This is an automated email from the ASF dual-hosted git repository. astefanutti pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-k.git
commit cc1eb6f5df515b38aa66d296c85a913039cd9b89 Author: phantomjinx <[email protected]> AuthorDate: Mon Sep 20 13:31:17 2021 +0100 Moves patches back into config directory * config/manager * permanent default patches for node-toleration, node-selector and resource requirements always applied in their default state * pull-policy, ports and watch-namespace patches avalailable to be applied if user wishes to manually add them * config/rbac * role promotion patches available to be applied if user wishes to manually add them * config/samples * integration platform patch always applied but empty so user can add additional properties * install * Moves all patches out of directory so while this may drive and automated install, it is possible to do a manual kustomize install using just the config directory # Conflicts: # pkg/resources/resources.go --- config/manager/kustomization.yaml | 5 + .../manager}/patch-image-pull-policy-always.yaml | 0 .../manager}/patch-node-selector.yaml | 0 .../operator => config/manager}/patch-ports.yaml | 0 .../manager}/patch-resource-requirements.yaml | 0 .../manager}/patch-toleration.yaml | 0 .../manager}/patch-watch-namespace-global.yaml | 0 .../rbac}/patch-role-to-clusterrole.yaml | 0 .../patch-rolebinding-to-clusterrolebinding.yaml | 0 config/samples/kustomization.yaml | 3 + .../samples}/patch-integration-platform.yaml | 0 install/Makefile | 48 ++++++---- install/operator/kustomization.yaml | 5 - install/platform/kustomization.yaml | 3 - pkg/resources/resources.go | 106 +++++++++++++++++++++ 15 files changed, 142 insertions(+), 28 deletions(-) diff --git a/config/manager/kustomization.yaml b/config/manager/kustomization.yaml index 895978a..94d3d33 100644 --- a/config/manager/kustomization.yaml +++ b/config/manager/kustomization.yaml @@ -21,3 +21,8 @@ kind: Kustomization resources: - operator-deployment.yaml - operator-service-account.yaml + +patchesStrategicMerge: +- patch-toleration.yaml +- patch-node-selector.yaml +- patch-resource-requirements.yaml diff --git a/install/operator/patch-image-pull-policy-always.yaml b/config/manager/patch-image-pull-policy-always.yaml similarity index 100% rename from install/operator/patch-image-pull-policy-always.yaml rename to config/manager/patch-image-pull-policy-always.yaml diff --git a/install/operator/patch-node-selector.yaml b/config/manager/patch-node-selector.yaml similarity index 100% rename from install/operator/patch-node-selector.yaml rename to config/manager/patch-node-selector.yaml diff --git a/install/operator/patch-ports.yaml b/config/manager/patch-ports.yaml similarity index 100% rename from install/operator/patch-ports.yaml rename to config/manager/patch-ports.yaml diff --git a/install/operator/patch-resource-requirements.yaml b/config/manager/patch-resource-requirements.yaml similarity index 100% rename from install/operator/patch-resource-requirements.yaml rename to config/manager/patch-resource-requirements.yaml diff --git a/install/operator/patch-toleration.yaml b/config/manager/patch-toleration.yaml similarity index 100% rename from install/operator/patch-toleration.yaml rename to config/manager/patch-toleration.yaml diff --git a/install/operator/patch-watch-namespace-global.yaml b/config/manager/patch-watch-namespace-global.yaml similarity index 100% rename from install/operator/patch-watch-namespace-global.yaml rename to config/manager/patch-watch-namespace-global.yaml diff --git a/install/setup/patch-role-to-clusterrole.yaml b/config/rbac/patch-role-to-clusterrole.yaml similarity index 100% rename from install/setup/patch-role-to-clusterrole.yaml rename to config/rbac/patch-role-to-clusterrole.yaml diff --git a/install/setup/patch-rolebinding-to-clusterrolebinding.yaml b/config/rbac/patch-rolebinding-to-clusterrolebinding.yaml similarity index 100% rename from install/setup/patch-rolebinding-to-clusterrolebinding.yaml rename to config/rbac/patch-rolebinding-to-clusterrolebinding.yaml diff --git a/config/samples/kustomization.yaml b/config/samples/kustomization.yaml index 1c7e1bb..e1bcc89 100644 --- a/config/samples/kustomization.yaml +++ b/config/samples/kustomization.yaml @@ -28,3 +28,6 @@ resources: - bases/camel_v1_build.yaml - bases/camel_v1_kamelet.yaml - bases/camel_v1_kameletbinding.yaml + +patchesStrategicMerge: +- patch-integration-platform.yaml diff --git a/install/platform/patch-integration-platform.yaml b/config/samples/patch-integration-platform.yaml similarity index 100% rename from install/platform/patch-integration-platform.yaml rename to config/samples/patch-integration-platform.yaml diff --git a/install/Makefile b/install/Makefile index 8d321c6..bbc5a91 100644 --- a/install/Makefile +++ b/install/Makefile @@ -50,21 +50,24 @@ MONITORING_PORT ?= 8080 HEALTH_PORT ?= 8081 CONFIG := ../config -RBAC_OS := $(CONFIG)/rbac/openshift +MANAGER := $(CONFIG)/manager +SAMPLES := $(CONFIG)/samples +RBAC := $(CONFIG)/rbac +RBAC_OS := $(RBAC)/openshift RBAC_GLOBAL := global OPERATOR := operator PLACEHOLDER := placeholder YAML := yaml # Setup patches -ROLE_TO_CROLE_PATCH := patch-role-to-clusterrole -ROLEBIN_TO_CROLEBIN_PATCH := patch-rolebinding-to-clusterrolebinding +ROLE_TO_CROLE_PATCH := $(RBAC)/patch-role-to-clusterrole +ROLEBIN_TO_CROLEBIN_PATCH := $(RBAC)/patch-rolebinding-to-clusterrolebinding # Operator patches PORTS_PATCH := patch-ports IMAGE_PULL_POLICY_PATCH := patch-image-pull-policy-always WATCH_NAMESPACE_PATCH := patch-watch-namespace-global # Platform patches -INT_PLATFORM_PATCH := platform/patch-integration-platform +INT_PLATFORM_PATCH := patch-integration-platform # # Macro for editing kustomization to define @@ -197,11 +200,16 @@ setup: setup-cluster @$(call set-kustomize-namespace,$@) # If GLOBAL then add the conversion patches for all roles and rolebindings ifeq ($(GLOBAL),true) - @$(call add-remove-kind-patch,setup,add,$(ROLE_TO_CROLE_PATCH).$(YAML),Role) - @$(call add-remove-kind-patch,setup,add,$(ROLEBIN_TO_CROLEBIN_PATCH).$(YAML),RoleBinding) + @$(call add-remove-kind-patch,setup,add,../$(ROLE_TO_CROLE_PATCH).$(YAML),Role) + @$(call add-remove-kind-patch,setup,add,../$(ROLEBIN_TO_CROLEBIN_PATCH).$(YAML),RoleBinding) else - @$(call add-remove-kind-patch,setup,remove,$(ROLE_TO_CROLE_PATCH).$(YAML),Role) - @$(call add-remove-kind-patch,setup,remove,$(ROLEBIN_TO_CROLEBIN_PATCH).$(YAML),RoleBinding) + @$(call add-remove-kind-patch,setup,remove,../$(ROLE_TO_CROLE_PATCH).$(YAML),Role) + @$(call add-remove-kind-patch,setup,remove,../$(ROLEBIN_TO_CROLEBIN_PATCH).$(YAML),RoleBinding) +endif +ifeq ($(PLATFORM), openshift) + @for res in $(RBAC_OS)/operator-role*; do \ + (cd $@ && $(KUSTOMIZE) edit add resource ../$$res); \ + done endif # # Build the resources @@ -223,10 +231,10 @@ endif # Customizes the port patch # .operator-port-patch: - @sed -i 's/--monitoring-port=.*/--monitoring-port=$(MONITORING_PORT)/' $(OPERATOR)/$(PORTS_PATCH).$(YAML) - @sed -i '/path:.*\/containerPort/,/- op/{s/value: .*/value: $(MONITORING_PORT)/}' $(OPERATOR)/$(PORTS_PATCH).$(YAML) - @sed -i 's/--health-port=.*/--health-port=$(HEALTH_PORT)/' $(OPERATOR)/$(PORTS_PATCH).$(YAML) - @sed -i '/path:.*\/httpGet\/port/,/- op/{s/value: .*/value: $(HEALTH_PORT)/}' $(OPERATOR)/$(PORTS_PATCH).$(YAML) + @sed -i 's/--monitoring-port=.*/--monitoring-port=$(MONITORING_PORT)/' $(MANAGER)/$(PORTS_PATCH).$(YAML) + @sed -i '/path:.*\/containerPort/,/- op/{s/value: .*/value: $(MONITORING_PORT)/}' $(MANAGER)/$(PORTS_PATCH).$(YAML) + @sed -i 's/--health-port=.*/--health-port=$(HEALTH_PORT)/' $(MANAGER)/$(PORTS_PATCH).$(YAML) + @sed -i '/path:.*\/httpGet\/port/,/- op/{s/value: .*/value: $(HEALTH_PORT)/}' $(MANAGER)/$(PORTS_PATCH).$(YAML) .operator-can-monitor: kubectl @output=$$(kubectl get crd prometheusrules.monitoring.coreos.com 2>&1) || (echo "****" && echo "**** ERROR: Montoring not available as Prometheus CRDs not installed in cluster ****" && echo "****"; exit 1) @@ -261,21 +269,21 @@ endif @$(call set-kustomize-image,$@) # Set the WATCH NAMESPACE env var depending on GLOBAL var ifeq ($(GLOBAL), true) - @$(call add-remove-kind-patch,$@,add,$(WATCH_NAMESPACE_PATCH).$(YAML),Deployment) + @$(call add-remove-kind-patch,$(MANAGER),add,$(WATCH_NAMESPACE_PATCH).$(YAML),Deployment) else - @$(call add-remove-kind-patch,$@,remove,$(WATCH_NAMESPACE_PATCH).$(YAML),Deployment) + @$(call add-remove-kind-patch,$(MANAGER),remove,$(WATCH_NAMESPACE_PATCH).$(YAML),Deployment) endif # Set the ALWAYS_PULL_IMAGES config depending on var ifeq ($(ALWAYS_PULL_IMAGES),true) - @$(call add-remove-kind-patch,$@,add,$(IMAGE_PULL_POLICY_PATCH).$(YAML),Deployment) + @$(call add-remove-kind-patch,$(MANAGER),add,$(IMAGE_PULL_POLICY_PATCH).$(YAML),Deployment) else - @$(call add-remove-kind-patch,$@,remove,$(IMAGE_PULL_POLICY_PATCH).$(YAML),Deployment) + @$(call add-remove-kind-patch,$(MANAGER),remove,$(IMAGE_PULL_POLICY_PATCH).$(YAML),Deployment) endif # Set the PORTS depending on vars ifneq ($(MONITORING_PORT), 8080) - @$(call add-remove-kind-patch,$@,add,$(PORTS_PATCH).$(YAML),Deployment) + @$(call add-remove-kind-patch,$(MANAGER),add,$(PORTS_PATCH).$(YAML),Deployment) else ifneq ($(HEALTH_PORT), 8081) - @$(call add-remove-kind-patch,$@,add,$(PORTS_PATCH).$(YAML),Deployment) + @$(call add-remove-kind-patch,$(MANAGER),add,$(PORTS_PATCH).$(YAML),Deployment) endif ifeq ($(DRY_RUN), false) @$(KUSTOMIZE) build $(KOPTIONS) $@ | kubectl apply -f - @@ -289,13 +297,13 @@ endif # Customizes the samples patches for kubernetes # .platform-kubernetes-patch: - @sed -i 's/.*profile:.*/ profile: Kubernetes/' $(INT_PLATFORM_PATCH).$(YAML) + @sed -i 's/.*profile:.*/ profile: Kubernetes/' $(SAMPLES)/$(INT_PLATFORM_PATCH).$(YAML) # # Customizes the samples patches for openshift # .platform-openshift-patch: - @sed -i 's/.*profile:.*/ profile: Openshift/' $(INT_PLATFORM_PATCH).$(YAML) + @sed -i 's/.*profile:.*/ profile: Openshift/' $(SAMPLES)/$(INT_PLATFORM_PATCH).$(YAML) # # Install the integration platform diff --git a/install/operator/kustomization.yaml b/install/operator/kustomization.yaml index 9467eee..3b5d1f1 100644 --- a/install/operator/kustomization.yaml +++ b/install/operator/kustomization.yaml @@ -44,8 +44,3 @@ kind: Kustomization resources: - ../../config/manager - -patchesStrategicMerge: -- patch-toleration.yaml -- patch-node-selector.yaml -- patch-resource-requirements.yaml diff --git a/install/platform/kustomization.yaml b/install/platform/kustomization.yaml index c4c77e0..7102db8 100644 --- a/install/platform/kustomization.yaml +++ b/install/platform/kustomization.yaml @@ -22,6 +22,3 @@ # resources: - ../../config/samples/bases/camel_v1_integrationplatform.yaml - -patchesStrategicMerge: -- patch-integration-platform.yaml diff --git a/pkg/resources/resources.go b/pkg/resources/resources.go index ea0fc45..1186d7e 100644 --- a/pkg/resources/resources.go +++ b/pkg/resources/resources.go @@ -181,6 +181,48 @@ var assets = func() http.FileSystem { compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\x4d\x6f\x9b\x40\x14\xbc\xef\xaf\x18\x99\x4b\x22\xf9\xa3\xed\xd1\x3d\xd1\xc4\x56\x51\x23\x5b\x0a\x4e\xa3\x1c\x9f\xe1\x19\x9e\x02\xfb\xe8\xee\x12\xe2\x7f\x5f\x2d\xb6\x9b\x44\xbd\x66\x6f\x88\x61\x3e\x76\x86\x04\xb3\xcf\x3b\x26\xc1\x9d\x14\x6c\x3d\x97\x08\x8a\x50\x33\xd2\x8e\x8a\x9a\x91\xeb\x21\x0c\xe4\x18\x6b\xed\x6d\x49\x41\xd4\xe2\x2a\xcd\xd7\xd7\xe8\x6d\xc9\x0e\x6a\x19\xea\xd0\xaa\x63\x93\xa0\x50\x1b\x9c\xec\x [...] }, + "/manager/patch-image-pull-policy-always.yaml": &vfsgen۰CompressedFileInfo{ + name: "patch-image-pull-policy-always.yaml", + modTime: time.Time{}, + uncompressedSize: 185, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8c\x31\x0a\xc3\x30\x10\x04\x7b\xbd\xe2\x3e\x60\x42\x5a\x75\x81\x3c\xc0\x55\xfa\x45\x5e\x82\xf0\x49\x3a\xa4\x4b\x82\x7f\x1f\x54\x38\x5d\xa6\x5a\x66\x61\x60\xf9\xc1\x3e\x72\xab\x51\x60\x36\x2e\xef\x6b\xd8\x73\xdd\xa2\xdc\x69\xda\x8e\xc2\xea\xa1\xd0\xb1\xc1\x11\x83\x48\x45\x61\x94\x84\x42\x5d\xf6\xa5\x19\x3b\xbc\xf5\x30\x8c\x69\xde\xce\x62\x0a\xe7\xdc\x22\xa7\x9d\xa4\x56\x1d\xb9\xb2\x8f\xd3\x88\x2c\xff\x72\xf2\x23\x [...] + }, + "/manager/patch-node-selector.yaml": &vfsgen۰CompressedFileInfo{ + name: "patch-node-selector.yaml", + modTime: time.Time{}, + uncompressedSize: 1155, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\xcd\x6e\xe3\x36\x10\xbe\xf3\x29\x3e\x58\x97\x5d\xc0\x3f\x6d\x8f\xee\x49\x4d\x6c\x54\xe8\xc2\x06\x22\x6f\x83\x1c\x69\x71\x2c\x0d\x4c\x71\x58\x92\x8a\xe2\xb7\x2f\x28\xdb\x4d\x82\x5e\x33\x27\x49\x1c\xcd\x7c\x7f\x2c\xb0\xf8\xba\x52\x05\x7e\x70\x43\x2e\x92\x41\x12\xa4\x8e\x50\x7a\xdd\x74\x84\x5a\x4e\x69\xd4\x81\xb0\x95\xc1\x19\x9d\x58\x1c\xbe\x95\xf5\xf6\x3b\x06\x67\x28\x40\x1c\x41\x02\x7a\x09\xa4\x0a\x34\xe2\x52\x [...] + }, + "/manager/patch-ports.yaml": &vfsgen۰CompressedFileInfo{ + name: "patch-ports.yaml", + modTime: time.Time{}, + uncompressedSize: 1241, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\xcb\x6e\xeb\x36\x14\xdc\xf3\x2b\x06\xd6\x26\x01\x6c\xcb\xe9\x2a\x70\xd1\x85\x9b\xd8\xad\xd0\xc0\x0e\x22\xa7\x41\x96\xb4\x74\x2c\x1d\x54\xe2\x61\x49\x2a\x8a\xff\xbe\xa0\xfc\x48\x82\x6e\x2e\x2e\xc2\x8d\xc0\x87\xe6\xc1\x19\x26\x98\x7c\xdf\x50\x09\x1e\xb8\x20\xe3\xa9\x44\x10\x84\x9a\xb0\xb0\xba\xa8\x09\xb9\xec\x43\xaf\x1d\x61\x25\x9d\x29\x75\x60\x31\xb8\x5a\xe4\xab\x6b\x74\xa6\x24\x07\x31\x04\x71\x68\xc5\x91\x4a\x [...] + }, + "/manager/patch-resource-requirements.yaml": &vfsgen۰CompressedFileInfo{ + name: "patch-resource-requirements.yaml", + modTime: time.Time{}, + uncompressedSize: 1412, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x54\xc1\x8e\xdb\x36\x10\xbd\xf3\x2b\x1e\xac\x4b\x02\xac\xed\xcd\xa2\x29\x0a\xf7\xa4\xee\xae\x51\xa1\xa9\x0d\xac\x9c\x06\x39\xd2\xe2\x58\x1a\xac\xc4\x61\x49\x2a\x8a\xff\xbe\xa0\x6c\x65\xed\x04\xdb\x53\xe6\x64\x71\xc8\x37\xef\xcd\x9b\x71\x86\xf9\xcf\x0b\x95\xe1\x03\x57\x64\x03\x19\x44\x41\x6c\x08\xb9\xd3\x55\x43\x28\xe5\x10\x07\xed\x09\x6b\xe9\xad\xd1\x91\xc5\xe2\x4d\x5e\xae\xdf\xa2\xb7\x86\x3c\xc4\x12\xc4\xa3\x13\x [...] + }, + "/manager/patch-toleration.yaml": &vfsgen۰CompressedFileInfo{ + name: "patch-toleration.yaml", + modTime: time.Time{}, + uncompressedSize: 1226, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\x4d\x8f\xdb\x36\x10\xbd\xf3\x57\x3c\x48\x97\x04\xf0\x47\xd3\xa3\x7a\x52\x77\x6d\x54\x68\x20\x03\x2b\xa7\x41\x8e\xb4\x38\x92\x08\x53\x1c\x85\xa4\x56\xf1\xbf\x2f\x28\x5b\xb5\x8d\x5e\x97\x17\x5b\x33\xc3\x99\xf7\xe6\x3d\xa6\x58\x7f\xdc\x11\x29\xbe\xea\x9a\xac\x27\x85\xc0\x08\x1d\x21\x1f\x64\xdd\x11\x2a\x6e\xc2\x24\x1d\x61\xcf\xa3\x55\x32\x68\xb6\xf8\x94\x57\xfb\xcf\x18\xad\x22\x07\xb6\x04\x76\xe8\xd9\x91\x48\x51\x [...] + }, + "/manager/patch-watch-namespace-global.yaml": &vfsgen۰CompressedFileInfo{ + name: "patch-watch-namespace-global.yaml", + modTime: time.Time{}, + uncompressedSize: 1086, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\x4d\x4f\xe3\x3a\x14\xdd\xfb\x57\x1c\x35\x0b\x40\x2a\x0d\x7a\xcb\xbe\x55\x1e\xb4\x7a\xd1\xa0\x54\x22\x65\x10\x4b\x37\xb9\x4d\xae\x26\xf1\xf5\xd8\x4e\x43\xff\xfd\xc8\x69\x3b\x80\x66\x37\xc2\x9b\xca\xea\xcd\xf9\xb8\xe7\x38\xc1\xed\xd7\x1d\x95\xe0\x91\x2b\x32\x9e\x6a\x04\x41\x68\x09\x99\xd5\x55\x4b\x28\x65\x1f\x46\xed\x08\x6b\x19\x4c\xad\x03\x8b\xc1\x75\x56\xae\x6f\x30\x98\x9a\x1c\xc4\x10\xc4\xa1\x17\x47\x2a\x41\x [...] + }, "/prometheus": &vfsgen۰DirInfo{ name: "prometheus", modTime: time.Time{}, @@ -333,6 +375,18 @@ var assets = func() http.FileSystem { compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x55\xc1\x6e\xe3\x36\x10\xbd\xeb\x2b\x1e\xac\xcb\x6e\x11\xdb\x6d\x4f\x85\x7b\x72\x77\x93\xd6\xe8\xc2\x06\x22\x6f\x17\x7b\xa4\xa8\xb1\x3c\x0d\xc5\x61\x49\x2a\x8a\xfb\xf5\x05\x29\x7b\xd7\x59\x27\x40\x0e\x41\x5b\x5d\x3c\xa4\x46\x6f\xde\x9b\x79\x26\x4b\x4c\x5f\xef\x29\x4a\x7c\x60\x4d\x36\x50\x83\x28\x88\x7b\xc2\xd2\x29\xbd\x27\x54\xb2\x8b\x83\xf2\x84\x1b\xe9\x6d\xa3\x22\x8b\xc5\x9b\x65\x75\xf3\x16\xbd\x6d\xc8\x43\x2c\x [...] }, + "/rbac/patch-role-to-clusterrole.yaml": &vfsgen۰FileInfo{ + name: "patch-role-to-clusterrole.yaml", + modTime: time.Time{}, + content: []byte("\x2d\x20\x6f\x70\x3a\x20\x72\x65\x70\x6c\x61\x63\x65\x0a\x20\x20\x70\x61\x74\x68\x3a\x20\x2f\x6b\x69\x6e\x64\x0a\x20\x20\x76\x61\x6c\x75\x65\x3a\x20\x43\x6c\x75\x73\x74\x65\x72\x52\x6f\x6c\x65\x0a"), + }, + "/rbac/patch-rolebinding-to-clusterrolebinding.yaml": &vfsgen۰CompressedFileInfo{ + name: "patch-rolebinding-to-clusterrolebinding.yaml", + modTime: time.Time{}, + uncompressedSize: 174, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\xcd\xcd\x0d\xc2\x30\x10\x44\xe1\xbb\xab\x98\x06\x90\x39\xfb\x08\x1d\xa4\x83\x25\x3b\x10\xc3\x62\x5b\xfe\xa1\x7e\x24\x88\x94\x93\x0b\xf8\xde\x3b\x21\x97\x80\xca\x62\xb2\xd2\x01\x45\xfa\x16\xe0\x5f\x31\xa9\x03\x3e\x62\x83\x01\x57\x1b\xad\xb3\x2e\xd9\x78\x89\x49\x63\x7a\xb8\x89\xab\xd9\xb8\xf0\x3e\xf7\x3b\x14\xd5\x03\xb5\x71\x7b\x72\xed\xcd\x9f\x7d\x92\x37\x5b\xf9\x27\x77\xfc\x3b\x6c\xd9\x94\xd5\x7d\x03\x00\x00\xff\x [...] + }, "/rbac/user-cluster-role.yaml": &vfsgen۰CompressedFileInfo{ name: "user-cluster-role.yaml", modTime: time.Time{}, @@ -411,6 +465,13 @@ var assets = func() http.FileSystem { compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\xc1\x8e\xdb\x36\x10\xbd\xf3\x2b\x1e\xac\x4b\x02\x38\x72\xd3\xa3\x7b\x72\x1c\x1b\x11\x92\xda\xc0\xca\xe9\x62\x8f\x63\x69\x2c\x0d\x4c\x91\x2c\x49\x59\xeb\xbf\x2f\x28\xdb\x5d\x1b\x2d\x8a\x1e\x56\x27\x8a\x1c\xce\x7b\x6f\xde\x63\x86\x4f\xef\xf7\xa9\x0c\x3f\xa4\x62\x13\xb8\x46\xb4\x88\x2d\x63\xe1\xa8\x6a\x19\xa5\x3d\xc4\x81\x3c\x63\x6d\x7b\x53\x53\x14\x6b\xf0\x61\x51\xae\x3f\xa2\x37\x35\x7b\x58\xc3\xb0\x1e\x9d\xf5\x [...] }, + "/samples/patch-integration-platform.yaml": &vfsgen۰CompressedFileInfo{ + name: "patch-integration-platform.yaml", + modTime: time.Time{}, + uncompressedSize: 3711, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x57\x5f\x8f\xdb\xb8\x11\x7f\xd7\xa7\x18\xc4\x2f\x09\x20\xcb\xd9\xb4\x45\x51\xf5\xc9\xd9\xec\xf6\xdc\x4d\xec\x60\xb5\xd7\xeb\xa1\xe8\xc3\x98\x1a\x4b\x84\x29\x52\x25\xa9\x75\xdc\x6e\xbf\x7b\x31\x24\x65\xcb\x1b\xdf\xa1\x0f\x67\x60\xbd\x36\x35\x7f\x7e\x33\xf3\x9b\xe1\x78\x06\xf3\xdf\xee\x95\xcd\xe0\xb3\x14\xa4\x1d\xd5\xe0\x0d\xf8\x96\x60\xd9\xa3\x68\x09\x2a\xb3\xf3\x07\xb4\x04\xf7\x66\xd0\x35\x7a\x69\x34\xbc\x5d\x56\x [...] + }, "/templates": &vfsgen۰DirInfo{ name: "templates", modTime: time.Time{}, @@ -521,6 +582,12 @@ var assets = func() http.FileSystem { fs["/manager"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ fs["/manager/operator-deployment.yaml"].(os.FileInfo), fs["/manager/operator-service-account.yaml"].(os.FileInfo), + fs["/manager/patch-image-pull-policy-always.yaml"].(os.FileInfo), + fs["/manager/patch-node-selector.yaml"].(os.FileInfo), + fs["/manager/patch-ports.yaml"].(os.FileInfo), + fs["/manager/patch-resource-requirements.yaml"].(os.FileInfo), + fs["/manager/patch-toleration.yaml"].(os.FileInfo), + fs["/manager/patch-watch-namespace-global.yaml"].(os.FileInfo), } fs["/prometheus"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ fs["/prometheus/operator-pod-monitor.yaml"].(os.FileInfo), @@ -542,6 +609,8 @@ var assets = func() http.FileSystem { fs["/rbac/operator-role-service-binding.yaml"].(os.FileInfo), fs["/rbac/operator-role-strimzi.yaml"].(os.FileInfo), fs["/rbac/operator-role.yaml"].(os.FileInfo), + fs["/rbac/patch-role-to-clusterrole.yaml"].(os.FileInfo), + fs["/rbac/patch-rolebinding-to-clusterrolebinding.yaml"].(os.FileInfo), fs["/rbac/user-cluster-role.yaml"].(os.FileInfo), fs["/rbac/user-global-kamelet-viewer-role-binding.yaml"].(os.FileInfo), fs["/rbac/user-global-kamelet-viewer-role.yaml"].(os.FileInfo), @@ -554,6 +623,7 @@ var assets = func() http.FileSystem { } fs["/samples"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ fs["/samples/bases"].(os.FileInfo), + fs["/samples/patch-integration-platform.yaml"].(os.FileInfo), } fs["/samples/bases"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ fs["/samples/bases/camel_v1_build.yaml"].(os.FileInfo), @@ -597,6 +667,11 @@ func (fs vfsgen۰FS) Open(path string) (http.File, error) { vfsgen۰CompressedFileInfo: f, gr: gr, }, nil + case *vfsgen۰FileInfo: + return &vfsgen۰File{ + vfsgen۰FileInfo: f, + Reader: bytes.NewReader(f.content), + }, nil case *vfsgen۰DirInfo: return &vfsgen۰Dir{ vfsgen۰DirInfo: f, @@ -678,6 +753,37 @@ func (f *vfsgen۰CompressedFile) Close() error { return f.gr.Close() } +// vfsgen۰FileInfo is a static definition of an uncompressed file (because it's not worth gzip compressing). +type vfsgen۰FileInfo struct { + name string + modTime time.Time + content []byte +} + +func (f *vfsgen۰FileInfo) Readdir(count int) ([]os.FileInfo, error) { + return nil, fmt.Errorf("cannot Readdir from file %s", f.name) +} +func (f *vfsgen۰FileInfo) Stat() (os.FileInfo, error) { return f, nil } + +func (f *vfsgen۰FileInfo) NotWorthGzipCompressing() {} + +func (f *vfsgen۰FileInfo) Name() string { return f.name } +func (f *vfsgen۰FileInfo) Size() int64 { return int64(len(f.content)) } +func (f *vfsgen۰FileInfo) Mode() os.FileMode { return 0444 } +func (f *vfsgen۰FileInfo) ModTime() time.Time { return f.modTime } +func (f *vfsgen۰FileInfo) IsDir() bool { return false } +func (f *vfsgen۰FileInfo) Sys() interface{} { return nil } + +// vfsgen۰File is an opened file instance. +type vfsgen۰File struct { + *vfsgen۰FileInfo + *bytes.Reader +} + +func (f *vfsgen۰File) Close() error { + return nil +} + // vfsgen۰DirInfo is a static definition of a directory. type vfsgen۰DirInfo struct { name string
