From 091e129dd0b5610dddf0d4ef959e6499391239da Mon Sep 17 00:00:00 2001 From: David Eads Date: Tue, 26 Nov 2024 11:47:16 -0500 Subject: [PATCH 1/4] update library-go and MOM --- go.mod | 8 +- go.sum | 16 +- .../api/config/v1/types_infrastructure.go | 26 +- .../openshift/api/config/v1/types_node.go | 19 ++ .../api/config/v1/zz_generated.deepcopy.go | 5 + ..._generated.featuregated-crd-manifests.yaml | 4 +- .../v1/zz_generated.swagger_doc_generated.go | 16 +- .../v1alpha1/types_cluster_image_policy.go | 1 + .../api/config/v1alpha1/types_image_policy.go | 1 + .../zz_generated.swagger_doc_generated.go | 4 +- .../openshift/api/envtest-releases.yaml | 13 + vendor/github.com/openshift/api/features.md | 5 +- .../openshift/api/features/features.go | 111 +++++++- .../github.com/openshift/api/features/util.go | 28 ++ .../api/kubecontrolplane/v1/types.go | 19 ++ .../v1/zz_generated.swagger_doc_generated.go | 1 + .../openshift/api/operator/v1/types.go | 42 ++- .../api/operator/v1/types_ingress.go | 22 +- ...000_10_config-operator_01_configs.crd.yaml | 13 + ..._12_etcd_01_etcds-CustomNoUpgrade.crd.yaml | 13 + .../0000_12_etcd_01_etcds-Default.crd.yaml | 13 + ...etcd_01_etcds-DevPreviewNoUpgrade.crd.yaml | 13 + ...tcd_01_etcds-TechPreviewNoUpgrade.crd.yaml | 13 + ..._kube-apiserver_01_kubeapiservers.crd.yaml | 13 + ...manager_01_kubecontrollermanagers.crd.yaml | 13 + ..._kube-scheduler_01_kubeschedulers.crd.yaml | 13 + ...-apiserver_01_openshiftapiservers.crd.yaml | 13 + ...ud-credential_00_cloudcredentials.crd.yaml | 13 + ...or_00_kubestorageversionmigrators.crd.yaml | 13 + ...authentication_01_authentications.crd.yaml | 13 + .../0000_50_console_01_consoles.crd.yaml | 13 + ..._50_ingress_00_ingresscontrollers.crd.yaml | 47 +++- ..._50_insights_00_insightsoperators.crd.yaml | 13 + ...er_02_openshiftcontrollermanagers.crd.yaml | 13 + .../0000_50_service-ca_02_servicecas.crd.yaml | 13 + .../0000_50_storage_01_storages.crd.yaml | 13 + .../0000_70_dns_00_dnses.crd.yaml | 13 + ...twork_01_networks-CustomNoUpgrade.crd.yaml | 13 + ...00_70_network_01_networks-Default.crd.yaml | 13 + ...k_01_networks-DevPreviewNoUpgrade.crd.yaml | 13 + ..._01_networks-TechPreviewNoUpgrade.crd.yaml | 13 + ...troller_01_csisnapshotcontrollers.crd.yaml | 13 + ...0_csi-driver_01_clustercsidrivers.crd.yaml | 13 + .../v1/zz_generated.swagger_doc_generated.go | 9 +- .../make/operator.example.mk.help.log | 1 + .../make/targets/openshift/operator/mom.mk | 4 + .../scripts/test-operator-integration.sh | 9 + .../pkg/manifestclient/discovery_reader.go | 150 +++++++++++ .../group_resource_discovery.go | 250 ------------------ .../library-go/pkg/manifestclient/list.go | 7 +- .../pkg/manifestclient/read_roundtripper.go | 101 +------ .../manifestclient/readwrite_roundtripper.go | 9 +- .../pkg/manifestclient/write_roundtripper.go | 13 +- .../apiservice/apiservice_controller.go | 2 +- .../auditpolicy/auditpolicy_controller.go | 5 +- .../controllerset/apiservercontrollerset.go | 3 - .../libraryapplyconfiguration/command.go | 2 +- .../directory_apply_configuration.go | 40 ++- .../libraryapplyconfiguration/equivalence.go | 19 ++ .../operator_launch_helpers.go | 44 ++- .../libraryapplyconfiguration/options.go | 17 +- .../libraryapplyconfiguration/types.go | 54 ++++ .../libraryinputresources/easy_creation.go | 4 +- .../library/libraryinputresources/resource.go | 77 +++--- .../libraryoutputresources/easy_creation.go | 16 +- vendor/modules.txt | 8 +- 66 files changed, 1063 insertions(+), 481 deletions(-) create mode 100644 vendor/github.com/openshift/library-go/pkg/manifestclient/discovery_reader.go delete mode 100644 vendor/github.com/openshift/library-go/pkg/manifestclient/group_resource_discovery.go create mode 100644 vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/types.go diff --git a/go.mod b/go.mod index c2e694c3a..219ad88fc 100644 --- a/go.mod +++ b/go.mod @@ -6,11 +6,11 @@ require ( github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc github.com/ghodss/yaml v1.0.0 github.com/google/go-cmp v0.6.0 - github.com/openshift/api v0.0.0-20241001152557-e415140e5d5f - github.com/openshift/build-machinery-go v0.0.0-20241031155326-6ae126a9cb72 + github.com/openshift/api v0.0.0-20241101202457-04eb3fd119d2 + github.com/openshift/build-machinery-go v0.0.0-20241126220845-0de670012c09 github.com/openshift/client-go v0.0.0-20241001162912-da6d55e4611f - github.com/openshift/library-go v0.0.0-20241120135057-fc703a7407c9 - github.com/openshift/multi-operator-manager v0.0.0-20241119235446-3c965870ef94 + github.com/openshift/library-go v0.0.0-20241127135410-64d8d9e80808 + github.com/openshift/multi-operator-manager v0.0.0-20241205181422-20aa3906b99d github.com/spf13/cobra v1.8.1 github.com/stretchr/testify v1.9.0 go.etcd.io/etcd/client/v3 v3.5.14 diff --git a/go.sum b/go.sum index 344bf46c1..a1c3c1e98 100644 --- a/go.sum +++ b/go.sum @@ -148,16 +148,16 @@ github.com/onsi/ginkgo/v2 v2.19.0 h1:9Cnnf7UHo57Hy3k6/m5k3dRfGTMXGvxhHFvkDTCTpvA github.com/onsi/ginkgo/v2 v2.19.0/go.mod h1:rlwLi9PilAFJ8jCg9UE1QP6VBpd6/xj3SRC0d6TU0To= github.com/onsi/gomega v1.33.1 h1:dsYjIxxSR755MDmKVsaFQTE22ChNBcuuTWgkUDSubOk= github.com/onsi/gomega v1.33.1/go.mod h1:U4R44UsT+9eLIaYRB2a5qajjtQYn0hauxvRm16AVYg0= -github.com/openshift/api v0.0.0-20241001152557-e415140e5d5f h1:ya1OmyZm3LIIxI3U9VE9Nyx3ehCHgBwxyFUPflYPWls= -github.com/openshift/api v0.0.0-20241001152557-e415140e5d5f/go.mod h1:Shkl4HanLwDiiBzakv+con/aMGnVE2MAGvoKp5oyYUo= -github.com/openshift/build-machinery-go v0.0.0-20241031155326-6ae126a9cb72 h1:kMM+Ea3YFrcoYS76RhhBA7uELy97JM0gwqnyoy7fxco= -github.com/openshift/build-machinery-go v0.0.0-20241031155326-6ae126a9cb72/go.mod h1:8jcm8UPtg2mCAsxfqKil1xrmRMI3a+XU2TZ9fF8A7TE= +github.com/openshift/api v0.0.0-20241101202457-04eb3fd119d2 h1:CguNy+2KzhJ3a3i7e4Bgm/ByfQpSSSPYmF9NLZskoUs= +github.com/openshift/api v0.0.0-20241101202457-04eb3fd119d2/go.mod h1:Shkl4HanLwDiiBzakv+con/aMGnVE2MAGvoKp5oyYUo= +github.com/openshift/build-machinery-go v0.0.0-20241126220845-0de670012c09 h1:NibXytu9e89emCQoRiKZR+warzC1bpQgYDyb9jpEI/s= +github.com/openshift/build-machinery-go v0.0.0-20241126220845-0de670012c09/go.mod h1:8jcm8UPtg2mCAsxfqKil1xrmRMI3a+XU2TZ9fF8A7TE= github.com/openshift/client-go v0.0.0-20241001162912-da6d55e4611f h1:FRc0bVNWprihWS0GqQWzb3dY4dkCwpOP3mDw5NwSoR4= github.com/openshift/client-go v0.0.0-20241001162912-da6d55e4611f/go.mod h1:KiZi2mJRH1TOJ3FtBDYS6YvUL30s/iIXaGSUrSa36mo= -github.com/openshift/library-go v0.0.0-20241120135057-fc703a7407c9 h1:bwIqO3LDkumwfDKTMRzixNHKUqU7yaKTTAKwENi6JOY= -github.com/openshift/library-go v0.0.0-20241120135057-fc703a7407c9/go.mod h1:9B1MYPoLtP9tqjWxcbUNVpwxy68zOH/3EIP6c31dAM0= -github.com/openshift/multi-operator-manager v0.0.0-20241119235446-3c965870ef94 h1:9Z5HQo1KSQogIpQ2tDzrCk4+sDjL/xF+YXBrDP4R36k= -github.com/openshift/multi-operator-manager v0.0.0-20241119235446-3c965870ef94/go.mod h1:Fn/rmcwj4bCuS11UT5TZvzONt7qTjzcd9BCSQkIwQOI= +github.com/openshift/library-go v0.0.0-20241127135410-64d8d9e80808 h1:IUVlNRH6tuA0djyJsfGVTACsjE16hncfU1c/YKOobGw= +github.com/openshift/library-go v0.0.0-20241127135410-64d8d9e80808/go.mod h1:l/3SegTa9x+ry2J213bh7+DBofXOOvdrqU4JC9ktJa0= +github.com/openshift/multi-operator-manager v0.0.0-20241205181422-20aa3906b99d h1:Rzx23P63JFNNz5D23ubhC0FCN5rK8CeJhKcq5QKcdyU= +github.com/openshift/multi-operator-manager v0.0.0-20241205181422-20aa3906b99d/go.mod h1:iVi9Bopa5cLhjG5ie9DoZVVqkH8BGb1FQVTtecOLn4I= github.com/orisano/pixelmatch v0.0.0-20220722002657-fb0b55479cde/go.mod h1:nZgzbfBr3hhjoZnS66nKrHmduYNpc34ny7RK4z5/HM0= github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= diff --git a/vendor/github.com/openshift/api/config/v1/types_infrastructure.go b/vendor/github.com/openshift/api/config/v1/types_infrastructure.go index 392d128c1..0daa62d30 100644 --- a/vendor/github.com/openshift/api/config/v1/types_infrastructure.go +++ b/vendor/github.com/openshift/api/config/v1/types_infrastructure.go @@ -507,6 +507,20 @@ type AWSPlatformStatus struct { // +listType=atomic // +optional ResourceTags []AWSResourceTag `json:"resourceTags,omitempty"` + + // cloudLoadBalancerConfig holds configuration related to DNS and cloud + // load balancers. It allows configuration of in-cluster DNS as an alternative + // to the platform default DNS implementation. + // When using the ClusterHosted DNS type, Load Balancer IP addresses + // must be provided for the API and internal API load balancers as well as the + // ingress load balancer. + // + // +default={"dnsType": "PlatformDefault"} + // +kubebuilder:default={"dnsType": "PlatformDefault"} + // +openshift:enable:FeatureGate=AWSClusterHostedDNS + // +optional + // +nullable + CloudLoadBalancerConfig *CloudLoadBalancerConfig `json:"cloudLoadBalancerConfig,omitempty"` } // AWSResourceTag is a tag to apply to AWS resources created for the cluster. @@ -647,12 +661,12 @@ type GCPPlatformStatus struct { // Tombstone the field as a reminder. // ClusterHostedDNS ClusterHostedDNS `json:"clusterHostedDNS,omitempty"` - // cloudLoadBalancerConfig is a union that contains the IP addresses of API, - // API-Int and Ingress Load Balancers created on the cloud platform. These - // values would not be populated on on-prem platforms. These Load Balancer - // IPs are used to configure the in-cluster DNS instances for API, API-Int - // and Ingress services. `dnsType` is expected to be set to `ClusterHosted` - // when these Load Balancer IP addresses are populated and used. + // cloudLoadBalancerConfig holds configuration related to DNS and cloud + // load balancers. It allows configuration of in-cluster DNS as an alternative + // to the platform default DNS implementation. + // When using the ClusterHosted DNS type, Load Balancer IP addresses + // must be provided for the API and internal API load balancers as well as the + // ingress load balancer. // // +default={"dnsType": "PlatformDefault"} // +kubebuilder:default={"dnsType": "PlatformDefault"} diff --git a/vendor/github.com/openshift/api/config/v1/types_node.go b/vendor/github.com/openshift/api/config/v1/types_node.go index b3b1b62c4..a50328c91 100644 --- a/vendor/github.com/openshift/api/config/v1/types_node.go +++ b/vendor/github.com/openshift/api/config/v1/types_node.go @@ -46,6 +46,25 @@ type NodeSpec struct { // the status and corresponding reaction of the cluster // +optional WorkerLatencyProfile WorkerLatencyProfileType `json:"workerLatencyProfile,omitempty"` + + // minimumKubeletVersion is the lowest version of a kubelet that can join the cluster. + // Specifically, the apiserver will deny most authorization requests of kubelets that are older + // than the specified version, only allowing the kubelet to get and update its node object, and perform + // subjectaccessreviews. + // This means any kubelet that attempts to join the cluster will not be able to run any assigned workloads, + // and will eventually be marked as not ready. + // Its max length is 8, so maximum version allowed is either "9.999.99" or "99.99.99". + // Since the kubelet reports the version of the kubernetes release, not Openshift, this field references + // the underlying kubernetes version this version of Openshift is based off of. + // In other words: if an admin wishes to ensure no nodes run an older version than Openshift 4.17, then + // they should set the minimumKubeletVersion to 1.30.0. + // When comparing versions, the kubelet's version is stripped of any contents outside of major.minor.patch version. + // Thus, a kubelet with version "1.0.0-ec.0" will be compatible with minimumKubeletVersion "1.0.0" or earlier. + // +kubebuilder:validation:XValidation:rule="self == \"\" || self.matches('^[0-9]*.[0-9]*.[0-9]*$')",message="minmumKubeletVersion must be in a semver compatible format of x.y.z, or empty" + // +kubebuilder:validation:MaxLength:=8 + // +openshift:enable:FeatureGate=MinimumKubeletVersion + // +optional + MinimumKubeletVersion string `json:"minimumKubeletVersion"` } type NodeStatus struct { diff --git a/vendor/github.com/openshift/api/config/v1/zz_generated.deepcopy.go b/vendor/github.com/openshift/api/config/v1/zz_generated.deepcopy.go index 069346998..1b7fa44aa 100644 --- a/vendor/github.com/openshift/api/config/v1/zz_generated.deepcopy.go +++ b/vendor/github.com/openshift/api/config/v1/zz_generated.deepcopy.go @@ -245,6 +245,11 @@ func (in *AWSPlatformStatus) DeepCopyInto(out *AWSPlatformStatus) { *out = make([]AWSResourceTag, len(*in)) copy(*out, *in) } + if in.CloudLoadBalancerConfig != nil { + in, out := &in.CloudLoadBalancerConfig, &out.CloudLoadBalancerConfig + *out = new(CloudLoadBalancerConfig) + (*in).DeepCopyInto(*out) + } return } diff --git a/vendor/github.com/openshift/api/config/v1/zz_generated.featuregated-crd-manifests.yaml b/vendor/github.com/openshift/api/config/v1/zz_generated.featuregated-crd-manifests.yaml index fa5dd4e31..abfea5eaf 100644 --- a/vendor/github.com/openshift/api/config/v1/zz_generated.featuregated-crd-manifests.yaml +++ b/vendor/github.com/openshift/api/config/v1/zz_generated.featuregated-crd-manifests.yaml @@ -310,6 +310,7 @@ infrastructures.config.openshift.io: Capability: "" Category: "" FeatureGates: + - AWSClusterHostedDNS - BareMetalLoadBalancer - GCPClusterHostedDNS - GCPLabelsTags @@ -382,7 +383,8 @@ nodes.config.openshift.io: CRDName: nodes.config.openshift.io Capability: "" Category: "" - FeatureGates: [] + FeatureGates: + - MinimumKubeletVersion FilenameOperatorName: config-operator FilenameOperatorOrdering: "01" FilenameRunLevel: "0000_10" diff --git a/vendor/github.com/openshift/api/config/v1/zz_generated.swagger_doc_generated.go b/vendor/github.com/openshift/api/config/v1/zz_generated.swagger_doc_generated.go index c580bd834..145a7e4c0 100644 --- a/vendor/github.com/openshift/api/config/v1/zz_generated.swagger_doc_generated.go +++ b/vendor/github.com/openshift/api/config/v1/zz_generated.swagger_doc_generated.go @@ -1184,10 +1184,11 @@ func (AWSPlatformSpec) SwaggerDoc() map[string]string { } var map_AWSPlatformStatus = map[string]string{ - "": "AWSPlatformStatus holds the current status of the Amazon Web Services infrastructure provider.", - "region": "region holds the default AWS region for new AWS resources created by the cluster.", - "serviceEndpoints": "ServiceEndpoints list contains custom endpoints which will override default service endpoint of AWS Services. There must be only one ServiceEndpoint for a service.", - "resourceTags": "resourceTags is a list of additional tags to apply to AWS resources created for the cluster. See https://docs.aws.amazon.com/general/latest/gr/aws_tagging.html for information on tagging AWS resources. AWS supports a maximum of 50 tags per resource. OpenShift reserves 25 tags for its use, leaving 25 tags available for the user.", + "": "AWSPlatformStatus holds the current status of the Amazon Web Services infrastructure provider.", + "region": "region holds the default AWS region for new AWS resources created by the cluster.", + "serviceEndpoints": "ServiceEndpoints list contains custom endpoints which will override default service endpoint of AWS Services. There must be only one ServiceEndpoint for a service.", + "resourceTags": "resourceTags is a list of additional tags to apply to AWS resources created for the cluster. See https://docs.aws.amazon.com/general/latest/gr/aws_tagging.html for information on tagging AWS resources. AWS supports a maximum of 50 tags per resource. OpenShift reserves 25 tags for its use, leaving 25 tags available for the user.", + "cloudLoadBalancerConfig": "cloudLoadBalancerConfig holds configuration related to DNS and cloud load balancers. It allows configuration of in-cluster DNS as an alternative to the platform default DNS implementation. When using the ClusterHosted DNS type, Load Balancer IP addresses must be provided for the API and internal API load balancers as well as the ingress load balancer.", } func (AWSPlatformStatus) SwaggerDoc() map[string]string { @@ -1389,7 +1390,7 @@ var map_GCPPlatformStatus = map[string]string{ "region": "region holds the region for new GCP resources created for the cluster.", "resourceLabels": "resourceLabels is a list of additional labels to apply to GCP resources created for the cluster. See https://cloud.google.com/compute/docs/labeling-resources for information on labeling GCP resources. GCP supports a maximum of 64 labels per resource. OpenShift reserves 32 labels for internal use, allowing 32 labels for user configuration.", "resourceTags": "resourceTags is a list of additional tags to apply to GCP resources created for the cluster. See https://cloud.google.com/resource-manager/docs/tags/tags-overview for information on tagging GCP resources. GCP supports a maximum of 50 tags per resource.", - "cloudLoadBalancerConfig": "cloudLoadBalancerConfig is a union that contains the IP addresses of API, API-Int and Ingress Load Balancers created on the cloud platform. These values would not be populated on on-prem platforms. These Load Balancer IPs are used to configure the in-cluster DNS instances for API, API-Int and Ingress services. `dnsType` is expected to be set to `ClusterHosted` when these Load Balancer IP addresses are populated and used.", + "cloudLoadBalancerConfig": "cloudLoadBalancerConfig holds configuration related to DNS and cloud load balancers. It allows configuration of in-cluster DNS as an alternative to the platform default DNS implementation. When using the ClusterHosted DNS type, Load Balancer IP addresses must be provided for the API and internal API load balancers as well as the ingress load balancer.", } func (GCPPlatformStatus) SwaggerDoc() map[string]string { @@ -2087,8 +2088,9 @@ func (NodeList) SwaggerDoc() map[string]string { } var map_NodeSpec = map[string]string{ - "cgroupMode": "CgroupMode determines the cgroups version on the node", - "workerLatencyProfile": "WorkerLatencyProfile determins the how fast the kubelet is updating the status and corresponding reaction of the cluster", + "cgroupMode": "CgroupMode determines the cgroups version on the node", + "workerLatencyProfile": "WorkerLatencyProfile determins the how fast the kubelet is updating the status and corresponding reaction of the cluster", + "minimumKubeletVersion": "minimumKubeletVersion is the lowest version of a kubelet that can join the cluster. Specifically, the apiserver will deny most authorization requests of kubelets that are older than the specified version, only allowing the kubelet to get and update its node object, and perform subjectaccessreviews. This means any kubelet that attempts to join the cluster will not be able to run any assigned workloads, and will eventually be marked as not ready. Its max length is 8, so maximum version allowed is either \"9.999.99\" or \"99.99.99\". Since the kubelet reports the version of the kubernetes release, not Openshift, this field references the underlying kubernetes version this version of Openshift is based off of. In other words: if an admin wishes to ensure no nodes run an older version than Openshift 4.17, then they should set the minimumKubeletVersion to 1.30.0. When comparing versions, the kubelet's version is stripped of any contents outside of major.minor.patch version. Thus, a kubelet with version \"1.0.0-ec.0\" will be compatible with minimumKubeletVersion \"1.0.0\" or earlier.", } func (NodeSpec) SwaggerDoc() map[string]string { diff --git a/vendor/github.com/openshift/api/config/v1alpha1/types_cluster_image_policy.go b/vendor/github.com/openshift/api/config/v1alpha1/types_cluster_image_policy.go index e3670f03e..14650fd48 100644 --- a/vendor/github.com/openshift/api/config/v1alpha1/types_cluster_image_policy.go +++ b/vendor/github.com/openshift/api/config/v1alpha1/types_cluster_image_policy.go @@ -41,6 +41,7 @@ type ClusterImagePolicySpec struct { // If multiple scopes match a given image, only the policy requirements for the most specific scope apply. The policy requirements for more general scopes are ignored. // In addition to setting a policy appropriate for your own deployed applications, make sure that a policy on the OpenShift image repositories // quay.io/openshift-release-dev/ocp-release, quay.io/openshift-release-dev/ocp-v4.0-art-dev (or on a more general scope) allows deployment of the OpenShift images required for cluster operation. + // If a scope is configured in both the ClusterImagePolicy and the ImagePolicy, or if the scope in ImagePolicy is nested under one of the scopes from the ClusterImagePolicy, only the policy from the ClusterImagePolicy will be applied. // For additional details about the format, please refer to the document explaining the docker transport field, // which can be found at: https://github.com/containers/image/blob/main/docs/containers-policy.json.5.md#docker // +kubebuilder:validation:Required diff --git a/vendor/github.com/openshift/api/config/v1alpha1/types_image_policy.go b/vendor/github.com/openshift/api/config/v1alpha1/types_image_policy.go index 7031110ff..a177ddb0d 100644 --- a/vendor/github.com/openshift/api/config/v1alpha1/types_image_policy.go +++ b/vendor/github.com/openshift/api/config/v1alpha1/types_image_policy.go @@ -40,6 +40,7 @@ type ImagePolicySpec struct { // If multiple scopes match a given image, only the policy requirements for the most specific scope apply. The policy requirements for more general scopes are ignored. // In addition to setting a policy appropriate for your own deployed applications, make sure that a policy on the OpenShift image repositories // quay.io/openshift-release-dev/ocp-release, quay.io/openshift-release-dev/ocp-v4.0-art-dev (or on a more general scope) allows deployment of the OpenShift images required for cluster operation. + // If a scope is configured in both the ClusterImagePolicy and the ImagePolicy, or if the scope in ImagePolicy is nested under one of the scopes from the ClusterImagePolicy, only the policy from the ClusterImagePolicy will be applied. // For additional details about the format, please refer to the document explaining the docker transport field, // which can be found at: https://github.com/containers/image/blob/main/docs/containers-policy.json.5.md#docker // +kubebuilder:validation:Required diff --git a/vendor/github.com/openshift/api/config/v1alpha1/zz_generated.swagger_doc_generated.go b/vendor/github.com/openshift/api/config/v1alpha1/zz_generated.swagger_doc_generated.go index 9da086efc..55468f38d 100644 --- a/vendor/github.com/openshift/api/config/v1alpha1/zz_generated.swagger_doc_generated.go +++ b/vendor/github.com/openshift/api/config/v1alpha1/zz_generated.swagger_doc_generated.go @@ -102,7 +102,7 @@ func (ClusterImagePolicyList) SwaggerDoc() map[string]string { var map_ClusterImagePolicySpec = map[string]string{ "": "CLusterImagePolicySpec is the specification of the ClusterImagePolicy custom resource.", - "scopes": "scopes defines the list of image identities assigned to a policy. Each item refers to a scope in a registry implementing the \"Docker Registry HTTP API V2\". Scopes matching individual images are named Docker references in the fully expanded form, either using a tag or digest. For example, docker.io/library/busybox:latest (not busybox:latest). More general scopes are prefixes of individual-image scopes, and specify a repository (by omitting the tag or digest), a repository namespace, or a registry host (by only specifying the host name and possibly a port number) or a wildcard expression starting with `*.`, for matching all subdomains (not including a port number). Wildcards are only supported for subdomain matching, and may not be used in the middle of the host, i.e. *.example.com is a valid case, but example*.*.com is not. If multiple scopes match a given image, only the policy requirements for the most specific scope apply. The policy requirements for more general scopes are ignored. In addition to setting a policy appropriate for your own deployed applications, make sure that a policy on the OpenShift image repositories quay.io/openshift-release-dev/ocp-release, quay.io/openshift-release-dev/ocp-v4.0-art-dev (or on a more general scope) allows deployment of the OpenShift images required for cluster operation. For additional details about the format, please refer to the document explaining the docker transport field, which can be found at: https://github.com/containers/image/blob/main/docs/containers-policy.json.5.md#docker", + "scopes": "scopes defines the list of image identities assigned to a policy. Each item refers to a scope in a registry implementing the \"Docker Registry HTTP API V2\". Scopes matching individual images are named Docker references in the fully expanded form, either using a tag or digest. For example, docker.io/library/busybox:latest (not busybox:latest). More general scopes are prefixes of individual-image scopes, and specify a repository (by omitting the tag or digest), a repository namespace, or a registry host (by only specifying the host name and possibly a port number) or a wildcard expression starting with `*.`, for matching all subdomains (not including a port number). Wildcards are only supported for subdomain matching, and may not be used in the middle of the host, i.e. *.example.com is a valid case, but example*.*.com is not. If multiple scopes match a given image, only the policy requirements for the most specific scope apply. The policy requirements for more general scopes are ignored. In addition to setting a policy appropriate for your own deployed applications, make sure that a policy on the OpenShift image repositories quay.io/openshift-release-dev/ocp-release, quay.io/openshift-release-dev/ocp-v4.0-art-dev (or on a more general scope) allows deployment of the OpenShift images required for cluster operation. If a scope is configured in both the ClusterImagePolicy and the ImagePolicy, or if the scope in ImagePolicy is nested under one of the scopes from the ClusterImagePolicy, only the policy from the ClusterImagePolicy will be applied. For additional details about the format, please refer to the document explaining the docker transport field, which can be found at: https://github.com/containers/image/blob/main/docs/containers-policy.json.5.md#docker", "policy": "policy contains configuration to allow scopes to be verified, and defines how images not matching the verification policy will be treated.", } @@ -151,7 +151,7 @@ func (ImagePolicyList) SwaggerDoc() map[string]string { var map_ImagePolicySpec = map[string]string{ "": "ImagePolicySpec is the specification of the ImagePolicy CRD.", - "scopes": "scopes defines the list of image identities assigned to a policy. Each item refers to a scope in a registry implementing the \"Docker Registry HTTP API V2\". Scopes matching individual images are named Docker references in the fully expanded form, either using a tag or digest. For example, docker.io/library/busybox:latest (not busybox:latest). More general scopes are prefixes of individual-image scopes, and specify a repository (by omitting the tag or digest), a repository namespace, or a registry host (by only specifying the host name and possibly a port number) or a wildcard expression starting with `*.`, for matching all subdomains (not including a port number). Wildcards are only supported for subdomain matching, and may not be used in the middle of the host, i.e. *.example.com is a valid case, but example*.*.com is not. If multiple scopes match a given image, only the policy requirements for the most specific scope apply. The policy requirements for more general scopes are ignored. In addition to setting a policy appropriate for your own deployed applications, make sure that a policy on the OpenShift image repositories quay.io/openshift-release-dev/ocp-release, quay.io/openshift-release-dev/ocp-v4.0-art-dev (or on a more general scope) allows deployment of the OpenShift images required for cluster operation. For additional details about the format, please refer to the document explaining the docker transport field, which can be found at: https://github.com/containers/image/blob/main/docs/containers-policy.json.5.md#docker", + "scopes": "scopes defines the list of image identities assigned to a policy. Each item refers to a scope in a registry implementing the \"Docker Registry HTTP API V2\". Scopes matching individual images are named Docker references in the fully expanded form, either using a tag or digest. For example, docker.io/library/busybox:latest (not busybox:latest). More general scopes are prefixes of individual-image scopes, and specify a repository (by omitting the tag or digest), a repository namespace, or a registry host (by only specifying the host name and possibly a port number) or a wildcard expression starting with `*.`, for matching all subdomains (not including a port number). Wildcards are only supported for subdomain matching, and may not be used in the middle of the host, i.e. *.example.com is a valid case, but example*.*.com is not. If multiple scopes match a given image, only the policy requirements for the most specific scope apply. The policy requirements for more general scopes are ignored. In addition to setting a policy appropriate for your own deployed applications, make sure that a policy on the OpenShift image repositories quay.io/openshift-release-dev/ocp-release, quay.io/openshift-release-dev/ocp-v4.0-art-dev (or on a more general scope) allows deployment of the OpenShift images required for cluster operation. If a scope is configured in both the ClusterImagePolicy and the ImagePolicy, or if the scope in ImagePolicy is nested under one of the scopes from the ClusterImagePolicy, only the policy from the ClusterImagePolicy will be applied. For additional details about the format, please refer to the document explaining the docker transport field, which can be found at: https://github.com/containers/image/blob/main/docs/containers-policy.json.5.md#docker", "policy": "policy contains configuration to allow scopes to be verified, and defines how images not matching the verification policy will be treated.", } diff --git a/vendor/github.com/openshift/api/envtest-releases.yaml b/vendor/github.com/openshift/api/envtest-releases.yaml index fa789b18c..5651bbcc9 100644 --- a/vendor/github.com/openshift/api/envtest-releases.yaml +++ b/vendor/github.com/openshift/api/envtest-releases.yaml @@ -12,3 +12,16 @@ releases: envtest-v1.30.3-linux-arm64.tar.gz: hash: deb395d5e9578a58786c42b4e7d878b4aef984ac2dce510031fbecf12092162a4aee1cde774f1527cfae90f6885382dc7b3d79ec379b7f4160c3a35fad7cbc3b selfLink: https://storage.googleapis.com/openshift-kubebuilder-tools/envtest-v1.30.3-linux-arm64.tar.gz + v1.31.1: + envtest-v1.31.1-darwin-amd64.tar.gz: + hash: c884c6a9751f12f57ede0dc3d8dfffdb0f60f7111d6d01ca0693b66d663dfbd37c21ab6a9e571d1a6f649ed7db54b04b069ab0aff6366b2db2f5d3d8ba84a296 + selfLink: https://storage.googleapis.com/openshift-kubebuilder-tools/envtest-v1.31.1-darwin-amd64.tar.gz + envtest-v1.31.1-darwin-arm64.tar.gz: + hash: c760be21c579a516cad8fbafd0f202229f5e074da1869958b84ae8dca295ffb33eb6fd4fd0b66349c31c4adff1561e7dd188137885e3661e34c0a14e12ada20e + selfLink: https://storage.googleapis.com/openshift-kubebuilder-tools/envtest-v1.31.1-darwin-arm64.tar.gz + envtest-v1.31.1-linux-amd64.tar.gz: + hash: a683fad736249b681d50c40715068ecb64f3ef22a85f29387eb61435c36dfe0cebf0bc7e109e237071cd856bc0e37d79a732309fd8d0b16fba6e019cf5c6e8b6 + selfLink: https://storage.googleapis.com/openshift-kubebuilder-tools/envtest-v1.31.1-linux-amd64.tar.gz + envtest-v1.31.1-linux-arm64.tar.gz: + hash: 86fa42c6a3d92e438e35d6066587d0e4f36b910885e10520868959ece2fe740d99abc735f69d6ebe8920291f70d3819b169ad5ddd2db805f8f56a3b83eee3893 + selfLink: https://storage.googleapis.com/openshift-kubebuilder-tools/envtest-v1.31.1-linux-arm64.tar.gz diff --git a/vendor/github.com/openshift/api/features.md b/vendor/github.com/openshift/api/features.md index e668fc88b..660d3bff1 100644 --- a/vendor/github.com/openshift/api/features.md +++ b/vendor/github.com/openshift/api/features.md @@ -7,6 +7,7 @@ | MachineAPIOperatorDisableMachineHealthCheckController| | | | | | | | MultiArchInstallAzure| | | | | | | | GatewayAPI| | | Enabled | Enabled | | | +| AWSClusterHostedDNS| | | Enabled | Enabled | Enabled | Enabled | | AdditionalRoutingCapabilities| | | Enabled | Enabled | Enabled | Enabled | | AutomatedEtcdBackup| | | Enabled | Enabled | Enabled | Enabled | | BootcNodeManagement| | | Enabled | Enabled | Enabled | Enabled | @@ -18,6 +19,7 @@ | Example| | | Enabled | Enabled | Enabled | Enabled | | GCPClusterHostedDNS| | | Enabled | Enabled | Enabled | Enabled | | ImageStreamImportMode| | | Enabled | Enabled | Enabled | Enabled | +| IngressControllerDynamicConfigurationManager| | | Enabled | Enabled | Enabled | Enabled | | InsightsConfig| | | Enabled | Enabled | Enabled | Enabled | | InsightsConfigAPI| | | Enabled | Enabled | Enabled | Enabled | | InsightsOnDemandDataGather| | | Enabled | Enabled | Enabled | Enabled | @@ -27,6 +29,7 @@ | ManagedBootImagesAWS| | | Enabled | Enabled | Enabled | Enabled | | MaxUnavailableStatefulSet| | | Enabled | Enabled | Enabled | Enabled | | MetricsCollectionProfiles| | | Enabled | Enabled | Enabled | Enabled | +| MinimumKubeletVersion| | | Enabled | Enabled | Enabled | Enabled | | MixedCPUsAllocation| | | Enabled | Enabled | Enabled | Enabled | | NetworkSegmentation| | | Enabled | Enabled | Enabled | Enabled | | NewOLM| | | Enabled | Enabled | Enabled | Enabled | @@ -48,6 +51,7 @@ | UserNamespacesSupport| | | Enabled | Enabled | Enabled | Enabled | | VSphereMultiNetworks| | | Enabled | Enabled | Enabled | Enabled | | VSphereMultiVCenters| | | Enabled | Enabled | Enabled | Enabled | +| VolumeAttributesClass| | | Enabled | Enabled | Enabled | Enabled | | VolumeGroupSnapshot| | | Enabled | Enabled | Enabled | Enabled | | ExternalOIDC| Enabled | | Enabled | Enabled | Enabled | Enabled | | AWSEFSDriverVolumeMetrics| Enabled | Enabled | Enabled | Enabled | Enabled | Enabled | @@ -64,7 +68,6 @@ | IngressControllerLBSubnetsAWS| Enabled | Enabled | Enabled | Enabled | Enabled | Enabled | | KMSv1| Enabled | Enabled | Enabled | Enabled | Enabled | Enabled | | ManagedBootImages| Enabled | Enabled | Enabled | Enabled | Enabled | Enabled | -| MetricsServer| Enabled | Enabled | Enabled | Enabled | Enabled | Enabled | | MultiArchInstallAWS| Enabled | Enabled | Enabled | Enabled | Enabled | Enabled | | MultiArchInstallGCP| Enabled | Enabled | Enabled | Enabled | Enabled | Enabled | | NetworkDiagnosticsConfig| Enabled | Enabled | Enabled | Enabled | Enabled | Enabled | diff --git a/vendor/github.com/openshift/api/features/features.go b/vendor/github.com/openshift/api/features/features.go index 7f4962395..0d1f0788e 100644 --- a/vendor/github.com/openshift/api/features/features.go +++ b/vendor/github.com/openshift/api/features/features.go @@ -40,6 +40,7 @@ var ( reportProblemsToJiraComponent("apiserver-auth"). contactPerson("stlaz"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/4193"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -47,6 +48,7 @@ var ( reportProblemsToJiraComponent("kube-apiserver"). contactPerson("benluddy"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/3488"). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -54,6 +56,7 @@ var ( reportProblemsToJiraComponent("Routing"). contactPerson("miciah"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade). mustRegister() @@ -61,6 +64,7 @@ var ( reportProblemsToJiraComponent("Networking / router"). contactPerson("miheer"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -68,6 +72,7 @@ var ( reportProblemsToJiraComponent("auth"). contactPerson("ibihim"). productScope(ocpSpecific). + enhancementPR("https://github.com/openshift/enhancements/pull/899"). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -75,6 +80,7 @@ var ( reportProblemsToJiraComponent("builds"). contactPerson("adkaplan"). productScope(ocpSpecific). + enhancementPR("https://github.com/openshift/enhancements/pull/1056"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -82,6 +88,7 @@ var ( reportProblemsToJiraComponent("builds"). contactPerson("adkaplan"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -89,6 +96,7 @@ var ( reportProblemsToJiraComponent("node"). contactPerson("ehashman"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/2400"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -96,6 +104,7 @@ var ( reportProblemsToJiraComponent("openstack"). contactPerson("egarcia"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -103,6 +112,7 @@ var ( reportProblemsToJiraComponent("insights"). contactPerson("tremes"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -110,6 +120,7 @@ var ( reportProblemsToJiraComponent("insights"). contactPerson("jmesnil"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -117,6 +128,7 @@ var ( reportProblemsToJiraComponent("scheduling"). contactPerson("jchaloup"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/4381"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -124,6 +136,7 @@ var ( reportProblemsToJiraComponent("cloud-credential-operator"). contactPerson("abutcher"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -131,6 +144,7 @@ var ( reportProblemsToJiraComponent("apps"). contactPerson("atiratree"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/961"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -138,12 +152,14 @@ var ( reportProblemsToJiraComponent("node"). contactPerson("sairameshv"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/3386"). mustRegister() FeatureGatePrivateHostedZoneAWS = newFeatureGate("PrivateHostedZoneAWS"). reportProblemsToJiraComponent("Routing"). contactPerson("miciah"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -151,6 +167,7 @@ var ( reportProblemsToJiraComponent("node"). contactPerson("sgrunert"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -158,6 +175,7 @@ var ( reportProblemsToJiraComponent("Installer"). contactPerson("bhb"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -165,6 +183,7 @@ var ( reportProblemsToJiraComponent("cloud-provider"). contactPerson("jspeed"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -172,6 +191,7 @@ var ( reportProblemsToJiraComponent("machine-config-operator/platform-baremetal"). contactPerson("mkowalsk"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/3705"). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -179,6 +199,7 @@ var ( reportProblemsToJiraComponent("splat"). contactPerson("vr4manta"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -186,6 +207,7 @@ var ( reportProblemsToJiraComponent("splat"). contactPerson("rvanderp3"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -193,6 +215,7 @@ var ( reportProblemsToJiraComponent("router"). contactPerson("thejasn"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -200,6 +223,7 @@ var ( reportProblemsToJiraComponent("Networking/ovn-kubernetes"). contactPerson("tssurya"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -207,6 +231,7 @@ var ( reportProblemsToJiraComponent("Networking/ovn-kubernetes"). contactPerson("tssurya"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -214,6 +239,7 @@ var ( reportProblemsToJiraComponent("Networking/cluster-network-operator"). contactPerson("jcaamano"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -221,6 +247,7 @@ var ( reportProblemsToJiraComponent("Networking/ovn-kubernetes"). contactPerson("jcaamano"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -228,6 +255,7 @@ var ( reportProblemsToJiraComponent("Networking/ovn-kubernetes"). contactPerson("pliu"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -235,6 +263,7 @@ var ( reportProblemsToJiraComponent("Networking/cluster-network-operator"). contactPerson("kyrtapz"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -242,6 +271,7 @@ var ( reportProblemsToJiraComponent("Networking"). contactPerson("npinaeva"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -249,6 +279,7 @@ var ( reportProblemsToJiraComponent("etcd"). contactPerson("hasbro17"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -256,6 +287,7 @@ var ( reportProblemsToJiraComponent("etcd"). contactPerson("hasbro17"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -263,6 +295,7 @@ var ( reportProblemsToJiraComponent("etcd"). contactPerson("hasbro17"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -270,12 +303,14 @@ var ( reportProblemsToJiraComponent("ecoproject"). contactPerson("msluiter"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). mustRegister() FeatureGateDNSNameResolver = newFeatureGate("DNSNameResolver"). reportProblemsToJiraComponent("dns"). contactPerson("miciah"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -283,6 +318,7 @@ var ( reportProblemsToJiraComponent("splat"). contactPerson("rvanderp3"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -290,6 +326,7 @@ var ( reportProblemsToJiraComponent("MachineConfigOperator"). contactPerson("cdoern"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -297,19 +334,22 @@ var ( reportProblemsToJiraComponent("Installer"). contactPerson("vincepri"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). mustRegister() - FeatureGateMetricsServer = newFeatureGate("MetricsServer"). - reportProblemsToJiraComponent("Monitoring"). - contactPerson("slashpai"). + FeatureGateGCPClusterHostedDNS = newFeatureGate("GCPClusterHostedDNS"). + reportProblemsToJiraComponent("Installer"). + contactPerson("barbacbd"). productScope(ocpSpecific). - enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). + enhancementPR(legacyFeatureGateWithoutEnhancement). + enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() - FeatureGateGCPClusterHostedDNS = newFeatureGate("GCPClusterHostedDNS"). + FeatureGateAWSClusterHostedDNS = newFeatureGate("AWSClusterHostedDNS"). reportProblemsToJiraComponent("Installer"). contactPerson("barbacbd"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -317,6 +357,7 @@ var ( reportProblemsToJiraComponent("NodeTuningOperator"). contactPerson("titzhak"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -324,6 +365,7 @@ var ( reportProblemsToJiraComponent("MachineConfigOperator"). contactPerson("djoshy"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -331,6 +373,7 @@ var ( reportProblemsToJiraComponent("MachineConfigOperator"). contactPerson("djoshy"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -338,6 +381,7 @@ var ( reportProblemsToJiraComponent("cloud-provider"). contactPerson("jspeed"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/2395"). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -345,6 +389,7 @@ var ( reportProblemsToJiraComponent("MachineConfigOperator"). contactPerson("dkhater"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -352,6 +397,7 @@ var ( reportProblemsToJiraComponent("MachineConfigOperator"). contactPerson("inesqyx"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -359,6 +405,7 @@ var ( reportProblemsToJiraComponent("Cluster Version Operator"). contactPerson("lmohanty"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -366,6 +413,7 @@ var ( reportProblemsToJiraComponent("kube-apiserver"). contactPerson("dgrisonnet"). productScope(kubernetes). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -373,6 +421,7 @@ var ( reportProblemsToJiraComponent("MachineConfigOperator"). contactPerson("jhernand"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -380,6 +429,7 @@ var ( reportProblemsToJiraComponent("Cluster Version Operator"). contactPerson("pmuller"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -387,13 +437,23 @@ var ( reportProblemsToJiraComponent("kube-apiserver"). contactPerson("akashem"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/4006"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() + FeatureGateVolumeAttributesClass = newFeatureGate("VolumeAttributesClass"). + reportProblemsToJiraComponent("Storage / Kubernetes External Components"). + contactPerson("dfajmon"). + productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/3751"). + enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). + mustRegister() + FeatureGateVolumeGroupSnapshot = newFeatureGate("VolumeGroupSnapshot"). reportProblemsToJiraComponent("Storage / Kubernetes External Components"). contactPerson("fbertina"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/3476"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -401,6 +461,7 @@ var ( reportProblemsToJiraComponent("authentication"). contactPerson("liouk"). productScope(ocpSpecific). + enhancementPR("https://github.com/openshift/enhancements/pull/1596"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). enableForClusterProfile(Hypershift, configv1.Default, configv1.TechPreviewNoUpgrade). mustRegister() @@ -409,6 +470,7 @@ var ( reportProblemsToJiraComponent("cluster-config"). contactPerson("deads"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -416,6 +478,7 @@ var ( reportProblemsToJiraComponent("olm"). contactPerson("joe"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -423,6 +486,7 @@ var ( reportProblemsToJiraComponent("olm"). contactPerson("joe"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -430,6 +494,7 @@ var ( reportProblemsToJiraComponent("insights"). contactPerson("tremes"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -437,6 +502,7 @@ var ( reportProblemsToJiraComponent("metal"). contactPerson("EmilienM"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -444,6 +510,7 @@ var ( reportProblemsToJiraComponent("insights"). contactPerson("tremes"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -451,6 +518,7 @@ var ( reportProblemsToJiraComponent("MachineConfigOperator"). contactPerson("jerzhang"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -458,6 +526,7 @@ var ( reportProblemsToJiraComponent("Monitoring"). contactPerson("rexagod"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -465,6 +534,7 @@ var ( reportProblemsToJiraComponent("Storage / Kubernetes External Components"). contactPerson("rbednar"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -472,12 +542,14 @@ var ( reportProblemsToJiraComponent("Installer"). contactPerson("cjschaef"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). mustRegister() FeatureGateChunkSizeMiB = newFeatureGate("ChunkSizeMiB"). reportProblemsToJiraComponent("Image Registry"). contactPerson("flavianmissi"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -485,12 +557,14 @@ var ( reportProblemsToJiraComponent("OCPCLOUD"). contactPerson("jspeed"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). mustRegister() FeatureGatePersistentIPsForVirtualization = newFeatureGate("PersistentIPsForVirtualization"). reportProblemsToJiraComponent("CNV Network"). contactPerson("mduarted"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -498,6 +572,7 @@ var ( reportProblemsToJiraComponent("Monitoring"). contactPerson("marioferh"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -505,6 +580,7 @@ var ( reportProblemsToJiraComponent("Installer"). contactPerson("r4f4"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -512,12 +588,14 @@ var ( reportProblemsToJiraComponent("Installer"). contactPerson("r4f4"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). mustRegister() FeatureGateMultiArchInstallGCP = newFeatureGate("MultiArchInstallGCP"). reportProblemsToJiraComponent("Installer"). contactPerson("r4f4"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -525,6 +603,7 @@ var ( reportProblemsToJiraComponent("Routing"). contactPerson("miciah"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -532,6 +611,7 @@ var ( reportProblemsToJiraComponent("Storage / Kubernetes External Components"). contactPerson("fbertina"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -539,6 +619,7 @@ var ( reportProblemsToJiraComponent("Multi-Arch"). contactPerson("psundara"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -546,6 +627,7 @@ var ( reportProblemsToJiraComponent("Node"). contactPerson("haircommander"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/127"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -553,6 +635,7 @@ var ( reportProblemsToJiraComponent("Node"). contactPerson("haircommander"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/127"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -560,6 +643,7 @@ var ( reportProblemsToJiraComponent("Node"). contactPerson("haircommander"). productScope(kubernetes). + enhancementPR("https://github.com/kubernetes/enhancements/issues/4265"). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() @@ -567,6 +651,23 @@ var ( reportProblemsToJiraComponent("SPLAT"). contactPerson("rvanderp"). productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). mustRegister() + + FeatureGateIngressControllerDynamicConfigurationManager = newFeatureGate("IngressControllerDynamicConfigurationManager"). + reportProblemsToJiraComponent("Networking/router"). + contactPerson("miciah"). + productScope(ocpSpecific). + enhancementPR(legacyFeatureGateWithoutEnhancement). + enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). + mustRegister() + + FeatureGateMinimumKubeletVersion = newFeatureGate("MinimumKubeletVersion"). + reportProblemsToJiraComponent("Node"). + contactPerson("haircommander"). + productScope(ocpSpecific). + enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade). + enhancementPR("https://github.com/openshift/enhancements/pull/1697"). + mustRegister() ) diff --git a/vendor/github.com/openshift/api/features/util.go b/vendor/github.com/openshift/api/features/util.go index d8d8e94a0..3fd55bcdf 100644 --- a/vendor/github.com/openshift/api/features/util.go +++ b/vendor/github.com/openshift/api/features/util.go @@ -3,6 +3,8 @@ package features import ( "fmt" configv1 "github.com/openshift/api/config/v1" + "net/url" + "strings" ) // FeatureGateDescription is a golang-only interface used to contains details for a feature gate. @@ -18,6 +20,8 @@ type FeatureGateDescription struct { ResponsiblePerson string // OwningProduct is the product that owns the lifecycle of the gate. OwningProduct OwningProduct + // EnhancementPR is the PR for the enhancement. + EnhancementPR string } type FeatureGateEnabledDisabled struct { @@ -45,10 +49,15 @@ type featureGateBuilder struct { owningJiraComponent string responsiblePerson string owningProduct OwningProduct + enhancementPRURL string statusByClusterProfileByFeatureSet map[ClusterProfileName]map[configv1.FeatureSet]bool } +const ( + legacyFeatureGateWithoutEnhancement = "FeatureGate predates 4.18" +) + // newFeatureGate featuregate are disabled in every FeatureSet and selectively enabled func newFeatureGate(name string) *featureGateBuilder { b := &featureGateBuilder{ @@ -80,6 +89,11 @@ func (b *featureGateBuilder) productScope(owningProduct OwningProduct) *featureG return b } +func (b *featureGateBuilder) enhancementPR(url string) *featureGateBuilder { + b.enhancementPRURL = url + return b +} + func (b *featureGateBuilder) enableIn(featureSets ...configv1.FeatureSet) *featureGateBuilder { for clusterProfile := range b.statusByClusterProfileByFeatureSet { for _, featureSet := range featureSets { @@ -109,6 +123,19 @@ func (b *featureGateBuilder) register() (configv1.FeatureGateName, error) { if len(b.owningProduct) == 0 { return "", fmt.Errorf("missing owningProduct") } + _, enhancementPRErr := url.Parse(b.enhancementPRURL) + switch { + case b.enhancementPRURL == legacyFeatureGateWithoutEnhancement: + + case len(b.enhancementPRURL) == 0: + return "", fmt.Errorf("FeatureGate/%s is missing an enhancementPR with GA Graduation Criteria like https://github.com/openshift/enhancements/pull/#### or https://github.com/kubernetes/enhancements/issues/####", b.name) + + case !strings.HasPrefix(b.enhancementPRURL, "https://github.com/openshift/enhancements/pull/") && !strings.HasPrefix(b.enhancementPRURL, "https://github.com/kubernetes/enhancements/issues/"): + return "", fmt.Errorf("FeatureGate/%s enhancementPR format is incorrect; must be like https://github.com/openshift/enhancements/pull/#### or https://github.com/kubernetes/enhancements/issues/####", b.name) + + case enhancementPRErr != nil: + return "", fmt.Errorf("FeatureGate/%s is enhancementPR is invalid: %w", b.name, enhancementPRErr) + } featureGateName := configv1.FeatureGateName(b.name) description := FeatureGateDescription{ @@ -118,6 +145,7 @@ func (b *featureGateBuilder) register() (configv1.FeatureGateName, error) { OwningJiraComponent: b.owningJiraComponent, ResponsiblePerson: b.responsiblePerson, OwningProduct: b.owningProduct, + EnhancementPR: b.enhancementPRURL, } // statusByClusterProfileByFeatureSet is initialized by constructor to be false for every combination diff --git a/vendor/github.com/openshift/api/kubecontrolplane/v1/types.go b/vendor/github.com/openshift/api/kubecontrolplane/v1/types.go index b9cdcc213..6d29f42e3 100644 --- a/vendor/github.com/openshift/api/kubecontrolplane/v1/types.go +++ b/vendor/github.com/openshift/api/kubecontrolplane/v1/types.go @@ -62,6 +62,25 @@ type KubeAPIServerConfig struct { // TODO this needs to be removed. APIServerArguments map[string]Arguments `json:"apiServerArguments"` + + // minimumKubeletVersion is the lowest version of a kubelet that can join the cluster. + // Specifically, the apiserver will deny most authorization requests of kubelets that are older + // than the specified version, only allowing the kubelet to get and update its node object, and perform + // subjectaccessreviews. + // This means any kubelet that attempts to join the cluster will not be able to run any assigned workloads, + // and will eventually be marked as not ready. + // Its max length is 8, so maximum version allowed is either "9.999.99" or "99.99.99". + // Since the kubelet reports the version of the kubernetes release, not Openshift, this field references + // the underlying kubernetes version this version of Openshift is based off of. + // In other words: if an admin wishes to ensure no nodes run an older version than Openshift 4.17, then + // they should set the minimumKubeletVersion to 1.30.0. + // When comparing versions, the kubelet's version is stripped of any contents outside of major.minor.patch version. + // Thus, a kubelet with version "1.0.0-ec.0" will be compatible with minimumKubeletVersion "1.0.0" or earlier. + // +kubebuilder:validation:XValidation:rule="self == \"\" || self.matches('^[0-9]*.[0-9]*.[0-9]*$')",message="minmumKubeletVersion must be in a semver compatible format of x.y.z, or empty" + // +kubebuilder:validation:MaxLength:=8 + // +openshift:enable:FeatureGate=MinimumKubeletVersion + // +optional + MinimumKubeletVersion string `json:"minimumKubeletVersion"` } // Arguments masks the value so protobuf can generate diff --git a/vendor/github.com/openshift/api/kubecontrolplane/v1/zz_generated.swagger_doc_generated.go b/vendor/github.com/openshift/api/kubecontrolplane/v1/zz_generated.swagger_doc_generated.go index 906bb271b..5ecdd0583 100644 --- a/vendor/github.com/openshift/api/kubecontrolplane/v1/zz_generated.swagger_doc_generated.go +++ b/vendor/github.com/openshift/api/kubecontrolplane/v1/zz_generated.swagger_doc_generated.go @@ -33,6 +33,7 @@ var map_KubeAPIServerConfig = map[string]string{ "projectConfig": "projectConfig feeds an admission plugin", "serviceAccountPublicKeyFiles": "serviceAccountPublicKeyFiles is a list of files, each containing a PEM-encoded public RSA key. (If any file contains a private key, the public portion of the key is used) The list of public keys is used to verify presented service account tokens. Each key is tried in order until the list is exhausted or verification succeeds. If no keys are specified, no service account authentication will be available.", "oauthConfig": "oauthConfig, if present start the /oauth endpoint in this process", + "minimumKubeletVersion": "minimumKubeletVersion is the lowest version of a kubelet that can join the cluster. Specifically, the apiserver will deny most authorization requests of kubelets that are older than the specified version, only allowing the kubelet to get and update its node object, and perform subjectaccessreviews. This means any kubelet that attempts to join the cluster will not be able to run any assigned workloads, and will eventually be marked as not ready. Its max length is 8, so maximum version allowed is either \"9.999.99\" or \"99.99.99\". Since the kubelet reports the version of the kubernetes release, not Openshift, this field references the underlying kubernetes version this version of Openshift is based off of. In other words: if an admin wishes to ensure no nodes run an older version than Openshift 4.17, then they should set the minimumKubeletVersion to 1.30.0. When comparing versions, the kubelet's version is stripped of any contents outside of major.minor.patch version. Thus, a kubelet with version \"1.0.0-ec.0\" will be compatible with minimumKubeletVersion \"1.0.0\" or earlier.", } func (KubeAPIServerConfig) SwaggerDoc() map[string]string { diff --git a/vendor/github.com/openshift/api/operator/v1/types.go b/vendor/github.com/openshift/api/operator/v1/types.go index eeb8afdc6..f04b6846a 100644 --- a/vendor/github.com/openshift/api/operator/v1/types.go +++ b/vendor/github.com/openshift/api/operator/v1/types.go @@ -147,17 +147,27 @@ type GenerationStatus struct { // group is the group of the thing you're tracking // +kubebuilder:validation:Required Group string `json:"group"` + // resource is the resource type of the thing you're tracking // +kubebuilder:validation:Required Resource string `json:"resource"` + // namespace is where the thing you're tracking is // +kubebuilder:validation:Required Namespace string `json:"namespace"` + // name is the name of the thing you're tracking // +kubebuilder:validation:Required Name string `json:"name"` + + // TODO: Add validation for lastGeneration. The value for this field should generally increase, except when the associated + // resource has been deleted and re-created. To accurately validate this field, we should introduce a new UID field and only + // enforce an increasing value in lastGeneration when the UID remains unchanged. A change in the UID indicates that the resource + // was re-created, allowing the lastGeneration value to reset or decrease. + // lastGeneration is the last generation of the workload controller involved LastGeneration int64 `json:"lastGeneration"` + // hash is an optional field set for resources without generation that are content sensitive like secrets and configmaps Hash string `json:"hash"` } @@ -178,12 +188,34 @@ var ( // OperatorCondition is just the standard condition fields. type OperatorCondition struct { + // type of condition in CamelCase or in foo.example.com/CamelCase. + // --- + // Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be + // useful (see .node.status.conditions), the ability to deconflict is important. + // The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + // +required // +kubebuilder:validation:Required - Type string `json:"type"` - Status ConditionStatus `json:"status"` - LastTransitionTime metav1.Time `json:"lastTransitionTime,omitempty"` - Reason string `json:"reason,omitempty"` - Message string `json:"message,omitempty"` + // +kubebuilder:validation:Pattern=`^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$` + // +kubebuilder:validation:MaxLength=316 + Type string `json:"type" protobuf:"bytes,1,opt,name=type"` + + // status of the condition, one of True, False, Unknown. + // +required + // +kubebuilder:validation:Required + // +kubebuilder:validation:Enum=True;False;Unknown + Status ConditionStatus `json:"status"` + + // lastTransitionTime is the last time the condition transitioned from one status to another. + // This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. + // +required + // +kubebuilder:validation:Required + // +kubebuilder:validation:Type=string + // +kubebuilder:validation:Format=date-time + LastTransitionTime metav1.Time `json:"lastTransitionTime,omitempty"` + + Reason string `json:"reason,omitempty"` + + Message string `json:"message,omitempty"` } type ConditionStatus string diff --git a/vendor/github.com/openshift/api/operator/v1/types_ingress.go b/vendor/github.com/openshift/api/operator/v1/types_ingress.go index 7ae22ee0a..1f5664345 100644 --- a/vendor/github.com/openshift/api/operator/v1/types_ingress.go +++ b/vendor/github.com/openshift/api/operator/v1/types_ingress.go @@ -392,6 +392,7 @@ type CIDR string // LoadBalancerStrategy holds parameters for a load balancer. // +openshift:validation:FeatureGateAwareXValidation:featureGate=SetEIPForNLBIngressController,rule="!has(self.scope) || self.scope != 'Internal' || !has(self.providerParameters) || !has(self.providerParameters.aws) || !has(self.providerParameters.aws.networkLoadBalancer) || !has(self.providerParameters.aws.networkLoadBalancer.eipAllocations)",message="eipAllocations are forbidden when the scope is Internal." +// +kubebuilder:validation:XValidation:rule=`!has(self.scope) || self.scope != 'Internal' || !has(self.providerParameters) || !has(self.providerParameters.openstack) || !has(self.providerParameters.openstack.floatingIP) || self.providerParameters.openstack.floatingIP == ""`,message="cannot specify a floating ip when scope is internal" type LoadBalancerStrategy struct { // scope indicates the scope at which the load balancer is exposed. // Possible values are "External" and "Internal". @@ -678,19 +679,28 @@ type IBMLoadBalancerParameters struct { // OpenStackLoadBalancerParameters provides configuration settings that are // specific to OpenStack load balancers. type OpenStackLoadBalancerParameters struct { - // loadBalancerIP specifies the floating IP address that the load balancer will use. + // loadBalancerIP is tombstoned since the field was replaced by floatingIP. + // LoadBalancerIP string `json:"loadBalancerIP,omitempty"` + + // floatingIP specifies the IP address that the load balancer will use. // When not specified, an IP address will be assigned randomly by the OpenStack cloud provider. + // When specified, the floating IP has to be pre-created. If the + // specified value is not a floating IP or is already claimed, the + // OpenStack cloud provider won't be able to provision the load + // balancer. + // This field may only be used if the IngressController has External scope. // This value must be a valid IPv4 or IPv6 address. // + --- - // + Note: this field is meant to be set by the ingress controller to populate the - // + `Service.Spec.LoadBalancerIP` field which has been deprecated in Kubernetes: + // + Note: this field is meant to be set by the ingress controller + // + to populate the `Service.Spec.LoadBalancerIP` field which has been + // + deprecated in Kubernetes: // + https://github.com/kubernetes/kubernetes/pull/107235 // + However, the field is still used by cloud-provider-openstack to reconcile - // + the floating IP that we attach to the load balancer. + // + the floating IP that we attach to the external load balancer. // - // +kubebuilder:validation:XValidation:rule="isIP(self)",message="loadBalancerIP must be a valid IPv4 or IPv6 address" + // +kubebuilder:validation:XValidation:rule="isIP(self)",message="floatingIP must be a valid IPv4 or IPv6 address" // +optional - LoadBalancerIP string `json:"loadBalancerIP,omitempty"` + FloatingIP string `json:"floatingIP,omitempty"` } // AWSClassicLoadBalancerParameters holds configuration parameters for an diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_10_config-operator_01_configs.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_10_config-operator_01_configs.crd.yaml index c2d91226a..323ba4687 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_10_config-operator_01_configs.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_10_config-operator_01_configs.crd.yaml @@ -110,6 +110,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -117,10 +120,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-CustomNoUpgrade.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-CustomNoUpgrade.crd.yaml index afe82c37b..b68cce4db 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-CustomNoUpgrade.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-CustomNoUpgrade.crd.yaml @@ -151,6 +151,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -158,10 +161,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-Default.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-Default.crd.yaml index f5df3557f..ebe2486ef 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-Default.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-Default.crd.yaml @@ -138,6 +138,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -145,10 +148,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-DevPreviewNoUpgrade.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-DevPreviewNoUpgrade.crd.yaml index 3c01a3ce6..bc49df765 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-DevPreviewNoUpgrade.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-DevPreviewNoUpgrade.crd.yaml @@ -151,6 +151,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -158,10 +161,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-TechPreviewNoUpgrade.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-TechPreviewNoUpgrade.crd.yaml index cfaa4c7ce..8449c20a6 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-TechPreviewNoUpgrade.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_12_etcd_01_etcds-TechPreviewNoUpgrade.crd.yaml @@ -151,6 +151,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -158,10 +161,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_20_kube-apiserver_01_kubeapiservers.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_20_kube-apiserver_01_kubeapiservers.crd.yaml index da4ae9be6..435a8a81e 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_20_kube-apiserver_01_kubeapiservers.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_20_kube-apiserver_01_kubeapiservers.crd.yaml @@ -128,6 +128,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -135,10 +138,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_25_kube-controller-manager_01_kubecontrollermanagers.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_25_kube-controller-manager_01_kubecontrollermanagers.crd.yaml index 4cbd378af..7cd18e09b 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_25_kube-controller-manager_01_kubecontrollermanagers.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_25_kube-controller-manager_01_kubecontrollermanagers.crd.yaml @@ -137,6 +137,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -144,10 +147,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_25_kube-scheduler_01_kubeschedulers.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_25_kube-scheduler_01_kubeschedulers.crd.yaml index 255eab4c1..9654facc4 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_25_kube-scheduler_01_kubeschedulers.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_25_kube-scheduler_01_kubeschedulers.crd.yaml @@ -128,6 +128,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -135,10 +138,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_30_openshift-apiserver_01_openshiftapiservers.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_30_openshift-apiserver_01_openshiftapiservers.crd.yaml index d2ae6f79a..bb9b904fc 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_30_openshift-apiserver_01_openshiftapiservers.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_30_openshift-apiserver_01_openshiftapiservers.crd.yaml @@ -109,6 +109,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -116,10 +119,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_40_cloud-credential_00_cloudcredentials.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_40_cloud-credential_00_cloudcredentials.crd.yaml index 197b3f4e7..bf6c616af 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_40_cloud-credential_00_cloudcredentials.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_40_cloud-credential_00_cloudcredentials.crd.yaml @@ -126,6 +126,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -133,10 +136,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_40_kube-storage-version-migrator_00_kubestorageversionmigrators.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_40_kube-storage-version-migrator_00_kubestorageversionmigrators.crd.yaml index 930f5506a..30d1f9055 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_40_kube-storage-version-migrator_00_kubestorageversionmigrators.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_40_kube-storage-version-migrator_00_kubestorageversionmigrators.crd.yaml @@ -104,6 +104,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -111,10 +114,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_authentication_01_authentications.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_authentication_01_authentications.crd.yaml index 52fac7bef..3fab2ff1f 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_authentication_01_authentications.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_authentication_01_authentications.crd.yaml @@ -103,6 +103,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -110,10 +113,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_console_01_consoles.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_console_01_consoles.crd.yaml index 956c84547..505332e4b 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_console_01_consoles.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_console_01_consoles.crd.yaml @@ -849,6 +849,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -856,10 +859,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_ingress_00_ingresscontrollers.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_ingress_00_ingresscontrollers.crd.yaml index 968febc36..2524b5a84 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_ingress_00_ingresscontrollers.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_ingress_00_ingresscontrollers.crd.yaml @@ -639,15 +639,20 @@ spec: If empty, defaults will be applied. See specific openstack fields for details about their defaults. properties: - loadBalancerIP: + floatingIP: description: |- - loadBalancerIP specifies the floating IP address that the load balancer will use. + floatingIP specifies the IP address that the load balancer will use. When not specified, an IP address will be assigned randomly by the OpenStack cloud provider. + When specified, the floating IP has to be pre-created. If the + specified value is not a floating IP or is already claimed, the + OpenStack cloud provider won't be able to provision the load + balancer. + This field may only be used if the IngressController has External scope. This value must be a valid IPv4 or IPv6 address. type: string x-kubernetes-validations: - - message: loadBalancerIP must be a valid IPv4 or - IPv6 address + - message: floatingIP must be a valid IPv4 or IPv6 + address rule: isIP(self) type: object type: @@ -689,6 +694,10 @@ spec: rule: '!has(self.scope) || self.scope != ''Internal'' || !has(self.providerParameters) || !has(self.providerParameters.aws) || !has(self.providerParameters.aws.networkLoadBalancer) || !has(self.providerParameters.aws.networkLoadBalancer.eipAllocations)' + - message: cannot specify a floating ip when scope is internal + rule: '!has(self.scope) || self.scope != ''Internal'' || !has(self.providerParameters) + || !has(self.providerParameters.openstack) || !has(self.providerParameters.openstack.floatingIP) + || self.providerParameters.openstack.floatingIP == ""' nodePort: description: |- nodePort holds parameters for the NodePortService endpoint publishing strategy. @@ -2336,6 +2345,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -2343,10 +2355,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array @@ -2815,15 +2837,20 @@ spec: If empty, defaults will be applied. See specific openstack fields for details about their defaults. properties: - loadBalancerIP: + floatingIP: description: |- - loadBalancerIP specifies the floating IP address that the load balancer will use. + floatingIP specifies the IP address that the load balancer will use. When not specified, an IP address will be assigned randomly by the OpenStack cloud provider. + When specified, the floating IP has to be pre-created. If the + specified value is not a floating IP or is already claimed, the + OpenStack cloud provider won't be able to provision the load + balancer. + This field may only be used if the IngressController has External scope. This value must be a valid IPv4 or IPv6 address. type: string x-kubernetes-validations: - - message: loadBalancerIP must be a valid IPv4 or - IPv6 address + - message: floatingIP must be a valid IPv4 or IPv6 + address rule: isIP(self) type: object type: @@ -2865,6 +2892,10 @@ spec: rule: '!has(self.scope) || self.scope != ''Internal'' || !has(self.providerParameters) || !has(self.providerParameters.aws) || !has(self.providerParameters.aws.networkLoadBalancer) || !has(self.providerParameters.aws.networkLoadBalancer.eipAllocations)' + - message: cannot specify a floating ip when scope is internal + rule: '!has(self.scope) || self.scope != ''Internal'' || !has(self.providerParameters) + || !has(self.providerParameters.openstack) || !has(self.providerParameters.openstack.floatingIP) + || self.providerParameters.openstack.floatingIP == ""' nodePort: description: |- nodePort holds parameters for the NodePortService endpoint publishing strategy. diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_insights_00_insightsoperators.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_insights_00_insightsoperators.crd.yaml index d1d2fa6b0..b7ce165e3 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_insights_00_insightsoperators.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_insights_00_insightsoperators.crd.yaml @@ -108,6 +108,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -115,10 +118,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_openshift-controller-manager_02_openshiftcontrollermanagers.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_openshift-controller-manager_02_openshiftcontrollermanagers.crd.yaml index 1abf8e03d..d6dabdda0 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_openshift-controller-manager_02_openshiftcontrollermanagers.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_openshift-controller-manager_02_openshiftcontrollermanagers.crd.yaml @@ -106,6 +106,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -113,10 +116,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_service-ca_02_servicecas.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_service-ca_02_servicecas.crd.yaml index f31a18f21..16fba0d6d 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_service-ca_02_servicecas.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_service-ca_02_servicecas.crd.yaml @@ -107,6 +107,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -114,10 +117,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_storage_01_storages.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_storage_01_storages.crd.yaml index b928c9137..e0f841881 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_storage_01_storages.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_50_storage_01_storages.crd.yaml @@ -123,6 +123,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -130,10 +133,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_dns_00_dnses.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_dns_00_dnses.crd.yaml index bdb32882b..7d2acd004 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_dns_00_dnses.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_dns_00_dnses.crd.yaml @@ -576,6 +576,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -583,10 +586,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-CustomNoUpgrade.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-CustomNoUpgrade.crd.yaml index c023c8c27..146c68405 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-CustomNoUpgrade.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-CustomNoUpgrade.crd.yaml @@ -923,6 +923,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -930,10 +933,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-Default.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-Default.crd.yaml index e1adf488a..3f150defe 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-Default.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-Default.crd.yaml @@ -867,6 +867,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -874,10 +877,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-DevPreviewNoUpgrade.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-DevPreviewNoUpgrade.crd.yaml index ce2db2e92..fd0679763 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-DevPreviewNoUpgrade.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-DevPreviewNoUpgrade.crd.yaml @@ -923,6 +923,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -930,10 +933,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-TechPreviewNoUpgrade.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-TechPreviewNoUpgrade.crd.yaml index 2704f6fbd..e55b94afc 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-TechPreviewNoUpgrade.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-TechPreviewNoUpgrade.crd.yaml @@ -923,6 +923,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -930,10 +933,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_80_csi-snapshot-controller_01_csisnapshotcontrollers.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_80_csi-snapshot-controller_01_csisnapshotcontrollers.crd.yaml index 23197942e..a166e4c3a 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_80_csi-snapshot-controller_01_csisnapshotcontrollers.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_80_csi-snapshot-controller_01_csisnapshotcontrollers.crd.yaml @@ -107,6 +107,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -114,10 +117,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_90_csi-driver_01_clustercsidrivers.crd.yaml b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_90_csi-driver_01_clustercsidrivers.crd.yaml index 1f0f61a94..9a65a695a 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_90_csi-driver_01_clustercsidrivers.crd.yaml +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.crd-manifests/0000_90_csi-driver_01_clustercsidrivers.crd.yaml @@ -384,6 +384,9 @@ spec: description: OperatorCondition is just the standard condition fields. properties: lastTransitionTime: + description: |- + lastTransitionTime is the last time the condition transitioned from one status to another. + This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. format: date-time type: string message: @@ -391,10 +394,20 @@ spec: reason: type: string status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown type: string type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ type: string required: + - lastTransitionTime + - status - type type: object type: array diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.swagger_doc_generated.go b/vendor/github.com/openshift/api/operator/v1/zz_generated.swagger_doc_generated.go index a3a78a89b..03d9e16ed 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.swagger_doc_generated.go +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.swagger_doc_generated.go @@ -52,7 +52,10 @@ func (NodeStatus) SwaggerDoc() map[string]string { } var map_OperatorCondition = map[string]string{ - "": "OperatorCondition is just the standard condition fields.", + "": "OperatorCondition is just the standard condition fields.", + "type": "type of condition in CamelCase or in foo.example.com/CamelCase.", + "status": "status of the condition, one of True, False, Unknown.", + "lastTransitionTime": "lastTransitionTime is the last time the condition transitioned from one status to another. This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.", } func (OperatorCondition) SwaggerDoc() map[string]string { @@ -1122,8 +1125,8 @@ func (NodePortStrategy) SwaggerDoc() map[string]string { } var map_OpenStackLoadBalancerParameters = map[string]string{ - "": "OpenStackLoadBalancerParameters provides configuration settings that are specific to OpenStack load balancers.", - "loadBalancerIP": "loadBalancerIP specifies the floating IP address that the load balancer will use. When not specified, an IP address will be assigned randomly by the OpenStack cloud provider. This value must be a valid IPv4 or IPv6 address. ", + "": "OpenStackLoadBalancerParameters provides configuration settings that are specific to OpenStack load balancers.", + "floatingIP": "floatingIP specifies the IP address that the load balancer will use. When not specified, an IP address will be assigned randomly by the OpenStack cloud provider. When specified, the floating IP has to be pre-created. If the specified value is not a floating IP or is already claimed, the OpenStack cloud provider won't be able to provision the load balancer. This field may only be used if the IngressController has External scope. This value must be a valid IPv4 or IPv6 address. ", } func (OpenStackLoadBalancerParameters) SwaggerDoc() map[string]string { diff --git a/vendor/github.com/openshift/build-machinery-go/make/operator.example.mk.help.log b/vendor/github.com/openshift/build-machinery-go/make/operator.example.mk.help.log index 410fd9861..b636e3926 100644 --- a/vendor/github.com/openshift/build-machinery-go/make/operator.example.mk.help.log +++ b/vendor/github.com/openshift/build-machinery-go/make/operator.example.mk.help.log @@ -22,6 +22,7 @@ update-deps-overrides update-generated update-gofmt update-profile-manifests +update-test-operator-integration verify verify-bindata verify-codegen diff --git a/vendor/github.com/openshift/build-machinery-go/make/targets/openshift/operator/mom.mk b/vendor/github.com/openshift/build-machinery-go/make/targets/openshift/operator/mom.mk index 36372087a..21c81afe0 100644 --- a/vendor/github.com/openshift/build-machinery-go/make/targets/openshift/operator/mom.mk +++ b/vendor/github.com/openshift/build-machinery-go/make/targets/openshift/operator/mom.mk @@ -4,3 +4,7 @@ test-operator-integration: build bash $(scripts_dir)/test-operator-integration.sh .PHONY: test-operator-integration +update-test-operator-integration: build + REPLACE_TEST_OUTPUT=true bash $(scripts_dir)/test-operator-integration.sh + +.PHONY: update-test-operator-integration diff --git a/vendor/github.com/openshift/build-machinery-go/scripts/test-operator-integration.sh b/vendor/github.com/openshift/build-machinery-go/scripts/test-operator-integration.sh index 04f08222a..262bf6010 100644 --- a/vendor/github.com/openshift/build-machinery-go/scripts/test-operator-integration.sh +++ b/vendor/github.com/openshift/build-machinery-go/scripts/test-operator-integration.sh @@ -18,6 +18,8 @@ if ! command -v multi-operator-manager &> /dev/null; then exit 1 fi +REPLACE_TEST_OUTPUT="${REPLACE_TEST_OUTPUT:-false}" + # Define the path to the operator binary MOM_CMD="${MOM_CMD:-multi-operator-manager}" @@ -39,5 +41,12 @@ APPLY_CONFIG_ARGS=( --output-dir="$APPLY_CONFIG_OUTPUT_DIR" ) +if [ "$REPLACE_TEST_OUTPUT" == "true" ] +then + APPLY_CONFIG_ARGS=("${APPLY_CONFIG_ARGS[@]}" "--replace-expected-output=true") +else + APPLY_CONFIG_ARGS=("${APPLY_CONFIG_ARGS[@]}" "--preserve-policy=KeepAlways") +fi + # Run the apply-configuration command from the operator "${MOM_CMD}" "${APPLY_CONFIG_ARGS[@]}" diff --git a/vendor/github.com/openshift/library-go/pkg/manifestclient/discovery_reader.go b/vendor/github.com/openshift/library-go/pkg/manifestclient/discovery_reader.go new file mode 100644 index 000000000..e5126561c --- /dev/null +++ b/vendor/github.com/openshift/library-go/pkg/manifestclient/discovery_reader.go @@ -0,0 +1,150 @@ +package manifestclient + +import ( + "embed" + "errors" + "fmt" + "io/fs" + "path/filepath" + "sync" + + apidiscoveryv2 "k8s.io/api/apidiscovery/v2" + "k8s.io/apimachinery/pkg/runtime/schema" + "k8s.io/apimachinery/pkg/util/json" + apirequest "k8s.io/apiserver/pkg/endpoints/request" + "sigs.k8s.io/yaml" +) + +type kindData struct { + kind schema.GroupVersionKind + listKind schema.GroupVersionKind + err error +} + +func newDiscoveryReader(content fs.FS) *discoveryReader { + return &discoveryReader{ + sourceFS: content, + kindForResource: make(map[schema.GroupVersionResource]kindData), + } +} + +type discoveryReader struct { + kindForResource map[schema.GroupVersionResource]kindData + + sourceFS fs.FS + lock sync.RWMutex +} + +func (dr *discoveryReader) getKindForResource(gvr schema.GroupVersionResource) (kindData, error) { + dr.lock.RLock() + kindForGVR, ok := dr.kindForResource[gvr] + if ok { + defer dr.lock.RUnlock() + return kindForGVR, kindForGVR.err + } + dr.lock.RUnlock() + + dr.lock.Lock() + defer dr.lock.Unlock() + + kindForGVR, ok = dr.kindForResource[gvr] + if ok { + return kindForGVR, kindForGVR.err + } + + discoveryPath := "/apis" + if len(gvr.Group) == 0 { + discoveryPath = "/api" + } + discoveryBytes, err := dr.getGroupResourceDiscovery(&apirequest.RequestInfo{Path: discoveryPath}) + if err != nil { + kindForGVR.err = fmt.Errorf("error reading discovery: %w", err) + dr.kindForResource[gvr] = kindForGVR + return kindForGVR, kindForGVR.err + } + + discoveryInfo := &apidiscoveryv2.APIGroupDiscoveryList{} + if err := json.Unmarshal(discoveryBytes, discoveryInfo); err != nil { + kindForGVR.err = fmt.Errorf("error unmarshalling discovery: %w", err) + dr.kindForResource[gvr] = kindForGVR + return kindForGVR, kindForGVR.err + } + + kindForGVR.err = fmt.Errorf("did not find kind for %v\n", gvr) + for _, groupInfo := range discoveryInfo.Items { + if groupInfo.Name != gvr.Group { + continue + } + for _, versionInfo := range groupInfo.Versions { + if versionInfo.Version != gvr.Version { + continue + } + for _, resourceInfo := range versionInfo.Resources { + if resourceInfo.Resource != gvr.Resource { + continue + } + if resourceInfo.ResponseKind == nil { + continue + } + kindForGVR.kind = schema.GroupVersionKind{ + Group: gvr.Group, + Version: gvr.Version, + Kind: resourceInfo.ResponseKind.Kind, + } + if len(resourceInfo.ResponseKind.Group) > 0 { + kindForGVR.kind.Group = resourceInfo.ResponseKind.Group + } + if len(resourceInfo.ResponseKind.Version) > 0 { + kindForGVR.kind.Version = resourceInfo.ResponseKind.Version + } + kindForGVR.listKind = schema.GroupVersionKind{ + Group: kindForGVR.kind.Group, + Version: kindForGVR.kind.Version, + Kind: resourceInfo.ResponseKind.Kind + "List", + } + kindForGVR.err = nil + dr.kindForResource[gvr] = kindForGVR + return kindForGVR, kindForGVR.err + } + } + } + + dr.kindForResource[gvr] = kindForGVR + return kindForGVR, kindForGVR.err +} + +func (dr *discoveryReader) getGroupResourceDiscovery(requestInfo *apirequest.RequestInfo) ([]byte, error) { + switch { + case requestInfo.Path == "/api": + return dr.getAggregatedDiscoveryForURL("aggregated-discovery-api.yaml", requestInfo.Path) + case requestInfo.Path == "/apis": + return dr.getAggregatedDiscoveryForURL("aggregated-discovery-apis.yaml", requestInfo.Path) + default: + // TODO can probably do better + return nil, fmt.Errorf("unsupported discovery path: %q", requestInfo.Path) + } +} + +func (dr *discoveryReader) getAggregatedDiscoveryForURL(filename, url string) ([]byte, error) { + discoveryBytes, err := fs.ReadFile(dr.sourceFS, filename) + if errors.Is(err, fs.ErrNotExist) { + discoveryBytes, err = fs.ReadFile(defaultDiscovery, filepath.Join("default-discovery", filename)) + } + if err != nil { + return nil, fmt.Errorf("error reading discovery: %w", err) + } + + apiMap := map[string]interface{}{} + if err := yaml.Unmarshal(discoveryBytes, &apiMap); err != nil { + return nil, fmt.Errorf("discovery %q unmarshal failed: %w", url, err) + } + apiJSON, err := json.Marshal(apiMap) + if err != nil { + return nil, fmt.Errorf("discovery %q marshal failed: %w", url, err) + } + + return apiJSON, err +} + +//go:embed default-discovery +var defaultDiscovery embed.FS diff --git a/vendor/github.com/openshift/library-go/pkg/manifestclient/group_resource_discovery.go b/vendor/github.com/openshift/library-go/pkg/manifestclient/group_resource_discovery.go deleted file mode 100644 index 84e3b5aff..000000000 --- a/vendor/github.com/openshift/library-go/pkg/manifestclient/group_resource_discovery.go +++ /dev/null @@ -1,250 +0,0 @@ -package manifestclient - -import ( - "errors" - "fmt" - "io/fs" - "path/filepath" - "strings" - - "k8s.io/apimachinery/pkg/util/json" - "sigs.k8s.io/yaml" - - metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" - apirequest "k8s.io/apiserver/pkg/endpoints/request" -) - -func (mrt *manifestRoundTripper) getGroupResourceDiscovery(requestInfo *apirequest.RequestInfo) ([]byte, error) { - switch { - case requestInfo.Path == "/api": - ret, err := mrt.getAggregatedDiscoveryForURL("aggregated-discovery-api.yaml", requestInfo.Path) - if errors.Is(err, fs.ErrNotExist) { - return mrt.getLegacyGroupResourceDiscovery(requestInfo) - } - return ret, err - case requestInfo.Path == "/apis": - ret, err := mrt.getAggregatedDiscoveryForURL("aggregated-discovery-apis.yaml", requestInfo.Path) - if errors.Is(err, fs.ErrNotExist) { - return mrt.getLegacyGroupResourceDiscovery(requestInfo) - } - return ret, err - default: - // TODO can probably do better - return nil, fmt.Errorf("unsupported discovery path: %q", requestInfo.Path) - } -} - -func (mrt *manifestRoundTripper) getAggregatedDiscoveryForURL(filename, url string) ([]byte, error) { - discoveryBytes, err := fs.ReadFile(mrt.sourceFS, filename) - if errors.Is(err, fs.ErrNotExist) { - discoveryBytes, err = fs.ReadFile(defaultDiscovery, filepath.Join("default-discovery", filename)) - } - if err != nil { - return nil, fmt.Errorf("error reading discovery: %w", err) - } - - apiMap := map[string]interface{}{} - if err := yaml.Unmarshal(discoveryBytes, &apiMap); err != nil { - return nil, fmt.Errorf("discovery %q unmarshal failed: %w", url, err) - } - apiJSON, err := json.Marshal(apiMap) - if err != nil { - return nil, fmt.Errorf("discovery %q marshal failed: %w", url, err) - } - - return apiJSON, err -} - -func (mrt *manifestRoundTripper) getLegacyGroupResourceDiscovery(requestInfo *apirequest.RequestInfo) ([]byte, error) { - if len(requestInfo.Path) == 0 { - return nil, fmt.Errorf("path required for group resource discovery") - } - - apiResourceList := &metav1.APIResourceList{} - - group, version, err := splitGroupVersionFromRequestPath(requestInfo.Path) - if err != nil { - return nil, fmt.Errorf("unable to split group/version from path: %w", err) - } - - apiResourceList.GroupVersion = fmt.Sprintf("%s/%s", group, version) - if group == "core" { - apiResourceList.GroupVersion = version - } - - // Map of resource name to APIResource. - apiResources := map[string]metav1.APIResource{} - - clusterGroupPath := filepath.Join("cluster-scoped-resources", group) - clusterGroupDirEntries, err := fs.ReadDir(mrt.sourceFS, clusterGroupPath) - if err != nil && !errors.Is(err, fs.ErrNotExist) { - return nil, fmt.Errorf("unable to read directory: %w", err) - } - - apiResourcesForClusterScope, err := getAPIResourcesFromNamespaceDirEntries(clusterGroupDirEntries, mrt.sourceFS, group, version, clusterGroupPath, false /* cluster-scoped */) - if err != nil { - return nil, fmt.Errorf("unable to get resources from cluster-scoped directory: %w", err) - } - for resourceName, apiResource := range apiResourcesForClusterScope { - apiResources[resourceName] = apiResource - } - - namespaceDirEntries, err := fs.ReadDir(mrt.sourceFS, "namespaces") - if err != nil { - return nil, fmt.Errorf("unable to read directory: %w", err) - } - for _, namespaceDirEntry := range namespaceDirEntries { - if !namespaceDirEntry.IsDir() { - continue - } - - namespaceGroupPath := filepath.Join("namespaces", namespaceDirEntry.Name(), group) - namespaceGroupDirEntries, err := fs.ReadDir(mrt.sourceFS, namespaceGroupPath) - if err != nil && !errors.Is(err, fs.ErrNotExist) { - return nil, fmt.Errorf("unable to read directory: %w", err) - } else if errors.Is(err, fs.ErrNotExist) { - // No resources for this namespace. - continue - } - - apiResourcesForNamespace, err := getAPIResourcesFromNamespaceDirEntries(namespaceGroupDirEntries, mrt.sourceFS, group, version, namespaceGroupPath, true /* namespaced */) - if err != nil { - return nil, fmt.Errorf("unable to get resources from namespace directory: %w", err) - } - - for resourceName, apiResource := range apiResourcesForNamespace { - apiResources[resourceName] = apiResource - } - - // Namespaces are special: each namespace is stored in its own file within the namespace directory - namespacePath := filepath.Join("namespaces", namespaceDirEntry.Name(), namespaceDirEntry.Name()+".yaml") - if namespaceObj, err := readIndividualFile(mrt.sourceFS, namespacePath); err == nil { - // It's currently not guaranteed that the file is always present - apiResources["namespaces"] = metav1.APIResource{ - Name: "namespaces", - Kind: namespaceObj.GetKind(), - Group: namespaceObj.GroupVersionKind().Group, - Version: namespaceObj.GroupVersionKind().Version, - Namespaced: false, - Verbs: []string{"get", "list", "watch"}, - } - } - } - - for _, apiResource := range apiResources { - apiResourceList.APIResources = append(apiResourceList.APIResources, apiResource) - } - - ret, err := serializeAPIResourceListToJSON(apiResourceList) - if err != nil { - return nil, fmt.Errorf("failed to serialize group resource discovery: %v", err) - } - return []byte(ret), nil -} - -func splitGroupVersionFromRequestPath(path string) (string, string, error) { - if path == "/api/v1" { - return "core", "v1", nil - } - - parts := strings.Split(path, "/") - if len(parts) != 4 { - return "", "", fmt.Errorf("invalid path: %s", path) - } - - return parts[2], parts[3], nil -} - -func getResourceDirAPIServerListEntry(sourceFS fs.FS, groupPath, resourceName, group, version string, namespaced bool) (*metav1.APIResource, error) { - resourceDirEntries, err := fs.ReadDir(sourceFS, filepath.Join(groupPath, resourceName)) - if err != nil { - return nil, fmt.Errorf("unable to read directory: %w", err) - } - for _, fileEntry := range resourceDirEntries { - if !strings.HasSuffix(fileEntry.Name(), ".yaml") { - // There shouldn't be anything that hits this, but ignore it if there is. - continue - } - - individualObj, individualErr := readIndividualFile(sourceFS, filepath.Join(groupPath, resourceName, fileEntry.Name())) - if individualErr != nil { - return nil, fmt.Errorf("unable to read file: %w", individualErr) - } - - groupVersion := fmt.Sprintf("%s/%s", group, version) - if group == "core" { - group = "" - groupVersion = version - } - - if individualObj.GetAPIVersion() != groupVersion { - continue - } - - // No point checking further, all files should produce the same APIResource. - return &metav1.APIResource{ - Name: resourceName, - Kind: individualObj.GetKind(), - Group: group, - Version: version, - Namespaced: namespaced, - Verbs: []string{"get", "list", "watch"}, - }, nil - } - - return nil, nil -} - -func getAPIResourcesFromNamespaceDirEntries(dirEntries []fs.DirEntry, sourceFS fs.FS, group, version string, basePath string, namespaced bool) (map[string]metav1.APIResource, error) { - apiResources := map[string]metav1.APIResource{} - for _, dirEntry := range dirEntries { - // Directories are named after the resource and contain individual resources. - if dirEntry.IsDir() { - apiResource, err := getResourceDirAPIServerListEntry(sourceFS, basePath, dirEntry.Name(), group, version, namespaced) - if err != nil { - return nil, fmt.Errorf("unable to get resource from directory: %w", err) - } - if apiResource != nil { - apiResources[dirEntry.Name()] = *apiResource - } - } - - if !strings.HasSuffix(dirEntry.Name(), ".yaml") { - // There shouldn't be anything that hits this, but ignore it if there is. - continue - } - - resourceName := strings.TrimSuffix(dirEntry.Name(), ".yaml") - if _, ok := apiResources[resourceName]; ok { - // We already have this resource. - continue - } - - // Files are named after the resource and contain a list of resources. - listObj, err := readListFile(sourceFS, filepath.Join(basePath, dirEntry.Name())) - if err != nil { - return nil, fmt.Errorf("unable to read list file: %w", err) - } - - for _, obj := range listObj.Items { - if obj.GetAPIVersion() != fmt.Sprintf("%s/%s", group, version) { - continue - } - - apiResources[resourceName] = metav1.APIResource{ - Name: resourceName, - Kind: obj.GetKind(), - Group: group, - Version: version, - Namespaced: namespaced, - Verbs: []string{"get", "list", "watch"}, - } - - // Once we find a resource in the expected group/version, we can break. - // Anything else would produce the same APIResource. - break - } - } - - return apiResources, nil -} diff --git a/vendor/github.com/openshift/library-go/pkg/manifestclient/list.go b/vendor/github.com/openshift/library-go/pkg/manifestclient/list.go index d0e61f761..6ee3da6e5 100644 --- a/vendor/github.com/openshift/library-go/pkg/manifestclient/list.go +++ b/vendor/github.com/openshift/library-go/pkg/manifestclient/list.go @@ -42,7 +42,7 @@ func (mrt *manifestRoundTripper) listAll(requestInfo *apirequest.RequestInfo) ([ Resource: requestInfo.Resource, } - kind, err := mrt.getKindForResource(gvr) + kind, err := mrt.discoveryReader.getKindForResource(gvr) if err != nil { return nil, fmt.Errorf("unable to determine list kind: %w", err) } @@ -240,7 +240,10 @@ func allPossibleListFileLocations(sourceFS fs.FS, requestInfo *apirequest.Reques allPossibleListFileLocations = append(allPossibleListFileLocations, filepath.Join(clusterParts...)) namespaces, err := allNamespacesWithData(sourceFS) - if err != nil { + switch { + case errors.Is(err, fs.ErrNotExist): + return allPossibleListFileLocations, nil + case err != nil: return nil, fmt.Errorf("unable to read namespaces: %w", err) } for _, ns := range namespaces { diff --git a/vendor/github.com/openshift/library-go/pkg/manifestclient/read_roundtripper.go b/vendor/github.com/openshift/library-go/pkg/manifestclient/read_roundtripper.go index 4f798e5c2..bb0290632 100644 --- a/vendor/github.com/openshift/library-go/pkg/manifestclient/read_roundtripper.go +++ b/vendor/github.com/openshift/library-go/pkg/manifestclient/read_roundtripper.go @@ -2,19 +2,14 @@ package manifestclient import ( "bytes" - "embed" "fmt" "io" "io/fs" "net/http" "strconv" "strings" - "sync" "time" - apidiscoveryv2 "k8s.io/api/apidiscovery/v2" - "k8s.io/apimachinery/pkg/util/json" - apierrors "k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/runtime/schema" utilruntime "k8s.io/apimachinery/pkg/util/runtime" @@ -36,23 +31,16 @@ type manifestRoundTripper struct { // requestInfoResolver is the same type constructed the same way as the kube-apiserver requestInfoResolver *apirequest.RequestInfoFactory - lock sync.RWMutex - kindForResource map[schema.GroupVersionResource]kindData -} - -type kindData struct { - kind schema.GroupVersionKind - listKind schema.GroupVersionKind - err error + discoveryReader *discoveryReader } -func newReadRoundTripper(content fs.FS) *manifestRoundTripper { +func newReadRoundTripper(content fs.FS, discoveryRoundTripper *discoveryReader) *manifestRoundTripper { return &manifestRoundTripper{ sourceFS: content, requestInfoResolver: server.NewRequestInfoResolver(&server.Config{ LegacyAPIGroupPrefixes: sets.NewString(server.DefaultLegacyAPIPrefix), }), - kindForResource: make(map[schema.GroupVersionResource]kindData), + discoveryReader: discoveryRoundTripper, } } @@ -82,7 +70,7 @@ func (mrt *manifestRoundTripper) RoundTrip(req *http.Request) (*http.Response, e switch requestInfo.Verb { case "get": if isDiscovery { - returnBody, returnErr = mrt.getGroupResourceDiscovery(requestInfo) + returnBody, returnErr = mrt.discoveryReader.getGroupResourceDiscovery(requestInfo) } else { // TODO handle label and field selectors because single item lists are GETs returnBody, returnErr = mrt.get(requestInfo) @@ -168,84 +156,3 @@ func isServerGroupResourceDiscovery(path string) bool { } return parts[0] == "" && parts[1] == "apis" } - -//go:embed default-discovery -var defaultDiscovery embed.FS - -func (mrt *manifestRoundTripper) getKindForResource(gvr schema.GroupVersionResource) (kindData, error) { - mrt.lock.RLock() - kindForGVR, ok := mrt.kindForResource[gvr] - if ok { - defer mrt.lock.RUnlock() - return kindForGVR, kindForGVR.err - } - mrt.lock.RUnlock() - - mrt.lock.Lock() - defer mrt.lock.Unlock() - - kindForGVR, ok = mrt.kindForResource[gvr] - if ok { - return kindForGVR, kindForGVR.err - } - - discoveryPath := "/apis" - if len(gvr.Group) == 0 { - discoveryPath = "/api" - } - discoveryBytes, err := mrt.getGroupResourceDiscovery(&apirequest.RequestInfo{Path: discoveryPath}) - if err != nil { - kindForGVR.err = fmt.Errorf("error reading discovery: %w", err) - mrt.kindForResource[gvr] = kindForGVR - return kindForGVR, kindForGVR.err - } - - discoveryInfo := &apidiscoveryv2.APIGroupDiscoveryList{} - if err := json.Unmarshal(discoveryBytes, discoveryInfo); err != nil { - kindForGVR.err = fmt.Errorf("error unmarshalling discovery: %w", err) - mrt.kindForResource[gvr] = kindForGVR - return kindForGVR, kindForGVR.err - } - - kindForGVR.err = fmt.Errorf("did not find kind for %v\n", gvr) - for _, groupInfo := range discoveryInfo.Items { - if groupInfo.Name != gvr.Group { - continue - } - for _, versionInfo := range groupInfo.Versions { - if versionInfo.Version != gvr.Version { - continue - } - for _, resourceInfo := range versionInfo.Resources { - if resourceInfo.Resource != gvr.Resource { - continue - } - if resourceInfo.ResponseKind == nil { - continue - } - kindForGVR.kind = schema.GroupVersionKind{ - Group: gvr.Group, - Version: gvr.Version, - Kind: resourceInfo.ResponseKind.Kind, - } - if len(resourceInfo.ResponseKind.Group) > 0 { - kindForGVR.kind.Group = resourceInfo.ResponseKind.Group - } - if len(resourceInfo.ResponseKind.Version) > 0 { - kindForGVR.kind.Version = resourceInfo.ResponseKind.Version - } - kindForGVR.listKind = schema.GroupVersionKind{ - Group: kindForGVR.kind.Group, - Version: kindForGVR.kind.Version, - Kind: resourceInfo.ResponseKind.Kind + "List", - } - kindForGVR.err = nil - mrt.kindForResource[gvr] = kindForGVR - return kindForGVR, kindForGVR.err - } - } - } - - mrt.kindForResource[gvr] = kindForGVR - return kindForGVR, kindForGVR.err -} diff --git a/vendor/github.com/openshift/library-go/pkg/manifestclient/readwrite_roundtripper.go b/vendor/github.com/openshift/library-go/pkg/manifestclient/readwrite_roundtripper.go index c781a41c5..13d01f533 100644 --- a/vendor/github.com/openshift/library-go/pkg/manifestclient/readwrite_roundtripper.go +++ b/vendor/github.com/openshift/library-go/pkg/manifestclient/readwrite_roundtripper.go @@ -49,10 +49,11 @@ func NewRoundTripper(mustGatherDir string) *readWriteRoundTripper { } func newReadWriteRoundTripper(sourceFS fs.FS) *readWriteRoundTripper { - return &readWriteRoundTripper{ - readDelegate: newReadRoundTripper(sourceFS), - writeDelegate: newWriteRoundTripper(), - } + rt := &readWriteRoundTripper{} + discoveryReader := newDiscoveryReader(sourceFS) + rt.readDelegate = newReadRoundTripper(sourceFS, discoveryReader) + rt.writeDelegate = newWriteRoundTripper(discoveryReader) + return rt } type readWriteRoundTripper struct { diff --git a/vendor/github.com/openshift/library-go/pkg/manifestclient/write_roundtripper.go b/vendor/github.com/openshift/library-go/pkg/manifestclient/write_roundtripper.go index a75dd8a4a..d85d78dd4 100644 --- a/vendor/github.com/openshift/library-go/pkg/manifestclient/write_roundtripper.go +++ b/vendor/github.com/openshift/library-go/pkg/manifestclient/write_roundtripper.go @@ -28,18 +28,21 @@ type writeTrackingRoundTripper struct { // requestInfoResolver is the same type constructed the same way as the kube-apiserver requestInfoResolver *apirequest.RequestInfoFactory + discoveryReader *discoveryReader + lock sync.RWMutex nextRequestNumber int actionTracker *AllActionsTracker[TrackedSerializedRequest] } -func newWriteRoundTripper() *writeTrackingRoundTripper { +func newWriteRoundTripper(discoveryRoundTripper *discoveryReader) *writeTrackingRoundTripper { return &writeTrackingRoundTripper{ nextRequestNumber: 1, actionTracker: &AllActionsTracker[TrackedSerializedRequest]{}, requestInfoResolver: server.NewRequestInfoResolver(&server.Config{ LegacyAPIGroupPrefixes: sets.NewString(server.DefaultLegacyAPIPrefix), }), + discoveryReader: discoveryRoundTripper, } } @@ -213,8 +216,14 @@ func (mrt *writeTrackingRoundTripper) roundTrip(req *http.Request) ([]byte, erro ret := &unstructured.Unstructured{Object: map[string]interface{}{}} ret.SetName(serializedRequest.ActionMetadata.Name) ret.SetNamespace(serializedRequest.ActionMetadata.Namespace) - if actionHasRuntimeObjectBody { // TODO might be able to do something generally based on discovery if absolutely necessary + if actionHasRuntimeObjectBody { ret.SetGroupVersionKind(bodyObj.GetObjectKind().GroupVersionKind()) + } else { + kindForResource, err := mrt.discoveryReader.getKindForResource(gvr) + if err != nil { + return nil, err + } + ret.SetGroupVersionKind(kindForResource.kind) } retBytes, err := json.Marshal(ret.Object) if err != nil { diff --git a/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controller/apiservice/apiservice_controller.go b/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controller/apiservice/apiservice_controller.go index 78d3fe663..817f7fe1a 100644 --- a/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controller/apiservice/apiservice_controller.go +++ b/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controller/apiservice/apiservice_controller.go @@ -70,7 +70,7 @@ func NewAPIServiceController( kubeClient: kubeClient, } - return factory.New().WithSync(c.sync).WithControllerInstanceName(c.controllerInstanceName).ResyncEvery(10*time.Second).WithInformers( + return factory.New().WithSync(c.sync).WithControllerInstanceName(c.controllerInstanceName).ResyncEvery(1*time.Minute).WithInformers( append(informers, kubeInformersForNamespaces.InformersFor(targetNamespace).Core().V1().Services().Informer(), kubeInformersForNamespaces.InformersFor(targetNamespace).Core().V1().Endpoints().Informer(), diff --git a/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controller/auditpolicy/auditpolicy_controller.go b/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controller/auditpolicy/auditpolicy_controller.go index 9695e69da..318bf2e52 100644 --- a/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controller/auditpolicy/auditpolicy_controller.go +++ b/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controller/auditpolicy/auditpolicy_controller.go @@ -38,7 +38,6 @@ func NewAuditPolicyController( name string, targetNamespace string, targetConfigMapName string, - apiserverConfigLister configv1listers.APIServerLister, operatorClient v1helpers.OperatorClient, kubeClient kubernetes.Interface, configInformers configinformers.SharedInformerFactory, @@ -48,13 +47,13 @@ func NewAuditPolicyController( c := &auditPolicyController{ controllerInstanceName: factory.ControllerInstanceName(name, "AuditPolicy"), operatorClient: operatorClient, - apiserverConfigLister: apiserverConfigLister, + apiserverConfigLister: configInformers.Config().V1().APIServers().Lister(), kubeClient: kubeClient, targetNamespace: targetNamespace, targetConfigMapName: targetConfigMapName, } - return factory.New().WithSync(c.sync).WithControllerInstanceName(c.controllerInstanceName).ResyncEvery(10*time.Second).WithInformers( + return factory.New().WithSync(c.sync).WithControllerInstanceName(c.controllerInstanceName).ResyncEvery(1*time.Minute).WithInformers( configInformers.Config().V1().APIServers().Informer(), kubeInformersForTargetNamesace.Core().V1().ConfigMaps().Informer(), operatorClient.Informer(), diff --git a/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controllerset/apiservercontrollerset.go b/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controllerset/apiservercontrollerset.go index 87311adee..39438998f 100644 --- a/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controllerset/apiservercontrollerset.go +++ b/vendor/github.com/openshift/library-go/pkg/operator/apiserver/controllerset/apiservercontrollerset.go @@ -11,7 +11,6 @@ import ( openshiftconfigclientv1 "github.com/openshift/client-go/config/clientset/versioned/typed/config/v1" configinformers "github.com/openshift/client-go/config/informers/externalversions" configv1informers "github.com/openshift/client-go/config/informers/externalversions/config/v1" - configv1listers "github.com/openshift/client-go/config/listers/config/v1" "github.com/openshift/library-go/pkg/controller/factory" "github.com/openshift/library-go/pkg/operator/apiserver/controller/apiservice" "github.com/openshift/library-go/pkg/operator/apiserver/controller/auditpolicy" @@ -400,7 +399,6 @@ func (cs *APIServerControllerSet) WithoutEncryptionControllers() *APIServerContr func (cs *APIServerControllerSet) WithAuditPolicyController( targetNamespace string, targetConfigMapName string, - apiserverConfigLister configv1listers.APIServerLister, configInformers configinformers.SharedInformerFactory, kubeInformersForTargetNamesace kubeinformers.SharedInformerFactory, kubeClient kubernetes.Interface, @@ -409,7 +407,6 @@ func (cs *APIServerControllerSet) WithAuditPolicyController( cs.name, targetNamespace, targetConfigMapName, - apiserverConfigLister, cs.operatorClient, kubeClient, configInformers, diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/command.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/command.go index 06d446069..5dedf744f 100644 --- a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/command.go +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/command.go @@ -34,7 +34,7 @@ type ApplyConfigurationInput struct { } // ApplyConfigurationFunc is a function called for applying configuration. -type ApplyConfigurationFunc func(ctx context.Context, applyConfigurationInput ApplyConfigurationInput) (AllDesiredMutationsGetter, error) +type ApplyConfigurationFunc func(ctx context.Context, applyConfigurationInput ApplyConfigurationInput) (*ApplyConfigurationRunResult, AllDesiredMutationsGetter, error) func NewApplyConfigurationCommand(applyConfigurationFn ApplyConfigurationFunc, outputResourcesFn libraryoutputresources.OutputResourcesFunc, streams genericiooptions.IOStreams) *cobra.Command { return newApplyConfigurationCommand(applyConfigurationFn, outputResourcesFn, streams) diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/directory_apply_configuration.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/directory_apply_configuration.go index 229ab1bff..72378eea5 100644 --- a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/directory_apply_configuration.go +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/directory_apply_configuration.go @@ -4,7 +4,9 @@ import ( "errors" "fmt" "io/fs" + "k8s.io/apimachinery/pkg/util/json" "k8s.io/apimachinery/pkg/util/sets" + "k8s.io/apimachinery/pkg/util/yaml" "os" "path/filepath" ) @@ -14,15 +16,17 @@ type ApplyConfigurationResult interface { OutputDirectory() (string, error) Stdout() string Stderr() string + ControllerResults() *ApplyConfigurationRunResult AllDesiredMutationsGetter } type simpleApplyConfigurationResult struct { - err error - outputDirectory string - stdout string - stderr string + err error + outputDirectory string + stdout string + stderr string + controllerResults *ApplyConfigurationRunResult applyConfiguration *applyConfiguration } @@ -60,6 +64,26 @@ func NewApplyConfigurationResultFromDirectory(inFS fs.FS, outputDirectory string stderrContent = stderrContent[indexToStart:] } + var controllerResults *ApplyConfigurationRunResult + controllerResultsContent := []byte{} + controllerResultsLocation := filepath.Join(outputDirectory, "controller-results.yaml") + controllerResultsContent, err = fs.ReadFile(inFS, "controller-results.yaml") + if err != nil && !os.IsNotExist(err) { + errs = append(errs, fmt.Errorf("failed reading %q: %w", controllerResultsLocation, err)) + } + if len(controllerResultsContent) > 0 { + if asJSON, err := yaml.ToJSON(controllerResultsContent); err != nil { + errs = append(errs, fmt.Errorf("unable to convert controller-results.yaml to json: %w", err)) + } else { + localControllerResults := &ApplyConfigurationRunResult{} + if err := json.Unmarshal(asJSON, localControllerResults); err != nil { + errs = append(errs, fmt.Errorf("unable to parse controller-results.yaml: %w", err)) + } else { + controllerResults = localControllerResults + } + } + } + outputContent, err := fs.ReadDir(inFS, ".") switch { case errors.Is(err, fs.ErrNotExist) && execError != nil: @@ -85,6 +109,7 @@ func NewApplyConfigurationResultFromDirectory(inFS fs.FS, outputDirectory string ret := &simpleApplyConfigurationResult{ stdout: string(stdoutContent), stderr: string(stderrContent), + controllerResults: controllerResults, outputDirectory: outputDirectory, applyConfiguration: &applyConfiguration{}, } @@ -101,6 +126,9 @@ func NewApplyConfigurationResultFromDirectory(inFS fs.FS, outputDirectory string if currContent.Name() == "stderr.log" { continue } + if currContent.Name() == "controller-results.yaml" { + continue + } if !currContent.IsDir() { errs = append(errs, fmt.Errorf("unexpected file %q, only target cluster directories are: %v", filepath.Join(outputDirectory, currContent.Name()), sets.List(AllClusterTypes))) @@ -140,6 +168,10 @@ func (s *simpleApplyConfigurationResult) Error() error { return s.err } +func (s *simpleApplyConfigurationResult) ControllerResults() *ApplyConfigurationRunResult { + return s.controllerResults +} + func (s *simpleApplyConfigurationResult) OutputDirectory() (string, error) { return s.outputDirectory, nil } diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/equivalence.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/equivalence.go index 6af6a0e5f..538fa5a2f 100644 --- a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/equivalence.go +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/equivalence.go @@ -9,11 +9,13 @@ import ( "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/util/sets" "k8s.io/apimachinery/pkg/util/yaml" + "reflect" ) func EquivalentApplyConfigurationResultIgnoringEvents(lhs, rhs ApplyConfigurationResult) []string { reasons := []string{} reasons = append(reasons, equivalentErrors("Error", lhs.Error(), rhs.Error())...) + reasons = append(reasons, equivalentRunResults("ControllerResults", lhs.ControllerResults(), rhs.ControllerResults())...) for _, clusterType := range sets.List(AllClusterTypes) { currLHS := lhs.MutationsForClusterType(clusterType) @@ -39,6 +41,23 @@ func equivalentErrors(field string, lhs, rhs error) []string { return reasons } +func equivalentRunResults(field string, lhs, rhs *ApplyConfigurationRunResult) []string { + reasons := []string{} + switch { + case lhs == nil && rhs == nil: + case lhs == nil && rhs != nil: + reasons = append(reasons, fmt.Sprintf("%v: lhs=nil, rhs=%v", field, rhs)) + case lhs != nil && rhs == nil: + reasons = append(reasons, fmt.Sprintf("%v: lhs=%v, rhs=nil", field, lhs)) + default: + if !reflect.DeepEqual(lhs, rhs) { + reasons = append(reasons, fmt.Sprintf("%v: diff: %v", field, cmp.Diff(lhs, rhs))) + } + } + + return reasons +} + func EquivalentClusterApplyResultIgnoringEvents(field string, lhs, rhs SingleClusterDesiredMutationGetter) []string { switch { case lhs == nil && rhs == nil: diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/operator_launch_helpers.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/operator_launch_helpers.go index 2bafc8d06..c29e47990 100644 --- a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/operator_launch_helpers.go +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/operator_launch_helpers.go @@ -6,6 +6,7 @@ import ( "fmt" "math/rand" "reflect" + "runtime/debug" "strings" "time" @@ -18,7 +19,7 @@ import ( ) type OperatorStarter interface { - RunOnce(ctx context.Context) error + RunOnce(ctx context.Context, input ApplyConfigurationInput) (*ApplyConfigurationRunResult, AllDesiredMutationsGetter, error) Start(ctx context.Context) error } @@ -27,11 +28,6 @@ type SimpleOperatorStarter struct { ControllerNamedRunOnceFns []NamedRunOnce // ControllerRunFns is useful during a transition to coalesce the operator launching flow. ControllerRunFns []RunFunc - // Controllers hold an optional list of controller names to run. - // '*' means "all controllersFromFlags are enabled by default" - // 'foo' means "enable 'foo'" - // '-foo' means "disable 'foo'" - Controllers []string } var ( @@ -41,7 +37,7 @@ var ( _ SimplifiedInformerFactory = generatedNamespacedInformerFactory{} ) -func (a SimpleOperatorStarter) RunOnce(ctx context.Context) error { +func (a SimpleOperatorStarter) RunOnce(ctx context.Context, input ApplyConfigurationInput) (*ApplyConfigurationRunResult, AllDesiredMutationsGetter, error) { for _, informer := range a.Informers { informer.Start(ctx) } @@ -61,29 +57,53 @@ func (a SimpleOperatorStarter) RunOnce(ctx context.Context) error { knownControllersSet.Insert(controllerRunner.ControllerInstanceName()) } if len(duplicateControllerNames) > 0 { - return fmt.Errorf("the following controllers were requested to run multiple times: %v", duplicateControllerNames) + return nil, nil, fmt.Errorf("the following controllers were requested to run multiple times: %v", duplicateControllerNames) } - if errs := validateControllersFromFlags(knownControllersSet, a.Controllers); len(errs) > 0 { - return errors.Join(errs...) + if errs := validateControllersFromFlags(knownControllersSet, input.Controllers); len(errs) > 0 { + return nil, nil, errors.Join(errs...) } + allControllersRunResult := &ApplyConfigurationRunResult{} + shuffleNamedRunOnce(a.ControllerNamedRunOnceFns) errs := []error{} for _, controllerRunner := range a.ControllerNamedRunOnceFns { func() { - if !isControllerEnabled(controllerRunner.ControllerInstanceName(), a.Controllers) { + currControllerResult := ControllerRunResult{ + ControllerName: controllerRunner.ControllerInstanceName(), + Status: ControllerRunStatusUnknown, + } + defer func() { + if r := recover(); r != nil { + currControllerResult.Status = ControllerRunStatusPanicked + currControllerResult.PanicStack = fmt.Sprintf("%s\n%s", r, string(debug.Stack())) + } + allControllersRunResult.ControllerResults = append(allControllersRunResult.ControllerResults, currControllerResult) + }() + + if !isControllerEnabled(controllerRunner.ControllerInstanceName(), input.Controllers) { + currControllerResult.Status = ControllerRunStatusSkipped return } localCtx, localCancel := context.WithTimeout(ctx, 1*time.Second) defer localCancel() + localCtx = manifestclient.WithControllerInstanceNameFromContext(localCtx, controllerRunner.ControllerInstanceName()) if err := controllerRunner.RunOnce(localCtx); err != nil { + currControllerResult.Status = ControllerRunStatusFailed + currControllerResult.Errors = append(currControllerResult.Errors, ErrorDetails{Message: err.Error()}) errs = append(errs, fmt.Errorf("controller %q failed: %w", controllerRunner.ControllerInstanceName(), err)) + } else { + currControllerResult.Status = ControllerRunStatusSucceeded } }() } - return errors.Join(errs...) + + // canonicalize + CanonicalizeApplyConfigurationRunResult(allControllersRunResult) + + return allControllersRunResult, NewApplyConfigurationFromClient(input.MutationTrackingClient.GetMutations()), errors.Join(errs...) } func (a SimpleOperatorStarter) Start(ctx context.Context) error { diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/options.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/options.go index 5ce734f1b..40a1ba5e3 100644 --- a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/options.go +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/options.go @@ -7,6 +7,7 @@ import ( "github.com/openshift/library-go/pkg/manifestclient" "os" "path/filepath" + "sigs.k8s.io/yaml" "github.com/openshift/multi-operator-manager/pkg/library/libraryoutputresources" ) @@ -44,19 +45,19 @@ func (o *applyConfigurationOptions) Run(ctx context.Context) error { errs = append(errs, err) } - result, err := o.applyConfigurationFn(ctx, o.input) + controllerResults, mutations, err := o.applyConfigurationFn(ctx, o.input) if err != nil { errs = append(errs, err) } // also validate the raw results because filtering may have eliminated "bad" output. - unspecifiedOutputResources := UnspecifiedOutputResources(result, allAllowedOutputResources) - if err := ValidateAllDesiredMutationsGetter(result, allAllowedOutputResources); err != nil { + unspecifiedOutputResources := UnspecifiedOutputResources(mutations, allAllowedOutputResources) + if err := ValidateAllDesiredMutationsGetter(mutations, allAllowedOutputResources); err != nil { errs = append(errs, err) } // now filter the results and check them - filteredResult := FilterAllDesiredMutationsGetter(result, allAllowedOutputResources) + filteredResult := FilterAllDesiredMutationsGetter(mutations, allAllowedOutputResources) if err := ValidateAllDesiredMutationsGetter(filteredResult, allAllowedOutputResources); err != nil { errs = append(errs, err) } @@ -70,5 +71,13 @@ func (o *applyConfigurationOptions) Run(ctx context.Context) error { } } + if controllerResultBytes, err := yaml.Marshal(controllerResults); err != nil { + errs = append(errs, fmt.Errorf("failed marshalling controller results: %w", err)) + } else { + if err := os.WriteFile(filepath.Join(o.outputDirectory, "controller-results.yaml"), controllerResultBytes, 0644); err != nil { + errs = append(errs, fmt.Errorf("failed writing controller results: %w", err)) + } + } + return errors.Join(errs...) } diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/types.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/types.go new file mode 100644 index 000000000..d920a2dbd --- /dev/null +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration/types.go @@ -0,0 +1,54 @@ +package libraryapplyconfiguration + +import ( + "slices" + "strings" +) + +type ApplyConfigurationRunResult struct { + ControllerResults []ControllerRunResult `json:"controllerResults"` +} + +type ControllerRunResult struct { + ControllerName string `json:"controllerName"` + Status ControllerRunStatus `json:"status"` + Errors []ErrorDetails `json:"errors,omitempty"` + PanicStack string `json:"panicStack,omitempty"` +} + +type ControllerRunStatus string + +var ( + ControllerRunStatusUnknown ControllerRunStatus = "Unknown" + ControllerRunStatusSucceeded ControllerRunStatus = "Succeeded" + ControllerRunStatusSkipped ControllerRunStatus = "Skipped" + ControllerRunStatusFailed ControllerRunStatus = "Failed" + ControllerRunStatusPanicked ControllerRunStatus = "Panicked" +) + +// TODO perhaps we add indications about interfaces this matches? +type ErrorDetails struct { + Message string `json:"message"` +} + +func CanonicalizeApplyConfigurationRunResult(obj *ApplyConfigurationRunResult) { + if obj == nil { + return + } + slices.SortStableFunc(obj.ControllerResults, sortControllerRunResult) +} + +// TODO sort with error details +func sortControllerRunResult(a, b ControllerRunResult) int { + if c := strings.Compare(a.ControllerName, b.ControllerName); c != 0 { + return c + } + if c := strings.Compare(string(a.Status), string(b.Status)); c != 0 { + return c + } + if c := strings.Compare(a.PanicStack, b.PanicStack); c != 0 { + return c + } + + return 0 +} diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryinputresources/easy_creation.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryinputresources/easy_creation.go index 30f96e7f0..b461c293b 100644 --- a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryinputresources/easy_creation.go +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryinputresources/easy_creation.go @@ -53,11 +53,11 @@ func ExactClusterRoleBinding(name string) ExactResourceID { } func ExactRole(namespace, name string) ExactResourceID { - return ExactResource("rbac.authorization.k8s.io", "v1", "roles", "", name) + return ExactResource("rbac.authorization.k8s.io", "v1", "roles", namespace, name) } func ExactRoleBinding(namespace, name string) ExactResourceID { - return ExactResource("rbac.authorization.k8s.io", "v1", "rolebindings", "", name) + return ExactResource("rbac.authorization.k8s.io", "v1", "rolebindings", namespace, name) } func ExactConfigResource(resource string) ExactResourceID { diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryinputresources/resource.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryinputresources/resource.go index d40811331..67785935a 100644 --- a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryinputresources/resource.go +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryinputresources/resource.go @@ -13,7 +13,6 @@ import ( "sigs.k8s.io/yaml" "github.com/google/go-cmp/cmp" - metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/runtime/schema" "k8s.io/apimachinery/pkg/util/sets" @@ -35,15 +34,43 @@ func (r Resource) ID() string { return fmt.Sprintf("%s/%s/%s/%s", r.ResourceType.Group, r.ResourceType.Resource, namespace, name) } -func LenientResourcesFromDirRecursive(location string) ([]*Resource, error) { - discoveryClient, err := NewDiscoveryClientFromMustGather(location) +func discoverResourcesFromMustGather(mustGatherDir string) (map[schema.GroupVersionKind][]schema.GroupVersionResource, error) { + discoveryClient, err := NewDiscoveryClientFromMustGather(mustGatherDir) if err != nil { - return nil, err + return nil, fmt.Errorf("failed creating discovery client: %w", err) } - _, apiResourceList, _, err := discoveryClient.GroupsAndMaybeResources() + _, gvToAPIResourceList, _, err := discoveryClient.GroupsAndMaybeResources() if err != nil { - return nil, fmt.Errorf("failed to get api resource list: %w", err) + return nil, fmt.Errorf("failed to get api resource list with GroupsAndMaybeResources: %w", err) + } + + gvkToResources := map[schema.GroupVersionKind][]schema.GroupVersionResource{} + for gv, apiResourceList := range gvToAPIResourceList { + for _, apiResource := range apiResourceList.APIResources { + if strings.Contains(apiResource.Name, "/") { + // Skip subresources + continue + } + gvk := schema.GroupVersionKind{ + Group: gv.Group, + Version: gv.Version, + Kind: apiResource.Kind, + } + gvkToResources[gvk] = append(gvkToResources[gvk], schema.GroupVersionResource{ + Group: gv.Group, + Version: gv.Version, + Resource: apiResource.Name, + }) + } + } + return gvkToResources, nil +} + +func LenientResourcesFromDirRecursive(location string) ([]*Resource, error) { + gvkToResources, err := discoverResourcesFromMustGather(location) + if err != nil { + return nil, fmt.Errorf("failed to discover resources from must-gather: %w", err) } currResourceList := []*Resource{} @@ -59,7 +86,7 @@ func LenientResourcesFromDirRecursive(location string) ([]*Resource, error) { if !strings.HasSuffix(currFile.Name(), ".yaml") && !strings.HasSuffix(currFile.Name(), ".json") { return nil } - currResource, err := ResourcesFromFile(apiResourceList, currLocation, location) + currResource, err := ResourcesFromFile(gvkToResources, currLocation, location) if err != nil { return fmt.Errorf("error deserializing %q: %w", currLocation, err) } @@ -74,37 +101,19 @@ func LenientResourcesFromDirRecursive(location string) ([]*Resource, error) { return currResourceList, errors.Join(errs...) } -func findGVR(resources map[schema.GroupVersion]*metav1.APIResourceList, gvk schema.GroupVersionKind) (*schema.GroupVersionResource, error) { - apiResourceList, ok := resources[gvk.GroupVersion()] - if !ok { - return nil, fmt.Errorf("failed to find api resource list for gvk %s", gvk) - } - - var matches []*schema.GroupVersionResource - for _, apiResource := range apiResourceList.APIResources { - if strings.Contains(apiResource.Name, "/") { - // Skip subresources - continue - } - if apiResource.Kind == gvk.Kind { - matches = append(matches, &schema.GroupVersionResource{ - Group: gvk.Group, - Version: gvk.Version, - Resource: apiResource.Name, - }) - } - } - switch len(matches) { +func findGVR(gvkToResources map[schema.GroupVersionKind][]schema.GroupVersionResource, gvk schema.GroupVersionKind) (*schema.GroupVersionResource, error) { + resources := gvkToResources[gvk] + switch len(resources) { case 1: - return matches[0], nil + return &resources[0], nil case 0: - return nil, fmt.Errorf("failed to find resource for gvk %s", gvk) + return nil, fmt.Errorf("no resources found for Group: %q, Version: %q, Kind: %q", gvk.Group, gvk.Version, gvk.Kind) default: - return nil, fmt.Errorf("multiple resources found for gvk %v", matches) + return nil, fmt.Errorf("multiple resources found for Group: %q, Version: %q, Kind: %q", gvk.Group, gvk.Version, gvk.Kind) } } -func ResourcesFromFile(apiResourceList map[schema.GroupVersion]*metav1.APIResourceList, location, fileTrimPrefix string) ([]*Resource, error) { +func ResourcesFromFile(gvkToResources map[schema.GroupVersionKind][]schema.GroupVersionResource, location, fileTrimPrefix string) ([]*Resource, error) { content, err := os.ReadFile(location) if err != nil { return nil, fmt.Errorf("unable to read %q: %w", location, err) @@ -135,7 +144,7 @@ func ResourcesFromFile(apiResourceList map[schema.GroupVersion]*metav1.APIResour // Short-circuit if the file contains a single resource if !resource.Content.IsList() { gvk := retContent.GroupVersionKind() - gvr, err := findGVR(apiResourceList, gvk) + gvr, err := findGVR(gvkToResources, gvk) if err != nil { return nil, fmt.Errorf("failed to find gvr: %w", err) } @@ -151,7 +160,7 @@ func ResourcesFromFile(apiResourceList map[schema.GroupVersion]*metav1.APIResour resources := make([]*Resource, 0, len(list.Items)) for _, item := range list.Items { - gvr, err := findGVR(apiResourceList, item.GroupVersionKind()) + gvr, err := findGVR(gvkToResources, item.GroupVersionKind()) if err != nil { return nil, fmt.Errorf("failed to find gvr: %w", err) } diff --git a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryoutputresources/easy_creation.go b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryoutputresources/easy_creation.go index 62b75f5cf..503700ff7 100644 --- a/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryoutputresources/easy_creation.go +++ b/vendor/github.com/openshift/multi-operator-manager/pkg/library/libraryoutputresources/easy_creation.go @@ -65,11 +65,11 @@ func ExactClusterRoleBinding(name string) ExactResourceID { } func ExactRole(namespace, name string) ExactResourceID { - return ExactResource("rbac.authorization.k8s.io", "v1", "roles", "", name) + return ExactResource("rbac.authorization.k8s.io", "v1", "roles", namespace, name) } func ExactRoleBinding(namespace, name string) ExactResourceID { - return ExactResource("rbac.authorization.k8s.io", "v1", "rolebindings", "", name) + return ExactResource("rbac.authorization.k8s.io", "v1", "rolebindings", namespace, name) } func ExactConfigResource(resource string) ExactResourceID { @@ -79,3 +79,15 @@ func ExactConfigResource(resource string) ExactResourceID { func GeneratedCSR(generateName string) GeneratedResourceID { return GeneratedResource("certificates.k8s.io", "v1", "certificatesigningrequests", "", generateName) } + +func ExactPDB(namespace, name string) ExactResourceID { + return ExactResource("policy", "v1", "poddisruptionbudgets", namespace, name) +} + +func ExactService(namespace, name string) ExactResourceID { + return ExactResource("", "v1", "services", namespace, name) +} + +func ExactOAuthClient(name string) ExactResourceID { + return ExactResource("oauth.openshift.io", "v1", "oauthclients", "", name) +} diff --git a/vendor/modules.txt b/vendor/modules.txt index 7c97b75fa..54753628d 100644 --- a/vendor/modules.txt +++ b/vendor/modules.txt @@ -175,7 +175,7 @@ github.com/modern-go/reflect2 # github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 ## explicit github.com/munnerz/goautoneg -# github.com/openshift/api v0.0.0-20241001152557-e415140e5d5f +# github.com/openshift/api v0.0.0-20241101202457-04eb3fd119d2 ## explicit; go 1.22.0 github.com/openshift/api github.com/openshift/api/annotations @@ -248,7 +248,7 @@ github.com/openshift/api/template github.com/openshift/api/template/v1 github.com/openshift/api/user github.com/openshift/api/user/v1 -# github.com/openshift/build-machinery-go v0.0.0-20241031155326-6ae126a9cb72 +# github.com/openshift/build-machinery-go v0.0.0-20241126220845-0de670012c09 ## explicit; go 1.22.0 github.com/openshift/build-machinery-go github.com/openshift/build-machinery-go/make @@ -315,7 +315,7 @@ github.com/openshift/client-go/user/applyconfigurations/internal github.com/openshift/client-go/user/applyconfigurations/user/v1 github.com/openshift/client-go/user/clientset/versioned/scheme github.com/openshift/client-go/user/clientset/versioned/typed/user/v1 -# github.com/openshift/library-go v0.0.0-20241120135057-fc703a7407c9 +# github.com/openshift/library-go v0.0.0-20241127135410-64d8d9e80808 ## explicit; go 1.22.0 github.com/openshift/library-go/pkg/apiserver/jsonpatch github.com/openshift/library-go/pkg/apps/deployment @@ -387,7 +387,7 @@ github.com/openshift/library-go/pkg/route/routeapihelpers github.com/openshift/library-go/pkg/serviceability github.com/openshift/library-go/test/library github.com/openshift/library-go/test/library/encryption -# github.com/openshift/multi-operator-manager v0.0.0-20241119235446-3c965870ef94 +# github.com/openshift/multi-operator-manager v0.0.0-20241205181422-20aa3906b99d ## explicit; go 1.22.0 github.com/openshift/multi-operator-manager/pkg/flagtypes github.com/openshift/multi-operator-manager/pkg/library/libraryapplyconfiguration From 456a46c01065e2367fb3159b9c242f9df5a636e6 Mon Sep 17 00:00:00 2001 From: David Eads Date: Tue, 26 Nov 2024 11:50:50 -0500 Subject: [PATCH 2/4] MOM fitting --- pkg/cmd/mom/apply_configuration_command.go | 13 ++++--------- pkg/operator/starter.go | 1 - 2 files changed, 4 insertions(+), 10 deletions(-) diff --git a/pkg/cmd/mom/apply_configuration_command.go b/pkg/cmd/mom/apply_configuration_command.go index 19223f7f1..fb2e9fc86 100644 --- a/pkg/cmd/mom/apply_configuration_command.go +++ b/pkg/cmd/mom/apply_configuration_command.go @@ -14,19 +14,14 @@ func NewApplyConfigurationCommand(streams genericiooptions.IOStreams) *cobra.Com return libraryapplyconfiguration.NewApplyConfigurationCommand(RunApplyConfiguration, runOutputResources, streams) } -func RunApplyConfiguration(ctx context.Context, input libraryapplyconfiguration.ApplyConfigurationInput) (libraryapplyconfiguration.AllDesiredMutationsGetter, error) { +func RunApplyConfiguration(ctx context.Context, input libraryapplyconfiguration.ApplyConfigurationInput) (*libraryapplyconfiguration.ApplyConfigurationRunResult, libraryapplyconfiguration.AllDesiredMutationsGetter, error) { authenticationOperatorInput, err := operator.CreateOperatorInputFromMOM(ctx, input) if err != nil { - return nil, fmt.Errorf("unable to configure operator input: %w", err) + return nil, nil, fmt.Errorf("unable to configure operator input: %w", err) } operatorStarter, err := operator.CreateOperatorStarter(ctx, authenticationOperatorInput) if err != nil { - return nil, fmt.Errorf("unable to configure operators: %w", err) + return nil, nil, fmt.Errorf("unable to configure operators: %w", err) } - var operatorRunError error - if err := operatorStarter.RunOnce(ctx); err != nil { - operatorRunError = fmt.Errorf("unable to run operators: %w", err) - } - - return libraryapplyconfiguration.NewApplyConfigurationFromClient(input.MutationTrackingClient.GetMutations()), operatorRunError + return operatorStarter.RunOnce(ctx, input) } diff --git a/pkg/operator/starter.go b/pkg/operator/starter.go index 2967dc83d..8ac92d3a0 100644 --- a/pkg/operator/starter.go +++ b/pkg/operator/starter.go @@ -551,7 +551,6 @@ func prepareOauthAPIServerOperator( ).WithAuditPolicyController( "openshift-oauth-apiserver", "audit", - informerFactories.operatorConfigInformer.Config().V1().APIServers().Lister(), informerFactories.operatorConfigInformer, informerFactories.kubeInformersForNamespaces.InformersFor("openshift-oauth-apiserver"), authOperatorInput.kubeClient, From 9c1aac2a8d8a37006149b1783c3ec2902e1da757 Mon Sep 17 00:00:00 2001 From: David Eads Date: Thu, 5 Dec 2024 12:30:29 -0500 Subject: [PATCH 3/4] add resource output --- pkg/cmd/mom/output_resources_command.go | 48 +++++++++++-------------- 1 file changed, 20 insertions(+), 28 deletions(-) diff --git a/pkg/cmd/mom/output_resources_command.go b/pkg/cmd/mom/output_resources_command.go index 1772466c8..099aed7db 100644 --- a/pkg/cmd/mom/output_resources_command.go +++ b/pkg/cmd/mom/output_resources_command.go @@ -22,17 +22,22 @@ func runOutputResources(ctx context.Context) (*libraryoutputresources.OutputReso ManagementResources: libraryoutputresources.ResourceList{ ExactResources: []libraryoutputresources.ExactResourceID{ libraryoutputresources.ExactClusterOperator("authentication"), + libraryoutputresources.ExactLowLevelOperator("authentications"), + libraryoutputresources.ExactNamespace("openshift-authentication"), + libraryoutputresources.ExactNamespace("openshift-oauth-apiserver"), + libraryoutputresources.ExactConfigMap("openshift-authentication", "audit"), libraryoutputresources.ExactConfigMap("openshift-authentication", "v4-0-config-system-trusted-ca-bundle"), libraryoutputresources.ExactDeployment("openshift-authentication", "oauth-openshift"), - libraryoutputresources.ExactLowLevelOperator("authentications"), - exactNamespace("openshift-authentication"), - exactRole("openshift-config-managed", "system:openshift:oauth-servercert-trust"), - exactRoleBinding("openshift-config-managed", "system:openshift:oauth-servercert-trust"), libraryoutputresources.ExactSecret("openshift-authentication", "v4-0-config-system-session"), libraryoutputresources.ExactSecret("openshift-authentication", "v4-0-config-system-ocp-branding-template"), - exactService("openshift-authentication", "oauth-openshift"), + libraryoutputresources.ExactService("openshift-authentication", "oauth-openshift"), libraryoutputresources.ExactServiceAccount("openshift-authentication", "oauth-openshift"), + + libraryoutputresources.ExactRole("openshift-config-managed", "system:openshift:oauth-servercert-trust"), + libraryoutputresources.ExactRoleBinding("openshift-config-managed", "system:openshift:oauth-servercert-trust"), + + libraryoutputresources.ExactPDB("openshift-oauth-apiserver", "oauth-apiserver-pdb"), }, EventingNamespaces: []string{ "openshift-authentication-operator", @@ -41,9 +46,16 @@ func runOutputResources(ctx context.Context) (*libraryoutputresources.OutputReso UserWorkloadResources: libraryoutputresources.ResourceList{ ExactResources: []libraryoutputresources.ExactResourceID{ libraryoutputresources.ExactClusterRoleBinding("system:openshift:openshift-authentication"), - exactOAuthClient("openshift-browser-client"), - exactOAuthClient("openshift-challenging-client"), - exactOAuthClient("openshift-cli-client"), + libraryoutputresources.ExactClusterRoleBinding("system:openshift:oauth-apiserver"), + libraryoutputresources.ExactClusterRoleBinding("system:openshift:useroauthaccesstoken-manager"), + libraryoutputresources.ExactClusterRole("system:openshift:useroauthaccesstoken-manager"), + libraryoutputresources.ExactOAuthClient("openshift-browser-client"), + libraryoutputresources.ExactOAuthClient("openshift-challenging-client"), + libraryoutputresources.ExactOAuthClient("openshift-cli-client"), + + // these are used to access resources in the user workload cluster + libraryoutputresources.ExactServiceAccount("openshift-oauth-apiserver", "oauth-apiserver-sa"), + libraryoutputresources.ExactService("openshift-oauth-apiserver", "api"), }, GeneratedNameResources: []libraryoutputresources.GeneratedResourceID{ libraryoutputresources.GeneratedCSR("system:openshift:openshift-authenticator-"), @@ -51,23 +63,3 @@ func runOutputResources(ctx context.Context) (*libraryoutputresources.OutputReso }, }, nil } - -func exactOAuthClient(name string) libraryoutputresources.ExactResourceID { - return libraryoutputresources.ExactResource("oauth.openshift.io", "v1", "oauthclients", "", name) -} - -func exactNamespace(name string) libraryoutputresources.ExactResourceID { - return libraryoutputresources.ExactNamespace(name) -} - -func exactService(namespace, name string) libraryoutputresources.ExactResourceID { - return libraryoutputresources.ExactResource("", "v1", "services", namespace, name) -} - -func exactRole(namespace, name string) libraryoutputresources.ExactResourceID { - return libraryoutputresources.ExactRole(namespace, name) -} - -func exactRoleBinding(namespace, name string) libraryoutputresources.ExactResourceID { - return libraryoutputresources.ExactRoleBinding(namespace, name) -} From 4bdbff351aa89f5a9711b4f0946650e88ad2fb12 Mon Sep 17 00:00:00 2001 From: David Eads Date: Tue, 26 Nov 2024 11:55:04 -0500 Subject: [PATCH 4/4] update generated test output --- ...dy-cluster.yaml => 0ded-body-cluster.yaml} | 2 - .../0ded-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 0ded-options-cluster.yaml} | 0 .../authentications/0f09-body-cluster.yaml | 12 ++ .../0f09-metadata-cluster.yaml | 9 ++ .../authentications/0f09-options-cluster.yaml | 2 + ...dy-cluster.yaml => 125f-body-cluster.yaml} | 2 - .../125f-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 125f-options-cluster.yaml} | 0 .../authentications/1b61-body-cluster.yaml | 14 +++ .../1b61-metadata-cluster.yaml | 9 ++ .../authentications/1b61-options-cluster.yaml | 2 + ...dy-cluster.yaml => 2887-body-cluster.yaml} | 2 - .../2887-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 2887-options-cluster.yaml} | 0 .../authentications/3fff-body-cluster.yaml | 26 ++++ .../3fff-metadata-cluster.yaml | 9 ++ .../authentications/3fff-options-cluster.yaml | 2 + .../authentications/44e5-body-cluster.yaml | 9 ++ .../44e5-metadata-cluster.yaml | 9 ++ .../authentications/44e5-options-cluster.yaml | 2 + ...dy-cluster.yaml => 4c2c-body-cluster.yaml} | 2 - .../4c2c-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 4c2c-options-cluster.yaml} | 0 .../authentications/4c68-body-cluster.yaml | 9 ++ .../4c68-metadata-cluster.yaml | 9 ++ .../authentications/4c68-options-cluster.yaml | 2 + ...dy-cluster.yaml => 4dff-body-cluster.yaml} | 4 +- .../4dff-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 4dff-options-cluster.yaml} | 0 .../authentications/4ee1-body-cluster.yaml | 9 ++ .../4ee1-metadata-cluster.yaml | 9 ++ .../authentications/4ee1-options-cluster.yaml | 2 + ...dy-cluster.yaml => 5731-body-cluster.yaml} | 2 - .../5731-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 5731-options-cluster.yaml} | 0 ...dy-cluster.yaml => 5bb4-body-cluster.yaml} | 2 - .../5bb4-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 5bb4-options-cluster.yaml} | 0 ...dy-cluster.yaml => 6ad2-body-cluster.yaml} | 2 - .../6ad2-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 6ad2-options-cluster.yaml} | 0 ...dy-cluster.yaml => 6db2-body-cluster.yaml} | 2 - .../6db2-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 6db2-options-cluster.yaml} | 0 .../authentications/7a7d-body-cluster.yaml | 12 ++ .../7a7d-metadata-cluster.yaml | 9 ++ .../authentications/7a7d-options-cluster.yaml | 2 + ...dy-cluster.yaml => 8111-body-cluster.yaml} | 2 - .../8111-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 8111-options-cluster.yaml} | 0 ...dy-cluster.yaml => 8595-body-cluster.yaml} | 2 - .../8595-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 8595-options-cluster.yaml} | 0 ...dy-cluster.yaml => 9b4b-body-cluster.yaml} | 2 - .../9b4b-metadata-cluster.yaml | 9 ++ ...cluster.yaml => 9b4b-options-cluster.yaml} | 0 .../authentications/b899-body-cluster.yaml | 9 ++ .../b899-metadata-cluster.yaml | 9 ++ .../authentications/b899-options-cluster.yaml | 2 + ...dy-cluster.yaml => b8b9-body-cluster.yaml} | 2 - .../b8b9-metadata-cluster.yaml | 9 ++ ...cluster.yaml => b8b9-options-cluster.yaml} | 0 ...dy-cluster.yaml => d306-body-cluster.yaml} | 5 +- .../d306-metadata-cluster.yaml | 9 ++ ...cluster.yaml => d306-options-cluster.yaml} | 0 ...dy-cluster.yaml => d317-body-cluster.yaml} | 2 - .../d317-metadata-cluster.yaml | 9 ++ ...cluster.yaml => d317-options-cluster.yaml} | 0 ...dy-cluster.yaml => d3e4-body-cluster.yaml} | 2 - .../d3e4-metadata-cluster.yaml | 9 ++ ...cluster.yaml => d3e4-options-cluster.yaml} | 0 .../authentications/f1b1-body-cluster.yaml | 11 ++ .../f1b1-metadata-cluster.yaml | 9 ++ .../authentications/f1b1-options-cluster.yaml | 2 + .../ca52-body-authentication.yaml | 8 ++ .../ca52-metadata-authentication.yaml | 8 ++ .../5657-body-openshift-oauth-apiserver.yaml | 15 +++ ...57-metadata-openshift-oauth-apiserver.yaml | 8 ++ ...> 9a55-body-openshift-authentication.yaml} | 1 - ...a55-metadata-openshift-authentication.yaml | 8 ++ ...hentication-operator.1802f6e485250051.yaml | 24 ---- ...hentication-operator.1802f6e485319d7b.yaml | 34 ------ ...n-operator.17fe72c59b829800.cc404894.yaml} | 6 +- ...on-operator.17fe72c59b829800.cc404894.yaml | 9 ++ ...hentication-operator.1802f6e4d892e853.yaml | 21 ---- ...hentication-operator.1802f6e4d8c17be2.yaml | 27 ----- ...n-operator.17fe72c59b829800.327a2f38.yaml} | 6 +- ...on-operator.17fe72c59b829800.327a2f38.yaml | 9 ++ ...n-operator.17fe72c59b829800.87c2a194.yaml} | 6 +- ...on-operator.17fe72c59b829800.87c2a194.yaml | 9 ++ ...n-operator.17fe72c59b829800.da44325f.yaml} | 6 +- ...on-operator.17fe72c59b829800.da44325f.yaml | 9 ++ ...on-operator.17fe72c59b829800.9dfc3b5d.yaml | 22 ++++ ...on-operator.17fe72c59b829800.9dfc3b5d.yaml | 9 ++ ...on-operator.17fe72c59b829800.b2cdb588.yaml | 29 +++++ ...on-operator.17fe72c59b829800.b2cdb588.yaml | 9 ++ ...n-operator.17fe72c59b829800.07abf400.yaml} | 6 +- ...on-operator.17fe72c59b829800.07abf400.yaml | 9 ++ ...on-operator.17fe72c59b829800.adf05e91.yaml | 22 ++++ ...on-operator.17fe72c59b829800.adf05e91.yaml | 9 ++ ...n-operator.17fe72c59b829800.fd7c2a06.yaml} | 6 +- ...on-operator.17fe72c59b829800.fd7c2a06.yaml | 9 ++ ...on-operator.17fe72c59b829800.651f7f3f.yaml | 22 ++++ ...on-operator.17fe72c59b829800.651f7f3f.yaml | 9 ++ ...on-operator.17fe72c59b829800.d64f6f23.yaml | 25 ++++ ...on-operator.17fe72c59b829800.d64f6f23.yaml | 9 ++ ...n-operator.17fe72c59b829800.44a05c38.yaml} | 6 +- ...on-operator.17fe72c59b829800.44a05c38.yaml | 9 ++ ...on-operator.17fe72c59b829800.c605caf3.yaml | 22 ++++ ...on-operator.17fe72c59b829800.c605caf3.yaml | 9 ++ ...on-operator.17fe72c59b829800.ad6de22d.yaml | 31 +++++ ...on-operator.17fe72c59b829800.ad6de22d.yaml | 9 ++ ...n-operator.17fe72c59b829800.b8ffb9fd.yaml} | 6 +- ...on-operator.17fe72c59b829800.b8ffb9fd.yaml | 9 ++ ...on-operator.17fe72c59b829800.c1353886.yaml | 21 ++++ ...on-operator.17fe72c59b829800.c1353886.yaml | 9 ++ ...on-operator.17fe72c59b829800.52f3c122.yaml | 21 ++++ ...on-operator.17fe72c59b829800.52f3c122.yaml | 9 ++ ...n-operator.17fe72c59b829800.a18021d9.yaml} | 6 +- ...on-operator.17fe72c59b829800.a18021d9.yaml | 9 ++ ...n-operator.17fe72c59b829800.a1759283.yaml} | 6 +- ...on-operator.17fe72c59b829800.a1759283.yaml | 9 ++ ...n-operator.17fe72c59b829800.8953695d.yaml} | 6 +- ...on-operator.17fe72c59b829800.8953695d.yaml | 9 ++ ...on-operator.17fe72c59b829800.9b8e044a.yaml | 21 ++++ ...on-operator.17fe72c59b829800.9b8e044a.yaml | 9 ++ ...n-operator.17fe72c59b829800.e6f3afa2.yaml} | 6 +- ...on-operator.17fe72c59b829800.e6f3afa2.yaml | 9 ++ ...n-operator.17fe72c59b829800.c1403ea8.yaml} | 6 +- ...on-operator.17fe72c59b829800.c1403ea8.yaml | 9 ++ ...n-operator.17fe72c59b829800.49fb0e36.yaml} | 6 +- ...on-operator.17fe72c59b829800.49fb0e36.yaml | 9 ++ ...n-operator.17fe72c59b829800.ce8a3f4a.yaml} | 6 +- ...on-operator.17fe72c59b829800.ce8a3f4a.yaml | 9 ++ ...n-operator.17fe72c59b829800.6c145ec7.yaml} | 6 +- ...on-operator.17fe72c59b829800.6c145ec7.yaml | 9 ++ ...n-operator.17fe72c59b829800.a8ecfbce.yaml} | 6 +- ...on-operator.17fe72c59b829800.a8ecfbce.yaml | 9 ++ ...on-operator.17fe72c59b829800.103eb7f4.yaml | 22 ++++ ...on-operator.17fe72c59b829800.103eb7f4.yaml | 9 ++ ...v4-0-config-system-trusted-ca-bundle.yaml} | 2 - ...-v4-0-config-system-trusted-ca-bundle.yaml | 9 ++ ...7-body-audit.yaml => 84c5-body-audit.yaml} | 2 - .../core/configmaps/84c5-metadata-audit.yaml | 9 ++ ...c23d-body-v4-0-config-system-session.yaml} | 4 +- ...d-metadata-v4-0-config-system-session.yaml | 9 ++ ...-config-system-ocp-branding-template.yaml} | 2 - ...0-config-system-ocp-branding-template.yaml | 9 ++ ...ft.yaml => e784-body-oauth-openshift.yaml} | 2 - .../e784-metadata-oauth-openshift.yaml | 9 ++ ...ft.yaml => 421e-body-oauth-openshift.yaml} | 1 - .../421e-metadata-oauth-openshift.yaml | 9 ++ ...enshift-COLON-oauth-servercert-trust.yaml} | 2 - ...penshift-COLON-oauth-servercert-trust.yaml | 9 ++ ...enshift-COLON-oauth-servercert-trust.yaml} | 2 - ...penshift-COLON-oauth-servercert-trust.yaml | 9 ++ .../5a7c-body-oauth-apiserver-pdb.yaml | 18 +++ .../5a7c-metadata-oauth-apiserver-pdb.yaml | 9 ++ ...dy-cluster.yaml => 11e6-body-cluster.yaml} | 1 - .../11e6-metadata-cluster.yaml | 8 ++ ...dy-cluster.yaml => e1f4-body-cluster.yaml} | 2 +- .../e1f4-metadata-cluster.yaml | 8 ++ .../0598-body-authentication.yaml | 71 +++++++++++ .../0598-metadata-authentication.yaml | 8 ++ ...shift-COLON-openshift-authenticator-.yaml} | 4 +- ...nshift-COLON-openshift-authenticator-.yaml | 8 ++ ...COLON-openshift-COLON-oauth-apiserver.yaml | 13 ++ ...COLON-openshift-COLON-oauth-apiserver.yaml | 8 ++ ...shift-COLON-openshift-authentication.yaml} | 2 - ...nshift-COLON-openshift-authentication.yaml | 8 ++ ...ft-COLON-useroauthaccesstoken-manager.yaml | 13 ++ ...ft-COLON-useroauthaccesstoken-manager.yaml | 8 ++ ...ft-COLON-useroauthaccesstoken-manager.yaml | 17 +++ ...ft-COLON-useroauthaccesstoken-manager.yaml | 8 ++ .../4ddd-body-oauth-apiserver-sa.yaml | 6 + .../4ddd-metadata-oauth-apiserver-sa.yaml | 9 ++ .../core/services/dfd1-body-api.yaml | 22 ++++ .../core/services/dfd1-metadata-api.yaml | 9 ++ .../expected-output/controller-results.yaml | 112 ++++++++++++++++++ 180 files changed, 1402 insertions(+), 216 deletions(-) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{011-body-cluster.yaml => 0ded-body-cluster.yaml} (83%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{011-options-cluster.yaml => 0ded-options-cluster.yaml} (100%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-options-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{002-body-cluster.yaml => 125f-body-cluster.yaml} (71%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{002-options-cluster.yaml => 125f-options-cluster.yaml} (100%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-options-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{001-body-cluster.yaml => 2887-body-cluster.yaml} (82%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{001-options-cluster.yaml => 2887-options-cluster.yaml} (100%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-options-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-options-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{040-body-cluster.yaml => 4c2c-body-cluster.yaml} (80%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{040-options-cluster.yaml => 4c2c-options-cluster.yaml} (100%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-options-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{047-body-cluster.yaml => 4dff-body-cluster.yaml} (82%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{047-options-cluster.yaml => 4dff-options-cluster.yaml} (100%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-options-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{037-body-cluster.yaml => 5731-body-cluster.yaml} (75%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{037-options-cluster.yaml => 5731-options-cluster.yaml} (100%) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{038-body-cluster.yaml => 5bb4-body-cluster.yaml} (74%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{038-options-cluster.yaml => 5bb4-options-cluster.yaml} (100%) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{010-body-cluster.yaml => 6ad2-body-cluster.yaml} (66%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{010-options-cluster.yaml => 6ad2-options-cluster.yaml} (100%) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{009-body-cluster.yaml => 6db2-body-cluster.yaml} (90%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{009-options-cluster.yaml => 6db2-options-cluster.yaml} (100%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-options-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{036-body-cluster.yaml => 8111-body-cluster.yaml} (78%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{036-options-cluster.yaml => 8111-options-cluster.yaml} (100%) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{014-body-cluster.yaml => 8595-body-cluster.yaml} (90%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{014-options-cluster.yaml => 8595-options-cluster.yaml} (100%) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{035-body-cluster.yaml => 9b4b-body-cluster.yaml} (72%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{035-options-cluster.yaml => 9b4b-options-cluster.yaml} (100%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-options-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{039-body-cluster.yaml => b8b9-body-cluster.yaml} (82%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{039-options-cluster.yaml => b8b9-options-cluster.yaml} (100%) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{008-body-cluster.yaml => d306-body-cluster.yaml} (73%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{008-options-cluster.yaml => d306-options-cluster.yaml} (100%) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{015-body-cluster.yaml => d317-body-cluster.yaml} (78%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{015-options-cluster.yaml => d317-options-cluster.yaml} (100%) rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{016-body-cluster.yaml => d3e4-body-cluster.yaml} (82%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/{016-options-cluster.yaml => d3e4-options-cluster.yaml} (100%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-body-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-options-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/config.openshift.io/clusteroperators/ca52-body-authentication.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/config.openshift.io/clusteroperators/ca52-metadata-authentication.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/5657-body-openshift-oauth-apiserver.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/5657-metadata-openshift-oauth-apiserver.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/{019-body-openshift-authentication.yaml => 9a55-body-openshift-authentication.yaml} (82%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/9a55-metadata-openshift-authentication.yaml delete mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/005-body-authentication-operator.1802f6e485250051.yaml delete mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006-body-authentication-operator.1802f6e485319d7b.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{050-body-authentication-operator.1802f6e4f057efb3.yaml => 006e-body-authentication-operator.17fe72c59b829800.cc404894.yaml} (77%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006e-metadata-authentication-operator.17fe72c59b829800.cc404894.yaml delete mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/042-body-authentication-operator.1802f6e4d892e853.yaml delete mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/045-body-authentication-operator.1802f6e4d8c17be2.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{032-body-authentication-operator.1802f6e48ff304ac.yaml => 1149-body-authentication-operator.17fe72c59b829800.327a2f38.yaml} (80%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1149-metadata-authentication-operator.17fe72c59b829800.327a2f38.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{041-body-authentication-operator.1802f6e4d8827d4e.yaml => 13d7-body-authentication-operator.17fe72c59b829800.87c2a194.yaml} (78%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13d7-metadata-authentication-operator.17fe72c59b829800.87c2a194.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{048-body-authentication-operator.1802f6e4f04c905b.yaml => 13fd-body-authentication-operator.17fe72c59b829800.da44325f.yaml} (81%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13fd-metadata-authentication-operator.17fe72c59b829800.da44325f.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1f51-body-authentication-operator.17fe72c59b829800.9dfc3b5d.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1f51-metadata-authentication-operator.17fe72c59b829800.9dfc3b5d.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/2e46-body-authentication-operator.17fe72c59b829800.b2cdb588.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/2e46-metadata-authentication-operator.17fe72c59b829800.b2cdb588.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{030-body-authentication-operator.1802f6e48fdd4ac1.yaml => 30b9-body-authentication-operator.17fe72c59b829800.07abf400.yaml} (78%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/30b9-metadata-authentication-operator.17fe72c59b829800.07abf400.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/32eb-body-authentication-operator.17fe72c59b829800.adf05e91.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/32eb-metadata-authentication-operator.17fe72c59b829800.adf05e91.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{026-body-authentication-operator.1802f6e48e09fa9a.yaml => 357b-body-authentication-operator.17fe72c59b829800.fd7c2a06.yaml} (79%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/357b-metadata-authentication-operator.17fe72c59b829800.fd7c2a06.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/37d9-body-authentication-operator.17fe72c59b829800.651f7f3f.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/37d9-metadata-authentication-operator.17fe72c59b829800.651f7f3f.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3c60-body-authentication-operator.17fe72c59b829800.d64f6f23.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3c60-metadata-authentication-operator.17fe72c59b829800.d64f6f23.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{004-body-authentication-operator.1802f6e4851e3ce9.yaml => 3ca6-body-authentication-operator.17fe72c59b829800.44a05c38.yaml} (77%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3ca6-metadata-authentication-operator.17fe72c59b829800.44a05c38.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/49ea-body-authentication-operator.17fe72c59b829800.c605caf3.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/49ea-metadata-authentication-operator.17fe72c59b829800.c605caf3.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5169-body-authentication-operator.17fe72c59b829800.ad6de22d.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5169-metadata-authentication-operator.17fe72c59b829800.ad6de22d.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{044-body-authentication-operator.1802f6e4d8b05b26.yaml => 5a6e-body-authentication-operator.17fe72c59b829800.b8ffb9fd.yaml} (78%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5a6e-metadata-authentication-operator.17fe72c59b829800.b8ffb9fd.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6303-body-authentication-operator.17fe72c59b829800.c1353886.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6303-metadata-authentication-operator.17fe72c59b829800.c1353886.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6413-body-authentication-operator.17fe72c59b829800.52f3c122.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6413-metadata-authentication-operator.17fe72c59b829800.52f3c122.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{024-body-authentication-operator.1802f6e485e9875b.yaml => 72b5-body-authentication-operator.17fe72c59b829800.a18021d9.yaml} (79%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/72b5-metadata-authentication-operator.17fe72c59b829800.a18021d9.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{013-body-authentication-operator.1802f6e48582e420.yaml => 9650-body-authentication-operator.17fe72c59b829800.a1759283.yaml} (79%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/9650-metadata-authentication-operator.17fe72c59b829800.a1759283.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{034-body-authentication-operator.1802f6e49003180c.yaml => a103-body-authentication-operator.17fe72c59b829800.8953695d.yaml} (80%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/a103-metadata-authentication-operator.17fe72c59b829800.8953695d.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/adcf-body-authentication-operator.17fe72c59b829800.9b8e044a.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/adcf-metadata-authentication-operator.17fe72c59b829800.9b8e044a.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{028-body-authentication-operator.1802f6e48fc5bf22.yaml => ba68-body-authentication-operator.17fe72c59b829800.e6f3afa2.yaml} (79%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/ba68-metadata-authentication-operator.17fe72c59b829800.e6f3afa2.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{022-body-authentication-operator.1802f6e485dc1cda.yaml => bdd9-body-authentication-operator.17fe72c59b829800.c1403ea8.yaml} (80%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bdd9-metadata-authentication-operator.17fe72c59b829800.c1403ea8.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{043-body-authentication-operator.1802f6e4d8a0b2ab.yaml => bf8a-body-authentication-operator.17fe72c59b829800.49fb0e36.yaml} (85%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bf8a-metadata-authentication-operator.17fe72c59b829800.49fb0e36.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{018-body-authentication-operator.1802f6e485b56e6d.yaml => e0b5-body-authentication-operator.17fe72c59b829800.ce8a3f4a.yaml} (78%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/e0b5-metadata-authentication-operator.17fe72c59b829800.ce8a3f4a.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{020-body-authentication-operator.1802f6e485c99334.yaml => eb3c-body-authentication-operator.17fe72c59b829800.6c145ec7.yaml} (78%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/eb3c-metadata-authentication-operator.17fe72c59b829800.6c145ec7.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/{003-body-authentication-operator.1802f6e48510cb24.yaml => f16c-body-authentication-operator.17fe72c59b829800.a8ecfbce.yaml} (82%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f16c-metadata-authentication-operator.17fe72c59b829800.a8ecfbce.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f760-body-authentication-operator.17fe72c59b829800.103eb7f4.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f760-metadata-authentication-operator.17fe72c59b829800.103eb7f4.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/{023-body-v4-0-config-system-trusted-ca-bundle.yaml => 7023-body-v4-0-config-system-trusted-ca-bundle.yaml} (67%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/7023-metadata-v4-0-config-system-trusted-ca-bundle.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/{017-body-audit.yaml => 84c5-body-audit.yaml} (76%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/84c5-metadata-audit.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/{012-body-v4-0-config-system-session.yaml => c23d-body-v4-0-config-system-session.yaml} (52%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/c23d-metadata-v4-0-config-system-session.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/{025-body-v4-0-config-system-ocp-branding-template.yaml => dc0d-body-v4-0-config-system-ocp-branding-template.yaml} (99%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/dc0d-metadata-v4-0-config-system-ocp-branding-template.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/{027-body-oauth-openshift.yaml => e784-body-oauth-openshift.yaml} (62%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/e784-metadata-oauth-openshift.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/{029-body-oauth-openshift.yaml => 421e-body-oauth-openshift.yaml} (86%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/421e-metadata-oauth-openshift.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/{033-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml => e0e8-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml} (78%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/e0e8-metadata-system-COLON-openshift-COLON-oauth-servercert-trust.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/{031-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml => 8c64-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml} (74%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/8c64-metadata-system-COLON-openshift-COLON-oauth-servercert-trust.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-oauth-apiserver/policy/poddisruptionbudgets/5a7c-body-oauth-apiserver-pdb.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-oauth-apiserver/policy/poddisruptionbudgets/5a7c-metadata-oauth-apiserver-pdb.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/{046-body-cluster.yaml => 11e6-body-cluster.yaml} (92%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/11e6-metadata-cluster.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/{007-body-cluster.yaml => e1f4-body-cluster.yaml} (94%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/e1f4-metadata-cluster.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/UpdateStatus/cluster-scoped-resources/config.openshift.io/clusteroperators/0598-body-authentication.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/UpdateStatus/cluster-scoped-resources/config.openshift.io/clusteroperators/0598-metadata-authentication.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/{049-body-system-COLON-openshift-COLON-openshift-authenticator-.yaml => c5ab-body-system-COLON-openshift-COLON-openshift-authenticator-.yaml} (52%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/c5ab-metadata-system-COLON-openshift-COLON-openshift-authenticator-.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/19fc-body-system-COLON-openshift-COLON-oauth-apiserver.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/19fc-metadata-system-COLON-openshift-COLON-oauth-apiserver.yaml rename test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/{021-body-system-COLON-openshift-COLON-openshift-authentication.yaml => 65b2-body-system-COLON-openshift-COLON-openshift-authentication.yaml} (75%) create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/65b2-metadata-system-COLON-openshift-COLON-openshift-authentication.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/fe36-body-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/fe36-metadata-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/13cc-body-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/13cc-metadata-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/serviceaccounts/4ddd-body-oauth-apiserver-sa.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/serviceaccounts/4ddd-metadata-oauth-apiserver-sa.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/services/dfd1-body-api.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/services/dfd1-metadata-api.yaml create mode 100644 test-data/apply-configuration/overall/minimal-cluster/expected-output/controller-results.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/011-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-body-cluster.yaml similarity index 83% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/011-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-body-cluster.yaml index 5e8699c79..fe5a85cdf 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/011-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-metadataController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-metadata-cluster.yaml new file mode 100644 index 000000000..f245529b1 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-metadataController +fieldManager: openshift-authentication-Metadata +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/011-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/011-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0ded-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-body-cluster.yaml new file mode 100644 index 000000000..404decce1 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-body-cluster.yaml @@ -0,0 +1,12 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + message: configmap "audit" not found + reason: ContentCreationError + status: "True" + type: RevisionControllerDegraded + latestAvailableRevision: 0 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-metadata-cluster.yaml new file mode 100644 index 000000000..45837a192 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: RevisionController +fieldManager: oauth-apiserver-RevisionController +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-options-cluster.yaml new file mode 100644 index 000000000..fe9ba5df7 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/0f09-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: oauth-apiserver-RevisionController +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/002-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-body-cluster.yaml similarity index 71% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/002-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-body-cluster.yaml index 2988f562e..9ea079fd9 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/002-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-configOverridesController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-metadata-cluster.yaml new file mode 100644 index 000000000..5759f2258 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-configOverridesController +fieldManager: openshift-authentication-UnsupportedConfigOverrides +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/002-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/002-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/125f-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-body-cluster.yaml new file mode 100644 index 000000000..90a21bc34 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-body-cluster.yaml @@ -0,0 +1,14 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + message: endpoints "api" not found + reason: ErrorCheckingPrecondition + status: "False" + type: APIServicesAvailable + - lastTransitionTime: "2024-10-14T22:38:20Z" + status: "False" + type: APIServicesDegraded diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-metadata-cluster.yaml new file mode 100644 index 000000000..4e9268ebe --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: openshift-apiserver-APIService +fieldManager: openshift-apiserver-APIService +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-options-cluster.yaml new file mode 100644 index 000000000..e64635222 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/1b61-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: openshift-apiserver-APIService +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/001-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-body-cluster.yaml similarity index 82% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/001-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-body-cluster.yaml index 5af7cf8d0..c1706f202 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/001-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-resourceSyncer name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-metadata-cluster.yaml new file mode 100644 index 000000000..4f0781db0 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-resourceSyncer +fieldManager: oauth-server-ResourceSync +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/001-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/001-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/2887-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-body-cluster.yaml new file mode 100644 index 000000000..09e4e3f0f --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-body-cluster.yaml @@ -0,0 +1,26 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + reason: PreconditionNotFulfilled + status: "False" + type: APIServerDeploymentAvailable + - lastTransitionTime: "2024-10-14T22:38:20Z" + message: | + waiting for .status.latestAvailableRevision to be available + reason: PreconditionNotFulfilled + status: "True" + type: APIServerDeploymentDegraded + - lastTransitionTime: "2024-10-14T22:38:20Z" + reason: PreconditionNotFulfilled + status: "False" + type: APIServerDeploymentProgressing + - lastTransitionTime: "2024-10-14T22:38:20Z" + message: | + waiting for .status.latestAvailableRevision to be available + reason: PreconditionNotFulfilled + status: "True" + type: APIServerWorkloadDegraded diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-metadata-cluster.yaml new file mode 100644 index 000000000..4657b0e8c --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: OAuthAPIServerController-WorkloadWorkloadController +fieldManager: OAuthAPIServerController-Workload +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-options-cluster.yaml new file mode 100644 index 000000000..46e6a0d53 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/3fff-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: OAuthAPIServerController-Workload +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-body-cluster.yaml new file mode 100644 index 000000000..b7f42202f --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-body-cluster.yaml @@ -0,0 +1,9 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + status: "False" + type: EncryptionKeyControllerDegraded diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-metadata-cluster.yaml new file mode 100644 index 000000000..b15e52e51 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: openshift-oauth-apiserver-EncryptionKey +fieldManager: openshift-oauth-apiserver-EncryptionKey +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-options-cluster.yaml new file mode 100644 index 000000000..8d8f104be --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/44e5-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: openshift-oauth-apiserver-EncryptionKey +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/040-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-body-cluster.yaml similarity index 80% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/040-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-body-cluster.yaml index 4aa5f2abc..780816da7 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/040-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-ingressStateController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-metadata-cluster.yaml new file mode 100644 index 000000000..94189ac03 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-ingressStateController +fieldManager: openshift-authentication-IngressState +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/040-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/040-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c2c-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-body-cluster.yaml new file mode 100644 index 000000000..2492194d7 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-body-cluster.yaml @@ -0,0 +1,9 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + status: "False" + type: Encrypted diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-metadata-cluster.yaml new file mode 100644 index 000000000..b7e0de3f4 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: openshift-oauth-apiserver-EncryptionCondition +fieldManager: openshift-oauth-apiserver-EncryptionCondition +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-options-cluster.yaml new file mode 100644 index 000000000..1aa22f033 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4c68-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: openshift-oauth-apiserver-EncryptionCondition +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/047-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-body-cluster.yaml similarity index 82% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/047-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-body-cluster.yaml index 9e38f5c45..a26457d88 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/047-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-body-cluster.yaml @@ -1,16 +1,14 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-other-configObserver name: cluster status: conditions: - lastTransitionTime: "2024-10-14T22:38:20Z" message: |- - oauth.config.openshift.io "cluster" not found endpoints/host-etcd-2 in the openshift-etcd namespace: not found configmap openshift-etcd/etcd-endpoints not found, and fallback observer failed + oauth.config.openshift.io "cluster" not found reason: Error status: "True" type: OAuthAPIServerConfigObservationDegraded diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-metadata-cluster.yaml new file mode 100644 index 000000000..ab6ad9aae --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-other-configObserver +fieldManager: oauth-apiserver-ConfigObserver +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/047-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/047-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4dff-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-body-cluster.yaml new file mode 100644 index 000000000..8ead3aa58 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-body-cluster.yaml @@ -0,0 +1,9 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + status: "False" + type: EncryptionStateControllerDegraded diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-metadata-cluster.yaml new file mode 100644 index 000000000..daff82d92 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: openshift-oauth-apiserver-EncryptionState +fieldManager: openshift-oauth-apiserver-EncryptionState +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-options-cluster.yaml new file mode 100644 index 000000000..8b605dfc0 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/4ee1-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: openshift-oauth-apiserver-EncryptionState +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/037-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-body-cluster.yaml similarity index 75% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/037-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-body-cluster.yaml index 7c7eb79a0..f3ae4a270 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/037-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-authServiceCheckController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-metadata-cluster.yaml new file mode 100644 index 000000000..7b6579d25 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-authServiceCheckController +fieldManager: OAuthServerService-EndpointAccessible +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/037-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/037-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5731-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/038-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-body-cluster.yaml similarity index 74% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/038-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-body-cluster.yaml index 859a679c4..250c22bd5 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/038-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-authServiceEndpointCheckController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-metadata-cluster.yaml new file mode 100644 index 000000000..cf7da3641 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-authServiceEndpointCheckController +fieldManager: OAuthServerServiceEndpoints-EndpointAccessible +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/038-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/038-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/5bb4-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/010-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-body-cluster.yaml similarity index 66% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/010-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-body-cluster.yaml index 1ca419766..7b8aaf8f4 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/010-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-managementStateController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-metadata-cluster.yaml new file mode 100644 index 000000000..e3438f218 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-managementStateController +fieldManager: authentication-ManagementState +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/010-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/010-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6ad2-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/009-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-body-cluster.yaml similarity index 90% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/009-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-body-cluster.yaml index a605d8357..0d9618308 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/009-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-deploymentController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-metadata-cluster.yaml new file mode 100644 index 000000000..4165efbf8 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-deploymentController +fieldManager: OAuthServer-Workload +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/009-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/009-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/6db2-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-body-cluster.yaml new file mode 100644 index 000000000..35804826c --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-body-cluster.yaml @@ -0,0 +1,12 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + status: "False" + type: EncryptionMigrationControllerDegraded + - lastTransitionTime: "2024-10-14T22:38:20Z" + status: "False" + type: EncryptionMigrationControllerProgressing diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-metadata-cluster.yaml new file mode 100644 index 000000000..5b6226837 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: openshift-oauth-apiserver-EncryptionMigration +fieldManager: openshift-oauth-apiserver-EncryptionMigration +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-options-cluster.yaml new file mode 100644 index 000000000..9a1ff03cf --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/7a7d-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: openshift-oauth-apiserver-EncryptionMigration +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/036-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-body-cluster.yaml similarity index 78% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/036-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-body-cluster.yaml index 99559dfb1..6dd531c54 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/036-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-authRouteCheckController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-metadata-cluster.yaml new file mode 100644 index 000000000..121d3bdcc --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-authRouteCheckController +fieldManager: OAuthServerRoute-EndpointAccessible +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/036-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/036-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8111-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/014-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-body-cluster.yaml similarity index 90% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/014-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-body-cluster.yaml index c118e46d5..7007df476 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/014-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-payloadConfigController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-metadata-cluster.yaml new file mode 100644 index 000000000..034ec5d85 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-payloadConfigController +fieldManager: openshift-authentication-PayloadConfig +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/014-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/014-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/8595-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/035-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-body-cluster.yaml similarity index 72% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/035-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-body-cluster.yaml index ad3834c6b..3fd46f67c 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/035-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-metadata-cluster.yaml new file mode 100644 index 000000000..e05ea4956 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-staticResourceController +fieldManager: OpenshiftAuthenticationStaticResources-StaticResources +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/035-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/035-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/9b4b-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-body-cluster.yaml new file mode 100644 index 000000000..4dbe588c9 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-body-cluster.yaml @@ -0,0 +1,9 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + status: "False" + type: EncryptionPruneControllerDegraded diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-metadata-cluster.yaml new file mode 100644 index 000000000..47bebf892 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: openshift-oauth-apiserver-EncryptionPrune +fieldManager: openshift-oauth-apiserver-EncryptionPrune +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-options-cluster.yaml new file mode 100644 index 000000000..c75b805c1 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b899-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: openshift-oauth-apiserver-EncryptionPrune +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/039-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-body-cluster.yaml similarity index 82% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/039-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-body-cluster.yaml index 81de1d312..a66b7a798 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/039-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-workersAvailableController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-metadata-cluster.yaml new file mode 100644 index 000000000..c03006a88 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-workersAvailableController +fieldManager: openshift-authentication-IngressNodesAvailable +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/039-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/039-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/b8b9-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/008-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-body-cluster.yaml similarity index 73% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/008-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-body-cluster.yaml index 5b63ecd80..6e05df357 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/008-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-body-cluster.yaml @@ -1,17 +1,14 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-configObserver name: cluster status: conditions: - lastTransitionTime: "2024-10-14T22:38:20Z" message: |- - infrastructure.config.openshift.io "cluster" not found console.config.openshift.io "cluster" not found - secret "v4-0-config-system-router-certs" not found oauth.config.openshift.io "cluster" not found + secret "v4-0-config-system-router-certs" not found reason: Error status: "True" type: OAuthServerConfigObservationDegraded diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-metadata-cluster.yaml new file mode 100644 index 000000000..31ebd570c --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-configObserver +fieldManager: oauth-server-ConfigObserver +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/008-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/008-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d306-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/015-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-body-cluster.yaml similarity index 78% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/015-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-body-cluster.yaml index c86708164..f007fe196 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/015-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-routerCertsController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-metadata-cluster.yaml new file mode 100644 index 000000000..4e4135ddf --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-routerCertsController +fieldManager: openshift-authentication-RouterCertsDomainValidation +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/015-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/015-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d317-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/016-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-body-cluster.yaml similarity index 82% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/016-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-body-cluster.yaml index a514119b6..3fbc5e22e 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/016-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-body-cluster.yaml @@ -1,8 +1,6 @@ apiVersion: operator.openshift.io/v1 kind: Authentication metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-serviceCAController name: cluster status: conditions: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-metadata-cluster.yaml new file mode 100644 index 000000000..f20cf367e --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: TODO-serviceCAController +fieldManager: openshift-authentication-ServiceCA +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/016-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-options-cluster.yaml similarity index 100% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/016-options-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/d3e4-options-cluster.yaml diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-body-cluster.yaml new file mode 100644 index 000000000..7d5ed35cf --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-body-cluster.yaml @@ -0,0 +1,11 @@ +apiVersion: operator.openshift.io/v1 +kind: Authentication +metadata: + name: cluster +status: + conditions: + - lastTransitionTime: "2024-10-14T22:38:20Z" + message: "" + reason: AsExpected + status: "False" + type: APIServerStaticResourcesDegraded diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-metadata-cluster.yaml new file mode 100644 index 000000000..972fb8b48 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-metadata-cluster.yaml @@ -0,0 +1,9 @@ +action: ApplyStatus +controllerInstanceName: APIServerStaticResources-StaticResources +fieldManager: APIServerStaticResources-StaticResources +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-options-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-options-cluster.yaml new file mode 100644 index 000000000..fd646ae3f --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/ApplyStatus/cluster-scoped-resources/operator.openshift.io/authentications/f1b1-options-cluster.yaml @@ -0,0 +1,2 @@ +fieldManager: APIServerStaticResources-StaticResources +force: true diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/config.openshift.io/clusteroperators/ca52-body-authentication.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/config.openshift.io/clusteroperators/ca52-body-authentication.yaml new file mode 100644 index 000000000..519b15c4a --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/config.openshift.io/clusteroperators/ca52-body-authentication.yaml @@ -0,0 +1,8 @@ +apiVersion: config.openshift.io/v1 +kind: ClusterOperator +metadata: + creationTimestamp: null + name: authentication +spec: {} +status: + extension: null diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/config.openshift.io/clusteroperators/ca52-metadata-authentication.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/config.openshift.io/clusteroperators/ca52-metadata-authentication.yaml new file mode 100644 index 000000000..88f7f015b --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/config.openshift.io/clusteroperators/ca52-metadata-authentication.yaml @@ -0,0 +1,8 @@ +action: Create +controllerInstanceName: authentication +generateName: "" +mame: authentication +resourceType: + Group: config.openshift.io + Resource: clusteroperators + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/5657-body-openshift-oauth-apiserver.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/5657-body-openshift-oauth-apiserver.yaml new file mode 100644 index 000000000..a1b01beca --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/5657-body-openshift-oauth-apiserver.yaml @@ -0,0 +1,15 @@ +apiVersion: v1 +kind: Namespace +metadata: + annotations: + openshift.io/node-selector: "" + workload.openshift.io/allowed: management + creationTimestamp: null + labels: + openshift.io/cluster-monitoring: "true" + pod-security.kubernetes.io/audit: privileged + pod-security.kubernetes.io/enforce: privileged + pod-security.kubernetes.io/warn: privileged + name: openshift-oauth-apiserver +spec: {} +status: {} diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/5657-metadata-openshift-oauth-apiserver.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/5657-metadata-openshift-oauth-apiserver.yaml new file mode 100644 index 000000000..35c8cc35f --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/5657-metadata-openshift-oauth-apiserver.yaml @@ -0,0 +1,8 @@ +action: Create +controllerInstanceName: APIServerStaticResources-StaticResources +generateName: "" +mame: openshift-oauth-apiserver +resourceType: + Group: "" + Resource: namespaces + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/019-body-openshift-authentication.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/9a55-body-openshift-authentication.yaml similarity index 82% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/019-body-openshift-authentication.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/9a55-body-openshift-authentication.yaml index 8135c43db..2249d9dec 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/019-body-openshift-authentication.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/9a55-body-openshift-authentication.yaml @@ -3,7 +3,6 @@ kind: Namespace metadata: annotations: openshift.io/node-selector: "" - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController workload.openshift.io/allowed: management creationTimestamp: null labels: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/9a55-metadata-openshift-authentication.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/9a55-metadata-openshift-authentication.yaml new file mode 100644 index 000000000..98df58651 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/cluster-scoped-resources/core/namespaces/9a55-metadata-openshift-authentication.yaml @@ -0,0 +1,8 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: openshift-authentication +resourceType: + Group: "" + Resource: namespaces + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/005-body-authentication-operator.1802f6e485250051.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/005-body-authentication-operator.1802f6e485250051.yaml deleted file mode 100644 index 73ca5bd7e..000000000 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/005-body-authentication-operator.1802f6e485250051.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -count: 1 -eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" -involvedObject: - kind: Deployment - name: authentication-operator - namespace: openshift-authentication-operator -kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" -message: cipherSuites changed to ["TLS_AES_128_GCM_SHA256" "TLS_AES_256_GCM_SHA384" - "TLS_CHACHA20_POLY1305_SHA256" "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256" "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" - "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384" "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384" - "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256" "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"] -metadata: - creationTimestamp: null - name: authentication-operator.1802f6e485250051 - namespace: openshift-authentication-operator -reason: ObserveTLSSecurityProfile -reportingComponent: "" -reportingInstance: "" -source: - component: cluster-authentication-operator-run-once-sync-context -type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006-body-authentication-operator.1802f6e485319d7b.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006-body-authentication-operator.1802f6e485319d7b.yaml deleted file mode 100644 index f7ac39350..000000000 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006-body-authentication-operator.1802f6e485319d7b.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: v1 -count: 1 -eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" -involvedObject: - kind: Deployment - name: authentication-operator - namespace: openshift-authentication-operator -kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" -message: 'Writing updated section ("oauthServer") of observed config: " map[string]any(\n- - \tnil,\n+ \t{\n+ \t\t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), - string(\"//localhost(:|$)\")},\n+ \t\t\"oauthConfig\": map[string]any{\n+ \t\t\t\"tokenConfig\": - map[string]any{\n+ \t\t\t\t\"accessTokenMaxAgeSeconds\": float64(86400),\n+ \t\t\t\t\"authorizeTokenMaxAgeSeconds\": - float64(300),\n+ \t\t\t},\n+ \t\t},\n+ \t\t\"serverArguments\": map[string]any{\n+ - \t\t\t\"audit-log-format\": []any{string(\"json\")},\n+ \t\t\t\"audit-log-maxbackup\": - []any{string(\"10\")},\n+ \t\t\t\"audit-log-maxsize\": []any{string(\"100\")},\n+ - \t\t\t\"audit-log-path\": []any{string(\"/var/log/oauth-server/audit.log\")},\n+ - \t\t\t\"audit-policy-file\": []any{string(\"/var/run/configmaps/audit/audit.\"...)},\n+ - \t\t},\n+ \t\t\"servingInfo\": map[string]any{\n+ \t\t\t\"cipherSuites\": []any{\n+ - \t\t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ - \t\t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\"...), - ...,\n+ \t\t\t},\n+ \t\t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t},\n+ - \t},\n )\n"' -metadata: - creationTimestamp: null - name: authentication-operator.1802f6e485319d7b - namespace: openshift-authentication-operator -reason: ObservedConfigChanged -reportingComponent: "" -reportingInstance: "" -source: - component: cluster-authentication-operator-run-once-sync-context -type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/050-body-authentication-operator.1802f6e4f057efb3.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006e-body-authentication-operator.17fe72c59b829800.cc404894.yaml similarity index 77% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/050-body-authentication-operator.1802f6e4f057efb3.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006e-body-authentication-operator.17fe72c59b829800.cc404894.yaml index 010b76776..dc20f58e8 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/050-body-authentication-operator.1802f6e4f057efb3.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006e-body-authentication-operator.17fe72c59b829800.cc404894.yaml @@ -1,17 +1,17 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:30Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:30Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: A csr "" is created for OpenShiftAuthenticatorCertRequester metadata: creationTimestamp: null - name: authentication-operator.1802f6e4f057efb3 + name: authentication-operator.17fe72c59b829800.cc404894 namespace: openshift-authentication-operator reason: CSRCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006e-metadata-authentication-operator.17fe72c59b829800.cc404894.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006e-metadata-authentication-operator.17fe72c59b829800.cc404894.yaml new file mode 100644 index 000000000..ba2eeee85 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/006e-metadata-authentication-operator.17fe72c59b829800.cc404894.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.cc404894 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/042-body-authentication-operator.1802f6e4d892e853.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/042-body-authentication-operator.1802f6e4d892e853.yaml deleted file mode 100644 index 437e1a72c..000000000 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/042-body-authentication-operator.1802f6e4d892e853.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -count: 1 -eventTime: null -firstTimestamp: "2024-10-29T15:44:29Z" -involvedObject: - kind: Deployment - name: authentication-operator - namespace: openshift-authentication-operator -kind: Event -lastTimestamp: "2024-10-29T15:44:29Z" -message: minTLSVersion changed to VersionTLS12 -metadata: - creationTimestamp: null - name: authentication-operator.1802f6e4d892e853 - namespace: openshift-authentication-operator -reason: ObserveTLSSecurityProfile -reportingComponent: "" -reportingInstance: "" -source: - component: cluster-authentication-operator-run-once-sync-context -type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/045-body-authentication-operator.1802f6e4d8c17be2.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/045-body-authentication-operator.1802f6e4d8c17be2.yaml deleted file mode 100644 index 179adb322..000000000 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/045-body-authentication-operator.1802f6e4d8c17be2.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -count: 1 -eventTime: null -firstTimestamp: "2024-10-29T15:44:29Z" -involvedObject: - kind: Deployment - name: authentication-operator - namespace: openshift-authentication-operator -kind: Event -lastTimestamp: "2024-10-29T15:44:29Z" -message: 'Writing updated section ("oauthAPIServer") of observed config: " map[string]any(\n- - \tnil,\n+ \t{\n+ \t\t\"apiServerArguments\": map[string]any{\n+ \t\t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ - \t\t\t\"cors-allowed-origins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ - \t\t\t\"tls-cipher-suites\": []any{\n+ \t\t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), - string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ - \t\t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\"...), ...,\n+ \t\t\t},\n+ \t\t\t\"tls-min-version\": - string(\"VersionTLS12\"),\n+ \t\t},\n+ \t},\n )\n"' -metadata: - creationTimestamp: null - name: authentication-operator.1802f6e4d8c17be2 - namespace: openshift-authentication-operator -reason: ObservedConfigChanged -reportingComponent: "" -reportingInstance: "" -source: - component: cluster-authentication-operator-run-once-sync-context -type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/032-body-authentication-operator.1802f6e48ff304ac.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1149-body-authentication-operator.17fe72c59b829800.327a2f38.yaml similarity index 80% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/032-body-authentication-operator.1802f6e48ff304ac.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1149-body-authentication-operator.17fe72c59b829800.327a2f38.yaml index 3ab2ef4a6..517359329 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/032-body-authentication-operator.1802f6e48ff304ac.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1149-body-authentication-operator.17fe72c59b829800.327a2f38.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e48ff304ac + name: authentication-operator.17fe72c59b829800.327a2f38 namespace: openshift-authentication-operator reason: RoleCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1149-metadata-authentication-operator.17fe72c59b829800.327a2f38.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1149-metadata-authentication-operator.17fe72c59b829800.327a2f38.yaml new file mode 100644 index 000000000..696f5dd5f --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1149-metadata-authentication-operator.17fe72c59b829800.327a2f38.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.327a2f38 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/041-body-authentication-operator.1802f6e4d8827d4e.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13d7-body-authentication-operator.17fe72c59b829800.87c2a194.yaml similarity index 78% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/041-body-authentication-operator.1802f6e4d8827d4e.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13d7-body-authentication-operator.17fe72c59b829800.87c2a194.yaml index f96e6dea9..938abdc6a 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/041-body-authentication-operator.1802f6e4d8827d4e.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13d7-body-authentication-operator.17fe72c59b829800.87c2a194.yaml @@ -1,17 +1,17 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:29Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:29Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: service account issuer changed from to https://kubernetes.default.svc metadata: creationTimestamp: null - name: authentication-operator.1802f6e4d8827d4e + name: authentication-operator.17fe72c59b829800.87c2a194 namespace: openshift-authentication-operator reason: ObserveAPIAudiences reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13d7-metadata-authentication-operator.17fe72c59b829800.87c2a194.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13d7-metadata-authentication-operator.17fe72c59b829800.87c2a194.yaml new file mode 100644 index 000000000..e4ca0b05a --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13d7-metadata-authentication-operator.17fe72c59b829800.87c2a194.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.87c2a194 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/048-body-authentication-operator.1802f6e4f04c905b.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13fd-body-authentication-operator.17fe72c59b829800.da44325f.yaml similarity index 81% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/048-body-authentication-operator.1802f6e4f04c905b.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13fd-body-authentication-operator.17fe72c59b829800.da44325f.yaml index b815b2e65..139c729d0 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/048-body-authentication-operator.1802f6e4f04c905b.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13fd-body-authentication-operator.17fe72c59b829800.da44325f.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:30Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:30Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: 'No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates' metadata: creationTimestamp: null - name: authentication-operator.1802f6e4f04c905b + name: authentication-operator.17fe72c59b829800.da44325f namespace: openshift-authentication-operator reason: NoValidCertificateFound reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13fd-metadata-authentication-operator.17fe72c59b829800.da44325f.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13fd-metadata-authentication-operator.17fe72c59b829800.da44325f.yaml new file mode 100644 index 000000000..35dc47278 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/13fd-metadata-authentication-operator.17fe72c59b829800.da44325f.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.da44325f +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1f51-body-authentication-operator.17fe72c59b829800.9dfc3b5d.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1f51-body-authentication-operator.17fe72c59b829800.9dfc3b5d.yaml new file mode 100644 index 000000000..b7dcf3716 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1f51-body-authentication-operator.17fe72c59b829800.9dfc3b5d.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager + because it was missing +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.9dfc3b5d + namespace: openshift-authentication-operator +reason: ClusterRoleCreated +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1f51-metadata-authentication-operator.17fe72c59b829800.9dfc3b5d.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1f51-metadata-authentication-operator.17fe72c59b829800.9dfc3b5d.yaml new file mode 100644 index 000000000..9496b19e5 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/1f51-metadata-authentication-operator.17fe72c59b829800.9dfc3b5d.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.9dfc3b5d +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/2e46-body-authentication-operator.17fe72c59b829800.b2cdb588.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/2e46-body-authentication-operator.17fe72c59b829800.b2cdb588.yaml new file mode 100644 index 000000000..74c49be1c --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/2e46-body-authentication-operator.17fe72c59b829800.b2cdb588.yaml @@ -0,0 +1,29 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: 'Writing updated section ("oauthServer") of observed config: "\u00a0\u00a0map[string]any(\n-\u00a0\tnil,\n+\u00a0\t{\n+\u00a0\t\t\"corsAllowedOrigins\": + []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+\u00a0\t\t\"oauthConfig\": + map[string]any{\n+\u00a0\t\t\t\"loginURL\": string(\"https://api.ostest.test.metalkube.org:6443\"),\n+\u00a0\t\t\t\"tokenConfig\": + map[string]any{\n+\u00a0\t\t\t\t\"accessTokenMaxAgeSeconds\": float64(86400),\n+\u00a0\t\t\t\t\"authorizeTokenMaxAgeSeconds\": + float64(300),\n+\u00a0\t\t\t},\n+\u00a0\t\t},\n+\u00a0\t\t\"serverArguments\": map[string]any{\n+\u00a0\t\t\t\"audit-log-format\": []any{string(\"json\")},\n+\u00a0\t\t\t\"audit-log-maxbackup\": + []any{string(\"10\")},\n+\u00a0\t\t\t\"audit-log-maxsize\": []any{string(\"100\")},\n+\u00a0\t\t\t\"audit-log-path\": []any{string(\"/var/log/oauth-server/audit.log\")},\n+\u00a0\t\t\t\"audit-policy-file\": []any{string(\"/var/run/configmaps/audit/audit.\"...)},\n+\u00a0\t\t},\n+\u00a0\t\t\"servingInfo\": + map[string]any{\n+\u00a0\t\t\t\"cipherSuites\": []any{\n+\u00a0\t\t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), + string(\"TLS_AES_256_GCM_SHA384\"),\n+\u00a0\t\t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+\u00a0\t\t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\"...), + ...,\n+\u00a0\t\t\t},\n+\u00a0\t\t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+\u00a0\t\t},\n+\u00a0\t},\n\u00a0\u00a0)\n"' +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.b2cdb588 + namespace: openshift-authentication-operator +reason: ObservedConfigChanged +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/2e46-metadata-authentication-operator.17fe72c59b829800.b2cdb588.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/2e46-metadata-authentication-operator.17fe72c59b829800.b2cdb588.yaml new file mode 100644 index 000000000..d28a5765a --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/2e46-metadata-authentication-operator.17fe72c59b829800.b2cdb588.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.b2cdb588 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/030-body-authentication-operator.1802f6e48fdd4ac1.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/30b9-body-authentication-operator.17fe72c59b829800.07abf400.yaml similarity index 78% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/030-body-authentication-operator.1802f6e48fdd4ac1.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/30b9-body-authentication-operator.17fe72c59b829800.07abf400.yaml index a8ad011c7..d607d5ae7 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/030-body-authentication-operator.1802f6e48fdd4ac1.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/30b9-body-authentication-operator.17fe72c59b829800.07abf400.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created Service/oauth-openshift -n openshift-authentication because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e48fdd4ac1 + name: authentication-operator.17fe72c59b829800.07abf400 namespace: openshift-authentication-operator reason: ServiceCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/30b9-metadata-authentication-operator.17fe72c59b829800.07abf400.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/30b9-metadata-authentication-operator.17fe72c59b829800.07abf400.yaml new file mode 100644 index 000000000..dc5442695 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/30b9-metadata-authentication-operator.17fe72c59b829800.07abf400.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.07abf400 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/32eb-body-authentication-operator.17fe72c59b829800.adf05e91.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/32eb-body-authentication-operator.17fe72c59b829800.adf05e91.yaml new file mode 100644 index 000000000..be54b1626 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/32eb-body-authentication-operator.17fe72c59b829800.adf05e91.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver + because it was missing +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.adf05e91 + namespace: openshift-authentication-operator +reason: ClusterRoleBindingCreated +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/32eb-metadata-authentication-operator.17fe72c59b829800.adf05e91.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/32eb-metadata-authentication-operator.17fe72c59b829800.adf05e91.yaml new file mode 100644 index 000000000..3ebc296a4 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/32eb-metadata-authentication-operator.17fe72c59b829800.adf05e91.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.adf05e91 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/026-body-authentication-operator.1802f6e48e09fa9a.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/357b-body-authentication-operator.17fe72c59b829800.fd7c2a06.yaml similarity index 79% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/026-body-authentication-operator.1802f6e48e09fa9a.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/357b-body-authentication-operator.17fe72c59b829800.fd7c2a06.yaml index ca198381d..3e95c0727 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/026-body-authentication-operator.1802f6e48e09fa9a.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/357b-body-authentication-operator.17fe72c59b829800.fd7c2a06.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e48e09fa9a + name: authentication-operator.17fe72c59b829800.fd7c2a06 namespace: openshift-authentication-operator reason: SecretCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/357b-metadata-authentication-operator.17fe72c59b829800.fd7c2a06.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/357b-metadata-authentication-operator.17fe72c59b829800.fd7c2a06.yaml new file mode 100644 index 000000000..4f7601500 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/357b-metadata-authentication-operator.17fe72c59b829800.fd7c2a06.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.fd7c2a06 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/37d9-body-authentication-operator.17fe72c59b829800.651f7f3f.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/37d9-body-authentication-operator.17fe72c59b829800.651f7f3f.yaml new file mode 100644 index 000000000..c718bf4bb --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/37d9-body-authentication-operator.17fe72c59b829800.651f7f3f.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: Created PodDisruptionBudget.policy/oauth-apiserver-pdb -n openshift-oauth-apiserver + because it was missing +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.651f7f3f + namespace: openshift-authentication-operator +reason: PodDisruptionBudgetCreated +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/37d9-metadata-authentication-operator.17fe72c59b829800.651f7f3f.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/37d9-metadata-authentication-operator.17fe72c59b829800.651f7f3f.yaml new file mode 100644 index 000000000..1ed2d038b --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/37d9-metadata-authentication-operator.17fe72c59b829800.651f7f3f.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.651f7f3f +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3c60-body-authentication-operator.17fe72c59b829800.d64f6f23.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3c60-body-authentication-operator.17fe72c59b829800.d64f6f23.yaml new file mode 100644 index 000000000..c2b91fab3 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3c60-body-authentication-operator.17fe72c59b829800.d64f6f23.yaml @@ -0,0 +1,25 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: 'Writing updated section ("oauthAPIServer") of observed config: "\u00a0\u00a0map[string]any(\n-\u00a0\tnil,\n+\u00a0\t{\n+\u00a0\t\t\"apiServerArguments\": + map[string]any{\n+\u00a0\t\t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+\u00a0\t\t\t\"cors-allowed-origins\": + []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+\u00a0\t\t\t\"tls-cipher-suites\": + []any{\n+\u00a0\t\t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+\u00a0\t\t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+\u00a0\t\t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\"...), + ...,\n+\u00a0\t\t\t},\n+\u00a0\t\t\t\"tls-min-version\": string(\"VersionTLS12\"),\n+\u00a0\t\t},\n+\u00a0\t},\n\u00a0\u00a0)\n"' +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.d64f6f23 + namespace: openshift-authentication-operator +reason: ObservedConfigChanged +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3c60-metadata-authentication-operator.17fe72c59b829800.d64f6f23.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3c60-metadata-authentication-operator.17fe72c59b829800.d64f6f23.yaml new file mode 100644 index 000000000..614b70cf4 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3c60-metadata-authentication-operator.17fe72c59b829800.d64f6f23.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.d64f6f23 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/004-body-authentication-operator.1802f6e4851e3ce9.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3ca6-body-authentication-operator.17fe72c59b829800.44a05c38.yaml similarity index 77% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/004-body-authentication-operator.1802f6e4851e3ce9.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3ca6-body-authentication-operator.17fe72c59b829800.44a05c38.yaml index 18f84baa5..163bf2dc3 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/004-body-authentication-operator.1802f6e4851e3ce9.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3ca6-body-authentication-operator.17fe72c59b829800.44a05c38.yaml @@ -1,17 +1,17 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: minTLSVersion changed to VersionTLS12 metadata: creationTimestamp: null - name: authentication-operator.1802f6e4851e3ce9 + name: authentication-operator.17fe72c59b829800.44a05c38 namespace: openshift-authentication-operator reason: ObserveTLSSecurityProfile reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3ca6-metadata-authentication-operator.17fe72c59b829800.44a05c38.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3ca6-metadata-authentication-operator.17fe72c59b829800.44a05c38.yaml new file mode 100644 index 000000000..0a3644c56 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/3ca6-metadata-authentication-operator.17fe72c59b829800.44a05c38.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.44a05c38 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/49ea-body-authentication-operator.17fe72c59b829800.c605caf3.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/49ea-body-authentication-operator.17fe72c59b829800.c605caf3.yaml new file mode 100644 index 000000000..2af8a78dd --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/49ea-body-authentication-operator.17fe72c59b829800.c605caf3.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager + because it was missing +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.c605caf3 + namespace: openshift-authentication-operator +reason: ClusterRoleBindingCreated +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/49ea-metadata-authentication-operator.17fe72c59b829800.c605caf3.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/49ea-metadata-authentication-operator.17fe72c59b829800.c605caf3.yaml new file mode 100644 index 000000000..f1cc2e0d7 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/49ea-metadata-authentication-operator.17fe72c59b829800.c605caf3.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.c605caf3 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5169-body-authentication-operator.17fe72c59b829800.ad6de22d.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5169-body-authentication-operator.17fe72c59b829800.ad6de22d.yaml new file mode 100644 index 000000000..4fc0675dc --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5169-body-authentication-operator.17fe72c59b829800.ad6de22d.yaml @@ -0,0 +1,31 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: 'Status for clusteroperator/authentication changed: Degraded set to Unknown + (""),Progressing set to Unknown (""),Available set to Unknown (""),Upgradeable set + to Unknown (""),EvaluationConditionsDetected set to Unknown (""),status.relatedObjects + changed from [] to [{"operator.openshift.io" "authentications" "" "cluster"} {"config.openshift.io" + "authentications" "" "cluster"} {"config.openshift.io" "infrastructures" "" "cluster"} + {"config.openshift.io" "oauths" "" "cluster"} {"route.openshift.io" "routes" "openshift-authentication" + "oauth-openshift"} {"" "services" "openshift-authentication" "oauth-openshift"} + {"" "namespaces" "" "openshift-config"} {"" "namespaces" "" "openshift-config-managed"} + {"" "namespaces" "" "openshift-authentication"} {"" "namespaces" "" "openshift-authentication-operator"} + {"" "namespaces" "" "openshift-ingress"} {"" "namespaces" "" "openshift-oauth-apiserver"}],status.versions + changed from [] to [{"operator" ""}]' +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.ad6de22d + namespace: openshift-authentication-operator +reason: OperatorStatusChanged +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5169-metadata-authentication-operator.17fe72c59b829800.ad6de22d.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5169-metadata-authentication-operator.17fe72c59b829800.ad6de22d.yaml new file mode 100644 index 000000000..bc00a9a83 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5169-metadata-authentication-operator.17fe72c59b829800.ad6de22d.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.ad6de22d +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/044-body-authentication-operator.1802f6e4d8b05b26.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5a6e-body-authentication-operator.17fe72c59b829800.b8ffb9fd.yaml similarity index 78% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/044-body-authentication-operator.1802f6e4d8b05b26.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5a6e-body-authentication-operator.17fe72c59b829800.b8ffb9fd.yaml index d07aec970..8809bc45f 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/044-body-authentication-operator.1802f6e4d8b05b26.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5a6e-body-authentication-operator.17fe72c59b829800.b8ffb9fd.yaml @@ -1,17 +1,17 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:29Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:29Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Required endpoints/host-etcd-2 in the openshift-etcd namespace not found. metadata: creationTimestamp: null - name: authentication-operator.1802f6e4d8b05b26 + name: authentication-operator.17fe72c59b829800.b8ffb9fd namespace: openshift-authentication-operator reason: ObserveStorageFailed reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5a6e-metadata-authentication-operator.17fe72c59b829800.b8ffb9fd.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5a6e-metadata-authentication-operator.17fe72c59b829800.b8ffb9fd.yaml new file mode 100644 index 000000000..bca4eddb8 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/5a6e-metadata-authentication-operator.17fe72c59b829800.b8ffb9fd.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.b8ffb9fd +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6303-body-authentication-operator.17fe72c59b829800.c1353886.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6303-body-authentication-operator.17fe72c59b829800.c1353886.yaml new file mode 100644 index 000000000..6a8002f96 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6303-body-authentication-operator.17fe72c59b829800.c1353886.yaml @@ -0,0 +1,21 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: loginURL changed from to https://api.ostest.test.metalkube.org:6443 +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.c1353886 + namespace: openshift-authentication-operator +reason: ObserveAPIServerURL +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6303-metadata-authentication-operator.17fe72c59b829800.c1353886.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6303-metadata-authentication-operator.17fe72c59b829800.c1353886.yaml new file mode 100644 index 000000000..f557a6557 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6303-metadata-authentication-operator.17fe72c59b829800.c1353886.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.c1353886 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6413-body-authentication-operator.17fe72c59b829800.52f3c122.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6413-body-authentication-operator.17fe72c59b829800.52f3c122.yaml new file mode 100644 index 000000000..214e546bf --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6413-body-authentication-operator.17fe72c59b829800.52f3c122.yaml @@ -0,0 +1,21 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: Created Service/api -n openshift-oauth-apiserver because it was missing +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.52f3c122 + namespace: openshift-authentication-operator +reason: ServiceCreated +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6413-metadata-authentication-operator.17fe72c59b829800.52f3c122.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6413-metadata-authentication-operator.17fe72c59b829800.52f3c122.yaml new file mode 100644 index 000000000..7f517d8d8 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/6413-metadata-authentication-operator.17fe72c59b829800.52f3c122.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.52f3c122 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/024-body-authentication-operator.1802f6e485e9875b.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/72b5-body-authentication-operator.17fe72c59b829800.a18021d9.yaml similarity index 79% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/024-body-authentication-operator.1802f6e485e9875b.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/72b5-body-authentication-operator.17fe72c59b829800.a18021d9.yaml index b97ebe9e7..637c66491 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/024-body-authentication-operator.1802f6e485e9875b.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/72b5-body-authentication-operator.17fe72c59b829800.a18021d9.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e485e9875b + name: authentication-operator.17fe72c59b829800.a18021d9 namespace: openshift-authentication-operator reason: ConfigMapCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/72b5-metadata-authentication-operator.17fe72c59b829800.a18021d9.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/72b5-metadata-authentication-operator.17fe72c59b829800.a18021d9.yaml new file mode 100644 index 000000000..19742750a --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/72b5-metadata-authentication-operator.17fe72c59b829800.a18021d9.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.a18021d9 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/013-body-authentication-operator.1802f6e48582e420.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/9650-body-authentication-operator.17fe72c59b829800.a1759283.yaml similarity index 79% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/013-body-authentication-operator.1802f6e48582e420.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/9650-body-authentication-operator.17fe72c59b829800.a1759283.yaml index c22e28b5f..bf4989a48 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/013-body-authentication-operator.1802f6e48582e420.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/9650-body-authentication-operator.17fe72c59b829800.a1759283.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created Secret/v4-0-config-system-session -n openshift-authentication because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e48582e420 + name: authentication-operator.17fe72c59b829800.a1759283 namespace: openshift-authentication-operator reason: SecretCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/9650-metadata-authentication-operator.17fe72c59b829800.a1759283.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/9650-metadata-authentication-operator.17fe72c59b829800.a1759283.yaml new file mode 100644 index 000000000..295b1f6a4 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/9650-metadata-authentication-operator.17fe72c59b829800.a1759283.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.a1759283 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/034-body-authentication-operator.1802f6e49003180c.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/a103-body-authentication-operator.17fe72c59b829800.8953695d.yaml similarity index 80% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/034-body-authentication-operator.1802f6e49003180c.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/a103-body-authentication-operator.17fe72c59b829800.8953695d.yaml index e3bc10085..2e03f08cb 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/034-body-authentication-operator.1802f6e49003180c.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/a103-body-authentication-operator.17fe72c59b829800.8953695d.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e49003180c + name: authentication-operator.17fe72c59b829800.8953695d namespace: openshift-authentication-operator reason: RoleBindingCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/a103-metadata-authentication-operator.17fe72c59b829800.8953695d.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/a103-metadata-authentication-operator.17fe72c59b829800.8953695d.yaml new file mode 100644 index 000000000..051408268 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/a103-metadata-authentication-operator.17fe72c59b829800.8953695d.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.8953695d +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/adcf-body-authentication-operator.17fe72c59b829800.9b8e044a.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/adcf-body-authentication-operator.17fe72c59b829800.9b8e044a.yaml new file mode 100644 index 000000000..b286dd9b3 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/adcf-body-authentication-operator.17fe72c59b829800.9b8e044a.yaml @@ -0,0 +1,21 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: Created Namespace/openshift-oauth-apiserver because it was missing +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.9b8e044a + namespace: openshift-authentication-operator +reason: NamespaceCreated +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/adcf-metadata-authentication-operator.17fe72c59b829800.9b8e044a.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/adcf-metadata-authentication-operator.17fe72c59b829800.9b8e044a.yaml new file mode 100644 index 000000000..2cb35fccf --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/adcf-metadata-authentication-operator.17fe72c59b829800.9b8e044a.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.9b8e044a +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/028-body-authentication-operator.1802f6e48fc5bf22.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/ba68-body-authentication-operator.17fe72c59b829800.e6f3afa2.yaml similarity index 79% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/028-body-authentication-operator.1802f6e48fc5bf22.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/ba68-body-authentication-operator.17fe72c59b829800.e6f3afa2.yaml index 272ef321b..c29a163a2 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/028-body-authentication-operator.1802f6e48fc5bf22.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/ba68-body-authentication-operator.17fe72c59b829800.e6f3afa2.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e48fc5bf22 + name: authentication-operator.17fe72c59b829800.e6f3afa2 namespace: openshift-authentication-operator reason: ServiceAccountCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/ba68-metadata-authentication-operator.17fe72c59b829800.e6f3afa2.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/ba68-metadata-authentication-operator.17fe72c59b829800.e6f3afa2.yaml new file mode 100644 index 000000000..b46e58dfb --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/ba68-metadata-authentication-operator.17fe72c59b829800.e6f3afa2.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.e6f3afa2 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/022-body-authentication-operator.1802f6e485dc1cda.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bdd9-body-authentication-operator.17fe72c59b829800.c1403ea8.yaml similarity index 80% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/022-body-authentication-operator.1802f6e485dc1cda.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bdd9-body-authentication-operator.17fe72c59b829800.c1403ea8.yaml index 5eef8b3aa..60785b00b 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/022-body-authentication-operator.1802f6e485dc1cda.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bdd9-body-authentication-operator.17fe72c59b829800.c1403ea8.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e485dc1cda + name: authentication-operator.17fe72c59b829800.c1403ea8 namespace: openshift-authentication-operator reason: ClusterRoleBindingCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bdd9-metadata-authentication-operator.17fe72c59b829800.c1403ea8.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bdd9-metadata-authentication-operator.17fe72c59b829800.c1403ea8.yaml new file mode 100644 index 000000000..dc9545902 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bdd9-metadata-authentication-operator.17fe72c59b829800.c1403ea8.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.c1403ea8 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/043-body-authentication-operator.1802f6e4d8a0b2ab.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bf8a-body-authentication-operator.17fe72c59b829800.49fb0e36.yaml similarity index 85% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/043-body-authentication-operator.1802f6e4d8a0b2ab.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bf8a-body-authentication-operator.17fe72c59b829800.49fb0e36.yaml index 767d5d329..07baae997 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/043-body-authentication-operator.1802f6e4d8a0b2ab.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bf8a-body-authentication-operator.17fe72c59b829800.49fb0e36.yaml @@ -1,20 +1,20 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:29Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:29Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: cipherSuites changed to ["TLS_AES_128_GCM_SHA256" "TLS_AES_256_GCM_SHA384" "TLS_CHACHA20_POLY1305_SHA256" "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256" "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384" "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384" "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256" "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"] metadata: creationTimestamp: null - name: authentication-operator.1802f6e4d8a0b2ab + name: authentication-operator.17fe72c59b829800.49fb0e36 namespace: openshift-authentication-operator reason: ObserveTLSSecurityProfile reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bf8a-metadata-authentication-operator.17fe72c59b829800.49fb0e36.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bf8a-metadata-authentication-operator.17fe72c59b829800.49fb0e36.yaml new file mode 100644 index 000000000..dbf69a119 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/bf8a-metadata-authentication-operator.17fe72c59b829800.49fb0e36.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.49fb0e36 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/018-body-authentication-operator.1802f6e485b56e6d.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/e0b5-body-authentication-operator.17fe72c59b829800.ce8a3f4a.yaml similarity index 78% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/018-body-authentication-operator.1802f6e485b56e6d.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/e0b5-body-authentication-operator.17fe72c59b829800.ce8a3f4a.yaml index 133d11779..a83934f71 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/018-body-authentication-operator.1802f6e485b56e6d.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/e0b5-body-authentication-operator.17fe72c59b829800.ce8a3f4a.yaml @@ -1,17 +1,17 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created ConfigMap/audit -n openshift-authentication because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e485b56e6d + name: authentication-operator.17fe72c59b829800.ce8a3f4a namespace: openshift-authentication-operator reason: ConfigMapCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/e0b5-metadata-authentication-operator.17fe72c59b829800.ce8a3f4a.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/e0b5-metadata-authentication-operator.17fe72c59b829800.ce8a3f4a.yaml new file mode 100644 index 000000000..69ac87f0c --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/e0b5-metadata-authentication-operator.17fe72c59b829800.ce8a3f4a.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.ce8a3f4a +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/020-body-authentication-operator.1802f6e485c99334.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/eb3c-body-authentication-operator.17fe72c59b829800.6c145ec7.yaml similarity index 78% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/020-body-authentication-operator.1802f6e485c99334.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/eb3c-body-authentication-operator.17fe72c59b829800.6c145ec7.yaml index c348141c5..3a2292930 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/020-body-authentication-operator.1802f6e485c99334.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/eb3c-body-authentication-operator.17fe72c59b829800.6c145ec7.yaml @@ -1,17 +1,17 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: Created Namespace/openshift-authentication because it was missing metadata: creationTimestamp: null - name: authentication-operator.1802f6e485c99334 + name: authentication-operator.17fe72c59b829800.6c145ec7 namespace: openshift-authentication-operator reason: NamespaceCreated reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/eb3c-metadata-authentication-operator.17fe72c59b829800.6c145ec7.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/eb3c-metadata-authentication-operator.17fe72c59b829800.6c145ec7.yaml new file mode 100644 index 000000000..d39df7bd7 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/eb3c-metadata-authentication-operator.17fe72c59b829800.6c145ec7.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.6c145ec7 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/003-body-authentication-operator.1802f6e48510cb24.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f16c-body-authentication-operator.17fe72c59b829800.a8ecfbce.yaml similarity index 82% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/003-body-authentication-operator.1802f6e48510cb24.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f16c-body-authentication-operator.17fe72c59b829800.a8ecfbce.yaml index 4f2d694b9..adf835c25 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/003-body-authentication-operator.1802f6e48510cb24.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f16c-body-authentication-operator.17fe72c59b829800.a8ecfbce.yaml @@ -1,18 +1,18 @@ apiVersion: v1 count: 1 eventTime: null -firstTimestamp: "2024-10-29T15:44:28Z" +firstTimestamp: "2024-10-14T22:38:20Z" involvedObject: kind: Deployment name: authentication-operator namespace: openshift-authentication-operator kind: Event -lastTimestamp: "2024-10-29T15:44:28Z" +lastTimestamp: "2024-10-14T22:38:20Z" message: AuditProfile changed from '%!s()' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]' metadata: creationTimestamp: null - name: authentication-operator.1802f6e48510cb24 + name: authentication-operator.17fe72c59b829800.a8ecfbce namespace: openshift-authentication-operator reason: ObserveAuditProfile reportingComponent: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f16c-metadata-authentication-operator.17fe72c59b829800.a8ecfbce.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f16c-metadata-authentication-operator.17fe72c59b829800.a8ecfbce.yaml new file mode 100644 index 000000000..7b904865a --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f16c-metadata-authentication-operator.17fe72c59b829800.a8ecfbce.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.a8ecfbce +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f760-body-authentication-operator.17fe72c59b829800.103eb7f4.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f760-body-authentication-operator.17fe72c59b829800.103eb7f4.yaml new file mode 100644 index 000000000..76a4e90a4 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f760-body-authentication-operator.17fe72c59b829800.103eb7f4.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +count: 1 +eventTime: null +firstTimestamp: "2024-10-14T22:38:20Z" +involvedObject: + kind: Deployment + name: authentication-operator + namespace: openshift-authentication-operator +kind: Event +lastTimestamp: "2024-10-14T22:38:20Z" +message: Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because + it was missing +metadata: + creationTimestamp: null + name: authentication-operator.17fe72c59b829800.103eb7f4 + namespace: openshift-authentication-operator +reason: ServiceAccountCreated +reportingComponent: "" +reportingInstance: "" +source: + component: cluster-authentication-operator-run-once-sync-context +type: Normal diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f760-metadata-authentication-operator.17fe72c59b829800.103eb7f4.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f760-metadata-authentication-operator.17fe72c59b829800.103eb7f4.yaml new file mode 100644 index 000000000..10c023d42 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication-operator/core/events/f760-metadata-authentication-operator.17fe72c59b829800.103eb7f4.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: "" +generateName: "" +mame: authentication-operator.17fe72c59b829800.103eb7f4 +namespace: openshift-authentication-operator +resourceType: + Group: "" + Resource: events + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/023-body-v4-0-config-system-trusted-ca-bundle.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/7023-body-v4-0-config-system-trusted-ca-bundle.yaml similarity index 67% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/023-body-v4-0-config-system-trusted-ca-bundle.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/7023-body-v4-0-config-system-trusted-ca-bundle.yaml index 526e192e5..b92009344 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/023-body-v4-0-config-system-trusted-ca-bundle.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/7023-body-v4-0-config-system-trusted-ca-bundle.yaml @@ -1,8 +1,6 @@ apiVersion: v1 kind: ConfigMap metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController creationTimestamp: null labels: config.openshift.io/inject-trusted-cabundle: "true" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/7023-metadata-v4-0-config-system-trusted-ca-bundle.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/7023-metadata-v4-0-config-system-trusted-ca-bundle.yaml new file mode 100644 index 000000000..07e9ab8cd --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/7023-metadata-v4-0-config-system-trusted-ca-bundle.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: v4-0-config-system-trusted-ca-bundle +namespace: openshift-authentication +resourceType: + Group: "" + Resource: configmaps + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/017-body-audit.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/84c5-body-audit.yaml similarity index 76% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/017-body-audit.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/84c5-body-audit.yaml index 6a0debd87..907508ffc 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/017-body-audit.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/84c5-body-audit.yaml @@ -13,8 +13,6 @@ data: - level: Metadata kind: ConfigMap metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController creationTimestamp: null name: audit namespace: openshift-authentication diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/84c5-metadata-audit.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/84c5-metadata-audit.yaml new file mode 100644 index 000000000..ac0ff4ee5 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/configmaps/84c5-metadata-audit.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: audit +namespace: openshift-authentication +resourceType: + Group: "" + Resource: configmaps + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/012-body-v4-0-config-system-session.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/c23d-body-v4-0-config-system-session.yaml similarity index 52% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/012-body-v4-0-config-system-session.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/c23d-body-v4-0-config-system-session.yaml index 66df1c1cf..f925a641b 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/012-body-v4-0-config-system-session.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/c23d-body-v4-0-config-system-session.yaml @@ -1,10 +1,8 @@ apiVersion: v1 data: - v4-0-config-system-session: eyJraW5kIjoiU2Vzc2lvblNlY3JldHMiLCJhcGlWZXJzaW9uIjoib3BlcmF0b3J2MWNsaWVudCIsInNlY3JldHMiOlt7ImF1dGhlbnRpY2F0aW9uIjoiZXlXLXlELXNUQnVvWXJNbVp5Um5PcjN2M2c2RkI2ZGFIQkZwck12MVd5enJNbHh5am96WTE1Y3NRSTdGV0htMyIsImVuY3J5cHRpb24iOiI2VVlTNDNGNmJQUnFHckYxYUl2U3pnZ3gxTVRWM0s1XyJ9XX0= + v4-0-config-system-session: eyJraW5kIjoiU2Vzc2lvblNlY3JldHMiLCJhcGlWZXJzaW9uIjoib3BlcmF0b3J2MWNsaWVudCIsInNlY3JldHMiOlt7ImF1dGhlbnRpY2F0aW9uIjoiZXlFUDNvR21XNnNEdW5JWlV2aHVabFJXV25GdlpkQ2RhYXJCZGl0MEJ2b1FKOVp2aW8xcHdNMUdDNXF6RTY2NyIsImVuY3J5cHRpb24iOiJmSDNqeF9CR0J0alBZQW9HU011M3RJbVpLX29aRmdWeiJ9XX0= kind: Secret metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-payloadConfigController creationTimestamp: null labels: app: oauth-openshift diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/c23d-metadata-v4-0-config-system-session.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/c23d-metadata-v4-0-config-system-session.yaml new file mode 100644 index 000000000..547d37989 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/c23d-metadata-v4-0-config-system-session.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: TODO-payloadConfigController +generateName: "" +mame: v4-0-config-system-session +namespace: openshift-authentication +resourceType: + Group: "" + Resource: secrets + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/025-body-v4-0-config-system-ocp-branding-template.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/dc0d-body-v4-0-config-system-ocp-branding-template.yaml similarity index 99% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/025-body-v4-0-config-system-ocp-branding-template.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/dc0d-body-v4-0-config-system-ocp-branding-template.yaml index 21b752463..b6fa4319a 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/025-body-v4-0-config-system-ocp-branding-template.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/dc0d-body-v4-0-config-system-ocp-branding-template.yaml @@ -5,8 +5,6 @@ data: providers.html: <!DOCTYPE html>
<html lang="en-us" data-test-id="login">
  <head>
    <title>
      
        {{ .Locale.LogIn }}
      
       · Red Hat OpenShift
    </title>
    <meta http-equiv="X-UA-Compatible" content="IE=edge">
    <meta name="viewport" content="width=device-width, initial-scale=1.0">
    <link rel="shortcut icon" href="data:image/png;base64,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">

    <style>
      @font-face{font-family:'RedHatText';src:url(data:application/x-font-woff;charset=utf-8;base64,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) format("woff");font-weight:400;font-style:normal}@font-face{font-family:'RedHatText';src:url(data:application/x-font-woff;charset=utf-8;base64,d09GRgABAAAAAJGsABIAAAABMBAAAQAAAACQFAAAAZgAAARiAAAAAAAAAABCQVNFAAABlAAAADoAAAA6iyWUsURTSUcAAJAMAAAACAAAAAgAAAABR1BPUwAAAdAAAA0DAAAiKg6dhaRHU1VCAAAO1AAAAucAAAYocANv8E9TLzIAABG8AAAAUgAAAGBlc4G0Y21hcAAAEhAAAAPvAAAFtG9M/VdjdnQgAACIJAAAAE4AAAB4LTf/nGZwZ20AAIh0AAAG8gAADhWeNhPOZ2FzcAAAiBwAAAAIAAAACAAAABBnbHlmAAAWAAAAYiIAANKiCBm2Q2hlYWQAAHgkAAAANgAAADYUv47MaGhlYQAAeFwAAAAhAAAAJAf3BJJobXR4AAB4gAAAAy0AAAaalTVI8GxvY2EAAHuwAAADUAAAA1CxiuSLbWF4cAAAfwAAAAAgAAAAIAL7DzBuYW1lAAB/IAAAAzYAAAnGODVYGXBvc3QAAIJYAAAFwQAACgn0pp/YcHJlcAAAj2gAAACiAAAAveG2XiMAAQAAAAgAAAAEAA4AAmlkZW9yb21uAAJERkxUAA5sYXRuAA4ABgAAAAAAAQACAAgADAAB/2IAAQAAAAB42rWZC3CU1RXHz012F7KQhACbJQHl/Q7hKYIEZzpVZ6p2VKS2tbZIbaeOxChY25l2xk6pBTpMlaKCKFWqAvJow0MQQRgqDy1WoKCyEPIqahJhu5NAkiam3v7u3e/b7CYLLLR+Z/7fd/c+zrn33HPPOd+3okTELw/KFkm76ZbbZ0pW8eyflki+eKgXrcW09xPP1+69eYAM+fqMmQOkYMYd3xwgk2bOuG2AFDl9lPNMc57pztPjPL3im/PjeSUyzN4L7H2CvU+x9xvt/SZkGXmXvhuuyAF+70pRfXvauebKZJkp82SJbE/rmpaVvip9TfpGT4nnec8rnr2ef3o9Xr+3hzfXO8V7q7dYuki+rpN+YLlukhW6ThXqsCrS9Wq6PmZaQT9aluswrRUqqA/TukjN0i/bsfW07pfl4qeljJaljCun9WPJYGwAjWUztt5yDupaVSg+eu1W03nO0iFm2oXx3UAvEAB9kTaS5ygwGhSAMWAaKALTwY3gHvBt8B3wXXAv+B64D3wf/ADMAk/qo/JbsAAsBIvAErAUPAeWMYvl+qC8ANbwey14HawD68EGsBGUgk1gM9gCtoI3wDawHewAb4GdYBd4G+wGJ0AInASnQBk4DcpBBagEVaAOfA7OgnP6qPKBLqAryAB+0A10B5kgC2SDAMgF9+v9ajbrVei6QX4k83Uba4+w9ghrj8hCrHsRzyVgKXhWfPIcdcvZoRd4vghWMuaP4CXwMlgF/gReAa+C18BqsIbxa8HrYB1YDzaAjaAUbAKbwRawFbwBtoHtYAd4C+wEu8DbYDc4AULgJDgFysBpUA4qQCWoAp8w70/BZ6AG1II65v45OAvOgTbwH/Al0NgmJ1spwElBrxH0GkGvEfQaQa8R9BpBrxH0GkGvEfQaUT10q8oBPUEv0BsEGJ9rbb1cDdcb1AgwGhRKhhoHxoMJYCKYqi+oaaBIb8PSz4hSRWja3AfJOHYmxM6E2JkQuxJiV0LsSsjuwhqea8HrYB1YDzaAjaAUbAKbwRawFbwBtoHtYAd4C+wEu8DbYDc4AULgJDgFysBpUA4qQCWo0iG0E0I7IbQTQjshtBNCOyG0E0I7IbQTQjshZpmvD3D2v+TsNMgK1jUHnRTrNlWim9VcbHEePuQxTn4afsBHqdX6i5cY08CYj4yVMuYj+oZobZCutLTQUkbLMbT2ENwa4bYBTkfoUUOPfL1TFst8em1n7BFaqxlfQY9mejRj+4tleMLdjAnBuZwxrXCuYVwYzmHGHbBjPNZjlSBrrm6BU4t0VUHJxg+GaDns9L9Aa7VpZUyY3Q3qKnY9m3mWsrsH1BzJVMXUl+itaq50N6uXtMAm45FzB+TdLlNkPBHgvK7XTaBOh7jXamxXn9GtttbU18v/eOmn9H2s1/3VqJfih0XvgXdIf4qsSurK9GHpr9+hbq/+h37zCiWs1iXcm+wawrpZz5cMPIKIF79tImi0V410R09iVqQ/FT/7+xVcV8tVL9NP6EpOo1/YaX1B70VL+FirpbPcK3ULuqqSqfoQvc/oar3vCkV40EyrLtWf6VInYhu5rba2Gatrn0uzgyajRdN6JWvXO3UDiOfXdtmRKUqwllOhV7H6DQnjj6GhCuzZ15Gj/szez7DCmivQlc/BV36hqxZdo08lnUHHvheuWkzGVzDzs/ol/ZFellBXAerI3C6iU1bbis+7clkt+pWOa6CuCs+cRGu6MSWepfpx1y+1z0nvw5beh3O5PuJU5eqttuUIfuZ81JMQO69yH1K29NSuAL6iEg97RC/Ad/jwasf0buqi3nWzqaMUfxbrqJPoDrF3QbxCG+dpL2NKTUtSTdUbHxqNBMSi3rHa+GtQYu+4Xz78e+MlLLA7vcrcPbBzzbA+mtjjeg4bl4bHraH96mI9VEvMJpJYFxZZbe9l+iA8w+x6VvssnXVc9LRrkylHfUyNte/KJJ2C+Jd3TLyEq9+ZSTW7sQepR/Ueu8YKfVyGm7lb31oWtxI/2q/RERPBTGTkV0MnO8mxFliid+nZDodV+j7u21nPCb3e7lDEtUvbbmJdc3S2+nE7o3p9s15NaX3SdVZa6SfpdRCe9cwwA4/jT+gUXVtTZ8/N6P2OtmqjXiCJCL+TAZx1ZtWGhFYbmZrIStz9CLP+pljM9sUkGEtqZfQZh5c/yRqaoj2hs9bbtFmv6XftybG3DMmL2Tp8XJux+g8Y6zM1JuYmzWZK9EkrO6rxUrJJn7WrMis3Yv3Scd4RQ1YbJzll/ph1mbP3MRmjsfGVnc6Qa62RuF+tWL65vJ069r6sh7tIxMOO9lqNnLdraCb6ZFi59Q7VOftQYM/lWetL2vfcj54anFhfbW2+s4QF+lbeXc0e9aJ/jd5sTqheq9+ldBDaQ12IDHgqPrUNn7tPL4761uhpYsyHeC8TMXi3hVPni0yJGfpiluCzPsDv5K1NRufshfEarl01xvk3M7rRejPfJXMAsfOuSeyFVfmSxueW5OV275KoK/vLT05n7KSx89gkmvVHbcNon5ymIoFbuXP+wui2ypWrz1mbTMh+sKm2jrmE247eW92cr1O+kRHTiPElNfpD9/zr40gtT1hD86X16vgoc1Lic6GoV/zAWkfzRfOWYVcRKXMueVI+QZov9aw05jEunsv4nHjWak+TH42VkXGcilq1E/HaOAdGb/vi8taovVnvbeNeGz32JsjeFzvFYf2u9UERe07mYy/50h/04nfUG59Cbov98ufa483Gn+g3qX8/Zg1hGcyouLPl9O4f9ZbIWUe/3eR7FzpqyYnQPsmMqzOR53Mz+4TMJ96aMztkcmF3NvEWad8LT6eSy8Z4d7HnorZdFlxqsNXGZO8gNubqqKYvaR2t7rtQLCMIx0kIW5/fklQC2Yb9HpqChMSzHItzrhW0JZ+nzZECNj44MSkxLtpT1tGPmC+/h6wn8acwt2qrwTBv0/VWD26+5It7s0tPkuu/pt/jRCeNokn2NBDnG1KZVUNcVuFLgb+1ObQYnb/fRrxyewrrHS1VJp54c654E/jSvIdfLDNOtEBjZ/b+hY1Aqb3Z7LFzqEuh5ylrabXRc2W/zZznnEZX723fhwRb8tuoe5g9rG//BvN/fxPcy7q7pfget1Gy7P8EPmzH40TuRuvBIo4WaxPXYL562Ejz6uV3wcQsdOIhl/A4uWD8Pngdzt5OuYQP71Zjs8XUvnf1iuUdfku+xHjfIfo7kdVaYXZ0zZdZxT48cqb1xE08M53T5ti8yZQ6zpMI30DUzyC3DCR614tIKKefL+YxMuPicqvr8Tr6KCiEhOpU+Hfy1NEV1Md/y+i0hhYb1Vrc3ld9ZaV6+q76y8nVfk9Rkmve0snd86WfFMtCWSxLZYUKqjFqrCpS09Ud6i51t5qlilWJmkvs6Im1LmDkItkh82WnHJWtclylySHlU0FpVcPVaNWd0RNVjprC+D7qFvUNdS187lCD4HWXGgy/u9UQ9S1oKJwfUMPUQ9BoZDymCtRT6mk1SS2HJpt/A9Uz9pz1wD5y+N1TJkN5WHxvWwowpwCrCEofaj022+hr/1OLUk6slA0PlwKWWyJNBgH4R2lyB8qLPY1kl9zWgEM5sZKZU66dl0t9HEqHR2fKd6ivQ/0sjZFCGSnXyyg0MJZf10MFYIxtKaRunIyXCTwnyiRaJsp1ts3QqFhpDDxcMhzGQqM60BhHRpTG21EDHbre0kCLgUgpcGrM5UoodGhUrFTI3MbZ+bk0waHCmJx4muTQRIeusxS9kvUfHSMzF+9lLH0wdA00mHJXLL6bDHHIvfrLAItMk7V1uK51KPH7kouhSd8qjA0M7dA2wngD3gEzeGcYRi473NZc+ZU4F7FzSOP8eiHF/LtgZd2gdKRl0dILSrczSre22Ndaosda3jXW7gZYq/NaqxtoNeWzUrqgkxHwHMkep1u9j5RpciPl26A0uUdmUX5AfsLoB2UOPB+WnzH65/ILuP1SnoDPr+TX8JkP5cpvoKA8iQ/Jx9ssRNuLoHz5nfye+qfkaWa0BMqXP0B5eKOllJ+B8uRZqLs8B2XKMihLlkPD5XkoW1ZAI+QFqIe8COXISlmNxDWyEQ5/lr/AoVS2U34TysN/7aa8R/6K3HdkP7o5AAXlIBSQd6GgvAcF5G9QUA7J+5T/DgXlAyhPDssxysflY8onpApu1XKG8idSyzzr5BzzDENB+Zc0M9t/yxfMs0209FCCz8zBZ2ZLvuqheksfFVC5konnDcogvOgIyVAj1SjpiV8cTblAFcgoVagKZagapyaKH+86RXqrqWqqdFU3qBsoT1PTKBepIhmG550uQ4zvlV7qTnWn9FMz1AzuM9VM7vhe6YbvnSWD1f1qtqSrH6oHqMEPS381R82RMXjjYilUD6uH5Vp8f4mMU4+oRyg/qh6lz1yiwWg1T82TsXjtx8T6bWTht6XbfwEzLEqNAHjaldRJTBNhFAfw//taSimlrAoqYkVExI3N4oI7ILumaYwhJFBZTKAUQ1tERdSKW70YDx4MLqAYY4wH48HgEg/Gg/FgPBgPxIMxhiAxxhhjjAm+eQwG4oF6mN+bmdd58/p933wgABaMGMagikurXLB53H4vVsLI9zExwTnABCsSkIp0ZGE1CrCBz43bakvscOxwuuxwOndV2+F1OSvtCOlPESIRg0QsxBIsxxqsxUbJREPBDBuSkII0ZCAbOXCgSM8ZEIVYzME8LMJSrEAuCrFJzxm5ahzmYj7syOQO87AOm/VcBB/xSMYCLMYyrEI+1mMLtrrdHj8FxZB4UbwsDop3Gt2+ZrovPhSfis/Fl+LrJm9HO70VR8QP4qj4Rfze0ulupF+aCqJJtIoJYoqno9Gj0sQMMVvM8QbaO5VDLBK3i2Vijejy+XJyVa3YILaIHrFT7GbzVK/YJ4bEC+IlsZ/NV4PibfGe+EAcFp/5Avt86oX4SnwjvhPfix99gQM+NSZ+FX+IvzUNSjTz2lF80H9Ebd3MblQYmsNQTdMw7Tw6DI1hGBGGpjC0hKF1FmP4q83g76aAv7ZiVMGFOjTBAz96JkeeTJNjQHn6TOzV4x491unRq8cuPXbr/zaoX9/S4009DurxOtfO4n1AsUbsRxtGMc5XmbCQiSLJTFFkoWiyUgzZKJYz6YigOIqnBEqkJL628+GgQjYNJqqgSqqiaqqhBq6cynNn4b1B8ZjZ6BwMVEQeCknUOjbS+b/nP3n/IXwTx2W3+sQqjCGZO4n7t5epHrS3z3wv7vKTM/ekYlRgN/fYS372GAXY49TFnqCDbJC62ZN0iO2jw+wpOsKeph72DB3lqsQ7qbaKmtHKvX3m3gw8vkEex35c48wAhnj9aGvoLIbxCI/xRFu9lMOzpziWUDkPeT3Vy68UtVE73ydqJZ/MRTLXOsu1ruAq1xvgObrB8zU0VUurwzVKaSeVUTnV/wGhSu0DAHjaY2Bh0mX8wsDKwMDUxRTBwMDgDaEZ4xhSGHWAooxszMxgAijHDsSMDFDg6+ztA+L8/8v86995BgbmX4yGCgwMk0FyjF+Z9gApBQZmADvVDgIAAHjarZR3dFRFFIe/38uCIiIIBAKEzewiodeEkgChSBNReiAJvXdCFxWMBaRLr1FRQVHhYBcFsXHA3kVAMLvYGyqIokjWu0vA8pd/+M6Z8+bOmXdn3p3vGyCOWPPKI6JPokWKxcV12uIS/Bqbw7l5/+GJU10N1BiN0GJV1AB1U3f10VLVVEfVUEuN1TiN1wRN1CTlarKmaKpqqbZWa6XWqL4GUYziXMTFtvYllORSSnEZpSnD5ZSlHOWJpwIVSaASlaliO66KXz3USj2Vrf5K4BZu5TbmMo/bmc8CFrKIxSxhKXewjOWsYCWrWM0a1rKO9Wxgo3opQ72VY/sPUoM6NKQPWeSSzz3cxd1sYTNb2cGTPMbjvMg+XmYvB/iIIxziMCGOc4If+UmZWquRGqV+aq0s9miohmiYKilJq6jGQNCyaJk0Wvl/FU1x8tlrEwVqoHracGE8XS1UBx9XUJNBZPOxOqmzGitFDdVIK2xKIbM1X8PVXGmKVwX1VQelqomWECCFJFJpSluupD0dyaSffZHDBCYxme2qrCpKVFX55VRdASUriC9uk83JpI2dQwXrlaIBaRZlM5jrmWOrz/GqeM283d5+76h/rv+ki3MlXbyr7Pwu6JJdQ5fi0l17l+tmuQVuWyAYWB5YGSwbjA8OPuMVRiJnI5HYr5XCWZXTbW85DOEGNqmLl2B5d3n7vIP+PP8J57kSrpxLcInOxfI2dmmxvNNc3r/yqiivIqeiNYPIXlshcL6KhTMLj53vhzPCaeHUon6x8IDwhFAk3D7sC/tChaGdobahMqHSBbMLlhakFi/vbdHWIi96Wpto7TpreczTAS8jOuy18dp5Xb3Mc/m8nl6mlw3/iyf/cOLvfF9g1WekRElbZyytN96SjLQ4I2aDNhp1icbhMs3QTGMvX1lGRXVNl894WqgFWqQGxlSS1ahmjPhqxnxTO48U46VjES/p5kBOjJlBZGm5sTs5Rk6undZ49pgZ+ebGFrNjs5G71dzYEbNjn/kRteMZ8+OIGXLI7DhsrBaYIcejjvAH3xu31bnXGLiTZO6jFvdTlwepx0PU5gHq87Bxt41mPEUjHqEJTxiFO2nMo7RkFy14lgyeoxW7jc0XaM3zdOE1OvMK7XiJq3iVDmynE/u5mtfpyhu8yTW8RTfe4Vrepjvv0oP37GTfpzcf0osPaM7TDOAT+nKQ/hyN+mbUhxnKp8boMYbxGSP5khF8wXA+ZyzfMoZvGM3XzLCbcio/GyU/MJ1fmMJJpnHKnDnDjZxlNjcZSjfLI09iFF8xju/MwGCRf8nmYoBZ/M5MThtnvzGHSMzy1JjvTexm6avWfwLNuioHAHja1L15fFzHcSDc3e+aAwNg7sEcGMw9wAzOwWAAXngkAZAEQBA8RBKkSPAmoZuSZUuWLFMH5diSfMZOfCi2tZHj2LEtf5btnxNlEye+ryReR8laG8fJOo6dw8lnm/IlDraq+703BwaUFO/3x0cJ17x+1dXV1dVV1VXVhJJNq++hX2A/IhIJ6j5CKLnMKKWvJAQ+kdySGiwE3Qn3JvqGM9K+Fz4KHxNGVPj2CfYM0YiDFPVeB5UJnScyYVRmF6CFb7ciARQ/XSDEboNmmtvtVrWuQomWaCqX0LwlSaXeR2jH/Tuq391547dvYs9cnfrc52iS9mG/BwD+JYDfToKkh2zWN2hUkaAHiSiypJxXKWNkmfejUVmmy4T31RXq7IjHQj1dPV53R7Az2Ndj00IFb2Ik4PepWgC/pxI05S+NjJVHsxL/nkr5D9DK6VdvLm2ZvXS++ke08IlPlLZsyY1PTY3/CXvm3L7RfX7v4Y2HbmJHPlfu7y9XbRuHhzf8DZCptPo8+yj7IkmQYX3A75MlmXAUJXaSMBbdLVMg5knALEYXKOkKejptKknQhKIFCpmRsUpQVVPJAVYe3cJKI4Ggls2mku3M7+tm9P1jJ9N7ht+0MH/55Pj4ycvzi28Z2ps5Uykdnsxkth45NVicn9g2fvKhufmHTo5v27A4UMpNHRsrH9uew7k5YMxNG+nCuVFqtALc6LJMOa3aXYS4O1xd7V3Q0JlQtWCh5E6MdAMC7SzlTblLI1sAtwF2gJK5B46Vy8cemJMeeWRw36ZUatM+9szY8ftnZy8dG2MHqr7s1iOjo0e3ZZE3KO9/N/TvJIN6EfCRZCadBzKYSMiysqxSRfErwBzQyunGf5oWQQT85n8H6JXqg9RRfZ7eD7Pw52e+fM6EPQew7aRXz66FrQAz+GUEayd2N2e5cA2q+wD9WfV+aqv+HCB+6Uz1WYFvafUK+w+YxywZ0vu9HqYwmEWFAJ/J52Ei+RRGkXbkJLSPkQW3J5/Jp1UtWqBIq9ZzCDxWSZUT7D9KR16zC+dp/MRDc/vfMXIgvbJh5NBkOjN5uHTglc6/At44NPfA8hhM89wcTLe+affAUG7qeHns2HRuZfGcwHEPjPvdnKY5PQ1/yxKVzzOKY1YVJkl+aS0tYdzwlYLve+6i1991V/V32TPV/0lzV6dosfotARff+gLAlUiXHuAkZNRYtmL1c7YouRfuwvUp3gkA34/AOx2kR49pKqNIL8ZgZmEeDBJ5M0kJVjuFBZfM5iqBAC45d4mNvOPek4/GbgksTEwfuIu23ffbZ4/16ltP7KEfqfEOjtNBMnrSrsJaArlC+ThliTHmZ4iZgzg8HreC4gRwA4lCU9QN8IbeWn2aLr23+pcw0D+levVj1bfTXdVPG3C3AlyFxPWoYENK2QmJmiAVorjdMkgLTjc/ALsTRvwHF8S7UobTHt51qlSCV+eRTL7dEmDmR4Zwe2TgtIwE5C55vUh1+swvbn3P17/2nosj9CdXnwOEDtMPXp1iydo4n+R83K1HNBiYNUwDJYDYiSC9JSoBOOpNHbiT3swu3lh9PbsI0GT6AkBzXH1eyONR4OGfAw97SY6PsBXb5vP5NIJsZNpupsEir3HtFsZ+Xll+YHb2geWK+fOe1JYDw8PXbUmnt1w3PHxgS4oenxOSac78OXZsKodCaAyEUG77MVMOvYrPpRdXFuwOlMkUZDegZC5XPtY2JyEdLqe3zYszm05ofBqE1E6l3F5TYB+gEzdcunTDZz/2sY9OTk+xZ1594tirq1fYoX/ZWi5tNenwLU6HIBlEqTw40AUspMrQo8TmFUp2taZMMZ8XlAExqOXq5XI3U4JjY+UGEo1Vcuzn48OTByfT+4v1dKpeXYjE62kVKvoW6fH5h4dnN+/y+uvo9e6jicMj9TSz2y2a3Qc0c5EAGdfLNsoULowYVdh53OoMyqnG7trRToinsz3QEYBXXO5AwsYXhbHjeVNSA/kq5x+cm3zb5dd94JOf/GRlCij4yuNT5wLVv6Wh6g/Yob/fPDKyBXgzBOv7EPsC6SV9es4Hq9tPGZBtvo50sCJOAv1i0kJ/ppBC0lWMNT6azeWy2fLomCUOVb8vEAzi5otslw1t3X7TpunDG6bvP3LksTsX3rRp8+jtGybnSxP3rpzrnb2wZd9bzx+uDE4OFYquQOeRncdfMVg8ku8dL2T67AHP8p6hvROJCbGGuoBWZ7kOktC7ZSSIucOYi1qoHSgnvOWEPwWrsovN//AuduDChat/wA4AjBkY69sAhpdE9JDE1zS8bUmxlLduxWRBgLl9piR7W9/8Ldsfft9dJ/bsWb6LFnfcsVj8vTfRN1dvu/6WW66nbwbYpo6kIn6wrJuXOPShEtXDpU6CotigNFD9z/v/5n/eW/0RCJ8/ZttB5FKSAWo/yPdzgNOmyVz+gDBEZGVTAHncnQpI/URKQkDwv5SS6MbXvPPVF95x+zsuvPKdr3knQFxllH9NMS/AdQB+H+dyDeS406YweY1g83iEFCqlQAoFKyWJpqS3P0Jd1Td/8uk3/JJ2vOmL9Aa67xe/qH60+g7qMcb8IYBpIym9R5Op1GrUNmLzePio3WLYbhqp/usjX/nag9UfArP9HpfdB6s/AngJgLeTy0nQJVQKCAJIYEWYf9T5+GxJoNKYOyBs+yA5+c5QpgpMOs34E/T11Vez7urd9LFFZpfOLV79mXRudVXMj/RuloX1RahGu8g95Itkg15xCm1WUZXLOEOXG/RazVh5lHa0u9ocdmqjNrfbY9PSBQvmhy2YMbIEMKf0rQJmMNDZISuzNqpAS0VdaQnZ1QYD87R1ubos6HaATogF/3ELfpjDn9G3u6iiYh9AG1VRL9s1BjtaI+Y2A34bwG/ztAHHdLRbPTjq8X/Cgh8nkwB/pz4t8LdR1ak5JMBeacTdbsDuCiH2oIOnulJed1vQFbR6aONjELaDdD/XHzxkmz7pAQmDCgSRbKjL2Ygq29RmfRHHIxRGdye82OEW/xxaDCwKUO2CJX8KvhKWZcEuVPfN/Mvndv6y+tSO6j8IA2PlT859fsWwMVrMf4gMw1gn9U3WWIGQZA0ZtXoydrQBFzRNUw32PRbsKJ8nsGMs2ASJeP7lQQbarXaxrwPtwiCebtG9MYADjSUX0FCal6hE5+aeSi0e1uOAgSypsgGYq4hc5UHTJMEWIqAjmC0ooMDO1jWUFpb0TkKiEegm7PZnsm4bKpSgZ6kozEum7YJivtJgzA0P9kRcYVtnRyE4vKF/eHOdbRefiHZFVbXscI4WMluTpqln0eonFq16OK0W9d2CVk6qOWC9aHUcZ7OpJ4mqhne/PN5rsX4i5Kjoqwtm20U1G/YpzYeoMgstbJpiW4F3NKJqrfmd0mRPLBLwuTsaVhLvi9uHnL80Q758VPBXwK/IwlaUFRk4jAGHWVajWmc1MprNpFPhkNdt12iSJTUtYfCXgP1+C3aSPAqw5/SdaarIBnw2b1NZix60uh5SKUZTvanefC6bqfVjF/1w28jBbdwK+YLuL/ShjavFYGl6qKy4qSTL83NP2YHf+lBDkdntYJ5T5TYglSRL54im8XmK7rbVdRmZe8oFbxTwDVBvLr2UV9COrGst33fN5ktLepCSwf58NhoO+Dpcdpumkgqt2GuGt2Z4A2rGCXoCKgPSutb4wG/scg2Up0azmwMZd68v1pOMp0PTrzw41No+H9smjUrFdGGDz1twdQQDvsBJbcvx18y0sNhr8/m4NZ/h2nzKijWfMHjlMk4qk/8r82n184TVTzf5FfQDUrjGkwqomUyRV1qzZBo66MunBtIDNfA2AA+wud+B86TN4MmbxN4RhRmj83aTGUGg2pp8EpowOiORjnZKI4lIoifeHQO9NtwRpi7alnRoSbF3hOAbWHekEzSDTfqEQikgBwQ4bwfdmC0LM1TTpGWbUAk8bkK6gjDVXnfCk4DXOhK4a6COnCo3+Dv8sIP4TZ/HxaWleq/Hu95l+j3owEnaX3N9fP7kF+p8HwYNdvM1bzfW/F1C7oMEgc0EFNLL63hEbMIjQinsyjBk2ob7G8j9bKEG98MW3Bg5CHB36FOhoLtTVmft1JRS14QOkKnf6wq3h60eHNhDHe7vt/pI8j6AB9upptJ5h4292BjsohcX9OLyuryoYVj9OJv6edzqJ1zrR9WAATVVu4ydoeb16/fzhNVPnGwS/dip1mZzSkAxdT16OUQP4S6kWE93Vzqc9nlcofaQ1Y9r3X66yeehH13fTDQ+LepLmJQm4GJSWvBTiAyI9QpjADKRaxDJVkekThdwVQN0C/Y9FuwonwfAG2DjpgdK2H8FsvBvrBa5fyOAVjgsUbBZOmFn7YAtQzJMDGjnR3jSKRABXdJCJsU190ghQ9GLQtHY4gK6LAQ0m6g+evFOeuPF+ZnORJvD29YdBd3/6q/YM1U7/dkLq1NzsnSEsUhc9N/FzkD/cXKv3uGnihaA/Z2hLmFqSPmWg9NgcJoGeCkK31gSKmw+Gasp6mzq2VZvaEJngg7jmRzXTe2om9Y5NFMtlKc6J6fUpDsZTs8mten/DzKQ+1O5rHIasuoRsQ/4vNy3WhopFkBkoQ6sURRZ1/K19uaHBvLl3jL3uWbsWq5Q18fjVh9hs49egMj7YUKQ2EGQUK7Gr99HPp8fyA+4vaIPh9Zr9FH9LvqFrT7SFAhJbvqUMYy5p2LARrlrQN4NDKQtw1RENOCitNUS15Z2uiUqSzp6cDkeNgsPPtYnLDzEnr1V32IgQjQgJUUxc21CgkJU6i3VE5KRNvj2Avd/BMlGfRwPbZwqIw7gJuIA/ddhOy9TZKg2O+NcTghyErT3us1/Li0uWKkMBhh8lbinBXgsUU4s79+Pvue9e++q/i69vvq7jOxfgX/7q4QOVL9J33YzjI/7tvlcthlzeRuMb7uut9gPhOf7gvB82w1r5UX2gZ0AdS+XoS6xJ69+EOCjH51J7DK6uS/zxWwcjFAK6qJCZSqDNEoKGKvfgTcrnKcFjNjqwwADZFtnh90ms1nQTQEQk1bqIQEU6nIqHtXDoakIDWB9GyBs4uMVsMIcVlkfUSnjB0hMuqzKoCCxy4aXlENT4KfiVJwOUGc5PM2A9z2AMsT5Q8CLr94k4ClUsslgVAJEgZcqIHnciFko4I56om0OpVPt5PDsAh6ZhbZfrYPXvXoF4PUBq0t8mGzNIOuA4CABpz+BJt+oo3lo9TjA4KdRODxiDU6uG5xNAcrXSIW4LKw+L+0A/jTgkHbqh9cWP9XmZLClwBrsgjXolampSZ7EFcFVST0oPuXU220qszGGchq2H29nu11r6Gv1F9BDmu+HAuconxcYN+CMOwA7/2IYU5Je7SLf5fveAb3DtMxZvWUeMICsMci99Ya44dFa0mFJALAA2ODmcUeLbWThrjWbxxqDW/DxX8DIdtTxXmT1N4RN6oF5gZHAHummbBaGC9YcWNwSN7QauAcU9C60qhy2GhfyucJzoSc47HZjHf8bwB7XywBbtmkwNpDJYEFexhMrzgSNZ0awaoPwn9ebSWmW/gMy+N3sGYDZIWQw+QE0PvBphyZz16IQwiHhYVT5CZHQUWADjyhAVT8MAKym0/UtDB5A/x11UqfHA4MwbPbdeE7E+bbTkBUfgTH0g30Ligv6geTLtdMj4/iCUr4kYZtxAxukLH19K/sGMeGkyBV476IwfYME/fgSbQYElnEcHkdM1UJaBrYNNDbRu3BOgKDn1+ABZm9HS1yAhls5DTsNGj6Ha0iQLtIEBleKvAydR2ToLISdSfLptX216Ko27lpf3TRa/aY4/VFhDciGgKwHBTBoe5vmsXkELI3DgsWAe9NhfhaCEQbQF/r4wc6n860O8FzE5ffzA7yyVq7AOqn4NdC6blxevusDH6B3/tPWC1vprdV/vHjh4jcu1PT2J/lcewxb7W1ivdskfh5HLHO1wYHtxtM+twobqAXj/RaMJLkIMMb0UhvYvBwOm9fqDN8GSE6n0w3bvRfh2Qx4MFdPcvp5jLn6MSA7+ykDJTFnwToojdzua+B2yZwrewucH7f6iJA7AOct+sYQ4NwGey7vTJoPUnkW4GmqzHU07rBuAJzKpNIC916Ey88gOT29Bj0/AXALoGmL4VPlcqNmcspY9z5QwDIq10iIBefDFpwYeQvAqeijo6X+oizPgpgCYDJIp1Z6Tl/v8GDvWN8YwtS0TAPMxy2YYQ5zQh/rA0BUOFZwnqh8ubX21Ns72DvoDiBUnKoazCcsmHFu64MWpVHFrtokdFS1xnGs3Ne7aUNZH9OHBnpH+0YRqkPgCpK3RIj0M+D7ECmiZMYlqMB614DoxqGHXWWKQpZt4pAm3AX7TrKrGC4GA6gDudqcdhKiIYcWKCTMg0ywQAIB9JKDSprwZwwd33JxvXnuEir6l+bY+erd2RHbUx/TRnL04atvGti7MZncuHdgcBF/LpaPX5qbu3S8vJI5XTk3cTa3ciG77WipBLp/dhvYAEdMG6CZF0JkRehLKkVSk7WEPmURuthb9IvZyxZawUqQdwuZDIwApIYJXCdMwy04iyvSFpx7LDhRzgP8XAkUZ7qu4tyEEY+MMM/bIyQH83Xf3FM51ENcsCMWCz3xTqYqcoQSRZqP8E9Z06dL4gXcCEBlobxHmNGTxrFbRI+LzREfmyeu3Cg1j11hTff15r35ToxCCaYqeOQqHJeVkmadteYkXyBIhSdTGc3mKFrSW9gT5w8XS3hmPXa2r7hyuJ//Xjlb6AkHaDkymcLTa/qNcKD6VbBa8LhfuXHo0k48uY5HyzcM3c9/7YnRYv9iD73T40NX5sDenuqjXj8/+m+x3iJctoLNMgZ07gMZw+bLTeKF4nlYqwkAMZOrn0d+Rs75IWDImRVxBmYXp+U1L5Vxbm6vnZubZ2BgKNBIuCsk4sRoO213B5LGGZiA/34LfpLsAPj79D1dYGRhH2zeWe8LM3px1HoxTwdCIewn1B3qjkUj4Ya+2oy+QN7fx+V9wJD3XwUIr/ikGIoQ95l1x9FoYCbNdoaB2WLYS3po3ZHzeeNn/9J7AJ+gQdsd5Eu4n/lBjw0wEQfQSpzDojglWNPt6c8U0sZeI+A9YcFLkgzA26ZPFoEPLJhSbY9cA9Vg+EKhMFwYdvsQNhfAGKfg5HEKk+QzetCKU9gMyvoIMNgw8JNinE70ghIDfHY7kEXSbuM7mXKuZTfG4UQfviDJ2qWX8IZeaGis3net1qCjOdOZtDuWKaRsWvdLDJtY57Qie81gitzMmU1ta08sXnPN8IrBPRNJVmo8uDihVep443esuQzX5lJW6uZync10/blE2NV/wLm0YKfJR2GGl3VnHd/NPRXhJ5trQTYqQVFDCWo9AaAMWQzaGEfSgTGFMrrSFJjB8xgNYnrTwOZSFwx3RyfOm7dUTmFIieHsSN316L+y+R++4Q13PUpf+9cXLvz1kepzNAPj4rC5LAkZ/L9RnAc4+JmIrU411NZEsNjtlNo77GinOBvOgQHnVQfHuZvcqzvcgHAnt90Eu+fBVlUV6XYChpaq3IduIUU+Z7fV4GumNdGLTZmkXnrRtks6er+6Sbcb+ZefvXebYTWt2VNE2yQ6mnkwHBcBOFsa2WyFHRC6QxfIxLNcJoYMXvgYPNgvhGFUbSJT49x3GXOvriEmN/nanNYxrTD56uPU2mDrHdWHsUvQCWX09jJJMax+VRjkRtSsv90PzdvSCbeItyr5S0a0mr8WbnXXZxui1S6/+sTxux+mf/XDraOjOo6Txx7xfazLkLWXDb+UJQprEUmmruz2prx1urKA8WELRoycBhglfagn3hWq15XXxDYF/LGIPxlIIryanizgPW7BC3N4ZX0ksEZPXoOb3++P+CNgvwNEU0cW8J6w4MXJLqHL1+vIa3BLJgL+fDZRTBajYX9PoAchOppwrNEtxNcU1wct3bIVciF/yCNGmy20gpPg55UgA2p65RrMkPHF+HrrYNxjwYhyeoHNY+mUa0A0Y8Jl0MxqF49DS5ODuqONEuYC9sX1jC6jiALMx7VB4cNCecYlW4JyGx0B0LNNjbjdB534M3kRqQwKy1rPUbYpqO2elYFinScp2/fgu8wIt1c/4eseq7mUkpvj0u89WhfwVjc3P7Ho0cPpAVaMnaroL1LBItI05SSs1/Du/9K813gzQs4KWZrEmAeuUyZa6JRrekGztX4OeXwd54OIsQ7/A+AO6f0um8Jj7UA2AiB6yYi5Q019Wa5F/now4Dov9CcB6wkLVpw8LXA0Ydmo6tDskkJVWJMNMXyRcEd7Ih7ORDJ+b3tXRxcH7DR4tRnHEHlS+BksHAFBQNPEUaOqaiHZ3t7ubsfjDQBo7LcC3uMWvDD5urCHO2CkAqYRSWbTGJdEDbgCRF+7z+3jIO04eCO25kMcx5hBx1sAJkhUG/r7uENFIpJMLlHTXcuWLRcabHEOaqd2j9fyJQl4j1vwwmRenE860Z/IYbJ5jFiSEbAJFY/AVAHV4aDU0eno5I4+DtvWCPsJC3YcrDjOpyauIAPsik1C95fh9DD2wWAAEKWxSCARTLg7HH7QUDhoh3BbtaBDCFY1n6s62JIsDh4orYuD5vi6HLjbc5DoCQN4PAaSw+s26HpA8JQGy56JeMia8twYGWlsW5RyHcJBHR63l+98Ftz3W3CTZATg7tJn0HdlwpZqOspa6JqA7nRSip4sHrkg+rA39PGE1Uc3eb+YwzrcMeCEu0paog5oU0+nM9AWMEDbzDjC/tWf0/9Nr5Io6SW/Y3jG3JRJsM8zEDc0nWKKGgZ7WwErvNUTGZ4siRfjGLsKixItUK4qxoVBLmuMy4yInmrRQpb9ohmG4PDTOz8lIMBg74U13KYpJEqjNi1QCCZN3R5VoyTs32P4l9+dKqtqTgjlMtf6v7Nw+vzh1Lbkhon4zkJ+/NzIyZtuS+68fXwgubErMp4YGrddt337YkdnZbjk9e0Ldy0fqn6mFI++K9nr8+9zOXNAl5nVX7FR9h3iA+rfP/fUAAzP5wJSd4WYLNnwBG2+zcnYbKThY2p+vCReCeJ+wreSIA6UnKSmbyJS/4RbofiY8KdLejtXLBKBRMabxoSvjOGKAD2x4sZRd7MMEMBvKopsNK0fHC7ujtx6Mbx3cPDA5lT1V5nNgcCWtH7dwV+Wj0/l08mt7Kve6rcS2fz0sRuj0b8Kx45OT13Pt73B1efpT+kLQHzQKXwwGj8ed8mAq2RlYsVbZ2LFaOxamVi4V9JSejIwlbowURaR+uUNK5mZsJ7edODAkWhkKj+YnzkxNrY8nS/md8W6j21HpBjg9CsWNej/gEF/N7B4NMIEZtK818Mo0r/uY2Z+bNLfdP4EhS9EgQ3MoH/tieWyr9G/g5Ce7q4g9O7Lp1QMsi43jg6mIVPPcfQPDLqnJw8OF+aiF6sPHpxM4wyk9Ou2J5HoZZyGVJz6vFeTv5y6Phr5H12xo0SM9XnWCWswDGMFCReGGRD5Cqg4q9RANF7vzolG4t2RRDSR9OeTGibNNKZb+NFRidhJwCWJbJZeGVjegP1nth4ZLR2aTFffaLtuIjXpf/3IDBhRjh16No3TUIFpyE0tj0c3LnQFaHRqojID/IFS5wH2PFiVR3SHDSSOnQpTEg9arDSZ7t0qNY9kgrii/WhLhPFADqTUytqHS2B0gSKYSXVqWgyNQbG4/YJxTKOw+6alA77edm+4I5d+3esu3kSvLO09pMonZDmVOXSkepa+26BhjkXpL0gP6cdIVBcIqHwOBFQ3iK4g6O8B2O4U2IxV4SoM1kSOiJ9BYZQAGU+KfZlUpMvn6Wh32kkP7UHJo9TNfNmMqDGstGbZQz0WG8xHb7vn4tj5Yr4wn5ncGt77/hpLSPkpzhC5VEK/+ssTF7qCBwL+ibHrEtkqssY3u2JHDJ2W4AH7d0T2D+Y/eCgeATL4bdZUx+K7ZStPFIMKQC0T55xCVqCEdAuJ6Z65GN07Mn/y4qaRZMWHAuHzxYGzC9VP0b6xbfFY9V2cluPw/fPs+8QJ1jxYBNbC796NQito2IJtoGGLAGsQ0U7qVIFQXlNEgxkXhF7vi/X2RWN9vZGL7Gg+Fu2DP/Lnqk6K53hs9furOaOfCJ6cdMIUdcAS5jlGZo8wN3ztslOojyQYBvaTUNDnaYu4IqJjraljqRbuxMOfTCTu7kw67d62WOTi7ho2L3xNlo4yFo6yDVc/OzVn0TwANHeQvJ7B/Dk8LhMUR+7lWpwgNubQ+UTCW8VdKWneVM4/c/Ev7/+nn7zlG0jdrc/+oPqTf/5nAZN8GmBKxKN34En4rJA1bqoFC14g1acvsu9cTbKvirZSL8iDDDmqOyVg3rQdpBszPJkBvpJOIj6AjE1TJL7F41LDD4S8QB6P1x6KsKoMyaQCKW86ZYRVlfycPYJNTBJoYpi5gZEFb/S68s7rL1YG4iM+SuFn94iXXlks9JeLQ8PnFqufoYOjk90xW6dN/BqLVn+rxr8wFi/ZqzskCsPnMyyG4uUSjXKZoMjMcKcE+Th4IAIXe+aTJd1l8nfKyEk1RrAeg9Mr+9awtyFvcxynOMmCTmKIVdziDFkGW5zfB1Ig7o/n0wrMb8UUrEbaX1D4Z/gGN5jbfqw8dv1UFn9iNPILm/csbtq8Z88vUZzmp5crlRPwc2b5xuund1x//Y6Zo1y/KLJRkFe4v23XdZxl0CEU2UuZIs3zJDWDMCCo+A7s5+6TLmkh4IctgGsHYn/i7pOgQQsTxWzO7a3XEGZuDe8d5pIJFYW5yF2WevAt9uWd6by5QSXj1f9kt9TrB0ivIpetiOtWfYsLzHrYb2XFw9UgwM+SqYi1KmQqR5XybRR1WhCmPurT1gpTmMprCdCLDWJTsfZREJsVGkhkV62dlPMavZ1WiRt2gDY7rI9OB7C/5fT0cHkpiGqEhkR4JAmXaAazNcSMuIk76zVjRpC8AXN7Qkbz7RhsD7hcic78NlgLN09spugzU4u56qcMnyjoVX8MfLZeDmD818oB7CoPz2b7xxPppZ27bjw0enKonJvN5gbj+cNzu+KVucLWWzfMgyXcHYxoHa7p8ZnrYvHZrmA8Ggppne0z48lNxa6UwDMONsD97Ldgfx/RB0GbgjUKa25eVUCRwg2bLlvTy50OMWUhkwJT2I0+kQoPWqvwqEcxjX7uGHno7NmLjz7ak3XHAoFyYG7PQzR45A2hJ45UM3FFW9a0HaLv7as/B+BXYC3u051oz9B5EPAY58MFBODBewY2PCWZ/tag+SnX22qHJjUB4famUEB4hVMGAxlSZeGucT8NkmHcdxHERGn+JL1SfRYkQ5yeqTr3FwfP7KGzgJMTeoMZbc45DLbKOSzxVEHpb79+zyOPvOobAO+t9JaqU4wNBBn7CsBZm3MYfJGcw7ZbXnfT4fMnzh+64XU3nwWgv0NPVR+np2HnPGnEdOAe6kTp5dBkKtdQrEvwdhKMyuHcW8lh4iFuT1rbM59+6M4773v6zy7fd9/q808++ZNq9eMfF/jaV/uYi88FwG2XmURcXFgbcgg3YSB5F8MoY56qHayI0at1IcYf9//xfa999J4fRfdOu2IdPrfWnRsv059XH6WvuPqZnZsk+SRjUdFfDr79IfS3Tl5i8KXkJeYoWyX0keoL1LGfbqWn9lf/Oz0JNjO3a9m3wGZ+AMCptAs6+7Fh3+IW5AY1ygGfZ9KgJEZM+7bFkzr7tkhsmqTZpEuWFQvybHezsWs3jN25p0bgnaEXe8cyf+3UMJL7iWbTLhObZLt8LXPZaL+0pHcxOtBfLPTmkj1hHlVmU2mMxRw8YcWixfcsWsQUQr4ghtS9Di3GyoMDsgbWVfc6JDEaGJTJO6gGCGu2lfVcACZV9OK1mq4ZnB4rFhgtDRfGi+PN43M2ju9Za3xhGN83jMisItVsLceownyv91SGp8bIBpx2BtMHk1ibQZtt7aw7zPGNvPgL1igd5ijjBRglnucNDQ70N4+zrXGcz1njjP8rIV/5NXm630TSZW+TNM0GOLUantMc3vCLtrdG5zRHlxmv4Cxu2VTZNr5tZKgwVhxrHmO7SK6SyMDq89J1sGcOkQrs58ClbkASVAhmOp4UuiXHVGUgzwAPGF+0xTPqUPOUOPgk4vsZO6VO9D4rKy4bQ1RRqMR3O9DBe1JrMwc3tE47Umu2mzgctVeW9NTIMCXT2zdtKI8OV0YqaD0meiJdhudqiA61r++5ChoKm2msixOFHNiohtUudq9sNse3/39cPHOuwau18UAovlSqN+dnB05MbDqfLJyhOw3D/mq1MlDYGVXsUnRzEh1fU9v3dHSMGY6vXDqds+z96Wx6pDBYpL+PZn/1J8m+VMIVbm935UgLeRr6O0J+8WvzXuNCuaE17zUK1OEXfWmtRB2ANhpIU5DEpki94doiNcYX5EAB5GprsVOjydMWTaIgd575NWnSV7dP2JZxbL51CaIPXLtxC2n6IsNCf3AXvQrrb5BsIqsCpZ6a19dGK2Mg3fpDjGgJUBTx0EiDQaXXNqFqXYsQjHXOGGEvIG3TqK1e7msa2A12sb4MJTOh4IynDBHV/IKq+sVbfGgNL3ESivb8GPvsuq+JzZOSjROjI8VCNh2PGct2kA46ruVwbpXB/RJ80E3x5cUXc0k3BZ83eKgt/pOKFv/1AP9989fkv2FiIw67zbHiovY2qkl2bd0t3doTyi/pnV9jX2ixx0c0QrsFyqlxWN1Fane0HLM2X6GoyFyrlWy0qqOBXbLZa6NwOLSTwDfRdfdFIZvKL+nFZkJE9BKWgLNrjpU171+DfLCaGd06CTtPaWhgXZ2B+/a53H5I6MHbCbkTs/kkFgCzQVK4l1+gn8J8BVlhl6CzwO6a55+nLp8ys8h71ibcNzZZ0r2MJhM9cSO5uZt113LuBT7ftvBJJgg5oO/t4ZFsdTjJ8yYyeHTWgE59qnY8zmg8E8+kU8lErTueqo3nGg5+rlEiD+ihPqoqBQmUhhgYjwSzKVBmmcFtSZEUdTvCBjsNE7fR73oOJAYXLHHVOL2SCZUvXaMVP72qz5onJVqyvdyc+dq5Sc/R0tqM+cHFjYm1JymZfrnclC2v9k8tjTSerVhz8Kw1B2FzDjACrWEO+LElg4m4BKN7+XNg9fWc0ReeXb4FY/H1HU0ciB4vTsM1jGf00gO9gIju6+mr9WHkzI+v/opdYd8hWXLZzvNE6I8It3D4EZCXUsVDZTUWRScq9CXP+6gCEqH5CTOeLImDjQTO6rLAqPEUSTNPkUQPcQySAJPh/HrNcGE1t9DWHDrBsqG8VEUCFg71U38+zU/axVnYIRgfntG+yzoLs+EJrGYD6mnSfDDAJHEWZn2smh8bZ2EJ0GUVflx8HgwSE1G+GaomoplWbezU2jbN8zEv4Se0gFHU7XV78ymHFl1zRla2HEPXPiu7dOnixo3rnpdd2r7Xe2b71S/XH5mZ/nR6RdTcM9xTHLm6mnvCrU6viAMHys8b8J0OrKsEdMPTc6z1Y3mYRBZZypvCsnta/RkCrNeww4NnBwsznclv1p0YyJZcY51czj4s5OwkIfd8MsKP8oR0LRBNxVzMS8bJ3gXgr8BuW8vjvYieNyKwqYiNxvatm8JkxKLINj3xaDKWTPrzKTtG+1g4fc/CKRYjZEGfE0gN9OeyZs0DI4GYnze27iWdikULvamh9FCtGxFUZPXzbaufJPSzX19MU02NCI9O08gxERXGbm/ZVQq6Mqtv1DpzNozpWauvsNmXqom+eIUFrLVwyQo9RI/Lf72v56y+4jKXk5GG81leBEHVQKPEbhwtuxkaRPqNjQ5uGNog6n7UOnNBZ2v6Qjn5GLy7S59p7A3XItco1uMc7Ki5C0fDeGo8GoJVcX8DjxZJI+0uiFGtx6S9ZgEFkRx+TS4NclpnU8CqzSxUw+1pC7dorMXoeaQ+ouRbB6Vr9MHjA3P8LCpObtI9eOLSDVqHGyReJ5f9RmwsqR298AKr1n7EE0x7xHmB1fmaJkt6u1HBIJNJmUVEzWOqhloMTUdW8zs6Ei6UMeGGs6ubp+dk+XrGIlF6U90Z7eBqF48Z6Cej5F69HfZuKUGp3E8VKs2bxRk02Ow0CZa0qho7qol4TOiSACrB5b7ZFCs6KeRsqzdQsXMPDowMD4wOjhaAsv6kHaS+YplApg7T6NGoBUyasQhvN6Iiy0e355rjEWa7NyeH+rmZdNrwYHzTCJSkvTPHGwMUprsStniF20hsC49VQLr8jMXZv5A0GcKs2QTPBk9jyDIeZ9i5fx9YSlrBsz6TbbKZYl9mKDuEBiCGs3hz6HQB/SxYCVqJQMbGNhYIwjOp7vzvl7ldvv5QObkpvJzbu3EyvW15w8iSnsWEr4mjAdtIfmBiz+LEhr17mbJhyBWy73YlfZMTY5O/d2rHK/YWMeVr+OBkipYLExfy1eChLZsPHdyy5RBfEzkW5fL7N4T87ifkgn62HX7tzYPhEgfzJgRsHOSxDRsmSiOyNsvdqxTdq02xDvbmWIehQUYr5cFNQ5v6wfiNhv3ezo42B02whNPU3bD/Z63+w9D/zfoNQwC9JQ7qPPd9gp0FAoQ7ZZpQcDSjMAgoDJYHy6OlkeFmJNqM+lmSwEMaht/SZJgc0Q+BliOB5ajZkpSB2FdZmOepwNQSCYsu2GzCc8f1GwYj57qWoaQnlAVFRospHgsFvJ4Ol5xW0u5OhxYq0FSlJL2cWI/Flb2Lr3wp8R5s5UsvfO0lxXxYdH/OoDvuBY/Dg9P6iXVmHqZcs51sSfGWky42olaTLuTk1OoV9jD7BdhNr597KgiSxNEO9rIL1aX5iPmHBH8siccBEBTySeikW2SiS9Q0ivHYNVz31MjXr+0gIaMg3ErzI8zx6S/kc+lkphcP4Kl59tloOokzUszD5IsR4wBEFEg7o2/0R3du23zj4Y3H8uX4dLowmuxdGB0a2TgyMzYzd9tvvOrGB0ubS/RVbp8jHNw5NnskntwZjvYloylX2D2aHxjN9aXy5UN7q+30p69+5PTekU29CUEfN56/gT7Oo1acVJWR/YzzUqA9DF9GLlRVPmwMwzDrLsIrEYxe8JqVbWpnp82BDAubN1+87776aJ0K14R/szmiga1+BWMspMeJSsLkNXo7arYOwKoLsMK9oJeb9vDhZRumJBM023k6joGeWRYy0tTKagDtlRNmqyW9CywBooW1cNDvcbe3gYmrEhXLFoVAcGqwhIIS6MzN4/kfS4cP333xru9fjC6Wdp+4uLGUHPdK3oMH3/CGF/6dfan6XGGwcViwDjYCsae4vvIRoVO/m5A5oah0oRAH0X4JmCvAq0mY+j8e6YuSJFS6XP9gCSnTWJVkdXX1rwByH5exHzFqktwNzZtqkkBPK/Wg1qlJ8nWAMMjl5UeMmiQIC3YhUZMEy5FIqM9c4hUJlDqArcuSIMy/xXoaXBZ8xKhLcgJeqeijvCgJk05iSFaAl5UwgV2rMgmnqxHfBZr/G+C39SO8XC5m1KayqbSNtakoIQCn/wfe+qw1L1iXZC98slfMTJgYgxSINU5N0KxcQlnT3HhalQLhtn2O/in7Ptj2b+C1Sx4hv4JXDuvXJajGeni+glO2S4g/ErR7t83BzBGg9FdPtVFegao75nHjgHrzmVSs2F0U9Kkfnsvwma3+G0ALcl30I0YNE5zHot7Lz6NFiojcPHvNdVdAF/GvdpG/4vFtSXIr+tyYHOA2Shu0MyqZ9Kh1sW6KEjQcfYbfL4EhKjFeN0U626qljPYfJaa3rXVAnLeVv9pdsoLzmvzS/XXBelefbHJC89A9oNGfAy4b63g9snovPLhBb2+sgSJ4otsot7FixjJFGxgWsw3raqVgQ7WROVqUS8H1Brwh1ttH69YbyGT07jEeT4AlGLBSCryFwoI7EpvMfaNiii/lTWuipttM9bsY/wdwHzVy594O7Q/pLiyYgrGAWNph1nC0c3tAYcwokFMr++Grlf0wG1BR8sOqmeIXaRpWzCEQd03N/uC6Nfv9TQGH9MqzRrghUJPLTum3AQeNzIg9IMCvJcGMAVE1pj4Gqu6BFXGxpLfJsqzJGg9R6Sp4S1rKC5L904994LTzovTbl1FwXx0XMuU6gPF67oN7rEPUankAHmzWHTKvTAxTMSvcap3EqMAQsGa/3YgRPm/M9yfdHo9k5D7Eqt8l/53PxWN8D0j/kpCxp2VqTUCnyOo30kwjaKO5RBGg083gTDzvrsOzm/y36lfQH4T2wCzKLnx3xZTzQn56ZLGkcXuEbwV430nCetDpgO0EY29hYox4zhCP56xgOKhfg91Po8cvHj168TgtTdP93uqPtt+yvfoEdUzzXCwe24ty9E2Wz+idSDGJeOuiJHuIqhBFJZYP1jRPNTNkUqyytJliJdo1BlFabfWEUZMbbfbWbUD3csMGEgz4qY/Cukh5bLX8MY7zty2c0dcDOgdWBjTxlgy8kybeXHVowNxmYZM1kTYbNaJks2I/g34/rKCIH9PugyZedXltsGbBtjfwwjX7O/Dg3FpqxtYQkNcpXAZ1J4JO/m5Rn/D0erRpRRqLLs9adMEKip/RA0mgSwDsJRMLeT5BlVmzJIFZbtRm45ZJtJ5E9sbJ7SWmn67WuBFD6wVeTs+quszfad1yCQ8raKEXTz7DobU05XGynD/fLPhzJyGnakdFRFaIdVRkRNCqdRG0taMiwo+KWjQBagb8eG4gUhWxOEiqUNf396y+Y1ku2YuFTFqWZzXMyCVYvaYlWEyB7M0lBpIDJlxbI9xnLbhhgDutb0vyzFx+3IEjq1tqHLhWBzwBwBO5RA59riZ4u5W3JuA/Z8GPtxGsXO9Q7RIecGi0EbCtDvBAP+I9OtI/PjBen8CZzzgRPNrBz0vvoVdBdvWTCfI+4dbvAGNfjYeA+bpgj8NaKfiJve4Tw/+fAmZjksbO2x0M41mQzeK7nTZYsPJJvPMnJovgM9FKxMaIRsRub90ejIHBgXyuXBqYGJwo9OX68/3pTNKfTrdhZKhhRa8X5YIulYzhE2oOp958LtFzZmPp8GS6+pgZ2rI8MbmSTJzfjCHW7D7DO1Sd37y41wq2Lg8MlOvjWcYHBiv5meXv8IiWT1vh1y14O1Ql5IIpRw0maJ6sRuZOaEamNJHX5W4/Z5Z0Ali8nhON/vW6/hODhJwV/SexX3kZA/nXY5UI6o2YX02wbk/LJtB5wJ/nXFpbXs18+rTVfxTWwYQ+xusAYP++dcbdekCmn0bE1UdIhgyi7wDZztvRxmTSX+yJgywIAyRRz6fpU0mx+LTLcsDiukOFkRecizGuCtee8dRGo4WZq+3LwTCyg7nBdBJN7bw3z2Pj16vso1V8AXwIjCcC+nPwcEiPJ5EF8zPd8cWt8RT/fUd3vKfN+aedWf/mPY9u3uPCX5WF5PUl5LqANwu/jmKUf8CXqYYHvT9wtl3/g+unI0P4W0u5E8kTcr/ePgA8lORWTD+VDW05b9YJA/OFW+DRdbkg21xa7Bq8UCmPDKGsX8sLGDf/+5wX3ybkPHz8W3qbA5Qst1Oui6CPN0r9Wji9kWYaqW0OKE+NZo0B9mZTa3MQGbEtmizxahNYcpd6qCfr9Zg5tyOA5W9yHUTgm/wOIffqnT6gZQ1nycA5YeJsxhHUsNZMVDImwmabRnw0Ux8OeL2Ueru8XVwBEEjZRQ2i7up3MffAwikNZuobW9Ew2ky2htobpsbXgiCNNTpiZn2Wl0E6XhcEcxL4XP+mmGsF5E5ThRguhBrnsFXGAhbYWlNvKH6tOjFW/9+2+k/+b77/NlUyMjvXrDlbC3xNMSMj58LBcy42k1fU1TPaCOrXEKiZgzzUSYR8JEBi8QIvBPVUUfhXka2KQ3HGq0FBG4KVXdZttKQ70pk0liLCLMaXkr2hrluJ6FopHecX1saBjC1fM8VDP6o1BYSckFPWHDxrzUHYnIOGCkS8mhQW2DGUoZc4B6L2DM6BBT99I1lThShWX4Uo/lKrEF2Lu0QeywPst0gcs5S6qI2Eqd3G5h12Js2qFIwCYqPkPKb7ChsXFo7NZj8J2k3MvtAdTWE2qijKEy9UePRCzT3bIr2FJ7g89lhdisuNcyd5jsvJuX21LBfG8fqslAZeiuDNSH6qUFFJ3WHHgKJZbMPdYWwZM0yCVuH0mCoSbbC2aqxAK1pKWifbhi7ckTr0500pN1KH/5vVkdZ5N3FYJ5jz00/epIcw56fgYYrcQ232OJorwpktFkoRWN9uU28ndhv8vI/YMD/h3DqJQahBQnNFtV96Se2X9Pa+fCbt9nOnOKd8yyGut2Tq04xG/WuWSNfwaHPi0Vjjkjjn5LZ4HHgW6AE8+3bDfnwQ6LSid3iANl6eD4W3NBqmW6LlaBoryXUbFeTWHbjT7RGzK4qUY07gmFVz4Fbdh9mSvK6Al9cVYMLnMcLrN1Fjn68dRft5HnsXv5UIQ3jYw60a8ei8pgTCDF4VGLQKC6yTP2gWFliTP/gV6e3e6jeTuboMwl+yM1YGIdCW53jxPecdYs/ZQMi7dKeNZ3u5atlePQ0ODK1F6lcrR4fWOhmswdGxTpsmR4fbm7aZMS0C5+9ZOMdChNyhe+pw5sWhTFs+ym8jw0o5rdDWe9Y8XpO6BhoaVkTBalImMmYcj8DlWQuXMOByn94RAHg2fihXR8Mk+lFEFRsRX9QKnew6jdYgtdbpAmg5Gmn0nIVXfBXxWjuvCX7dGYg0DCsIoPthLUqZ1m3WYBRDG5nSevvYxKutEa8av4X+k5D3t8LLrPcj+lyf4TKtG67huKR53RkoROuznJ8TNeQHvmuYaQv3Uh3uiSQh72mBexxREaZaa4oaqnirZmtXCjzH6w8U9bx9fbQpjXI+qK0Wh/B9CXo/beEcBf68rQXO3dzRhhj5WhIblc41DdYulHXIh7mkXSxMr5Ac+biRKo8XeWGxCgePMYWNNwddzUWsB1LjgyWzPB7lVQfAsjxl1IeuqxVmndvwNob/UKDXWFMsZtQUa9WSU9SBmez+TAY398Q6OQX1N2ZiHisjzVkEPJH1oshqbTqsMVJaazmuNR6jPG9AzFcPzNfDLeYLHZQ2TbWtiNvjqKastFy7veu3+zXWb03eRSKE/KEeNH2piKck8Gxypjb6R9dfFb3rN16zNtY4U6+5QhqcqfWykucC83X920b9qTfimdKnzdJjArFIw87WmCocqT01HtTXUMNiKvVl1Gp9Pmf0CfJ5P8HqXGaXvISaJXGbOrtWHbXGsYB8nSLkeNNIoqbI1FpBrz02HjSUWlvSO5qrrdWN51mr3/BNBO/uqa+2Zmvc2Bq7XVNwDWDynGc+lncJ3SRLyDHd2aEwibQbxwbiCLPe9bEmI5oXFKqvT9/wlFsqmRSWZTNtJNHvs1a/YZmg1YIVIq2+DRus5pBeA9ioFulD2LYm2M9ZsDFPdErfWjcmXjXSckevAdtcQhDBG7K+mV6h/0XImRb0iptOVLV1FxGUspb/tAXF2kWJRy/2bZzL8nxx3ve7xVw5MB7NUauCto77qT6bfB33U4sm3IXSXPGN01fg8W0Lj+QPCJnXdzVWfFvrUqrr48S1i75ZfTxn9dF9mGCV4NpY6xMmWuK/fs23bjpC72af4/kE7557KvlfrfmW5OvcTFVSsMybQqx0u3HGI4pM/rWawRAaW7Uu+Gavi2Foyr/zr0m2+4Mti9fNdg2HioWu8UxiYG9u93VHwuOH+lKRAa+v2JUp0JHto2Nb7I5UJtPZOeX3zW2/mgr47gp1d7Rvsdtioi5MDx2mnwG6YF2YKL8jhEr0rFllCTBNZ/Np2R4ueJuqwWTMswvAqKdnbK5QmKv09FTw51gP1aeGhrZvGx7eTn/ZN1uJxyuzfX2zY/H42GxfaWamBF9AHOz7dezPSQzvPmiuwWZciyTjBk2WzGgdQvc21GFTgWLXqMP275GhQCW+t2j2PbA/Nu4vRYf0rfT+YGBDPI0f4sN0fFMwhHhZddiM2i/3GCdObrMADOUFYCINn+DddIYnP7SmNIzEavLfemR5N2v5JZ21+mvefErTutYml5T+qwXYtlSd9bkk3DePteZArlBVyJV9hHzJGKsHRhaLYhaUOda6T+rGmrFyHHDfaR64TbIyhoT+sU5jWzMp+AF5LRFk/Yagfvga04e8+bQhS8T4vmeNLzZEyH8TaAeaxmdkhUQaHki1B2YuUV3ayDojxaT7tW3W4q2H0inUmzC3pA51h+HrF7g/a+EeBtw/bJwsYdJHA/4yniw1fYrX6xpY5+pyQ3gVjibc7RbuhfVb2teOIJyCEZhpJHVjcDaM4TlrDHFQZH7vZfJXtjHPpBl1h4V637oNHWsx78HMFErrM1Pq8Hc14F9bHyEbIX/xcvE3M0ta49+0QPrWbd1iheQaslCuuURCfKZ4gsi6vPa0Nc4o8No7X+Y4U3U5KuuvjVzrVq1Wx/oYW3kgYyCfc2SUfM0Qu26wLwYHgIF9FPNdqQQ7vizxYhnWIwpKc+2JD8aC1m+Kn/xomoU2xgDYFGZU9OKnkQm5lvjII9zOtn5BJD6uaWETCTPYzpoWDyGl4WIfDCKXyXoxgS3SSuC3MJGvvQc0mcrVL66/JTRZzrUdwuQLtJcNvugBvvjYy+SLPqIRu02zr7RRmxNg2NSV9dfwwDUb/5rruCZLIyOE/FSgFxmCNZSmNnvDeJT5QYqbQaunkvG0bnwi7cRuN24TX3d8Yo0PXPMNx9p1XgQL3G5T7SvWi9eiyRJeaDdRGR3pL6Bu2SiUJZJYzbBtrIdsJDvIIXJcP9oO+lQHVZkfhjrRwyTtuhKzwxix3ukcBhSqlK0YaVJYWcJuk+3nTTaO7zY9CQllYd/i/OzMlL4lXenN+tKYGeuti4SxKsjVwhDUurPBWkl5/r1esxTlYIyjRXhpc3LT3oGh/d3tlazNpTlCLm/S6fYmN+4ddCc6vMFI9A937Hn88iteu3GsJznWX95KF7YODW3Vh4e2Vq/ObNt/Khz5UJvfEYrQbbmpUiweGRhk7IQsudoC5Vh+ajgqy1qw3e2hNmnjyNzSpvFY0eHqiyZHHIGlsf7Nm/sHNm+uviueyMY7vcBMjGoRrFXN6Yq6RqfQNXyEvFK/o4Pi3cUqCwB1NySAugdHOXXtSN0zp49dLztm26iDgLHlXHlZ1D6ydHJ56dyRc/v37p7bMb11klM94zJ9BgKfZy18woDPPfpdR6Cf1jipAidXG3M4qdNBL62LjdMZ2N0SpaWlpeWl5ePHrj/aiFQ7R0oWOPF8pkkyR45iThcWpfBSm9xF7bbNaabYlyrMqSoiUtzKawJhasMoajtRVLuCHimnQ3VivpOZrGfUm0hoCwcPLC7M7pzaJrp2d7Zp3Ty/if5/wot0YWXvYvXT/5c4kq18qer+v8WUpI4PnjP4AON+H8K7JPVbrsmZ6809sKrDeXJ9DjiydOL40pkjZ1owJcaKwMZ9nD1PsuR1PKfhDfSdhFcs68BcK+zYQTXGc62wno74Y0k8LvKjcBtPdXBS3FbF76K8cptDknjwqLhc3LgLs69Wotlppoqt94aexzFrMOYXawoSNpzJhLsy+QzoveJ6d1HP2e0SvjUc52LdOB/j41zW26JdeLmXo66KdKx1FWnNxCrSqoy08XRJd3qMjsVJKsaixVb/g72VfZHrRVsxX2bLxkImmeiOuKBrGXNAMbp+V8u70iYqpeFCFqs7ZrSsiFTkS6CSreVUYAwHrCGe4RoIYHZaZcyIYZSssl2aqrK3bg+XI4Wbt9z08OSckojcsLj7TKlcSi72+uL2M+2FaLRSPR6IDsZj/T2p/sWFrdmp2MhyXh7qnVz0FgKZ/C1Lk0u9Ut+O3tlTS1ODu+PxzO5s6rrhzm23FEJF+tWu4WTUW4j0FAarD4xOhroGjg+waFmc8Z9ke+ht7FtAjfjH1TNTug+v86Ho7nplXZWEj6tkyhtM5a7cs/IB9q3Ll8W774N3f5+/28XfbTdyBOgr3Z0MKINv0ZKWotHHPnAaXuP3xQNNP8WeBbGU4+9EKT9R4EllmDLBu+W5YrIJQeSL0WMiOYzNYz4Y738H20n/BGAFyTiH1e/iwNDB2EbJLMEUoyUcBSOwLMUVwJTtTWVSvIoqH1ROHGiXak4RmJ1HpzsmegO92URHp9cx3TGWD/RmEh2eANvZsWmLN+CNZjo24s+YoMMd7Ab6O+xpoIMxJqQhoYdQ7cCrkSjevN1AS+pPlOnvVP+aPT07K2AcBrp8nH2PuMggh5F2OkApJrNM+HNYvT/HphIXdUlaQMCqxctWgMuU3GjbdMfRbduPdM60ldhjxYJncseOSU+hyPu5jh0hz7LniNPElWcrLPGsSuyLAHyRIWTCr88Sekc0k4lGMhl2JBONptPRaAbti7vYEfo5DjNIShxqXuIUWMIrYbCiPpY1JXuxLLfX3RZ0BWvVwJt7KNX9/plINhsJZ7Mfx58NvdZ6x/7fyLbTe6Ui73+C9z9gZnBjah5hSwpP5JZRPqyLBa3rOVcXa0yV4ZnpkeGZmeFoJhuBvtn2qeHh7duHh6dK2WgkC7hkBR6HQJK5+XrQSIbjERbTd4hP3zIShe7Bm80s9oPVkYGv5259xzG66+Ljh9m3HnroIbFOFmGdfLt+nZhZRcYaa14nXoxbTeU+dvjQ4bsu3s2+bSwTaP6b9DuwPXwD8OoXktRJjDu7AngGiZsd4Gh4iAHDpafF+kXs3n1Tdjf7xn9yOKnqd8nnVj8o4MQ4HMOrHLkmnCDAOQp7/+EvCXzev+qgb+XXbV/gY3OApclUHqUgooniBBNm5NvRpUnxGnSLR0/h+/u4Z17CgjyX1muy9Gm3O51JYtlcJI6yNi4Ig3zpW5tuTBvvGCi/pf6utC1S0cC5ix7DusGkwHHucfD58Np5lXZcosRaocAixpy0OrGl2xtMzg1b683Kvl15QaPR1Z+RPyWvFzlErOFajdryrIzUVLBXYzIefL2+0B3v64t3G7GOHatHyOeAJhIJ6f7mCRLTUylJqX23n9p/qvpz805Z6JsR0INyXA/C768Sd3NL7CSupcabPtpdjPo8rlB7qCEHlNig7y/D+ssBBDt9FV638AuCuWsiWfE0FzoIKE4XGMXzDfG+YrwPeLDfBxpwPDiUKwIf+kP4e0jvt8kaUxWe14mXGwAq4S5ERiga9SjZReI6I2UY25/AupJIB2ZrytRcCbutwcXYgiIT4rTLHUoHF9sqiO2KVJK0OhGx6LrVVYj29kbh62+YdPXqd3tjsV784v2Mrf4T0PBLvJ858xJas4eoOI7h+aFotfpkLi7J6VoLiee7rkUDL32rn/Yn69CgP7h6lUmNeERWf0b/nn0eVJZevDfE62F8u8VTC4L1MamRa4kZq9x1E5MX4t2ZVHdvvDfT68OLZUDpVYOpLOg2pvai5cwwMFWqw4XeFOsJsWNyYmAgGds23D8XPJR8zfzA4obEyJ+ZKC77g6Xc5EIyFS525UYHewvb5qJD27Pl3dUrDXgXV39B/xN0M8T72KfwvhZ+K3fcvKXNDHrnZ4IwilPECP/vRjsItptL9a1qDZb09qbheWFYuVIAtLXGxYpupbH6rem9v8boqNMaHSV5+n3yd+xH9fLYkKMBwuUo1x6IpTxY8jjlLb0LFir9PrXxGHeA88/sR7Ai8iTFHn3p0t3NjHwMhrjQ93BcNDIq3ndZu5XAxys280N8M1/mSsKepU+Z2xgiZSJ2r4Fc9efUJvCjHwDYOcDvH9mjFp5mPxZAgam3xWbJ+3HL4lzZkGUoRwD3VvLMGJhoC1rsKd73Z7lVj+/E1tuReRdIbA/Q9M84PcYElm3EDM3kxPCs1e2WdEd9QTFvSnpoy/5j7EdIBU5jgEkfNGg8I6B2iP4VSZYMwEH+O4IWH1qU1j1gzRDMsQVRVycGpITREy1tOWB0Z3QJ74FqRO+lV4hCevQYpsJSvJ6koQSaQhQPYkw10Owr9O6/++4d3/sevfLzq7/6pYAxAN8u18HAJcgXHAISl5uYMHj1eG2YgxAAxN137NXwfpaOc7k9TqqiloDTBiohYiSGigA5UmCqUq1Na3PgObLqFUnyDPFgD3A8nPg2r2YvrlvhadMcBqADRjZRnarTbuNoIZkSHC3xnQ5w7Kpvs5AUiNLVb6wO0a+xZ0SdOH4JKQ6wi9bXidNoiY7QN99Sve0vpUdfeAWnT3Z1iPXx97y4aPE+NUK6yIJYrUqKlljfHdVb74A3ePtbVgfIt16kn6C75L7l3DelN75wu7BxyPdpnP4ZjDz+Irp6pU5UfaKo68X+ycnvTw4M6vrgwCSfj83kr8mX6Xm+o9vJd3BW15oXjIodUxL1MSfIv9G307lr6Q/ehD8xQa+v/i6dW+Y44zs/fSnv/FF1uu4d9uBLeIfNXv1U3TvSbS/hHanywpf5O0gDWG1fph8E/poGm78lBSRm15hLcklmfdQJ2g80eBTemYF3ri13sO1PedsdL6UtjBnb7nwpbWGs2HbXtdvCH9OrSXoH7J0uon7CKdGRQmWU72notdOy2enX3LnpxIULJzbd+Zor7/x/d+7c/PVL939t866dP8Z3C/DuUv27GR/f7tGNh+blUu3lnza+jDWBeuk+4G+N86qRwi+SBJeNlWFsGkrCjfcZl+i+6o9p+5NP/o30tiNXE9h/CWBstWAYb/KK1RwaLBZr4wEYeDdMibZXf/zkk+yZF24+wv4eYSRXU/R29gWQG5P6pgTPnpOUImWSBgYgFsNU5tFsIFjBUlFqmoQZlpnJJTKZFF5cktHUQNDS3kEBAsOhDBpCLpetRU6AdhQMcA+PN+eOFzqjne5gIXB0MZ70Zofm5oay3mSnmtk+EIDFDQ8LcXfOW9qwoXTgloFNVFH322x3Hj4xOn1oevREca4St9n2KyrdPHDzxBFX+xFhC6ToQ+Z4MLJRA3leBKsnSRUpwSNtcDQKk86bo+DnJOZRXG08oOtkc1aQDGg8gVLJj5mNwYBw7aKBNIbDQ9/U217WcOjbX+p4NtBp+l6YYzfaAjyuCWvaYHEAl1BOjespyULIg4uY5oKpipar5CrBXEmrBLUgfeV5touez992a/4c3cXO9d56G33N1L33TunT05NTr757++T0tNjDhuDbW6EvJ943bJS0MLUbo3ifYlyEwi8dF8X4MLukxKuSPv3QQ0cffJB+ePGzn12sXtcI0yvuV6YwJXZ0vcuyj+fBivoveOBkt/vtxoVrbvOfU4sXSlbmUMnKHIKeeF8PPvjZve/E7t6597NCR9uw+jWmwvyXYDcY1Is9MPPDiSDsgpLKw1z5tkDOmgUGwXYABTeaSXLvpGX4VupTzirrJ54FAjnutqw57vEh/fqZvYPHC4X8znimEE2eXZgsFb3eM3v7l4vF/I54ttCdgM9G+r3e14KqkupLZW/Dn73J3PK2vZGunV0hmooF422pyPbxge2dnsHo9n3Rrp2hULI72OMUn7o9g7eDXaLkY+GMK8t/6w6nXXx3BCucHQSatxMPieA6wFwAVULfO1nB82JD2Jh1C3zejg7QDvzeiC/S4enwuDvh1Xa3O51oA9mRcAuLpZTA6wPd3nLKn4L5EP6eid4zl+47S3ccO3369Bv6+8enp6njruOn7746RR3V5+m5X/ziF9OViSnDTqfH6Y8BL8tPo1ChJlEirvI1/TRuy0+D+rIkjT51/KljDzwArx+vPkHVqqFz9dM4y9OvwxjHOLyCTQOGCvgZ3lJtSK2VtQ6HjOXRpMGGFHpxLYSx4Gnb3kDEEU3Ie+wzY76B0GIo7Iz0KPyvIv1Er9Pe22fffaDN1cd/W9iPtKerq6vH6TdXn3oZ/k0F/ZvfrPYv7tuHOgzY65/g+m/Z0KkZrTdR3HV7GRNqf6NKDab3de03ddAfUqX6K+GjAJj0DMDM0mNctzxG8IKiKUO7rlOhRRf+BrVfqNrYjWe9ukyV1dvYX7LtZDvZTxNzT3kxDgqjPBeo5NgKpnOWKmBbqBj+aERJwVPW4qn5wN70YGlJQC3CVidTTV7BkTsk6lixU8nmZESRyA1EUVVlyUj1U9S9Rl8lgicjzHHJfJe8hFf18VZv2eEtYpeIfYms+yqWkadk3+LOmcnN5VKhN50Mhzydrja7RrbT7W1YuDxZnzyvCicbutLbmd/X4F0vN4RFonQxgjSz/OwEIzSOb1gM929OhQc98mxODUUHNud3nBzftLK7WNx902RhMeUvHBmae+2x0dHrXzs7defB4fCgnk0MuwKjRwcy7lQHSGBPW64rNz68tDWzbTjq7Qx8Md5z/XTl+HRu+MArtm29ZU+/z1sKBMrHHphbfP3p8cF9t20d2rcxEfD6A+8rlDvabT7HKa9PRz6rrP4U+OCLwGHIrg/RkMELbUDKPTDb22BSczCp+QZegKesxVPzgb3pgckLhfr5k2XzWgCHw7yssS7p0+hqsPUrPEMU3yPNr+mja6b7JbwmbhLYv3fXDn3L2Ki4/9TrbsdiW1NsipfhlEB3u8L+AXRHL8mRabKby4ptQ6B/bR5mqrKFaqqEmzuYfozfu6HK/HxakzD+D9artGTUn5FApKUzefiXtmndQmquCaetZ68t8HdTKGsdz5XK19+3c+d915fNn+xV/Qsrmzau7O7v372ycdPKQn91LDq4LZOfDQ95+7sKGzcWQwXfYGRHPrNtMEqPz10+OT5+8qH5+Yfw5+U5/bb9Q0P7b9ONn1tz0yOxRGwsENg2PLzNHxiL9cRGuP4hkzIdpX/EvsHjhfvJGPkYUuWTMO12aji7y22Yj8Bsyu14aAGbOtDGRW12GaNeME9WPe8UpxhOforh4KcYEX1MvKfiXQwv48UlPTc40NPj91EyMjQwNjjW09/TXyz09aYS4jJLp514qbfdOptpXLP1JyO5snHOGUzlUv4KqDH84c97d5S7u8s7es2f2w4d2rbt4EG6EO1xt/cVM5Hu7piro52OivBnMwy60tN7bMeOY8d2zBzf8UxPpDOm7Z6aevd4h8vVIfSgPvokO891OS8p6UOgMzKZKXQea38o7GH0cigKOYQ/Cc9nIwr37fjcGP/cXaB4wZ0bVckg2OagcqXKKTq9Y252psKOHqNj1X/6z6MbjrJn3ve+6g//4o//6Os0WPre94C2fcDXHwO+HsY7CbIZptldbbC1Myyq6sQAVvW8gvU80ctyntjt/ES8dp1HTFoYHOgv9uWT7oDbk0m6vW2gAnp9PjwXadisQSHMjpZHRyvwy1iddqZBQ9X3ffpc8DO+G3aVjnTv6r937o7f7Vo+SOnB5fCTd8zd2z8XP1zadYO/GvwxpcftbtvkwtHhwsbJrW951aTNbbd7bPqdb9EnN/UPHd2t2zx8d02ufpJ1sJ+RFCmAbvkOftkBC1CFDvRnIuGg3abIDpAQwKd+XnMFa/Yx+TQPqeLKlkTNYC0s8RqFPxVZIfKlNS3xeD5Z9xieHiIY408VvL+EF7Jh8p4lfqt2LgsYpeLumBtvrQ6WjTLLZUNzBZU5wAmT8xsaq18KloWWmvNzvbW68fbBUv5gYXJ29uKpibFzhaH0fG5yz+ydpxf8Ixvzb/OXNuXmTsjZ5HXRpPJnbt+Byf1nlIVFJdezP9yjfsYdWJzcf4N2gv67+pQ0mInnHlM/JY9k4hkeS/lG+lN2gXRj/Rq9mErGwl0BrHHqpG2G4teoysCv3aQ7inqMUhblr+uG4DbCA/wSYO9WVdo+uG9TMrlx39B46UhiJlCOdZe9U/GlkQ9sHh7acvuNSnHqSGnkyPaicvNNciG9qysmV/9Migan0v3KDfTmietctOI6iJcbrf4vdhu3GQHLUJCBTJ0v9GVlSSG7gFMVah03CIvB7c1k3BF+WWeWq4voFUeGrLd00VCEdYPWbjDAEc99d3BL4LrwTL/LLntO7ddc3onrNx27u+t059TozOZO5x9+2Km1eT4wuNl/IHvbQrituzg2PKo4M6HTC7lttywUrz8Un9hw4sCWhcnMJn/eGc6XpgZ8qFGqsOA/BGs9iBWHbLw2qoKHhFh57wLY8Q4QdMR2XuaFNgm3s4LADG6PG/93d6KVVeEmlrh+EtDW/Maav+ODH7zvXx/5ytce/Nf7fp9+6EN3ffCb27bS89U/pXr1nVuZvvUtbxHyBp2P7wccIiC7d+kz7XZG2xyMOMHWwxAT3+4OfgHcsqbwcqKdLuZ0+p1g78W7Y1GsLSQyYX0128+Nth+ubv5V0vgXYIZfqUpK88KDTTOH7ije9ujM6Zn3zpzC3299BH7C7+8tvver+y/t/yr8Ez9o9yWOZ2n1eXYr33fjximd4QOwjr0xYgUlfr2EVxvu2V0r3ele/Ya53r65GybxZ+/cDfreEyf2wpejfPzhxT0PHy/Dzz2L8PPkG19915ve/Kq732T4ndu5PZTQuxVZkkzHs6/meEZziDuesfZhuULbb773d9kzV6fY7NjJHXjODINysc+TEJ7xtTnxyNu69NNwbjRe+hkioUAmZ1z62XhIJeJwMv4SXj+zqzK0f2TLxD3bzt1fHP8u3buHFvMbE8WN+YG5cvnGAyMHN/4zOy7ssATQtBdoWkT+i3czSe4DJrTbsKLwvHHofN4s1RCtr0qdSSfSmTT3HvlqThXj1LlcGll7hgYmN+vNTZ+Y2P26wdm+Axu2XzczdmhhZPP8xOiewuzwgztHD0+m5zftOPTnxfmxeGVkupDaWhrYeHRiaFDPDEyXN3SP7uybONTZfsg404FvuE86iAtv63XB3mTHhYN3pkt8l7og+JcYNUPbnFg1VLg/wjAtYp2ACScl3Mx15MjN1d+gKz+FET9T3XP8Ix9Zop+q7qGbiPC1XWEJ6KsHq5YoVGE9PtBFFDbv5VGJZslWw9zzWWXGYVNMZ7IpcT+wF9202phZlbuRZkCqbZ30Q9VP2FM7cxfuz02f2jjzmtK2/sOlbfsPbkttz9B99IbjX/W471wuH9qSGhqcy6fmN0/MerxIi5HVn7FZkIM9MJM79WkXZbQdBpL2MQXvpZY0KisYLlmL8cKS6KpYMskETzorJouhgKcTlk0P7bE1XU9t7NC1uhgSj5UUyNMD+o27+wav+z+tXX1sW9UVf/f6+fm9xInz7Pjj2c92HMexHdtxG8ef+XLzVZKmSVPyQdI2Tdry0a4M2m6DSRPrYJRtIFEEG6Ogtaqg1f6CApsmjUmjY0yTENIACTS0TWKTJoS0sr+QgLo7577njyRuy7RFsuPE79537rnnnHfuvb9zzrcnem4P9vtGOte+TkK3Z1MLg8HQtj2FnqW2pn3DA7tnpZ7lB3bMP3Yg26bOOuxPPrQ13ZafSfbMDQTJHfHI7MGpfF7HCbXBoKJMv0LFdiNZt1+2vvawtuOQIgEsgnuUjJXuoVLpd3TP2u6rP9Hwb2mYuwGQcT9Yuixm93GJ4EeRKdxe1DPtli2JSMplu4EtiXigjSAaP5vIhkNtsUBMtnB+4pcqrMlUsqmVBZxxpsa62GotTT6/OtY5P5zf3jG02NMDwr49NzwfHl3NZ3bsyGR3TGWKCwvFbQsLjb7MVLx/RbbNpaPjKa83NR5Nz9nklX7QCx85N9jdPTTU3T1Y+vV4KjU6yqLTOFav8DM6VpUBmHveiHGoTYgVwyBJzkB5w+HKzKuVREYsT2R9GSA1i1hNWLPVFa6NYfv00QW/mgzQN68rBKUzVSGANalKlsgkvQxr0gdg6ldqbX6uxubnuc3IDKlcY80B7c7R16CP77I+wFpjmtqyte5Fa53mpgmmRDJZDVI5L7iVrBCFvk4wMA3bgR+OUfZmzKClxbTqRjpXNdJpwzQ751IcoYhR0uIM7DCGCBvD91g/Q8V+H6iilxj4MMyKCFODcazGqQrAR7e1uYqtzeu2NihIGmZWAdom2JgeZH2C59MMz2uebDB8vUhamgJRWo5lsHtWk6TlUXGR20iI9fEQ6wOsvwBWzW/DYAYri9bYaNR6K0Ytj0atIyhbGUWMXx7oL8P49X3W347iLQ1ggxphSDLhDV5YHfObzVCuaobyGGhPSTnQnhXvU6giSgGdjyskyuh9mPUPVkFYZxV6mVVgo8WplK28VM7p5wXakmwOTrG2YAFspvoWIFdjAfJYDMWtUKIVRNHANs1m4qIuqSJfLpjfFOv7kfK4vTBGGTgIq1HMqUH5OqqXq6henlx/3DAD6rUvyCQ5xDB/NfIfr5H/BDe9Cesn1lTs3IDze2Vkbm4EX6Hu7lAokTAe3D178ODs7oODQ7lMsZjJDaH9xXPbczCeTf5NBDUmWvVvRK22GPg357aP7GObvHZ1MMwwBvCmkIPgtoD24KqhkWguTlV74lXtida6OCK6ONl6Lk7K7nvcZgko9i414h0J5cY86sGzvadk1dKqWpWk298XVxOevf1wfzvwLgK8i6DW4ayoMCud7HxMw+Ft1rp4ResSuta1C6Jac7pwPQdHP1IgkemB8LgnqiQUX2fAG/K5AwG3M6LE3Ns7chNhf0fsQKKgOHtsVjesi3OKw+aWW7e41Fxc7ZJMUc2OK8CcCeA9+jWg201SHd2OIOOiG5waEZyasvOfzprASfR3dY3/9hd3309W3svPzhbefe8x4Ivr2uckBP37UOvRl/FZ0ZeR62p9pKL1CV3rZeRINou+PIy8Ti4y5In495/zLQE5P7ZrKDjga1e7HP5wyC+3tVz4VWHRJJK+Lb3DVltGhplU/KKoY7g+JxkmLx2oRxr430BbwH6o9e1HvGo/YL7cCuHKkDgWO+8iLrFWE8q7ZuUJC9e4MK+Ozq/s9PQ4AtbOlu6tckpNDU/2Ozotppjq7ggJa9Nzd1gsObN5W5/dle/uGblobQmE/U6njo3Gc+oo05dN/kqEWaZojb8igr9iA8fTbhh47g3S+lPSNpguva9j9T8nSZBZJ6wOkmiprEJ9SxWvsVRMVhUX4WLRjmQo6fe6gkqwCUwGcUqV8a9D7Ds2WgVnzeeL/dPRgBqcSKcngmogOtXvDLS5lEBAQUCyt7NTyCd8CUnqUqO5fATkVoI/8+96Wls9+HpGdTi8XodDZXPqAh1MwXj0OVVh/lpAzhpwkXEd2xiv2MYEue6c2no2yF0Zd+qscUnO3HBOyaEbTiroCbx9thH3Yi/jXlJBkvrareTROfoa+hkw2Mfg2k7yTbiok/xAwdOak+QE/LWP7RDvNglGgxEMIg9jEHhwzAR+yiDiSQ0rkWPkePBMjnACpcIiJwh0v2SCj3SmqYnSplATqJ7X42jF8l1UpKKtwdTOdi51Pwfuf2zT/R9kaLDn2P2b8P4ccTsoLyIAGSNoEo1E5HhO5E8KhBqN9JihAenB1JASnrfzi1gr0LjK0jvv8hTj666np254+VLRh6QrriZ4LtlbbVY8Aq+Qb9bJx2c70P42vQxU36fRfp9GOz7pGc5ew5V6/HAPHwhPRBceEdyx/hwVOWHKw741XedbPV6ov5ntXZm5kw1EkCThGEsabTBqtWvL6GoYzWHcXpbERfglSquNRBKlXR6NiL51fQin/qsuisOcCThj4k9u6IX76p1gqFEy2VdI5pP5bAarhVlll7YWt5i6NIlA3/naF/RjxtNvaDy9H3n6ADmL4qJtyMcasfAzB0+Xw3qM7RFmXIxsFwPvya+ZMWOLnUU5h2/SRN3chB3c1Gmip9TW11wbmhVTN23B6sJgM2ENK9rY8dxmqRiOdfl9lmYD3ZrsSsfSGvjVq3rcWtomDezUrGOugT/8Lev5w4U1/iCfaAl+hzU+bbUQ2qzR00hMTWQjp2xm8IJgBNaGFoGv5daNG6r1GyLP0nUbrudBncaY/umm7RjvtMYCNjZU+JcdGc5myjyc2D68c2TnQF9mW3bbjfjZysBjhBvkHiEf0WHwUzsx0p1yBjyfMLJ9zDt1fJOBY8cUcgvbNApWcSGkf/HixcULFx55efnFF5eZ7R0Ex/gj8iTGa93oHF5wxliM0UelveTJ5WXNfxq8dg1o2Qe0WLB6VS0dHGcycHeKxGRiVS5g5Gaz2WK2WDXCsBBZLWE27Fsn7kJp729eWDp/fqn02bJG4w7uKfI+LcB9hFcaeMSfMewOAndM4ZPp06czp0+nTz+RPf3j3Jkz+TPPZM88mz8DNAxyu4G+7zD6PJjpCmG7QB/IOywGNXwTuDvsaJpfg8e8kZ+VW8xgMZz2Fo/sQYKbmzRPH/ciaiN6TOBV1ML3SYseL/Ev8vw7+kdyJer1dnV5vdFfLi//s0sDbHdpz5FB7kPg+8egEY9z54Gsx7kFbkarmVNF71egPyzZF3zStgm17xf5WshwfeABystdwIO9nI07vuOlRhaYCYsM/t4GInGcdMyImB/s9C6T1qmJdSoyqDAGZvIG/mG8Vjp1w0tZPoX1sCTBD85rzda0vi09OrnrR4U3rk7OT+5+tPD70uRdJ5b3LJ04sbRn+QTS6+GmyAv0KOaWfwV88J5YiBAnjO1I6RKZKZSuEn6KtJCWkbfe0vzBebj+b7XX2wgJh0KnyUzpUoEYSl/So6VPS5/q11MuTZ4HAX/zf4ztsl1nzfeHgfn5gf65uf72RHegPZkkzy/2F+bnC/2LQ6n2tmSyLdiDsQhcL32KnmeeJ/hqNrlR4g2cu1WkPDWA8wETCEs3awPlJlVCJsoRh6yqEV3i9ST7FA+1NUc04E8YMaQkrMdNg3Jox316KVEBFUUP6auh9lBuRfF4lJX8/sCuWHwmsJrdr6ge10puNTATj88Gfja8d+/w8L696dxKYDbRvSuwml9zud2u1exqYLYbLtifX3W5Pc7kgbHxAwfGxw7A2BCT/AHz5UwsMqeyl1hZfyqG6fUlnoJyCov3fXAEfoiXnP3yODlbQiBShkN4JVbidRZbcfZgTu7UMgqDDcF62baADO59hrxzd+lZMlV69RMN26phjBm+lrsJtrV4bQu1woTbuR8WG3GHyGrGdOHgtymY1gRTUuv5HNf0tJw8r1SePGr5+3Jixko+cbymGGRfsyJRtV+z/7KiXXDVkla8187ZsUZjEPGCtmrqTT0dZ9gelC8NZzsHbMePe6cSSsJ2jNLSn3IjAS85erW0RfWZG/9C31kXC9LGpNu+MfijGkq7LvyjXvxHuYe63NN9yv9HzMgf6QL3Cb2HyYy1aBGw0hmamG/Z9DAVDETMpv7R2CA64UUXFAWX7hzwjXbDWEXOU3TpVbFMelPoWOREKjhiKdkUJsQUlj9+epTIxDL6NA29XiC7Spf6Ll/9sxbT9jZNgsyu72diQz9EzjoJyTplMvf0aOlK6d/Q0WtXP3y9UHqJzPRdpp0b1jIyqzGmhT4D04V1Kxn2XOWu3WP4q2EnPnu5GFYaam4yEMz0iZEIkzUF0sAIn8Jym3SR08svUsNsoE3bK1dCUUFQYkaJGiv7OM7qPo4gOFOdmaypDGLBU4QrJZlcgfd709HD02N32w80pgO+sM0WCboMtxPZcRs+qdRo9Al2ldzQ0dc1cOt4PuRt9zrM7iafp9CrBixH2UMOXkhp9cf0Mj1Ex1ZHt/4HER5TGAAAAAEAAAABAMSgZ+ioXw889QAPA+gAAAAA2NDztAAAAADY0Vae/7L+4ARIA/MAAAAGAAIAAAAAAAB42mNgZGBg/vXvPAMDS8r/Tf93sHgwAEWQAeMyALGZB5AAAAB42o2UXUiTYRTH/+e8JZnRMJop6bJVJs2pmJnOXF+29YGzwFXURVhZXYQRUUkUkRAkRlfdFWFdVBZBRIF9gEQQFahFXViElUQX0U2I4EBY/+d1s3ejwIvfzvNxnnPO83/OXlWswjfAiT5GhvagSd9juf6gPUdOocnycv4TjeJGRNuQo1e5fpTr3NMYrQ+Veithu7h2Brl6Fnn6ESET07qNJfoMM/U+47dgoZ3HgfUodT6JqSMd1mVZjH8uUd//iE1Y42vqTyETsxL32Sju+BD5RL5zvpm21+pEhDbG+WLaAcedG/TIxN1tLjBOLJEr9lcLJ9N8zJe2NqlTEqNXOkY/J9TX1nMKGL2d2Lo7MW+QpAh+3cdzWSjTvaQOZXIFHm3mOIQQxlGN8fgPLbDHIeswfbmu27lvzvGMdCAkX5An17CAe+vVgyz9hnmaQ33ykCnDWGrncWC1ozR9zcbUkc4QqvUQykx+u5a6iTr/i6nP2G2kOY2bqNcIsjUUf8N4tYz3jvSRQYzZd30go7b9xX037Quzb+6f0KBWjiNKWyAnEBUfxM7nxGjjwHqVOk9i69aBCuKx9UuHejqh1iFb36lg9HfCd3Bi3mSSu8z/GYXMUWj3wFQIs3fSucy+MXSjQGeimXSRJhImx8hOWYaorkIbx5e0EDvMvpzGZZmNRRxfN2AUlcRl2zHM4Pub+QpSxX6YT0o4LiYV8hDFpILfL5fc4JmfmCP3yB0sIaVq+v8WSuV3vF/GUCRr0SoHEZYYYH3gd+8lOUM8ZBR10o8a9ZOnqLG6UfOvNeq0gfjkPOrJcrkJL6mUQQTkOcoNuhoB9loJe7pSo/DL23gcMebtRtjKwErLReby7G+sYH3LdJgE4NVsanuad37C/2kffHqDPtt5hwD12UONO1GsjfQ7hQrdxPc6yvMnGf8A8tGDHPHz7uvhlt3snyByJYL5Us15A/s1wnkL/Z7Sr5x+9VzflfDbmuqna0kXv3vt5Cvc1nTkT9uPfL5ZcBIvtiRsUBcgKCOMMcL/xEXW1IsSCaFVg6iSAWoXxZrkmyXe7TU1mk1cug65VB/WkPn9Ayd0PtcAAAAAAAAaABoAGgAaABoASgCcAOgBKAFWAYAB0gH+AhgCRgJyApACugLiAywDZgPGBAgEXAR+BKwE0AT8BSYFTgV8BaYF1gYGBjgGfAaqBtYHQAd2B6wH2ggOCMII9gkkCVYJpgnSCgQKOApsCqAKzgr8CyoLagvYDCgMWgyMDNAM/g1ADXANkg24DeAOCA4qDk4OhA6mDvYPJA9OD4YPqg/wECYQTBB8EJ4QxhD4ESQRSBFyEZwRyBIqElASdBKaEyoTWBOIE74UBhQuFFwVFBVCFYAVrhXaFkgWgBa8Ft4XBhcuF1gXfBeeF8IYJhhUGIAYphjSGPoZJBlMGXoZqBnQGfwaLhpcGugbXhuoHB4cbhzAHSwdZh2aHeYeEB4mHowe1h8YH24fwiAKIF4gnCDmIQohNiFiIZohyCJOIr4jMiOkJHAk+iVkJjomsCdMJ5QnyihWKIwovikuKbgp0ioAKkoqfiq0KuorICtSK6Ar0iw4LMQtKi1qLa4uJi5mLvYvPi+qL9wwAjAsMFYwdjCsMOYxCjF4Mbox5jIgMkgygDKsMtQy9DMaM3QzwDQANGo0qDTUNQQ1MjXYNhg2WDaCNxA3Xje2OAA4VDiUOMQ5VjmGOcI6DjpYOuA7IjuOO+g8Ljx6PMY9JD1+PcI+Vj6mPxA/Sj92P7I/3EAYQEZAdECyQPZBKEFWQeJCIEJsQt5DTkOsRA5EbkTiRTxF7kZSRthHhEfMSBZI0EkWSYpJyEpKSmhKgkqoSuxLDktCS2xLrEvwTBZMPExgTIRM3k0WTTpNVE14TZhNwk32TjpOlk8ETyhPSk94T6BPtk/ST/xQNlBYUHhQnFDMUOhRAFEaUUBRQFFAUUBRQFFAUVpRdFGOUahRwlHcUfJSCFIeUjRSUlJwUpJStFMcU4RTulPkVBxUnlTqVRJVXFV8VaZV1lbaV3BX+ligWNxZSFniWjZallrYWyxbcluUW9ZcNFxqXLpdIl1IXbxeJF5GXmJehl6wXtJe+l8qX0hfdl+mX+JgBGBEYKBg0GEcYXphnmIGYmRiemK6YxhjwmRSZPplImVAZXRlkGXeZhJmamaCZppm3GdKZ3BnjGeiaApoKGhCaGRogGikaMpo4GjgaUZpUQABAAABpwBcAAQAZwAJAAIAKABUAI0AAACMDhUABQACeNrtlE1rE1EUhs8kafphLS0iinRxcCEqOkltF7YVoVSKYmpiGwQ3wjSZTK6dZIaZm6b9A64Eu3bhwp9Q/AkuXAtuXfsHBJe+986J/fRrISiYYWaee+5733vOPUmIiJ1n5FD2eYw7Y4fOYJRxjoYpFM7TNKXCBWheCA/RRXotXKQpeis8DJcPwiM06bjCo+DbwmO06zwQPkXnnI/C43TW+Sx8mnZzY8ITdCH3Epk4hVGM9nJvhB26lG8J52gi/1w4TzfzA30BmvfCQ3Qn/0W4SBcLt4SHaa/wRHiEeGhSeBRcFh5zeKgmfIrcYiw8TleLr4RPO1x8JzxBc8OfhCfp/Mi08BSNj8wtR/FOooK25hvlmXmut31e85t819NcS6KnfkPzUk+3oyTly22t43ShVAqUbvc23EbUKUELabXVUg3lhTJcibr6ysCl7m9rXvWbqtdZ84Ne6CUzbrk8u7i6fL+ymOmN5PpAcmzVIz9JVdTlbBmf6HvE5Y8VVfO72gsSr8MlNgUcHdfbKmWj5PWopfte4jMCoWr43RQJ9LpNP2GNdNbvVbga+91MXMkE13i/1hmXrZmsNTbelqdCbyP0uY9c2eOVpYfs6QU2JaCCtJGoWKduqkI3SoJSdaUiM/1+3+00NkO9E/umQgnHg+xt1X9p7ifM0DJFFNMOJaQooDZpYrpBZZqheVAdER/vNTybeN8lzypq0Ef0FNGGHS9RD+82Ygn+V5guWycN55QWqIQrgL9R9GiDXKyKqINo5pu5VqmFS2FOYRwemV3Bii7eV47lUsd429KqnVHYo2NVASiEKkE1Lmoq0ywtQrVM96kCOug/cLl+zOXnez0Cm7qVzZEP7ca/ke+Pc/n3OlVD1JAHzwTPDvYr2bqzDvxs3tSkbJYDT6Z1UAvUt301FWeK0OZj/FI5gR64aTvDth7frr4HX0YFsdUedK4ccriGyEl9NTcfyOzwvoNsPNrCrey3bwNPM9OXczWzZt8lemhZ49z5WxeyHqTwNH2OEUuxY2q9XNu1APNVrK8cWdO3l4tTbNAm1BrfFVPloIeH1fGxs9/v9f9z/51z/7U13/sXOPAL/wptW/8pAAB42m1SCXQTVRS9t4QJJAUKKIIbyOpGbZI2Td2gSwqF0kpLKCCi08k0GZrOlMmkpbiAAgqCoqK4giDuCwLuoOC+r8d93/W47x71HJdk5psEcc6Zc//7/7/73vv3ogD293cIUfzPxxvSfwF7oRddGI0xGItxOBSH4XAcgSMxHsU4CiXwwY8ASlGGIMoRQgWOxjE4FsfhKfbGE2jFBbiNEt1QsAV/4m9E2Yd96aEXKgvZD0/iafbHMxzAIg7EF/iNgziY+3BfDsGz3A/P4Xn8gRc4lMO4Pw/ggTyIB3M4R/AQfMSRHMXRaMOLHIOXEMNWvMyxHIcLcTsP5WE8nEfgEx7J8SzmUSyhj358g1cYwKuI4zWWsoxBljPECh7NY3gsvuJx2MnjOQGfcSJqEEYtJmEy6jAFU1GPaWhAI07AdDShGTMQwUy0YBZmYw5OxFycBI2VaEcCGzGfVayGjg78RcBgDcOsJfE6J6GTk1kHE0lOwQJOZT2n4Uv8zgY28gSs5HQ2wWIzutDNGUgxwpls4SzO5hyeyLk8ifN4Mj7mKZTZioXooYJTcRq2YRGjVLEJp7ONMcap4VPOZzsT7KBOg534FmdwAZbgTCymySQtptjFbi5kDxfha56KHTyNp+NznoH12MDFXMIzeRaXchmX82yewxVcyXO5iqt5Hs/Hg3gIfVGN8/AG3sRbeBvv4Hy8i/fxIdfwAryHDzAQA3AQDsYtcGEzRuIa3I17cCfuwqN4jBfyIuzCbtyEmzEIE3AyzuFaXsxLuI6X4hEUYTvu4GW8nFfwSl7F9fCiEMdjIubhFPTDWXgYZ2MFKiGjCh70xihuwCqci9W8Gm4sw3Ksg4TB2Af7Ygj2w1AMw/44AAdyI37Aj/iJm3gNN/NaXsfreQNv5E28mbfwVt7GLbydW3E/fsYv+BV98Dj64zusxfe4FyOwBsNxCJZyG7fzDt7Ju3g37+G9vI87uJP38wHu4m5XQ6S+vqC6ya23JjtlRZUqW021S3VXdsiKaejuSiNm6Gq7t1rRTCXV0ZZQF3qqo4YlK4qqW1KNIqdvpcE0ZEsK27lS2N70hLPX3GGHrVdYj7nDgnFSjtGd0rUSn9/vmZRNcU1ulU3v5Nwdqc4mL6ib4q4TvdU5TFKdpSWiqnfKfwkDQaleVlKWKtXbHYndKld9uozU4Bw15B2VlkmNdpV+jfGUHpPNVEdCTlnuRqeg1OSkNOWllAWlZntXhGFv83/a8PtCrhnpYaQZeWlBvzirlCJOxcgeFSNixIgzYu+IqekxKWIPKrXYBfu2RDXVVJNaUmqJmXKX6m3JVfbOznu52faxNMdO88zJqSc7WsuimCyUUfK0VnK3o7n+/YFySXXEVh2x1ZzYqhBbTYutCsrYXmIHPLGc2PGM2PG8ljWb3KNlrxRo892a6FMTumuO7vP30r28sD1mqqqekPWopkgJR7ZEvgmqXYmMCXTnSM83QVAyHEmMPSQxhAlMJ8XMN0G5lMw3Qa03uZcJKlxWxgRWvgkC4qxKSjkVU3tUTIl5U8IEKdsEKccE3Y4JurMm6HZM0J1ngp68F+1xTLDIMcGi7MP2UQwzqulyoo9cnFTihpHoJ9t3spHdmogGyTlKsVUk/9tCNsMuJaL+wl3Z0BlGhIVyZqZsoj2aiHrHiuWE5Yk55dPLAXkmysRFMcXo6JCdMTIb/XOOyoRe+6mbE0aX3O7NPHSJv6Qk4A8WZQjNpLogZVhqQm2zBudvRFsTmb2MMunrfoEBgRUCKwVWOegrG9SpmpoRzdROP0a0WJE7PfGezriq20tVj8rJuLPs+HfpFbmZtSRbGXCFU6bhcJaXCCwVWCYwKLBcYEig6C0k8kI+gWKGkJghJPhCgi8k+EKCLyT4QjZfetRSgUGB1QJrHKwqc1xcVSWw2skPiLoBp66vwifQif0+O682XFtrY21tTWGxZbWljW/ENd36B++29cEAAAAAAQAB//8AD3jaY2AgAAqAMJEhkWkPAwPTPcavDAz/dZh//TvPdPz/N6ZnjH//f/uvDuIzuAChHYMdYxwDA4jPmPL/N7I40x7GOLC+Q4yRIBoAG2gk3gAAeNqtV2tbG8cVntUNjAEDkrCbdd1RxqIuO5JJ6zjEVhyyy6I4SlKBcbvrNO0uEu79kvRGr+n9ovyZs6J96nzLT8t7ZlYKOOA+fZ7yQeedmXfmXOfMQkJLEg+jMJay90Qs7vao8uBRRLdcuhEnj+XoYUSFZvrRrJgVg4E6cBsNEjGJQG2PhSOCxG+Ro0kmj1tU0KqhGi0qajk8Ltbqwg+oGsgk8bNCLfCzZjGgQrB/JGleAQTpkEr9o3GhUMAx1Di82uDZ8WLd8a9KQOWPq04Va4pEPzqMx6tOwSgsaSp6VA8i1kerQZATXDmU9HGfSmuPxjechSAchFQJowYVm/HeOxHI7iiS1O9jagts2mS0Gccys2xYdANT+UjSBq9vMPPjfiQRjVEqaa4fJZiRvDbH6Daj24mbxHHsIlo0HwxI7EUkekxuYOz26Bqja730yZIYMONJWRzE8TCNyfHiOPcglkP4o/y4RWUtYUGpmcKnmaAf0YzyaVb5yAC2JC2qmHAjEnKYzRz4khfZXdeaz79UTMIBldcbWAzkSI6gK9soNxGh3Sjpu+leHKm4EUvaehBhzeW45Ka0aEbThcAbi4JN8yyGylcoF+WnVDh4TM4AhtDMeosuaMnWLsKtkjiQfAJtJTFTkm1j7ZweX1gUQeivN6aFc1GfLqR5e4rjwYQAricyHKmUk2qCLVxOCEkXRk6sRGpVum1VLJyzna5jl3A/de3kpkVtHDpemBfFEFpc1YjXUcSXdFYohDRMt1u0pEGVki4Fb/ABAMgQLfFoD6Mlk69lHLRkgiIRgwE003KQyFEiaRlha9GK7u1HWWm4HV+nhUN11KKq7u1GvQd20m1gvmrmazoTK8HDKFtZCchJfVr2+MqhtPzsEv8s4YecVeSi2OxHGYcP/vojZBhql9YbCtsm2LXrvAU3mWdieNKF/V3Mnk7WOSnMhKgqxCsgcW/sOI7JVl2LTBTC/YhWlC9DWkT5LSiUHEqxhpkENvznyhVHLIuq8H2fI1GDIVjLarMefei5zyNuq3C27rXoss4cllcQeJaf01mR5XM6K7F0dVZmeVVnFZaf19kMy2s6m2X5BZ1dYOlpNUkEVRKEXMk2Oe/ytWmRPrG4Ol18zy62TiyuTRfft4tSC7rknecw+/pv6ys7etK/BvyTsOt5+MdSwT+W1+Efyyb8Y7kG/1h+Ef6xvAH/WH4J/rFch38s21p2TOXe1FB7JZHofk4SmNziNra5eDc03fToJi7mC7gTXXlOWlW6qbjDP5PhsvdfnuQ6W6yEXHr0wnpWduphhO7IXn7lRHjO49zS8kVj+Ys4zXLCz+rE/T3TFp4Xq/8S/Ld9T21mt5w6+3ob8YADZ9uPW5Nutugl3b7cadHmf6Oiwgegv4wUidWmbMsu9waE9v5o1FVdNJMILyDaL56mTcep1xDhO2hiq3QZtBL6atPQsnnh08XAOxy1lZSdEc68e5om2/Y8quA25GxJCTeXrd3ouCTL0j0urZWfi31uuXPo3srsUDsJVYKn723Cbc8+T6UgGSoq43XFcilIXeCEW97Te1KYhodA7SDHChp2+OmaC4wWnHeGEmWbawWXGMkoo+DKnzkVJ7IRTTaiiN+8pX6qC4XQmcRCYra8lsdCdRCmV6ZLNGfWd1SXlXIW701DyM7YSJPYj9qyg5edrc8nJduVp4IqTYzun/yIsUk8q9rzbCku+VdPWBJM0pXwl87TLk9SvIX+0eYo7tDlIOq7eFxlJ25nG04N9/a1U6t7bv/Uqn/m3mftCDTd8Z6lcFvTXW8E27jG4NS5VCS0TRvYERqXuT7XbORTfKn51nUuUIXr08bNs+fv6GwOj85ky/9Y0t3/VxWzT9zHOgqt6kS9NOLczi4a8B1vEpXXMbrrNVQel9ybaQjuIwR1e+3xWYIbXm3TbdzyN86Z7+E4p1all4Df1PQyxFscxRDhljt4gSfReltzQdNbgF/VYyF2APoADoNdPXbMzB6AmXnAnC7APnMYPGQOg68xh8HX9TF6YQAUATkGxfrYsXOPgOzcO8xzGH2DeQa9yzyDvsk8g77FOkOAhHUySFkngwPWyWDAnNcBhsxhcMgcBo+Zw+Dbxq5toO8Yuxh919jF6HvGLkbfN3Yx+oGxi9EPjV2MfmTsYvRjxLgzTeBPzIi2AN+z8DXA9znoZuRj9FO8tTnnZxYy5+eG4+ScX2DzK9NTf2lGZseRhbzjVxYy/dc4Jyf8xkIm/NZCJvwO3HvT835vRob+gYVM/4OFTP8jduaEP1nIhD9byIS/gPvq9Ly/mpGh/81Cpv/dQqb/Aztzwj8tZMLIQiZ8qMcXzScuVdxxqVAM8d8T2mDsezR7SMXr/aPJY936BPWgA/oAAHjaY/DewXAiKGIjI2Nf5AbGnRwMHAzJBRsZ2J22MDDIMzNogZjbjVjUWIQ4mLkgPAsmHSYZNjCPy2kPzwHOAywHGJgZuIF8Xqc9DA5gCOLvBJIMLhtVGDsCIzY4dESA+CkuGzVA/B0cDBABBpdI6Y3qIKFdHA0MjCwOHckhMAkQ2G7CosEiwsHMp7WD8X/rBpbejUwMLptZU9gYXFwA56Uu+QAAAAAAAQAAAAB42tWUTU/cMBCG7/yKkU9UKjHLqUUJCIGioi5aPra9m3g2cXHsdDzZsP++Ds6WpWorbohbbI0fP+/YTn762FpYIwXjXSFm2aEAdJXXxtWF+LYsDz6J05O9vEVWWrE62QPIe2d+9mg0GF2IyrdZWz1Y3nSY3aL+oniJj3yF2vStkE8L1ui0J3CqxUJco2NVk2pBwtX517mAnmwhGubuWMphGJ5xkT0RKoo8DuP379E/eeRtnC997zRtXoN/LfICg6kd0ktmt60egXISljvGucZQkek49njajmOLwKqxyehEmgRYNiZA6R3DnV/xoAghTlhToQuoIeZBAm4Q7i7nsIj7puJ5KvgI39M5wiybZQk2rR0xaq2MVfcWYTDcgILy7AYUH8MUIymGLBibearlopzncvRMef7IkG/Ju534C0K828ATKV0/323I1A3/N835tgqODmefow9CfBAQXwRck/+BFcNZz42nAPujQ4gSdVTr759uTno8i9XKVEbZaTjm/bCr9UIlZ1IaW0UPby+2o5LL5//FL3pJbTk=) format("woff");font-weight:700;font-style:normal}.pf-c-login__header,.pf-c-login__footer{--pf-global--Color--100: var(--pf-global--Color--light-100);--pf-global--Color--200: var(--pf-global--Color--light-200);--pf-global--BorderColor--100: var(--pf-global--BorderColor--light-100);--pf-global--primary-color--100: var(--pf-global--primary-color--light-100);--pf-global--link--Color: var(--pf-global--link--Color--light);--pf-global--link--Color--hover: var(--pf-global--link--Color--light);--pf-global--BackgroundColor--100: var(--pf-global--BackgroundColor--dark-100)}.pf-c-login__header .pf-c-card,.pf-c-login__footer .pf-c-card{--pf-c-card--BackgroundColor: var(--pf-global--BackgroundColor--dark-transparent-200)}.pf-c-login__header .pf-c-button,.pf-c-login__footer .pf-c-button{--pf-c-button--m-primary--Color: var(--pf-global--primary-color--dark-100);--pf-c-button--m-primary--hover--Color: var(--pf-global--primary-color--dark-100);--pf-c-button--m-primary--focus--Color: var(--pf-global--primary-color--dark-100);--pf-c-button--m-primary--active--Color: var(--pf-global--primary-color--dark-100);--pf-c-button--m-primary--BackgroundColor: var(--pf-global--BackgroundColor--light-100);--pf-c-button--m-primary--hover--BackgroundColor: var(--pf-global--BackgroundColor--light-300);--pf-c-button--m-primary--focus--BackgroundColor: var(--pf-global--BackgroundColor--light-300);--pf-c-button--m-primary--active--BackgroundColor: var(--pf-global--BackgroundColor--light-300);--pf-c-button--m-secondary--Color: var(--pf-global--Color--light-100);--pf-c-button--m-secondary--hover--Color: var(--pf-global--Color--light-100);--pf-c-button--m-secondary--focus--Color: var(--pf-global--Color--light-100);--pf-c-button--m-secondary--active--Color: var(--pf-global--Color--light-100);--pf-c-button--m-secondary--BorderColor: var(--pf-global--Color--light-100);--pf-c-button--m-secondary--hover--BorderColor: var(--pf-global--Color--light-100);--pf-c-button--m-secondary--focus--BorderColor: var(--pf-global--Color--light-100);--pf-c-button--m-secondary--active--BorderColor: var(--pf-global--Color--light-100)}:root{--pf-global--palette--black-100: #fafafa;--pf-global--palette--black-150: #f5f5f5;--pf-global--palette--black-200: #ededed;--pf-global--palette--black-300: #d2d2d2;--pf-global--palette--black-400: #b8bbbe;--pf-global--palette--black-500: #8a8d90;--pf-global--palette--black-600: #737679;--pf-global--palette--black-700: #4f5255;--pf-global--palette--black-800: #3c3f42;--pf-global--palette--black-850: #212427;--pf-global--palette--black-900: #151515;--pf-global--palette--black-1000: #030303;--pf-global--palette--blue-50: #def3ff;--pf-global--palette--blue-100: #bee1f4;--pf-global--palette--blue-200: #73bcf7;--pf-global--palette--blue-300: #2b9af3;--pf-global--palette--blue-400: #06c;--pf-global--palette--blue-500: #004080;--pf-global--palette--blue-600: #004368;--pf-global--palette--blue-700: #002235;--pf-global--palette--cyan-100: #a2d9d9;--pf-global--palette--cyan-200: #73c5c5;--pf-global--palette--cyan-300: #009596;--pf-global--palette--cyan-400: #005f60;--pf-global--palette--cyan-500: #003737;--pf-global--palette--cyan-600: #003d44;--pf-global--palette--cyan-700: #001f22;--pf-global--palette--gold-100: #f9e0a2;--pf-global--palette--gold-200: #f6d173;--pf-global--palette--gold-300: #f4c145;--pf-global--palette--gold-400: #f0ab00;--pf-global--palette--gold-500: #c58c00;--pf-global--palette--gold-600: #795600;--pf-global--palette--gold-700: #3d2c00;--pf-global--palette--green-100: #bde5b8;--pf-global--palette--green-200: #95d58e;--pf-global--palette--green-300: #6ec664;--pf-global--palette--green-400: #5ba352;--pf-global--palette--green-500: #467f40;--pf-global--palette--green-600: #1e4f18;--pf-global--palette--green-700: #0f280d;--pf-global--palette--light-blue-100: #beedf9;--pf-global--palette--light-blue-200: #7cdbf3;--pf-global--palette--light-blue-300: #35caed;--pf-global--palette--light-blue-400: #00b9e4;--pf-global--palette--light-blue-500: #008bad;--pf-global--palette--light-blue-600: #005c73;--pf-global--palette--light-blue-700: #002d39;--pf-global--palette--light-green-100: #e4f5bc;--pf-global--palette--light-green-200: #c8eb79;--pf-global--palette--light-green-300: #ace12e;--pf-global--palette--light-green-400: #92d400;--pf-global--palette--light-green-500: #6ca100;--pf-global--palette--light-green-600: #486b00;--pf-global--palette--light-green-700: #253600;--pf-global--palette--orange-100: #f4b678;--pf-global--palette--orange-200: #ef9234;--pf-global--palette--orange-300: #ec7a08;--pf-global--palette--orange-400: #c46100;--pf-global--palette--orange-500: #8f4700;--pf-global--palette--orange-600: #773d00;--pf-global--palette--orange-700: #3b1f00;--pf-global--palette--purple-100: #cbc1ff;--pf-global--palette--purple-200: #b2a3ff;--pf-global--palette--purple-300: #a18fff;--pf-global--palette--purple-400: #8476d1;--pf-global--palette--purple-500: #6753ac;--pf-global--palette--purple-600: #40199a;--pf-global--palette--purple-700: #1f0066;--pf-global--palette--red-100: #c9190b;--pf-global--palette--red-200: #a30000;--pf-global--palette--red-300: #7d1007;--pf-global--palette--red-400: #470000;--pf-global--palette--red-500: #2c0000;--pf-global--palette--white: #fff;--pf-global--BackgroundColor--100: #fff;--pf-global--BackgroundColor--150: #f5f5f5;--pf-global--BackgroundColor--200: #fafafa;--pf-global--BackgroundColor--300: #ededed;--pf-global--BackgroundColor--light-100: #fff;--pf-global--BackgroundColor--light-200: #fafafa;--pf-global--BackgroundColor--light-300: #ededed;--pf-global--BackgroundColor--dark-100: #151515;--pf-global--BackgroundColor--dark-200: #3c3f42;--pf-global--BackgroundColor--dark-300: #212427;--pf-global--BackgroundColor--dark-400: #4f5255;--pf-global--BackgroundColor--dark-transparent-100: rgba(3,3,3,0.62);--pf-global--BackgroundColor--dark-transparent-200: rgba(3,3,3,0.32);--pf-global--Color--100: #151515;--pf-global--Color--200: #737679;--pf-global--Color--300: #3c3f42;--pf-global--Color--400: #8a8d90;--pf-global--Color--light-100: #fff;--pf-global--Color--light-200: #ededed;--pf-global--Color--light-300: #d2d2d2;--pf-global--Color--dark-100: #151515;--pf-global--Color--dark-200: #737679;--pf-global--active-color--100: #06c;--pf-global--active-color--200: #bee1f4;--pf-global--active-color--300: #73bcf7;--pf-global--active-color--400: #2b9af3;--pf-global--disabled-color--100: #737679;--pf-global--disabled-color--200: #d2d2d2;--pf-global--disabled-color--300: #ededed;--pf-global--primary-color--100: #06c;--pf-global--primary-color--200: #004080;--pf-global--primary-color--light-100: #73bcf7;--pf-global--primary-color--dark-100: #06c;--pf-global--secondary-color--100: #737679;--pf-global--default-color--100: #73c5c5;--pf-global--default-color--200: #009596;--pf-global--default-color--300: #003737;--pf-global--success-color--100: #92d400;--pf-global--success-color--200: #486b00;--pf-global--info-color--100: #73bcf7;--pf-global--info-color--200: #004368;--pf-global--warning-color--100: #f0ab00;--pf-global--warning-color--200: #795600;--pf-global--danger-color--100: #c9190b;--pf-global--danger-color--200: #a30000;--pf-global--danger-color--300: #470000;--pf-global--BoxShadow--sm: 0 .0625rem .125rem 0 rgba(3,3,3,0.2);--pf-global--BoxShadow--sm-right: .25rem 0 .625rem -.25rem rgba(3,3,3,0.12);--pf-global--BoxShadow--sm-left: -.25rem 0 .625rem -.25rem rgba(3,3,3,0.12);--pf-global--BoxShadow--sm-bottom: 0 .25rem .625rem -.25rem rgba(3,3,3,0.12);--pf-global--BoxShadow--sm-top: 0 -.25rem .625rem -.25rem rgba(3,3,3,0.12);--pf-global--BoxShadow--md: 0 .0625rem .0625rem 0rem rgba(3,3,3,0.05),0 .25rem .5rem .25rem rgba(3,3,3,0.06);--pf-global--BoxShadow--md-right: .3125rem 0 .625rem -.25rem rgba(3,3,3,0.25);--pf-global--BoxShadow--md-left: -.3125rem 0 .625rem -.25rem rgba(3,3,3,0.25);--pf-global--BoxShadow--md-bottom: 0 .3125rem .625rem -.25rem rgba(3,3,3,0.25);--pf-global--BoxShadow--md-top: 0 -.3125rem .625rem -.25rem rgba(3,3,3,0.25);--pf-global--BoxShadow--lg: 0 .1875rem .4375rem .1875rem rgba(3,3,3,0.13),0 .6875rem 1.5rem 1rem rgba(3,3,3,0.12);--pf-global--BoxShadow--lg-right: .75rem 0 .625rem -.25rem rgba(3,3,3,0.07);--pf-global--BoxShadow--lg-left: -.75rem 0 .625rem -.25rem rgba(3,3,3,0.07);--pf-global--BoxShadow--lg-bottom: 0 .75rem .625rem -.25rem rgba(3,3,3,0.07);--pf-global--BoxShadow--lg-top: 0 -.75rem .625rem -.25rem rgba(3,3,3,0.07);--pf-global--BoxShadow--inset: inset 0 0 .625rem 0 rgba(3,3,3,0.25);--pf-global--font-path: ./assets/fonts;--pf-global--fonticon-path: ./assets/pficon;--pf-global--spacer--xs: .25rem;--pf-global--spacer--sm: .5rem;--pf-global--spacer--md: 1rem;--pf-global--spacer--lg: 1.5rem;--pf-global--spacer--xl: 2rem;--pf-global--spacer--2xl: 3rem;--pf-global--spacer--3xl: 4rem;--pf-global--spacer--form-element: .375rem;--pf-global--gutter: 1.5rem;--pf-global--gutter--md: 1rem;--pf-global--golden-ratio: 1.681;--pf-global--ZIndex--xs: 100;--pf-global--ZIndex--sm: 200;--pf-global--ZIndex--md: 300;--pf-global--ZIndex--lg: 400;--pf-global--ZIndex--xl: 500;--pf-global--ZIndex--2xl: 600;--pf-global--breakpoint--xs: 0;--pf-global--breakpoint--sm: 576px;--pf-global--breakpoint--md: 768px;--pf-global--breakpoint--lg: 992px;--pf-global--breakpoint--xl: 1200px;--pf-global--breakpoint--2xl: 1450px;--pf-global--link--Color: #06c;--pf-global--link--Color--hover: #004080;--pf-global--link--Color--light: #73bcf7;--pf-global--link--Color--light--hover: #2b9af3;--pf-global--link--Color--dark: #06c;--pf-global--link--Color--dark--hover: #004080;--pf-global--link--FontWeight: 500;--pf-global--link--TextDecoration: none;--pf-global--link--TextDecoration--hover: underline;--pf-global--BorderWidth--sm: 1px;--pf-global--BorderWidth--md: 2px;--pf-global--BorderWidth--lg: 3px;--pf-global--BorderColor--100: #d2d2d2;--pf-global--BorderColor--200: #8a8d90;--pf-global--BorderColor--300: #ededed;--pf-global--BorderColor--dark-100: #d2d2d2;--pf-global--BorderColor--light-100: #b8bbbe;--pf-global--BorderRadius--sm: 3px;--pf-global--BorderRadius--lg: 30em;--pf-global--icon--Color--light: #737679;--pf-global--icon--Color--dark: #151515;--pf-global--icon--FontSize--sm: .625rem;--pf-global--icon--FontSize--md: 1.125rem;--pf-global--icon--FontSize--lg: 1.5rem;--pf-global--icon--FontSize--xl: 3.375rem;--pf-global--FontFamily--sans-serif: overpass,overpass,open sans,-apple-system,blinkmacsystemfont,Segoe UI,roboto,Helvetica Neue,arial,sans-serif,Apple Color Emoji,Segoe UI Emoji,Segoe UI Symbol;--pf-global--FontFamily--heading--sans-serif: overpass,overpass,open sans,-apple-system,blinkmacsystemfont,Segoe UI,roboto,Helvetica Neue,arial,sans-serif,Apple Color Emoji,Segoe UI Emoji,Segoe UI Symbol;--pf-global--FontFamily--monospace: overpass-mono,overpass-mono,SFMono-Regular,menlo,monaco,consolas,Liberation Mono,Courier New,monospace;--pf-global--FontFamily--redhatfont--sans-serif: RedHatText,Overpass,overpass,helvetica,arial,sans-serif;--pf-global--FontFamily--redhatfont--heading--sans-serif: RedHatDisplay,Overpass,overpass,helvetica,arial,sans-serif;--pf-global--FontFamily--redhatfont--monospace: Liberation Mono,consolas,SFMono-Regular,menlo,monaco,Courier New,monospace;--pf-global--FontSize--4xl: 2.25rem;--pf-global--FontSize--3xl: 1.75rem;--pf-global--FontSize--2xl: 1.5rem;--pf-global--FontSize--xl: 1.25rem;--pf-global--FontSize--lg: 1.125rem;--pf-global--FontSize--md: 1rem;--pf-global--FontSize--sm: .875rem;--pf-global--FontSize--xs: .75rem;--pf-global--FontWeight--light: 300;--pf-global--FontWeight--normal: 400;--pf-global--FontWeight--semi-bold: 500;--pf-global--FontWeight--bold: 600;--pf-global--FontWeight--redhatfont--bold: 700;--pf-global--LineHeight--sm: 1.3;--pf-global--LineHeight--md: 1.5;--pf-global--ListStyle: disc outside;--pf-global--Transition: all 250ms cubic-bezier(0.42, 0, 0.58, 1);--pf-global--TimingFunction: cubic-bezier(0.645, 0.045, 0.355, 1);--pf-global--TransitionDuration: 250ms;--pf-global--arrow--width: .9375rem;--pf-global--arrow--width-lg: 1.5625rem;--pf-global--target-size--MinWidth: 44px;--pf-global--target-size--MinHeight: 44px}.pf-m-redhat-font{--pf-global--FontFamily--sans-serif: var(--pf-global--FontFamily--redhatfont--sans-serif);--pf-global--FontFamily--heading--sans-serif: var(--pf-global--FontFamily--redhatfont--heading--sans-serif);--pf-global--FontFamily--monospace: var(--pf-global--FontFamily--redhatfont--monospace);--pf-global--FontWeight--semi-bold: var(--pf-global--FontWeight--redhatfont--bold);--pf-global--FontWeight--bold: var(--pf-global--FontWeight--redhatfont--bold);--pf-global--link--FontWeight: var(--pf-global--FontWeight--normal)}html,body,p,ol,ul,li,dl,dt,dd,blockquote,figure,fieldset,legend,textarea,pre,iframe,hr,h1,h2,h3,h4,h5,h6{padding:0;margin:0}html,body{height:100%}h1,h2,h3,h4,h5,h6{font-size:100%;font-weight:var(--pf-global--FontWeight--normal)}ul{list-style:none}button,input,optgroup,select,textarea{margin:0;font-family:inherit;font-size:100%;line-height:var(--pf-global--LineHeight--md);color:var(--pf-global--Color--100)}img,embed,iframe,object,audio,video{max-width:100%;height:auto}iframe{border:0}table{border-spacing:0;border-collapse:collapse}td,th{padding:0;text-align:left}*,*::before,*::after{box-sizing:border-box}html{font-family:sans-serif;line-height:1.15}body{font-family:var(--pf-global--FontFamily--sans-serif);font-size:var(--pf-global--FontSize--md);font-weight:var(--pf-global--FontWeight--normal);line-height:var(--pf-global--LineHeight--md);text-align:left;background-color:var(--pf-global--BackgroundColor--100)}a{font-weight:var(--pf-global--link--FontWeight);color:var(--pf-global--link--Color);text-decoration:var(--pf-global--link--TextDecoration)}a:hover{--pf-global--link--Color: var(--pf-global--link--Color--hover);--pf-global--link--TextDecoration: var(--pf-global--link--TextDecoration--hover)}button,a{cursor:pointer}button::-moz-focus-inner,[type="button"]::-moz-focus-inner,[type="reset"]::-moz-focus-inner,[type="submit"]::-moz-focus-inner{padding:0;border-style:none}button:-moz-focusring,[type="button"]:-moz-focusring,[type="reset"]:-moz-focusring,[type="submit"]:-moz-focusring{outline:1px dotted ButtonText}.pf-c-login{--pf-c-login--PaddingTop: var(--pf-global--spacer--lg);--pf-c-login--PaddingBottom: var(--pf-global--spacer--lg);--pf-c-login--xl--BackgroundImage: none;--pf-c-login__container--xl--GridColumnGap: var(--pf-global--spacer--3xl);--pf-c-login__container--MaxWidth: 31.25rem;--pf-c-login__container--xl--MaxWidth: none;--pf-c-login__container--PaddingLeft: 6.125rem;--pf-c-login__container--PaddingRight: 6.125rem;--pf-c-login__container--xl--GridTemplateColumns: 34rem minmax(auto, 34rem);--pf-c-login__header--MarginBottom: var(--pf-global--spacer--md);--pf-c-login__header--sm--PaddingLeft: var(--pf-global--spacer--md);--pf-c-login__header--sm--PaddingRight: var(--pf-global--spacer--md);--pf-c-login__header--xl--MarginBottom: var(--pf-global--spacer--2xl);--pf-c-login__header--xl--MarginTop: var(--pf-global--spacer--3xl);--pf-c-login__header--c-brand--MarginBottom: var(--pf-global--spacer--lg);--pf-c-login__header--c-brand--xl--MarginBottom: var(--pf-global--spacer--2xl);--pf-c-login__main--BackgroundColor: var(--pf-global--BackgroundColor--light-100);--pf-c-login__main--xl--MarginBottom: var(--pf-global--spacer--lg);--pf-c-login__main-header--PaddingTop: var(--pf-global--spacer--2xl);--pf-c-login__main-header--PaddingRight: var(--pf-global--spacer--xl);--pf-c-login__main-header--PaddingBottom: var(--pf-global--spacer--md);--pf-c-login__main-header--PaddingLeft: var(--pf-global--spacer--xl);--pf-c-login__main-header--md--PaddingRight: var(--pf-global--spacer--2xl);--pf-c-login__main-header--md--PaddingLeft: var(--pf-global--spacer--2xl);--pf-c-login__main-header--ColumnGap: var(--pf-global--spacer--md);--pf-c-login__main-header--RowGap: var(--pf-global--spacer--md);--pf-c-login__main-header-desc--MarginBottom: var(--pf-global--spacer--sm);--pf-c-login__main-header-desc--md--MarginBottom: 0;--pf-c-login__main-header-desc--FontSize: var(--pf-global--FontSize--sm);--pf-c-login__main-body--PaddingRight: var(--pf-global--spacer--xl);--pf-c-login__main-body--PaddingBottom: var(--pf-global--spacer--xl);--pf-c-login__main-body--PaddingLeft: var(--pf-global--spacer--xl);--pf-c-login__main-body--md--PaddingRight: var(--pf-global--spacer--2xl);--pf-c-login__main-body--md--PaddingLeft: var(--pf-global--spacer--2xl);--pf-c-login__main-body--c-form__helper-text-icon--FontSize: var(--pf-global--icon--FontSize--md);--pf-c-login__main-body--c-form__helper-text-icon--MarginRight: var(--pf-global--spacer--sm);--pf-c-login__main-footer--PaddingBottom: var(--pf-global--spacer--3xl);--pf-c-login__main-footer--c-title--MarginBottom: var(--pf-global--spacer--md);--pf-c-login__main-footer-links--PaddingTop: var(--pf-global--spacer--sm);--pf-c-login__main-footer-links--PaddingRight: var(--pf-global--spacer--3xl);--pf-c-login__main-footer-links--PaddingBottom: var(--pf-global--spacer--xl);--pf-c-login__main-footer-links--PaddingLeft: var(--pf-global--spacer--3xl);--pf-c-login__main-footer-links-item--PaddingRight: var(--pf-global--spacer--md);--pf-c-login__main-footer-links-item--PaddingLeft: var(--pf-global--spacer--md);--pf-c-login__main-footer-links-item--MarginBottom: var(--pf-global--spacer--sm);--pf-c-login__main-footer-links-item-link-svg--Fill: var(--pf-global--icon--Color--light);--pf-c-login__main-footer-links-item-link-svg--Width: var(--pf-global--icon--FontSize--lg);--pf-c-login__main-footer-links-item-link-svg--Height: var(--pf-global--icon--FontSize--lg);--pf-c-login__main-footer-links-item-link-svg--hover--Fill: var(--pf-global--icon--Color--dark);--pf-c-login__main-footer-band--PaddingTop: var(--pf-global--spacer--lg);--pf-c-login__main-footer-band--PaddingRight: var(--pf-global--spacer--md);--pf-c-login__main-footer-band--PaddingBottom: var(--pf-global--spacer--lg);--pf-c-login__main-footer-band--PaddingLeft: var(--pf-global--spacer--md);--pf-c-login__main-footer-band--BackgroundColor: var(--pf-global--BackgroundColor--300);--pf-c-login__main-footer-band-item--PaddingTop: var(--pf-global--spacer--md);--pf-c-login__footer--sm--PaddingLeft: var(--pf-global--spacer--md);--pf-c-login__footer--sm--PaddingRight: var(--pf-global--spacer--md);--pf-c-login__footer--c-list--PaddingTop: var(--pf-global--spacer--md);--pf-c-login__footer--c-list--xl--PaddingTop: var(--pf-global--spacer--2xl);display:flex;justify-content:center;min-height:100vh;padding-top:var(--pf-c-login--PaddingTop);padding-bottom:var(--pf-c-login--PaddingBottom)}@media (min-width: 1200px){.pf-c-login{--pf-c-login__container--MaxWidth: var(--pf-c-login__container--xl--MaxWidth)}}@media (min-width: 1200px){.pf-c-login{--pf-c-login__header--MarginBottom: var(--pf-c-login__header--xl--MarginBottom);--pf-c-login__header--c-brand--MarginBottom: var(--pf-c-login__header--c-brand--xl--MarginBottom)}}@media (min-width: 768px){.pf-c-login{--pf-c-login__main-header--PaddingRight: var(--pf-c-login__main-header--md--PaddingRight);--pf-c-login__main-header--PaddingLeft: var(--pf-c-login__main-header--md--PaddingLeft);--pf-c-login__main-header-desc--MarginBottom: var(--pf-c-login__main-header-desc--md--MarginBottom)}}@media (min-width: 768px){.pf-c-login{--pf-c-login__main-body--PaddingRight: var(--pf-c-login__main-body--md--PaddingRight);--pf-c-login__main-body--PaddingLeft: var(--pf-c-login__main-body--md--PaddingLeft)}}@media (min-width: 1200px){.pf-c-login{--pf-c-login__footer--c-list--PaddingTop: var(--pf-c-login__footer--c-list--xl--PaddingTop)}}@media (min-width: 1200px){.pf-c-login{background-image:var(--pf-c-login--xl--BackgroundImage)}}@media (min-width: 576px){.pf-c-login{align-items:center}}.pf-c-login__container{max-width:var(--pf-c-login__container--MaxWidth)}@media (min-width: 1200px){.pf-c-login__container{display:grid;grid-column-gap:var(--pf-c-login__container--xl--GridColumnGap);grid-template-columns:var(--pf-c-login__container--xl--GridTemplateColumns);grid-template-areas:"main header" "main footer" "main .";padding-right:var(--pf-c-login__container--PaddingRight);padding-left:var(--pf-c-login__container--PaddingLeft)}}.pf-c-login__header{color:var(--pf-global--Color--100);grid-area:header}@media (max-width: 576px){.pf-c-login__header{padding-right:var(--pf-c-login__header--sm--PaddingRight);padding-left:var(--pf-c-login__header--sm--PaddingLeft)}}@media (min-width: 1200px){.pf-c-login__header{margin-top:var(--pf-c-login__header--xl--MarginTop)}}.pf-c-login__header .pf-c-brand{margin-bottom:var(--pf-c-login__header--c-brand--MarginBottom)}.pf-c-login__main{grid-area:main;background-color:var(--pf-c-login__main--BackgroundColor)}.pf-c-login__main>:first-child:not(.pf-c-login__main-header){padding-top:var(--pf-c-login__main-header--PaddingTop)}.pf-c-login__main>:last-child:not(.pf-c-login__main-footer){padding-bottom:var(--pf-c-login__main-footer--PaddingBottom)}@media (max-width: 1200px){.pf-c-login__main{margin-bottom:var(--pf-c-login__main--xl--MarginBottom)}}.pf-c-login__main-header{display:grid;grid-template-columns:1fr auto;column-gap:var(--pf-c-login__main-header--ColumnGap);row-gap:var(--pf-c-login__main-header--RowGap);align-items:center;padding:var(--pf-c-login__main-header--PaddingTop) var(--pf-c-login__main-header--PaddingRight) var(--pf-c-login__main-header--PaddingBottom) var(--pf-c-login__main-header--PaddingLeft)}@media (max-width: 768px){.pf-c-login__main-header{grid-template-columns:100%}}.pf-c-login__main-header .pf-c-dropdown{grid-column:2 / 3;grid-row:1}@media (max-width: 768px){.pf-c-login__main-header .pf-c-dropdown{grid-column:auto;grid-row:auto}}.pf-c-login__main-header-desc{margin-bottom:var(--pf-c-login__main-header-desc--MarginBottom);font-size:var(--pf-c-login__main-header-desc--FontSize);grid-column:1 / -1}.pf-c-login__main-body{padding-right:var(--pf-c-login__main-body--PaddingRight);padding-bottom:var(--pf-c-login__main-body--PaddingBottom);padding-left:var(--pf-c-login__main-body--PaddingLeft)}.pf-c-login__main-body .pf-c-form__helper-text{display:flex;align-items:center}.pf-c-login__main-body .pf-c-form__helper-text .pf-c-form__helper-text-icon{margin-right:var(--pf-c-login__main-body--c-form__helper-text-icon--MarginRight);font-size:var(--pf-c-login__main-body--c-form__helper-text-icon--FontSize)}.pf-c-login__main-footer{display:flex;flex-wrap:wrap}.pf-c-login__main-footer .pf-c-title{margin-bottom:var(--pf-c-login__main-footer--c-title--MarginBottom);text-align:center}.pf-c-login__main-footer>*{flex-basis:100%}.pf-c-login__main-footer-links{display:flex;flex-wrap:wrap;justify-content:center;padding:var(--pf-c-login__main-footer-links--PaddingTop) var(--pf-c-login__main-footer-links--PaddingRight) var(--pf-c-login__main-footer-links--PaddingBottom) var(--pf-c-login__main-footer-links--PaddingLeft)}.pf-c-login__main-footer-links-item{padding-right:var(--pf-c-login__main-footer-links-item--PaddingRight);padding-left:var(--pf-c-login__main-footer-links-item--PaddingLeft);margin-bottom:var(--pf-c-login__main-footer-links-item--MarginBottom)}.pf-c-login__main-footer-links-item-link svg{fill:var(--pf-c-login__main-footer-links-item-link-svg--Fill);width:100%;max-width:var(--pf-c-login__main-footer-links-item-link-svg--Width);height:100%;max-height:var(--pf-c-login__main-footer-links-item-link-svg--Height)}.pf-c-login__main-footer-links-item-link:hover svg{fill:var(--pf-c-login__main-footer-links-item-link-svg--hover--Fill)}.pf-c-login__main-footer-band{padding:var(--pf-c-login__main-footer-band--PaddingTop) var(--pf-c-login__main-footer-band--PaddingRight) var(--pf-c-login__main-footer-band--PaddingBottom) var(--pf-c-login__main-footer-band--PaddingLeft);text-align:center;background-color:var(--pf-c-login__main-footer-band--BackgroundColor)}.pf-c-login__main-footer-band>*+*{padding-top:var(--pf-c-login__main-footer-band-item--PaddingTop)}.pf-c-login__footer{color:var(--pf-global--Color--100);grid-area:footer}@media (max-width: 576px){.pf-c-login__footer{padding-right:var(--pf-c-login__footer--sm--PaddingRight);padding-left:var(--pf-c-login__footer--sm--PaddingLeft)}}.pf-c-login__footer .pf-c-list a{color:unset}.pf-c-login__footer .pf-c-list:not(:only-child){padding-top:var(--pf-c-login__footer--c-list--PaddingTop)}body{background-color:var(--pf-global--BackgroundColor--dark-100);background-image:url(data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4KPCEtLSBHZW5lcmF0b3I6IEFkb2JlIElsbHVzdHJhdG9yIDI0LjAuMiwgU1ZHIEV4cG9ydCBQbHVnLUluIC4gU1ZHIFZlcnNpb246IDYuMDAgQnVpbGQgMCkgIC0tPgo8c3ZnIHZlcnNpb249IjEuMSIgaWQ9IkxheWVyXzEiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgeG1sbnM6eGxpbms9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkveGxpbmsiIHg9IjBweCIgeT0iMHB4IgoJIHdpZHRoPSIxOTJweCIgaGVpZ2h0PSIxNDVweCIgdmlld0JveD0iMCAwIDE5MiAxNDUiIHN0eWxlPSJlbmFibGUtYmFja2dyb3VuZDpuZXcgMCAwIDE5MiAxNDU7IiB4bWw6c3BhY2U9InByZXNlcnZlIj4KPHN0eWxlIHR5cGU9InRleHQvY3NzIj4KCS5zdDB7ZmlsbDojMDIwMzAzO30KPC9zdHlsZT4KPGc+Cgk8cGF0aCBjbGFzcz0ic3QwIiBkPSJNMTI3LjUsODMuNWMxMi41LDAsMzAuNi0yLjYsMzAuNi0xNy41YzAtMS4yLDAtMi4zLTAuMy0zLjRsLTcuNC0zMi40Yy0xLjctNy4xLTMuMi0xMC4zLTE1LjctMTYuNgoJCWMtOS43LTUtMzAuOC0xMy4xLTM3LjEtMTMuMUM5MS43LDAuNSw5MCw4LDgzLjEsOGMtNi43LDAtMTEuNi01LjYtMTcuOS01LjZjLTYsMC05LjksNC4xLTEyLjksMTIuNWMwLDAtOC40LDIzLjctOS41LDI3LjIKCQljLTAuMiwwLjYtMC4yLDEuNC0wLjIsMS45QzQyLjUsNTMuMyw3OC44LDgzLjUsMTI3LjUsODMuNSBNMTYwLDcyLjFjMS43LDguMiwxLjcsOS4xLDEuNywxMC4xYzAsMTQtMTUuNywyMS44LTM2LjQsMjEuOAoJCWMtNDYuOCwwLTg3LjctMjcuNC04Ny43LTQ1LjVjMC0yLjgsMC42LTUuNCwxLjUtNy4zQzIyLjMsNTIsMC41LDU1LDAuNSw3NC4yYzAsMzEuNSw3NC42LDcwLjMsMTMzLjcsNzAuMwoJCWM0NS4zLDAsNTYuNy0yMC41LDU2LjctMzYuNkMxOTAuOCw5NS4xLDE3OS45LDgwLjcsMTYwLDcyLjEiLz4KPC9nPgo8L3N2Zz4K);background-position:110% 105%;background-repeat:no-repeat;background-size:90%}@media (min-width: 768px){body{background-size:80%}}@media (min-width: 1000px){body{background-position:110% 100%;background-size:70%}}@media (min-width: 1200px){body{background-position:100% 70%;background-size:70%}}@media (min-width: 1400px){body{background-size:75%}}@media (min-width: 1800px){body{background-size:70%}}@media (min-width: 1800px){body{background-position:75% 80%;background-size:60%}}@media (min-width: 2200px){body{background-size:50%}}@media (max-width: 1199px){.pf-c-login__container{width:100%}}.pf-c-login__main-body{padding-bottom:var(--pf-global--spacer--2xl) !important}@media (min-width: 1200px){.pf-c-brand{height:60px}}.pf-c-button{--pf-c-button--PaddingTop: var(--pf-global--spacer--form-element);--pf-c-button--PaddingRight: var(--pf-global--spacer--md);--pf-c-button--PaddingBottom: var(--pf-global--spacer--form-element);--pf-c-button--PaddingLeft: var(--pf-global--spacer--md);--pf-c-button--LineHeight: var(--pf-global--LineHeight--md);--pf-c-button--FontWeight: var(--pf-global--FontWeight--semi-bold);--pf-c-button--FontSize: var(--pf-global--FontSize--md);--pf-c-button--BorderRadius: var(--pf-global--BorderRadius--sm);--pf-c-button--BorderColor: transparent;--pf-c-button--BorderWidth: var(--pf-global--BorderWidth--sm);--pf-c-button--hover--BorderWidth: var(--pf-global--BorderWidth--md);--pf-c-button--focus--BorderWidth: var(--pf-global--BorderWidth--md);--pf-c-button--active--BorderWidth: var(--pf-global--BorderWidth--md);--pf-c-button--disabled--Color: var(--pf-global--disabled-color--100);--pf-c-button--disabled--BackgroundColor: var(--pf-global--disabled-color--200);--pf-c-button--disabled--BorderColor: transparent;--pf-c-button--m-primary--BackgroundColor: var(--pf-global--primary-color--100);--pf-c-button--m-primary--Color: var(--pf-global--Color--light-100);--pf-c-button--m-primary--hover--BackgroundColor: var(--pf-global--primary-color--200);--pf-c-button--m-primary--hover--Color: var(--pf-global--Color--light-100);--pf-c-button--m-primary--focus--BackgroundColor: var(--pf-global--primary-color--200);--pf-c-button--m-primary--focus--Color: var(--pf-global--Color--light-100);--pf-c-button--m-primary--active--BackgroundColor: var(--pf-global--primary-color--200);--pf-c-button--m-primary--active--Color: var(--pf-global--Color--light-100);--pf-c-button--m-secondary--BackgroundColor: transparent;--pf-c-button--m-secondary--BorderColor: var(--pf-global--primary-color--100);--pf-c-button--m-secondary--Color: var(--pf-global--primary-color--100);--pf-c-button--m-secondary--hover--BackgroundColor: transparent;--pf-c-button--m-secondary--hover--BorderColor: var(--pf-global--primary-color--100);--pf-c-button--m-secondary--hover--Color: var(--pf-global--primary-color--100);--pf-c-button--m-secondary--focus--BackgroundColor: transparent;--pf-c-button--m-secondary--focus--BorderColor: var(--pf-global--primary-color--100);--pf-c-button--m-secondary--focus--Color: var(--pf-global--primary-color--100);--pf-c-button--m-secondary--active--BackgroundColor: transparent;--pf-c-button--m-secondary--active--BorderColor: var(--pf-global--primary-color--100);--pf-c-button--m-secondary--active--Color: var(--pf-global--primary-color--100);--pf-c-button--m-tertiary--BackgroundColor: transparent;--pf-c-button--m-tertiary--BorderColor: var(--pf-global--Color--100);--pf-c-button--m-tertiary--Color: var(--pf-global--Color--100);--pf-c-button--m-tertiary--hover--BackgroundColor: transparent;--pf-c-button--m-tertiary--hover--BorderColor: var(--pf-global--Color--100);--pf-c-button--m-tertiary--hover--Color: var(--pf-global--Color--100);--pf-c-button--m-tertiary--focus--BackgroundColor: transparent;--pf-c-button--m-tertiary--focus--BorderColor: var(--pf-global--Color--100);--pf-c-button--m-tertiary--focus--Color: var(--pf-global--Color--100);--pf-c-button--m-tertiary--active--BackgroundColor: transparent;--pf-c-button--m-tertiary--active--BorderColor: var(--pf-global--Color--100);--pf-c-button--m-tertiary--active--Color: var(--pf-global--Color--100);--pf-c-button--m-danger--BackgroundColor: var(--pf-global--danger-color--100);--pf-c-button--m-danger--Color: var(--pf-global--Color--light-100);--pf-c-button--m-danger--hover--BackgroundColor: var(--pf-global--danger-color--200);--pf-c-button--m-danger--hover--Color: var(--pf-global--Color--light-100);--pf-c-button--m-danger--focus--BackgroundColor: var(--pf-global--danger-color--200);--pf-c-button--m-danger--focus--Color: var(--pf-global--Color--light-100);--pf-c-button--m-danger--active--BackgroundColor: var(--pf-global--danger-color--200);--pf-c-button--m-danger--active--Color: var(--pf-global--Color--light-100);--pf-c-button--m-link--Color: var(--pf-global--link--Color);--pf-c-button--m-link--hover--Color: var(--pf-global--link--Color--hover);--pf-c-button--m-link--focus--Color: var(--pf-global--link--Color--hover);--pf-c-button--m-link--active--Color: var(--pf-global--link--Color--hover);--pf-c-button--m-link--disabled--BackgroundColor: transparent;--pf-c-button--m-link--m-inline--hover--TextDecoration: var(--pf-global--link--TextDecoration--hover);--pf-c-button--m-link--m-inline--hover--Color: var(--pf-global--link--Color--hover);--pf-c-button--m-plain--Color: var(--pf-global--Color--200);--pf-c-button--m-plain--hover--Color: var(--pf-global--Color--100);--pf-c-button--m-plain--focus--Color: var(--pf-global--Color--100);--pf-c-button--m-plain--active--Color: var(--pf-global--Color--100);--pf-c-button--m-plain--disabled--Color: var(--pf-global--disabled-color--200);--pf-c-button--m-plain--disabled--BackgroundColor: transparent;--pf-c-button--m-control--after--BorderWidth: var(--pf-global--BorderWidth--sm);--pf-c-button--m-control--after--BorderTopColor: var(--pf-global--BorderColor--300);--pf-c-button--m-control--after--BorderRightColor: var(--pf-global--BorderColor--300);--pf-c-button--m-control--after--BorderBottomColor: var(--pf-global--BorderColor--200);--pf-c-button--m-control--after--BorderLeftColor: var(--pf-global--BorderColor--300);--pf-c-button--m-control--hover--after--BorderBottomWidth: var(--pf-global--BorderWidth--md);--pf-c-button--m-control--hover--after--BorderBottomColor: var(--pf-global--active-color--100);--pf-c-button--m-control--active--after--BorderBottomWidth: var(--pf-global--BorderWidth--md);--pf-c-button--m-control--active--after--BorderBottomColor: var(--pf-global--active-color--100);--pf-c-button--m-control--focus--after--BorderBottomWidth: var(--pf-global--BorderWidth--md);--pf-c-button--m-control--focus--after--BorderBottomColor: var(--pf-global--active-color--100);--pf-c-button--m-control--m-expanded--after--BorderBottomWidth: var(--pf-global--BorderWidth--md);--pf-c-button--m-control--m-expanded--after--BorderBottomColor: var(--pf-global--active-color--100);--pf-c-button--m-control--disabled--after--BorderBottomColor: var(--pf-global--BorderColor--300);--pf-c-button--m-control--disabled--BackgroundColor: transparent;--pf-c-button__icon--MarginRight: var(--pf-global--spacer--xs);--pf-c-button__text--icon--MarginLeft: var(--pf-global--spacer--xs);position:relative;display:inline-block;padding:var(--pf-c-button--PaddingTop) var(--pf-c-button--PaddingRight) var(--pf-c-button--PaddingBottom) var(--pf-c-button--PaddingLeft);font-size:var(--pf-c-button--FontSize);font-weight:var(--pf-c-button--FontWeight);line-height:var(--pf-c-button--LineHeight);text-align:center;white-space:nowrap;user-select:none;border:0;border-radius:var(--pf-c-button--BorderRadius)}.pf-c-button .pf-c-button__icon{margin-right:var(--pf-c-button__icon--MarginRight)}.pf-c-button .pf-c-button__text+.pf-c-button__icon{margin-right:0;margin-left:var(--pf-c-button__text--icon--MarginLeft)}.pf-c-button::after{position:absolute;top:0;right:0;bottom:0;left:0;content:"";border:var(--pf-c-button--BorderWidth) solid;border-color:var(--pf-c-button--BorderColor);border-radius:var(--pf-c-button--BorderRadius)}.pf-c-button:hover,.pf-c-button.pf-m-hover{text-decoration:none}.pf-c-button:hover::after,.pf-c-button.pf-m-hover::after{--pf-c-button--BorderWidth: var(--pf-c-button--hover--BorderWidth)}.pf-c-button:active::after,.pf-c-button.pf-m-active::after{--pf-c-button--BorderWidth: var(--pf-c-button--active--BorderWidth)}.pf-c-button:focus::after,.pf-c-button.pf-m-focus::after{--pf-c-button--BorderWidth: var(--pf-c-button--focus--BorderWidth)}.pf-c-button.pf-m-block{display:block;width:100%}.pf-c-button.pf-m-primary{color:var(--pf-c-button--m-primary--Color);background-color:var(--pf-c-button--m-primary--BackgroundColor)}.pf-c-button.pf-m-primary:hover,.pf-c-button.pf-m-primary.pf-m-hover{--pf-c-button--m-primary--Color: var(--pf-c-button--m-primary--hover--Color);--pf-c-button--m-primary--BackgroundColor: var(--pf-c-button--m-primary--hover--BackgroundColor)}.pf-c-button.pf-m-primary:active,.pf-c-button.pf-m-primary.pf-m-active{--pf-c-button--m-primary--Color: var(--pf-c-button--m-primary--active--Color);--pf-c-button--m-primary--BackgroundColor: var(--pf-c-button--m-primary--active--BackgroundColor)}.pf-c-button.pf-m-primary:focus,.pf-c-button.pf-m-primary.pf-m-focus{--pf-c-button--m-primary--Color: var(--pf-c-button--m-primary--focus--Color);--pf-c-button--m-primary--BackgroundColor: var(--pf-c-button--m-primary--focus--BackgroundColor)}.pf-c-button.pf-m-secondary{color:var(--pf-c-button--m-secondary--Color);background-color:var(--pf-c-button--m-secondary--BackgroundColor)}.pf-c-button.pf-m-secondary::after{--pf-c-button--BorderColor: var(--pf-c-button--m-secondary--BorderColor)}.pf-c-button.pf-m-secondary:hover,.pf-c-button.pf-m-secondary.pf-m-hover{--pf-c-button--m-secondary--Color: var(--pf-c-button--m-secondary--hover--Color);--pf-c-button--m-secondary--BackgroundColor: var(--pf-c-button--m-secondary--hover--BackgroundColor)}.pf-c-button.pf-m-secondary:hover::after,.pf-c-button.pf-m-secondary.pf-m-hover::after{--pf-c-button--BorderColor: var(--pf-c-button--m-secondary--hover--BorderColor)}.pf-c-button.pf-m-secondary:active,.pf-c-button.pf-m-secondary.pf-m-active{--pf-c-button--m-secondary--Color: var(--pf-c-button--m-secondary--active--Color);--pf-c-button--m-secondary--BackgroundColor: var(--pf-c-button--m-secondary--active--BackgroundColor)}.pf-c-button.pf-m-secondary:active::after,.pf-c-button.pf-m-secondary.pf-m-active::after{--pf-c-button--BorderColor: var(--pf-c-button--m-secondary--active--BorderColor)}.pf-c-button.pf-m-secondary:focus,.pf-c-button.pf-m-secondary.pf-m-focus{--pf-c-button--m-secondary--Color: var(--pf-c-button--m-secondary--focus--Color);--pf-c-button--m-secondary--BackgroundColor: var(--pf-c-button--m-secondary--focus--BackgroundColor)}.pf-c-button.pf-m-secondary:focus::after,.pf-c-button.pf-m-secondary.pf-m-focus::after{--pf-c-button--BorderColor: var(--pf-c-button--m-secondary--focus--BorderColor)}.pf-c-button.pf-m-tertiary{color:var(--pf-c-button--m-tertiary--Color);background-color:var(--pf-c-button--m-tertiary--BackgroundColor)}.pf-c-button.pf-m-tertiary::after{--pf-c-button--BorderColor: var(--pf-c-button--m-tertiary--BorderColor)}.pf-c-button.pf-m-tertiary:hover,.pf-c-button.pf-m-tertiary.pf-m-hover{--pf-c-button--m-tertiary--Color: var(--pf-c-button--m-tertiary--hover--Color);--pf-c-button--m-tertiary--BackgroundColor: var(--pf-c-button--m-tertiary--hover--BackgroundColor)}.pf-c-button.pf-m-tertiary:hover::after,.pf-c-button.pf-m-tertiary.pf-m-hover::after{--pf-c-button--BorderColor: var(--pf-c-button--m-tertiary--hover--BorderColor)}.pf-c-button.pf-m-tertiary:active,.pf-c-button.pf-m-tertiary.pf-m-active{--pf-c-button--m-tertiary--Color: var(--pf-c-button--m-tertiary--active--Color);--pf-c-button--m-tertiary--BackgroundColor: var(--pf-c-button--m-tertiary--active--BackgroundColor)}.pf-c-button.pf-m-tertiary:active::after,.pf-c-button.pf-m-tertiary.pf-m-active::after{--pf-c-button--BorderColor: var(--pf-c-button--m-tertiary--active--BorderColor)}.pf-c-button.pf-m-tertiary:focus,.pf-c-button.pf-m-tertiary.pf-m-focus{--pf-c-button--m-tertiary--Color: var(--pf-c-button--m-tertiary--focus--Color);--pf-c-button--m-tertiary--BackgroundColor: var(--pf-c-button--m-tertiary--focus--BackgroundColor)}.pf-c-button.pf-m-tertiary:focus::after,.pf-c-button.pf-m-tertiary.pf-m-focus::after{--pf-c-button--BorderColor: var(--pf-c-button--m-tertiary--focus--BorderColor)}.pf-c-button.pf-m-danger{color:var(--pf-c-button--m-danger--Color);background-color:var(--pf-c-button--m-danger--BackgroundColor)}.pf-c-button.pf-m-danger:hover,.pf-c-button.pf-m-danger.pf-m-hover{--pf-c-button--m-danger--Color: var(--pf-c-button--m-danger--hover--Color);--pf-c-button--m-danger--BackgroundColor: var(--pf-c-button--m-danger--hover--BackgroundColor)}.pf-c-button.pf-m-danger:active,.pf-c-button.pf-m-danger.pf-m-active{--pf-c-button--m-danger--Color: var(--pf-c-button--m-danger--active--Color);--pf-c-button--m-danger--BackgroundColor: var(--pf-c-button--m-danger--active--BackgroundColor)}.pf-c-button.pf-m-danger:focus,.pf-c-button.pf-m-danger.pf-m-focus{--pf-c-button--m-danger--Color: var(--pf-c-button--m-danger--focus--Color);--pf-c-button--m-danger--BackgroundColor: var(--pf-c-button--m-danger--focus--BackgroundColor)}.pf-c-button.pf-m-link{color:var(--pf-c-button--m-link--Color)}.pf-c-button.pf-m-link:not(.pf-m-inline):hover,.pf-c-button.pf-m-link:not(.pf-m-inline).pf-m-hover{--pf-c-button--m-link--Color: var(--pf-c-button--m-link--hover--Color)}.pf-c-button.pf-m-link:not(.pf-m-inline):active,.pf-c-button.pf-m-link:not(.pf-m-inline).pf-m-active{--pf-c-button--m-link--Color: var(--pf-c-button--m-link--active--Color)}.pf-c-button.pf-m-link:not(.pf-m-inline):focus,.pf-c-button.pf-m-link:not(.pf-m-inline).pf-m-focus{--pf-c-button--m-link--Color: var(--pf-c-button--m-link--focus--Color)}.pf-c-button.pf-m-link:disabled,.pf-c-button.pf-m-link.pf-m-disabled{background-color:var(--pf-c-button--m-link--disabled--BackgroundColor)}.pf-c-button.pf-m-link.pf-m-inline{display:inline;padding:0}.pf-c-button.pf-m-link.pf-m-inline:hover{--pf-c-button--m-link--Color: var(--pf-c-button--m-link--m-inline--hover--Color);text-decoration:var(--pf-c-button--m-link--m-inline--hover--TextDecoration)}.pf-c-button.pf-m-control::after{--pf-c-button--BorderWidth: var(--pf-c-button--m-control--after--BorderWidth);--pf-c-button--BorderColor: var(--pf-c-button--m-control--after--BorderTopColor) var(--pf-c-button--m-control--after--BorderRightColor) var(--pf-c-button--m-control--after--BorderBottomColor) var(--pf-c-button--m-control--after--BorderLeftColor);border-radius:initial}.pf-c-button.pf-m-control:hover::after,.pf-c-button.pf-m-control.pf-m-hover::after{--pf-c-button--m-control--after--BorderBottomColor: var(--pf-c-button--m-control--hover--after--BorderBottomColor);border-bottom-width:var(--pf-c-button--m-control--hover--after--BorderBottomWidth)}.pf-c-button.pf-m-control:active::after,.pf-c-button.pf-m-control.pf-m-active::after{--pf-c-button--m-control--after--BorderBottomColor: var(--pf-c-button--m-control--active--after--BorderBottomColor);border-bottom-width:var(--pf-c-button--m-control--active--after--BorderBottomWidth)}.pf-c-button.pf-m-control:focus::after,.pf-c-button.pf-m-control.pf-m-focus::after{--pf-c-button--m-control--after--BorderBottomColor: var(--pf-c-button--m-control--focus--after--BorderBottomColor);border-bottom-width:var(--pf-c-button--m-control--focus--after--BorderBottomWidth)}.pf-c-button.pf-m-control.pf-m-expanded::after{--pf-c-button--m-control--after--BorderBottomColor: var(--pf-c-button--m-control--m-expanded--after--BorderBottomColor);border-bottom-width:var(--pf-c-button--m-control--m-expanded--after--BorderBottomWidth)}.pf-c-button.pf-m-control:disabled,.pf-c-button.pf-m-control.pf-m-disabled{background-color:var(--pf-c-button--m-control--disabled--BackgroundColor)}.pf-c-button.pf-m-control:disabled::after,.pf-c-button.pf-m-control.pf-m-disabled::after{--pf-c-button--m-control--after--BorderBottomColor: var(--pf-c-button--m-control--disabled--after--BorderBottomColor)}.pf-c-button:disabled,.pf-c-button.pf-m-disabled{color:var(--pf-c-button--disabled--Color);pointer-events:none;background-color:var(--pf-c-button--disabled--BackgroundColor)}.pf-c-button:disabled::after,.pf-c-button.pf-m-disabled::after{--pf-c-button--BorderColor: var(--pf-c-button--disabled--BorderColor)}.pf-c-button.pf-m-plain{color:var(--pf-c-button--m-plain--Color)}.pf-c-button.pf-m-plain:hover,.pf-c-button.pf-m-plain.pf-m-hover{--pf-c-button--m-plain--Color: var(--pf-c-button--m-plain--hover--Color)}.pf-c-button.pf-m-plain:active,.pf-c-button.pf-m-plain.pf-m-active{--pf-c-button--m-plain--Color: var(--pf-c-button--m-plain--active--Color)}.pf-c-button.pf-m-plain:focus,.pf-c-button.pf-m-plain.pf-m-focus{--pf-c-button--m-plain--Color: var(--pf-c-button--m-plain--focus--Color)}.pf-c-button.pf-m-plain:disabled,.pf-c-button.pf-m-plain.pf-m-disabled{--pf-c-button--m-plain--Color: var(--pf-c-button--m-plain--disabled--Color);background-color:var(--pf-c-button--m-plain--disabled--BackgroundColor)}.pf-m-redhat-font .pf-c-button{--pf-c-button--FontWeight: var(--pf-global--FontWeight--normal)}.pf-c-title.pf-m-3xl{font-size:28px;line-height:36.4px}.idp{margin:24px 0 0}

    </style>
  </head>

  <body class="pf-m-redhat-font">
    <div class="pf-c-login">
      <div class="pf-c-login__container">
        <header class="pf-c-login__header">
          <img src="data:image/svg+xml;base64,<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg
   xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:cc="http://creativecommons.org/ns#"
   xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
   xmlns:svg="http://www.w3.org/2000/svg"
   xmlns="http://www.w3.org/2000/svg"
   xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
   xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
   height="48"
   width="142.98006"
   id="Logos"
   viewBox="0 0 142.98005 47.999999"
   version="1.1"
   sodipodi:docname="Logo-Red_Hat-OpenShift-A-Reverse-RGB-sm.svg"
   inkscape:version="1.0 (4035a4f, 2020-05-01)">
  <metadata
     id="metadata43">
    <rdf:RDF>
      <cc:Work
         rdf:about="">
        <dc:format>image/svg+xml</dc:format>
        <dc:type
           rdf:resource="http://purl.org/dc/dcmitype/StillImage" />
        <dc:title>Logo-Red_Hat-OpenShift-A-Reverse-RGB</dc:title>
      </cc:Work>
    </rdf:RDF>
  </metadata>
  <sodipodi:namedview
     showguides="false"
     fit-margin-bottom="0"
     fit-margin-right="0"
     fit-margin-left="0"
     fit-margin-top="0"
     inkscape:document-rotation="0"
     pagecolor="#ffffff"
     bordercolor="#666666"
     borderopacity="1"
     objecttolerance="10"
     gridtolerance="10"
     guidetolerance="10"
     inkscape:pageopacity="0"
     inkscape:pageshadow="2"
     inkscape:window-width="1779"
     inkscape:window-height="1035"
     id="namedview41"
     showgrid="false"
     inkscape:zoom="5.6568542"
     inkscape:cx="12.872122"
     inkscape:cy="44.679661"
     inkscape:window-x="1772"
     inkscape:window-y="23"
     inkscape:window-maximized="0"
     inkscape:current-layer="Logos" />
  <defs
     id="defs12">
    <style
       id="style10">.cls-1{fill:#fff;}.cls-2{fill:#e00;}</style>
  </defs>
  <title
     id="title14">Logo-Red_Hat-OpenShift-A-Reverse-RGB</title>
  <path
     class="cls-1"
     d="m 52.481365,43.906138 c -4.260509,0 -7.601455,-3.318866 -7.601455,-7.53721 0,-4.218344 3.340946,-7.539211 7.601455,-7.539211 4.26051,0 7.629565,3.320867 7.629565,7.539211 0,4.218344 -3.371063,7.53721 -7.629565,7.53721 z m 0,-13.050569 c -3.027732,0 -5.366796,2.381228 -5.366796,5.513359 0,3.132145 2.339064,5.511358 5.366796,5.511358 3.027733,0 5.386874,-2.409334 5.386874,-5.511358 0,-3.102025 -2.339063,-5.513359 -5.386874,-5.513359 z"
     id="path16"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 62.188982,33.048061 h 2.059983 v 1.023972 a 4.8487891,4.8487885 0 0 1 3.258627,-1.190613 c 3.01167,0 5.364788,2.409336 5.364788,5.471198 0,3.061863 -2.359141,5.491279 -5.406951,5.491279 A 5.3708119,5.3708121 0 0 1 64.269043,42.799843 V 48 h -2.088092 z m 2.088092,2.923328 v 4.802604 c 0.66859,0.772996 1.774877,1.252855 2.965491,1.252855 2.047936,0 3.591919,-1.566058 3.591919,-3.65415 0,-2.088091 -1.566069,-3.674243 -3.591919,-3.674243 -1.210691,0 -2.274815,0.459777 -2.965491,1.272934 z"
     id="path18"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 80.002008,43.863977 c -3.132137,0 -5.575606,-2.409334 -5.575606,-5.511359 0,-3.069903 2.339064,-5.471198 5.324633,-5.471198 2.923328,0 5.135902,2.421374 5.135902,5.553519 v 0.602326 h -8.390513 a 3.5858953,3.5858947 0 0 0 3.591918,3.047811 4.127996,4.127996 0 0 0 2.690426,-0.925585 l 1.337181,1.31711 a 6.346593,6.346593 0 0 1 -4.113941,1.387376 z M 76.514494,37.47522 h 6.306437 c -0.313214,-1.628311 -1.566068,-2.839007 -3.112059,-2.839007 -1.606224,0 -2.881165,1.148455 -3.194378,2.839007 z"
     id="path20"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 86.870624,33.048061 h 2.088091 v 1.066134 a 4.3709374,4.3709376 0 0 1 3.198394,-1.274949 c 2.443468,0 4.156105,1.692567 4.156105,4.156117 v 6.681892 h -2.088092 v -6.332542 c 0,-1.670473 -1.023968,-2.694445 -2.630192,-2.694445 a 3.0116702,3.0116706 0 0 0 -2.632199,1.377335 v 7.643625 h -2.088092 z"
     id="path22"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 98.98356,39.709874 c 1.58615,1.543979 3.21245,2.296908 5.03351,2.296908 2.10817,0 3.54774,-1.003892 3.54774,-2.44347 0,-1.295028 -0.83523,-1.94153 -2.96348,-2.296907 l -2.44347,-0.401552 C 99.48551,36.427155 98.1684,35.1743 98.1684,33.06413 c 0,-2.545872 2.13026,-4.196265 5.38888,-4.196265 a 9.8140294,9.8140292 0 0 1 5.88882,1.983691 l -1.20466,1.670473 c -1.58615,-1.204668 -3.15222,-1.794956 -4.78053,-1.794956 -1.90137,0 -3.1743,0.875385 -3.1743,2.170399 0,1.190615 0.73083,1.75481 2.61011,2.068025 l 2.34911,0.371432 c 3.08997,0.501953 4.48939,1.774873 4.48939,4.051702 0,2.692431 -2.33906,4.4894 -5.82256,4.4894 a 8.8041159,8.8041157 0 0 1 -6.264272,-2.632205 z"
     id="path24"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 111.5101,29.060614 2.08809,-0.459792 v 5.513373 a 4.3709374,4.3709376 0 0 1 3.19438,-1.274949 c 2.44347,0 4.15611,1.692567 4.15611,4.156117 v 6.681892 h -2.0881 v -6.332542 c 0,-1.670473 -1.02396,-2.694445 -2.6322,-2.694445 a 3.0116702,3.0116706 0 0 0 -2.63019,1.377335 v 7.643625 h -2.08809 z"
     id="path26"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 123.11909,30.040413 a 1.2829715,1.2829715 0 0 1 1.27494,-1.293017 1.2950182,1.2950181 0 0 1 0,2.588031 1.2829715,1.2829715 0 0 1 -1.27494,-1.295014 z m 2.31898,13.636842 h -2.08809 V 33.048061 h 2.08809 z"
     id="path28"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 129.48777,33.048061 v -1.606218 c 0,-2.20856 1.27293,-3.423269 3.614,-3.423269 a 5.5113565,5.5113565 0 0 1 1.50383,0.186724 v 1.817035 a 4.1621282,4.1621284 0 0 0 -1.3151,-0.188724 c -1.14845,0 -1.71264,0.522021 -1.71264,1.650394 v 1.566072 h 3.02774 v 1.754794 h -3.02974 v 8.874386 h -2.08809 v -8.874386 h -2.46355 v -1.756808 z"
     id="path30"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 137.77789,34.802855 h -2.25273 v -1.754794 h 2.25674 v -2.714512 l 2.06601,-0.501954 v 3.212453 h 3.13214 v 1.754794 h -3.13214 v 5.758323 c 0,1.086199 0.4397,1.483737 1.56607,1.483737 a 4.1300038,4.130004 0 0 0 1.52591,-0.250962 v 1.752794 a 6.9007404,6.9007398 0 0 1 -1.98368,0.313204 c -2.06802,0 -3.17431,-0.979799 -3.17431,-2.810888 z"
     id="path32"
     style="stroke-width:0.200778" />
  <path
     class="cls-2"
     d="m 25.498808,16.664575 c 2.511733,0 6.145815,-0.518007 6.145815,-3.505585 a 2.8108922,2.8108922 0 0 0 -0.06224,-0.68666 L 30.086586,5.9751541 C 29.741247,4.5456143 29.438073,3.8971013 26.928347,2.6422383 24.974777,1.6443715 20.732338,0 19.475467,0 c -1.168528,0 -1.515874,1.5138662 -2.901242,1.5138662 -1.341197,0 -2.337056,-1.1243569 -3.591919,-1.1243569 -1.204668,0 -1.98971,0.8211821 -2.596059,2.5097254 0,0 -1.688543,4.7624541 -1.905384,5.4531303 a 1.2910026,1.2910026 0 0 0 -0.04819,0.38951 c 0,1.851173 7.294265,7.9227 17.066131,7.9227 m 6.535324,-2.292885 c 0.347346,1.644372 0.347346,1.817041 0.347346,2.033882 0,2.810892 -3.160246,4.370943 -7.314343,4.370943 -9.40645,-0.002 -17.6222862,-5.497308 -17.6222862,-9.131391 A 3.7043544,3.704355 0 0 1 7.7480236,10.173421 C 4.3709374,10.344084 0,10.950434 0,14.801355 c 0,6.320498 14.976032,14.110683 26.833982,14.110683 9.091228,0 11.384113,-4.111942 11.384113,-7.358514 0,-2.553901 -2.208558,-5.453134 -6.189986,-7.183842"
     id="path34"
     style="stroke-width:0.200778" />
  <path
     d="m 32.028109,14.369682 c 0.347346,1.644372 0.347346,1.817042 0.347346,2.033882 0,2.810892 -3.160246,4.370937 -7.314343,4.370937 -9.400427,0 -17.6162632,-5.495294 -17.6162632,-9.129377 A 3.7043544,3.704355 0 0 1 7.7480236,10.173421 L 8.482871,8.354373 a 1.2910026,1.2910026 0 0 0 -0.05019,0.387502 c 0,1.851173 7.294265,7.9227 17.066131,7.9227 2.511733,0 6.145815,-0.518007 6.145815,-3.505585 a 2.8108922,2.8108922 0 0 0 -0.06224,-0.68666 z"
     id="path36"
     style="stroke-width:0.200778" />
  <path
     class="cls-1"
     d="m 116.29866,18.531811 c 0,2.387252 1.43556,3.547745 4.05371,3.547745 a 10.462542,10.462542 0 0 0 2.38725,-0.337311 v -2.766714 a 4.9873259,4.9873263 0 0 1 -1.54198,0.232901 c -1.07818,0 -1.47773,-0.337307 -1.47773,-1.351235 v -4.244448 h 3.12411 v -2.851047 h -3.12411 V 7.1476973 l -3.41322,0.7388635 v 2.8751412 h -2.26478 v 2.851047 h 2.25876 z m -10.64124,0.06425 c 0,-0.738863 0.74087,-1.098256 1.85921,-1.098256 a 8.657548,8.6575474 0 0 1 2.02785,0.25298 v 1.435562 a 4.3187351,4.3187357 0 0 1 -2.12824,0.528049 c -1.09625,0 -1.75279,-0.421635 -1.75279,-1.118335 m 1.04404,3.525658 c 1.20467,0 2.17644,-0.252977 3.08395,-0.865344 v 0.676622 h 3.37709 v -7.15975 c 0,-2.72255 -1.83511,-4.216339 -4.89698,-4.216339 -1.71063,0 -3.40118,0.401557 -5.22023,1.224747 l 1.22475,2.513741 c 1.30907,-0.550132 2.40934,-0.887439 3.37909,-0.887439 1.40545,0 2.13227,0.548124 2.13227,1.668465 v 0.548124 a 9.9445351,9.9445347 0 0 0 -2.53382,-0.317229 c -2.87314,0 -4.60384,1.204668 -4.60384,3.359016 0,1.963607 1.56205,3.461413 4.05371,3.461413 M 88.143556,21.939008 h 3.632075 v -5.79244 h 6.081566 v 5.786428 h 3.632073 V 7.1517135 H 97.865228 V 12.831723 H 91.783662 V 7.1517135 H 88.151587 Z M 74.311959,16.337307 c 0,-1.606224 1.266909,-2.83097 2.935374,-2.83097 a 3.4573974,3.4573972 0 0 1 2.365165,0.867361 V 18.2708 a 3.2847283,3.2847285 0 0 1 -2.365165,0.887438 c -1.646379,0 -2.935374,-1.224745 -2.935374,-2.828962 m 5.342703,5.595679 h 3.379094 V 6.41285 L 79.62053,7.1517135 v 4.2022835 a 5.6820178,5.6820172 0 0 0 -2.851048,-0.738864 c -3.250596,0 -5.8065,2.511733 -5.8065,5.722174 a 5.6719789,5.6719783 0 0 0 5.694064,5.748277 5.0435437,5.0435443 0 0 0 2.997616,-0.969758 z M 64.156607,13.351738 c 1.07617,0 1.983687,0.696699 2.343079,1.772869 h -4.660057 c 0.337307,-1.118333 1.182582,-1.772869 2.323001,-1.772869 m -5.77036,3.005647 c 0,3.252604 2.660309,5.786426 6.079558,5.786426 1.879283,0 3.252604,-0.507966 4.668089,-1.690553 l -2.26076,-2.007782 c -0.528046,0.550132 -1.309073,0.845276 -2.236667,0.845276 a 2.8891956,2.8891958 0 0 1 -2.746644,-1.772871 h 7.960849 v -0.843267 c 0,-3.547748 -2.385243,-6.101644 -5.637847,-6.101644 a 5.7362279,5.7362285 0 0 0 -5.822562,5.784415 m -5.894843,-6.101644 c 1.204668,0 1.879282,0.758941 1.879282,1.668466 0,0.909524 -0.676622,1.668465 -1.879282,1.668465 h -3.589911 v -3.336931 z m -7.228008,11.677255 h 3.632074 v -5.384872 h 2.764713 l 2.788807,5.384872 h 4.053708 l -3.252604,-5.912918 a 4.4713264,4.4713268 0 0 0 2.786799,-4.16012 c 0,-2.660309 -2.090099,-4.7082445 -5.220229,-4.7082445 h -7.547245 z"
     id="path38"
     style="stroke-width:0.200778" />
</svg>
" alt="Red Hat OpenShift logo" class="pf-c-brand" />

        </header>
        <main class="pf-c-login__main">
          <div class="pf-c-login__main-body">
            {{ if eq (len .Providers) 1}}
              <a class="pf-c-button pf-m-primary pf-m-block" href="{{ (index .Providers 0).URL }}">{{ .Locale.LogIn }}</a>
            {{ else }}
              <h1 class="pf-c-title pf-m-3xl">{{ .Locale.LogInWith }}</h1>
              <ul>
                {{ $logInWith := .Locale.LogInWith }}
                {{ range $provider := .Providers }}
                  <li class="idp">
                    <a href="{{$provider.URL}}" class="pf-c-button pf-m-secondary pf-m-block" title="{{ $logInWith }} {{$provider.Name}}">{{$provider.Name}}</a>
                  </li>
                {{ end }}
              </ul>
            {{ end }}
          </div>
        </main>
      </div>
    </div>
  </body>
</html>
 kind: Secret metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController creationTimestamp: null name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/dc0d-metadata-v4-0-config-system-ocp-branding-template.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/dc0d-metadata-v4-0-config-system-ocp-branding-template.yaml new file mode 100644 index 000000000..7949fbd92 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/secrets/dc0d-metadata-v4-0-config-system-ocp-branding-template.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: v4-0-config-system-ocp-branding-template +namespace: openshift-authentication +resourceType: + Group: "" + Resource: secrets + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/027-body-oauth-openshift.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/e784-body-oauth-openshift.yaml similarity index 62% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/027-body-oauth-openshift.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/e784-body-oauth-openshift.yaml index b4ea89874..014faf337 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/027-body-oauth-openshift.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/e784-body-oauth-openshift.yaml @@ -1,8 +1,6 @@ apiVersion: v1 kind: ServiceAccount metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController creationTimestamp: null labels: app: oauth-openshift diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/e784-metadata-oauth-openshift.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/e784-metadata-oauth-openshift.yaml new file mode 100644 index 000000000..6eef77fd5 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/serviceaccounts/e784-metadata-oauth-openshift.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: oauth-openshift +namespace: openshift-authentication +resourceType: + Group: "" + Resource: serviceaccounts + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/029-body-oauth-openshift.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/421e-body-oauth-openshift.yaml similarity index 86% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/029-body-oauth-openshift.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/421e-body-oauth-openshift.yaml index 5016a568a..7c2011f94 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/029-body-oauth-openshift.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/421e-body-oauth-openshift.yaml @@ -2,7 +2,6 @@ apiVersion: v1 kind: Service metadata: annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController operator.openshift.io/spec-hash: d9e6d53076d47ab2d123d8b1ba8ec6543488d973dcc4e02349493cd1c33bce83 service.alpha.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert creationTimestamp: null diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/421e-metadata-oauth-openshift.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/421e-metadata-oauth-openshift.yaml new file mode 100644 index 000000000..d63ac9ccb --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-authentication/core/services/421e-metadata-oauth-openshift.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: oauth-openshift +namespace: openshift-authentication +resourceType: + Group: "" + Resource: services + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/033-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/e0e8-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml similarity index 78% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/033-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/e0e8-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml index 10a2bb654..2397a5ec8 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/033-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/e0e8-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml @@ -1,8 +1,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController creationTimestamp: null name: system:openshift:oauth-servercert-trust namespace: openshift-config-managed diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/e0e8-metadata-system-COLON-openshift-COLON-oauth-servercert-trust.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/e0e8-metadata-system-COLON-openshift-COLON-oauth-servercert-trust.yaml new file mode 100644 index 000000000..2b36f030d --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/rolebindings/e0e8-metadata-system-COLON-openshift-COLON-oauth-servercert-trust.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: system:openshift:oauth-servercert-trust +namespace: openshift-config-managed +resourceType: + Group: rbac.authorization.k8s.io + Resource: rolebindings + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/031-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/8c64-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml similarity index 74% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/031-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/8c64-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml index 8cb8b219c..f654a2943 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/031-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/8c64-body-system-COLON-openshift-COLON-oauth-servercert-trust.yaml @@ -1,8 +1,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController creationTimestamp: null name: system:openshift:oauth-servercert-trust namespace: openshift-config-managed diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/8c64-metadata-system-COLON-openshift-COLON-oauth-servercert-trust.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/8c64-metadata-system-COLON-openshift-COLON-oauth-servercert-trust.yaml new file mode 100644 index 000000000..3c11246cc --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-config-managed/rbac.authorization.k8s.io/roles/8c64-metadata-system-COLON-openshift-COLON-oauth-servercert-trust.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: system:openshift:oauth-servercert-trust +namespace: openshift-config-managed +resourceType: + Group: rbac.authorization.k8s.io + Resource: roles + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-oauth-apiserver/policy/poddisruptionbudgets/5a7c-body-oauth-apiserver-pdb.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-oauth-apiserver/policy/poddisruptionbudgets/5a7c-body-oauth-apiserver-pdb.yaml new file mode 100644 index 000000000..78e43c8e3 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-oauth-apiserver/policy/poddisruptionbudgets/5a7c-body-oauth-apiserver-pdb.yaml @@ -0,0 +1,18 @@ +apiVersion: policy/v1 +kind: PodDisruptionBudget +metadata: + creationTimestamp: null + name: oauth-apiserver-pdb + namespace: openshift-oauth-apiserver +spec: + maxUnavailable: 1 + selector: + matchLabels: + apiserver: "true" + app: openshift-oauth-apiserver + unhealthyPodEvictionPolicy: AlwaysAllow +status: + currentHealthy: 0 + desiredHealthy: 0 + disruptionsAllowed: 0 + expectedPods: 0 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-oauth-apiserver/policy/poddisruptionbudgets/5a7c-metadata-oauth-apiserver-pdb.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-oauth-apiserver/policy/poddisruptionbudgets/5a7c-metadata-oauth-apiserver-pdb.yaml new file mode 100644 index 000000000..af95e0792 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Create/namespaces/openshift-oauth-apiserver/policy/poddisruptionbudgets/5a7c-metadata-oauth-apiserver-pdb.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: APIServerStaticResources-StaticResources +generateName: "" +mame: oauth-apiserver-pdb +namespace: openshift-oauth-apiserver +resourceType: + Group: policy + Resource: poddisruptionbudgets + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/046-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/11e6-body-cluster.yaml similarity index 92% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/046-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/11e6-body-cluster.yaml index e4c9137fc..1153822cb 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/046-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/11e6-body-cluster.yaml @@ -4,7 +4,6 @@ metadata: annotations: include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true" - synthetic.mom.openshift.io/controller-instance-name: TODO-other-configObserver release.openshift.io/create-only: "true" name: cluster spec: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/11e6-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/11e6-metadata-cluster.yaml new file mode 100644 index 000000000..f690bce81 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/11e6-metadata-cluster.yaml @@ -0,0 +1,8 @@ +action: Update +controllerInstanceName: TODO-other-configObserver +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/007-body-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/e1f4-body-cluster.yaml similarity index 94% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/007-body-cluster.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/e1f4-body-cluster.yaml index fca20ca56..d740df0b6 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/007-body-cluster.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/e1f4-body-cluster.yaml @@ -4,7 +4,6 @@ metadata: annotations: include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true" - synthetic.mom.openshift.io/controller-instance-name: TODO-configObserver release.openshift.io/create-only: "true" name: cluster spec: @@ -15,6 +14,7 @@ spec: - //127\.0\.0\.1(:|$) - //localhost(:|$) oauthConfig: + loginURL: https://api.ostest.test.metalkube.org:6443 tokenConfig: accessTokenMaxAgeSeconds: 86400 authorizeTokenMaxAgeSeconds: 300 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/e1f4-metadata-cluster.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/e1f4-metadata-cluster.yaml new file mode 100644 index 000000000..9f2b1248a --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/Update/cluster-scoped-resources/operator.openshift.io/authentications/e1f4-metadata-cluster.yaml @@ -0,0 +1,8 @@ +action: Update +controllerInstanceName: TODO-configObserver +generateName: "" +mame: cluster +resourceType: + Group: operator.openshift.io + Resource: authentications + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/UpdateStatus/cluster-scoped-resources/config.openshift.io/clusteroperators/0598-body-authentication.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/UpdateStatus/cluster-scoped-resources/config.openshift.io/clusteroperators/0598-body-authentication.yaml new file mode 100644 index 000000000..2df731e84 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/UpdateStatus/cluster-scoped-resources/config.openshift.io/clusteroperators/0598-body-authentication.yaml @@ -0,0 +1,71 @@ +apiVersion: config.openshift.io/v1 +kind: ClusterOperator +metadata: + creationTimestamp: null + name: authentication +spec: {} +status: + conditions: + - lastTransitionTime: "2024-12-05T18:54:45Z" + reason: NoData + status: Unknown + type: Degraded + - lastTransitionTime: "2024-12-05T18:54:45Z" + reason: NoData + status: Unknown + type: Progressing + - lastTransitionTime: "2024-12-05T18:54:45Z" + reason: NoData + status: Unknown + type: Available + - lastTransitionTime: "2024-12-05T18:54:45Z" + reason: NoData + status: Unknown + type: Upgradeable + - lastTransitionTime: "2024-12-05T18:54:45Z" + reason: NoData + status: Unknown + type: EvaluationConditionsDetected + extension: null + relatedObjects: + - group: operator.openshift.io + name: cluster + resource: authentications + - group: config.openshift.io + name: cluster + resource: authentications + - group: config.openshift.io + name: cluster + resource: infrastructures + - group: config.openshift.io + name: cluster + resource: oauths + - group: route.openshift.io + name: oauth-openshift + namespace: openshift-authentication + resource: routes + - group: "" + name: oauth-openshift + namespace: openshift-authentication + resource: services + - group: "" + name: openshift-config + resource: namespaces + - group: "" + name: openshift-config-managed + resource: namespaces + - group: "" + name: openshift-authentication + resource: namespaces + - group: "" + name: openshift-authentication-operator + resource: namespaces + - group: "" + name: openshift-ingress + resource: namespaces + - group: "" + name: openshift-oauth-apiserver + resource: namespaces + versions: + - name: operator + version: "" diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/UpdateStatus/cluster-scoped-resources/config.openshift.io/clusteroperators/0598-metadata-authentication.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/UpdateStatus/cluster-scoped-resources/config.openshift.io/clusteroperators/0598-metadata-authentication.yaml new file mode 100644 index 000000000..2fba29eae --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/Management/UpdateStatus/cluster-scoped-resources/config.openshift.io/clusteroperators/0598-metadata-authentication.yaml @@ -0,0 +1,8 @@ +action: UpdateStatus +controllerInstanceName: authentication +generateName: "" +mame: authentication +resourceType: + Group: config.openshift.io + Resource: clusteroperators + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/049-body-system-COLON-openshift-COLON-openshift-authenticator-.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/c5ab-body-system-COLON-openshift-COLON-openshift-authenticator-.yaml similarity index 52% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/049-body-system-COLON-openshift-COLON-openshift-authenticator-.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/c5ab-body-system-COLON-openshift-COLON-openshift-authenticator-.yaml index 874572ec0..b404c9017 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/049-body-system-COLON-openshift-COLON-openshift-authenticator-.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/c5ab-body-system-COLON-openshift-COLON-openshift-authenticator-.yaml @@ -1,14 +1,12 @@ apiVersion: certificates.k8s.io/v1 kind: CertificateSigningRequest metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-authenticatorCertRequester creationTimestamp: null generateName: system:openshift:openshift-authenticator- labels: authentication.openshift.io/csr: openshift-authenticator spec: - request: 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 + request: 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 signerName: kubernetes.io/kube-apiserver-client usages: - digital signature diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/c5ab-metadata-system-COLON-openshift-COLON-openshift-authenticator-.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/c5ab-metadata-system-COLON-openshift-COLON-openshift-authenticator-.yaml new file mode 100644 index 000000000..bfd5a3a95 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/certificates.k8s.io/certificatesigningrequests/c5ab-metadata-system-COLON-openshift-COLON-openshift-authenticator-.yaml @@ -0,0 +1,8 @@ +action: Create +controllerInstanceName: TODO-authenticatorCertRequester +generateName: system:openshift:openshift-authenticator- +mame: "" +resourceType: + Group: certificates.k8s.io + Resource: certificatesigningrequests + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/19fc-body-system-COLON-openshift-COLON-oauth-apiserver.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/19fc-body-system-COLON-openshift-COLON-oauth-apiserver.yaml new file mode 100644 index 000000000..ae4cc9c4e --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/19fc-body-system-COLON-openshift-COLON-oauth-apiserver.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + creationTimestamp: null + name: system:openshift:oauth-apiserver +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: cluster-admin +subjects: +- kind: ServiceAccount + name: oauth-apiserver-sa + namespace: openshift-oauth-apiserver diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/19fc-metadata-system-COLON-openshift-COLON-oauth-apiserver.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/19fc-metadata-system-COLON-openshift-COLON-oauth-apiserver.yaml new file mode 100644 index 000000000..1a5ac31cf --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/19fc-metadata-system-COLON-openshift-COLON-oauth-apiserver.yaml @@ -0,0 +1,8 @@ +action: Create +controllerInstanceName: APIServerStaticResources-StaticResources +generateName: "" +mame: system:openshift:oauth-apiserver +resourceType: + Group: rbac.authorization.k8s.io + Resource: clusterrolebindings + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/021-body-system-COLON-openshift-COLON-openshift-authentication.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/65b2-body-system-COLON-openshift-COLON-openshift-authentication.yaml similarity index 75% rename from test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/021-body-system-COLON-openshift-COLON-openshift-authentication.yaml rename to test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/65b2-body-system-COLON-openshift-COLON-openshift-authentication.yaml index d32b52fee..4de8c0414 100644 --- a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/021-body-system-COLON-openshift-COLON-openshift-authentication.yaml +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/65b2-body-system-COLON-openshift-COLON-openshift-authentication.yaml @@ -1,8 +1,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: - annotations: - synthetic.mom.openshift.io/controller-instance-name: TODO-staticResourceController creationTimestamp: null name: system:openshift:openshift-authentication roleRef: diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/65b2-metadata-system-COLON-openshift-COLON-openshift-authentication.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/65b2-metadata-system-COLON-openshift-COLON-openshift-authentication.yaml new file mode 100644 index 000000000..2993613aa --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/65b2-metadata-system-COLON-openshift-COLON-openshift-authentication.yaml @@ -0,0 +1,8 @@ +action: Create +controllerInstanceName: TODO-staticResourceController +generateName: "" +mame: system:openshift:openshift-authentication +resourceType: + Group: rbac.authorization.k8s.io + Resource: clusterrolebindings + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/fe36-body-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/fe36-body-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml new file mode 100644 index 000000000..e6728bcfe --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/fe36-body-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + creationTimestamp: null + name: system:openshift:useroauthaccesstoken-manager +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:openshift:useroauthaccesstoken-manager +subjects: +- apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:authenticated:oauth diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/fe36-metadata-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/fe36-metadata-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml new file mode 100644 index 000000000..d120c8606 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterrolebindings/fe36-metadata-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml @@ -0,0 +1,8 @@ +action: Create +controllerInstanceName: APIServerStaticResources-StaticResources +generateName: "" +mame: system:openshift:useroauthaccesstoken-manager +resourceType: + Group: rbac.authorization.k8s.io + Resource: clusterrolebindings + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/13cc-body-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/13cc-body-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml new file mode 100644 index 000000000..1e064825c --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/13cc-body-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml @@ -0,0 +1,17 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + creationTimestamp: null + name: system:openshift:useroauthaccesstoken-manager +rules: +- apiGroups: + - oauth.openshift.io + resources: + - useroauthaccesstokens + verbs: + - get + - list + - watch + - delete diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/13cc-metadata-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/13cc-metadata-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml new file mode 100644 index 000000000..f17e35555 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/13cc-metadata-system-COLON-openshift-COLON-useroauthaccesstoken-manager.yaml @@ -0,0 +1,8 @@ +action: Create +controllerInstanceName: APIServerStaticResources-StaticResources +generateName: "" +mame: system:openshift:useroauthaccesstoken-manager +resourceType: + Group: rbac.authorization.k8s.io + Resource: clusterroles + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/serviceaccounts/4ddd-body-oauth-apiserver-sa.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/serviceaccounts/4ddd-body-oauth-apiserver-sa.yaml new file mode 100644 index 000000000..8ff490c15 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/serviceaccounts/4ddd-body-oauth-apiserver-sa.yaml @@ -0,0 +1,6 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + creationTimestamp: null + name: oauth-apiserver-sa + namespace: openshift-oauth-apiserver diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/serviceaccounts/4ddd-metadata-oauth-apiserver-sa.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/serviceaccounts/4ddd-metadata-oauth-apiserver-sa.yaml new file mode 100644 index 000000000..03250e193 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/serviceaccounts/4ddd-metadata-oauth-apiserver-sa.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: APIServerStaticResources-StaticResources +generateName: "" +mame: oauth-apiserver-sa +namespace: openshift-oauth-apiserver +resourceType: + Group: "" + Resource: serviceaccounts + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/services/dfd1-body-api.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/services/dfd1-body-api.yaml new file mode 100644 index 000000000..f8a4fefef --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/services/dfd1-body-api.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +kind: Service +metadata: + annotations: + operator.openshift.io/spec-hash: 9c74227d7f96d723d980c50373a5e91f08c5893365bfd5a5040449b1b6585a23 + prometheus.io/scheme: https + prometheus.io/scrape: "true" + service.alpha.openshift.io/serving-cert-secret-name: serving-cert + creationTimestamp: null + labels: + app: openshift-oauth-apiserver + name: api + namespace: openshift-oauth-apiserver +spec: + ports: + - name: https + port: 443 + targetPort: 8443 + selector: + apiserver: "true" +status: + loadBalancer: {} diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/services/dfd1-metadata-api.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/services/dfd1-metadata-api.yaml new file mode 100644 index 000000000..1a0a8906c --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/UserWorkload/Create/namespaces/openshift-oauth-apiserver/core/services/dfd1-metadata-api.yaml @@ -0,0 +1,9 @@ +action: Create +controllerInstanceName: APIServerStaticResources-StaticResources +generateName: "" +mame: api +namespace: openshift-oauth-apiserver +resourceType: + Group: "" + Resource: services + Version: v1 diff --git a/test-data/apply-configuration/overall/minimal-cluster/expected-output/controller-results.yaml b/test-data/apply-configuration/overall/minimal-cluster/expected-output/controller-results.yaml new file mode 100644 index 000000000..55ae135f7 --- /dev/null +++ b/test-data/apply-configuration/overall/minimal-cluster/expected-output/controller-results.yaml @@ -0,0 +1,112 @@ +controllerResults: +- controllerName: APIServerStaticResources-StaticResources + status: Succeeded +- controllerName: NamespaceFinalizerController_openshift-oauth-apiserver + status: Succeeded +- controllerName: OAuthAPIServerController-WorkloadWorkloadController + errors: + - message: waiting for .status.latestAvailableRevision to be available + status: Failed +- controllerName: RevisionController + errors: + - message: synthetic requeue request + status: Failed +- controllerName: SecretRevisionPruneController + status: Succeeded +- controllerName: TODO-authRouteCheckController + status: Succeeded +- controllerName: TODO-authServiceCheckController + status: Succeeded +- controllerName: TODO-authServiceEndpointCheckController + status: Succeeded +- controllerName: TODO-authenticatorCertRequester + status: Succeeded +- controllerName: TODO-configObserver + errors: + - message: |- + console.config.openshift.io "cluster" not found + oauth.config.openshift.io "cluster" not found + secret "v4-0-config-system-router-certs" not found + status: Failed +- controllerName: TODO-configOverridesController + status: Succeeded +- controllerName: TODO-customRouteController + errors: + - message: ingress.config.openshift.io "cluster" not found + status: Failed +- controllerName: TODO-deploymentController + errors: + - message: 'waiting for the oauth-openshift route to appear: route.route.openshift.io + "oauth-openshift" not found' + status: Failed +- controllerName: TODO-ingressStateController + status: Succeeded +- controllerName: TODO-logLevelController + status: Succeeded +- controllerName: TODO-managementStateController + status: Succeeded +- controllerName: TODO-metadataController + status: Succeeded +- controllerName: TODO-oauthClientsController + errors: + - message: 'unable to get cluster ingress config: ingress.config.openshift.io "cluster" + not found' + status: Failed +- controllerName: TODO-other-configObserver + errors: + - message: |- + endpoints/host-etcd-2 in the openshift-etcd namespace: not found + configmap openshift-etcd/etcd-endpoints not found, and fallback observer failed + oauth.config.openshift.io "cluster" not found + status: Failed +- controllerName: TODO-payloadConfigController + status: Succeeded +- controllerName: TODO-proxyConfigController + status: Succeeded +- controllerName: TODO-resourceSyncer + status: Succeeded +- controllerName: TODO-routerCertsController + status: Succeeded +- controllerName: TODO-serviceCAController + status: Succeeded +- controllerName: TODO-staleConditions + status: Succeeded +- controllerName: TODO-staticResourceController + status: Succeeded +- controllerName: TODO-trustDistributionController + errors: + - message: ingress.config.openshift.io "cluster" not found + status: Failed +- controllerName: TODO-webhookAuthController + errors: + - message: the server could not find the requested resource (get authentications.config.openshift.io + cluster) + status: Failed +- controllerName: TODO-webhookCertsApprover + status: Succeeded +- controllerName: TODO-wellKnownReadyController + errors: + - message: authentication.config.openshift.io "cluster" not found + status: Failed +- controllerName: TODO-workersAvailableController + status: Succeeded +- controllerName: auditPolicyController + errors: + - message: apiserver.config.openshift.io "cluster" not found + status: Failed +- controllerName: authentication + status: Succeeded +- controllerName: openshift-apiserver-APIService + errors: + - message: endpoints "api" not found + status: Failed +- controllerName: openshift-oauth-apiserver-EncryptionCondition + status: Succeeded +- controllerName: openshift-oauth-apiserver-EncryptionKey + status: Succeeded +- controllerName: openshift-oauth-apiserver-EncryptionMigration + status: Succeeded +- controllerName: openshift-oauth-apiserver-EncryptionPrune + status: Succeeded +- controllerName: openshift-oauth-apiserver-EncryptionState + status: Succeeded