This is an automated email from the ASF dual-hosted git repository.

astefanutti pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-k.git

commit cc1eb6f5df515b38aa66d296c85a913039cd9b89
Author: phantomjinx <[email protected]>
AuthorDate: Mon Sep 20 13:31:17 2021 +0100

    Moves patches back into config directory
    
    * config/manager
     * permanent default patches for node-toleration, node-selector and resource
       requirements always applied in their default state
     * pull-policy, ports and watch-namespace patches avalailable to be applied
       if user wishes to manually add them
    
    * config/rbac
     * role promotion patches available to be applied if user wishes to manually
       add them
    
    * config/samples
     * integration platform patch always applied but empty so user can add
       additional properties
    
    * install
     * Moves all patches out of directory so while this may drive and automated
       install, it is possible to do a manual kustomize install using just the
       config directory
    
    # Conflicts:
    #   pkg/resources/resources.go
---
 config/manager/kustomization.yaml                  |   5 +
 .../manager}/patch-image-pull-policy-always.yaml   |   0
 .../manager}/patch-node-selector.yaml              |   0
 .../operator => config/manager}/patch-ports.yaml   |   0
 .../manager}/patch-resource-requirements.yaml      |   0
 .../manager}/patch-toleration.yaml                 |   0
 .../manager}/patch-watch-namespace-global.yaml     |   0
 .../rbac}/patch-role-to-clusterrole.yaml           |   0
 .../patch-rolebinding-to-clusterrolebinding.yaml   |   0
 config/samples/kustomization.yaml                  |   3 +
 .../samples}/patch-integration-platform.yaml       |   0
 install/Makefile                                   |  48 ++++++----
 install/operator/kustomization.yaml                |   5 -
 install/platform/kustomization.yaml                |   3 -
 pkg/resources/resources.go                         | 106 +++++++++++++++++++++
 15 files changed, 142 insertions(+), 28 deletions(-)

diff --git a/config/manager/kustomization.yaml 
b/config/manager/kustomization.yaml
index 895978a..94d3d33 100644
--- a/config/manager/kustomization.yaml
+++ b/config/manager/kustomization.yaml
@@ -21,3 +21,8 @@ kind: Kustomization
 resources:
 - operator-deployment.yaml
 - operator-service-account.yaml
+
+patchesStrategicMerge:
+- patch-toleration.yaml
+- patch-node-selector.yaml
+- patch-resource-requirements.yaml
diff --git a/install/operator/patch-image-pull-policy-always.yaml 
b/config/manager/patch-image-pull-policy-always.yaml
similarity index 100%
rename from install/operator/patch-image-pull-policy-always.yaml
rename to config/manager/patch-image-pull-policy-always.yaml
diff --git a/install/operator/patch-node-selector.yaml 
b/config/manager/patch-node-selector.yaml
similarity index 100%
rename from install/operator/patch-node-selector.yaml
rename to config/manager/patch-node-selector.yaml
diff --git a/install/operator/patch-ports.yaml b/config/manager/patch-ports.yaml
similarity index 100%
rename from install/operator/patch-ports.yaml
rename to config/manager/patch-ports.yaml
diff --git a/install/operator/patch-resource-requirements.yaml 
b/config/manager/patch-resource-requirements.yaml
similarity index 100%
rename from install/operator/patch-resource-requirements.yaml
rename to config/manager/patch-resource-requirements.yaml
diff --git a/install/operator/patch-toleration.yaml 
b/config/manager/patch-toleration.yaml
similarity index 100%
rename from install/operator/patch-toleration.yaml
rename to config/manager/patch-toleration.yaml
diff --git a/install/operator/patch-watch-namespace-global.yaml 
b/config/manager/patch-watch-namespace-global.yaml
similarity index 100%
rename from install/operator/patch-watch-namespace-global.yaml
rename to config/manager/patch-watch-namespace-global.yaml
diff --git a/install/setup/patch-role-to-clusterrole.yaml 
b/config/rbac/patch-role-to-clusterrole.yaml
similarity index 100%
rename from install/setup/patch-role-to-clusterrole.yaml
rename to config/rbac/patch-role-to-clusterrole.yaml
diff --git a/install/setup/patch-rolebinding-to-clusterrolebinding.yaml 
b/config/rbac/patch-rolebinding-to-clusterrolebinding.yaml
similarity index 100%
rename from install/setup/patch-rolebinding-to-clusterrolebinding.yaml
rename to config/rbac/patch-rolebinding-to-clusterrolebinding.yaml
diff --git a/config/samples/kustomization.yaml 
b/config/samples/kustomization.yaml
index 1c7e1bb..e1bcc89 100644
--- a/config/samples/kustomization.yaml
+++ b/config/samples/kustomization.yaml
@@ -28,3 +28,6 @@ resources:
 - bases/camel_v1_build.yaml
 - bases/camel_v1_kamelet.yaml
 - bases/camel_v1_kameletbinding.yaml
+
+patchesStrategicMerge:
+- patch-integration-platform.yaml
diff --git a/install/platform/patch-integration-platform.yaml 
b/config/samples/patch-integration-platform.yaml
similarity index 100%
rename from install/platform/patch-integration-platform.yaml
rename to config/samples/patch-integration-platform.yaml
diff --git a/install/Makefile b/install/Makefile
index 8d321c6..bbc5a91 100644
--- a/install/Makefile
+++ b/install/Makefile
@@ -50,21 +50,24 @@ MONITORING_PORT ?= 8080
 HEALTH_PORT ?= 8081
 
 CONFIG := ../config
-RBAC_OS := $(CONFIG)/rbac/openshift
+MANAGER := $(CONFIG)/manager
+SAMPLES := $(CONFIG)/samples
+RBAC := $(CONFIG)/rbac
+RBAC_OS := $(RBAC)/openshift
 RBAC_GLOBAL := global
 OPERATOR := operator
 PLACEHOLDER := placeholder
 YAML := yaml
 
 # Setup patches
-ROLE_TO_CROLE_PATCH := patch-role-to-clusterrole
-ROLEBIN_TO_CROLEBIN_PATCH := patch-rolebinding-to-clusterrolebinding
+ROLE_TO_CROLE_PATCH := $(RBAC)/patch-role-to-clusterrole
+ROLEBIN_TO_CROLEBIN_PATCH := $(RBAC)/patch-rolebinding-to-clusterrolebinding
 # Operator patches
 PORTS_PATCH := patch-ports
 IMAGE_PULL_POLICY_PATCH := patch-image-pull-policy-always
 WATCH_NAMESPACE_PATCH := patch-watch-namespace-global
 # Platform patches
-INT_PLATFORM_PATCH := platform/patch-integration-platform
+INT_PLATFORM_PATCH := patch-integration-platform
 
 #
 # Macro for editing kustomization to define
@@ -197,11 +200,16 @@ setup: setup-cluster
        @$(call set-kustomize-namespace,$@)
 # If GLOBAL then add the conversion patches for all roles and rolebindings
 ifeq ($(GLOBAL),true)
-       @$(call 
add-remove-kind-patch,setup,add,$(ROLE_TO_CROLE_PATCH).$(YAML),Role)
-       @$(call 
add-remove-kind-patch,setup,add,$(ROLEBIN_TO_CROLEBIN_PATCH).$(YAML),RoleBinding)
+       @$(call 
add-remove-kind-patch,setup,add,../$(ROLE_TO_CROLE_PATCH).$(YAML),Role)
+       @$(call 
add-remove-kind-patch,setup,add,../$(ROLEBIN_TO_CROLEBIN_PATCH).$(YAML),RoleBinding)
 else
-       @$(call 
add-remove-kind-patch,setup,remove,$(ROLE_TO_CROLE_PATCH).$(YAML),Role)
-       @$(call 
add-remove-kind-patch,setup,remove,$(ROLEBIN_TO_CROLEBIN_PATCH).$(YAML),RoleBinding)
+       @$(call 
add-remove-kind-patch,setup,remove,../$(ROLE_TO_CROLE_PATCH).$(YAML),Role)
+       @$(call 
add-remove-kind-patch,setup,remove,../$(ROLEBIN_TO_CROLEBIN_PATCH).$(YAML),RoleBinding)
+endif
+ifeq ($(PLATFORM), openshift)
+       @for res in $(RBAC_OS)/operator-role*; do \
+               (cd $@ && $(KUSTOMIZE) edit add resource ../$$res); \
+       done
 endif
 #
 # Build the resources
@@ -223,10 +231,10 @@ endif
 # Customizes the port patch
 #
 .operator-port-patch:
-       @sed -i 's/--monitoring-port=.*/--monitoring-port=$(MONITORING_PORT)/' 
$(OPERATOR)/$(PORTS_PATCH).$(YAML)
-       @sed -i '/path:.*\/containerPort/,/- op/{s/value: .*/value: 
$(MONITORING_PORT)/}' $(OPERATOR)/$(PORTS_PATCH).$(YAML)
-       @sed -i 's/--health-port=.*/--health-port=$(HEALTH_PORT)/' 
$(OPERATOR)/$(PORTS_PATCH).$(YAML)
-       @sed -i '/path:.*\/httpGet\/port/,/- op/{s/value: .*/value: 
$(HEALTH_PORT)/}' $(OPERATOR)/$(PORTS_PATCH).$(YAML)
+       @sed -i 's/--monitoring-port=.*/--monitoring-port=$(MONITORING_PORT)/' 
$(MANAGER)/$(PORTS_PATCH).$(YAML)
+       @sed -i '/path:.*\/containerPort/,/- op/{s/value: .*/value: 
$(MONITORING_PORT)/}' $(MANAGER)/$(PORTS_PATCH).$(YAML)
+       @sed -i 's/--health-port=.*/--health-port=$(HEALTH_PORT)/' 
$(MANAGER)/$(PORTS_PATCH).$(YAML)
+       @sed -i '/path:.*\/httpGet\/port/,/- op/{s/value: .*/value: 
$(HEALTH_PORT)/}' $(MANAGER)/$(PORTS_PATCH).$(YAML)
 
 .operator-can-monitor: kubectl
        @output=$$(kubectl get crd prometheusrules.monitoring.coreos.com 2>&1) 
|| (echo "****" && echo "**** ERROR: Montoring not available as Prometheus CRDs 
not installed in cluster ****" && echo "****"; exit 1)
@@ -261,21 +269,21 @@ endif
        @$(call set-kustomize-image,$@)
 # Set the WATCH NAMESPACE env var depending on GLOBAL var
 ifeq ($(GLOBAL), true)
-       @$(call 
add-remove-kind-patch,$@,add,$(WATCH_NAMESPACE_PATCH).$(YAML),Deployment)
+       @$(call 
add-remove-kind-patch,$(MANAGER),add,$(WATCH_NAMESPACE_PATCH).$(YAML),Deployment)
 else
-       @$(call 
add-remove-kind-patch,$@,remove,$(WATCH_NAMESPACE_PATCH).$(YAML),Deployment)
+       @$(call 
add-remove-kind-patch,$(MANAGER),remove,$(WATCH_NAMESPACE_PATCH).$(YAML),Deployment)
 endif
 # Set the ALWAYS_PULL_IMAGES config depending on var
 ifeq ($(ALWAYS_PULL_IMAGES),true)
-       @$(call 
add-remove-kind-patch,$@,add,$(IMAGE_PULL_POLICY_PATCH).$(YAML),Deployment)
+       @$(call 
add-remove-kind-patch,$(MANAGER),add,$(IMAGE_PULL_POLICY_PATCH).$(YAML),Deployment)
 else
-       @$(call 
add-remove-kind-patch,$@,remove,$(IMAGE_PULL_POLICY_PATCH).$(YAML),Deployment)
+       @$(call 
add-remove-kind-patch,$(MANAGER),remove,$(IMAGE_PULL_POLICY_PATCH).$(YAML),Deployment)
 endif
 # Set the PORTS depending on vars
 ifneq ($(MONITORING_PORT), 8080)
-       @$(call add-remove-kind-patch,$@,add,$(PORTS_PATCH).$(YAML),Deployment)
+       @$(call 
add-remove-kind-patch,$(MANAGER),add,$(PORTS_PATCH).$(YAML),Deployment)
 else ifneq ($(HEALTH_PORT), 8081)
-       @$(call add-remove-kind-patch,$@,add,$(PORTS_PATCH).$(YAML),Deployment)
+       @$(call 
add-remove-kind-patch,$(MANAGER),add,$(PORTS_PATCH).$(YAML),Deployment)
 endif
 ifeq ($(DRY_RUN), false)
        @$(KUSTOMIZE) build $(KOPTIONS) $@ | kubectl apply -f -
@@ -289,13 +297,13 @@ endif
 # Customizes the samples patches for kubernetes
 #
 .platform-kubernetes-patch:
-       @sed -i 's/.*profile:.*/  profile: Kubernetes/' 
$(INT_PLATFORM_PATCH).$(YAML)
+       @sed -i 's/.*profile:.*/  profile: Kubernetes/' 
$(SAMPLES)/$(INT_PLATFORM_PATCH).$(YAML)
 
 #
 # Customizes the samples patches for openshift
 #
 .platform-openshift-patch:
-       @sed -i 's/.*profile:.*/  profile: Openshift/' 
$(INT_PLATFORM_PATCH).$(YAML)
+       @sed -i 's/.*profile:.*/  profile: Openshift/' 
$(SAMPLES)/$(INT_PLATFORM_PATCH).$(YAML)
 
 #
 # Install the integration platform
diff --git a/install/operator/kustomization.yaml 
b/install/operator/kustomization.yaml
index 9467eee..3b5d1f1 100644
--- a/install/operator/kustomization.yaml
+++ b/install/operator/kustomization.yaml
@@ -44,8 +44,3 @@ kind: Kustomization
 
 resources:
 - ../../config/manager
-
-patchesStrategicMerge:
-- patch-toleration.yaml
-- patch-node-selector.yaml
-- patch-resource-requirements.yaml
diff --git a/install/platform/kustomization.yaml 
b/install/platform/kustomization.yaml
index c4c77e0..7102db8 100644
--- a/install/platform/kustomization.yaml
+++ b/install/platform/kustomization.yaml
@@ -22,6 +22,3 @@
 #
 resources:
 - ../../config/samples/bases/camel_v1_integrationplatform.yaml
-
-patchesStrategicMerge:
-- patch-integration-platform.yaml
diff --git a/pkg/resources/resources.go b/pkg/resources/resources.go
index ea0fc45..1186d7e 100644
--- a/pkg/resources/resources.go
+++ b/pkg/resources/resources.go
@@ -181,6 +181,48 @@ var assets = func() http.FileSystem {
 
                        compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\x4d\x6f\x9b\x40\x14\xbc\xef\xaf\x18\x99\x4b\x22\xf9\xa3\xed\xd1\x3d\xd1\xc4\x56\x51\x23\x5b\x0a\x4e\xa3\x1c\x9f\xe1\x19\x9e\x02\xfb\xe8\xee\x12\xe2\x7f\x5f\x2d\xb6\x9b\x44\xbd\x66\x6f\x88\x61\x3e\x76\x86\x04\xb3\xcf\x3b\x26\xc1\x9d\x14\x6c\x3d\x97\x08\x8a\x50\x33\xd2\x8e\x8a\x9a\x91\xeb\x21\x0c\xe4\x18\x6b\xed\x6d\x49\x41\xd4\xe2\x2a\xcd\xd7\xd7\xe8\x6d\xc9\x0e\x6a\x19\xea\xd0\xaa\x63\x93\xa0\x50\x1b\x9c\xec\x
 [...]
                },
+               "/manager/patch-image-pull-policy-always.yaml": 
&vfsgen۰CompressedFileInfo{
+                       name:             "patch-image-pull-policy-always.yaml",
+                       modTime:          time.Time{},
+                       uncompressedSize: 185,
+
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8c\x31\x0a\xc3\x30\x10\x04\x7b\xbd\xe2\x3e\x60\x42\x5a\x75\x81\x3c\xc0\x55\xfa\x45\x5e\x82\xf0\x49\x3a\xa4\x4b\x82\x7f\x1f\x54\x38\x5d\xa6\x5a\x66\x61\x60\xf9\xc1\x3e\x72\xab\x51\x60\x36\x2e\xef\x6b\xd8\x73\xdd\xa2\xdc\x69\xda\x8e\xc2\xea\xa1\xd0\xb1\xc1\x11\x83\x48\x45\x61\x94\x84\x42\x5d\xf6\xa5\x19\x3b\xbc\xf5\x30\x8c\x69\xde\xce\x62\x0a\xe7\xdc\x22\xa7\x9d\xa4\x56\x1d\xb9\xb2\x8f\xd3\x88\x2c\xff\x72\xf2\x23\x
 [...]
+               },
+               "/manager/patch-node-selector.yaml": &vfsgen۰CompressedFileInfo{
+                       name:             "patch-node-selector.yaml",
+                       modTime:          time.Time{},
+                       uncompressedSize: 1155,
+
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\xcd\x6e\xe3\x36\x10\xbe\xf3\x29\x3e\x58\x97\x5d\xc0\x3f\x6d\x8f\xee\x49\x4d\x6c\x54\xe8\xc2\x06\x22\x6f\x83\x1c\x69\x71\x2c\x0d\x4c\x71\x58\x92\x8a\xe2\xb7\x2f\x28\xdb\x4d\x82\x5e\x33\x27\x49\x1c\xcd\x7c\x7f\x2c\xb0\xf8\xba\x52\x05\x7e\x70\x43\x2e\x92\x41\x12\xa4\x8e\x50\x7a\xdd\x74\x84\x5a\x4e\x69\xd4\x81\xb0\x95\xc1\x19\x9d\x58\x1c\xbe\x95\xf5\xf6\x3b\x06\x67\x28\x40\x1c\x41\x02\x7a\x09\xa4\x0a\x34\xe2\x52\x
 [...]
+               },
+               "/manager/patch-ports.yaml": &vfsgen۰CompressedFileInfo{
+                       name:             "patch-ports.yaml",
+                       modTime:          time.Time{},
+                       uncompressedSize: 1241,
+
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\xcb\x6e\xeb\x36\x14\xdc\xf3\x2b\x06\xd6\x26\x01\x6c\xcb\xe9\x2a\x70\xd1\x85\x9b\xd8\xad\xd0\xc0\x0e\x22\xa7\x41\x96\xb4\x74\x2c\x1d\x54\xe2\x61\x49\x2a\x8a\xff\xbe\xa0\xfc\x48\x82\x6e\x2e\x2e\xc2\x8d\xc0\x87\xe6\xc1\x19\x26\x98\x7c\xdf\x50\x09\x1e\xb8\x20\xe3\xa9\x44\x10\x84\x9a\xb0\xb0\xba\xa8\x09\xb9\xec\x43\xaf\x1d\x61\x25\x9d\x29\x75\x60\x31\xb8\x5a\xe4\xab\x6b\x74\xa6\x24\x07\x31\x04\x71\x68\xc5\x91\x4a\x
 [...]
+               },
+               "/manager/patch-resource-requirements.yaml": 
&vfsgen۰CompressedFileInfo{
+                       name:             "patch-resource-requirements.yaml",
+                       modTime:          time.Time{},
+                       uncompressedSize: 1412,
+
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x54\xc1\x8e\xdb\x36\x10\xbd\xf3\x2b\x1e\xac\x4b\x02\xac\xed\xcd\xa2\x29\x0a\xf7\xa4\xee\xae\x51\xa1\xa9\x0d\xac\x9c\x06\x39\xd2\xe2\x58\x1a\xac\xc4\x61\x49\x2a\x8a\xff\xbe\xa0\x6c\x65\xed\x04\xdb\x53\xe6\x64\x71\xc8\x37\xef\xcd\x9b\x71\x86\xf9\xcf\x0b\x95\xe1\x03\x57\x64\x03\x19\x44\x41\x6c\x08\xb9\xd3\x55\x43\x28\xe5\x10\x07\xed\x09\x6b\xe9\xad\xd1\x91\xc5\xe2\x4d\x5e\xae\xdf\xa2\xb7\x86\x3c\xc4\x12\xc4\xa3\x13\x
 [...]
+               },
+               "/manager/patch-toleration.yaml": &vfsgen۰CompressedFileInfo{
+                       name:             "patch-toleration.yaml",
+                       modTime:          time.Time{},
+                       uncompressedSize: 1226,
+
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\x4d\x8f\xdb\x36\x10\xbd\xf3\x57\x3c\x48\x97\x04\xf0\x47\xd3\xa3\x7a\x52\x77\x6d\x54\x68\x20\x03\x2b\xa7\x41\x8e\xb4\x38\x92\x08\x53\x1c\x85\xa4\x56\xf1\xbf\x2f\x28\x5b\xb5\x8d\x5e\x97\x17\x5b\x33\xc3\x99\xf7\xe6\x3d\xa6\x58\x7f\xdc\x11\x29\xbe\xea\x9a\xac\x27\x85\xc0\x08\x1d\x21\x1f\x64\xdd\x11\x2a\x6e\xc2\x24\x1d\x61\xcf\xa3\x55\x32\x68\xb6\xf8\x94\x57\xfb\xcf\x18\xad\x22\x07\xb6\x04\x76\xe8\xd9\x91\x48\x51\x
 [...]
+               },
+               "/manager/patch-watch-namespace-global.yaml": 
&vfsgen۰CompressedFileInfo{
+                       name:             "patch-watch-namespace-global.yaml",
+                       modTime:          time.Time{},
+                       uncompressedSize: 1086,
+
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\x4d\x4f\xe3\x3a\x14\xdd\xfb\x57\x1c\x35\x0b\x40\x2a\x0d\x7a\xcb\xbe\x55\x1e\xb4\x7a\xd1\xa0\x54\x22\x65\x10\x4b\x37\xb9\x4d\xae\x26\xf1\xf5\xd8\x4e\x43\xff\xfd\xc8\x69\x3b\x80\x66\x37\xc2\x9b\xca\xea\xcd\xf9\xb8\xe7\x38\xc1\xed\xd7\x1d\x95\xe0\x91\x2b\x32\x9e\x6a\x04\x41\x68\x09\x99\xd5\x55\x4b\x28\x65\x1f\x46\xed\x08\x6b\x19\x4c\xad\x03\x8b\xc1\x75\x56\xae\x6f\x30\x98\x9a\x1c\xc4\x10\xc4\xa1\x17\x47\x2a\x41\x
 [...]
+               },
                "/prometheus": &vfsgen۰DirInfo{
                        name:    "prometheus",
                        modTime: time.Time{},
@@ -333,6 +375,18 @@ var assets = func() http.FileSystem {
 
                        compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x55\xc1\x6e\xe3\x36\x10\xbd\xeb\x2b\x1e\xac\xcb\x6e\x11\xdb\x6d\x4f\x85\x7b\x72\x77\x93\xd6\xe8\xc2\x06\x22\x6f\x17\x7b\xa4\xa8\xb1\x3c\x0d\xc5\x61\x49\x2a\x8a\xfb\xf5\x05\x29\x7b\xd7\x59\x27\x40\x0e\x41\x5b\x5d\x3c\xa4\x46\x6f\xde\x9b\x79\x26\x4b\x4c\x5f\xef\x29\x4a\x7c\x60\x4d\x36\x50\x83\x28\x88\x7b\xc2\xd2\x29\xbd\x27\x54\xb2\x8b\x83\xf2\x84\x1b\xe9\x6d\xa3\x22\x8b\xc5\x9b\x65\x75\xf3\x16\xbd\x6d\xc8\x43\x2c\x
 [...]
                },
+               "/rbac/patch-role-to-clusterrole.yaml": &vfsgen۰FileInfo{
+                       name:    "patch-role-to-clusterrole.yaml",
+                       modTime: time.Time{},
+                       content: 
[]byte("\x2d\x20\x6f\x70\x3a\x20\x72\x65\x70\x6c\x61\x63\x65\x0a\x20\x20\x70\x61\x74\x68\x3a\x20\x2f\x6b\x69\x6e\x64\x0a\x20\x20\x76\x61\x6c\x75\x65\x3a\x20\x43\x6c\x75\x73\x74\x65\x72\x52\x6f\x6c\x65\x0a"),
+               },
+               "/rbac/patch-rolebinding-to-clusterrolebinding.yaml": 
&vfsgen۰CompressedFileInfo{
+                       name:             
"patch-rolebinding-to-clusterrolebinding.yaml",
+                       modTime:          time.Time{},
+                       uncompressedSize: 174,
+
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\xcd\xcd\x0d\xc2\x30\x10\x44\xe1\xbb\xab\x98\x06\x90\x39\xfb\x08\x1d\xa4\x83\x25\x3b\x10\xc3\x62\x5b\xfe\xa1\x7e\x24\x88\x94\x93\x0b\xf8\xde\x3b\x21\x97\x80\xca\x62\xb2\xd2\x01\x45\xfa\x16\xe0\x5f\x31\xa9\x03\x3e\x62\x83\x01\x57\x1b\xad\xb3\x2e\xd9\x78\x89\x49\x63\x7a\xb8\x89\xab\xd9\xb8\xf0\x3e\xf7\x3b\x14\xd5\x03\xb5\x71\x7b\x72\xed\xcd\x9f\x7d\x92\x37\x5b\xf9\x27\x77\xfc\x3b\x6c\xd9\x94\xd5\x7d\x03\x00\x00\xff\x
 [...]
+               },
                "/rbac/user-cluster-role.yaml": &vfsgen۰CompressedFileInfo{
                        name:             "user-cluster-role.yaml",
                        modTime:          time.Time{},
@@ -411,6 +465,13 @@ var assets = func() http.FileSystem {
 
                        compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\xc1\x8e\xdb\x36\x10\xbd\xf3\x2b\x1e\xac\x4b\x02\x38\x72\xd3\xa3\x7b\x72\x1c\x1b\x11\x92\xda\xc0\xca\xe9\x62\x8f\x63\x69\x2c\x0d\x4c\x91\x2c\x49\x59\xeb\xbf\x2f\x28\xdb\x5d\x1b\x2d\x8a\x1e\x56\x27\x8a\x1c\xce\x7b\x6f\xde\x63\x86\x4f\xef\xf7\xa9\x0c\x3f\xa4\x62\x13\xb8\x46\xb4\x88\x2d\x63\xe1\xa8\x6a\x19\xa5\x3d\xc4\x81\x3c\x63\x6d\x7b\x53\x53\x14\x6b\xf0\x61\x51\xae\x3f\xa2\x37\x35\x7b\x58\xc3\xb0\x1e\x9d\xf5\x
 [...]
                },
+               "/samples/patch-integration-platform.yaml": 
&vfsgen۰CompressedFileInfo{
+                       name:             "patch-integration-platform.yaml",
+                       modTime:          time.Time{},
+                       uncompressedSize: 3711,
+
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x57\x5f\x8f\xdb\xb8\x11\x7f\xd7\xa7\x18\xc4\x2f\x09\x20\xcb\xd9\xb4\x45\x51\xf5\xc9\xd9\xec\xf6\xdc\x4d\xec\x60\xb5\xd7\xeb\xa1\xe8\xc3\x98\x1a\x4b\x84\x29\x52\x25\xa9\x75\xdc\x6e\xbf\x7b\x31\x24\x65\xcb\x1b\xdf\xa1\x0f\x67\x60\xbd\x36\x35\x7f\x7e\x33\xf3\x9b\xe1\x78\x06\xf3\xdf\xee\x95\xcd\xe0\xb3\x14\xa4\x1d\xd5\xe0\x0d\xf8\x96\x60\xd9\xa3\x68\x09\x2a\xb3\xf3\x07\xb4\x04\xf7\x66\xd0\x35\x7a\x69\x34\xbc\x5d\x56\x
 [...]
+               },
                "/templates": &vfsgen۰DirInfo{
                        name:    "templates",
                        modTime: time.Time{},
@@ -521,6 +582,12 @@ var assets = func() http.FileSystem {
        fs["/manager"].(*vfsgen۰DirInfo).entries = []os.FileInfo{
                fs["/manager/operator-deployment.yaml"].(os.FileInfo),
                fs["/manager/operator-service-account.yaml"].(os.FileInfo),
+               
fs["/manager/patch-image-pull-policy-always.yaml"].(os.FileInfo),
+               fs["/manager/patch-node-selector.yaml"].(os.FileInfo),
+               fs["/manager/patch-ports.yaml"].(os.FileInfo),
+               fs["/manager/patch-resource-requirements.yaml"].(os.FileInfo),
+               fs["/manager/patch-toleration.yaml"].(os.FileInfo),
+               fs["/manager/patch-watch-namespace-global.yaml"].(os.FileInfo),
        }
        fs["/prometheus"].(*vfsgen۰DirInfo).entries = []os.FileInfo{
                fs["/prometheus/operator-pod-monitor.yaml"].(os.FileInfo),
@@ -542,6 +609,8 @@ var assets = func() http.FileSystem {
                fs["/rbac/operator-role-service-binding.yaml"].(os.FileInfo),
                fs["/rbac/operator-role-strimzi.yaml"].(os.FileInfo),
                fs["/rbac/operator-role.yaml"].(os.FileInfo),
+               fs["/rbac/patch-role-to-clusterrole.yaml"].(os.FileInfo),
+               
fs["/rbac/patch-rolebinding-to-clusterrolebinding.yaml"].(os.FileInfo),
                fs["/rbac/user-cluster-role.yaml"].(os.FileInfo),
                
fs["/rbac/user-global-kamelet-viewer-role-binding.yaml"].(os.FileInfo),
                fs["/rbac/user-global-kamelet-viewer-role.yaml"].(os.FileInfo),
@@ -554,6 +623,7 @@ var assets = func() http.FileSystem {
        }
        fs["/samples"].(*vfsgen۰DirInfo).entries = []os.FileInfo{
                fs["/samples/bases"].(os.FileInfo),
+               fs["/samples/patch-integration-platform.yaml"].(os.FileInfo),
        }
        fs["/samples/bases"].(*vfsgen۰DirInfo).entries = []os.FileInfo{
                fs["/samples/bases/camel_v1_build.yaml"].(os.FileInfo),
@@ -597,6 +667,11 @@ func (fs vfsgen۰FS) Open(path string) (http.File, error) {
                        vfsgen۰CompressedFileInfo: f,
                        gr:                        gr,
                }, nil
+       case *vfsgen۰FileInfo:
+               return &vfsgen۰File{
+                       vfsgen۰FileInfo: f,
+                       Reader:          bytes.NewReader(f.content),
+               }, nil
        case *vfsgen۰DirInfo:
                return &vfsgen۰Dir{
                        vfsgen۰DirInfo: f,
@@ -678,6 +753,37 @@ func (f *vfsgen۰CompressedFile) Close() error {
        return f.gr.Close()
 }
 
+// vfsgen۰FileInfo is a static definition of an uncompressed file (because 
it's not worth gzip compressing).
+type vfsgen۰FileInfo struct {
+       name    string
+       modTime time.Time
+       content []byte
+}
+
+func (f *vfsgen۰FileInfo) Readdir(count int) ([]os.FileInfo, error) {
+       return nil, fmt.Errorf("cannot Readdir from file %s", f.name)
+}
+func (f *vfsgen۰FileInfo) Stat() (os.FileInfo, error) { return f, nil }
+
+func (f *vfsgen۰FileInfo) NotWorthGzipCompressing() {}
+
+func (f *vfsgen۰FileInfo) Name() string       { return f.name }
+func (f *vfsgen۰FileInfo) Size() int64        { return int64(len(f.content)) }
+func (f *vfsgen۰FileInfo) Mode() os.FileMode  { return 0444 }
+func (f *vfsgen۰FileInfo) ModTime() time.Time { return f.modTime }
+func (f *vfsgen۰FileInfo) IsDir() bool        { return false }
+func (f *vfsgen۰FileInfo) Sys() interface{}   { return nil }
+
+// vfsgen۰File is an opened file instance.
+type vfsgen۰File struct {
+       *vfsgen۰FileInfo
+       *bytes.Reader
+}
+
+func (f *vfsgen۰File) Close() error {
+       return nil
+}
+
 // vfsgen۰DirInfo is a static definition of a directory.
 type vfsgen۰DirInfo struct {
        name    string

Reply via email to