diff --git a/openshift-hack/e2e/annotate/generated/zz_generated.annotations.go b/openshift-hack/e2e/annotate/generated/zz_generated.annotations.go index 951c880085e16..a679c744329e4 100644 --- a/openshift-hack/e2e/annotate/generated/zz_generated.annotations.go +++ b/openshift-hack/e2e/annotate/generated/zz_generated.annotations.go @@ -1 +1,11257 @@ package generated + +import ( + "fmt" + "github.com/onsi/ginkgo" + "github.com/onsi/ginkgo/types" +) + +var annotations = map[string]string{ + "[Top Level] Recreate [Feature:Recreate] recreate nodes and ensure they function upon restart": "recreate nodes and ensure they function upon restart [Disabled:Broken] [sig-cluster-lifecycle] [Suite:k8s]", + + "[Top Level] [k8s.io] Cluster size autoscaler scalability [Slow] CA ignores unschedulable pods while scheduling schedulable pods [Feature:ClusterAutoscalerScalability6]": "CA ignores unschedulable pods while scheduling schedulable pods [Feature:ClusterAutoscalerScalability6] [sig-cluster-lifecycle] [Suite:k8s]", + + "[Top Level] [k8s.io] Cluster size autoscaler scalability [Slow] should scale down empty nodes [Feature:ClusterAutoscalerScalability3]": "should scale down empty nodes [Feature:ClusterAutoscalerScalability3] [sig-cluster-lifecycle] [Suite:k8s]", + + "[Top Level] [k8s.io] Cluster size autoscaler scalability [Slow] should scale down underutilized nodes [Feature:ClusterAutoscalerScalability4]": "should scale down underutilized nodes [Feature:ClusterAutoscalerScalability4] [sig-cluster-lifecycle] [Suite:k8s]", + + "[Top Level] [k8s.io] Cluster size autoscaler scalability [Slow] should scale up at all [Feature:ClusterAutoscalerScalability1]": "should scale up at all [Feature:ClusterAutoscalerScalability1] [sig-cluster-lifecycle] [Suite:k8s]", + + "[Top Level] [k8s.io] Cluster size autoscaler scalability [Slow] should scale up twice [Feature:ClusterAutoscalerScalability2]": "should scale up twice [Feature:ClusterAutoscalerScalability2] [sig-cluster-lifecycle] [Suite:k8s]", + + "[Top Level] [k8s.io] Cluster size autoscaler scalability [Slow] shouldn't scale down with underutilized nodes due to host port conflicts [Feature:ClusterAutoscalerScalability5]": "shouldn't scale down with underutilized nodes due to host port conflicts [Feature:ClusterAutoscalerScalability5] [sig-cluster-lifecycle] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance]": "should execute poststart exec hook properly [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance]": "should execute poststart http hook properly [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance]": "should execute prestop exec hook properly [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance]": "should execute prestop http hook properly [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]": "should report termination message [LinuxOnly] as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]": "should report termination message [LinuxOnly] from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]": "should report termination message [LinuxOnly] from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set [NodeConformance]": "should report termination message [LinuxOnly] if TerminationMessagePath is set [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]": "should report termination message [LinuxOnly] if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance]": "should be able to pull from private registry with secret [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]": "should be able to pull image [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]": "should not be able to pull from private registry without secret [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]": "should not be able to pull image from invalid registry [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance]": "should run with the expected status [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Docker Containers should be able to override the image's default arguments (docker cmd) [NodeConformance] [Conformance]": "should be able to override the image's default arguments (docker cmd) [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Docker Containers should be able to override the image's default command (docker entrypoint) [NodeConformance] [Conformance]": "should be able to override the image's default command (docker entrypoint) [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Docker Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance]": "should be able to override the image's default command and arguments [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Docker Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance]": "should use the image defaults if command and args are blank [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Downward API [Serial] [Disruptive] [NodeFeature:EphemeralStorage] Downward API tests for local ephemeral storage should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars": "should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] Downward API [Serial] [Disruptive] [NodeFeature:EphemeralStorage] Downward API tests for local ephemeral storage should provide default limits.ephemeral-storage from node allocatable": "should provide default limits.ephemeral-storage from node allocatable [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] GKE local SSD [Feature:GKELocalSSD] should write and read from node local SSD [Feature:GKELocalSSD]": "should write and read from node local SSD [Feature:GKELocalSSD] [sig-arch] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] GKE node pools [Feature:GKENodePool] should create a cluster with multiple node pools [Feature:GKENodePool]": "should create a cluster with multiple node pools [Feature:GKENodePool] [sig-arch] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance]": "should invoke init containers on a RestartAlways pod [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance]": "should invoke init containers on a RestartNever pod [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance]": "should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance]": "should not start app containers if init containers fail on a RestartAlways pod [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Kubelet when scheduling a busybox Pod with hostAliases should write entries to /etc/hosts [LinuxOnly] [NodeConformance] [Conformance]": "should write entries to /etc/hosts [LinuxOnly] [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance]": "should print the output to logs [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance]": "should be possible to delete [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance]": "should have an terminated reason [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance]": "should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance]": "should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Lease lease API should be available [Conformance]": "lease API should be available [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] NodeLease when the NodeLease feature is enabled should have OwnerReferences set": "should have OwnerReferences set [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] NodeLease when the NodeLease feature is enabled the kubelet should create and update a lease in the kube-node-lease namespace": "the kubelet should create and update a lease in the kube-node-lease namespace [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] NodeLease when the NodeLease feature is enabled the kubelet should report node status infrequently": "the kubelet should report node status infrequently [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]": "should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should be submitted and removed [NodeConformance] [Conformance]": "should be submitted and removed [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should be updated [NodeConformance] [Conformance]": "should be updated [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance]": "should cap back-off at MaxContainerBackOff [Slow][NodeConformance] [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should contain environment variables for services [NodeConformance] [Conformance]": "should contain environment variables for services [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should delete a collection of pods [Conformance]": "should delete a collection of pods [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should get a host IP [NodeConformance] [Conformance]": "should get a host IP [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]": "should have their auto-restart back-off timer reset on image update [Slow][NodeConformance] [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should run through the lifecycle of Pods and PodStatus [Conformance]": "should run through the lifecycle of Pods and PodStatus [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should support pod readiness gates [NodeFeature:PodReadinessGate]": "should support pod readiness gates [NodeFeature:PodReadinessGate] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should support remote command execution over websockets [NodeConformance] [Conformance]": "should support remote command execution over websockets [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance]": "should support retrieving logs from the container over websockets [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]": "should enable privileged commands [LinuxOnly] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should *not* be restarted by liveness probe because startup probe delays it": "should *not* be restarted by liveness probe because startup probe delays it [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]": "should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance]": "should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should *not* be restarted with a non-local redirect http liveness probe": "should *not* be restarted with a non-local redirect http liveness probe [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Conformance]": "should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should be restarted by liveness probe after startup probe enables it": "should be restarted by liveness probe after startup probe enables it [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should be restarted startup probe fails": "should be restarted startup probe fails [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]": "should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should be restarted with a docker exec liveness probe with timeout ": "should be restarted with a docker exec liveness probe with timeout [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance]": "should be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout": "should be restarted with a failing exec liveness probe that took longer than the timeout [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should be restarted with a local redirect http liveness probe": "should be restarted with a local redirect http liveness probe [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance]": "should have monotonically increasing restart count [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should not be ready until startupProbe succeeds": "should not be ready until startupProbe succeeds [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container should not be ready with a docker exec readiness probe timeout ": "should not be ready with a docker exec readiness probe timeout [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]": "with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance]": "with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]": "should not run with an explicit root user ID [LinuxOnly] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a container with runAsNonRoot should not run without a specified user ID": "should not run without a specified user ID [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]": "should run with an explicit non-root user ID [LinuxOnly] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a container with runAsNonRoot should run with an image specified user ID": "should run with an image specified user ID [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]": "should run the container with uid 0 [LinuxOnly] [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]": "should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess]": "should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance]": "should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]": "should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance]": "should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]": "should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]": "should allow privilege escalation when true [LinuxOnly] [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]": "should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should not launch unsafe, but not explicitly enabled sysctls on the node": "should not launch unsafe, but not explicitly enabled sysctls on the node [Disabled:Broken] [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should reject invalid sysctls": "should reject invalid sysctls [Disabled:Broken] [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should support sysctls": "should support sysctls [Disabled:Broken] [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should support unsafe sysctls which are actually whitelisted": "should support unsafe sysctls which are actually whitelisted [Disabled:Broken] [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance]": "should allow composing env vars into new env vars [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance]": "should allow substituting values in a container's args [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance]": "should allow substituting values in a container's command [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Variable Expansion should allow substituting values in a volume subpath [sig-storage] [Conformance]": "should allow substituting values in a volume subpath [sig-storage] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] Variable Expansion should fail substituting values in a volume subpath with absolute path [sig-storage][Slow] [Conformance]": "should fail substituting values in a volume subpath with absolute path [sig-storage][Slow] [Conformance] [Suite:k8s]", + + "[Top Level] [k8s.io] Variable Expansion should fail substituting values in a volume subpath with backticks [sig-storage][Slow] [Conformance]": "should fail substituting values in a volume subpath with backticks [sig-storage][Slow] [Conformance] [Suite:k8s]", + + "[Top Level] [k8s.io] Variable Expansion should succeed in writing subpaths in container [sig-storage][Slow] [Conformance]": "should succeed in writing subpaths in container [sig-storage][Slow] [Conformance] [Suite:k8s]", + + "[Top Level] [k8s.io] Variable Expansion should verify that a failing subpath expansion can be modified during the lifecycle of a container [sig-storage][Slow] [Conformance]": "should verify that a failing subpath expansion can be modified during the lifecycle of a container [sig-storage][Slow] [Conformance] [Suite:k8s]", + + "[Top Level] [k8s.io] [Feature:Example] [k8s.io] Downward API should create a pod that prints his name and namespace": "should create a pod that prints his name and namespace [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [Feature:Example] [k8s.io] Liveness liveness pods should be automatically restarted": "liveness pods should be automatically restarted [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [Feature:Example] [k8s.io] Secret should create a pod that reads a secret": "should create a pod that reads a secret [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [Feature:TTLAfterFinished][NodeAlphaFeature:TTLAfterFinished] job should be deleted once it finishes after TTL seconds": "job should be deleted once it finishes after TTL seconds [Disabled:Alpha] [sig-node] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] AppArmor load AppArmor profiles can disable an AppArmor profile, using unconfined": "can disable an AppArmor profile, using unconfined [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile": "should enforce an AppArmor profile [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running [Conformance]": "should be sent by kubelets and the scheduler about pods scheduling and running [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Kubelet [Serial] [Slow] [k8s.io] [sig-node] experimental resource usage tracking [Feature:ExperimentalResourceUsageTracking] resource tracking for 100 pods per node": "resource tracking for 100 pods per node [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Kubelet [Serial] [Slow] [k8s.io] [sig-node] regular resource usage tracking [Feature:RegularResourceUsageTracking] resource tracking for 0 pods per node": "resource tracking for 0 pods per node [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Kubelet [Serial] [Slow] [k8s.io] [sig-node] regular resource usage tracking [Feature:RegularResourceUsageTracking] resource tracking for 100 pods per node": "resource tracking for 100 pods per node [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Mount propagation should propagate mounts to the host": "should propagate mounts to the host [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] NoExecuteTaintManager Multiple Pods [Serial] evicts pods with minTolerationSeconds [Disruptive] [Conformance]": "evicts pods with minTolerationSeconds [Disruptive] [Conformance] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] NoExecuteTaintManager Multiple Pods [Serial] only evicts pods without tolerations from tainted nodes": "only evicts pods without tolerations from tainted nodes [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] NoExecuteTaintManager Single Pod [Serial] doesn't evict pod with tolerations from tainted nodes": "doesn't evict pod with tolerations from tainted nodes [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] NoExecuteTaintManager Single Pod [Serial] eventually evict pod with finite tolerations from tainted nodes": "eventually evict pod with finite tolerations from tainted nodes [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] NoExecuteTaintManager Single Pod [Serial] evicts pods from tainted nodes": "evicts pods from tainted nodes [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] NoExecuteTaintManager Single Pod [Serial] removing taint cancels eviction [Disruptive] [Conformance]": "removing taint cancels eviction [Disruptive] [Conformance] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] NodeProblemDetector [DisabledForLargeClusters] should run without error": "should run without error [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Pod garbage collector [Feature:PodGarbageCollector] [Slow] should handle the creation of 1000 pods": "should handle the creation of 1000 pods [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Pods Extended [k8s.io] Delete Grace Period should be submitted and removed": "should be submitted and removed [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Pods Extended [k8s.io] Pod Container Status should never report success for a pending container": "should never report success for a pending container [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Pods Extended [k8s.io] Pod Container lifecycle should not create extra sandbox if all containers are done": "should not create extra sandbox if all containers are done [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Pods Extended [k8s.io] Pods Set QOS Class should be set on Pods with matching resource requests and limits for memory and cpu [Conformance]": "should be set on Pods with matching resource requests and limits for memory and cpu [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process": "graceful pod terminated should wait until preStop hook completes the process [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] PreStop should call prestop when killing a pod [Conformance]": "should call prestop when killing a pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] SSH should SSH to all nodes and run commands": "should SSH to all nodes and run commands [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser And container.SecurityContext.RunAsGroup [LinuxOnly]": "should support container.SecurityContext.RunAsUser And container.SecurityContext.RunAsGroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly]": "should support container.SecurityContext.RunAsUser [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser And pod.Spec.SecurityContext.RunAsGroup [LinuxOnly]": "should support pod.Spec.SecurityContext.RunAsUser And pod.Spec.SecurityContext.RunAsGroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly]": "should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]": "should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly]": "should support seccomp default which is unconfined [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support seccomp runtime/default [LinuxOnly]": "should support seccomp runtime/default [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly]": "should support seccomp unconfined on the container [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly]": "should support seccomp unconfined on the pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support volume SELinux relabeling [Flaky] [LinuxOnly]": "should support volume SELinux relabeling [Flaky] [LinuxOnly] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support volume SELinux relabeling when using hostIPC [Flaky] [LinuxOnly]": "should support volume SELinux relabeling when using hostIPC [Flaky] [LinuxOnly] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] Security Context should support volume SELinux relabeling when using hostPID [Flaky] [LinuxOnly]": "should support volume SELinux relabeling when using hostPID [Flaky] [LinuxOnly] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] crictl should be able to run crictl on the node": "should be able to run crictl on the node [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] kubelet [k8s.io] [sig-node] Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s.": "kubelet should be able to delete 10 pods per node in 1m0s. [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] kubelet [k8s.io] [sig-node] host cleanup with volume mounts [sig-storage][HostCleanup][Flaky] Host cleanup after disrupting NFS volume [NFS] after stopping the nfs-server and deleting the (active) client pod, the NFS mount and the pod's UID directory should be removed.": "after stopping the nfs-server and deleting the (active) client pod, the NFS mount and the pod's UID directory should be removed. [Suite:k8s]", + + "[Top Level] [k8s.io] [sig-node] kubelet [k8s.io] [sig-node] host cleanup with volume mounts [sig-storage][HostCleanup][Flaky] Host cleanup after disrupting NFS volume [NFS] after stopping the nfs-server and deleting the (sleeping) client pod, the NFS mount and the pod's UID directory should be removed.": "after stopping the nfs-server and deleting the (sleeping) client pod, the NFS mount and the pod's UID directory should be removed. [Suite:k8s]", + + "[Top Level] [sig-api-machinery] API priority and fairness should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration": "should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (fairness)": "should ensure that requests can't be drowned out (fairness) [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (priority)": "should ensure that requests can't be drowned out (priority) [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance]": "listing mutating webhooks should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance]": "listing validating webhooks should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance]": "patching/updating a mutating webhook should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance]": "patching/updating a validating webhook should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance]": "should be able to deny attaching pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance]": "should be able to deny custom resource creation, update and deletion [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance]": "should be able to deny pod and configmap creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance]": "should deny crd creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance]": "should honor timeout [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance]": "should include webhook resources in discovery documents [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance]": "should mutate configmap [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance]": "should mutate custom resource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance]": "should mutate custom resource with different stored version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance]": "should mutate custom resource with pruning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance]": "should mutate pod and apply defaults after mutation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance]": "should not be able to mutate or prevent deletion of webhook configuration objects [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance]": "should unconditionally reject operations on fail closed webhook [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance]": "Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance]": "should be able to convert a non homogeneous list of CRs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance]": "should be able to convert from CR v1 to CR v2 [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance]": "watch on custom resource definition objects [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance]": "creating/deleting custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance]": "getting/updating/patching custom resource definition status sub-resource works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance]": "listing custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works [Conformance]": "custom resource defaulting for requests and from storage works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance]": "should include custom resource definition resources in discovery documents [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] [Flaky] kubectl explain works for CR with the same resource name as built-in object.": "[Flaky] kubectl explain works for CR with the same resource name as built-in object. [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance]": "removes definition from spec when one version gets changed to not be served [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance]": "updates the published spec when one version gets renamed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance]": "works for CRD preserving unknown fields at the schema root [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance]": "works for CRD preserving unknown fields in an embedded object [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance]": "works for CRD with validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD without validation schema [Conformance]": "works for CRD without validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance]": "works for multiple CRDs of different groups [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance]": "works for multiple CRDs of same group and version but different kinds [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance]": "works for multiple CRDs of same group but different versions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Discovery Custom resource should have storage version hash": "Custom resource should have storage version hash [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Discovery should validate PreferredVersion for each APIGroup [Conformance]": "should validate PreferredVersion for each APIGroup [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Etcd failure [Disruptive] should recover from SIGKILL": "should recover from SIGKILL [Serial] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Etcd failure [Disruptive] should recover from network partition with master": "should recover from network partition with master [Serial] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Events should delete a collection of events [Conformance]": "should delete a collection of events [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Events should ensure that an event can be fetched, patched, deleted, and listed [Conformance]": "should ensure that an event can be fetched, patched, deleted, and listed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should delete RS created by deployment when not orphaning [Conformance]": "should delete RS created by deployment when not orphaning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob": "should delete jobs and pods created by cronjob [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should delete pods created by rc when not orphaning [Conformance]": "should delete pods created by rc when not orphaning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance]": "should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should not be blocked by dependency circle [Conformance]": "should not be blocked by dependency circle [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance]": "should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance]": "should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Conformance]": "should orphan pods created by rc if delete options say so [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil": "should orphan pods created by rc if deleteOptions.OrphanDependents is nil [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should support cascading deletion of custom resources": "should support cascading deletion of custom resources [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Garbage collector should support orphan deletion of custom resources": "should support orphan deletion of custom resources [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod": "should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Generated clientset should create v1beta1 cronJobs, delete cronJobs, watch cronJobs": "should create v1beta1 cronJobs, delete cronJobs, watch cronJobs [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Namespaces [Serial] should always delete fast (ALL of 100 namespaces in 150 seconds) [Feature:ComprehensiveNamespaceDraining]": "should always delete fast (ALL of 100 namespaces in 150 seconds) [Feature:ComprehensiveNamespaceDraining] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Namespaces [Serial] should delete fast enough (90 percent of 100 namespaces in 150 seconds)": "should delete fast enough (90 percent of 100 namespaces in 150 seconds) [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Namespaces [Serial] should ensure that all pods are removed when a namespace is deleted [Conformance]": "should ensure that all pods are removed when a namespace is deleted [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Namespaces [Serial] should ensure that all services are removed when a namespace is deleted [Conformance]": "should ensure that all services are removed when a namespace is deleted [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Namespaces [Serial] should patch a Namespace [Conformance]": "should patch a Namespace [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes.": "should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class.": "should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class.": "should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class.": "should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists).": "should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists). [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn).": "should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn). [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.": "should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with best effort scope using scope-selectors.": "should verify ResourceQuota with best effort scope using scope-selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with terminating scopes through scope selectors.": "should verify ResourceQuota with terminating scopes through scope selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance]": "should be able to update and delete ResourceQuota. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance]": "should create a ResourceQuota and capture the life of a configMap. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a custom resource.": "should create a ResourceQuota and capture the life of a custom resource. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim with a storage class. [sig-storage]": "should create a ResourceQuota and capture the life of a persistent volume claim with a storage class. [sig-storage] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim. [sig-storage]": "should create a ResourceQuota and capture the life of a persistent volume claim. [sig-storage] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a pod. [Conformance]": "should create a ResourceQuota and capture the life of a pod. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance]": "should create a ResourceQuota and capture the life of a replica set. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replication controller. [Conformance]": "should create a ResourceQuota and capture the life of a replication controller. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a secret. [Conformance]": "should create a ResourceQuota and capture the life of a secret. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a service. [Conformance]": "should create a ResourceQuota and capture the life of a service. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should create a ResourceQuota and ensure its status is promptly calculated. [Conformance]": "should create a ResourceQuota and ensure its status is promptly calculated. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope. [Conformance]": "should verify ResourceQuota with best effort scope. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes. [Conformance]": "should verify ResourceQuota with terminating scopes. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance]": "should be consumable from pods in env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Secrets should be consumable via the environment [NodeConformance] [Conformance]": "should be consumable via the environment [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Secrets should fail to create secret due to empty secret key [Conformance]": "should fail to create secret due to empty secret key [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Secrets should patch a secret [Conformance]": "should patch a secret [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Server request timeout default timeout should be used if the specified timeout in the request URL is 0s": "default timeout should be used if the specified timeout in the request URL is 0s [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Server request timeout should return HTTP status code 400 if the user specifies an invalid timeout in the request URL": "should return HTTP status code 400 if the user specifies an invalid timeout in the request URL [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Server request timeout the request should be served with a default timeout if the specified timeout in the request URL exceeds maximum allowed": "the request should be served with a default timeout if the specified timeout in the request URL exceeds maximum allowed [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls": "should return chunks of results for list calls [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Servers with support for API chunking should support continue listing from the last key if the original version has been compacted away, though the list is inconsistent [Slow]": "should support continue listing from the last key if the original version has been compacted away, though the list is inconsistent [Slow] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Servers with support for Table transformation should return a 406 for a backend which does not implement metadata [Conformance]": "should return a 406 for a backend which does not implement metadata [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Servers with support for Table transformation should return chunks of table results for list calls": "should return chunks of table results for list calls [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Servers with support for Table transformation should return generic metadata details across all namespaces for nodes": "should return generic metadata details across all namespaces for nodes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Servers with support for Table transformation should return pod details": "should return pod details [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance]": "should be able to restart watching from the last resource version observed by the previous watch [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance]": "should be able to start watching from a specific resource version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Watchers should observe add, update, and delete watch notifications on configmaps [Conformance]": "should observe add, update, and delete watch notifications on configmaps [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]": "should observe an object deletion if it stops meeting the requirements of the selector [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance]": "should receive events on concurrent watches in same order [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/json,application/vnd.kubernetes.protobuf\"": "watch and report errors with accept \"application/json,application/vnd.kubernetes.protobuf\" [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/json\"": "watch and report errors with accept \"application/json\" [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/vnd.kubernetes.protobuf,application/json\"": "watch and report errors with accept \"application/vnd.kubernetes.protobuf,application/json\" [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/vnd.kubernetes.protobuf\"": "watch and report errors with accept \"application/vnd.kubernetes.protobuf\" [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] health handlers should contain necessary checks": "should contain necessary checks [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-api-machinery] server version should find the server version [Conformance]": "should find the server version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should be able to schedule after more than 100 missed schedule": "should be able to schedule after more than 100 missed schedule [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should delete failed finished jobs with limit of one job": "should delete failed finished jobs with limit of one job [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should delete successful finished jobs with limit of one successful job": "should delete successful finished jobs with limit of one successful job [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should not emit unexpected warnings": "should not emit unexpected warnings [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should not schedule jobs when suspended [Slow]": "should not schedule jobs when suspended [Slow] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should not schedule new jobs when ForbidConcurrent [Slow]": "should not schedule new jobs when ForbidConcurrent [Slow] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should remove from active list jobs that have been deleted": "should remove from active list jobs that have been deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should replace jobs when ReplaceConcurrent": "should replace jobs when ReplaceConcurrent [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] CronJob should schedule multiple jobs concurrently": "should schedule multiple jobs concurrently [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Daemon set [Serial] should not update pod when spec was updated and update strategy is OnDelete": "should not update pod when spec was updated and update strategy is OnDelete [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Daemon set [Serial] should retry creating failed daemon pods [Conformance]": "should retry creating failed daemon pods [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Daemon set [Serial] should rollback without unnecessary restarts [Conformance]": "should rollback without unnecessary restarts [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Daemon set [Serial] should run and stop complex daemon [Conformance]": "should run and stop complex daemon [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Daemon set [Serial] should run and stop complex daemon with node affinity": "should run and stop complex daemon with node affinity [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Daemon set [Serial] should run and stop simple daemon [Conformance]": "should run and stop simple daemon [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Daemon set [Serial] should update pod when spec was updated and update strategy is RollingUpdate [Conformance]": "should update pod when spec was updated and update strategy is RollingUpdate [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] DaemonRestart [Disruptive] Controller Manager should not create/delete replicas across restart": "Controller Manager should not create/delete replicas across restart [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] DaemonRestart [Disruptive] Kube-proxy should recover after being killed accidentally": "Kube-proxy should recover after being killed accidentally [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] DaemonRestart [Disruptive] Kubelet should not restart containers across restart": "Kubelet should not restart containers across restart [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] DaemonRestart [Disruptive] Scheduler should continue assigning pods to nodes across restart": "Scheduler should continue assigning pods to nodes across restart [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment RecreateDeployment should delete old pods and create new ones [Conformance]": "RecreateDeployment should delete old pods and create new ones [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment RollingUpdateDeployment should delete old pods and create new ones [Conformance]": "RollingUpdateDeployment should delete old pods and create new ones [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment deployment reaping should cascade to its replica sets and pods": "deployment reaping should cascade to its replica sets and pods [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment deployment should delete old replica sets [Conformance]": "deployment should delete old replica sets [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment deployment should support proportional scaling [Conformance]": "deployment should support proportional scaling [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment deployment should support rollover [Conformance]": "deployment should support rollover [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment iterative rollouts should eventually progress": "iterative rollouts should eventually progress [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment should not disrupt a cloud load-balancer's connectivity during rollout": "should not disrupt a cloud load-balancer's connectivity during rollout [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment should run the lifecycle of a Deployment [Conformance]": "should run the lifecycle of a Deployment [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Deployment test Deployment ReplicaSet orphaning and adoption regarding controllerRef": "test Deployment ReplicaSet orphaning and adoption regarding controllerRef [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController Listing PodDisruptionBudgets for all namespaces should list and delete a collection of PodDisruptionBudgets": "should list and delete a collection of PodDisruptionBudgets [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController evictions: enough pods, absolute => should allow an eviction": "evictions: enough pods, absolute => should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController evictions: enough pods, replicaSet, percentage => should allow an eviction": "evictions: enough pods, replicaSet, percentage => should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController evictions: maxUnavailable allow single eviction, percentage => should allow an eviction": "evictions: maxUnavailable allow single eviction, percentage => should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController evictions: maxUnavailable deny evictions, integer => should not allow an eviction [Serial]": "evictions: maxUnavailable deny evictions, integer => should not allow an eviction [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController evictions: no PDB => should allow an eviction": "evictions: no PDB => should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController evictions: too few pods, absolute => should not allow an eviction": "evictions: too few pods, absolute => should not allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController evictions: too few pods, replicaSet, percentage => should not allow an eviction [Serial]": "evictions: too few pods, replicaSet, percentage => should not allow an eviction [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController should block an eviction until the PDB is updated to allow it": "should block an eviction until the PDB is updated to allow it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController should create a PodDisruptionBudget": "should create a PodDisruptionBudget [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController should observe PodDisruptionBudget status updated": "should observe PodDisruptionBudget status updated [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] DisruptionController should update/patch PodDisruptionBudget status": "should update/patch PodDisruptionBudget status [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Job should adopt matching orphans and release non-matching pods [Conformance]": "should adopt matching orphans and release non-matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Job should delete a job [Conformance]": "should delete a job [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Job should fail to exceed backoffLimit": "should fail to exceed backoffLimit [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Job should fail when exceeds active deadline": "should fail when exceeds active deadline [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Job should remove pods when job is deleted": "should remove pods when job is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Job should run a job to completion when tasks sometimes fail and are locally restarted [Conformance]": "should run a job to completion when tasks sometimes fail and are locally restarted [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] Job should run a job to completion when tasks sometimes fail and are not locally restarted": "should run a job to completion when tasks sometimes fail and are not locally restarted [Flaky] [Suite:k8s]", + + "[Top Level] [sig-apps] Job should run a job to completion when tasks succeed": "should run a job to completion when tasks succeed [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] Pods should be evicted from unready Node [Feature:TaintEviction] All pods on the unreachable node should be marked as NotReady upon the node turn NotReady AND all pods should be evicted after eviction timeout passes": "[Feature:TaintEviction] All pods on the unreachable node should be marked as NotReady upon the node turn NotReady AND all pods should be evicted after eviction timeout passes [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] Pods should return to running and ready state after network partition is healed All pods on the unreachable node should be marked as NotReady upon the node turn NotReady AND all pods should be mark back to Ready when the node get back to Ready before pod eviction timeout": "All pods on the unreachable node should be marked as NotReady upon the node turn NotReady AND all pods should be mark back to Ready when the node get back to Ready before pod eviction timeout [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [Job] should create new pods when node is partitioned": "should create new pods when node is partitioned [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [ReplicationController] should eagerly create replacement pod during network partition when termination grace is non-zero": "should eagerly create replacement pod during network partition when termination grace is non-zero [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [ReplicationController] should recreate pods scheduled on the unreachable node AND allow scheduling of pods on a node after it rejoins the cluster": "should recreate pods scheduled on the unreachable node AND allow scheduling of pods on a node after it rejoins the cluster [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [StatefulSet] should come back up if node goes down [Slow] [Disruptive]": "should come back up if node goes down [Slow] [Disruptive] [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [StatefulSet] should not reschedule stateful pods if there is a network partition [Slow] [Disruptive]": "should not reschedule stateful pods if there is a network partition [Slow] [Disruptive] [Serial] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicaSet should adopt matching pods on creation and release no longer matching pods [Conformance]": "should adopt matching pods on creation and release no longer matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicaSet should serve a basic image on each replica with a private image": "should serve a basic image on each replica with a private image [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicaSet should serve a basic image on each replica with a public image [Conformance]": "should serve a basic image on each replica with a public image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicaSet should surface a failure condition on a common issue like exceeded quota": "should surface a failure condition on a common issue like exceeded quota [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicationController should adopt matching pods on creation [Conformance]": "should adopt matching pods on creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicationController should release no longer matching pods [Conformance]": "should release no longer matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicationController should serve a basic image on each replica with a private image": "should serve a basic image on each replica with a private image [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicationController should serve a basic image on each replica with a public image [Conformance]": "should serve a basic image on each replica with a public image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicationController should surface a failure condition on a common issue like exceeded quota [Conformance]": "should surface a failure condition on a common issue like exceeded quota [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] ReplicationController should test the lifecycle of a ReplicationController [Conformance]": "should test the lifecycle of a ReplicationController [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Burst scaling should run to completion even with unhealthy pods [Slow] [Conformance]": "Burst scaling should run to completion even with unhealthy pods [Slow] [Conformance] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Scaling should happen in predictable order and halt if any stateful pod is unhealthy [Slow] [Conformance]": "Scaling should happen in predictable order and halt if any stateful pod is unhealthy [Slow] [Conformance] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Should recreate evicted statefulset [Conformance]": "Should recreate evicted statefulset [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should adopt matching orphans and release non-matching pods": "should adopt matching orphans and release non-matching pods [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should have a working scale subresource [Conformance]": "should have a working scale subresource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should implement legacy replacement when the update strategy is OnDelete": "should implement legacy replacement when the update strategy is OnDelete [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should not deadlock when a pod's predecessor fails": "should not deadlock when a pod's predecessor fails [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications [Conformance]": "should perform canary updates and phased rolling updates of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance]": "should perform rolling updates and roll backs of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications with PVCs": "should perform rolling updates and roll backs of template modifications with PVCs [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should provide basic identity": "should provide basic identity [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working CockroachDB cluster": "should creating a working CockroachDB cluster [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working mysql cluster": "should creating a working mysql cluster [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working redis cluster": "should creating a working redis cluster [Suite:k8s]", + + "[Top Level] [sig-apps] StatefulSet [k8s.io] Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working zookeeper cluster": "should creating a working zookeeper cluster [Suite:k8s]", + + "[Top Level] [sig-auth] Certificates API [Privileged:ClusterAdmin] should support CSR API operations [Conformance]": "should support CSR API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-auth] Certificates API [Privileged:ClusterAdmin] should support building a client with a CSR": "should support building a client with a CSR [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] Metadata Concealment should run a check-metadata-concealment job to completion": "should run a check-metadata-concealment job to completion [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] PodSecurityPolicy [Feature:PodSecurityPolicy] should allow pods under the privileged policy.PodSecurityPolicy": "should allow pods under the privileged policy.PodSecurityPolicy [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-auth] PodSecurityPolicy [Feature:PodSecurityPolicy] should enforce the restricted policy.PodSecurityPolicy": "should enforce the restricted policy.PodSecurityPolicy [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-auth] PodSecurityPolicy [Feature:PodSecurityPolicy] should forbid pod creation when no PSP is available": "should forbid pod creation when no PSP is available [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]": "should allow opting out of API token automount [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should ensure a single API token exists": "should ensure a single API token exists [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace": "should guarantee kube-root-ca.crt exist in any namespace [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should mount an API token into pods [Conformance]": "should mount an API token into pods [Conformance] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should mount projected service account token [Conformance]": "should mount projected service account token [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should run through the lifecycle of a ServiceAccount [Conformance]": "should run through the lifecycle of a ServiceAccount [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]": "should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should support InClusterConfig with token rotation [Slow]": "should support InClusterConfig with token rotation [Slow] [Suite:k8s]", + + "[Top Level] [sig-auth] ServiceAccounts should support OIDC discovery of service account issuer [Feature:ServiceAccountIssuerDiscovery]": "should support OIDC discovery of service account issuer [Feature:ServiceAccountIssuerDiscovery] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthenticator] The kubelet can delegate ServiceAccount tokens to the API server": "The kubelet can delegate ServiceAccount tokens to the API server [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthenticator] The kubelet's main port 10250 should reject requests with no credentials": "The kubelet's main port 10250 should reject requests with no credentials [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node": "A node shouldn't be able to create another node [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node": "A node shouldn't be able to delete another node [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error": "Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error": "Getting a non-existent secret should exit with the Forbidden error, not a NotFound error [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed": "Getting a secret for a workload the node has access to should succeed [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error": "Getting an existing configmap should exit with the Forbidden error [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error": "Getting an existing secret should exit with the Forbidden error [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] Should be able to scale a node group down to 0[Feature:ClusterSizeAutoscalingScaleDown]": "Should be able to scale a node group down to 0[Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] Should be able to scale a node group up from 0[Feature:ClusterSizeAutoscalingScaleUp]": "Should be able to scale a node group up from 0[Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] Should not scale GPU pool up if pod does not require GPUs [GpuType:] [Feature:ClusterSizeAutoscalingGpu]": "Should not scale GPU pool up if pod does not require GPUs [GpuType:] [Feature:ClusterSizeAutoscalingGpu] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] Should scale down GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]": "Should scale down GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] Should scale up GPU pool from 0 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]": "Should scale up GPU pool from 0 [GpuType:] [Feature:ClusterSizeAutoscalingGpu] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] Should scale up GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]": "Should scale up GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] Shouldn't perform scale up operation and should list unhealthy status if most of the cluster is broken[Feature:ClusterSizeAutoscalingScaleUp]": "Shouldn't perform scale up operation and should list unhealthy status if most of the cluster is broken[Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should add node to the particular mig [Feature:ClusterSizeAutoscalingScaleUp]": "should add node to the particular mig [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down by draining multiple pods one by one as dictated by pdb[Feature:ClusterSizeAutoscalingScaleDown]": "should be able to scale down by draining multiple pods one by one as dictated by pdb[Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down by draining system pods with pdb[Feature:ClusterSizeAutoscalingScaleDown]": "should be able to scale down by draining system pods with pdb[Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down when rescheduling a pod is required and pdb allows for it[Feature:ClusterSizeAutoscalingScaleDown]": "should be able to scale down when rescheduling a pod is required and pdb allows for it[Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed [Feature:ClusterSizeAutoscalingScaleDown]": "should correctly scale down after a node is not needed [Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed and one node is broken [Feature:ClusterSizeAutoscalingScaleDown]": "should correctly scale down after a node is not needed and one node is broken [Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed when there is non autoscaled pool[Feature:ClusterSizeAutoscalingScaleDown]": "should correctly scale down after a node is not needed when there is non autoscaled pool[Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should disable node pool autoscaling [Feature:ClusterSizeAutoscalingScaleUp]": "should disable node pool autoscaling [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small [Feature:ClusterSizeAutoscalingScaleUp]": "should increase cluster size if pending pods are small [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small and one node is broken [Feature:ClusterSizeAutoscalingScaleUp]": "should increase cluster size if pending pods are small and one node is broken [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small and there is another node pool that is not autoscaled [Feature:ClusterSizeAutoscalingScaleUp]": "should increase cluster size if pending pods are small and there is another node pool that is not autoscaled [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pod requesting EmptyDir volume is pending [Feature:ClusterSizeAutoscalingScaleUp]": "should increase cluster size if pod requesting EmptyDir volume is pending [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pod requesting volume is pending [Feature:ClusterSizeAutoscalingScaleUp]": "should increase cluster size if pod requesting volume is pending [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pods are pending due to host port conflict [Feature:ClusterSizeAutoscalingScaleUp]": "should increase cluster size if pods are pending due to host port conflict [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pods are pending due to pod anti-affinity [Feature:ClusterSizeAutoscalingScaleUp]": "should increase cluster size if pods are pending due to pod anti-affinity [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should scale down when expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown]": "should scale down when expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should scale up correct target pool [Feature:ClusterSizeAutoscalingScaleUp]": "should scale up correct target pool [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] should scale up when non expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp]": "should scale up when non expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't be able to scale down when rescheduling a pod is required, but pdb doesn't allow drain[Feature:ClusterSizeAutoscalingScaleDown]": "shouldn't be able to scale down when rescheduling a pod is required, but pdb doesn't allow drain[Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't increase cluster size if pending pod is too large [Feature:ClusterSizeAutoscalingScaleUp]": "shouldn't increase cluster size if pending pod is too large [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale down when non expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown]": "shouldn't scale down when non expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale up when expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp]": "shouldn't scale up when expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale up when expendable pod is preempted [Feature:ClusterSizeAutoscalingScaleUp]": "shouldn't scale up when expendable pod is preempted [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't trigger additional scale-ups during processing scale-up [Feature:ClusterSizeAutoscalingScaleUp]": "shouldn't trigger additional scale-ups during processing scale-up [Feature:ClusterSizeAutoscalingScaleUp] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] DNS horizontal autoscaling [DisabledForLargeClusters] kube-dns-autoscaler should scale kube-dns pods in both nonfaulty and faulty scenarios": "[DisabledForLargeClusters] kube-dns-autoscaler should scale kube-dns pods in both nonfaulty and faulty scenarios [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] DNS horizontal autoscaling [Serial] [Slow] kube-dns-autoscaler should scale kube-dns pods when cluster size changed": "[Serial] [Slow] kube-dns-autoscaler should scale kube-dns pods when cluster size changed [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] ReplicationController light Should scale from 1 pod to 2 pods": "Should scale from 1 pod to 2 pods [Flaky] [Serial] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] ReplicationController light Should scale from 2 pods to 1 pod [Slow]": "Should scale from 2 pods to 1 pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] Deployment Should scale from 1 pod to 3 pods and from 3 to 5": "Should scale from 1 pod to 3 pods and from 3 to 5 [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] Deployment Should scale from 5 pods to 3 pods and from 3 to 1": "Should scale from 5 pods to 3 pods and from 3 to 1 [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from 1 pod to 3 pods and from 3 to 5": "Should scale from 1 pod to 3 pods and from 3 to 5 [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from 5 pods to 3 pods and from 3 to 1": "Should scale from 5 pods to 3 pods and from 3 to 1 [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicationController Should scale from 1 pod to 3 pods and from 3 to 5 and verify decision stability": "Should scale from 1 pod to 3 pods and from 3 to 5 and verify decision stability [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicationController Should scale from 5 pods to 3 pods and from 3 to 1 and verify decision stability": "Should scale from 5 pods to 3 pods and from 3 to 1 and verify decision stability [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Object from Stackdriver [Feature:CustomMetricsAutoscaling]": "should scale down with Custom Metric of type Object from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling]": "should scale down with Custom Metric of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver with Prometheus [Feature:CustomMetricsAutoscaling]": "should scale down with Custom Metric of type Pod from Stackdriver with Prometheus [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target average value from Stackdriver [Feature:CustomMetricsAutoscaling]": "should scale down with External Metric with target average value from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target value from Stackdriver [Feature:CustomMetricsAutoscaling]": "should scale down with External Metric with target value from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two External metrics from Stackdriver [Feature:CustomMetricsAutoscaling]": "should scale up with two External metrics from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two metrics of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling]": "should scale up with two metrics of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets": "should support forwarding over websockets [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects NO client request should support a client that connects, sends DATA, and disconnects": "should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends DATA, and disconnects": "should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends NO DATA, and disconnects": "should support a client that connects, sends NO DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets": "should support forwarding over websockets [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects NO client request should support a client that connects, sends DATA, and disconnects": "should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends DATA, and disconnects": "should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends NO DATA, and disconnects": "should support a client that connects, sends NO DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]": "should create and stop a working application [Conformance] [Slow] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]": "should check if v1 is in available api versions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl apply apply set/view last-applied": "apply set/view last-applied [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl apply should apply a new configuration to an existing RC": "should apply a new configuration to an existing RC [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl apply should reuse port when apply to an existing SVC": "should reuse port when apply to an existing SVC [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl client-side validation should create/apply a CR with unknown fields for CRD with no validation schema": "should create/apply a CR with unknown fields for CRD with no validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl client-side validation should create/apply a valid CR for CRD with validation schema": "should create/apply a valid CR for CRD with validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl client-side validation should create/apply a valid CR with arbitrary-extra properties for CRD with partially-specified validation schema": "should create/apply a valid CR with arbitrary-extra properties for CRD with partially-specified validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl cluster-info dump should check if cluster-info dump succeeds": "should check if cluster-info dump succeeds [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl cluster-info should check if Kubernetes control plane services is included in cluster-info [Conformance]": "should check if Kubernetes control plane services is included in cluster-info [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl copy should copy a file from a running Pod": "should copy a file from a running Pod [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl create quota should create a quota with scopes": "should create a quota with scopes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl create quota should create a quota without scopes": "should create a quota without scopes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl create quota should reject quota with invalid scopes": "should reject quota with invalid scopes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for cronjob": "should check if kubectl describe prints relevant information for cronjob [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance]": "should check if kubectl describe prints relevant information for rc and pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl diff should check if kubectl diff finds a difference for Deployments [Conformance]": "should check if kubectl diff finds a difference for Deployments [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl expose should create services for rc [Conformance]": "should create services for rc [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl get componentstatuses should get componentstatuses": "should get componentstatuses [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance]": "should update the label on a resource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl logs should be able to retrieve and filter logs [Conformance]": "should be able to retrieve and filter logs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl patch should add annotations for pods in rc [Conformance]": "should add annotations for pods in rc [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance]": "should update a single-container pod's image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl run pod should create a pod from an image when restart is Never [Conformance]": "should create a pod from an image when restart is Never [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl server-side dry-run should check if kubectl can dry-run update Pods [Conformance]": "should check if kubectl can dry-run update Pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl taint [Serial] should remove all the taints with the same key off a node": "should remove all the taints with the same key off a node [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl taint [Serial] should update the taint on a node": "should update the taint on a node [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Kubectl version should check is all data is printed [Conformance]": "should check is all data is printed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Proxy server should support --unix-socket=/path [Conformance]": "should support --unix-socket=/path [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Proxy server should support proxy with --port 0 [Conformance]": "should support proxy with --port 0 [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should contain last line of the log": "should contain last line of the log [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should handle in-cluster config": "should handle in-cluster config [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should return command exit codes": "should return command exit codes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy": "should support exec through an HTTP proxy [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should support exec through kubectl proxy": "should support exec through kubectl proxy [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should support exec using resource/name": "should support exec using resource/name [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should support exec": "should support exec [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should support inline execution and attach": "should support inline execution and attach [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Simple pod should support port-forward": "should support port-forward [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Update Demo should create and stop a replication controller [Conformance]": "should create and stop a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-cli] Kubectl client Update Demo should scale a replication controller [Conformance]": "should scale a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Cluster level logging using Elasticsearch [Feature:Elasticsearch] should check that logs from containers are ingested into Elasticsearch": "should check that logs from containers are ingested into Elasticsearch [Disabled:Unimplemented] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Events API should delete a collection of events [Conformance]": "should delete a collection of events [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Events API should ensure that an event can be fetched, patched, deleted, and listed [Conformance]": "should ensure that an event can be fetched, patched, deleted, and listed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Kibana Logging Instances Is Alive [Feature:Elasticsearch] should check that the Kibana logging instance is alive": "should check that the Kibana logging instance is alive [Disabled:Unimplemented] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Logging soak [Performance] [Slow] [Disruptive] should survive logging 1KB every 1s seconds, for a duration of 2m0s": "should survive logging 1KB every 1s seconds, for a duration of 2m0s [Serial] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] MetricsGrabber should grab all metrics from API server.": "should grab all metrics from API server. [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] MetricsGrabber should grab all metrics from a ControllerManager.": "should grab all metrics from a ControllerManager. [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] MetricsGrabber should grab all metrics from a Kubelet.": "should grab all metrics from a Kubelet. [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] MetricsGrabber should grab all metrics from a Scheduler.": "should grab all metrics from a Scheduler. [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Stackdriver Monitoring should have accelerator metrics [Feature:StackdriverAcceleratorMonitoring]": "should have accelerator metrics [Feature:StackdriverAcceleratorMonitoring] [Disabled:Unimplemented] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Stackdriver Monitoring should have cluster metrics [Feature:StackdriverMonitoring]": "should have cluster metrics [Feature:StackdriverMonitoring] [Disabled:Unimplemented] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for external metrics [Feature:StackdriverExternalMetrics]": "should run Custom Metrics - Stackdriver Adapter for external metrics [Feature:StackdriverExternalMetrics] [Disabled:Unimplemented] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for new resource model [Feature:StackdriverCustomMetrics]": "should run Custom Metrics - Stackdriver Adapter for new resource model [Feature:StackdriverCustomMetrics] [Disabled:Unimplemented] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for old resource model [Feature:StackdriverCustomMetrics]": "should run Custom Metrics - Stackdriver Adapter for old resource model [Feature:StackdriverCustomMetrics] [Disabled:Unimplemented] [Suite:k8s]", + + "[Top Level] [sig-instrumentation] Stackdriver Monitoring should run Stackdriver Metadata Agent [Feature:StackdriverMetadataAgent]": "should run Stackdriver Metadata Agent [Feature:StackdriverMetadataAgent] [Disabled:Unimplemented] [Suite:k8s]", + + "[Top Level] [sig-network] ClusterDns [Feature:Example] should create pod that uses dns": "should create pod that uses dns [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service": "should be able to preserve UDP traffic when server pod cycles for a ClusterIP service [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service": "should be able to preserve UDP traffic when server pod cycles for a NodePort service [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] DNS configMap nameserver Change stubDomain should be able to change stubDomain configuration [Slow][Serial]": "should be able to change stubDomain configuration [Slow][Serial] [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-network] DNS configMap nameserver Forward PTR lookup should forward PTR records lookup to upstream nameserver [Slow][Serial]": "should forward PTR records lookup to upstream nameserver [Slow][Serial] [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-network] DNS configMap nameserver Forward external name lookup should forward externalname lookup to upstream nameserver [Slow][Serial]": "should forward externalname lookup to upstream nameserver [Slow][Serial] [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should provide /etc/hosts entries for the cluster [LinuxOnly] [Conformance]": "should provide /etc/hosts entries for the cluster [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should provide DNS for ExternalName services [Conformance]": "should provide DNS for ExternalName services [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should provide DNS for pods for Hostname [LinuxOnly] [Conformance]": "should provide DNS for pods for Hostname [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should provide DNS for pods for Subdomain [Conformance]": "should provide DNS for pods for Subdomain [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should provide DNS for services [Conformance]": "should provide DNS for services [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should provide DNS for the cluster [Conformance]": "should provide DNS for the cluster [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should provide DNS for the cluster [Provider:GCE]": "should provide DNS for the cluster [Provider:GCE] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance]": "should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should resolve DNS of partial qualified names for the cluster [LinuxOnly]": "should resolve DNS of partial qualified names for the cluster [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should support configurable pod DNS nameservers [Conformance]": "should support configurable pod DNS nameservers [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] DNS should support configurable pod resolv.conf": "should support configurable pod resolv.conf [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] ESIPP [Slow] should handle updates to ExternalTrafficPolicy field [DisabledForLargeClusters]": "should handle updates to ExternalTrafficPolicy field [DisabledForLargeClusters] [Suite:k8s]", + + "[Top Level] [sig-network] ESIPP [Slow] should only target nodes with endpoints": "should only target nodes with endpoints [Suite:k8s]", + + "[Top Level] [sig-network] ESIPP [Slow] should work for type=LoadBalancer": "should work for type=LoadBalancer [Suite:k8s]", + + "[Top Level] [sig-network] ESIPP [Slow] should work for type=NodePort": "should work for type=NodePort [Suite:k8s]", + + "[Top Level] [sig-network] ESIPP [Slow] should work from pods": "should work from pods [Suite:k8s]", + + "[Top Level] [sig-network] EndpointSlice should create Endpoints and EndpointSlices for Pods matching a Service": "should create Endpoints and EndpointSlices for Pods matching a Service [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] EndpointSlice should create and delete Endpoints and EndpointSlices for a Service with a selector specified": "should create and delete Endpoints and EndpointSlices for a Service with a selector specified [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] EndpointSlice should have Endpoints and EndpointSlices pointing to API Server": "should have Endpoints and EndpointSlices pointing to API Server [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] EndpointSliceMirroring should mirror a custom Endpoints resource through create update and delete": "should mirror a custom Endpoints resource through create update and delete [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Firewall rule [Slow] [Serial] should create valid firewall rules for LoadBalancer type service": "[Slow] [Serial] should create valid firewall rules for LoadBalancer type service [Suite:k8s]", + + "[Top Level] [sig-network] Firewall rule should have correct firewall rules for e2e cluster": "should have correct firewall rules for e2e cluster [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-network] Ingress API should support creating Ingress API operations [Conformance]": "should support creating Ingress API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] IngressClass API should support creating IngressClass API operations [Conformance]": " should support creating IngressClass API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] IngressClass [Feature:Ingress] should not set default value if no default IngressClass [Serial]": "should not set default value if no default IngressClass [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-network] IngressClass [Feature:Ingress] should prevent Ingress creation if more than 1 IngressClass marked as default [Serial]": "should prevent Ingress creation if more than 1 IngressClass marked as default [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-network] IngressClass [Feature:Ingress] should set default value on new IngressClass [Serial]": "should set default value on new IngressClass [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-network] KubeProxy should resolve connection reset issue #74839 [Slow]": "should resolve connection reset issue #74839 [Slow] [Suite:k8s]", + + "[Top Level] [sig-network] KubeProxy should set TCP CLOSE_WAIT timeout [Privileged]": "should set TCP CLOSE_WAIT timeout [Privileged] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] multicluster ingress should get instance group annotation": "multicluster ingress should get instance group annotation [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should conform to Ingress spec": "should conform to Ingress spec [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] rolling update backend pods should not cause service disruption": "rolling update backend pods should not cause service disruption [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should be able to create a ClusterIP service": "should be able to create a ClusterIP service [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should be able to switch between IG and NEG modes": "should be able to switch between IG and NEG modes [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should conform to Ingress spec": "should conform to Ingress spec [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should create NEGs for all ports with the Ingress annotation, and NEGs for the standalone annotation otherwise": "should create NEGs for all ports with the Ingress annotation, and NEGs for the standalone annotation otherwise [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should sync endpoints for both Ingress-referenced NEG and standalone NEG": "should sync endpoints for both Ingress-referenced NEG and standalone NEG [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should sync endpoints to NEG": "should sync endpoints to NEG [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should conform to Ingress spec": "should conform to Ingress spec [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should create ingress with backend HTTPS": "should create ingress with backend HTTPS [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should create ingress with pre-shared certificate": "should create ingress with pre-shared certificate [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should remove clusters as expected": "should remove clusters as expected [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should support https-only annotation": "should support https-only annotation [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] single and multi-cluster ingresses should be able to exist together": "single and multi-cluster ingresses should be able to exist together [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 Scalability GCE [Slow] [Serial] [Feature:IngressScale] Creating and updating ingresses should happen promptly with small/medium/large amount of ingresses": "Creating and updating ingresses should happen promptly with small/medium/large amount of ingresses [Suite:k8s]", + + "[Top Level] [sig-network] Loadbalancing: L7 [Slow] Nginx should conform to Ingress spec": "should conform to Ingress spec [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy API should support creating NetworkPolicy API operations": "should support creating NetworkPolicy API operations [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [Feature:SCTPConnectivity][LinuxOnly][Disruptive] NetworkPolicy between server and client using SCTP should enforce policy based on Ports [Feature:NetworkPolicy]": "should enforce policy based on Ports [Feature:NetworkPolicy] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [Feature:SCTPConnectivity][LinuxOnly][Disruptive] NetworkPolicy between server and client using SCTP should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]": "should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [Feature:SCTPConnectivity][LinuxOnly][Disruptive] NetworkPolicy between server and client using SCTP should support a 'default-deny' policy [Feature:NetworkPolicy]": "should support a 'default-deny' policy [Feature:NetworkPolicy] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy]": "should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy]": "should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy]": "should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy]": "should allow ingress access from updated namespace [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy]": "should allow ingress access from updated pod [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy]": "should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy]": "should deny ingress access to updated pod [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]": "should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy]": "should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy]": "should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy]": "should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy]": "should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy]": "should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy]": "should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]": "should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector or NamespaceSelector [Feature:NetworkPolicy]": "should enforce policy based on PodSelector or NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector with MatchExpressions[Feature:NetworkPolicy]": "should enforce policy based on PodSelector with MatchExpressions[Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy]": "should enforce policy based on Ports [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic from pods within server namespace based on PodSelector [Feature:NetworkPolicy]": "should enforce policy to allow traffic from pods within server namespace based on PodSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector [Feature:NetworkPolicy]": "should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]": "should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce updated policy [Feature:NetworkPolicy]": "should enforce updated policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy]": "should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should not allow access by TCP when a policy specifies only SCTP [Feature:NetworkPolicy] [Feature:SCTP]": "should not allow access by TCP when a policy specifies only SCTP [Feature:NetworkPolicy] [Feature:SCTP] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy]": "should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy]": "should support a 'default-deny-all' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy]": "should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy]": "should support allow-all policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should work with Ingress,Egress specified together [Feature:NetworkPolicy]": "should work with Ingress,Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [NodeConformance] [Conformance]": "should function for intra-pod communication: http [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: sctp [LinuxOnly][Feature:SCTPConnectivity][Disruptive]": "should function for intra-pod communication: sctp [LinuxOnly][Feature:SCTPConnectivity][Disruptive] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [NodeConformance] [Conformance]": "should function for intra-pod communication: udp [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]": "should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Pods should function for node-pod communication: sctp [LinuxOnly][Feature:SCTPConnectivity][Disruptive]": "should function for node-pod communication: sctp [LinuxOnly][Feature:SCTPConnectivity][Disruptive] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]": "should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should be able to handle large requests: http": "should be able to handle large requests: http [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should be able to handle large requests: udp": "should be able to handle large requests: udp [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly]": "should function for client IP based session affinity: http [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for client IP based session affinity: udp [LinuxOnly]": "should function for client IP based session affinity: udp [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for endpoint-Service: http": "should function for endpoint-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for endpoint-Service: sctp [Feature:SCTPConnectivity][Disruptive]": "should function for endpoint-Service: sctp [Feature:SCTPConnectivity][Disruptive] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for endpoint-Service: udp": "should function for endpoint-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for multiple endpoint-Services with same selector": "should function for multiple endpoint-Services with same selector [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for node-Service: http": "should function for node-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for node-Service: sctp [Feature:SCTPConnectivity][Disruptive]": "should function for node-Service: sctp [Feature:SCTPConnectivity][Disruptive] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for node-Service: udp": "should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for pod-Service(hostNetwork): udp": "should function for pod-Service(hostNetwork): udp [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for pod-Service: http": "should function for pod-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for pod-Service: sctp [Feature:SCTPConnectivity][Disruptive]": "should function for pod-Service: sctp [Feature:SCTPConnectivity][Disruptive] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for pod-Service: udp": "should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should function for service endpoints using hostNetwork": "should function for service endpoints using hostNetwork [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should support basic nodePort: udp functionality": "should support basic nodePort: udp functionality [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should update endpoints: http": "should update endpoints: http [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should update endpoints: udp": "should update endpoints: udp [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should update nodePort: http [Slow]": "should update nodePort: http [Slow] [Suite:k8s]", + + "[Top Level] [sig-network] Networking Granular Checks: Services should update nodePort: udp [Slow]": "should update nodePort: udp [Slow] [Suite:k8s]", + + "[Top Level] [sig-network] Networking IPerf [Experimental] [Slow] [Feature:Networking-Performance] should transfer ~ 1GB onto the service endpoint 1 servers (maximum of 1 clients)": "should transfer ~ 1GB onto the service endpoint 1 servers (maximum of 1 clients) [Suite:k8s]", + + "[Top Level] [sig-network] Networking should check kube-proxy urls": "should check kube-proxy urls [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-network] Networking should provide Internet connection for containers [Feature:Networking-IPv4]": "should provide Internet connection for containers [Feature:Networking-IPv4] [Skipped:azure] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Networking should provide Internet connection for containers [Feature:Networking-IPv6][Experimental][LinuxOnly]": "should provide Internet connection for containers [Feature:Networking-IPv6][Experimental][LinuxOnly] [Disabled:Unimplemented] [Skipped:azure] [Suite:k8s]", + + "[Top Level] [sig-network] Networking should provide unchanging, static URL paths for kubernetes api services": "should provide unchanging, static URL paths for kubernetes api services [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-network] Networking should recreate its iptables rules if they are deleted [Disruptive]": "should recreate its iptables rules if they are deleted [Disruptive] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] NoSNAT [Feature:NoSNAT] [Slow] Should be able to send traffic between Pods without SNAT": "Should be able to send traffic between Pods without SNAT [Suite:k8s]", + + "[Top Level] [sig-network] Proxy version v1 should proxy logs on node using proxy subresource ": "should proxy logs on node using proxy subresource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Proxy version v1 should proxy logs on node with explicit kubelet port using proxy subresource ": "should proxy logs on node with explicit kubelet port using proxy subresource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Proxy version v1 should proxy through a service and a pod [Conformance]": "should proxy through a service and a pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] SCTP [Feature:SCTP] [LinuxOnly] should allow creating a basic SCTP service with pod and endpoints": "should allow creating a basic SCTP service with pod and endpoints [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] SCTP [Feature:SCTP] [LinuxOnly] should create a ClusterIP Service with SCTP ports": "should create a ClusterIP Service with SCTP ports [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] SCTP [Feature:SCTP] [LinuxOnly] should create a Pod with SCTP HostPort": "should create a Pod with SCTP HostPort [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Service endpoints latency should not be very high [Conformance]": "should not be very high [Conformance] [Serial] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services [Slow] should be able to create and tear down a standard-tier load balancer [Slow]": "should be able to create and tear down a standard-tier load balancer [Slow] [Suite:k8s]", + + "[Top Level] [sig-network] Services should allow pods to hairpin back to themselves through services": "should allow pods to hairpin back to themselves through services [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to change the type and ports of a service [Slow] [DisabledForLargeClusters]": "should be able to change the type and ports of a service [Slow] [DisabledForLargeClusters] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to change the type from ClusterIP to ExternalName [Conformance]": "should be able to change the type from ClusterIP to ExternalName [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]": "should be able to change the type from ExternalName to ClusterIP [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance]": "should be able to change the type from ExternalName to NodePort [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to change the type from NodePort to ExternalName [Conformance]": "should be able to change the type from NodePort to ExternalName [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to create a functioning NodePort service [Conformance]": "should be able to create a functioning NodePort service [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to create an internal type load balancer [Slow]": "should be able to create an internal type load balancer [Slow] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to switch session affinity for LoadBalancer service with ESIPP off [Slow] [DisabledForLargeClusters] [LinuxOnly]": "should be able to switch session affinity for LoadBalancer service with ESIPP off [Slow] [DisabledForLargeClusters] [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to switch session affinity for LoadBalancer service with ESIPP on [Slow] [DisabledForLargeClusters] [LinuxOnly]": "should be able to switch session affinity for LoadBalancer service with ESIPP on [Slow] [DisabledForLargeClusters] [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly] [Conformance]": "should be able to switch session affinity for NodePort service [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly] [Conformance]": "should be able to switch session affinity for service with type clusterIP [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to up and down services": "should be able to up and down services [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be able to update service type to NodePort listening on same port number but different protocols": "should be able to update service type to NodePort listening on same port number but different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Services should be rejected when no endpoints exist": "should be rejected when no endpoints exist [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Services should check NodePort out-of-range": "should check NodePort out-of-range [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Services should create endpoints for unready pods": "should create endpoints for unready pods [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Services should find a service from listing all namespaces [Conformance]": "should find a service from listing all namespaces [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should handle load balancer cleanup finalizer for service [Slow]": "should handle load balancer cleanup finalizer for service [Slow] [Suite:k8s]", + + "[Top Level] [sig-network] Services should have session affinity timeout work for NodePort service [LinuxOnly] [Conformance]": "should have session affinity timeout work for NodePort service [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should have session affinity timeout work for service with type clusterIP [LinuxOnly] [Conformance]": "should have session affinity timeout work for service with type clusterIP [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should have session affinity work for LoadBalancer service with ESIPP off [Slow] [DisabledForLargeClusters] [LinuxOnly]": "should have session affinity work for LoadBalancer service with ESIPP off [Slow] [DisabledForLargeClusters] [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-network] Services should have session affinity work for LoadBalancer service with ESIPP on [Slow] [DisabledForLargeClusters] [LinuxOnly]": "should have session affinity work for LoadBalancer service with ESIPP on [Slow] [DisabledForLargeClusters] [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-network] Services should have session affinity work for NodePort service [LinuxOnly] [Conformance]": "should have session affinity work for NodePort service [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should have session affinity work for service with type clusterIP [LinuxOnly] [Conformance]": "should have session affinity work for service with type clusterIP [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should implement service.kubernetes.io/headless": "should implement service.kubernetes.io/headless [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-network] Services should implement service.kubernetes.io/service-proxy-name": "should implement service.kubernetes.io/service-proxy-name [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-network] Services should only allow access from service loadbalancer source ranges [Slow]": "should only allow access from service loadbalancer source ranges [Slow] [Suite:k8s]", + + "[Top Level] [sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly]": "should preserve source pod IP for traffic thru service cluster IP [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Services should prevent NodePort collisions": "should prevent NodePort collisions [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Services should provide secure master service [Conformance]": "should provide secure master service [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should reconcile LB health check interval [Slow][Serial]": "should reconcile LB health check interval [Slow][Serial] [Suite:k8s]", + + "[Top Level] [sig-network] Services should release NodePorts on delete": "should release NodePorts on delete [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-network] Services should serve a basic endpoint from pods [Conformance]": "should serve a basic endpoint from pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should serve multiport endpoints from pods [Conformance]": "should serve multiport endpoints from pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should test the lifecycle of an Endpoint [Conformance]": "should test the lifecycle of an Endpoint [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-network] Services should work after restarting apiserver [Disruptive]": "should work after restarting apiserver [Disruptive] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] Services should work after restarting kube-proxy [Disruptive]": "should work after restarting kube-proxy [Disruptive] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should be able to handle large requests: http": "should be able to handle large requests: http [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should be able to handle large requests: udp": "should be able to handle large requests: udp [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for client IP based session affinity: http [LinuxOnly]": "should function for client IP based session affinity: http [LinuxOnly] [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for client IP based session affinity: udp [LinuxOnly]": "should function for client IP based session affinity: udp [LinuxOnly] [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for endpoint-Service: http": "should function for endpoint-Service: http [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for endpoint-Service: udp": "should function for endpoint-Service: udp [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for node-Service: http": "should function for node-Service: http [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for node-Service: udp": "should function for node-Service: udp [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for pod-Service: http": "should function for pod-Service: http [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for pod-Service: sctp [Feature:SCTPConnectivity][Disruptive]": "should function for pod-Service: sctp [Feature:SCTPConnectivity][Disruptive] [Disabled:Alpha] [Serial] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should function for pod-Service: udp": "should function for pod-Service: udp [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should update endpoints: http": "should update endpoints: http [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] Granular Checks: Services Secondary IP Family should update endpoints: udp": "should update endpoints: udp [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should be able to reach pod on ipv4 and ipv6 ip [Feature:IPv6DualStackAlphaFeature:Phase2]": "should be able to reach pod on ipv4 and ipv6 ip [Feature:IPv6DualStackAlphaFeature:Phase2] [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create a single stack service with cluster ip from primary service range [Feature:IPv6DualStackAlphaFeature:Phase2]": "should create a single stack service with cluster ip from primary service range [Feature:IPv6DualStackAlphaFeature:Phase2] [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create pod, add ipv6 and ipv4 ip to pod ips": "should create pod, add ipv6 and ipv4 ip to pod ips [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create service with ipv4 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2]": "should create service with ipv4 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2] [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create service with ipv4,v6 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2]": "should create service with ipv4,v6 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2] [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create service with ipv6 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2]": "should create service with ipv6 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2] [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create service with ipv6,v4 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2]": "should create service with ipv6,v4 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2] [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should have ipv4 and ipv6 internal node ip": "should have ipv4 and ipv6 internal node ip [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should have ipv4 and ipv6 node podCIDRs": "should have ipv4 and ipv6 node podCIDRs [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-network] [Feature:PerformanceDNS][Serial] Should answer DNS query for maximum number of services per cluster": "Should answer DNS query for maximum number of services per cluster [Slow] [Suite:k8s]", + + "[Top Level] [sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance]": "should be consumable via environment variable [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance]": "should be consumable via the environment [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance]": "should fail to create ConfigMap with empty key [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] ConfigMap should run through a ConfigMap lifecycle [Conformance]": "should run through a ConfigMap lifecycle [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] ConfigMap should update ConfigMap successfully": "should update ConfigMap successfully [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]": "should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance]": "should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]": "should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance]": "should provide host IP as an env var [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance]": "should provide pod UID as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance]": "should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] PodTemplates should delete a collection of pod templates [Conformance]": "should delete a collection of pod templates [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] PodTemplates should run the lifecycle of PodTemplates [Conformance]": "should run the lifecycle of PodTemplates [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] RuntimeClass should support RuntimeClasses API operations [Conformance]": " should support RuntimeClasses API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with an unconfigured handler [NodeFeature:RuntimeHandler]": "should reject a Pod requesting a RuntimeClass with an unconfigured handler [NodeFeature:RuntimeHandler] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with conflicting node selector": "should reject a Pod requesting a RuntimeClass with conflicting node selector [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-node] RuntimeClass should reject a Pod requesting a deleted RuntimeClass [NodeFeature:RuntimeHandler]": "should reject a Pod requesting a deleted RuntimeClass [NodeFeature:RuntimeHandler] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-node] RuntimeClass should reject a Pod requesting a non-existent RuntimeClass [NodeFeature:RuntimeHandler]": "should reject a Pod requesting a non-existent RuntimeClass [NodeFeature:RuntimeHandler] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with a configured handler [NodeFeature:RuntimeHandler]": "should run a Pod requesting a RuntimeClass with a configured handler [NodeFeature:RuntimeHandler] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with scheduling with taints [Serial] ": "should run a Pod requesting a RuntimeClass with scheduling with taints [Serial] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with scheduling without taints ": "should run a Pod requesting a RuntimeClass with scheduling without taints [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-scheduling] GPUDevicePluginAcrossRecreate [Feature:Recreate] run Nvidia GPU Device Plugin tests with a recreation": "run Nvidia GPU Device Plugin tests with a recreation [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-scheduling] LimitRange should create a LimitRange with defaults and ensure pod has those defaults applied. [Conformance]": "should create a LimitRange with defaults and ensure pod has those defaults applied. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] Multi-AZ Cluster Volumes [sig-storage] should only be allowed to provision PDs in zones where nodes exist": "should only be allowed to provision PDs in zones where nodes exist [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-scheduling] Multi-AZ Cluster Volumes [sig-storage] should schedule pods in the same zones as statically provisioned PVs": "should schedule pods in the same zones as statically provisioned PVs [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-scheduling] Multi-AZ Clusters should spread the pods of a replication controller across zones": "should spread the pods of a replication controller across zones [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-scheduling] Multi-AZ Clusters should spread the pods of a service across zones": "should spread the pods of a service across zones [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] PodTopologySpread Filtering validates 4 pods with MaxSkew=1 are evenly distributed into 2 nodes": "validates 4 pods with MaxSkew=1 are evenly distributed into 2 nodes [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates local ephemeral storage resource limits of pods that are allowed to run [Feature:LocalStorageCapacityIsolation]": "validates local ephemeral storage resource limits of pods that are allowed to run [Feature:LocalStorageCapacityIsolation] [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates pod overhead is considered along with resource limits of pods that are allowed to run verify pod overhead is accounted for": "verify pod overhead is accounted for [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates resource limits of pods that are allowed to run [Conformance]": "validates resource limits of pods that are allowed to run [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching": "validates that NodeAffinity is respected if not matching [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance]": "validates that NodeSelector is respected if matching [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if not matching [Conformance]": "validates that NodeSelector is respected if not matching [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates that required NodeAffinity setting is respected if matching": "validates that required NodeAffinity setting is respected if matching [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if matching": "validates that taints-tolerations is respected if matching [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if not matching": "validates that taints-tolerations is respected if not matching [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates that there exists conflict between pods with same hostPort and protocol but one using 0.0.0.0 hostIP [Conformance]": "validates that there exists conflict between pods with same hostPort and protocol but one using 0.0.0.0 hostIP [Conformance] [Slow] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPredicates [Serial] validates that there is no conflict between pods with same hostPort but different hostIP and protocol [Conformance]": "validates that there is no conflict between pods with same hostPort but different hostIP and protocol [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPreemption [Serial] PodTopologySpread Preemption validates proper pods are preempted": "validates proper pods are preempted [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPreemption [Serial] PreemptionExecutionPath runs ReplicaSets to verify preemption running path [Conformance]": "runs ReplicaSets to verify preemption running path [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPreemption [Serial] PriorityClass endpoints verify PriorityClass endpoints can be operated with different HTTP methods [Conformance]": "verify PriorityClass endpoints can be operated with different HTTP methods [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPreemption [Serial] validates basic preemption works [Conformance]": "validates basic preemption works [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPreemption [Serial] validates lower priority pod preemption by critical pod [Conformance]": "validates lower priority pod preemption by critical pod [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPriorities [Serial] Pod should avoid nodes that have avoidPod annotation": "Pod should avoid nodes that have avoidPod annotation [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPriorities [Serial] Pod should be preferably scheduled to nodes pod can tolerate": "Pod should be preferably scheduled to nodes pod can tolerate [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPriorities [Serial] Pod should be scheduled to node that don't match the PodAntiAffinity terms": "Pod should be scheduled to node that don't match the PodAntiAffinity terms [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] SchedulerPriorities [Serial] PodTopologySpread Scoring validates pod should be preferably scheduled to node which makes the matching pods more evenly distributed": "validates pod should be preferably scheduled to node which makes the matching pods more evenly distributed [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-scheduling] [Feature:GPUDevicePlugin] run Nvidia GPU Device Plugin tests": "run Nvidia GPU Device Plugin tests [Disabled:SpecialConfig] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": "should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": "should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": "should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which share the same volume": "should support two pods which share the same volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress[Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": "should support snapshotting of many volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion": "should check snapshot fields, check restore correctly works after modifying source data, check deletion [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress[Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": "should support snapshotting of many volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion": "should check snapshot fields, check restore correctly works after modifying source data, check deletion [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (immediate-binding)] ephemeral should create read-only inline ephemeral volume": "should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (immediate-binding)] ephemeral should create read/write inline ephemeral volume": "should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": "should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (immediate-binding)] ephemeral should support two pods which share the same volume": "should support two pods which share the same volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (late-binding)] ephemeral should create read-only inline ephemeral volume": "should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (late-binding)] ephemeral should create read/write inline ephemeral volume": "should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (late-binding)] ephemeral should support multiple inline ephemeral volumes": "should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (late-binding)] ephemeral should support two pods which share the same volume": "should support two pods which share the same volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion": "should check snapshot fields, check restore correctly works after modifying source data, check deletion [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion": "should check snapshot fields, check restore correctly works after modifying source data, check deletion [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": "should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": "should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": "should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which share the same volume": "should support two pods which share the same volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress[Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": "should support snapshotting of many volumes repeatedly [Slow] [Serial] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion": "should check snapshot fields, check restore correctly works after modifying source data, check deletion [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress[Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": "should support snapshotting of many volumes repeatedly [Slow] [Serial] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion": "should check snapshot fields, check restore correctly works after modifying source data, check deletion [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (immediate-binding)] ephemeral should create read-only inline ephemeral volume": "should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (immediate-binding)] ephemeral should create read/write inline ephemeral volume": "should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": "should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (immediate-binding)] ephemeral should support two pods which share the same volume": "should support two pods which share the same volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (late-binding)] ephemeral should create read-only inline ephemeral volume": "should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (late-binding)] ephemeral should create read/write inline ephemeral volume": "should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (late-binding)] ephemeral should support multiple inline ephemeral volumes": "should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) [Feature:GenericEphemeralVolume] (late-binding)] ephemeral should support two pods which share the same volume": "should support two pods which share the same volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion": "should check snapshot fields, check restore correctly works after modifying source data, check deletion [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion": "should check snapshot fields, check restore correctly works after modifying source data, check deletion [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI CSIDriver deployment after pod creation using non-attachable mock driver should bringup pod after deploying CSIDriver attach=false [Slow]": "should bringup pod after deploying CSIDriver attach=false [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=File": "should modify fsGroup if fsGroupPolicy=File [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=default": "should modify fsGroup if fsGroupPolicy=default [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should not modify fsGroup if fsGroupPolicy=None": "should not modify fsGroup if fsGroupPolicy=None [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI NodeStage error cases [Slow] should call NodeUnstage after NodeStage ephemeral error": "should call NodeUnstage after NodeStage ephemeral error [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI NodeStage error cases [Slow] should call NodeUnstage after NodeStage success": "should call NodeUnstage after NodeStage success [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI NodeStage error cases [Slow] should not call NodeUnstage after NodeStage final error": "should not call NodeUnstage after NodeStage final error [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI NodeStage error cases [Slow] should retry NodeStage after NodeStage ephemeral error": "should retry NodeStage after NodeStage ephemeral error [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI NodeStage error cases [Slow] should retry NodeStage after NodeStage final error": "should retry NodeStage after NodeStage final error [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI Volume Snapshots [Feature:VolumeSnapshotDataSource] volumesnapshotcontent and pvc in Bound state with deletion timestamp set should not get deleted while snapshot finalizer exists": "volumesnapshotcontent and pvc in Bound state with deletion timestamp set should not get deleted while snapshot finalizer exists [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on": "should expand volume by restarting pod if attach=off, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on": "should expand volume by restarting pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off": "should expand volume without restarting pod if nodeExpansion=off [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on": "should not expand volume if resizingOnDriver=off, resizingOnSC=on [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI attach test using mock driver should not require VolumeAttach for drivers without attachment": "should not require VolumeAttach for drivers without attachment [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI attach test using mock driver should preserve attachment policy when no CSIDriver present": "should preserve attachment policy when no CSIDriver present [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI attach test using mock driver should require VolumeAttach for drivers with attachment": "should require VolumeAttach for drivers with attachment [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on": "should expand volume without restarting pod if attach=off, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on": "should expand volume without restarting pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI volume limit information using mock driver should report attach limit when limit is bigger than 0 [Slow]": "should report attach limit when limit is bigger than 0 [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI workload information using mock driver contain ephemeral=true when using inline volume": "contain ephemeral=true when using inline volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI workload information using mock driver should be passed when podInfoOnMount=true": "should be passed when podInfoOnMount=true [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when CSIDriver does not exist": "should not be passed when CSIDriver does not exist [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=false": "should not be passed when podInfoOnMount=false [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=nil": "should not be passed when podInfoOnMount=nil [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSIServiceAccountToken [Feature:CSIServiceAccountToken] token should be plumbed down when csiServiceAccountTokenEnabled=true": "token should be plumbed down when csiServiceAccountTokenEnabled=true [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSIServiceAccountToken [Feature:CSIServiceAccountToken] token should not be plumbed down when CSIDriver is not deployed": "token should not be plumbed down when CSIDriver is not deployed [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSIServiceAccountToken [Feature:CSIServiceAccountToken] token should not be plumbed down when csiServiceAccountTokenEnabled=false": "token should not be plumbed down when csiServiceAccountTokenEnabled=false [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSIStorageCapacity [Feature:CSIStorageCapacity] CSIStorageCapacity disabled": "CSIStorageCapacity disabled [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSIStorageCapacity [Feature:CSIStorageCapacity] CSIStorageCapacity unused": "CSIStorageCapacity unused [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSIStorageCapacity [Feature:CSIStorageCapacity] CSIStorageCapacity used, have capacity": "CSIStorageCapacity used, have capacity [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSIStorageCapacity [Feature:CSIStorageCapacity] CSIStorageCapacity used, insufficient capacity": "CSIStorageCapacity used, insufficient capacity [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume CSIStorageCapacity [Feature:CSIStorageCapacity] CSIStorageCapacity used, no capacity": "CSIStorageCapacity used, no capacity [Disabled:Alpha] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume storage capacity exhausted, immediate binding": "exhausted, immediate binding [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume storage capacity exhausted, late binding, no topology": "exhausted, late binding, no topology [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume storage capacity exhausted, late binding, with topology": "exhausted, late binding, with topology [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] CSI mock volume storage capacity unlimited": "unlimited [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap Should fail non-optional pod creation due to configMap object does not exist [Slow]": "Should fail non-optional pod creation due to configMap object does not exist [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]": "Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance]": "binary data should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]": "optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance]": "should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]": "should be consumable from pods in volume as non-root [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]": "should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]": "should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]": "should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]": "should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap should be immutable if `immutable` field is set": "should be immutable if `immutable` field is set [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance]": "updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance]": "should provide container's cpu limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance]": "should provide container's cpu request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance]": "should provide container's memory limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance]": "should provide container's memory request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]": "should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]": "should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]": "should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]": "should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance]": "should provide podname only [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]": "should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]": "should set mode on item file [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance]": "should update annotations on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance]": "should update labels on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner Default should be disabled by changing the default annotation [Serial] [Disruptive]": "should be disabled by changing the default annotation [Serial] [Disruptive] [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner Default should be disabled by removing the default annotation [Serial] [Disruptive]": "should be disabled by removing the default annotation [Serial] [Disruptive] [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner Default should create and delete default persistent volumes [Slow]": "should create and delete default persistent volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner External should let an external dynamic provisioner create and delete persistent volumes [Slow]": "should let an external dynamic provisioner create and delete persistent volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] deletion should be idempotent": "deletion should be idempotent [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should not provision a volume in an unmanaged GCE zone.": "should not provision a volume in an unmanaged GCE zone. [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should provision storage with different parameters": "should provision storage with different parameters [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should provision storage with non-default reclaim policy Retain": "should provision storage with non-default reclaim policy Retain [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should test that deleting a claim before the volume is provisioned deletes the volume.": "should test that deleting a claim before the volume is provisioned deletes the volume. [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning Invalid AWS KMS key should report an error and create no PV": "should report an error and create no PV [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Dynamic Provisioning [k8s.io] GlusterDynamicProvisioner should create and delete persistent volumes [fast]": "should create and delete persistent volumes [fast] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes pod should support memory backed volumes of specified size": "pod should support memory backed volumes of specified size [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance]": "pod should support shared volumes between containers [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]": "should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": "should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]": "should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": "should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]": "should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": "should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]": "should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": "should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]": "should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": "should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]": "should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": "should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]": "volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]": "volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs)": "files with FSGroup ownership should support (root,0644,tmpfs) [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root": "new files should be created with FSGroup ownership when container is non-root [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root": "new files should be created with FSGroup ownership when container is root [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup": "nonexistent volume subPath should have the correct mode and owner using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup": "volume on default medium should have the correct mode using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup": "volume on tmpfs should have the correct mode using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir wrapper volumes should not cause race condition when used for configmaps [Serial] [Conformance]": "should not cause race condition when used for configmaps [Serial] [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir wrapper volumes should not cause race condition when used for git_repo [Serial] [Slow]": "should not cause race condition when used for git_repo [Serial] [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] EmptyDir wrapper volumes should not conflict [Conformance]": "should not conflict [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : configmap": "should allow deletion of pod with invalid volume : configmap [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected": "should allow deletion of pod with invalid volume : projected [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : secret": "should allow deletion of pod with invalid volume : secret [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Flexvolumes should be mountable when attachable [Feature:Flexvolumes]": "should be mountable when attachable [Feature:Flexvolumes] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Flexvolumes should be mountable when non-attachable": "should be mountable when non-attachable [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] GCP Volumes GlusterFS should be mountable": "should be mountable [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] GCP Volumes NFSv3 should be mountable for NFSv3": "should be mountable for NFSv3 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] GCP Volumes NFSv4 should be mountable for NFSv4": "should be mountable for NFSv4 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] GenericPersistentVolume[Disruptive] When kubelet restarts Should test that a file written to the mount before kubelet restart is readable after restart.": "Should test that a file written to the mount before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] GenericPersistentVolume[Disruptive] When kubelet restarts Should test that a volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns.": "Should test that a volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] GenericPersistentVolume[Disruptive] When kubelet restarts Should test that a volume mounted to a pod that is force deleted while the kubelet is down unmounts when the kubelet returns.": "Should test that a volume mounted to a pod that is force deleted while the kubelet is down unmounts when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance]": "should give a volume the correct mode [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] HostPath should support r/w [NodeConformance]": "should support r/w [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] HostPath should support subPath [NodeConformance]": "should support subPath [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Block Device [Slow] Should be able to mount block device 'ablkdev' successfully when HostPathType is HostPathBlockDev": "Should be able to mount block device 'ablkdev' successfully when HostPathType is HostPathBlockDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Block Device [Slow] Should be able to mount block device 'ablkdev' successfully when HostPathType is HostPathUnset": "Should be able to mount block device 'ablkdev' successfully when HostPathType is HostPathUnset [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting block device 'ablkdev' when HostPathType is HostPathCharDev": "Should fail on mounting block device 'ablkdev' when HostPathType is HostPathCharDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting block device 'ablkdev' when HostPathType is HostPathDirectory": "Should fail on mounting block device 'ablkdev' when HostPathType is HostPathDirectory [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting block device 'ablkdev' when HostPathType is HostPathFile": "Should fail on mounting block device 'ablkdev' when HostPathType is HostPathFile [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting block device 'ablkdev' when HostPathType is HostPathSocket": "Should fail on mounting block device 'ablkdev' when HostPathType is HostPathSocket [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting non-existent block device 'does-not-exist-blk-dev' when HostPathType is HostPathBlockDev": "Should fail on mounting non-existent block device 'does-not-exist-blk-dev' when HostPathType is HostPathBlockDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Character Device [Slow] Should be able to mount character device 'achardev' successfully when HostPathType is HostPathCharDev": "Should be able to mount character device 'achardev' successfully when HostPathType is HostPathCharDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Character Device [Slow] Should be able to mount character device 'achardev' successfully when HostPathType is HostPathUnset": "Should be able to mount character device 'achardev' successfully when HostPathType is HostPathUnset [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting character device 'achardev' when HostPathType is HostPathBlockDev": "Should fail on mounting character device 'achardev' when HostPathType is HostPathBlockDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting character device 'achardev' when HostPathType is HostPathDirectory": "Should fail on mounting character device 'achardev' when HostPathType is HostPathDirectory [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting character device 'achardev' when HostPathType is HostPathFile": "Should fail on mounting character device 'achardev' when HostPathType is HostPathFile [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting character device 'achardev' when HostPathType is HostPathSocket": "Should fail on mounting character device 'achardev' when HostPathType is HostPathSocket [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting non-existent character device 'does-not-exist-char-dev' when HostPathType is HostPathCharDev": "Should fail on mounting non-existent character device 'does-not-exist-char-dev' when HostPathType is HostPathCharDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Directory [Slow] Should be able to mount directory 'adir' successfully when HostPathType is HostPathDirectory": "Should be able to mount directory 'adir' successfully when HostPathType is HostPathDirectory [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Directory [Slow] Should be able to mount directory 'adir' successfully when HostPathType is HostPathUnset": "Should be able to mount directory 'adir' successfully when HostPathType is HostPathUnset [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Directory [Slow] Should fail on mounting directory 'adir' when HostPathType is HostPathBlockDev": "Should fail on mounting directory 'adir' when HostPathType is HostPathBlockDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Directory [Slow] Should fail on mounting directory 'adir' when HostPathType is HostPathCharDev": "Should fail on mounting directory 'adir' when HostPathType is HostPathCharDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Directory [Slow] Should fail on mounting directory 'adir' when HostPathType is HostPathFile": "Should fail on mounting directory 'adir' when HostPathType is HostPathFile [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Directory [Slow] Should fail on mounting directory 'adir' when HostPathType is HostPathSocket": "Should fail on mounting directory 'adir' when HostPathType is HostPathSocket [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Directory [Slow] Should fail on mounting non-existent directory 'does-not-exist-dir' when HostPathType is HostPathDirectory": "Should fail on mounting non-existent directory 'does-not-exist-dir' when HostPathType is HostPathDirectory [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType File [Slow] Should be able to mount file 'afile' successfully when HostPathType is HostPathFile": "Should be able to mount file 'afile' successfully when HostPathType is HostPathFile [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType File [Slow] Should be able to mount file 'afile' successfully when HostPathType is HostPathUnset": "Should be able to mount file 'afile' successfully when HostPathType is HostPathUnset [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType File [Slow] Should fail on mounting file 'afile' when HostPathType is HostPathBlockDev": "Should fail on mounting file 'afile' when HostPathType is HostPathBlockDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType File [Slow] Should fail on mounting file 'afile' when HostPathType is HostPathCharDev": "Should fail on mounting file 'afile' when HostPathType is HostPathCharDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType File [Slow] Should fail on mounting file 'afile' when HostPathType is HostPathDirectory": "Should fail on mounting file 'afile' when HostPathType is HostPathDirectory [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType File [Slow] Should fail on mounting file 'afile' when HostPathType is HostPathSocket": "Should fail on mounting file 'afile' when HostPathType is HostPathSocket [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType File [Slow] Should fail on mounting non-existent file 'does-not-exist-file' when HostPathType is HostPathFile": "Should fail on mounting non-existent file 'does-not-exist-file' when HostPathType is HostPathFile [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Socket [Slow] Should be able to mount socket 'asocket' successfully when HostPathType is HostPathSocket": "Should be able to mount socket 'asocket' successfully when HostPathType is HostPathSocket [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Socket [Slow] Should be able to mount socket 'asocket' successfully when HostPathType is HostPathUnset": "Should be able to mount socket 'asocket' successfully when HostPathType is HostPathUnset [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Socket [Slow] Should fail on mounting non-existent socket 'does-not-exist-socket' when HostPathType is HostPathSocket": "Should fail on mounting non-existent socket 'does-not-exist-socket' when HostPathType is HostPathSocket [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Socket [Slow] Should fail on mounting socket 'asocket' when HostPathType is HostPathBlockDev": "Should fail on mounting socket 'asocket' when HostPathType is HostPathBlockDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Socket [Slow] Should fail on mounting socket 'asocket' when HostPathType is HostPathCharDev": "Should fail on mounting socket 'asocket' when HostPathType is HostPathCharDev [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Socket [Slow] Should fail on mounting socket 'asocket' when HostPathType is HostPathDirectory": "Should fail on mounting socket 'asocket' when HostPathType is HostPathDirectory [Suite:k8s]", + + "[Top Level] [sig-storage] HostPathType Socket [Slow] Should fail on mounting socket 'asocket' when HostPathType is HostPathFile": "Should fail on mounting socket 'asocket' when HostPathType is HostPathFile [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Broken] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Broken] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Disabled:Unsupported] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": "should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents": "(Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents": "(OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": "multiple pods should access different volumes repeatedly [Slow] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": "should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": "should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": "should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand Verify if offline PVC expansion works": "Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][sig-windows] volume-expand should resize volume when PVC is edited while pod is using it": "should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options": "should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source in parallel [Slow]": "should provision storage with pvc data source in parallel [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source": "should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": "should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": "should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.": "Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": "should fail to create pod by failing to mount volume [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": "should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": "should fail if non-existent subpath is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": "should fail if subpath directory is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": "should fail if subpath file is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": "should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": "should support creating multiple subpath from same volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": "should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": "should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": "should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": "should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": "should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": "should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": "should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": "should support restarting containers using directory as subpath [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": "should support restarting containers using file as subpath [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]": "should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": "should verify container cannot write to subpath readonly volumes [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow][LinuxOnly]": "should write files of various sizes, verify size, validate content [Slow][LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive][LinuxOnly] Should test that pv written before kubelet restart is readable after restart.": "Should test that pv written before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with different volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on different node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly]": "should access to two volumes with the same volume mode and retain data across pod recreation on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": "should concurrently access the single read-only volume from pods on the same node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": "should concurrently access the single volume from pods on different node [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node [LinuxOnly]": "should concurrently access the single volume from pods on the same node [LinuxOnly] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": "should fail to use a volume in a pod with mismatched mode [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": "should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data": "should store data [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": "should allow exec of files on the volume [Suite:k8s]", + + "[Top Level] [sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": "should store data [Suite:k8s]", + + "[Top Level] [sig-storage] Mounted flexvolume volume expand [Slow] [Feature:ExpandInUsePersistentVolumes] should be resizable when mounted": "should be resizable when mounted [Suite:k8s]", + + "[Top Level] [sig-storage] Mounted volume expand Should verify mounted devices can be resized": "Should verify mounted devices can be resized [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] NFSPersistentVolumes[Disruptive][Flaky] when kube-controller-manager restarts should delete a bound PVC from a clientPod, restart the kube-control-manager, and ensure the kube-controller-manager does not crash": "should delete a bound PVC from a clientPod, restart the kube-control-manager, and ensure the kube-controller-manager does not crash [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] NFSPersistentVolumes[Disruptive][Flaky] when kubelet restarts Should test that a file written to the mount before kubelet restart is readable after restart.": "Should test that a file written to the mount before kubelet restart is readable after restart. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] NFSPersistentVolumes[Disruptive][Flaky] when kubelet restarts Should test that a volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns.": "Should test that a volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] NFSPersistentVolumes[Disruptive][Flaky] when kubelet restarts Should test that a volume mounted to a pod that is force deleted while the kubelet is down unmounts when the kubelet returns.": "Should test that a volume mounted to a pod that is force deleted while the kubelet is down unmounts when the kubelet returns. [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] Node Poweroff [Feature:vsphere] [Slow] [Disruptive] verify volume status after node power off": "verify volume status after node power off [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] Node Unregister [Feature:vsphere] [Slow] [Disruptive] node unregister": "node unregister [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PV Protection Verify \"immediate\" deletion of a PV that is not bound to a PVC": "Verify \"immediate\" deletion of a PV that is not bound to a PVC [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PV Protection Verify that PV bound to a PVC is not removed immediately": "Verify that PV bound to a PVC is not removed immediately [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PVC Protection Verify \"immediate\" deletion of a PVC that is not in active use by a pod": "Verify \"immediate\" deletion of a PVC that is not in active use by a pod [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PVC Protection Verify that PVC in active use by a pod is not removed immediately": "Verify that PVC in active use by a pod is not removed immediately [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PVC Protection Verify that scheduling of a pod that uses PVC that is being deleted fails and the pod becomes Unschedulable": "Verify that scheduling of a pod that uses PVC that is being deleted fails and the pod becomes Unschedulable [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes Default StorageClass pods that use multiple volumes should be reschedulable [Slow]": "should be reschedulable [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes GCEPD should test that deleting a PVC before the pod does not cause pod deletion to fail on PD detach": "should test that deleting a PVC before the pod does not cause pod deletion to fail on PD detach [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes GCEPD should test that deleting the Namespace of a PVC and Pod causes the successful detach of Persistent Disk": "should test that deleting the Namespace of a PVC and Pod causes the successful detach of Persistent Disk [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes GCEPD should test that deleting the PV before the pod does not cause pod deletion to fail on PD detach": "should test that deleting the PV before the pod does not cause pod deletion to fail on PD detach [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes NFS when invoking the Recycle reclaim policy should test that a PV becomes Available and is clean after the PVC is deleted.": "should test that a PV becomes Available and is clean after the PVC is deleted. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test write access": "create a PV and a pre-bound PVC: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and a pre-bound PV: test write access": "create a PVC and a pre-bound PV: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access": "create a PVC and non-pre-bound PV: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs should create a non-pre-bound PV and PVC: test write access ": "should create a non-pre-bound PV and PVC: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 2 PVs and 4 PVCs: test write access": "should create 2 PVs and 4 PVCs: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 3 PVs and 3 PVCs: test write access": "should create 3 PVs and 3 PVCs: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 4 PVs and 2 PVCs: test write access [Slow]": "should create 4 PVs and 2 PVCs: test write access [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes [Feature:vsphere][Feature:LabelSelector] [sig-storage] Selector-Label Volume Binding:vsphere [Feature:vsphere] should bind volume with claim for given label": "should bind volume with claim for given label [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes [Feature:vsphere][Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere [Feature:vsphere] should delete persistent volume when reclaimPolicy set to delete and associated claim is deleted": "should delete persistent volume when reclaimPolicy set to delete and associated claim is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes [Feature:vsphere][Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere [Feature:vsphere] should not detach and unmount PV when associated pvc with delete as reclaimPolicy is deleted when it is in use by the pod": "should not detach and unmount PV when associated pvc with delete as reclaimPolicy is deleted when it is in use by the pod [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes [Feature:vsphere][Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere [Feature:vsphere] should retain persistent volume when reclaimPolicy set to retain when associated claim is deleted": "should retain persistent volume when reclaimPolicy set to retain when associated claim is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local Local volume that cannot be mounted [Slow] should fail due to non-existent path": "should fail due to non-existent path [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local Local volume that cannot be mounted [Slow] should fail due to wrong node": "should fail due to wrong node [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity": "should fail scheduling due to different NodeAffinity [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector": "should fail scheduling due to different NodeSelector [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local Pods sharing a single local PV [Serial] all pods should be running": "all pods should be running [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes on one node when pod has affinity": "should use volumes on one node when pod has affinity [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes on one node when pod management is parallel and pod has affinity": "should use volumes on one node when pod management is parallel and pod has affinity [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes spread across nodes when pod has anti-affinity": "should use volumes spread across nodes when pod has anti-affinity [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes spread across nodes when pod management is parallel and pod has anti-affinity": "should use volumes spread across nodes when pod management is parallel and pod has anti-affinity [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local Stress with local volumes [Serial] should be able to process many pods and reuse local volumes": "should be able to process many pods and reuse local volumes [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Skipped:gce] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1": "should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1": "should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted": "should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set fsGroup for one pod [Slow]": "should set fsGroup for one pod [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]": "should set same fsGroup for two pods simultaneously [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": "should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes:vsphere [Feature:vsphere] should test that a file written to the vsphere volume mount before kubelet restart can be read after restart [Disruptive]": "should test that a file written to the vsphere volume mount before kubelet restart can be read after restart [Disruptive] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes:vsphere [Feature:vsphere] should test that a vsphere volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns [Disruptive]": "should test that a vsphere volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns [Disruptive] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes:vsphere [Feature:vsphere] should test that deleting a PVC before the pod does not cause pod deletion to fail on vsphere volume detach": "should test that deleting a PVC before the pod does not cause pod deletion to fail on vsphere volume detach [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes:vsphere [Feature:vsphere] should test that deleting the Namespace of a PVC and Pod causes the successful detach of vsphere volume": "should test that deleting the Namespace of a PVC and Pod causes the successful detach of vsphere volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] PersistentVolumes:vsphere [Feature:vsphere] should test that deleting the PV before the pod does not cause pod deletion to fail on vsphere volume detach": "should test that deleting the PV before the pod does not cause pod deletion to fail on vsphere volume detach [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks [Serial] attach on previously attached volumes should work": "[Serial] attach on previously attached volumes should work [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks detach in a disrupted environment [Slow] [Disruptive] when node's API object is deleted": "when node's API object is deleted [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks detach in a disrupted environment [Slow] [Disruptive] when pod is evicted": "when pod is evicted [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks schedule a pod w/ RW PD(s) mounted to 1 or more containers, write to PD, verify content, delete pod, and repeat in rapid succession [Slow] using 1 containers and 2 PDs": "using 1 containers and 2 PDs [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks schedule a pod w/ RW PD(s) mounted to 1 or more containers, write to PD, verify content, delete pod, and repeat in rapid succession [Slow] using 4 containers and 1 PDs": "using 4 containers and 1 PDs [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for RW PD with pod delete grace period of \"default (30s)\"": "for RW PD with pod delete grace period of \"default (30s)\" [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for RW PD with pod delete grace period of \"immediate (0s)\"": "for RW PD with pod delete grace period of \"immediate (0s)\" [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for read-only PD with pod delete grace period of \"default (30s)\"": "for read-only PD with pod delete grace period of \"default (30s)\" [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for read-only PD with pod delete grace period of \"immediate (0s)\"": "for read-only PD with pod delete grace period of \"immediate (0s)\" [Suite:k8s]", + + "[Top Level] [sig-storage] Pod Disks should be able to delete a non-existent PD without error": "should be able to delete a non-existent PD without error [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance]": "should project all components that make up the projection API [Projection][NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap Should fail non-optional pod creation due to configMap object does not exist [Slow]": "Should fail non-optional pod creation due to configMap object does not exist [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]": "Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance]": "optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance]": "should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]": "should be consumable from pods in volume as non-root [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]": "should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]": "should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]": "should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]": "should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance]": "updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance]": "should provide container's cpu limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance]": "should provide container's cpu request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance]": "should provide container's memory limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance]": "should provide container's memory request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]": "should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]": "should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]": "should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]": "should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance]": "should provide podname only [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]": "should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]": "should set mode on item file [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance]": "should update annotations on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance]": "should update labels on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret Should fail non-optional pod creation due to secret object does not exist [Slow]": "Should fail non-optional pod creation due to secret object does not exist [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]": "Should fail non-optional pod creation due to the key in the secret object does not exist [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance]": "optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]": "should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance]": "should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]": "should be consumable in multiple volumes in a pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Regional PD RegionalPD should failover to a different zone when all nodes in one zone become unreachable [Slow] [Disruptive]": "should failover to a different zone when all nodes in one zone become unreachable [Slow] [Disruptive] [Serial] [Suite:k8s]", + + "[Top Level] [sig-storage] Regional PD RegionalPD should provision storage [Slow]": "should provision storage [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Regional PD RegionalPD should provision storage in the allowedTopologies [Slow]": "should provision storage in the allowedTopologies [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Regional PD RegionalPD should provision storage in the allowedTopologies with delayed binding [Slow]": "should provision storage in the allowedTopologies with delayed binding [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Regional PD RegionalPD should provision storage with delayed binding [Slow]": "should provision storage with delayed binding [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets Should fail non-optional pod creation due to secret object does not exist [Slow]": "Should fail non-optional pod creation due to secret object does not exist [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]": "Should fail non-optional pod creation due to the key in the secret object does not exist [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance]": "optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance]": "should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance]": "should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]": "should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]": "should be consumable in multiple volumes in a pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Secrets should be immutable if `immutable` field is set": "should be immutable if `immutable` field is set [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid capability name objectSpaceReserve is not honored for dynamically provisioned pvc using storageclass": "verify VSAN storage capability with invalid capability name objectSpaceReserve is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid diskStripes value is not honored for dynamically provisioned pvc using storageclass": "verify VSAN storage capability with invalid diskStripes value is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid hostFailuresToTolerate value is not honored for dynamically provisioned pvc using storageclass": "verify VSAN storage capability with invalid hostFailuresToTolerate value is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with non-vsan datastore is not honored for dynamically provisioned pvc using storageclass": "verify VSAN storage capability with non-vsan datastore is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid diskStripes and objectSpaceReservation values and a VSAN datastore is honored for dynamically provisioned pvc using storageclass": "verify VSAN storage capability with valid diskStripes and objectSpaceReservation values and a VSAN datastore is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid diskStripes and objectSpaceReservation values is honored for dynamically provisioned pvc using storageclass": "verify VSAN storage capability with valid diskStripes and objectSpaceReservation values is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid hostFailuresToTolerate and cacheReservation values is honored for dynamically provisioned pvc using storageclass": "verify VSAN storage capability with valid hostFailuresToTolerate and cacheReservation values is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid objectSpaceReservation and iopsLimit values is honored for dynamically provisioned pvc using storageclass": "verify VSAN storage capability with valid objectSpaceReservation and iopsLimit values is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify an existing and compatible SPBM policy is honored for dynamically provisioned pvc using storageclass": "verify an existing and compatible SPBM policy is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify an if a SPBM policy and VSAN capabilities cannot be honored for dynamically provisioned pvc using storageclass": "verify an if a SPBM policy and VSAN capabilities cannot be honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify clean up of stale dummy VM for dynamically provisioned pvc using SPBM policy": "verify clean up of stale dummy VM for dynamically provisioned pvc using SPBM policy [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify if a SPBM policy is not honored on a non-compatible datastore for dynamically provisioned pvc using storageclass": "verify if a SPBM policy is not honored on a non-compatible datastore for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify if a non-existing SPBM policy is not honored for dynamically provisioned pvc using storageclass": "verify if a non-existing SPBM policy is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod [LinuxOnly] [Conformance]": "should support subpaths with configmap pod [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod with mountPath of existing file [LinuxOnly] [Conformance]": "should support subpaths with configmap pod with mountPath of existing file [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Subpath Atomic writer volumes should support subpaths with downward pod [LinuxOnly] [Conformance]": "should support subpaths with downward pod [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [LinuxOnly] [Conformance]": "should support subpaths with projected pod [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Subpath Atomic writer volumes should support subpaths with secret pod [LinuxOnly] [Conformance]": "should support subpaths with secret pod [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]", + + "[Top Level] [sig-storage] Subpath Container restart should verify that container can restart successfully after configmaps modified": "should verify that container can restart successfully after configmaps modified [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Verify Volume Attach Through vpxd Restart [Feature:vsphere][Serial][Disruptive] verify volume remains attached through vpxd restart": "verify volume remains attached through vpxd restart [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Attach Verify [Feature:vsphere][Serial][Disruptive] verify volume remains attached after master kubelet restart": "verify volume remains attached after master kubelet restart [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - eagerzeroedthick is honored for dynamically provisioned pv using storageclass": "verify disk format type - eagerzeroedthick is honored for dynamically provisioned pv using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - thin is honored for dynamically provisioned pv using storageclass": "verify disk format type - thin is honored for dynamically provisioned pv using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - zeroedthick is honored for dynamically provisioned pv using storageclass": "verify disk format type - zeroedthick is honored for dynamically provisioned pv using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Disk Size [Feature:vsphere] verify dynamically provisioned pv has size rounded up correctly": "verify dynamically provisioned pv has size rounded up correctly [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume FStype [Feature:vsphere] verify fstype - default value should be ext4": "verify fstype - default value should be ext4 [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume FStype [Feature:vsphere] verify fstype - ext3 formatted volume": "verify fstype - ext3 formatted volume [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume FStype [Feature:vsphere] verify invalid fstype": "verify invalid fstype [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Operations Storm [Feature:vsphere] should create pod with many volumes and verify no attach call fails": "should create pod with many volumes and verify no attach call fails [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Placement [Feature:vsphere] should create and delete pod with multiple volumes from different datastore": "should create and delete pod with multiple volumes from different datastore [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Placement [Feature:vsphere] should create and delete pod with multiple volumes from same datastore": "should create and delete pod with multiple volumes from same datastore [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Placement [Feature:vsphere] should create and delete pod with the same volume source attach/detach to different worker nodes": "should create and delete pod with the same volume source attach/detach to different worker nodes [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Placement [Feature:vsphere] should create and delete pod with the same volume source on the same worker node": "should create and delete pod with the same volume source on the same worker node [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Placement [Feature:vsphere] test back to back pod creation and deletion with different volume sources on the same worker node": "test back to back pod creation and deletion with different volume sources on the same worker node [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify dynamic provision with default parameter on clustered datastore": "verify dynamic provision with default parameter on clustered datastore [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify dynamic provision with spbm policy on clustered datastore": "verify dynamic provision with spbm policy on clustered datastore [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify static provisioning on clustered datastore": "verify static provisioning on clustered datastore [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume Provisioning on Datastore [Feature:vsphere] verify dynamically provisioned pv using storageclass fails on an invalid datastore": "verify dynamically provisioned pv using storageclass fails on an invalid datastore [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volume limits should verify that all nodes have volume limits": "should verify that all nodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Volumes ConfigMap should be mountable": "should be mountable [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation fails if no zones are specified in the storage class (No shared datastores exist among all the nodes)": "Verify PVC creation fails if no zones are specified in the storage class (No shared datastores exist among all the nodes) [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation fails if only datastore is specified in the storage class (No shared datastores exist among all the nodes)": "Verify PVC creation fails if only datastore is specified in the storage class (No shared datastores exist among all the nodes) [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation fails if only storage policy is specified in the storage class (No shared datastores exist among all the nodes)": "Verify PVC creation fails if only storage policy is specified in the storage class (No shared datastores exist among all the nodes) [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation fails if the availability zone specified in the storage class have no shared datastores under it.": "Verify PVC creation fails if the availability zone specified in the storage class have no shared datastores under it. [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation with an invalid VSAN capability along with a compatible zone combination specified in storage class fails": "Verify PVC creation with an invalid VSAN capability along with a compatible zone combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation with compatible policy and datastore without any zones specified in the storage class fails (No shared datastores exist among all the nodes)": "Verify PVC creation with compatible policy and datastore without any zones specified in the storage class fails (No shared datastores exist among all the nodes) [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation with incompatible datastore and zone combination specified in storage class fails": "Verify PVC creation with incompatible datastore and zone combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation with incompatible storage policy along with compatible zone and datastore combination specified in storage class fails": "Verify PVC creation with incompatible storage policy along with compatible zone and datastore combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation with incompatible storagePolicy and zone combination specified in storage class fails": "Verify PVC creation with incompatible storagePolicy and zone combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation with incompatible zone along with compatible storagePolicy and datastore combination specified in storage class fails": "Verify PVC creation with incompatible zone along with compatible storagePolicy and datastore combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify PVC creation with invalid zone specified in storage class fails": "Verify PVC creation with invalid zone specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a PVC creation fails when multiple zones are specified in the storage class without shared datastores among the zones in waitForFirstConsumer binding mode": "Verify a PVC creation fails when multiple zones are specified in the storage class without shared datastores among the zones in waitForFirstConsumer binding mode [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod fails to get scheduled when conflicting volume topology (allowedTopologies) and pod scheduling constraints(nodeSelector) are specified": "Verify a pod fails to get scheduled when conflicting volume topology (allowedTopologies) and pod scheduling constraints(nodeSelector) are specified [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode with allowedTopologies": "Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode with allowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode with multiple allowedTopologies": "Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode with multiple allowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode": "Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on a VSAN capability, datastore and compatible zone specified in storage class": "Verify a pod is created and attached to a dynamically created PV, based on a VSAN capability, datastore and compatible zone specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on allowed zones specified in storage class ": "Verify a pod is created and attached to a dynamically created PV, based on allowed zones specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in storage class ": "Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in the storage class. (No shared datastores exist among both zones)": "Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in the storage class. (No shared datastores exist among both zones) [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and datastore specified in storage class when there are multiple datastores with the same name under different zones across datacenters": "Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and datastore specified in storage class when there are multiple datastores with the same name under different zones across datacenters [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and datastore specified in storage class": "Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and datastore specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class": "Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on the allowed zones specified in storage class when the datastore under the zone is present in another datacenter": "Verify a pod is created and attached to a dynamically created PV, based on the allowed zones specified in storage class when the datastore under the zone is present in another datacenter [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created and attached to a dynamically created PV, based on the allowed zones, datastore and storage policy specified in storage class": "Verify a pod is created and attached to a dynamically created PV, based on the allowed zones, datastore and storage policy specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify a pod is created on a non-Workspace zone and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class": "Verify a pod is created on a non-Workspace zone and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify dynamically created pv with allowed zones specified in storage class, shows the right zone information on its labels": "Verify dynamically created pv with allowed zones specified in storage class, shows the right zone information on its labels [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] Zone Support [Feature:vsphere] Verify dynamically created pv with multiple zones specified in the storage class, shows both the zones on its labels": "Verify dynamically created pv with multiple zones specified in the storage class, shows both the zones on its labels [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] [Feature:Flexvolumes] Detaching volumes should not work when mount is in progress [Slow]": "should not work when mount is in progress [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] [Feature:Flexvolumes] Mounted flexvolume expand[Slow] Should verify mounted flex volumes can be resized": "Should verify mounted flex volumes can be resized [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller after creating both pv and pvc": "should create bound pv/pvc count metrics for pvc controller after creating both pv and pvc [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics PVController should create none metrics for pvc controller before creating any PV or PVC": "should create none metrics for pvc controller before creating any PV or PVC [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics PVController should create total pv count metrics for with plugin and volume mode labels after creating pv": "should create total pv count metrics for with plugin and volume mode labels after creating pv [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics PVController should create unbound pv count metrics for pvc controller after creating pv only": "should create unbound pv count metrics for pvc controller after creating pv only [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller after creating pvc only": "should create unbound pvc count metrics for pvc controller after creating pvc only [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics should create metrics for total number of volumes in A/D Controller": "should create metrics for total number of volumes in A/D Controller [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics should create metrics for total time taken in volume operations in P/V Controller": "should create metrics for total time taken in volume operations in P/V Controller [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics should create prometheus metrics for volume provisioning and attach/detach": "should create prometheus metrics for volume provisioning and attach/detach [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics should create prometheus metrics for volume provisioning errors [Slow]": "should create prometheus metrics for volume provisioning errors [Slow] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics should create volume metrics in Volume Manager": "should create volume metrics in Volume Manager [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] [Serial] Volume metrics should create volume metrics with the correct PVC ref": "should create volume metrics with the correct PVC ref [Suite:openshift/conformance/serial] [Suite:k8s]", + + "[Top Level] [sig-storage] vcp at scale [Feature:vsphere] vsphere scale tests": "vsphere scale tests [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] vcp-performance [Feature:vsphere] vcp performance tests": "vcp performance tests [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] vsphere cloud provider stress [Feature:vsphere] vsphere stress tests": "vsphere stress tests [Suite:openshift/conformance/parallel] [Suite:k8s]", + + "[Top Level] [sig-storage] vsphere statefulset [Feature:vsphere] vsphere statefulset testing": "vsphere statefulset testing [Suite:openshift/conformance/parallel] [Suite:k8s]", +} + +func init() { + ginkgo.WalkTests(func(name, parentName string, node types.TestNode) { + combined := name + if len(parentName) > 0 { + combined = parentName + " " + combined + } + if updated, ok := annotations[combined]; ok { + node.SetText(updated) + } else { + panic(fmt.Sprintf("unable to find test %s", combined)) + } + }) +} diff --git a/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/v1/zz_generated.conversion.go b/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/v1/zz_generated.conversion.go new file mode 100644 index 0000000000000..f8ca2c657e34d --- /dev/null +++ b/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/v1/zz_generated.conversion.go @@ -0,0 +1,71 @@ +// +build !ignore_autogenerated + +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// Code generated by conversion-gen. DO NOT EDIT. + +package v1 + +import ( + conversion "k8s.io/apimachinery/pkg/conversion" + runtime "k8s.io/apimachinery/pkg/runtime" + clusterresourceoverride "k8s.io/kubernetes/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride" +) + +func init() { + localSchemeBuilder.Register(RegisterConversions) +} + +// RegisterConversions adds conversion functions to the given scheme. +// Public to allow building arbitrary schemes. +func RegisterConversions(s *runtime.Scheme) error { + if err := s.AddGeneratedConversionFunc((*ClusterResourceOverrideConfig)(nil), (*clusterresourceoverride.ClusterResourceOverrideConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_v1_ClusterResourceOverrideConfig_To_clusterresourceoverride_ClusterResourceOverrideConfig(a.(*ClusterResourceOverrideConfig), b.(*clusterresourceoverride.ClusterResourceOverrideConfig), scope) + }); err != nil { + return err + } + if err := s.AddGeneratedConversionFunc((*clusterresourceoverride.ClusterResourceOverrideConfig)(nil), (*ClusterResourceOverrideConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_clusterresourceoverride_ClusterResourceOverrideConfig_To_v1_ClusterResourceOverrideConfig(a.(*clusterresourceoverride.ClusterResourceOverrideConfig), b.(*ClusterResourceOverrideConfig), scope) + }); err != nil { + return err + } + return nil +} + +func autoConvert_v1_ClusterResourceOverrideConfig_To_clusterresourceoverride_ClusterResourceOverrideConfig(in *ClusterResourceOverrideConfig, out *clusterresourceoverride.ClusterResourceOverrideConfig, s conversion.Scope) error { + out.LimitCPUToMemoryPercent = in.LimitCPUToMemoryPercent + out.CPURequestToLimitPercent = in.CPURequestToLimitPercent + out.MemoryRequestToLimitPercent = in.MemoryRequestToLimitPercent + return nil +} + +// Convert_v1_ClusterResourceOverrideConfig_To_clusterresourceoverride_ClusterResourceOverrideConfig is an autogenerated conversion function. +func Convert_v1_ClusterResourceOverrideConfig_To_clusterresourceoverride_ClusterResourceOverrideConfig(in *ClusterResourceOverrideConfig, out *clusterresourceoverride.ClusterResourceOverrideConfig, s conversion.Scope) error { + return autoConvert_v1_ClusterResourceOverrideConfig_To_clusterresourceoverride_ClusterResourceOverrideConfig(in, out, s) +} + +func autoConvert_clusterresourceoverride_ClusterResourceOverrideConfig_To_v1_ClusterResourceOverrideConfig(in *clusterresourceoverride.ClusterResourceOverrideConfig, out *ClusterResourceOverrideConfig, s conversion.Scope) error { + out.LimitCPUToMemoryPercent = in.LimitCPUToMemoryPercent + out.CPURequestToLimitPercent = in.CPURequestToLimitPercent + out.MemoryRequestToLimitPercent = in.MemoryRequestToLimitPercent + return nil +} + +// Convert_clusterresourceoverride_ClusterResourceOverrideConfig_To_v1_ClusterResourceOverrideConfig is an autogenerated conversion function. +func Convert_clusterresourceoverride_ClusterResourceOverrideConfig_To_v1_ClusterResourceOverrideConfig(in *clusterresourceoverride.ClusterResourceOverrideConfig, out *ClusterResourceOverrideConfig, s conversion.Scope) error { + return autoConvert_clusterresourceoverride_ClusterResourceOverrideConfig_To_v1_ClusterResourceOverrideConfig(in, out, s) +} diff --git a/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/v1/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/v1/zz_generated.deepcopy.go index 14255bad29a36..e609027ea9ce3 100644 --- a/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/v1/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/v1/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package v1 diff --git a/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/zz_generated.deepcopy.go index 09414272c2210..d2e3345945004 100644 --- a/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/autoscaling/apis/clusterresourceoverride/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package clusterresourceoverride diff --git a/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/v1/zz_generated.conversion.go b/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/v1/zz_generated.conversion.go new file mode 100644 index 0000000000000..c2d65e81b521b --- /dev/null +++ b/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/v1/zz_generated.conversion.go @@ -0,0 +1,69 @@ +// +build !ignore_autogenerated + +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// Code generated by conversion-gen. DO NOT EDIT. + +package v1 + +import ( + unsafe "unsafe" + + conversion "k8s.io/apimachinery/pkg/conversion" + runtime "k8s.io/apimachinery/pkg/runtime" + runonceduration "k8s.io/kubernetes/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration" +) + +func init() { + localSchemeBuilder.Register(RegisterConversions) +} + +// RegisterConversions adds conversion functions to the given scheme. +// Public to allow building arbitrary schemes. +func RegisterConversions(s *runtime.Scheme) error { + if err := s.AddGeneratedConversionFunc((*RunOnceDurationConfig)(nil), (*runonceduration.RunOnceDurationConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_v1_RunOnceDurationConfig_To_runonceduration_RunOnceDurationConfig(a.(*RunOnceDurationConfig), b.(*runonceduration.RunOnceDurationConfig), scope) + }); err != nil { + return err + } + if err := s.AddGeneratedConversionFunc((*runonceduration.RunOnceDurationConfig)(nil), (*RunOnceDurationConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_runonceduration_RunOnceDurationConfig_To_v1_RunOnceDurationConfig(a.(*runonceduration.RunOnceDurationConfig), b.(*RunOnceDurationConfig), scope) + }); err != nil { + return err + } + return nil +} + +func autoConvert_v1_RunOnceDurationConfig_To_runonceduration_RunOnceDurationConfig(in *RunOnceDurationConfig, out *runonceduration.RunOnceDurationConfig, s conversion.Scope) error { + out.ActiveDeadlineSecondsOverride = (*int64)(unsafe.Pointer(in.ActiveDeadlineSecondsOverride)) + return nil +} + +// Convert_v1_RunOnceDurationConfig_To_runonceduration_RunOnceDurationConfig is an autogenerated conversion function. +func Convert_v1_RunOnceDurationConfig_To_runonceduration_RunOnceDurationConfig(in *RunOnceDurationConfig, out *runonceduration.RunOnceDurationConfig, s conversion.Scope) error { + return autoConvert_v1_RunOnceDurationConfig_To_runonceduration_RunOnceDurationConfig(in, out, s) +} + +func autoConvert_runonceduration_RunOnceDurationConfig_To_v1_RunOnceDurationConfig(in *runonceduration.RunOnceDurationConfig, out *RunOnceDurationConfig, s conversion.Scope) error { + out.ActiveDeadlineSecondsOverride = (*int64)(unsafe.Pointer(in.ActiveDeadlineSecondsOverride)) + return nil +} + +// Convert_runonceduration_RunOnceDurationConfig_To_v1_RunOnceDurationConfig is an autogenerated conversion function. +func Convert_runonceduration_RunOnceDurationConfig_To_v1_RunOnceDurationConfig(in *runonceduration.RunOnceDurationConfig, out *RunOnceDurationConfig, s conversion.Scope) error { + return autoConvert_runonceduration_RunOnceDurationConfig_To_v1_RunOnceDurationConfig(in, out, s) +} diff --git a/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/v1/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/v1/zz_generated.deepcopy.go index 3000ba62bd174..ff4c0295065c0 100644 --- a/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/v1/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/v1/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package v1 diff --git a/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/zz_generated.deepcopy.go index b87ed7a25b492..e2e9680e82357 100644 --- a/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/autoscaling/apis/runonceduration/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package runonceduration diff --git a/openshift-kube-apiserver/admission/network/apis/externalipranger/v1/zz_generated.conversion.go b/openshift-kube-apiserver/admission/network/apis/externalipranger/v1/zz_generated.conversion.go new file mode 100644 index 0000000000000..8ec11178435ca --- /dev/null +++ b/openshift-kube-apiserver/admission/network/apis/externalipranger/v1/zz_generated.conversion.go @@ -0,0 +1,71 @@ +// +build !ignore_autogenerated + +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// Code generated by conversion-gen. DO NOT EDIT. + +package v1 + +import ( + unsafe "unsafe" + + conversion "k8s.io/apimachinery/pkg/conversion" + runtime "k8s.io/apimachinery/pkg/runtime" + externalipranger "k8s.io/kubernetes/openshift-kube-apiserver/admission/network/apis/externalipranger" +) + +func init() { + localSchemeBuilder.Register(RegisterConversions) +} + +// RegisterConversions adds conversion functions to the given scheme. +// Public to allow building arbitrary schemes. +func RegisterConversions(s *runtime.Scheme) error { + if err := s.AddGeneratedConversionFunc((*ExternalIPRangerAdmissionConfig)(nil), (*externalipranger.ExternalIPRangerAdmissionConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_v1_ExternalIPRangerAdmissionConfig_To_externalipranger_ExternalIPRangerAdmissionConfig(a.(*ExternalIPRangerAdmissionConfig), b.(*externalipranger.ExternalIPRangerAdmissionConfig), scope) + }); err != nil { + return err + } + if err := s.AddGeneratedConversionFunc((*externalipranger.ExternalIPRangerAdmissionConfig)(nil), (*ExternalIPRangerAdmissionConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_externalipranger_ExternalIPRangerAdmissionConfig_To_v1_ExternalIPRangerAdmissionConfig(a.(*externalipranger.ExternalIPRangerAdmissionConfig), b.(*ExternalIPRangerAdmissionConfig), scope) + }); err != nil { + return err + } + return nil +} + +func autoConvert_v1_ExternalIPRangerAdmissionConfig_To_externalipranger_ExternalIPRangerAdmissionConfig(in *ExternalIPRangerAdmissionConfig, out *externalipranger.ExternalIPRangerAdmissionConfig, s conversion.Scope) error { + out.ExternalIPNetworkCIDRs = *(*[]string)(unsafe.Pointer(&in.ExternalIPNetworkCIDRs)) + out.AllowIngressIP = in.AllowIngressIP + return nil +} + +// Convert_v1_ExternalIPRangerAdmissionConfig_To_externalipranger_ExternalIPRangerAdmissionConfig is an autogenerated conversion function. +func Convert_v1_ExternalIPRangerAdmissionConfig_To_externalipranger_ExternalIPRangerAdmissionConfig(in *ExternalIPRangerAdmissionConfig, out *externalipranger.ExternalIPRangerAdmissionConfig, s conversion.Scope) error { + return autoConvert_v1_ExternalIPRangerAdmissionConfig_To_externalipranger_ExternalIPRangerAdmissionConfig(in, out, s) +} + +func autoConvert_externalipranger_ExternalIPRangerAdmissionConfig_To_v1_ExternalIPRangerAdmissionConfig(in *externalipranger.ExternalIPRangerAdmissionConfig, out *ExternalIPRangerAdmissionConfig, s conversion.Scope) error { + out.ExternalIPNetworkCIDRs = *(*[]string)(unsafe.Pointer(&in.ExternalIPNetworkCIDRs)) + out.AllowIngressIP = in.AllowIngressIP + return nil +} + +// Convert_externalipranger_ExternalIPRangerAdmissionConfig_To_v1_ExternalIPRangerAdmissionConfig is an autogenerated conversion function. +func Convert_externalipranger_ExternalIPRangerAdmissionConfig_To_v1_ExternalIPRangerAdmissionConfig(in *externalipranger.ExternalIPRangerAdmissionConfig, out *ExternalIPRangerAdmissionConfig, s conversion.Scope) error { + return autoConvert_externalipranger_ExternalIPRangerAdmissionConfig_To_v1_ExternalIPRangerAdmissionConfig(in, out, s) +} diff --git a/openshift-kube-apiserver/admission/network/apis/externalipranger/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/network/apis/externalipranger/zz_generated.deepcopy.go index 8437974962071..55601d78cf56c 100644 --- a/openshift-kube-apiserver/admission/network/apis/externalipranger/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/network/apis/externalipranger/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package externalipranger diff --git a/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/v1/zz_generated.conversion.go b/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/v1/zz_generated.conversion.go new file mode 100644 index 0000000000000..413965b8ee704 --- /dev/null +++ b/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/v1/zz_generated.conversion.go @@ -0,0 +1,69 @@ +// +build !ignore_autogenerated + +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// Code generated by conversion-gen. DO NOT EDIT. + +package v1 + +import ( + unsafe "unsafe" + + conversion "k8s.io/apimachinery/pkg/conversion" + runtime "k8s.io/apimachinery/pkg/runtime" + restrictedendpoints "k8s.io/kubernetes/openshift-kube-apiserver/admission/network/apis/restrictedendpoints" +) + +func init() { + localSchemeBuilder.Register(RegisterConversions) +} + +// RegisterConversions adds conversion functions to the given scheme. +// Public to allow building arbitrary schemes. +func RegisterConversions(s *runtime.Scheme) error { + if err := s.AddGeneratedConversionFunc((*RestrictedEndpointsAdmissionConfig)(nil), (*restrictedendpoints.RestrictedEndpointsAdmissionConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_v1_RestrictedEndpointsAdmissionConfig_To_restrictedendpoints_RestrictedEndpointsAdmissionConfig(a.(*RestrictedEndpointsAdmissionConfig), b.(*restrictedendpoints.RestrictedEndpointsAdmissionConfig), scope) + }); err != nil { + return err + } + if err := s.AddGeneratedConversionFunc((*restrictedendpoints.RestrictedEndpointsAdmissionConfig)(nil), (*RestrictedEndpointsAdmissionConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_restrictedendpoints_RestrictedEndpointsAdmissionConfig_To_v1_RestrictedEndpointsAdmissionConfig(a.(*restrictedendpoints.RestrictedEndpointsAdmissionConfig), b.(*RestrictedEndpointsAdmissionConfig), scope) + }); err != nil { + return err + } + return nil +} + +func autoConvert_v1_RestrictedEndpointsAdmissionConfig_To_restrictedendpoints_RestrictedEndpointsAdmissionConfig(in *RestrictedEndpointsAdmissionConfig, out *restrictedendpoints.RestrictedEndpointsAdmissionConfig, s conversion.Scope) error { + out.RestrictedCIDRs = *(*[]string)(unsafe.Pointer(&in.RestrictedCIDRs)) + return nil +} + +// Convert_v1_RestrictedEndpointsAdmissionConfig_To_restrictedendpoints_RestrictedEndpointsAdmissionConfig is an autogenerated conversion function. +func Convert_v1_RestrictedEndpointsAdmissionConfig_To_restrictedendpoints_RestrictedEndpointsAdmissionConfig(in *RestrictedEndpointsAdmissionConfig, out *restrictedendpoints.RestrictedEndpointsAdmissionConfig, s conversion.Scope) error { + return autoConvert_v1_RestrictedEndpointsAdmissionConfig_To_restrictedendpoints_RestrictedEndpointsAdmissionConfig(in, out, s) +} + +func autoConvert_restrictedendpoints_RestrictedEndpointsAdmissionConfig_To_v1_RestrictedEndpointsAdmissionConfig(in *restrictedendpoints.RestrictedEndpointsAdmissionConfig, out *RestrictedEndpointsAdmissionConfig, s conversion.Scope) error { + out.RestrictedCIDRs = *(*[]string)(unsafe.Pointer(&in.RestrictedCIDRs)) + return nil +} + +// Convert_restrictedendpoints_RestrictedEndpointsAdmissionConfig_To_v1_RestrictedEndpointsAdmissionConfig is an autogenerated conversion function. +func Convert_restrictedendpoints_RestrictedEndpointsAdmissionConfig_To_v1_RestrictedEndpointsAdmissionConfig(in *restrictedendpoints.RestrictedEndpointsAdmissionConfig, out *RestrictedEndpointsAdmissionConfig, s conversion.Scope) error { + return autoConvert_restrictedendpoints_RestrictedEndpointsAdmissionConfig_To_v1_RestrictedEndpointsAdmissionConfig(in, out, s) +} diff --git a/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/v1/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/v1/zz_generated.deepcopy.go index e9597be6b05da..d63f90426e6f9 100644 --- a/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/v1/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/v1/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package v1 diff --git a/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/zz_generated.deepcopy.go index 0a00cc4bc8da4..f6e62a3e11b7f 100644 --- a/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/network/apis/restrictedendpoints/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package restrictedendpoints diff --git a/openshift-kube-apiserver/admission/route/apis/ingressadmission/v1/zz_generated.conversion.go b/openshift-kube-apiserver/admission/route/apis/ingressadmission/v1/zz_generated.conversion.go new file mode 100644 index 0000000000000..1a4fd21ec0e01 --- /dev/null +++ b/openshift-kube-apiserver/admission/route/apis/ingressadmission/v1/zz_generated.conversion.go @@ -0,0 +1,67 @@ +// +build !ignore_autogenerated + +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// Code generated by conversion-gen. DO NOT EDIT. + +package v1 + +import ( + conversion "k8s.io/apimachinery/pkg/conversion" + runtime "k8s.io/apimachinery/pkg/runtime" + ingressadmission "k8s.io/kubernetes/openshift-kube-apiserver/admission/route/apis/ingressadmission" +) + +func init() { + localSchemeBuilder.Register(RegisterConversions) +} + +// RegisterConversions adds conversion functions to the given scheme. +// Public to allow building arbitrary schemes. +func RegisterConversions(s *runtime.Scheme) error { + if err := s.AddGeneratedConversionFunc((*IngressAdmissionConfig)(nil), (*ingressadmission.IngressAdmissionConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_v1_IngressAdmissionConfig_To_ingressadmission_IngressAdmissionConfig(a.(*IngressAdmissionConfig), b.(*ingressadmission.IngressAdmissionConfig), scope) + }); err != nil { + return err + } + if err := s.AddGeneratedConversionFunc((*ingressadmission.IngressAdmissionConfig)(nil), (*IngressAdmissionConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_ingressadmission_IngressAdmissionConfig_To_v1_IngressAdmissionConfig(a.(*ingressadmission.IngressAdmissionConfig), b.(*IngressAdmissionConfig), scope) + }); err != nil { + return err + } + return nil +} + +func autoConvert_v1_IngressAdmissionConfig_To_ingressadmission_IngressAdmissionConfig(in *IngressAdmissionConfig, out *ingressadmission.IngressAdmissionConfig, s conversion.Scope) error { + out.AllowHostnameChanges = in.AllowHostnameChanges + return nil +} + +// Convert_v1_IngressAdmissionConfig_To_ingressadmission_IngressAdmissionConfig is an autogenerated conversion function. +func Convert_v1_IngressAdmissionConfig_To_ingressadmission_IngressAdmissionConfig(in *IngressAdmissionConfig, out *ingressadmission.IngressAdmissionConfig, s conversion.Scope) error { + return autoConvert_v1_IngressAdmissionConfig_To_ingressadmission_IngressAdmissionConfig(in, out, s) +} + +func autoConvert_ingressadmission_IngressAdmissionConfig_To_v1_IngressAdmissionConfig(in *ingressadmission.IngressAdmissionConfig, out *IngressAdmissionConfig, s conversion.Scope) error { + out.AllowHostnameChanges = in.AllowHostnameChanges + return nil +} + +// Convert_ingressadmission_IngressAdmissionConfig_To_v1_IngressAdmissionConfig is an autogenerated conversion function. +func Convert_ingressadmission_IngressAdmissionConfig_To_v1_IngressAdmissionConfig(in *ingressadmission.IngressAdmissionConfig, out *IngressAdmissionConfig, s conversion.Scope) error { + return autoConvert_ingressadmission_IngressAdmissionConfig_To_v1_IngressAdmissionConfig(in, out, s) +} diff --git a/openshift-kube-apiserver/admission/route/apis/ingressadmission/v1/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/route/apis/ingressadmission/v1/zz_generated.deepcopy.go index ba0f8a528c380..e59ff458868b3 100644 --- a/openshift-kube-apiserver/admission/route/apis/ingressadmission/v1/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/route/apis/ingressadmission/v1/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package v1 diff --git a/openshift-kube-apiserver/admission/route/apis/ingressadmission/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/route/apis/ingressadmission/zz_generated.deepcopy.go index e75a7b7a07f22..159314a6901ea 100644 --- a/openshift-kube-apiserver/admission/route/apis/ingressadmission/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/route/apis/ingressadmission/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package ingressadmission diff --git a/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/v1/zz_generated.conversion.go b/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/v1/zz_generated.conversion.go new file mode 100644 index 0000000000000..6a13d569f2ea5 --- /dev/null +++ b/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/v1/zz_generated.conversion.go @@ -0,0 +1,69 @@ +// +build !ignore_autogenerated + +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// Code generated by conversion-gen. DO NOT EDIT. + +package v1 + +import ( + unsafe "unsafe" + + conversion "k8s.io/apimachinery/pkg/conversion" + runtime "k8s.io/apimachinery/pkg/runtime" + podnodeconstraints "k8s.io/kubernetes/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints" +) + +func init() { + localSchemeBuilder.Register(RegisterConversions) +} + +// RegisterConversions adds conversion functions to the given scheme. +// Public to allow building arbitrary schemes. +func RegisterConversions(s *runtime.Scheme) error { + if err := s.AddGeneratedConversionFunc((*PodNodeConstraintsConfig)(nil), (*podnodeconstraints.PodNodeConstraintsConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_v1_PodNodeConstraintsConfig_To_podnodeconstraints_PodNodeConstraintsConfig(a.(*PodNodeConstraintsConfig), b.(*podnodeconstraints.PodNodeConstraintsConfig), scope) + }); err != nil { + return err + } + if err := s.AddGeneratedConversionFunc((*podnodeconstraints.PodNodeConstraintsConfig)(nil), (*PodNodeConstraintsConfig)(nil), func(a, b interface{}, scope conversion.Scope) error { + return Convert_podnodeconstraints_PodNodeConstraintsConfig_To_v1_PodNodeConstraintsConfig(a.(*podnodeconstraints.PodNodeConstraintsConfig), b.(*PodNodeConstraintsConfig), scope) + }); err != nil { + return err + } + return nil +} + +func autoConvert_v1_PodNodeConstraintsConfig_To_podnodeconstraints_PodNodeConstraintsConfig(in *PodNodeConstraintsConfig, out *podnodeconstraints.PodNodeConstraintsConfig, s conversion.Scope) error { + out.NodeSelectorLabelBlacklist = *(*[]string)(unsafe.Pointer(&in.NodeSelectorLabelBlacklist)) + return nil +} + +// Convert_v1_PodNodeConstraintsConfig_To_podnodeconstraints_PodNodeConstraintsConfig is an autogenerated conversion function. +func Convert_v1_PodNodeConstraintsConfig_To_podnodeconstraints_PodNodeConstraintsConfig(in *PodNodeConstraintsConfig, out *podnodeconstraints.PodNodeConstraintsConfig, s conversion.Scope) error { + return autoConvert_v1_PodNodeConstraintsConfig_To_podnodeconstraints_PodNodeConstraintsConfig(in, out, s) +} + +func autoConvert_podnodeconstraints_PodNodeConstraintsConfig_To_v1_PodNodeConstraintsConfig(in *podnodeconstraints.PodNodeConstraintsConfig, out *PodNodeConstraintsConfig, s conversion.Scope) error { + out.NodeSelectorLabelBlacklist = *(*[]string)(unsafe.Pointer(&in.NodeSelectorLabelBlacklist)) + return nil +} + +// Convert_podnodeconstraints_PodNodeConstraintsConfig_To_v1_PodNodeConstraintsConfig is an autogenerated conversion function. +func Convert_podnodeconstraints_PodNodeConstraintsConfig_To_v1_PodNodeConstraintsConfig(in *podnodeconstraints.PodNodeConstraintsConfig, out *PodNodeConstraintsConfig, s conversion.Scope) error { + return autoConvert_podnodeconstraints_PodNodeConstraintsConfig_To_v1_PodNodeConstraintsConfig(in, out, s) +} diff --git a/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/v1/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/v1/zz_generated.deepcopy.go index 5d7b49dc20032..624cec3cceb09 100644 --- a/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/v1/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/v1/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package v1 diff --git a/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/zz_generated.deepcopy.go b/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/zz_generated.deepcopy.go index 46ccf9f25bd18..e8f45f4e9b281 100644 --- a/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/zz_generated.deepcopy.go +++ b/openshift-kube-apiserver/admission/scheduler/apis/podnodeconstraints/zz_generated.deepcopy.go @@ -1,5 +1,21 @@ // +build !ignore_autogenerated +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + // Code generated by deepcopy-gen. DO NOT EDIT. package podnodeconstraints diff --git a/pkg/generated/openapi/zz_generated.openapi.go b/pkg/generated/openapi/zz_generated.openapi.go new file mode 100644 index 0000000000000..8acf9b65f86e2 --- /dev/null +++ b/pkg/generated/openapi/zz_generated.openapi.go @@ -0,0 +1,51255 @@ +// +build !ignore_autogenerated + +/* +Copyright The Kubernetes Authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// Code generated by openapi-gen. DO NOT EDIT. + +// This file was autogenerated by openapi-gen. Do not edit it manually! + +package openapi + +import ( + spec "github.com/go-openapi/spec" + v1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1" + v1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1" + resource "k8s.io/apimachinery/pkg/api/resource" + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" + intstr "k8s.io/apimachinery/pkg/util/intstr" + common "k8s.io/kube-openapi/pkg/common" +) + +func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenAPIDefinition { + return map[string]common.OpenAPIDefinition{ + "k8s.io/api/admissionregistration/v1.MutatingWebhook": schema_k8sio_api_admissionregistration_v1_MutatingWebhook(ref), + "k8s.io/api/admissionregistration/v1.MutatingWebhookConfiguration": schema_k8sio_api_admissionregistration_v1_MutatingWebhookConfiguration(ref), + "k8s.io/api/admissionregistration/v1.MutatingWebhookConfigurationList": schema_k8sio_api_admissionregistration_v1_MutatingWebhookConfigurationList(ref), + "k8s.io/api/admissionregistration/v1.Rule": schema_k8sio_api_admissionregistration_v1_Rule(ref), + "k8s.io/api/admissionregistration/v1.RuleWithOperations": schema_k8sio_api_admissionregistration_v1_RuleWithOperations(ref), + "k8s.io/api/admissionregistration/v1.ServiceReference": schema_k8sio_api_admissionregistration_v1_ServiceReference(ref), + "k8s.io/api/admissionregistration/v1.ValidatingWebhook": schema_k8sio_api_admissionregistration_v1_ValidatingWebhook(ref), + "k8s.io/api/admissionregistration/v1.ValidatingWebhookConfiguration": schema_k8sio_api_admissionregistration_v1_ValidatingWebhookConfiguration(ref), + "k8s.io/api/admissionregistration/v1.ValidatingWebhookConfigurationList": schema_k8sio_api_admissionregistration_v1_ValidatingWebhookConfigurationList(ref), + "k8s.io/api/admissionregistration/v1.WebhookClientConfig": schema_k8sio_api_admissionregistration_v1_WebhookClientConfig(ref), + "k8s.io/api/admissionregistration/v1beta1.MutatingWebhook": schema_k8sio_api_admissionregistration_v1beta1_MutatingWebhook(ref), + "k8s.io/api/admissionregistration/v1beta1.MutatingWebhookConfiguration": schema_k8sio_api_admissionregistration_v1beta1_MutatingWebhookConfiguration(ref), + "k8s.io/api/admissionregistration/v1beta1.MutatingWebhookConfigurationList": schema_k8sio_api_admissionregistration_v1beta1_MutatingWebhookConfigurationList(ref), + "k8s.io/api/admissionregistration/v1beta1.Rule": schema_k8sio_api_admissionregistration_v1beta1_Rule(ref), + "k8s.io/api/admissionregistration/v1beta1.RuleWithOperations": schema_k8sio_api_admissionregistration_v1beta1_RuleWithOperations(ref), + "k8s.io/api/admissionregistration/v1beta1.ServiceReference": schema_k8sio_api_admissionregistration_v1beta1_ServiceReference(ref), + "k8s.io/api/admissionregistration/v1beta1.ValidatingWebhook": schema_k8sio_api_admissionregistration_v1beta1_ValidatingWebhook(ref), + "k8s.io/api/admissionregistration/v1beta1.ValidatingWebhookConfiguration": schema_k8sio_api_admissionregistration_v1beta1_ValidatingWebhookConfiguration(ref), + "k8s.io/api/admissionregistration/v1beta1.ValidatingWebhookConfigurationList": schema_k8sio_api_admissionregistration_v1beta1_ValidatingWebhookConfigurationList(ref), + "k8s.io/api/admissionregistration/v1beta1.WebhookClientConfig": schema_k8sio_api_admissionregistration_v1beta1_WebhookClientConfig(ref), + "k8s.io/api/apiserverinternal/v1alpha1.ServerStorageVersion": schema_k8sio_api_apiserverinternal_v1alpha1_ServerStorageVersion(ref), + "k8s.io/api/apiserverinternal/v1alpha1.StorageVersion": schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersion(ref), + "k8s.io/api/apiserverinternal/v1alpha1.StorageVersionCondition": schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersionCondition(ref), + "k8s.io/api/apiserverinternal/v1alpha1.StorageVersionList": schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersionList(ref), + "k8s.io/api/apiserverinternal/v1alpha1.StorageVersionSpec": schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersionSpec(ref), + "k8s.io/api/apiserverinternal/v1alpha1.StorageVersionStatus": schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersionStatus(ref), + "k8s.io/api/apps/v1.ControllerRevision": schema_k8sio_api_apps_v1_ControllerRevision(ref), + "k8s.io/api/apps/v1.ControllerRevisionList": schema_k8sio_api_apps_v1_ControllerRevisionList(ref), + "k8s.io/api/apps/v1.DaemonSet": schema_k8sio_api_apps_v1_DaemonSet(ref), + "k8s.io/api/apps/v1.DaemonSetCondition": schema_k8sio_api_apps_v1_DaemonSetCondition(ref), + "k8s.io/api/apps/v1.DaemonSetList": schema_k8sio_api_apps_v1_DaemonSetList(ref), + "k8s.io/api/apps/v1.DaemonSetSpec": schema_k8sio_api_apps_v1_DaemonSetSpec(ref), + "k8s.io/api/apps/v1.DaemonSetStatus": schema_k8sio_api_apps_v1_DaemonSetStatus(ref), + "k8s.io/api/apps/v1.DaemonSetUpdateStrategy": schema_k8sio_api_apps_v1_DaemonSetUpdateStrategy(ref), + "k8s.io/api/apps/v1.Deployment": schema_k8sio_api_apps_v1_Deployment(ref), + "k8s.io/api/apps/v1.DeploymentCondition": schema_k8sio_api_apps_v1_DeploymentCondition(ref), + "k8s.io/api/apps/v1.DeploymentList": schema_k8sio_api_apps_v1_DeploymentList(ref), + "k8s.io/api/apps/v1.DeploymentSpec": schema_k8sio_api_apps_v1_DeploymentSpec(ref), + "k8s.io/api/apps/v1.DeploymentStatus": schema_k8sio_api_apps_v1_DeploymentStatus(ref), + "k8s.io/api/apps/v1.DeploymentStrategy": schema_k8sio_api_apps_v1_DeploymentStrategy(ref), + "k8s.io/api/apps/v1.ReplicaSet": schema_k8sio_api_apps_v1_ReplicaSet(ref), + "k8s.io/api/apps/v1.ReplicaSetCondition": schema_k8sio_api_apps_v1_ReplicaSetCondition(ref), + "k8s.io/api/apps/v1.ReplicaSetList": schema_k8sio_api_apps_v1_ReplicaSetList(ref), + "k8s.io/api/apps/v1.ReplicaSetSpec": schema_k8sio_api_apps_v1_ReplicaSetSpec(ref), + "k8s.io/api/apps/v1.ReplicaSetStatus": schema_k8sio_api_apps_v1_ReplicaSetStatus(ref), + "k8s.io/api/apps/v1.RollingUpdateDaemonSet": schema_k8sio_api_apps_v1_RollingUpdateDaemonSet(ref), + "k8s.io/api/apps/v1.RollingUpdateDeployment": schema_k8sio_api_apps_v1_RollingUpdateDeployment(ref), + "k8s.io/api/apps/v1.RollingUpdateStatefulSetStrategy": schema_k8sio_api_apps_v1_RollingUpdateStatefulSetStrategy(ref), + "k8s.io/api/apps/v1.StatefulSet": schema_k8sio_api_apps_v1_StatefulSet(ref), + "k8s.io/api/apps/v1.StatefulSetCondition": schema_k8sio_api_apps_v1_StatefulSetCondition(ref), + "k8s.io/api/apps/v1.StatefulSetList": schema_k8sio_api_apps_v1_StatefulSetList(ref), + "k8s.io/api/apps/v1.StatefulSetSpec": schema_k8sio_api_apps_v1_StatefulSetSpec(ref), + "k8s.io/api/apps/v1.StatefulSetStatus": schema_k8sio_api_apps_v1_StatefulSetStatus(ref), + "k8s.io/api/apps/v1.StatefulSetUpdateStrategy": schema_k8sio_api_apps_v1_StatefulSetUpdateStrategy(ref), + "k8s.io/api/apps/v1beta1.ControllerRevision": schema_k8sio_api_apps_v1beta1_ControllerRevision(ref), + "k8s.io/api/apps/v1beta1.ControllerRevisionList": schema_k8sio_api_apps_v1beta1_ControllerRevisionList(ref), + "k8s.io/api/apps/v1beta1.Deployment": schema_k8sio_api_apps_v1beta1_Deployment(ref), + "k8s.io/api/apps/v1beta1.DeploymentCondition": schema_k8sio_api_apps_v1beta1_DeploymentCondition(ref), + "k8s.io/api/apps/v1beta1.DeploymentList": schema_k8sio_api_apps_v1beta1_DeploymentList(ref), + "k8s.io/api/apps/v1beta1.DeploymentRollback": schema_k8sio_api_apps_v1beta1_DeploymentRollback(ref), + "k8s.io/api/apps/v1beta1.DeploymentSpec": schema_k8sio_api_apps_v1beta1_DeploymentSpec(ref), + "k8s.io/api/apps/v1beta1.DeploymentStatus": schema_k8sio_api_apps_v1beta1_DeploymentStatus(ref), + "k8s.io/api/apps/v1beta1.DeploymentStrategy": schema_k8sio_api_apps_v1beta1_DeploymentStrategy(ref), + "k8s.io/api/apps/v1beta1.RollbackConfig": schema_k8sio_api_apps_v1beta1_RollbackConfig(ref), + "k8s.io/api/apps/v1beta1.RollingUpdateDeployment": schema_k8sio_api_apps_v1beta1_RollingUpdateDeployment(ref), + "k8s.io/api/apps/v1beta1.RollingUpdateStatefulSetStrategy": schema_k8sio_api_apps_v1beta1_RollingUpdateStatefulSetStrategy(ref), + "k8s.io/api/apps/v1beta1.Scale": schema_k8sio_api_apps_v1beta1_Scale(ref), + "k8s.io/api/apps/v1beta1.ScaleSpec": schema_k8sio_api_apps_v1beta1_ScaleSpec(ref), + "k8s.io/api/apps/v1beta1.ScaleStatus": schema_k8sio_api_apps_v1beta1_ScaleStatus(ref), + "k8s.io/api/apps/v1beta1.StatefulSet": schema_k8sio_api_apps_v1beta1_StatefulSet(ref), + "k8s.io/api/apps/v1beta1.StatefulSetCondition": schema_k8sio_api_apps_v1beta1_StatefulSetCondition(ref), + "k8s.io/api/apps/v1beta1.StatefulSetList": schema_k8sio_api_apps_v1beta1_StatefulSetList(ref), + "k8s.io/api/apps/v1beta1.StatefulSetSpec": schema_k8sio_api_apps_v1beta1_StatefulSetSpec(ref), + "k8s.io/api/apps/v1beta1.StatefulSetStatus": schema_k8sio_api_apps_v1beta1_StatefulSetStatus(ref), + "k8s.io/api/apps/v1beta1.StatefulSetUpdateStrategy": schema_k8sio_api_apps_v1beta1_StatefulSetUpdateStrategy(ref), + "k8s.io/api/apps/v1beta2.ControllerRevision": schema_k8sio_api_apps_v1beta2_ControllerRevision(ref), + "k8s.io/api/apps/v1beta2.ControllerRevisionList": schema_k8sio_api_apps_v1beta2_ControllerRevisionList(ref), + "k8s.io/api/apps/v1beta2.DaemonSet": schema_k8sio_api_apps_v1beta2_DaemonSet(ref), + "k8s.io/api/apps/v1beta2.DaemonSetCondition": schema_k8sio_api_apps_v1beta2_DaemonSetCondition(ref), + "k8s.io/api/apps/v1beta2.DaemonSetList": schema_k8sio_api_apps_v1beta2_DaemonSetList(ref), + "k8s.io/api/apps/v1beta2.DaemonSetSpec": schema_k8sio_api_apps_v1beta2_DaemonSetSpec(ref), + "k8s.io/api/apps/v1beta2.DaemonSetStatus": schema_k8sio_api_apps_v1beta2_DaemonSetStatus(ref), + "k8s.io/api/apps/v1beta2.DaemonSetUpdateStrategy": schema_k8sio_api_apps_v1beta2_DaemonSetUpdateStrategy(ref), + "k8s.io/api/apps/v1beta2.Deployment": schema_k8sio_api_apps_v1beta2_Deployment(ref), + "k8s.io/api/apps/v1beta2.DeploymentCondition": schema_k8sio_api_apps_v1beta2_DeploymentCondition(ref), + "k8s.io/api/apps/v1beta2.DeploymentList": schema_k8sio_api_apps_v1beta2_DeploymentList(ref), + "k8s.io/api/apps/v1beta2.DeploymentSpec": schema_k8sio_api_apps_v1beta2_DeploymentSpec(ref), + "k8s.io/api/apps/v1beta2.DeploymentStatus": schema_k8sio_api_apps_v1beta2_DeploymentStatus(ref), + "k8s.io/api/apps/v1beta2.DeploymentStrategy": schema_k8sio_api_apps_v1beta2_DeploymentStrategy(ref), + "k8s.io/api/apps/v1beta2.ReplicaSet": schema_k8sio_api_apps_v1beta2_ReplicaSet(ref), + "k8s.io/api/apps/v1beta2.ReplicaSetCondition": schema_k8sio_api_apps_v1beta2_ReplicaSetCondition(ref), + "k8s.io/api/apps/v1beta2.ReplicaSetList": schema_k8sio_api_apps_v1beta2_ReplicaSetList(ref), + "k8s.io/api/apps/v1beta2.ReplicaSetSpec": schema_k8sio_api_apps_v1beta2_ReplicaSetSpec(ref), + "k8s.io/api/apps/v1beta2.ReplicaSetStatus": schema_k8sio_api_apps_v1beta2_ReplicaSetStatus(ref), + "k8s.io/api/apps/v1beta2.RollingUpdateDaemonSet": schema_k8sio_api_apps_v1beta2_RollingUpdateDaemonSet(ref), + "k8s.io/api/apps/v1beta2.RollingUpdateDeployment": schema_k8sio_api_apps_v1beta2_RollingUpdateDeployment(ref), + "k8s.io/api/apps/v1beta2.RollingUpdateStatefulSetStrategy": schema_k8sio_api_apps_v1beta2_RollingUpdateStatefulSetStrategy(ref), + "k8s.io/api/apps/v1beta2.Scale": schema_k8sio_api_apps_v1beta2_Scale(ref), + "k8s.io/api/apps/v1beta2.ScaleSpec": schema_k8sio_api_apps_v1beta2_ScaleSpec(ref), + "k8s.io/api/apps/v1beta2.ScaleStatus": schema_k8sio_api_apps_v1beta2_ScaleStatus(ref), + "k8s.io/api/apps/v1beta2.StatefulSet": schema_k8sio_api_apps_v1beta2_StatefulSet(ref), + "k8s.io/api/apps/v1beta2.StatefulSetCondition": schema_k8sio_api_apps_v1beta2_StatefulSetCondition(ref), + "k8s.io/api/apps/v1beta2.StatefulSetList": schema_k8sio_api_apps_v1beta2_StatefulSetList(ref), + "k8s.io/api/apps/v1beta2.StatefulSetSpec": schema_k8sio_api_apps_v1beta2_StatefulSetSpec(ref), + "k8s.io/api/apps/v1beta2.StatefulSetStatus": schema_k8sio_api_apps_v1beta2_StatefulSetStatus(ref), + "k8s.io/api/apps/v1beta2.StatefulSetUpdateStrategy": schema_k8sio_api_apps_v1beta2_StatefulSetUpdateStrategy(ref), + "k8s.io/api/authentication/v1.BoundObjectReference": schema_k8sio_api_authentication_v1_BoundObjectReference(ref), + "k8s.io/api/authentication/v1.TokenRequest": schema_k8sio_api_authentication_v1_TokenRequest(ref), + "k8s.io/api/authentication/v1.TokenRequestSpec": schema_k8sio_api_authentication_v1_TokenRequestSpec(ref), + "k8s.io/api/authentication/v1.TokenRequestStatus": schema_k8sio_api_authentication_v1_TokenRequestStatus(ref), + "k8s.io/api/authentication/v1.TokenReview": schema_k8sio_api_authentication_v1_TokenReview(ref), + "k8s.io/api/authentication/v1.TokenReviewSpec": schema_k8sio_api_authentication_v1_TokenReviewSpec(ref), + "k8s.io/api/authentication/v1.TokenReviewStatus": schema_k8sio_api_authentication_v1_TokenReviewStatus(ref), + "k8s.io/api/authentication/v1.UserInfo": schema_k8sio_api_authentication_v1_UserInfo(ref), + "k8s.io/api/authentication/v1beta1.TokenReview": schema_k8sio_api_authentication_v1beta1_TokenReview(ref), + "k8s.io/api/authentication/v1beta1.TokenReviewSpec": schema_k8sio_api_authentication_v1beta1_TokenReviewSpec(ref), + "k8s.io/api/authentication/v1beta1.TokenReviewStatus": schema_k8sio_api_authentication_v1beta1_TokenReviewStatus(ref), + "k8s.io/api/authentication/v1beta1.UserInfo": schema_k8sio_api_authentication_v1beta1_UserInfo(ref), + "k8s.io/api/authorization/v1.LocalSubjectAccessReview": schema_k8sio_api_authorization_v1_LocalSubjectAccessReview(ref), + "k8s.io/api/authorization/v1.NonResourceAttributes": schema_k8sio_api_authorization_v1_NonResourceAttributes(ref), + "k8s.io/api/authorization/v1.NonResourceRule": schema_k8sio_api_authorization_v1_NonResourceRule(ref), + "k8s.io/api/authorization/v1.ResourceAttributes": schema_k8sio_api_authorization_v1_ResourceAttributes(ref), + "k8s.io/api/authorization/v1.ResourceRule": schema_k8sio_api_authorization_v1_ResourceRule(ref), + "k8s.io/api/authorization/v1.SelfSubjectAccessReview": schema_k8sio_api_authorization_v1_SelfSubjectAccessReview(ref), + "k8s.io/api/authorization/v1.SelfSubjectAccessReviewSpec": schema_k8sio_api_authorization_v1_SelfSubjectAccessReviewSpec(ref), + "k8s.io/api/authorization/v1.SelfSubjectRulesReview": schema_k8sio_api_authorization_v1_SelfSubjectRulesReview(ref), + "k8s.io/api/authorization/v1.SelfSubjectRulesReviewSpec": schema_k8sio_api_authorization_v1_SelfSubjectRulesReviewSpec(ref), + "k8s.io/api/authorization/v1.SubjectAccessReview": schema_k8sio_api_authorization_v1_SubjectAccessReview(ref), + "k8s.io/api/authorization/v1.SubjectAccessReviewSpec": schema_k8sio_api_authorization_v1_SubjectAccessReviewSpec(ref), + "k8s.io/api/authorization/v1.SubjectAccessReviewStatus": schema_k8sio_api_authorization_v1_SubjectAccessReviewStatus(ref), + "k8s.io/api/authorization/v1.SubjectRulesReviewStatus": schema_k8sio_api_authorization_v1_SubjectRulesReviewStatus(ref), + "k8s.io/api/authorization/v1beta1.LocalSubjectAccessReview": schema_k8sio_api_authorization_v1beta1_LocalSubjectAccessReview(ref), + "k8s.io/api/authorization/v1beta1.NonResourceAttributes": schema_k8sio_api_authorization_v1beta1_NonResourceAttributes(ref), + "k8s.io/api/authorization/v1beta1.NonResourceRule": schema_k8sio_api_authorization_v1beta1_NonResourceRule(ref), + "k8s.io/api/authorization/v1beta1.ResourceAttributes": schema_k8sio_api_authorization_v1beta1_ResourceAttributes(ref), + "k8s.io/api/authorization/v1beta1.ResourceRule": schema_k8sio_api_authorization_v1beta1_ResourceRule(ref), + "k8s.io/api/authorization/v1beta1.SelfSubjectAccessReview": schema_k8sio_api_authorization_v1beta1_SelfSubjectAccessReview(ref), + "k8s.io/api/authorization/v1beta1.SelfSubjectAccessReviewSpec": schema_k8sio_api_authorization_v1beta1_SelfSubjectAccessReviewSpec(ref), + "k8s.io/api/authorization/v1beta1.SelfSubjectRulesReview": schema_k8sio_api_authorization_v1beta1_SelfSubjectRulesReview(ref), + "k8s.io/api/authorization/v1beta1.SelfSubjectRulesReviewSpec": schema_k8sio_api_authorization_v1beta1_SelfSubjectRulesReviewSpec(ref), + "k8s.io/api/authorization/v1beta1.SubjectAccessReview": schema_k8sio_api_authorization_v1beta1_SubjectAccessReview(ref), + "k8s.io/api/authorization/v1beta1.SubjectAccessReviewSpec": schema_k8sio_api_authorization_v1beta1_SubjectAccessReviewSpec(ref), + "k8s.io/api/authorization/v1beta1.SubjectAccessReviewStatus": schema_k8sio_api_authorization_v1beta1_SubjectAccessReviewStatus(ref), + "k8s.io/api/authorization/v1beta1.SubjectRulesReviewStatus": schema_k8sio_api_authorization_v1beta1_SubjectRulesReviewStatus(ref), + "k8s.io/api/autoscaling/v1.ContainerResourceMetricSource": schema_k8sio_api_autoscaling_v1_ContainerResourceMetricSource(ref), + "k8s.io/api/autoscaling/v1.ContainerResourceMetricStatus": schema_k8sio_api_autoscaling_v1_ContainerResourceMetricStatus(ref), + "k8s.io/api/autoscaling/v1.CrossVersionObjectReference": schema_k8sio_api_autoscaling_v1_CrossVersionObjectReference(ref), + "k8s.io/api/autoscaling/v1.ExternalMetricSource": schema_k8sio_api_autoscaling_v1_ExternalMetricSource(ref), + "k8s.io/api/autoscaling/v1.ExternalMetricStatus": schema_k8sio_api_autoscaling_v1_ExternalMetricStatus(ref), + "k8s.io/api/autoscaling/v1.HorizontalPodAutoscaler": schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscaler(ref), + "k8s.io/api/autoscaling/v1.HorizontalPodAutoscalerCondition": schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscalerCondition(ref), + "k8s.io/api/autoscaling/v1.HorizontalPodAutoscalerList": schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscalerList(ref), + "k8s.io/api/autoscaling/v1.HorizontalPodAutoscalerSpec": schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscalerSpec(ref), + "k8s.io/api/autoscaling/v1.HorizontalPodAutoscalerStatus": schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscalerStatus(ref), + "k8s.io/api/autoscaling/v1.MetricSpec": schema_k8sio_api_autoscaling_v1_MetricSpec(ref), + "k8s.io/api/autoscaling/v1.MetricStatus": schema_k8sio_api_autoscaling_v1_MetricStatus(ref), + "k8s.io/api/autoscaling/v1.ObjectMetricSource": schema_k8sio_api_autoscaling_v1_ObjectMetricSource(ref), + "k8s.io/api/autoscaling/v1.ObjectMetricStatus": schema_k8sio_api_autoscaling_v1_ObjectMetricStatus(ref), + "k8s.io/api/autoscaling/v1.PodsMetricSource": schema_k8sio_api_autoscaling_v1_PodsMetricSource(ref), + "k8s.io/api/autoscaling/v1.PodsMetricStatus": schema_k8sio_api_autoscaling_v1_PodsMetricStatus(ref), + "k8s.io/api/autoscaling/v1.ResourceMetricSource": schema_k8sio_api_autoscaling_v1_ResourceMetricSource(ref), + "k8s.io/api/autoscaling/v1.ResourceMetricStatus": schema_k8sio_api_autoscaling_v1_ResourceMetricStatus(ref), + "k8s.io/api/autoscaling/v1.Scale": schema_k8sio_api_autoscaling_v1_Scale(ref), + "k8s.io/api/autoscaling/v1.ScaleSpec": schema_k8sio_api_autoscaling_v1_ScaleSpec(ref), + "k8s.io/api/autoscaling/v1.ScaleStatus": schema_k8sio_api_autoscaling_v1_ScaleStatus(ref), + "k8s.io/api/autoscaling/v2beta1.ContainerResourceMetricSource": schema_k8sio_api_autoscaling_v2beta1_ContainerResourceMetricSource(ref), + "k8s.io/api/autoscaling/v2beta1.ContainerResourceMetricStatus": schema_k8sio_api_autoscaling_v2beta1_ContainerResourceMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta1.CrossVersionObjectReference": schema_k8sio_api_autoscaling_v2beta1_CrossVersionObjectReference(ref), + "k8s.io/api/autoscaling/v2beta1.ExternalMetricSource": schema_k8sio_api_autoscaling_v2beta1_ExternalMetricSource(ref), + "k8s.io/api/autoscaling/v2beta1.ExternalMetricStatus": schema_k8sio_api_autoscaling_v2beta1_ExternalMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscaler": schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscaler(ref), + "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerCondition": schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscalerCondition(ref), + "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerList": schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscalerList(ref), + "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerSpec": schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscalerSpec(ref), + "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerStatus": schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscalerStatus(ref), + "k8s.io/api/autoscaling/v2beta1.MetricSpec": schema_k8sio_api_autoscaling_v2beta1_MetricSpec(ref), + "k8s.io/api/autoscaling/v2beta1.MetricStatus": schema_k8sio_api_autoscaling_v2beta1_MetricStatus(ref), + "k8s.io/api/autoscaling/v2beta1.ObjectMetricSource": schema_k8sio_api_autoscaling_v2beta1_ObjectMetricSource(ref), + "k8s.io/api/autoscaling/v2beta1.ObjectMetricStatus": schema_k8sio_api_autoscaling_v2beta1_ObjectMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta1.PodsMetricSource": schema_k8sio_api_autoscaling_v2beta1_PodsMetricSource(ref), + "k8s.io/api/autoscaling/v2beta1.PodsMetricStatus": schema_k8sio_api_autoscaling_v2beta1_PodsMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta1.ResourceMetricSource": schema_k8sio_api_autoscaling_v2beta1_ResourceMetricSource(ref), + "k8s.io/api/autoscaling/v2beta1.ResourceMetricStatus": schema_k8sio_api_autoscaling_v2beta1_ResourceMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta2.ContainerResourceMetricSource": schema_k8sio_api_autoscaling_v2beta2_ContainerResourceMetricSource(ref), + "k8s.io/api/autoscaling/v2beta2.ContainerResourceMetricStatus": schema_k8sio_api_autoscaling_v2beta2_ContainerResourceMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta2.CrossVersionObjectReference": schema_k8sio_api_autoscaling_v2beta2_CrossVersionObjectReference(ref), + "k8s.io/api/autoscaling/v2beta2.ExternalMetricSource": schema_k8sio_api_autoscaling_v2beta2_ExternalMetricSource(ref), + "k8s.io/api/autoscaling/v2beta2.ExternalMetricStatus": schema_k8sio_api_autoscaling_v2beta2_ExternalMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta2.HPAScalingPolicy": schema_k8sio_api_autoscaling_v2beta2_HPAScalingPolicy(ref), + "k8s.io/api/autoscaling/v2beta2.HPAScalingRules": schema_k8sio_api_autoscaling_v2beta2_HPAScalingRules(ref), + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscaler": schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscaler(ref), + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerBehavior": schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerBehavior(ref), + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerCondition": schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerCondition(ref), + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerList": schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerList(ref), + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerSpec": schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerSpec(ref), + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerStatus": schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerStatus(ref), + "k8s.io/api/autoscaling/v2beta2.MetricIdentifier": schema_k8sio_api_autoscaling_v2beta2_MetricIdentifier(ref), + "k8s.io/api/autoscaling/v2beta2.MetricSpec": schema_k8sio_api_autoscaling_v2beta2_MetricSpec(ref), + "k8s.io/api/autoscaling/v2beta2.MetricStatus": schema_k8sio_api_autoscaling_v2beta2_MetricStatus(ref), + "k8s.io/api/autoscaling/v2beta2.MetricTarget": schema_k8sio_api_autoscaling_v2beta2_MetricTarget(ref), + "k8s.io/api/autoscaling/v2beta2.MetricValueStatus": schema_k8sio_api_autoscaling_v2beta2_MetricValueStatus(ref), + "k8s.io/api/autoscaling/v2beta2.ObjectMetricSource": schema_k8sio_api_autoscaling_v2beta2_ObjectMetricSource(ref), + "k8s.io/api/autoscaling/v2beta2.ObjectMetricStatus": schema_k8sio_api_autoscaling_v2beta2_ObjectMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta2.PodsMetricSource": schema_k8sio_api_autoscaling_v2beta2_PodsMetricSource(ref), + "k8s.io/api/autoscaling/v2beta2.PodsMetricStatus": schema_k8sio_api_autoscaling_v2beta2_PodsMetricStatus(ref), + "k8s.io/api/autoscaling/v2beta2.ResourceMetricSource": schema_k8sio_api_autoscaling_v2beta2_ResourceMetricSource(ref), + "k8s.io/api/autoscaling/v2beta2.ResourceMetricStatus": schema_k8sio_api_autoscaling_v2beta2_ResourceMetricStatus(ref), + "k8s.io/api/batch/v1.Job": schema_k8sio_api_batch_v1_Job(ref), + "k8s.io/api/batch/v1.JobCondition": schema_k8sio_api_batch_v1_JobCondition(ref), + "k8s.io/api/batch/v1.JobList": schema_k8sio_api_batch_v1_JobList(ref), + "k8s.io/api/batch/v1.JobSpec": schema_k8sio_api_batch_v1_JobSpec(ref), + "k8s.io/api/batch/v1.JobStatus": schema_k8sio_api_batch_v1_JobStatus(ref), + "k8s.io/api/batch/v1beta1.CronJob": schema_k8sio_api_batch_v1beta1_CronJob(ref), + "k8s.io/api/batch/v1beta1.CronJobList": schema_k8sio_api_batch_v1beta1_CronJobList(ref), + "k8s.io/api/batch/v1beta1.CronJobSpec": schema_k8sio_api_batch_v1beta1_CronJobSpec(ref), + "k8s.io/api/batch/v1beta1.CronJobStatus": schema_k8sio_api_batch_v1beta1_CronJobStatus(ref), + "k8s.io/api/batch/v1beta1.JobTemplate": schema_k8sio_api_batch_v1beta1_JobTemplate(ref), + "k8s.io/api/batch/v1beta1.JobTemplateSpec": schema_k8sio_api_batch_v1beta1_JobTemplateSpec(ref), + "k8s.io/api/batch/v2alpha1.CronJob": schema_k8sio_api_batch_v2alpha1_CronJob(ref), + "k8s.io/api/batch/v2alpha1.CronJobList": schema_k8sio_api_batch_v2alpha1_CronJobList(ref), + "k8s.io/api/batch/v2alpha1.CronJobSpec": schema_k8sio_api_batch_v2alpha1_CronJobSpec(ref), + "k8s.io/api/batch/v2alpha1.CronJobStatus": schema_k8sio_api_batch_v2alpha1_CronJobStatus(ref), + "k8s.io/api/batch/v2alpha1.JobTemplate": schema_k8sio_api_batch_v2alpha1_JobTemplate(ref), + "k8s.io/api/batch/v2alpha1.JobTemplateSpec": schema_k8sio_api_batch_v2alpha1_JobTemplateSpec(ref), + "k8s.io/api/certificates/v1.CertificateSigningRequest": schema_k8sio_api_certificates_v1_CertificateSigningRequest(ref), + "k8s.io/api/certificates/v1.CertificateSigningRequestCondition": schema_k8sio_api_certificates_v1_CertificateSigningRequestCondition(ref), + "k8s.io/api/certificates/v1.CertificateSigningRequestList": schema_k8sio_api_certificates_v1_CertificateSigningRequestList(ref), + "k8s.io/api/certificates/v1.CertificateSigningRequestSpec": schema_k8sio_api_certificates_v1_CertificateSigningRequestSpec(ref), + "k8s.io/api/certificates/v1.CertificateSigningRequestStatus": schema_k8sio_api_certificates_v1_CertificateSigningRequestStatus(ref), + "k8s.io/api/certificates/v1beta1.CertificateSigningRequest": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequest(ref), + "k8s.io/api/certificates/v1beta1.CertificateSigningRequestCondition": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestCondition(ref), + "k8s.io/api/certificates/v1beta1.CertificateSigningRequestList": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestList(ref), + "k8s.io/api/certificates/v1beta1.CertificateSigningRequestSpec": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestSpec(ref), + "k8s.io/api/certificates/v1beta1.CertificateSigningRequestStatus": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestStatus(ref), + "k8s.io/api/coordination/v1.Lease": schema_k8sio_api_coordination_v1_Lease(ref), + "k8s.io/api/coordination/v1.LeaseList": schema_k8sio_api_coordination_v1_LeaseList(ref), + "k8s.io/api/coordination/v1.LeaseSpec": schema_k8sio_api_coordination_v1_LeaseSpec(ref), + "k8s.io/api/coordination/v1beta1.Lease": schema_k8sio_api_coordination_v1beta1_Lease(ref), + "k8s.io/api/coordination/v1beta1.LeaseList": schema_k8sio_api_coordination_v1beta1_LeaseList(ref), + "k8s.io/api/coordination/v1beta1.LeaseSpec": schema_k8sio_api_coordination_v1beta1_LeaseSpec(ref), + "k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource": schema_k8sio_api_core_v1_AWSElasticBlockStoreVolumeSource(ref), + "k8s.io/api/core/v1.Affinity": schema_k8sio_api_core_v1_Affinity(ref), + "k8s.io/api/core/v1.AttachedVolume": schema_k8sio_api_core_v1_AttachedVolume(ref), + "k8s.io/api/core/v1.AvoidPods": schema_k8sio_api_core_v1_AvoidPods(ref), + "k8s.io/api/core/v1.AzureDiskVolumeSource": schema_k8sio_api_core_v1_AzureDiskVolumeSource(ref), + "k8s.io/api/core/v1.AzureFilePersistentVolumeSource": schema_k8sio_api_core_v1_AzureFilePersistentVolumeSource(ref), + "k8s.io/api/core/v1.AzureFileVolumeSource": schema_k8sio_api_core_v1_AzureFileVolumeSource(ref), + "k8s.io/api/core/v1.Binding": schema_k8sio_api_core_v1_Binding(ref), + "k8s.io/api/core/v1.CSIPersistentVolumeSource": schema_k8sio_api_core_v1_CSIPersistentVolumeSource(ref), + "k8s.io/api/core/v1.CSIVolumeSource": schema_k8sio_api_core_v1_CSIVolumeSource(ref), + "k8s.io/api/core/v1.Capabilities": schema_k8sio_api_core_v1_Capabilities(ref), + "k8s.io/api/core/v1.CephFSPersistentVolumeSource": schema_k8sio_api_core_v1_CephFSPersistentVolumeSource(ref), + "k8s.io/api/core/v1.CephFSVolumeSource": schema_k8sio_api_core_v1_CephFSVolumeSource(ref), + "k8s.io/api/core/v1.CinderPersistentVolumeSource": schema_k8sio_api_core_v1_CinderPersistentVolumeSource(ref), + "k8s.io/api/core/v1.CinderVolumeSource": schema_k8sio_api_core_v1_CinderVolumeSource(ref), + "k8s.io/api/core/v1.ClientIPConfig": schema_k8sio_api_core_v1_ClientIPConfig(ref), + "k8s.io/api/core/v1.ComponentCondition": schema_k8sio_api_core_v1_ComponentCondition(ref), + "k8s.io/api/core/v1.ComponentStatus": schema_k8sio_api_core_v1_ComponentStatus(ref), + "k8s.io/api/core/v1.ComponentStatusList": schema_k8sio_api_core_v1_ComponentStatusList(ref), + "k8s.io/api/core/v1.ConfigMap": schema_k8sio_api_core_v1_ConfigMap(ref), + "k8s.io/api/core/v1.ConfigMapEnvSource": schema_k8sio_api_core_v1_ConfigMapEnvSource(ref), + "k8s.io/api/core/v1.ConfigMapKeySelector": schema_k8sio_api_core_v1_ConfigMapKeySelector(ref), + "k8s.io/api/core/v1.ConfigMapList": schema_k8sio_api_core_v1_ConfigMapList(ref), + "k8s.io/api/core/v1.ConfigMapNodeConfigSource": schema_k8sio_api_core_v1_ConfigMapNodeConfigSource(ref), + "k8s.io/api/core/v1.ConfigMapProjection": schema_k8sio_api_core_v1_ConfigMapProjection(ref), + "k8s.io/api/core/v1.ConfigMapVolumeSource": schema_k8sio_api_core_v1_ConfigMapVolumeSource(ref), + "k8s.io/api/core/v1.Container": schema_k8sio_api_core_v1_Container(ref), + "k8s.io/api/core/v1.ContainerImage": schema_k8sio_api_core_v1_ContainerImage(ref), + "k8s.io/api/core/v1.ContainerPort": schema_k8sio_api_core_v1_ContainerPort(ref), + "k8s.io/api/core/v1.ContainerState": schema_k8sio_api_core_v1_ContainerState(ref), + "k8s.io/api/core/v1.ContainerStateRunning": schema_k8sio_api_core_v1_ContainerStateRunning(ref), + "k8s.io/api/core/v1.ContainerStateTerminated": schema_k8sio_api_core_v1_ContainerStateTerminated(ref), + "k8s.io/api/core/v1.ContainerStateWaiting": schema_k8sio_api_core_v1_ContainerStateWaiting(ref), + "k8s.io/api/core/v1.ContainerStatus": schema_k8sio_api_core_v1_ContainerStatus(ref), + "k8s.io/api/core/v1.DaemonEndpoint": schema_k8sio_api_core_v1_DaemonEndpoint(ref), + "k8s.io/api/core/v1.DownwardAPIProjection": schema_k8sio_api_core_v1_DownwardAPIProjection(ref), + "k8s.io/api/core/v1.DownwardAPIVolumeFile": schema_k8sio_api_core_v1_DownwardAPIVolumeFile(ref), + "k8s.io/api/core/v1.DownwardAPIVolumeSource": schema_k8sio_api_core_v1_DownwardAPIVolumeSource(ref), + "k8s.io/api/core/v1.EmptyDirVolumeSource": schema_k8sio_api_core_v1_EmptyDirVolumeSource(ref), + "k8s.io/api/core/v1.EndpointAddress": schema_k8sio_api_core_v1_EndpointAddress(ref), + "k8s.io/api/core/v1.EndpointPort": schema_k8sio_api_core_v1_EndpointPort(ref), + "k8s.io/api/core/v1.EndpointSubset": schema_k8sio_api_core_v1_EndpointSubset(ref), + "k8s.io/api/core/v1.Endpoints": schema_k8sio_api_core_v1_Endpoints(ref), + "k8s.io/api/core/v1.EndpointsList": schema_k8sio_api_core_v1_EndpointsList(ref), + "k8s.io/api/core/v1.EnvFromSource": schema_k8sio_api_core_v1_EnvFromSource(ref), + "k8s.io/api/core/v1.EnvVar": schema_k8sio_api_core_v1_EnvVar(ref), + "k8s.io/api/core/v1.EnvVarSource": schema_k8sio_api_core_v1_EnvVarSource(ref), + "k8s.io/api/core/v1.EphemeralContainer": schema_k8sio_api_core_v1_EphemeralContainer(ref), + "k8s.io/api/core/v1.EphemeralContainerCommon": schema_k8sio_api_core_v1_EphemeralContainerCommon(ref), + "k8s.io/api/core/v1.EphemeralContainers": schema_k8sio_api_core_v1_EphemeralContainers(ref), + "k8s.io/api/core/v1.EphemeralVolumeSource": schema_k8sio_api_core_v1_EphemeralVolumeSource(ref), + "k8s.io/api/core/v1.Event": schema_k8sio_api_core_v1_Event(ref), + "k8s.io/api/core/v1.EventList": schema_k8sio_api_core_v1_EventList(ref), + "k8s.io/api/core/v1.EventSeries": schema_k8sio_api_core_v1_EventSeries(ref), + "k8s.io/api/core/v1.EventSource": schema_k8sio_api_core_v1_EventSource(ref), + "k8s.io/api/core/v1.ExecAction": schema_k8sio_api_core_v1_ExecAction(ref), + "k8s.io/api/core/v1.FCVolumeSource": schema_k8sio_api_core_v1_FCVolumeSource(ref), + "k8s.io/api/core/v1.FlexPersistentVolumeSource": schema_k8sio_api_core_v1_FlexPersistentVolumeSource(ref), + "k8s.io/api/core/v1.FlexVolumeSource": schema_k8sio_api_core_v1_FlexVolumeSource(ref), + "k8s.io/api/core/v1.FlockerVolumeSource": schema_k8sio_api_core_v1_FlockerVolumeSource(ref), + "k8s.io/api/core/v1.GCEPersistentDiskVolumeSource": schema_k8sio_api_core_v1_GCEPersistentDiskVolumeSource(ref), + "k8s.io/api/core/v1.GitRepoVolumeSource": schema_k8sio_api_core_v1_GitRepoVolumeSource(ref), + "k8s.io/api/core/v1.GlusterfsPersistentVolumeSource": schema_k8sio_api_core_v1_GlusterfsPersistentVolumeSource(ref), + "k8s.io/api/core/v1.GlusterfsVolumeSource": schema_k8sio_api_core_v1_GlusterfsVolumeSource(ref), + "k8s.io/api/core/v1.HTTPGetAction": schema_k8sio_api_core_v1_HTTPGetAction(ref), + "k8s.io/api/core/v1.HTTPHeader": schema_k8sio_api_core_v1_HTTPHeader(ref), + "k8s.io/api/core/v1.Handler": schema_k8sio_api_core_v1_Handler(ref), + "k8s.io/api/core/v1.HostAlias": schema_k8sio_api_core_v1_HostAlias(ref), + "k8s.io/api/core/v1.HostPathVolumeSource": schema_k8sio_api_core_v1_HostPathVolumeSource(ref), + "k8s.io/api/core/v1.ISCSIPersistentVolumeSource": schema_k8sio_api_core_v1_ISCSIPersistentVolumeSource(ref), + "k8s.io/api/core/v1.ISCSIVolumeSource": schema_k8sio_api_core_v1_ISCSIVolumeSource(ref), + "k8s.io/api/core/v1.KeyToPath": schema_k8sio_api_core_v1_KeyToPath(ref), + "k8s.io/api/core/v1.Lifecycle": schema_k8sio_api_core_v1_Lifecycle(ref), + "k8s.io/api/core/v1.LimitRange": schema_k8sio_api_core_v1_LimitRange(ref), + "k8s.io/api/core/v1.LimitRangeItem": schema_k8sio_api_core_v1_LimitRangeItem(ref), + "k8s.io/api/core/v1.LimitRangeList": schema_k8sio_api_core_v1_LimitRangeList(ref), + "k8s.io/api/core/v1.LimitRangeSpec": schema_k8sio_api_core_v1_LimitRangeSpec(ref), + "k8s.io/api/core/v1.List": schema_k8sio_api_core_v1_List(ref), + "k8s.io/api/core/v1.LoadBalancerIngress": schema_k8sio_api_core_v1_LoadBalancerIngress(ref), + "k8s.io/api/core/v1.LoadBalancerStatus": schema_k8sio_api_core_v1_LoadBalancerStatus(ref), + "k8s.io/api/core/v1.LocalObjectReference": schema_k8sio_api_core_v1_LocalObjectReference(ref), + "k8s.io/api/core/v1.LocalVolumeSource": schema_k8sio_api_core_v1_LocalVolumeSource(ref), + "k8s.io/api/core/v1.NFSVolumeSource": schema_k8sio_api_core_v1_NFSVolumeSource(ref), + "k8s.io/api/core/v1.Namespace": schema_k8sio_api_core_v1_Namespace(ref), + "k8s.io/api/core/v1.NamespaceCondition": schema_k8sio_api_core_v1_NamespaceCondition(ref), + "k8s.io/api/core/v1.NamespaceList": schema_k8sio_api_core_v1_NamespaceList(ref), + "k8s.io/api/core/v1.NamespaceSpec": schema_k8sio_api_core_v1_NamespaceSpec(ref), + "k8s.io/api/core/v1.NamespaceStatus": schema_k8sio_api_core_v1_NamespaceStatus(ref), + "k8s.io/api/core/v1.Node": schema_k8sio_api_core_v1_Node(ref), + "k8s.io/api/core/v1.NodeAddress": schema_k8sio_api_core_v1_NodeAddress(ref), + "k8s.io/api/core/v1.NodeAffinity": schema_k8sio_api_core_v1_NodeAffinity(ref), + "k8s.io/api/core/v1.NodeCondition": schema_k8sio_api_core_v1_NodeCondition(ref), + "k8s.io/api/core/v1.NodeConfigSource": schema_k8sio_api_core_v1_NodeConfigSource(ref), + "k8s.io/api/core/v1.NodeConfigStatus": schema_k8sio_api_core_v1_NodeConfigStatus(ref), + "k8s.io/api/core/v1.NodeDaemonEndpoints": schema_k8sio_api_core_v1_NodeDaemonEndpoints(ref), + "k8s.io/api/core/v1.NodeList": schema_k8sio_api_core_v1_NodeList(ref), + "k8s.io/api/core/v1.NodeProxyOptions": schema_k8sio_api_core_v1_NodeProxyOptions(ref), + "k8s.io/api/core/v1.NodeResources": schema_k8sio_api_core_v1_NodeResources(ref), + "k8s.io/api/core/v1.NodeSelector": schema_k8sio_api_core_v1_NodeSelector(ref), + "k8s.io/api/core/v1.NodeSelectorRequirement": schema_k8sio_api_core_v1_NodeSelectorRequirement(ref), + "k8s.io/api/core/v1.NodeSelectorTerm": schema_k8sio_api_core_v1_NodeSelectorTerm(ref), + "k8s.io/api/core/v1.NodeSpec": schema_k8sio_api_core_v1_NodeSpec(ref), + "k8s.io/api/core/v1.NodeStatus": schema_k8sio_api_core_v1_NodeStatus(ref), + "k8s.io/api/core/v1.NodeSystemInfo": schema_k8sio_api_core_v1_NodeSystemInfo(ref), + "k8s.io/api/core/v1.ObjectFieldSelector": schema_k8sio_api_core_v1_ObjectFieldSelector(ref), + "k8s.io/api/core/v1.ObjectReference": schema_k8sio_api_core_v1_ObjectReference(ref), + "k8s.io/api/core/v1.PersistentVolume": schema_k8sio_api_core_v1_PersistentVolume(ref), + "k8s.io/api/core/v1.PersistentVolumeClaim": schema_k8sio_api_core_v1_PersistentVolumeClaim(ref), + "k8s.io/api/core/v1.PersistentVolumeClaimCondition": schema_k8sio_api_core_v1_PersistentVolumeClaimCondition(ref), + "k8s.io/api/core/v1.PersistentVolumeClaimList": schema_k8sio_api_core_v1_PersistentVolumeClaimList(ref), + "k8s.io/api/core/v1.PersistentVolumeClaimSpec": schema_k8sio_api_core_v1_PersistentVolumeClaimSpec(ref), + "k8s.io/api/core/v1.PersistentVolumeClaimStatus": schema_k8sio_api_core_v1_PersistentVolumeClaimStatus(ref), + "k8s.io/api/core/v1.PersistentVolumeClaimTemplate": schema_k8sio_api_core_v1_PersistentVolumeClaimTemplate(ref), + "k8s.io/api/core/v1.PersistentVolumeClaimVolumeSource": schema_k8sio_api_core_v1_PersistentVolumeClaimVolumeSource(ref), + "k8s.io/api/core/v1.PersistentVolumeList": schema_k8sio_api_core_v1_PersistentVolumeList(ref), + "k8s.io/api/core/v1.PersistentVolumeSource": schema_k8sio_api_core_v1_PersistentVolumeSource(ref), + "k8s.io/api/core/v1.PersistentVolumeSpec": schema_k8sio_api_core_v1_PersistentVolumeSpec(ref), + "k8s.io/api/core/v1.PersistentVolumeStatus": schema_k8sio_api_core_v1_PersistentVolumeStatus(ref), + "k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource": schema_k8sio_api_core_v1_PhotonPersistentDiskVolumeSource(ref), + "k8s.io/api/core/v1.Pod": schema_k8sio_api_core_v1_Pod(ref), + "k8s.io/api/core/v1.PodAffinity": schema_k8sio_api_core_v1_PodAffinity(ref), + "k8s.io/api/core/v1.PodAffinityTerm": schema_k8sio_api_core_v1_PodAffinityTerm(ref), + "k8s.io/api/core/v1.PodAntiAffinity": schema_k8sio_api_core_v1_PodAntiAffinity(ref), + "k8s.io/api/core/v1.PodAttachOptions": schema_k8sio_api_core_v1_PodAttachOptions(ref), + "k8s.io/api/core/v1.PodCondition": schema_k8sio_api_core_v1_PodCondition(ref), + "k8s.io/api/core/v1.PodDNSConfig": schema_k8sio_api_core_v1_PodDNSConfig(ref), + "k8s.io/api/core/v1.PodDNSConfigOption": schema_k8sio_api_core_v1_PodDNSConfigOption(ref), + "k8s.io/api/core/v1.PodExecOptions": schema_k8sio_api_core_v1_PodExecOptions(ref), + "k8s.io/api/core/v1.PodIP": schema_k8sio_api_core_v1_PodIP(ref), + "k8s.io/api/core/v1.PodList": schema_k8sio_api_core_v1_PodList(ref), + "k8s.io/api/core/v1.PodLogOptions": schema_k8sio_api_core_v1_PodLogOptions(ref), + "k8s.io/api/core/v1.PodPortForwardOptions": schema_k8sio_api_core_v1_PodPortForwardOptions(ref), + "k8s.io/api/core/v1.PodProxyOptions": schema_k8sio_api_core_v1_PodProxyOptions(ref), + "k8s.io/api/core/v1.PodReadinessGate": schema_k8sio_api_core_v1_PodReadinessGate(ref), + "k8s.io/api/core/v1.PodSecurityContext": schema_k8sio_api_core_v1_PodSecurityContext(ref), + "k8s.io/api/core/v1.PodSignature": schema_k8sio_api_core_v1_PodSignature(ref), + "k8s.io/api/core/v1.PodSpec": schema_k8sio_api_core_v1_PodSpec(ref), + "k8s.io/api/core/v1.PodStatus": schema_k8sio_api_core_v1_PodStatus(ref), + "k8s.io/api/core/v1.PodStatusResult": schema_k8sio_api_core_v1_PodStatusResult(ref), + "k8s.io/api/core/v1.PodTemplate": schema_k8sio_api_core_v1_PodTemplate(ref), + "k8s.io/api/core/v1.PodTemplateList": schema_k8sio_api_core_v1_PodTemplateList(ref), + "k8s.io/api/core/v1.PodTemplateSpec": schema_k8sio_api_core_v1_PodTemplateSpec(ref), + "k8s.io/api/core/v1.PortStatus": schema_k8sio_api_core_v1_PortStatus(ref), + "k8s.io/api/core/v1.PortworxVolumeSource": schema_k8sio_api_core_v1_PortworxVolumeSource(ref), + "k8s.io/api/core/v1.PreferAvoidPodsEntry": schema_k8sio_api_core_v1_PreferAvoidPodsEntry(ref), + "k8s.io/api/core/v1.PreferredSchedulingTerm": schema_k8sio_api_core_v1_PreferredSchedulingTerm(ref), + "k8s.io/api/core/v1.Probe": schema_k8sio_api_core_v1_Probe(ref), + "k8s.io/api/core/v1.ProjectedVolumeSource": schema_k8sio_api_core_v1_ProjectedVolumeSource(ref), + "k8s.io/api/core/v1.QuobyteVolumeSource": schema_k8sio_api_core_v1_QuobyteVolumeSource(ref), + "k8s.io/api/core/v1.RBDPersistentVolumeSource": schema_k8sio_api_core_v1_RBDPersistentVolumeSource(ref), + "k8s.io/api/core/v1.RBDVolumeSource": schema_k8sio_api_core_v1_RBDVolumeSource(ref), + "k8s.io/api/core/v1.RangeAllocation": schema_k8sio_api_core_v1_RangeAllocation(ref), + "k8s.io/api/core/v1.ReplicationController": schema_k8sio_api_core_v1_ReplicationController(ref), + "k8s.io/api/core/v1.ReplicationControllerCondition": schema_k8sio_api_core_v1_ReplicationControllerCondition(ref), + "k8s.io/api/core/v1.ReplicationControllerList": schema_k8sio_api_core_v1_ReplicationControllerList(ref), + "k8s.io/api/core/v1.ReplicationControllerSpec": schema_k8sio_api_core_v1_ReplicationControllerSpec(ref), + "k8s.io/api/core/v1.ReplicationControllerStatus": schema_k8sio_api_core_v1_ReplicationControllerStatus(ref), + "k8s.io/api/core/v1.ResourceFieldSelector": schema_k8sio_api_core_v1_ResourceFieldSelector(ref), + "k8s.io/api/core/v1.ResourceQuota": schema_k8sio_api_core_v1_ResourceQuota(ref), + "k8s.io/api/core/v1.ResourceQuotaList": schema_k8sio_api_core_v1_ResourceQuotaList(ref), + "k8s.io/api/core/v1.ResourceQuotaSpec": schema_k8sio_api_core_v1_ResourceQuotaSpec(ref), + "k8s.io/api/core/v1.ResourceQuotaStatus": schema_k8sio_api_core_v1_ResourceQuotaStatus(ref), + "k8s.io/api/core/v1.ResourceRequirements": schema_k8sio_api_core_v1_ResourceRequirements(ref), + "k8s.io/api/core/v1.SELinuxOptions": schema_k8sio_api_core_v1_SELinuxOptions(ref), + "k8s.io/api/core/v1.ScaleIOPersistentVolumeSource": schema_k8sio_api_core_v1_ScaleIOPersistentVolumeSource(ref), + "k8s.io/api/core/v1.ScaleIOVolumeSource": schema_k8sio_api_core_v1_ScaleIOVolumeSource(ref), + "k8s.io/api/core/v1.ScopeSelector": schema_k8sio_api_core_v1_ScopeSelector(ref), + "k8s.io/api/core/v1.ScopedResourceSelectorRequirement": schema_k8sio_api_core_v1_ScopedResourceSelectorRequirement(ref), + "k8s.io/api/core/v1.SeccompProfile": schema_k8sio_api_core_v1_SeccompProfile(ref), + "k8s.io/api/core/v1.Secret": schema_k8sio_api_core_v1_Secret(ref), + "k8s.io/api/core/v1.SecretEnvSource": schema_k8sio_api_core_v1_SecretEnvSource(ref), + "k8s.io/api/core/v1.SecretKeySelector": schema_k8sio_api_core_v1_SecretKeySelector(ref), + "k8s.io/api/core/v1.SecretList": schema_k8sio_api_core_v1_SecretList(ref), + "k8s.io/api/core/v1.SecretProjection": schema_k8sio_api_core_v1_SecretProjection(ref), + "k8s.io/api/core/v1.SecretReference": schema_k8sio_api_core_v1_SecretReference(ref), + "k8s.io/api/core/v1.SecretVolumeSource": schema_k8sio_api_core_v1_SecretVolumeSource(ref), + "k8s.io/api/core/v1.SecurityContext": schema_k8sio_api_core_v1_SecurityContext(ref), + "k8s.io/api/core/v1.SerializedReference": schema_k8sio_api_core_v1_SerializedReference(ref), + "k8s.io/api/core/v1.Service": schema_k8sio_api_core_v1_Service(ref), + "k8s.io/api/core/v1.ServiceAccount": schema_k8sio_api_core_v1_ServiceAccount(ref), + "k8s.io/api/core/v1.ServiceAccountList": schema_k8sio_api_core_v1_ServiceAccountList(ref), + "k8s.io/api/core/v1.ServiceAccountTokenProjection": schema_k8sio_api_core_v1_ServiceAccountTokenProjection(ref), + "k8s.io/api/core/v1.ServiceList": schema_k8sio_api_core_v1_ServiceList(ref), + "k8s.io/api/core/v1.ServicePort": schema_k8sio_api_core_v1_ServicePort(ref), + "k8s.io/api/core/v1.ServiceProxyOptions": schema_k8sio_api_core_v1_ServiceProxyOptions(ref), + "k8s.io/api/core/v1.ServiceSpec": schema_k8sio_api_core_v1_ServiceSpec(ref), + "k8s.io/api/core/v1.ServiceStatus": schema_k8sio_api_core_v1_ServiceStatus(ref), + "k8s.io/api/core/v1.SessionAffinityConfig": schema_k8sio_api_core_v1_SessionAffinityConfig(ref), + "k8s.io/api/core/v1.StorageOSPersistentVolumeSource": schema_k8sio_api_core_v1_StorageOSPersistentVolumeSource(ref), + "k8s.io/api/core/v1.StorageOSVolumeSource": schema_k8sio_api_core_v1_StorageOSVolumeSource(ref), + "k8s.io/api/core/v1.Sysctl": schema_k8sio_api_core_v1_Sysctl(ref), + "k8s.io/api/core/v1.TCPSocketAction": schema_k8sio_api_core_v1_TCPSocketAction(ref), + "k8s.io/api/core/v1.Taint": schema_k8sio_api_core_v1_Taint(ref), + "k8s.io/api/core/v1.Toleration": schema_k8sio_api_core_v1_Toleration(ref), + "k8s.io/api/core/v1.TopologySelectorLabelRequirement": schema_k8sio_api_core_v1_TopologySelectorLabelRequirement(ref), + "k8s.io/api/core/v1.TopologySelectorTerm": schema_k8sio_api_core_v1_TopologySelectorTerm(ref), + "k8s.io/api/core/v1.TopologySpreadConstraint": schema_k8sio_api_core_v1_TopologySpreadConstraint(ref), + "k8s.io/api/core/v1.TypedLocalObjectReference": schema_k8sio_api_core_v1_TypedLocalObjectReference(ref), + "k8s.io/api/core/v1.Volume": schema_k8sio_api_core_v1_Volume(ref), + "k8s.io/api/core/v1.VolumeDevice": schema_k8sio_api_core_v1_VolumeDevice(ref), + "k8s.io/api/core/v1.VolumeMount": schema_k8sio_api_core_v1_VolumeMount(ref), + "k8s.io/api/core/v1.VolumeNodeAffinity": schema_k8sio_api_core_v1_VolumeNodeAffinity(ref), + "k8s.io/api/core/v1.VolumeProjection": schema_k8sio_api_core_v1_VolumeProjection(ref), + "k8s.io/api/core/v1.VolumeSource": schema_k8sio_api_core_v1_VolumeSource(ref), + "k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource": schema_k8sio_api_core_v1_VsphereVirtualDiskVolumeSource(ref), + "k8s.io/api/core/v1.WeightedPodAffinityTerm": schema_k8sio_api_core_v1_WeightedPodAffinityTerm(ref), + "k8s.io/api/core/v1.WindowsSecurityContextOptions": schema_k8sio_api_core_v1_WindowsSecurityContextOptions(ref), + "k8s.io/api/discovery/v1alpha1.Endpoint": schema_k8sio_api_discovery_v1alpha1_Endpoint(ref), + "k8s.io/api/discovery/v1alpha1.EndpointConditions": schema_k8sio_api_discovery_v1alpha1_EndpointConditions(ref), + "k8s.io/api/discovery/v1alpha1.EndpointPort": schema_k8sio_api_discovery_v1alpha1_EndpointPort(ref), + "k8s.io/api/discovery/v1alpha1.EndpointSlice": schema_k8sio_api_discovery_v1alpha1_EndpointSlice(ref), + "k8s.io/api/discovery/v1alpha1.EndpointSliceList": schema_k8sio_api_discovery_v1alpha1_EndpointSliceList(ref), + "k8s.io/api/discovery/v1beta1.Endpoint": schema_k8sio_api_discovery_v1beta1_Endpoint(ref), + "k8s.io/api/discovery/v1beta1.EndpointConditions": schema_k8sio_api_discovery_v1beta1_EndpointConditions(ref), + "k8s.io/api/discovery/v1beta1.EndpointPort": schema_k8sio_api_discovery_v1beta1_EndpointPort(ref), + "k8s.io/api/discovery/v1beta1.EndpointSlice": schema_k8sio_api_discovery_v1beta1_EndpointSlice(ref), + "k8s.io/api/discovery/v1beta1.EndpointSliceList": schema_k8sio_api_discovery_v1beta1_EndpointSliceList(ref), + "k8s.io/api/events/v1.Event": schema_k8sio_api_events_v1_Event(ref), + "k8s.io/api/events/v1.EventList": schema_k8sio_api_events_v1_EventList(ref), + "k8s.io/api/events/v1.EventSeries": schema_k8sio_api_events_v1_EventSeries(ref), + "k8s.io/api/events/v1beta1.Event": schema_k8sio_api_events_v1beta1_Event(ref), + "k8s.io/api/events/v1beta1.EventList": schema_k8sio_api_events_v1beta1_EventList(ref), + "k8s.io/api/events/v1beta1.EventSeries": schema_k8sio_api_events_v1beta1_EventSeries(ref), + "k8s.io/api/extensions/v1beta1.AllowedCSIDriver": schema_k8sio_api_extensions_v1beta1_AllowedCSIDriver(ref), + "k8s.io/api/extensions/v1beta1.AllowedFlexVolume": schema_k8sio_api_extensions_v1beta1_AllowedFlexVolume(ref), + "k8s.io/api/extensions/v1beta1.AllowedHostPath": schema_k8sio_api_extensions_v1beta1_AllowedHostPath(ref), + "k8s.io/api/extensions/v1beta1.DaemonSet": schema_k8sio_api_extensions_v1beta1_DaemonSet(ref), + "k8s.io/api/extensions/v1beta1.DaemonSetCondition": schema_k8sio_api_extensions_v1beta1_DaemonSetCondition(ref), + "k8s.io/api/extensions/v1beta1.DaemonSetList": schema_k8sio_api_extensions_v1beta1_DaemonSetList(ref), + "k8s.io/api/extensions/v1beta1.DaemonSetSpec": schema_k8sio_api_extensions_v1beta1_DaemonSetSpec(ref), + "k8s.io/api/extensions/v1beta1.DaemonSetStatus": schema_k8sio_api_extensions_v1beta1_DaemonSetStatus(ref), + "k8s.io/api/extensions/v1beta1.DaemonSetUpdateStrategy": schema_k8sio_api_extensions_v1beta1_DaemonSetUpdateStrategy(ref), + "k8s.io/api/extensions/v1beta1.Deployment": schema_k8sio_api_extensions_v1beta1_Deployment(ref), + "k8s.io/api/extensions/v1beta1.DeploymentCondition": schema_k8sio_api_extensions_v1beta1_DeploymentCondition(ref), + "k8s.io/api/extensions/v1beta1.DeploymentList": schema_k8sio_api_extensions_v1beta1_DeploymentList(ref), + "k8s.io/api/extensions/v1beta1.DeploymentRollback": schema_k8sio_api_extensions_v1beta1_DeploymentRollback(ref), + "k8s.io/api/extensions/v1beta1.DeploymentSpec": schema_k8sio_api_extensions_v1beta1_DeploymentSpec(ref), + "k8s.io/api/extensions/v1beta1.DeploymentStatus": schema_k8sio_api_extensions_v1beta1_DeploymentStatus(ref), + "k8s.io/api/extensions/v1beta1.DeploymentStrategy": schema_k8sio_api_extensions_v1beta1_DeploymentStrategy(ref), + "k8s.io/api/extensions/v1beta1.FSGroupStrategyOptions": schema_k8sio_api_extensions_v1beta1_FSGroupStrategyOptions(ref), + "k8s.io/api/extensions/v1beta1.HTTPIngressPath": schema_k8sio_api_extensions_v1beta1_HTTPIngressPath(ref), + "k8s.io/api/extensions/v1beta1.HTTPIngressRuleValue": schema_k8sio_api_extensions_v1beta1_HTTPIngressRuleValue(ref), + "k8s.io/api/extensions/v1beta1.HostPortRange": schema_k8sio_api_extensions_v1beta1_HostPortRange(ref), + "k8s.io/api/extensions/v1beta1.IDRange": schema_k8sio_api_extensions_v1beta1_IDRange(ref), + "k8s.io/api/extensions/v1beta1.IPBlock": schema_k8sio_api_extensions_v1beta1_IPBlock(ref), + "k8s.io/api/extensions/v1beta1.Ingress": schema_k8sio_api_extensions_v1beta1_Ingress(ref), + "k8s.io/api/extensions/v1beta1.IngressBackend": schema_k8sio_api_extensions_v1beta1_IngressBackend(ref), + "k8s.io/api/extensions/v1beta1.IngressList": schema_k8sio_api_extensions_v1beta1_IngressList(ref), + "k8s.io/api/extensions/v1beta1.IngressRule": schema_k8sio_api_extensions_v1beta1_IngressRule(ref), + "k8s.io/api/extensions/v1beta1.IngressRuleValue": schema_k8sio_api_extensions_v1beta1_IngressRuleValue(ref), + "k8s.io/api/extensions/v1beta1.IngressSpec": schema_k8sio_api_extensions_v1beta1_IngressSpec(ref), + "k8s.io/api/extensions/v1beta1.IngressStatus": schema_k8sio_api_extensions_v1beta1_IngressStatus(ref), + "k8s.io/api/extensions/v1beta1.IngressTLS": schema_k8sio_api_extensions_v1beta1_IngressTLS(ref), + "k8s.io/api/extensions/v1beta1.NetworkPolicy": schema_k8sio_api_extensions_v1beta1_NetworkPolicy(ref), + "k8s.io/api/extensions/v1beta1.NetworkPolicyEgressRule": schema_k8sio_api_extensions_v1beta1_NetworkPolicyEgressRule(ref), + "k8s.io/api/extensions/v1beta1.NetworkPolicyIngressRule": schema_k8sio_api_extensions_v1beta1_NetworkPolicyIngressRule(ref), + "k8s.io/api/extensions/v1beta1.NetworkPolicyList": schema_k8sio_api_extensions_v1beta1_NetworkPolicyList(ref), + "k8s.io/api/extensions/v1beta1.NetworkPolicyPeer": schema_k8sio_api_extensions_v1beta1_NetworkPolicyPeer(ref), + "k8s.io/api/extensions/v1beta1.NetworkPolicyPort": schema_k8sio_api_extensions_v1beta1_NetworkPolicyPort(ref), + "k8s.io/api/extensions/v1beta1.NetworkPolicySpec": schema_k8sio_api_extensions_v1beta1_NetworkPolicySpec(ref), + "k8s.io/api/extensions/v1beta1.PodSecurityPolicy": schema_k8sio_api_extensions_v1beta1_PodSecurityPolicy(ref), + "k8s.io/api/extensions/v1beta1.PodSecurityPolicyList": schema_k8sio_api_extensions_v1beta1_PodSecurityPolicyList(ref), + "k8s.io/api/extensions/v1beta1.PodSecurityPolicySpec": schema_k8sio_api_extensions_v1beta1_PodSecurityPolicySpec(ref), + "k8s.io/api/extensions/v1beta1.ReplicaSet": schema_k8sio_api_extensions_v1beta1_ReplicaSet(ref), + "k8s.io/api/extensions/v1beta1.ReplicaSetCondition": schema_k8sio_api_extensions_v1beta1_ReplicaSetCondition(ref), + "k8s.io/api/extensions/v1beta1.ReplicaSetList": schema_k8sio_api_extensions_v1beta1_ReplicaSetList(ref), + "k8s.io/api/extensions/v1beta1.ReplicaSetSpec": schema_k8sio_api_extensions_v1beta1_ReplicaSetSpec(ref), + "k8s.io/api/extensions/v1beta1.ReplicaSetStatus": schema_k8sio_api_extensions_v1beta1_ReplicaSetStatus(ref), + "k8s.io/api/extensions/v1beta1.RollbackConfig": schema_k8sio_api_extensions_v1beta1_RollbackConfig(ref), + "k8s.io/api/extensions/v1beta1.RollingUpdateDaemonSet": schema_k8sio_api_extensions_v1beta1_RollingUpdateDaemonSet(ref), + "k8s.io/api/extensions/v1beta1.RollingUpdateDeployment": schema_k8sio_api_extensions_v1beta1_RollingUpdateDeployment(ref), + "k8s.io/api/extensions/v1beta1.RunAsGroupStrategyOptions": schema_k8sio_api_extensions_v1beta1_RunAsGroupStrategyOptions(ref), + "k8s.io/api/extensions/v1beta1.RunAsUserStrategyOptions": schema_k8sio_api_extensions_v1beta1_RunAsUserStrategyOptions(ref), + "k8s.io/api/extensions/v1beta1.RuntimeClassStrategyOptions": schema_k8sio_api_extensions_v1beta1_RuntimeClassStrategyOptions(ref), + "k8s.io/api/extensions/v1beta1.SELinuxStrategyOptions": schema_k8sio_api_extensions_v1beta1_SELinuxStrategyOptions(ref), + "k8s.io/api/extensions/v1beta1.Scale": schema_k8sio_api_extensions_v1beta1_Scale(ref), + "k8s.io/api/extensions/v1beta1.ScaleSpec": schema_k8sio_api_extensions_v1beta1_ScaleSpec(ref), + "k8s.io/api/extensions/v1beta1.ScaleStatus": schema_k8sio_api_extensions_v1beta1_ScaleStatus(ref), + "k8s.io/api/extensions/v1beta1.SupplementalGroupsStrategyOptions": schema_k8sio_api_extensions_v1beta1_SupplementalGroupsStrategyOptions(ref), + "k8s.io/api/flowcontrol/v1alpha1.FlowDistinguisherMethod": schema_k8sio_api_flowcontrol_v1alpha1_FlowDistinguisherMethod(ref), + "k8s.io/api/flowcontrol/v1alpha1.FlowSchema": schema_k8sio_api_flowcontrol_v1alpha1_FlowSchema(ref), + "k8s.io/api/flowcontrol/v1alpha1.FlowSchemaCondition": schema_k8sio_api_flowcontrol_v1alpha1_FlowSchemaCondition(ref), + "k8s.io/api/flowcontrol/v1alpha1.FlowSchemaList": schema_k8sio_api_flowcontrol_v1alpha1_FlowSchemaList(ref), + "k8s.io/api/flowcontrol/v1alpha1.FlowSchemaSpec": schema_k8sio_api_flowcontrol_v1alpha1_FlowSchemaSpec(ref), + "k8s.io/api/flowcontrol/v1alpha1.FlowSchemaStatus": schema_k8sio_api_flowcontrol_v1alpha1_FlowSchemaStatus(ref), + "k8s.io/api/flowcontrol/v1alpha1.GroupSubject": schema_k8sio_api_flowcontrol_v1alpha1_GroupSubject(ref), + "k8s.io/api/flowcontrol/v1alpha1.LimitResponse": schema_k8sio_api_flowcontrol_v1alpha1_LimitResponse(ref), + "k8s.io/api/flowcontrol/v1alpha1.LimitedPriorityLevelConfiguration": schema_k8sio_api_flowcontrol_v1alpha1_LimitedPriorityLevelConfiguration(ref), + "k8s.io/api/flowcontrol/v1alpha1.NonResourcePolicyRule": schema_k8sio_api_flowcontrol_v1alpha1_NonResourcePolicyRule(ref), + "k8s.io/api/flowcontrol/v1alpha1.PolicyRulesWithSubjects": schema_k8sio_api_flowcontrol_v1alpha1_PolicyRulesWithSubjects(ref), + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfiguration": schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfiguration(ref), + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationCondition": schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationCondition(ref), + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationList": schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationList(ref), + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationReference": schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationReference(ref), + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationSpec": schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationSpec(ref), + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationStatus": schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationStatus(ref), + "k8s.io/api/flowcontrol/v1alpha1.QueuingConfiguration": schema_k8sio_api_flowcontrol_v1alpha1_QueuingConfiguration(ref), + "k8s.io/api/flowcontrol/v1alpha1.ResourcePolicyRule": schema_k8sio_api_flowcontrol_v1alpha1_ResourcePolicyRule(ref), + "k8s.io/api/flowcontrol/v1alpha1.ServiceAccountSubject": schema_k8sio_api_flowcontrol_v1alpha1_ServiceAccountSubject(ref), + "k8s.io/api/flowcontrol/v1alpha1.Subject": schema_k8sio_api_flowcontrol_v1alpha1_Subject(ref), + "k8s.io/api/flowcontrol/v1alpha1.UserSubject": schema_k8sio_api_flowcontrol_v1alpha1_UserSubject(ref), + "k8s.io/api/flowcontrol/v1beta1.FlowDistinguisherMethod": schema_k8sio_api_flowcontrol_v1beta1_FlowDistinguisherMethod(ref), + "k8s.io/api/flowcontrol/v1beta1.FlowSchema": schema_k8sio_api_flowcontrol_v1beta1_FlowSchema(ref), + "k8s.io/api/flowcontrol/v1beta1.FlowSchemaCondition": schema_k8sio_api_flowcontrol_v1beta1_FlowSchemaCondition(ref), + "k8s.io/api/flowcontrol/v1beta1.FlowSchemaList": schema_k8sio_api_flowcontrol_v1beta1_FlowSchemaList(ref), + "k8s.io/api/flowcontrol/v1beta1.FlowSchemaSpec": schema_k8sio_api_flowcontrol_v1beta1_FlowSchemaSpec(ref), + "k8s.io/api/flowcontrol/v1beta1.FlowSchemaStatus": schema_k8sio_api_flowcontrol_v1beta1_FlowSchemaStatus(ref), + "k8s.io/api/flowcontrol/v1beta1.GroupSubject": schema_k8sio_api_flowcontrol_v1beta1_GroupSubject(ref), + "k8s.io/api/flowcontrol/v1beta1.LimitResponse": schema_k8sio_api_flowcontrol_v1beta1_LimitResponse(ref), + "k8s.io/api/flowcontrol/v1beta1.LimitedPriorityLevelConfiguration": schema_k8sio_api_flowcontrol_v1beta1_LimitedPriorityLevelConfiguration(ref), + "k8s.io/api/flowcontrol/v1beta1.NonResourcePolicyRule": schema_k8sio_api_flowcontrol_v1beta1_NonResourcePolicyRule(ref), + "k8s.io/api/flowcontrol/v1beta1.PolicyRulesWithSubjects": schema_k8sio_api_flowcontrol_v1beta1_PolicyRulesWithSubjects(ref), + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfiguration": schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfiguration(ref), + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationCondition": schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationCondition(ref), + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationList": schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationList(ref), + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationReference": schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationReference(ref), + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationSpec": schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationSpec(ref), + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationStatus": schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationStatus(ref), + "k8s.io/api/flowcontrol/v1beta1.QueuingConfiguration": schema_k8sio_api_flowcontrol_v1beta1_QueuingConfiguration(ref), + "k8s.io/api/flowcontrol/v1beta1.ResourcePolicyRule": schema_k8sio_api_flowcontrol_v1beta1_ResourcePolicyRule(ref), + "k8s.io/api/flowcontrol/v1beta1.ServiceAccountSubject": schema_k8sio_api_flowcontrol_v1beta1_ServiceAccountSubject(ref), + "k8s.io/api/flowcontrol/v1beta1.Subject": schema_k8sio_api_flowcontrol_v1beta1_Subject(ref), + "k8s.io/api/flowcontrol/v1beta1.UserSubject": schema_k8sio_api_flowcontrol_v1beta1_UserSubject(ref), + "k8s.io/api/imagepolicy/v1alpha1.ImageReview": schema_k8sio_api_imagepolicy_v1alpha1_ImageReview(ref), + "k8s.io/api/imagepolicy/v1alpha1.ImageReviewContainerSpec": schema_k8sio_api_imagepolicy_v1alpha1_ImageReviewContainerSpec(ref), + "k8s.io/api/imagepolicy/v1alpha1.ImageReviewSpec": schema_k8sio_api_imagepolicy_v1alpha1_ImageReviewSpec(ref), + "k8s.io/api/imagepolicy/v1alpha1.ImageReviewStatus": schema_k8sio_api_imagepolicy_v1alpha1_ImageReviewStatus(ref), + "k8s.io/api/networking/v1.HTTPIngressPath": schema_k8sio_api_networking_v1_HTTPIngressPath(ref), + "k8s.io/api/networking/v1.HTTPIngressRuleValue": schema_k8sio_api_networking_v1_HTTPIngressRuleValue(ref), + "k8s.io/api/networking/v1.IPBlock": schema_k8sio_api_networking_v1_IPBlock(ref), + "k8s.io/api/networking/v1.Ingress": schema_k8sio_api_networking_v1_Ingress(ref), + "k8s.io/api/networking/v1.IngressBackend": schema_k8sio_api_networking_v1_IngressBackend(ref), + "k8s.io/api/networking/v1.IngressClass": schema_k8sio_api_networking_v1_IngressClass(ref), + "k8s.io/api/networking/v1.IngressClassList": schema_k8sio_api_networking_v1_IngressClassList(ref), + "k8s.io/api/networking/v1.IngressClassSpec": schema_k8sio_api_networking_v1_IngressClassSpec(ref), + "k8s.io/api/networking/v1.IngressList": schema_k8sio_api_networking_v1_IngressList(ref), + "k8s.io/api/networking/v1.IngressRule": schema_k8sio_api_networking_v1_IngressRule(ref), + "k8s.io/api/networking/v1.IngressRuleValue": schema_k8sio_api_networking_v1_IngressRuleValue(ref), + "k8s.io/api/networking/v1.IngressServiceBackend": schema_k8sio_api_networking_v1_IngressServiceBackend(ref), + "k8s.io/api/networking/v1.IngressSpec": schema_k8sio_api_networking_v1_IngressSpec(ref), + "k8s.io/api/networking/v1.IngressStatus": schema_k8sio_api_networking_v1_IngressStatus(ref), + "k8s.io/api/networking/v1.IngressTLS": schema_k8sio_api_networking_v1_IngressTLS(ref), + "k8s.io/api/networking/v1.NetworkPolicy": schema_k8sio_api_networking_v1_NetworkPolicy(ref), + "k8s.io/api/networking/v1.NetworkPolicyEgressRule": schema_k8sio_api_networking_v1_NetworkPolicyEgressRule(ref), + "k8s.io/api/networking/v1.NetworkPolicyIngressRule": schema_k8sio_api_networking_v1_NetworkPolicyIngressRule(ref), + "k8s.io/api/networking/v1.NetworkPolicyList": schema_k8sio_api_networking_v1_NetworkPolicyList(ref), + "k8s.io/api/networking/v1.NetworkPolicyPeer": schema_k8sio_api_networking_v1_NetworkPolicyPeer(ref), + "k8s.io/api/networking/v1.NetworkPolicyPort": schema_k8sio_api_networking_v1_NetworkPolicyPort(ref), + "k8s.io/api/networking/v1.NetworkPolicySpec": schema_k8sio_api_networking_v1_NetworkPolicySpec(ref), + "k8s.io/api/networking/v1.ServiceBackendPort": schema_k8sio_api_networking_v1_ServiceBackendPort(ref), + "k8s.io/api/networking/v1beta1.HTTPIngressPath": schema_k8sio_api_networking_v1beta1_HTTPIngressPath(ref), + "k8s.io/api/networking/v1beta1.HTTPIngressRuleValue": schema_k8sio_api_networking_v1beta1_HTTPIngressRuleValue(ref), + "k8s.io/api/networking/v1beta1.Ingress": schema_k8sio_api_networking_v1beta1_Ingress(ref), + "k8s.io/api/networking/v1beta1.IngressBackend": schema_k8sio_api_networking_v1beta1_IngressBackend(ref), + "k8s.io/api/networking/v1beta1.IngressClass": schema_k8sio_api_networking_v1beta1_IngressClass(ref), + "k8s.io/api/networking/v1beta1.IngressClassList": schema_k8sio_api_networking_v1beta1_IngressClassList(ref), + "k8s.io/api/networking/v1beta1.IngressClassSpec": schema_k8sio_api_networking_v1beta1_IngressClassSpec(ref), + "k8s.io/api/networking/v1beta1.IngressList": schema_k8sio_api_networking_v1beta1_IngressList(ref), + "k8s.io/api/networking/v1beta1.IngressRule": schema_k8sio_api_networking_v1beta1_IngressRule(ref), + "k8s.io/api/networking/v1beta1.IngressRuleValue": schema_k8sio_api_networking_v1beta1_IngressRuleValue(ref), + "k8s.io/api/networking/v1beta1.IngressSpec": schema_k8sio_api_networking_v1beta1_IngressSpec(ref), + "k8s.io/api/networking/v1beta1.IngressStatus": schema_k8sio_api_networking_v1beta1_IngressStatus(ref), + "k8s.io/api/networking/v1beta1.IngressTLS": schema_k8sio_api_networking_v1beta1_IngressTLS(ref), + "k8s.io/api/node/v1.Overhead": schema_k8sio_api_node_v1_Overhead(ref), + "k8s.io/api/node/v1.RuntimeClass": schema_k8sio_api_node_v1_RuntimeClass(ref), + "k8s.io/api/node/v1.RuntimeClassList": schema_k8sio_api_node_v1_RuntimeClassList(ref), + "k8s.io/api/node/v1.Scheduling": schema_k8sio_api_node_v1_Scheduling(ref), + "k8s.io/api/node/v1alpha1.Overhead": schema_k8sio_api_node_v1alpha1_Overhead(ref), + "k8s.io/api/node/v1alpha1.RuntimeClass": schema_k8sio_api_node_v1alpha1_RuntimeClass(ref), + "k8s.io/api/node/v1alpha1.RuntimeClassList": schema_k8sio_api_node_v1alpha1_RuntimeClassList(ref), + "k8s.io/api/node/v1alpha1.RuntimeClassSpec": schema_k8sio_api_node_v1alpha1_RuntimeClassSpec(ref), + "k8s.io/api/node/v1alpha1.Scheduling": schema_k8sio_api_node_v1alpha1_Scheduling(ref), + "k8s.io/api/node/v1beta1.Overhead": schema_k8sio_api_node_v1beta1_Overhead(ref), + "k8s.io/api/node/v1beta1.RuntimeClass": schema_k8sio_api_node_v1beta1_RuntimeClass(ref), + "k8s.io/api/node/v1beta1.RuntimeClassList": schema_k8sio_api_node_v1beta1_RuntimeClassList(ref), + "k8s.io/api/node/v1beta1.Scheduling": schema_k8sio_api_node_v1beta1_Scheduling(ref), + "k8s.io/api/policy/v1beta1.AllowedCSIDriver": schema_k8sio_api_policy_v1beta1_AllowedCSIDriver(ref), + "k8s.io/api/policy/v1beta1.AllowedFlexVolume": schema_k8sio_api_policy_v1beta1_AllowedFlexVolume(ref), + "k8s.io/api/policy/v1beta1.AllowedHostPath": schema_k8sio_api_policy_v1beta1_AllowedHostPath(ref), + "k8s.io/api/policy/v1beta1.Eviction": schema_k8sio_api_policy_v1beta1_Eviction(ref), + "k8s.io/api/policy/v1beta1.FSGroupStrategyOptions": schema_k8sio_api_policy_v1beta1_FSGroupStrategyOptions(ref), + "k8s.io/api/policy/v1beta1.HostPortRange": schema_k8sio_api_policy_v1beta1_HostPortRange(ref), + "k8s.io/api/policy/v1beta1.IDRange": schema_k8sio_api_policy_v1beta1_IDRange(ref), + "k8s.io/api/policy/v1beta1.PodDisruptionBudget": schema_k8sio_api_policy_v1beta1_PodDisruptionBudget(ref), + "k8s.io/api/policy/v1beta1.PodDisruptionBudgetList": schema_k8sio_api_policy_v1beta1_PodDisruptionBudgetList(ref), + "k8s.io/api/policy/v1beta1.PodDisruptionBudgetSpec": schema_k8sio_api_policy_v1beta1_PodDisruptionBudgetSpec(ref), + "k8s.io/api/policy/v1beta1.PodDisruptionBudgetStatus": schema_k8sio_api_policy_v1beta1_PodDisruptionBudgetStatus(ref), + "k8s.io/api/policy/v1beta1.PodSecurityPolicy": schema_k8sio_api_policy_v1beta1_PodSecurityPolicy(ref), + "k8s.io/api/policy/v1beta1.PodSecurityPolicyList": schema_k8sio_api_policy_v1beta1_PodSecurityPolicyList(ref), + "k8s.io/api/policy/v1beta1.PodSecurityPolicySpec": schema_k8sio_api_policy_v1beta1_PodSecurityPolicySpec(ref), + "k8s.io/api/policy/v1beta1.RunAsGroupStrategyOptions": schema_k8sio_api_policy_v1beta1_RunAsGroupStrategyOptions(ref), + "k8s.io/api/policy/v1beta1.RunAsUserStrategyOptions": schema_k8sio_api_policy_v1beta1_RunAsUserStrategyOptions(ref), + "k8s.io/api/policy/v1beta1.RuntimeClassStrategyOptions": schema_k8sio_api_policy_v1beta1_RuntimeClassStrategyOptions(ref), + "k8s.io/api/policy/v1beta1.SELinuxStrategyOptions": schema_k8sio_api_policy_v1beta1_SELinuxStrategyOptions(ref), + "k8s.io/api/policy/v1beta1.SupplementalGroupsStrategyOptions": schema_k8sio_api_policy_v1beta1_SupplementalGroupsStrategyOptions(ref), + "k8s.io/api/rbac/v1.AggregationRule": schema_k8sio_api_rbac_v1_AggregationRule(ref), + "k8s.io/api/rbac/v1.ClusterRole": schema_k8sio_api_rbac_v1_ClusterRole(ref), + "k8s.io/api/rbac/v1.ClusterRoleBinding": schema_k8sio_api_rbac_v1_ClusterRoleBinding(ref), + "k8s.io/api/rbac/v1.ClusterRoleBindingList": schema_k8sio_api_rbac_v1_ClusterRoleBindingList(ref), + "k8s.io/api/rbac/v1.ClusterRoleList": schema_k8sio_api_rbac_v1_ClusterRoleList(ref), + "k8s.io/api/rbac/v1.PolicyRule": schema_k8sio_api_rbac_v1_PolicyRule(ref), + "k8s.io/api/rbac/v1.Role": schema_k8sio_api_rbac_v1_Role(ref), + "k8s.io/api/rbac/v1.RoleBinding": schema_k8sio_api_rbac_v1_RoleBinding(ref), + "k8s.io/api/rbac/v1.RoleBindingList": schema_k8sio_api_rbac_v1_RoleBindingList(ref), + "k8s.io/api/rbac/v1.RoleList": schema_k8sio_api_rbac_v1_RoleList(ref), + "k8s.io/api/rbac/v1.RoleRef": schema_k8sio_api_rbac_v1_RoleRef(ref), + "k8s.io/api/rbac/v1.Subject": schema_k8sio_api_rbac_v1_Subject(ref), + "k8s.io/api/rbac/v1alpha1.AggregationRule": schema_k8sio_api_rbac_v1alpha1_AggregationRule(ref), + "k8s.io/api/rbac/v1alpha1.ClusterRole": schema_k8sio_api_rbac_v1alpha1_ClusterRole(ref), + "k8s.io/api/rbac/v1alpha1.ClusterRoleBinding": schema_k8sio_api_rbac_v1alpha1_ClusterRoleBinding(ref), + "k8s.io/api/rbac/v1alpha1.ClusterRoleBindingList": schema_k8sio_api_rbac_v1alpha1_ClusterRoleBindingList(ref), + "k8s.io/api/rbac/v1alpha1.ClusterRoleList": schema_k8sio_api_rbac_v1alpha1_ClusterRoleList(ref), + "k8s.io/api/rbac/v1alpha1.PolicyRule": schema_k8sio_api_rbac_v1alpha1_PolicyRule(ref), + "k8s.io/api/rbac/v1alpha1.Role": schema_k8sio_api_rbac_v1alpha1_Role(ref), + "k8s.io/api/rbac/v1alpha1.RoleBinding": schema_k8sio_api_rbac_v1alpha1_RoleBinding(ref), + "k8s.io/api/rbac/v1alpha1.RoleBindingList": schema_k8sio_api_rbac_v1alpha1_RoleBindingList(ref), + "k8s.io/api/rbac/v1alpha1.RoleList": schema_k8sio_api_rbac_v1alpha1_RoleList(ref), + "k8s.io/api/rbac/v1alpha1.RoleRef": schema_k8sio_api_rbac_v1alpha1_RoleRef(ref), + "k8s.io/api/rbac/v1alpha1.Subject": schema_k8sio_api_rbac_v1alpha1_Subject(ref), + "k8s.io/api/rbac/v1beta1.AggregationRule": schema_k8sio_api_rbac_v1beta1_AggregationRule(ref), + "k8s.io/api/rbac/v1beta1.ClusterRole": schema_k8sio_api_rbac_v1beta1_ClusterRole(ref), + "k8s.io/api/rbac/v1beta1.ClusterRoleBinding": schema_k8sio_api_rbac_v1beta1_ClusterRoleBinding(ref), + "k8s.io/api/rbac/v1beta1.ClusterRoleBindingList": schema_k8sio_api_rbac_v1beta1_ClusterRoleBindingList(ref), + "k8s.io/api/rbac/v1beta1.ClusterRoleList": schema_k8sio_api_rbac_v1beta1_ClusterRoleList(ref), + "k8s.io/api/rbac/v1beta1.PolicyRule": schema_k8sio_api_rbac_v1beta1_PolicyRule(ref), + "k8s.io/api/rbac/v1beta1.Role": schema_k8sio_api_rbac_v1beta1_Role(ref), + "k8s.io/api/rbac/v1beta1.RoleBinding": schema_k8sio_api_rbac_v1beta1_RoleBinding(ref), + "k8s.io/api/rbac/v1beta1.RoleBindingList": schema_k8sio_api_rbac_v1beta1_RoleBindingList(ref), + "k8s.io/api/rbac/v1beta1.RoleList": schema_k8sio_api_rbac_v1beta1_RoleList(ref), + "k8s.io/api/rbac/v1beta1.RoleRef": schema_k8sio_api_rbac_v1beta1_RoleRef(ref), + "k8s.io/api/rbac/v1beta1.Subject": schema_k8sio_api_rbac_v1beta1_Subject(ref), + "k8s.io/api/scheduling/v1.PriorityClass": schema_k8sio_api_scheduling_v1_PriorityClass(ref), + "k8s.io/api/scheduling/v1.PriorityClassList": schema_k8sio_api_scheduling_v1_PriorityClassList(ref), + "k8s.io/api/scheduling/v1alpha1.PriorityClass": schema_k8sio_api_scheduling_v1alpha1_PriorityClass(ref), + "k8s.io/api/scheduling/v1alpha1.PriorityClassList": schema_k8sio_api_scheduling_v1alpha1_PriorityClassList(ref), + "k8s.io/api/scheduling/v1beta1.PriorityClass": schema_k8sio_api_scheduling_v1beta1_PriorityClass(ref), + "k8s.io/api/scheduling/v1beta1.PriorityClassList": schema_k8sio_api_scheduling_v1beta1_PriorityClassList(ref), + "k8s.io/api/storage/v1.CSIDriver": schema_k8sio_api_storage_v1_CSIDriver(ref), + "k8s.io/api/storage/v1.CSIDriverList": schema_k8sio_api_storage_v1_CSIDriverList(ref), + "k8s.io/api/storage/v1.CSIDriverSpec": schema_k8sio_api_storage_v1_CSIDriverSpec(ref), + "k8s.io/api/storage/v1.CSINode": schema_k8sio_api_storage_v1_CSINode(ref), + "k8s.io/api/storage/v1.CSINodeDriver": schema_k8sio_api_storage_v1_CSINodeDriver(ref), + "k8s.io/api/storage/v1.CSINodeList": schema_k8sio_api_storage_v1_CSINodeList(ref), + "k8s.io/api/storage/v1.CSINodeSpec": schema_k8sio_api_storage_v1_CSINodeSpec(ref), + "k8s.io/api/storage/v1.StorageClass": schema_k8sio_api_storage_v1_StorageClass(ref), + "k8s.io/api/storage/v1.StorageClassList": schema_k8sio_api_storage_v1_StorageClassList(ref), + "k8s.io/api/storage/v1.TokenRequest": schema_k8sio_api_storage_v1_TokenRequest(ref), + "k8s.io/api/storage/v1.VolumeAttachment": schema_k8sio_api_storage_v1_VolumeAttachment(ref), + "k8s.io/api/storage/v1.VolumeAttachmentList": schema_k8sio_api_storage_v1_VolumeAttachmentList(ref), + "k8s.io/api/storage/v1.VolumeAttachmentSource": schema_k8sio_api_storage_v1_VolumeAttachmentSource(ref), + "k8s.io/api/storage/v1.VolumeAttachmentSpec": schema_k8sio_api_storage_v1_VolumeAttachmentSpec(ref), + "k8s.io/api/storage/v1.VolumeAttachmentStatus": schema_k8sio_api_storage_v1_VolumeAttachmentStatus(ref), + "k8s.io/api/storage/v1.VolumeError": schema_k8sio_api_storage_v1_VolumeError(ref), + "k8s.io/api/storage/v1.VolumeNodeResources": schema_k8sio_api_storage_v1_VolumeNodeResources(ref), + "k8s.io/api/storage/v1alpha1.CSIStorageCapacity": schema_k8sio_api_storage_v1alpha1_CSIStorageCapacity(ref), + "k8s.io/api/storage/v1alpha1.CSIStorageCapacityList": schema_k8sio_api_storage_v1alpha1_CSIStorageCapacityList(ref), + "k8s.io/api/storage/v1alpha1.VolumeAttachment": schema_k8sio_api_storage_v1alpha1_VolumeAttachment(ref), + "k8s.io/api/storage/v1alpha1.VolumeAttachmentList": schema_k8sio_api_storage_v1alpha1_VolumeAttachmentList(ref), + "k8s.io/api/storage/v1alpha1.VolumeAttachmentSource": schema_k8sio_api_storage_v1alpha1_VolumeAttachmentSource(ref), + "k8s.io/api/storage/v1alpha1.VolumeAttachmentSpec": schema_k8sio_api_storage_v1alpha1_VolumeAttachmentSpec(ref), + "k8s.io/api/storage/v1alpha1.VolumeAttachmentStatus": schema_k8sio_api_storage_v1alpha1_VolumeAttachmentStatus(ref), + "k8s.io/api/storage/v1alpha1.VolumeError": schema_k8sio_api_storage_v1alpha1_VolumeError(ref), + "k8s.io/api/storage/v1beta1.CSIDriver": schema_k8sio_api_storage_v1beta1_CSIDriver(ref), + "k8s.io/api/storage/v1beta1.CSIDriverList": schema_k8sio_api_storage_v1beta1_CSIDriverList(ref), + "k8s.io/api/storage/v1beta1.CSIDriverSpec": schema_k8sio_api_storage_v1beta1_CSIDriverSpec(ref), + "k8s.io/api/storage/v1beta1.CSINode": schema_k8sio_api_storage_v1beta1_CSINode(ref), + "k8s.io/api/storage/v1beta1.CSINodeDriver": schema_k8sio_api_storage_v1beta1_CSINodeDriver(ref), + "k8s.io/api/storage/v1beta1.CSINodeList": schema_k8sio_api_storage_v1beta1_CSINodeList(ref), + "k8s.io/api/storage/v1beta1.CSINodeSpec": schema_k8sio_api_storage_v1beta1_CSINodeSpec(ref), + "k8s.io/api/storage/v1beta1.StorageClass": schema_k8sio_api_storage_v1beta1_StorageClass(ref), + "k8s.io/api/storage/v1beta1.StorageClassList": schema_k8sio_api_storage_v1beta1_StorageClassList(ref), + "k8s.io/api/storage/v1beta1.TokenRequest": schema_k8sio_api_storage_v1beta1_TokenRequest(ref), + "k8s.io/api/storage/v1beta1.VolumeAttachment": schema_k8sio_api_storage_v1beta1_VolumeAttachment(ref), + "k8s.io/api/storage/v1beta1.VolumeAttachmentList": schema_k8sio_api_storage_v1beta1_VolumeAttachmentList(ref), + "k8s.io/api/storage/v1beta1.VolumeAttachmentSource": schema_k8sio_api_storage_v1beta1_VolumeAttachmentSource(ref), + "k8s.io/api/storage/v1beta1.VolumeAttachmentSpec": schema_k8sio_api_storage_v1beta1_VolumeAttachmentSpec(ref), + "k8s.io/api/storage/v1beta1.VolumeAttachmentStatus": schema_k8sio_api_storage_v1beta1_VolumeAttachmentStatus(ref), + "k8s.io/api/storage/v1beta1.VolumeError": schema_k8sio_api_storage_v1beta1_VolumeError(ref), + "k8s.io/api/storage/v1beta1.VolumeNodeResources": schema_k8sio_api_storage_v1beta1_VolumeNodeResources(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ConversionRequest": schema_pkg_apis_apiextensions_v1_ConversionRequest(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ConversionResponse": schema_pkg_apis_apiextensions_v1_ConversionResponse(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ConversionReview": schema_pkg_apis_apiextensions_v1_ConversionReview(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceColumnDefinition": schema_pkg_apis_apiextensions_v1_CustomResourceColumnDefinition(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceConversion": schema_pkg_apis_apiextensions_v1_CustomResourceConversion(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinition": schema_pkg_apis_apiextensions_v1_CustomResourceDefinition(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionCondition": schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionCondition(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionList": schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionList(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionNames": schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionNames(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionSpec": schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionSpec(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionStatus": schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionStatus(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionVersion": schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionVersion(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresourceScale": schema_pkg_apis_apiextensions_v1_CustomResourceSubresourceScale(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresourceStatus": schema_pkg_apis_apiextensions_v1_CustomResourceSubresourceStatus(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresources": schema_pkg_apis_apiextensions_v1_CustomResourceSubresources(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceValidation": schema_pkg_apis_apiextensions_v1_CustomResourceValidation(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ExternalDocumentation": schema_pkg_apis_apiextensions_v1_ExternalDocumentation(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSON": schema_pkg_apis_apiextensions_v1_JSON(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps": schema_pkg_apis_apiextensions_v1_JSONSchemaProps(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrArray": schema_pkg_apis_apiextensions_v1_JSONSchemaPropsOrArray(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrBool": schema_pkg_apis_apiextensions_v1_JSONSchemaPropsOrBool(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrStringArray": schema_pkg_apis_apiextensions_v1_JSONSchemaPropsOrStringArray(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ServiceReference": schema_pkg_apis_apiextensions_v1_ServiceReference(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.WebhookClientConfig": schema_pkg_apis_apiextensions_v1_WebhookClientConfig(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.WebhookConversion": schema_pkg_apis_apiextensions_v1_WebhookConversion(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ConversionRequest": schema_pkg_apis_apiextensions_v1beta1_ConversionRequest(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ConversionResponse": schema_pkg_apis_apiextensions_v1beta1_ConversionResponse(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ConversionReview": schema_pkg_apis_apiextensions_v1beta1_ConversionReview(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceColumnDefinition": schema_pkg_apis_apiextensions_v1beta1_CustomResourceColumnDefinition(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceConversion": schema_pkg_apis_apiextensions_v1beta1_CustomResourceConversion(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinition": schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinition(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionCondition": schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionCondition(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionList": schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionList(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionNames": schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionNames(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionSpec": schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionSpec(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionStatus": schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionStatus(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionVersion": schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionVersion(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresourceScale": schema_pkg_apis_apiextensions_v1beta1_CustomResourceSubresourceScale(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresourceStatus": schema_pkg_apis_apiextensions_v1beta1_CustomResourceSubresourceStatus(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresources": schema_pkg_apis_apiextensions_v1beta1_CustomResourceSubresources(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceValidation": schema_pkg_apis_apiextensions_v1beta1_CustomResourceValidation(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ExternalDocumentation": schema_pkg_apis_apiextensions_v1beta1_ExternalDocumentation(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSON": schema_pkg_apis_apiextensions_v1beta1_JSON(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps": schema_pkg_apis_apiextensions_v1beta1_JSONSchemaProps(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrArray": schema_pkg_apis_apiextensions_v1beta1_JSONSchemaPropsOrArray(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrBool": schema_pkg_apis_apiextensions_v1beta1_JSONSchemaPropsOrBool(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrStringArray": schema_pkg_apis_apiextensions_v1beta1_JSONSchemaPropsOrStringArray(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ServiceReference": schema_pkg_apis_apiextensions_v1beta1_ServiceReference(ref), + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.WebhookClientConfig": schema_pkg_apis_apiextensions_v1beta1_WebhookClientConfig(ref), + "k8s.io/apimachinery/pkg/api/resource.Quantity": schema_apimachinery_pkg_api_resource_Quantity(ref), + "k8s.io/apimachinery/pkg/api/resource.int64Amount": schema_apimachinery_pkg_api_resource_int64Amount(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.APIGroup": schema_pkg_apis_meta_v1_APIGroup(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.APIGroupList": schema_pkg_apis_meta_v1_APIGroupList(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.APIResource": schema_pkg_apis_meta_v1_APIResource(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.APIResourceList": schema_pkg_apis_meta_v1_APIResourceList(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.APIVersions": schema_pkg_apis_meta_v1_APIVersions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.Condition": schema_pkg_apis_meta_v1_Condition(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.CreateOptions": schema_pkg_apis_meta_v1_CreateOptions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.DeleteOptions": schema_pkg_apis_meta_v1_DeleteOptions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration": schema_pkg_apis_meta_v1_Duration(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.ExportOptions": schema_pkg_apis_meta_v1_ExportOptions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.FieldsV1": schema_pkg_apis_meta_v1_FieldsV1(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.GetOptions": schema_pkg_apis_meta_v1_GetOptions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.GroupKind": schema_pkg_apis_meta_v1_GroupKind(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.GroupResource": schema_pkg_apis_meta_v1_GroupResource(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.GroupVersion": schema_pkg_apis_meta_v1_GroupVersion(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.GroupVersionForDiscovery": schema_pkg_apis_meta_v1_GroupVersionForDiscovery(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.GroupVersionKind": schema_pkg_apis_meta_v1_GroupVersionKind(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.GroupVersionResource": schema_pkg_apis_meta_v1_GroupVersionResource(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.InternalEvent": schema_pkg_apis_meta_v1_InternalEvent(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector": schema_pkg_apis_meta_v1_LabelSelector(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelectorRequirement": schema_pkg_apis_meta_v1_LabelSelectorRequirement(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.List": schema_pkg_apis_meta_v1_List(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta": schema_pkg_apis_meta_v1_ListMeta(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.ListOptions": schema_pkg_apis_meta_v1_ListOptions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.ManagedFieldsEntry": schema_pkg_apis_meta_v1_ManagedFieldsEntry(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime": schema_pkg_apis_meta_v1_MicroTime(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta": schema_pkg_apis_meta_v1_ObjectMeta(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.OwnerReference": schema_pkg_apis_meta_v1_OwnerReference(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.PartialObjectMetadata": schema_pkg_apis_meta_v1_PartialObjectMetadata(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.PartialObjectMetadataList": schema_pkg_apis_meta_v1_PartialObjectMetadataList(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.Patch": schema_pkg_apis_meta_v1_Patch(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.PatchOptions": schema_pkg_apis_meta_v1_PatchOptions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.Preconditions": schema_pkg_apis_meta_v1_Preconditions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.RootPaths": schema_pkg_apis_meta_v1_RootPaths(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.ServerAddressByClientCIDR": schema_pkg_apis_meta_v1_ServerAddressByClientCIDR(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.Status": schema_pkg_apis_meta_v1_Status(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.StatusCause": schema_pkg_apis_meta_v1_StatusCause(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.StatusDetails": schema_pkg_apis_meta_v1_StatusDetails(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.Table": schema_pkg_apis_meta_v1_Table(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.TableColumnDefinition": schema_pkg_apis_meta_v1_TableColumnDefinition(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.TableOptions": schema_pkg_apis_meta_v1_TableOptions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.TableRow": schema_pkg_apis_meta_v1_TableRow(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.TableRowCondition": schema_pkg_apis_meta_v1_TableRowCondition(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.Time": schema_pkg_apis_meta_v1_Time(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.Timestamp": schema_pkg_apis_meta_v1_Timestamp(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.TypeMeta": schema_pkg_apis_meta_v1_TypeMeta(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.UpdateOptions": schema_pkg_apis_meta_v1_UpdateOptions(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1.WatchEvent": schema_pkg_apis_meta_v1_WatchEvent(ref), + "k8s.io/apimachinery/pkg/apis/meta/v1beta1.PartialObjectMetadataList": schema_pkg_apis_meta_v1beta1_PartialObjectMetadataList(ref), + "k8s.io/apimachinery/pkg/runtime.RawExtension": schema_k8sio_apimachinery_pkg_runtime_RawExtension(ref), + "k8s.io/apimachinery/pkg/runtime.TypeMeta": schema_k8sio_apimachinery_pkg_runtime_TypeMeta(ref), + "k8s.io/apimachinery/pkg/runtime.Unknown": schema_k8sio_apimachinery_pkg_runtime_Unknown(ref), + "k8s.io/apimachinery/pkg/util/intstr.IntOrString": schema_apimachinery_pkg_util_intstr_IntOrString(ref), + "k8s.io/apimachinery/pkg/version.Info": schema_k8sio_apimachinery_pkg_version_Info(ref), + "k8s.io/apiserver/pkg/apis/audit/v1.Event": schema_pkg_apis_audit_v1_Event(ref), + "k8s.io/apiserver/pkg/apis/audit/v1.EventList": schema_pkg_apis_audit_v1_EventList(ref), + "k8s.io/apiserver/pkg/apis/audit/v1.GroupResources": schema_pkg_apis_audit_v1_GroupResources(ref), + "k8s.io/apiserver/pkg/apis/audit/v1.ObjectReference": schema_pkg_apis_audit_v1_ObjectReference(ref), + "k8s.io/apiserver/pkg/apis/audit/v1.Policy": schema_pkg_apis_audit_v1_Policy(ref), + "k8s.io/apiserver/pkg/apis/audit/v1.PolicyList": schema_pkg_apis_audit_v1_PolicyList(ref), + "k8s.io/apiserver/pkg/apis/audit/v1.PolicyRule": schema_pkg_apis_audit_v1_PolicyRule(ref), + "k8s.io/apiserver/pkg/apis/audit/v1alpha1.Event": schema_pkg_apis_audit_v1alpha1_Event(ref), + "k8s.io/apiserver/pkg/apis/audit/v1alpha1.EventList": schema_pkg_apis_audit_v1alpha1_EventList(ref), + "k8s.io/apiserver/pkg/apis/audit/v1alpha1.GroupResources": schema_pkg_apis_audit_v1alpha1_GroupResources(ref), + "k8s.io/apiserver/pkg/apis/audit/v1alpha1.ObjectReference": schema_pkg_apis_audit_v1alpha1_ObjectReference(ref), + "k8s.io/apiserver/pkg/apis/audit/v1alpha1.Policy": schema_pkg_apis_audit_v1alpha1_Policy(ref), + "k8s.io/apiserver/pkg/apis/audit/v1alpha1.PolicyList": schema_pkg_apis_audit_v1alpha1_PolicyList(ref), + "k8s.io/apiserver/pkg/apis/audit/v1alpha1.PolicyRule": schema_pkg_apis_audit_v1alpha1_PolicyRule(ref), + "k8s.io/apiserver/pkg/apis/audit/v1beta1.Event": schema_pkg_apis_audit_v1beta1_Event(ref), + "k8s.io/apiserver/pkg/apis/audit/v1beta1.EventList": schema_pkg_apis_audit_v1beta1_EventList(ref), + "k8s.io/apiserver/pkg/apis/audit/v1beta1.GroupResources": schema_pkg_apis_audit_v1beta1_GroupResources(ref), + "k8s.io/apiserver/pkg/apis/audit/v1beta1.ObjectReference": schema_pkg_apis_audit_v1beta1_ObjectReference(ref), + "k8s.io/apiserver/pkg/apis/audit/v1beta1.Policy": schema_pkg_apis_audit_v1beta1_Policy(ref), + "k8s.io/apiserver/pkg/apis/audit/v1beta1.PolicyList": schema_pkg_apis_audit_v1beta1_PolicyList(ref), + "k8s.io/apiserver/pkg/apis/audit/v1beta1.PolicyRule": schema_pkg_apis_audit_v1beta1_PolicyRule(ref), + "k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.ExecCredential": schema_pkg_apis_clientauthentication_v1alpha1_ExecCredential(ref), + "k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.ExecCredentialSpec": schema_pkg_apis_clientauthentication_v1alpha1_ExecCredentialSpec(ref), + "k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.ExecCredentialStatus": schema_pkg_apis_clientauthentication_v1alpha1_ExecCredentialStatus(ref), + "k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.Response": schema_pkg_apis_clientauthentication_v1alpha1_Response(ref), + "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.Cluster": schema_pkg_apis_clientauthentication_v1beta1_Cluster(ref), + "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.ExecCredential": schema_pkg_apis_clientauthentication_v1beta1_ExecCredential(ref), + "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.ExecCredentialSpec": schema_pkg_apis_clientauthentication_v1beta1_ExecCredentialSpec(ref), + "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.ExecCredentialStatus": schema_pkg_apis_clientauthentication_v1beta1_ExecCredentialStatus(ref), + "k8s.io/cloud-provider/config/v1alpha1.CloudControllerManagerConfiguration": schema_k8sio_cloud_provider_config_v1alpha1_CloudControllerManagerConfiguration(ref), + "k8s.io/cloud-provider/config/v1alpha1.CloudProviderConfiguration": schema_k8sio_cloud_provider_config_v1alpha1_CloudProviderConfiguration(ref), + "k8s.io/cloud-provider/config/v1alpha1.KubeCloudSharedConfiguration": schema_k8sio_cloud_provider_config_v1alpha1_KubeCloudSharedConfiguration(ref), + "k8s.io/controller-manager/config/v1alpha1.ControllerLeaderConfiguration": schema_k8sio_controller_manager_config_v1alpha1_ControllerLeaderConfiguration(ref), + "k8s.io/controller-manager/config/v1alpha1.GenericControllerManagerConfiguration": schema_k8sio_controller_manager_config_v1alpha1_GenericControllerManagerConfiguration(ref), + "k8s.io/controller-manager/config/v1alpha1.LeaderMigrationConfiguration": schema_k8sio_controller_manager_config_v1alpha1_LeaderMigrationConfiguration(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIService": schema_pkg_apis_apiregistration_v1_APIService(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceCondition": schema_pkg_apis_apiregistration_v1_APIServiceCondition(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceList": schema_pkg_apis_apiregistration_v1_APIServiceList(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceSpec": schema_pkg_apis_apiregistration_v1_APIServiceSpec(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceStatus": schema_pkg_apis_apiregistration_v1_APIServiceStatus(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.ServiceReference": schema_pkg_apis_apiregistration_v1_ServiceReference(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIService": schema_pkg_apis_apiregistration_v1beta1_APIService(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceCondition": schema_pkg_apis_apiregistration_v1beta1_APIServiceCondition(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceList": schema_pkg_apis_apiregistration_v1beta1_APIServiceList(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceSpec": schema_pkg_apis_apiregistration_v1beta1_APIServiceSpec(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceStatus": schema_pkg_apis_apiregistration_v1beta1_APIServiceStatus(ref), + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.ServiceReference": schema_pkg_apis_apiregistration_v1beta1_ServiceReference(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.AttachDetachControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_AttachDetachControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_CSRSigningConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_CSRSigningControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.CronJobControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_CronJobControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.DaemonSetControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_DaemonSetControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.DeploymentControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_DeploymentControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.DeprecatedControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_DeprecatedControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.EndpointControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_EndpointControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.EndpointSliceControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_EndpointSliceControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.EndpointSliceMirroringControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_EndpointSliceMirroringControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.GarbageCollectorControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_GarbageCollectorControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.GroupResource": schema_k8sio_kube_controller_manager_config_v1alpha1_GroupResource(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.HPAControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_HPAControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.JobControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_JobControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.KubeControllerManagerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_KubeControllerManagerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.NamespaceControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_NamespaceControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.NodeIPAMControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_NodeIPAMControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.NodeLifecycleControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_NodeLifecycleControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.PersistentVolumeBinderControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_PersistentVolumeBinderControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.PersistentVolumeRecyclerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_PersistentVolumeRecyclerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.PodGCControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_PodGCControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.ReplicaSetControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_ReplicaSetControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.ReplicationControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_ReplicationControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.ResourceQuotaControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_ResourceQuotaControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.SAControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_SAControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.StatefulSetControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_StatefulSetControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.TTLAfterFinishedControllerConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_TTLAfterFinishedControllerConfiguration(ref), + "k8s.io/kube-controller-manager/config/v1alpha1.VolumeConfiguration": schema_k8sio_kube_controller_manager_config_v1alpha1_VolumeConfiguration(ref), + "k8s.io/kube-proxy/config/v1alpha1.KubeProxyConfiguration": schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyConfiguration(ref), + "k8s.io/kube-proxy/config/v1alpha1.KubeProxyConntrackConfiguration": schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyConntrackConfiguration(ref), + "k8s.io/kube-proxy/config/v1alpha1.KubeProxyIPTablesConfiguration": schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyIPTablesConfiguration(ref), + "k8s.io/kube-proxy/config/v1alpha1.KubeProxyIPVSConfiguration": schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyIPVSConfiguration(ref), + "k8s.io/kube-proxy/config/v1alpha1.KubeProxyWinkernelConfiguration": schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyWinkernelConfiguration(ref), + "k8s.io/kube-scheduler/config/v1.ExtenderManagedResource": schema_k8sio_kube_scheduler_config_v1_ExtenderManagedResource(ref), + "k8s.io/kube-scheduler/config/v1.ExtenderTLSConfig": schema_k8sio_kube_scheduler_config_v1_ExtenderTLSConfig(ref), + "k8s.io/kube-scheduler/config/v1.LabelPreference": schema_k8sio_kube_scheduler_config_v1_LabelPreference(ref), + "k8s.io/kube-scheduler/config/v1.LabelsPresence": schema_k8sio_kube_scheduler_config_v1_LabelsPresence(ref), + "k8s.io/kube-scheduler/config/v1.LegacyExtender": schema_k8sio_kube_scheduler_config_v1_LegacyExtender(ref), + "k8s.io/kube-scheduler/config/v1.Policy": schema_k8sio_kube_scheduler_config_v1_Policy(ref), + "k8s.io/kube-scheduler/config/v1.PredicateArgument": schema_k8sio_kube_scheduler_config_v1_PredicateArgument(ref), + "k8s.io/kube-scheduler/config/v1.PredicatePolicy": schema_k8sio_kube_scheduler_config_v1_PredicatePolicy(ref), + "k8s.io/kube-scheduler/config/v1.PriorityArgument": schema_k8sio_kube_scheduler_config_v1_PriorityArgument(ref), + "k8s.io/kube-scheduler/config/v1.PriorityPolicy": schema_k8sio_kube_scheduler_config_v1_PriorityPolicy(ref), + "k8s.io/kube-scheduler/config/v1.RequestedToCapacityRatioArguments": schema_k8sio_kube_scheduler_config_v1_RequestedToCapacityRatioArguments(ref), + "k8s.io/kube-scheduler/config/v1.ResourceSpec": schema_k8sio_kube_scheduler_config_v1_ResourceSpec(ref), + "k8s.io/kube-scheduler/config/v1.ServiceAffinity": schema_k8sio_kube_scheduler_config_v1_ServiceAffinity(ref), + "k8s.io/kube-scheduler/config/v1.ServiceAntiAffinity": schema_k8sio_kube_scheduler_config_v1_ServiceAntiAffinity(ref), + "k8s.io/kube-scheduler/config/v1.UtilizationShapePoint": schema_k8sio_kube_scheduler_config_v1_UtilizationShapePoint(ref), + "k8s.io/kube-scheduler/config/v1beta1.DefaultPreemptionArgs": schema_k8sio_kube_scheduler_config_v1beta1_DefaultPreemptionArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.Extender": schema_k8sio_kube_scheduler_config_v1beta1_Extender(ref), + "k8s.io/kube-scheduler/config/v1beta1.InterPodAffinityArgs": schema_k8sio_kube_scheduler_config_v1beta1_InterPodAffinityArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.KubeSchedulerConfiguration": schema_k8sio_kube_scheduler_config_v1beta1_KubeSchedulerConfiguration(ref), + "k8s.io/kube-scheduler/config/v1beta1.KubeSchedulerProfile": schema_k8sio_kube_scheduler_config_v1beta1_KubeSchedulerProfile(ref), + "k8s.io/kube-scheduler/config/v1beta1.NodeAffinityArgs": schema_k8sio_kube_scheduler_config_v1beta1_NodeAffinityArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.NodeLabelArgs": schema_k8sio_kube_scheduler_config_v1beta1_NodeLabelArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.NodeResourcesFitArgs": schema_k8sio_kube_scheduler_config_v1beta1_NodeResourcesFitArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.NodeResourcesLeastAllocatedArgs": schema_k8sio_kube_scheduler_config_v1beta1_NodeResourcesLeastAllocatedArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.NodeResourcesMostAllocatedArgs": schema_k8sio_kube_scheduler_config_v1beta1_NodeResourcesMostAllocatedArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.Plugin": schema_k8sio_kube_scheduler_config_v1beta1_Plugin(ref), + "k8s.io/kube-scheduler/config/v1beta1.PluginConfig": schema_k8sio_kube_scheduler_config_v1beta1_PluginConfig(ref), + "k8s.io/kube-scheduler/config/v1beta1.PluginSet": schema_k8sio_kube_scheduler_config_v1beta1_PluginSet(ref), + "k8s.io/kube-scheduler/config/v1beta1.Plugins": schema_k8sio_kube_scheduler_config_v1beta1_Plugins(ref), + "k8s.io/kube-scheduler/config/v1beta1.PodTopologySpreadArgs": schema_k8sio_kube_scheduler_config_v1beta1_PodTopologySpreadArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.RequestedToCapacityRatioArgs": schema_k8sio_kube_scheduler_config_v1beta1_RequestedToCapacityRatioArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.ResourceSpec": schema_k8sio_kube_scheduler_config_v1beta1_ResourceSpec(ref), + "k8s.io/kube-scheduler/config/v1beta1.ServiceAffinityArgs": schema_k8sio_kube_scheduler_config_v1beta1_ServiceAffinityArgs(ref), + "k8s.io/kube-scheduler/config/v1beta1.UtilizationShapePoint": schema_k8sio_kube_scheduler_config_v1beta1_UtilizationShapePoint(ref), + "k8s.io/kube-scheduler/config/v1beta1.VolumeBindingArgs": schema_k8sio_kube_scheduler_config_v1beta1_VolumeBindingArgs(ref), + "k8s.io/kubelet/config/v1alpha1.CredentialProvider": schema_k8sio_kubelet_config_v1alpha1_CredentialProvider(ref), + "k8s.io/kubelet/config/v1alpha1.CredentialProviderConfig": schema_k8sio_kubelet_config_v1alpha1_CredentialProviderConfig(ref), + "k8s.io/kubelet/config/v1alpha1.ExecEnvVar": schema_k8sio_kubelet_config_v1alpha1_ExecEnvVar(ref), + "k8s.io/kubelet/config/v1beta1.KubeletAnonymousAuthentication": schema_k8sio_kubelet_config_v1beta1_KubeletAnonymousAuthentication(ref), + "k8s.io/kubelet/config/v1beta1.KubeletAuthentication": schema_k8sio_kubelet_config_v1beta1_KubeletAuthentication(ref), + "k8s.io/kubelet/config/v1beta1.KubeletAuthorization": schema_k8sio_kubelet_config_v1beta1_KubeletAuthorization(ref), + "k8s.io/kubelet/config/v1beta1.KubeletConfiguration": schema_k8sio_kubelet_config_v1beta1_KubeletConfiguration(ref), + "k8s.io/kubelet/config/v1beta1.KubeletWebhookAuthentication": schema_k8sio_kubelet_config_v1beta1_KubeletWebhookAuthentication(ref), + "k8s.io/kubelet/config/v1beta1.KubeletWebhookAuthorization": schema_k8sio_kubelet_config_v1beta1_KubeletWebhookAuthorization(ref), + "k8s.io/kubelet/config/v1beta1.KubeletX509Authentication": schema_k8sio_kubelet_config_v1beta1_KubeletX509Authentication(ref), + "k8s.io/kubelet/config/v1beta1.SerializedNodeConfigSource": schema_k8sio_kubelet_config_v1beta1_SerializedNodeConfigSource(ref), + "k8s.io/kubernetes/pkg/apis/abac/v1beta1.Policy": schema_pkg_apis_abac_v1beta1_Policy(ref), + "k8s.io/kubernetes/pkg/apis/abac/v1beta1.PolicySpec": schema_pkg_apis_abac_v1beta1_PolicySpec(ref), + "k8s.io/metrics/pkg/apis/custom_metrics/v1beta1.MetricListOptions": schema_pkg_apis_custom_metrics_v1beta1_MetricListOptions(ref), + "k8s.io/metrics/pkg/apis/custom_metrics/v1beta1.MetricValue": schema_pkg_apis_custom_metrics_v1beta1_MetricValue(ref), + "k8s.io/metrics/pkg/apis/custom_metrics/v1beta1.MetricValueList": schema_pkg_apis_custom_metrics_v1beta1_MetricValueList(ref), + "k8s.io/metrics/pkg/apis/custom_metrics/v1beta2.MetricIdentifier": schema_pkg_apis_custom_metrics_v1beta2_MetricIdentifier(ref), + "k8s.io/metrics/pkg/apis/custom_metrics/v1beta2.MetricListOptions": schema_pkg_apis_custom_metrics_v1beta2_MetricListOptions(ref), + "k8s.io/metrics/pkg/apis/custom_metrics/v1beta2.MetricValue": schema_pkg_apis_custom_metrics_v1beta2_MetricValue(ref), + "k8s.io/metrics/pkg/apis/custom_metrics/v1beta2.MetricValueList": schema_pkg_apis_custom_metrics_v1beta2_MetricValueList(ref), + "k8s.io/metrics/pkg/apis/external_metrics/v1beta1.ExternalMetricValue": schema_pkg_apis_external_metrics_v1beta1_ExternalMetricValue(ref), + "k8s.io/metrics/pkg/apis/external_metrics/v1beta1.ExternalMetricValueList": schema_pkg_apis_external_metrics_v1beta1_ExternalMetricValueList(ref), + "k8s.io/metrics/pkg/apis/metrics/v1alpha1.ContainerMetrics": schema_pkg_apis_metrics_v1alpha1_ContainerMetrics(ref), + "k8s.io/metrics/pkg/apis/metrics/v1alpha1.NodeMetrics": schema_pkg_apis_metrics_v1alpha1_NodeMetrics(ref), + "k8s.io/metrics/pkg/apis/metrics/v1alpha1.NodeMetricsList": schema_pkg_apis_metrics_v1alpha1_NodeMetricsList(ref), + "k8s.io/metrics/pkg/apis/metrics/v1alpha1.PodMetrics": schema_pkg_apis_metrics_v1alpha1_PodMetrics(ref), + "k8s.io/metrics/pkg/apis/metrics/v1alpha1.PodMetricsList": schema_pkg_apis_metrics_v1alpha1_PodMetricsList(ref), + "k8s.io/metrics/pkg/apis/metrics/v1beta1.ContainerMetrics": schema_pkg_apis_metrics_v1beta1_ContainerMetrics(ref), + "k8s.io/metrics/pkg/apis/metrics/v1beta1.NodeMetrics": schema_pkg_apis_metrics_v1beta1_NodeMetrics(ref), + "k8s.io/metrics/pkg/apis/metrics/v1beta1.NodeMetricsList": schema_pkg_apis_metrics_v1beta1_NodeMetricsList(ref), + "k8s.io/metrics/pkg/apis/metrics/v1beta1.PodMetrics": schema_pkg_apis_metrics_v1beta1_PodMetrics(ref), + "k8s.io/metrics/pkg/apis/metrics/v1beta1.PodMetricsList": schema_pkg_apis_metrics_v1beta1_PodMetricsList(ref), + } +} + +func schema_k8sio_api_admissionregistration_v1_MutatingWebhook(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MutatingWebhook describes an admission webhook and the resources and operations it applies to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the admission webhook. Name should be fully qualified, e.g., imagepolicy.kubernetes.io, where \"imagepolicy\" is the name of the webhook, and kubernetes.io is the name of the organization. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "clientConfig": { + SchemaProps: spec.SchemaProps{ + Description: "ClientConfig defines how to communicate with the hook. Required", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1.WebhookClientConfig"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules describes what operations on what resources/subresources the webhook cares about. The webhook cares about an operation if it matches _any_ Rule. However, in order to prevent ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks from putting the cluster in a state which cannot be recovered from without completely disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1.RuleWithOperations"), + }, + }, + }, + }, + }, + "failurePolicy": { + SchemaProps: spec.SchemaProps{ + Description: "FailurePolicy defines how unrecognized errors from the admission endpoint are handled - allowed values are Ignore or Fail. Defaults to Fail.", + Type: []string{"string"}, + Format: "", + }, + }, + "matchPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "matchPolicy defines how the \"rules\" list is used to match incoming requests. Allowed values are \"Exact\" or \"Equivalent\".\n\n- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but \"rules\" only included `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: [\"deployments\"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the webhook.\n\n- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and \"rules\" only included `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: [\"deployments\"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the webhook.\n\nDefaults to \"Equivalent\"", + Type: []string{"string"}, + Format: "", + }, + }, + "namespaceSelector": { + SchemaProps: spec.SchemaProps{ + Description: "NamespaceSelector decides whether to run the webhook on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the webhook.\n\nFor example, to run the webhook on any objects whose namespace is not associated with \"runlevel\" of \"0\" or \"1\"; you will set the selector as follows: \"namespaceSelector\": {\n \"matchExpressions\": [\n {\n \"key\": \"runlevel\",\n \"operator\": \"NotIn\",\n \"values\": [\n \"0\",\n \"1\"\n ]\n }\n ]\n}\n\nIf instead you want to only run the webhook on any objects whose namespace is associated with the \"environment\" of \"prod\" or \"staging\"; you will set the selector as follows: \"namespaceSelector\": {\n \"matchExpressions\": [\n {\n \"key\": \"environment\",\n \"operator\": \"In\",\n \"values\": [\n \"prod\",\n \"staging\"\n ]\n }\n ]\n}\n\nSee https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.\n\nDefault to the empty LabelSelector, which matches everything.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "objectSelector": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectSelector decides whether to run the webhook based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the webhook, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "sideEffects": { + SchemaProps: spec.SchemaProps{ + Description: "SideEffects states whether this webhook has side effects. Acceptable values are: None, NoneOnDryRun (webhooks created via v1beta1 may also specify Some or Unknown). Webhooks with side effects MUST implement a reconciliation system, since a request may be rejected by a future step in the admission change and the side effects therefore need to be undone. Requests with the dryRun attribute will be auto-rejected if they match a webhook with sideEffects == Unknown or Some.", + Type: []string{"string"}, + Format: "", + }, + }, + "timeoutSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "TimeoutSeconds specifies the timeout for this webhook. After the timeout passes, the webhook call will be ignored or the API call will fail based on the failure policy. The timeout value must be between 1 and 30 seconds. Default to 10 seconds.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "admissionReviewVersions": { + SchemaProps: spec.SchemaProps{ + Description: "AdmissionReviewVersions is an ordered list of preferred `AdmissionReview` versions the Webhook expects. API server will try to use first version in the list which it supports. If none of the versions specified in this list supported by API server, validation will fail for this object. If a persisted webhook configuration specifies allowed versions and does not include any versions known to the API Server, calls to the webhook will fail and be subject to the failure policy.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "reinvocationPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation. Allowed values are \"Never\" and \"IfNeeded\".\n\nNever: the webhook will not be called more than once in a single admission evaluation.\n\nIfNeeded: the webhook will be called at least one additional time as part of the admission evaluation if the object being admitted is modified by other admission plugins after the initial webhook call. Webhooks that specify this option *must* be idempotent, able to process objects they previously admitted. Note: * the number of additional invocations is not guaranteed to be exactly one. * if additional invocations result in further modifications to the object, webhooks are not guaranteed to be invoked again. * webhooks that use this option may be reordered to minimize the number of additional invocations. * to validate an object after all mutations are guaranteed complete, use a validating admission webhook instead.\n\nDefaults to \"Never\".", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "clientConfig", "sideEffects", "admissionReviewVersions"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1.RuleWithOperations", "k8s.io/api/admissionregistration/v1.WebhookClientConfig", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_admissionregistration_v1_MutatingWebhookConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "webhooks": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Webhooks is a list of webhooks and the affected resources and operations.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1.MutatingWebhook"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1.MutatingWebhook", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_admissionregistration_v1_MutatingWebhookConfigurationList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MutatingWebhookConfigurationList is a list of MutatingWebhookConfiguration.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of MutatingWebhookConfiguration.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1.MutatingWebhookConfiguration"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1.MutatingWebhookConfiguration", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_admissionregistration_v1_Rule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Rule is a tuple of APIGroups, APIVersion, and Resources.It is recommended to make sure that all the tuple expansions are valid.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the API groups the resources belong to. '*' is all groups. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiVersions": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersions is the API versions the resources belong to. '*' is all versions. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to.\n\nFor example: 'pods' means pods. 'pods/log' means the log subresource of pods. '*' means all resources, but not subresources. 'pods/*' means all subresources of pods. '*/scale' means all scale subresources. '*/*' means all resources and their subresources.\n\nIf wildcard is present, the validation rule will ensure resources do not overlap with each other.\n\nDepending on the enclosing object, subresources might not be allowed. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "scope": { + SchemaProps: spec.SchemaProps{ + Description: "scope specifies the scope of this rule. Valid values are \"Cluster\", \"Namespaced\", and \"*\" \"Cluster\" means that only cluster-scoped resources will match this rule. Namespace API objects are cluster-scoped. \"Namespaced\" means that only namespaced resources will match this rule. \"*\" means that there are no scope restrictions. Subresources match the scope of their parent resource. Default is \"*\".", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_admissionregistration_v1_RuleWithOperations(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuleWithOperations is a tuple of Operations and Resources. It is recommended to make sure that all the tuple expansions are valid.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "operations": { + SchemaProps: spec.SchemaProps{ + Description: "Operations is the operations the admission hook cares about - CREATE, UPDATE, DELETE, CONNECT or * for all of those operations and any future admission operations that are added. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the API groups the resources belong to. '*' is all groups. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiVersions": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersions is the API versions the resources belong to. '*' is all versions. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to.\n\nFor example: 'pods' means pods. 'pods/log' means the log subresource of pods. '*' means all resources, but not subresources. 'pods/*' means all subresources of pods. '*/scale' means all scale subresources. '*/*' means all resources and their subresources.\n\nIf wildcard is present, the validation rule will ensure resources do not overlap with each other.\n\nDepending on the enclosing object, subresources might not be allowed. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "scope": { + SchemaProps: spec.SchemaProps{ + Description: "scope specifies the scope of this rule. Valid values are \"Cluster\", \"Namespaced\", and \"*\" \"Cluster\" means that only cluster-scoped resources will match this rule. Namespace API objects are cluster-scoped. \"Namespaced\" means that only namespaced resources will match this rule. \"*\" means that there are no scope restrictions. Subresources match the scope of their parent resource. Default is \"*\".", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_admissionregistration_v1_ServiceReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceReference holds a reference to Service.legacy.k8s.io", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "`namespace` is the namespace of the service. Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "`name` is the name of the service. Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "`path` is an optional URL path which will be sent in any request to this service.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the port on the service that hosting webhook. Default to 443 for backward compatibility. `port` should be a valid port number (1-65535, inclusive).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"namespace", "name"}, + }, + }, + } +} + +func schema_k8sio_api_admissionregistration_v1_ValidatingWebhook(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ValidatingWebhook describes an admission webhook and the resources and operations it applies to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the admission webhook. Name should be fully qualified, e.g., imagepolicy.kubernetes.io, where \"imagepolicy\" is the name of the webhook, and kubernetes.io is the name of the organization. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "clientConfig": { + SchemaProps: spec.SchemaProps{ + Description: "ClientConfig defines how to communicate with the hook. Required", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1.WebhookClientConfig"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules describes what operations on what resources/subresources the webhook cares about. The webhook cares about an operation if it matches _any_ Rule. However, in order to prevent ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks from putting the cluster in a state which cannot be recovered from without completely disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1.RuleWithOperations"), + }, + }, + }, + }, + }, + "failurePolicy": { + SchemaProps: spec.SchemaProps{ + Description: "FailurePolicy defines how unrecognized errors from the admission endpoint are handled - allowed values are Ignore or Fail. Defaults to Fail.", + Type: []string{"string"}, + Format: "", + }, + }, + "matchPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "matchPolicy defines how the \"rules\" list is used to match incoming requests. Allowed values are \"Exact\" or \"Equivalent\".\n\n- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but \"rules\" only included `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: [\"deployments\"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the webhook.\n\n- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and \"rules\" only included `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: [\"deployments\"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the webhook.\n\nDefaults to \"Equivalent\"", + Type: []string{"string"}, + Format: "", + }, + }, + "namespaceSelector": { + SchemaProps: spec.SchemaProps{ + Description: "NamespaceSelector decides whether to run the webhook on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the webhook.\n\nFor example, to run the webhook on any objects whose namespace is not associated with \"runlevel\" of \"0\" or \"1\"; you will set the selector as follows: \"namespaceSelector\": {\n \"matchExpressions\": [\n {\n \"key\": \"runlevel\",\n \"operator\": \"NotIn\",\n \"values\": [\n \"0\",\n \"1\"\n ]\n }\n ]\n}\n\nIf instead you want to only run the webhook on any objects whose namespace is associated with the \"environment\" of \"prod\" or \"staging\"; you will set the selector as follows: \"namespaceSelector\": {\n \"matchExpressions\": [\n {\n \"key\": \"environment\",\n \"operator\": \"In\",\n \"values\": [\n \"prod\",\n \"staging\"\n ]\n }\n ]\n}\n\nSee https://kubernetes.io/docs/concepts/overview/working-with-objects/labels for more examples of label selectors.\n\nDefault to the empty LabelSelector, which matches everything.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "objectSelector": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectSelector decides whether to run the webhook based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the webhook, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "sideEffects": { + SchemaProps: spec.SchemaProps{ + Description: "SideEffects states whether this webhook has side effects. Acceptable values are: None, NoneOnDryRun (webhooks created via v1beta1 may also specify Some or Unknown). Webhooks with side effects MUST implement a reconciliation system, since a request may be rejected by a future step in the admission change and the side effects therefore need to be undone. Requests with the dryRun attribute will be auto-rejected if they match a webhook with sideEffects == Unknown or Some.", + Type: []string{"string"}, + Format: "", + }, + }, + "timeoutSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "TimeoutSeconds specifies the timeout for this webhook. After the timeout passes, the webhook call will be ignored or the API call will fail based on the failure policy. The timeout value must be between 1 and 30 seconds. Default to 10 seconds.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "admissionReviewVersions": { + SchemaProps: spec.SchemaProps{ + Description: "AdmissionReviewVersions is an ordered list of preferred `AdmissionReview` versions the Webhook expects. API server will try to use first version in the list which it supports. If none of the versions specified in this list supported by API server, validation will fail for this object. If a persisted webhook configuration specifies allowed versions and does not include any versions known to the API Server, calls to the webhook will fail and be subject to the failure policy.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"name", "clientConfig", "sideEffects", "admissionReviewVersions"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1.RuleWithOperations", "k8s.io/api/admissionregistration/v1.WebhookClientConfig", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_admissionregistration_v1_ValidatingWebhookConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "webhooks": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Webhooks is a list of webhooks and the affected resources and operations.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1.ValidatingWebhook"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1.ValidatingWebhook", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_admissionregistration_v1_ValidatingWebhookConfigurationList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ValidatingWebhookConfigurationList is a list of ValidatingWebhookConfiguration.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of ValidatingWebhookConfiguration.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1.ValidatingWebhookConfiguration"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1.ValidatingWebhookConfiguration", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_admissionregistration_v1_WebhookClientConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "WebhookClientConfig contains the information to make a TLS connection with the webhook", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "url": { + SchemaProps: spec.SchemaProps{ + Description: "`url` gives the location of the webhook, in standard URL form (`scheme://host:port/path`). Exactly one of `url` or `service` must be specified.\n\nThe `host` should not refer to a service running in the cluster; use the `service` field instead. The host might be resolved via external DNS in some apiservers (e.g., `kube-apiserver` cannot resolve in-cluster DNS as that would be a layering violation). `host` may also be an IP address.\n\nPlease note that using `localhost` or `127.0.0.1` as a `host` is risky unless you take great care to run this webhook on all hosts which run an apiserver which might need to make calls to this webhook. Such installs are likely to be non-portable, i.e., not easy to turn up in a new cluster.\n\nThe scheme must be \"https\"; the URL must begin with \"https://\".\n\nA path is optional, and if present may be any string permissible in a URL. You may use the path to pass an arbitrary string to the webhook, for example, a cluster identifier.\n\nAttempting to use a user or basic auth e.g. \"user:password@\" is not allowed. Fragments (\"#...\") and query parameters (\"?...\") are not allowed, either.", + Type: []string{"string"}, + Format: "", + }, + }, + "service": { + SchemaProps: spec.SchemaProps{ + Description: "`service` is a reference to the service for this webhook. Either `service` or `url` must be specified.\n\nIf the webhook is running within the cluster, then you should use `service`.", + Ref: ref("k8s.io/api/admissionregistration/v1.ServiceReference"), + }, + }, + "caBundle": { + SchemaProps: spec.SchemaProps{ + Description: "`caBundle` is a PEM encoded CA bundle which will be used to validate the webhook's server certificate. If unspecified, system trust roots on the apiserver are used.", + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1.ServiceReference"}, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_MutatingWebhook(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MutatingWebhook describes an admission webhook and the resources and operations it applies to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the admission webhook. Name should be fully qualified, e.g., imagepolicy.kubernetes.io, where \"imagepolicy\" is the name of the webhook, and kubernetes.io is the name of the organization. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "clientConfig": { + SchemaProps: spec.SchemaProps{ + Description: "ClientConfig defines how to communicate with the hook. Required", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1beta1.WebhookClientConfig"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules describes what operations on what resources/subresources the webhook cares about. The webhook cares about an operation if it matches _any_ Rule. However, in order to prevent ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks from putting the cluster in a state which cannot be recovered from without completely disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1beta1.RuleWithOperations"), + }, + }, + }, + }, + }, + "failurePolicy": { + SchemaProps: spec.SchemaProps{ + Description: "FailurePolicy defines how unrecognized errors from the admission endpoint are handled - allowed values are Ignore or Fail. Defaults to Ignore.", + Type: []string{"string"}, + Format: "", + }, + }, + "matchPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "matchPolicy defines how the \"rules\" list is used to match incoming requests. Allowed values are \"Exact\" or \"Equivalent\".\n\n- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but \"rules\" only included `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: [\"deployments\"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the webhook.\n\n- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and \"rules\" only included `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: [\"deployments\"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the webhook.\n\nDefaults to \"Exact\"", + Type: []string{"string"}, + Format: "", + }, + }, + "namespaceSelector": { + SchemaProps: spec.SchemaProps{ + Description: "NamespaceSelector decides whether to run the webhook on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the webhook.\n\nFor example, to run the webhook on any objects whose namespace is not associated with \"runlevel\" of \"0\" or \"1\"; you will set the selector as follows: \"namespaceSelector\": {\n \"matchExpressions\": [\n {\n \"key\": \"runlevel\",\n \"operator\": \"NotIn\",\n \"values\": [\n \"0\",\n \"1\"\n ]\n }\n ]\n}\n\nIf instead you want to only run the webhook on any objects whose namespace is associated with the \"environment\" of \"prod\" or \"staging\"; you will set the selector as follows: \"namespaceSelector\": {\n \"matchExpressions\": [\n {\n \"key\": \"environment\",\n \"operator\": \"In\",\n \"values\": [\n \"prod\",\n \"staging\"\n ]\n }\n ]\n}\n\nSee https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.\n\nDefault to the empty LabelSelector, which matches everything.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "objectSelector": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectSelector decides whether to run the webhook based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the webhook, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "sideEffects": { + SchemaProps: spec.SchemaProps{ + Description: "SideEffects states whether this webhook has side effects. Acceptable values are: Unknown, None, Some, NoneOnDryRun Webhooks with side effects MUST implement a reconciliation system, since a request may be rejected by a future step in the admission change and the side effects therefore need to be undone. Requests with the dryRun attribute will be auto-rejected if they match a webhook with sideEffects == Unknown or Some. Defaults to Unknown.", + Type: []string{"string"}, + Format: "", + }, + }, + "timeoutSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "TimeoutSeconds specifies the timeout for this webhook. After the timeout passes, the webhook call will be ignored or the API call will fail based on the failure policy. The timeout value must be between 1 and 30 seconds. Default to 30 seconds.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "admissionReviewVersions": { + SchemaProps: spec.SchemaProps{ + Description: "AdmissionReviewVersions is an ordered list of preferred `AdmissionReview` versions the Webhook expects. API server will try to use first version in the list which it supports. If none of the versions specified in this list supported by API server, validation will fail for this object. If a persisted webhook configuration specifies allowed versions and does not include any versions known to the API Server, calls to the webhook will fail and be subject to the failure policy. Default to `['v1beta1']`.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "reinvocationPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation. Allowed values are \"Never\" and \"IfNeeded\".\n\nNever: the webhook will not be called more than once in a single admission evaluation.\n\nIfNeeded: the webhook will be called at least one additional time as part of the admission evaluation if the object being admitted is modified by other admission plugins after the initial webhook call. Webhooks that specify this option *must* be idempotent, able to process objects they previously admitted. Note: * the number of additional invocations is not guaranteed to be exactly one. * if additional invocations result in further modifications to the object, webhooks are not guaranteed to be invoked again. * webhooks that use this option may be reordered to minimize the number of additional invocations. * to validate an object after all mutations are guaranteed complete, use a validating admission webhook instead.\n\nDefaults to \"Never\".", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "clientConfig"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1beta1.RuleWithOperations", "k8s.io/api/admissionregistration/v1beta1.WebhookClientConfig", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_MutatingWebhookConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object. Deprecated in v1.16, planned for removal in v1.19. Use admissionregistration.k8s.io/v1 MutatingWebhookConfiguration instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "webhooks": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Webhooks is a list of webhooks and the affected resources and operations.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1beta1.MutatingWebhook"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1beta1.MutatingWebhook", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_MutatingWebhookConfigurationList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MutatingWebhookConfigurationList is a list of MutatingWebhookConfiguration.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of MutatingWebhookConfiguration.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1beta1.MutatingWebhookConfiguration"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1beta1.MutatingWebhookConfiguration", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_Rule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Rule is a tuple of APIGroups, APIVersion, and Resources.It is recommended to make sure that all the tuple expansions are valid.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the API groups the resources belong to. '*' is all groups. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiVersions": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersions is the API versions the resources belong to. '*' is all versions. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to.\n\nFor example: 'pods' means pods. 'pods/log' means the log subresource of pods. '*' means all resources, but not subresources. 'pods/*' means all subresources of pods. '*/scale' means all scale subresources. '*/*' means all resources and their subresources.\n\nIf wildcard is present, the validation rule will ensure resources do not overlap with each other.\n\nDepending on the enclosing object, subresources might not be allowed. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "scope": { + SchemaProps: spec.SchemaProps{ + Description: "scope specifies the scope of this rule. Valid values are \"Cluster\", \"Namespaced\", and \"*\" \"Cluster\" means that only cluster-scoped resources will match this rule. Namespace API objects are cluster-scoped. \"Namespaced\" means that only namespaced resources will match this rule. \"*\" means that there are no scope restrictions. Subresources match the scope of their parent resource. Default is \"*\".", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_RuleWithOperations(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuleWithOperations is a tuple of Operations and Resources. It is recommended to make sure that all the tuple expansions are valid.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "operations": { + SchemaProps: spec.SchemaProps{ + Description: "Operations is the operations the admission hook cares about - CREATE, UPDATE, DELETE, CONNECT or * for all of those operations and any future admission operations that are added. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the API groups the resources belong to. '*' is all groups. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiVersions": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersions is the API versions the resources belong to. '*' is all versions. If '*' is present, the length of the slice must be one. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to.\n\nFor example: 'pods' means pods. 'pods/log' means the log subresource of pods. '*' means all resources, but not subresources. 'pods/*' means all subresources of pods. '*/scale' means all scale subresources. '*/*' means all resources and their subresources.\n\nIf wildcard is present, the validation rule will ensure resources do not overlap with each other.\n\nDepending on the enclosing object, subresources might not be allowed. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "scope": { + SchemaProps: spec.SchemaProps{ + Description: "scope specifies the scope of this rule. Valid values are \"Cluster\", \"Namespaced\", and \"*\" \"Cluster\" means that only cluster-scoped resources will match this rule. Namespace API objects are cluster-scoped. \"Namespaced\" means that only namespaced resources will match this rule. \"*\" means that there are no scope restrictions. Subresources match the scope of their parent resource. Default is \"*\".", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_ServiceReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceReference holds a reference to Service.legacy.k8s.io", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "`namespace` is the namespace of the service. Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "`name` is the name of the service. Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "`path` is an optional URL path which will be sent in any request to this service.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the port on the service that hosting webhook. Default to 443 for backward compatibility. `port` should be a valid port number (1-65535, inclusive).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"namespace", "name"}, + }, + }, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_ValidatingWebhook(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ValidatingWebhook describes an admission webhook and the resources and operations it applies to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the admission webhook. Name should be fully qualified, e.g., imagepolicy.kubernetes.io, where \"imagepolicy\" is the name of the webhook, and kubernetes.io is the name of the organization. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "clientConfig": { + SchemaProps: spec.SchemaProps{ + Description: "ClientConfig defines how to communicate with the hook. Required", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1beta1.WebhookClientConfig"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules describes what operations on what resources/subresources the webhook cares about. The webhook cares about an operation if it matches _any_ Rule. However, in order to prevent ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks from putting the cluster in a state which cannot be recovered from without completely disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1beta1.RuleWithOperations"), + }, + }, + }, + }, + }, + "failurePolicy": { + SchemaProps: spec.SchemaProps{ + Description: "FailurePolicy defines how unrecognized errors from the admission endpoint are handled - allowed values are Ignore or Fail. Defaults to Ignore.", + Type: []string{"string"}, + Format: "", + }, + }, + "matchPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "matchPolicy defines how the \"rules\" list is used to match incoming requests. Allowed values are \"Exact\" or \"Equivalent\".\n\n- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but \"rules\" only included `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: [\"deployments\"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the webhook.\n\n- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and \"rules\" only included `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: [\"deployments\"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the webhook.\n\nDefaults to \"Exact\"", + Type: []string{"string"}, + Format: "", + }, + }, + "namespaceSelector": { + SchemaProps: spec.SchemaProps{ + Description: "NamespaceSelector decides whether to run the webhook on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the webhook.\n\nFor example, to run the webhook on any objects whose namespace is not associated with \"runlevel\" of \"0\" or \"1\"; you will set the selector as follows: \"namespaceSelector\": {\n \"matchExpressions\": [\n {\n \"key\": \"runlevel\",\n \"operator\": \"NotIn\",\n \"values\": [\n \"0\",\n \"1\"\n ]\n }\n ]\n}\n\nIf instead you want to only run the webhook on any objects whose namespace is associated with the \"environment\" of \"prod\" or \"staging\"; you will set the selector as follows: \"namespaceSelector\": {\n \"matchExpressions\": [\n {\n \"key\": \"environment\",\n \"operator\": \"In\",\n \"values\": [\n \"prod\",\n \"staging\"\n ]\n }\n ]\n}\n\nSee https://kubernetes.io/docs/concepts/overview/working-with-objects/labels for more examples of label selectors.\n\nDefault to the empty LabelSelector, which matches everything.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "objectSelector": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectSelector decides whether to run the webhook based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the webhook, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "sideEffects": { + SchemaProps: spec.SchemaProps{ + Description: "SideEffects states whether this webhook has side effects. Acceptable values are: Unknown, None, Some, NoneOnDryRun Webhooks with side effects MUST implement a reconciliation system, since a request may be rejected by a future step in the admission change and the side effects therefore need to be undone. Requests with the dryRun attribute will be auto-rejected if they match a webhook with sideEffects == Unknown or Some. Defaults to Unknown.", + Type: []string{"string"}, + Format: "", + }, + }, + "timeoutSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "TimeoutSeconds specifies the timeout for this webhook. After the timeout passes, the webhook call will be ignored or the API call will fail based on the failure policy. The timeout value must be between 1 and 30 seconds. Default to 30 seconds.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "admissionReviewVersions": { + SchemaProps: spec.SchemaProps{ + Description: "AdmissionReviewVersions is an ordered list of preferred `AdmissionReview` versions the Webhook expects. API server will try to use first version in the list which it supports. If none of the versions specified in this list supported by API server, validation will fail for this object. If a persisted webhook configuration specifies allowed versions and does not include any versions known to the API Server, calls to the webhook will fail and be subject to the failure policy. Default to `['v1beta1']`.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"name", "clientConfig"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1beta1.RuleWithOperations", "k8s.io/api/admissionregistration/v1beta1.WebhookClientConfig", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_ValidatingWebhookConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it. Deprecated in v1.16, planned for removal in v1.19. Use admissionregistration.k8s.io/v1 ValidatingWebhookConfiguration instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "webhooks": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Webhooks is a list of webhooks and the affected resources and operations.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1beta1.ValidatingWebhook"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1beta1.ValidatingWebhook", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_ValidatingWebhookConfigurationList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ValidatingWebhookConfigurationList is a list of ValidatingWebhookConfiguration.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of ValidatingWebhookConfiguration.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/admissionregistration/v1beta1.ValidatingWebhookConfiguration"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1beta1.ValidatingWebhookConfiguration", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_admissionregistration_v1beta1_WebhookClientConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "WebhookClientConfig contains the information to make a TLS connection with the webhook", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "url": { + SchemaProps: spec.SchemaProps{ + Description: "`url` gives the location of the webhook, in standard URL form (`scheme://host:port/path`). Exactly one of `url` or `service` must be specified.\n\nThe `host` should not refer to a service running in the cluster; use the `service` field instead. The host might be resolved via external DNS in some apiservers (e.g., `kube-apiserver` cannot resolve in-cluster DNS as that would be a layering violation). `host` may also be an IP address.\n\nPlease note that using `localhost` or `127.0.0.1` as a `host` is risky unless you take great care to run this webhook on all hosts which run an apiserver which might need to make calls to this webhook. Such installs are likely to be non-portable, i.e., not easy to turn up in a new cluster.\n\nThe scheme must be \"https\"; the URL must begin with \"https://\".\n\nA path is optional, and if present may be any string permissible in a URL. You may use the path to pass an arbitrary string to the webhook, for example, a cluster identifier.\n\nAttempting to use a user or basic auth e.g. \"user:password@\" is not allowed. Fragments (\"#...\") and query parameters (\"?...\") are not allowed, either.", + Type: []string{"string"}, + Format: "", + }, + }, + "service": { + SchemaProps: spec.SchemaProps{ + Description: "`service` is a reference to the service for this webhook. Either `service` or `url` must be specified.\n\nIf the webhook is running within the cluster, then you should use `service`.", + Ref: ref("k8s.io/api/admissionregistration/v1beta1.ServiceReference"), + }, + }, + "caBundle": { + SchemaProps: spec.SchemaProps{ + Description: "`caBundle` is a PEM encoded CA bundle which will be used to validate the webhook's server certificate. If unspecified, system trust roots on the apiserver are used.", + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/admissionregistration/v1beta1.ServiceReference"}, + } +} + +func schema_k8sio_api_apiserverinternal_v1alpha1_ServerStorageVersion(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "An API server instance reports the version it can decode and the version it encodes objects to when persisting objects in the backend.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiServerID": { + SchemaProps: spec.SchemaProps{ + Description: "The ID of the reporting API server.", + Type: []string{"string"}, + Format: "", + }, + }, + "encodingVersion": { + SchemaProps: spec.SchemaProps{ + Description: "The API server encodes the object to this version when persisting it in the backend (e.g., etcd).", + Type: []string{"string"}, + Format: "", + }, + }, + "decodableVersions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The API server can decode objects encoded in these versions. The encodingVersion must be included in the decodableVersions.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersion(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "\n Storage version of a specific resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "The name is ..", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec is an empty spec. It is here to comply with Kubernetes API style.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apiserverinternal/v1alpha1.StorageVersionSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "API server instances report the version they can decode and the version they encode objects to when persisting objects in the backend.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apiserverinternal/v1alpha1.StorageVersionStatus"), + }, + }, + }, + Required: []string{"spec", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apiserverinternal/v1alpha1.StorageVersionSpec", "k8s.io/api/apiserverinternal/v1alpha1.StorageVersionStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersionCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Describes the state of the storageVersion at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of the condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "If set, this represents the .metadata.generation that the condition was set based upon.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status", "reason"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersionList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A list of StorageVersions.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apiserverinternal/v1alpha1.StorageVersion"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apiserverinternal/v1alpha1.StorageVersion", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersionSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StorageVersionSpec is an empty spec.", + Type: []string{"object"}, + }, + }, + } +} + +func schema_k8sio_api_apiserverinternal_v1alpha1_StorageVersionStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "API server instances report the versions they can decode and the version they encode objects to when persisting objects in the backend.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "storageVersions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "apiServerID", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The reported versions per API server instance.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apiserverinternal/v1alpha1.ServerStorageVersion"), + }, + }, + }, + }, + }, + "commonEncodingVersion": { + SchemaProps: spec.SchemaProps{ + Description: "If all API server instances agree on the same encoding storage version, then this field is set to that version. Otherwise this field is left empty. API servers should finish updating its storageVersionStatus entry before serving write operations, so that this field will be in sync with the reality.", + Type: []string{"string"}, + Format: "", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The latest available observations of the storageVersion's state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apiserverinternal/v1alpha1.StorageVersionCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apiserverinternal/v1alpha1.ServerStorageVersion", "k8s.io/api/apiserverinternal/v1alpha1.StorageVersionCondition"}, + } +} + +func schema_k8sio_api_apps_v1_ControllerRevision(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "data": { + SchemaProps: spec.SchemaProps{ + Description: "Data is the serialized representation of the state.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + "revision": { + SchemaProps: spec.SchemaProps{ + Description: "Revision indicates the revision of the state represented by Data.", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"revision"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_k8sio_api_apps_v1_ControllerRevisionList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ControllerRevisionList is a resource containing a list of ControllerRevision objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of ControllerRevisions", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.ControllerRevision"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.ControllerRevision", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1_DaemonSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSet represents the configuration of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "The desired behavior of this daemon set. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DaemonSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "The current status of this daemon set. This data may be out of date by some window of time. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DaemonSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.DaemonSetSpec", "k8s.io/api/apps/v1.DaemonSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1_DaemonSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetCondition describes the state of a DaemonSet at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of DaemonSet condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1_DaemonSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetList is a collection of daemon sets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "A list of daemon sets.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DaemonSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.DaemonSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1_DaemonSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetSpec is the specification of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "A label query over pods that are managed by the daemon set. Must match in order to be controlled. It must match the pod template's labels. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "An object that describes the pod that will be created. The DaemonSet will create exactly one copy of this pod on every node that matches the template's node selector (or on every node if no node selector is specified). More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#pod-template", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "updateStrategy": { + SchemaProps: spec.SchemaProps{ + Description: "An update strategy to replace existing DaemonSet pods with new pods.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DaemonSetUpdateStrategy"), + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "The minimum number of seconds for which a newly created DaemonSet pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of old history to retain to allow rollback. This is a pointer to distinguish between explicit zero and not specified. Defaults to 10.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"selector", "template"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.DaemonSetUpdateStrategy", "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1_DaemonSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetStatus represents the current status of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "currentNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that are running at least 1 daemon pod and are supposed to run the daemon pod. More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberMisscheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that are running the daemon pod, but are not supposed to run the daemon pod. More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "desiredNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The total number of nodes that should be running the daemon pod (including nodes correctly running the daemon pod). More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberReady": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have one or more of the daemon pod running and ready.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "The most recent generation observed by the daemon set controller.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "updatedNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The total number of nodes that are running updated daemon pod", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberAvailable": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have one or more of the daemon pod running and available (ready for at least spec.minReadySeconds)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have none of the daemon pod running and available (ready for at least spec.minReadySeconds)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "Count of hash collisions for the DaemonSet. The DaemonSet controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ControllerRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a DaemonSet's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DaemonSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"currentNumberScheduled", "numberMisscheduled", "desiredNumberScheduled", "numberReady"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.DaemonSetCondition"}, + } +} + +func schema_k8sio_api_apps_v1_DaemonSetUpdateStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetUpdateStrategy is a struct used to control the update strategy for a DaemonSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of daemon set update. Can be \"RollingUpdate\" or \"OnDelete\". Default is RollingUpdate.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "Rolling update config params. Present only if type = \"RollingUpdate\".", + Ref: ref("k8s.io/api/apps/v1.RollingUpdateDaemonSet"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.RollingUpdateDaemonSet"}, + } +} + +func schema_k8sio_api_apps_v1_Deployment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Deployment enables declarative updates for Pods and ReplicaSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the Deployment.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DeploymentSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the Deployment.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DeploymentStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.DeploymentSpec", "k8s.io/api/apps/v1.DeploymentStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1_DeploymentCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentCondition describes the state of a deployment at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of deployment condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastUpdateTime": { + SchemaProps: spec.SchemaProps{ + Description: "The last time this condition was updated.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1_DeploymentList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentList is a list of Deployments.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of Deployments.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.Deployment"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.Deployment", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1_DeploymentSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentSpec is the specification of the desired behavior of the Deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Number of desired pods. This is a pointer to distinguish between explicit zero and not specified. Defaults to 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Label selector for pods. Existing ReplicaSets whose pods are selected by this will be the ones affected by this deployment. It must match the pod template's labels.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template describes the pods that will be created.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "strategy": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-strategy": "retainKeys", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The deployment strategy to use to replace existing pods with new ones.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DeploymentStrategy"), + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum number of seconds for which a newly created pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of old ReplicaSets to retain to allow rollback. This is a pointer to distinguish between explicit zero and not specified. Defaults to 10.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "paused": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates that the deployment is paused.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "progressDeadlineSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum time in seconds for a deployment to make progress before it is considered to be failed. The deployment controller will continue to process failed deployments and a condition with a ProgressDeadlineExceeded reason will be surfaced in the deployment status. Note that progress will not be estimated during the time a deployment is paused. Defaults to 600s.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"selector", "template"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.DeploymentStrategy", "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1_DeploymentStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentStatus is the most recently observed status of the Deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "The generation observed by the deployment controller.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of non-terminated pods targeted by this deployment (their labels match the selector).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "updatedReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of non-terminated pods targeted by this deployment that have the desired template spec.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of ready pods targeted by this deployment.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "availableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of available pods (ready for at least minReadySeconds) targeted by this deployment.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "unavailableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of unavailable pods targeted by this deployment. This is the total number of pods that are still required for the deployment to have 100% available capacity. They may either be pods that are running but not yet available or pods that still have not been created.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a deployment's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.DeploymentCondition"), + }, + }, + }, + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "Count of hash collisions for the Deployment. The Deployment controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ReplicaSet.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.DeploymentCondition"}, + } +} + +func schema_k8sio_api_apps_v1_DeploymentStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentStrategy describes how to replace existing pods with new ones.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of deployment. Can be \"Recreate\" or \"RollingUpdate\". Default is RollingUpdate.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "Rolling update config params. Present only if DeploymentStrategyType = RollingUpdate.", + Ref: ref("k8s.io/api/apps/v1.RollingUpdateDeployment"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.RollingUpdateDeployment"}, + } +} + +func schema_k8sio_api_apps_v1_ReplicaSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSet ensures that a specified number of pod replicas are running at any given time.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "If the Labels of a ReplicaSet are empty, they are defaulted to be the same as the Pod(s) that the ReplicaSet manages. Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the specification of the desired behavior of the ReplicaSet. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.ReplicaSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the most recently observed status of the ReplicaSet. This data may be out of date by some window of time. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.ReplicaSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.ReplicaSetSpec", "k8s.io/api/apps/v1.ReplicaSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1_ReplicaSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetCondition describes the state of a replica set at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of replica set condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "The last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1_ReplicaSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetList is a collection of ReplicaSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.ReplicaSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.ReplicaSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1_ReplicaSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetSpec is the specification of a ReplicaSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Replicas is the number of desired replicas. This is a pointer to distinguish between explicit zero and unspecified. Defaults to 1. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/#what-is-a-replicationcontroller", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum number of seconds for which a newly created pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Selector is a label query over pods that should match the replica count. Label keys and values that must match in order to be controlled by this replica set. It must match the pod template's labels. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template is the object that describes the pod that will be created if insufficient replicas are detected. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#pod-template", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + }, + Required: []string{"selector"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1_ReplicaSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetStatus represents the current status of a ReplicaSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Replicas is the most recently oberved number of replicas. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/#what-is-a-replicationcontroller", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "fullyLabeledReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of pods that have labels matching the labels of the pod template of the replicaset.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of ready replicas for this replica set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "availableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of available replicas (ready for at least minReadySeconds) for this replica set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "ObservedGeneration reflects the generation of the most recently observed ReplicaSet.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a replica set's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.ReplicaSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.ReplicaSetCondition"}, + } +} + +func schema_k8sio_api_apps_v1_RollingUpdateDaemonSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Spec to control the desired behavior of daemon set rolling update.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of DaemonSet pods that can be unavailable during the update. Value can be an absolute number (ex: 5) or a percentage of total number of DaemonSet pods at the start of the update (ex: 10%). Absolute number is calculated from percentage by rounding up. This cannot be 0. Default value is 1. Example: when this is set to 30%, at most 30% of the total number of nodes that should be running the daemon pod (i.e. status.desiredNumberScheduled) can have their pods stopped for an update at any given time. The update starts by stopping at most 30% of those DaemonSet pods and then brings up new DaemonSet pods in their place. Once the new pods are available, it then proceeds onto other DaemonSet pods, thus ensuring that at least 70% of original number of DaemonSet pods are available at all times during the update.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_apps_v1_RollingUpdateDeployment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Spec to control the desired behavior of rolling update.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of pods that can be unavailable during the update. Value can be an absolute number (ex: 5) or a percentage of desired pods (ex: 10%). Absolute number is calculated from percentage by rounding down. This can not be 0 if MaxSurge is 0. Defaults to 25%. Example: when this is set to 30%, the old ReplicaSet can be scaled down to 70% of desired pods immediately when the rolling update starts. Once new pods are ready, old ReplicaSet can be scaled down further, followed by scaling up the new ReplicaSet, ensuring that the total number of pods available at all times during the update is at least 70% of desired pods.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "maxSurge": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of pods that can be scheduled above the desired number of pods. Value can be an absolute number (ex: 5) or a percentage of desired pods (ex: 10%). This can not be 0 if MaxUnavailable is 0. Absolute number is calculated from percentage by rounding up. Defaults to 25%. Example: when this is set to 30%, the new ReplicaSet can be scaled up immediately when the rolling update starts, such that the total number of old and new pods do not exceed 130% of desired pods. Once old pods have been killed, new ReplicaSet can be scaled up further, ensuring that total number of pods running at any time during the update is at most 130% of desired pods.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_apps_v1_RollingUpdateStatefulSetStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RollingUpdateStatefulSetStrategy is used to communicate parameter for RollingUpdateStatefulSetStrategyType.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "partition": { + SchemaProps: spec.SchemaProps{ + Description: "Partition indicates the ordinal at which the StatefulSet should be partitioned. Default value is 0.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_apps_v1_StatefulSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the desired identities of pods in this set.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.StatefulSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the current status of Pods in this StatefulSet. This data may be out of date by some window of time.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.StatefulSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.StatefulSetSpec", "k8s.io/api/apps/v1.StatefulSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1_StatefulSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetCondition describes the state of a statefulset at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of statefulset condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1_StatefulSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetList is a collection of StatefulSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.StatefulSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.StatefulSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1_StatefulSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A StatefulSetSpec is the specification of a StatefulSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "replicas is the desired number of replicas of the given Template. These are replicas in the sense that they are instantiations of the same Template, but individual replicas also have a consistent identity. If unspecified, defaults to 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is a label query over pods that should match the replica count. It must match the pod template's labels. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "template is the object that describes the pod that will be created if insufficient replicas are detected. Each pod stamped out by the StatefulSet will fulfill this Template, but have a unique identity from the rest of the StatefulSet.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "volumeClaimTemplates": { + SchemaProps: spec.SchemaProps{ + Description: "volumeClaimTemplates is a list of claims that pods are allowed to reference. The StatefulSet controller is responsible for mapping network identities to claims in a way that maintains the identity of a pod. Every claim in this list must have at least one matching (by name) volumeMount in one container in the template. A claim in this list takes precedence over any volumes in the template, with the same name.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaim"), + }, + }, + }, + }, + }, + "serviceName": { + SchemaProps: spec.SchemaProps{ + Description: "serviceName is the name of the service that governs this StatefulSet. This service must exist before the StatefulSet, and is responsible for the network identity of the set. Pods get DNS/hostnames that follow the pattern: pod-specific-string.serviceName.default.svc.cluster.local where \"pod-specific-string\" is managed by the StatefulSet controller.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "podManagementPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "podManagementPolicy controls how pods are created during initial scale up, when replacing pods on nodes, or when scaling down. The default policy is `OrderedReady`, where pods are created in increasing order (pod-0, then pod-1, etc) and the controller will wait until each pod is ready before continuing. When scaling down, the pods are removed in the opposite order. The alternative policy is `Parallel` which will create pods in parallel to match the desired scale without waiting, and on scale down will delete all pods at once.", + Type: []string{"string"}, + Format: "", + }, + }, + "updateStrategy": { + SchemaProps: spec.SchemaProps{ + Description: "updateStrategy indicates the StatefulSetUpdateStrategy that will be employed to update Pods in the StatefulSet when a revision is made to Template.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.StatefulSetUpdateStrategy"), + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "revisionHistoryLimit is the maximum number of revisions that will be maintained in the StatefulSet's revision history. The revision history consists of all revisions not represented by a currently applied StatefulSetSpec version. The default value is 10.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"selector", "template", "serviceName"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.StatefulSetUpdateStrategy", "k8s.io/api/core/v1.PersistentVolumeClaim", "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1_StatefulSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetStatus represents the current state of a StatefulSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "observedGeneration is the most recent generation observed for this StatefulSet. It corresponds to the StatefulSet's generation, which is updated on mutation by the API Server.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "replicas is the number of Pods created by the StatefulSet controller.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "readyReplicas is the number of Pods created by the StatefulSet controller that have a Ready Condition.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "currentReplicas is the number of Pods created by the StatefulSet controller from the StatefulSet version indicated by currentRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "updatedReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "updatedReplicas is the number of Pods created by the StatefulSet controller from the StatefulSet version indicated by updateRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentRevision": { + SchemaProps: spec.SchemaProps{ + Description: "currentRevision, if not empty, indicates the version of the StatefulSet used to generate Pods in the sequence [0,currentReplicas).", + Type: []string{"string"}, + Format: "", + }, + }, + "updateRevision": { + SchemaProps: spec.SchemaProps{ + Description: "updateRevision, if not empty, indicates the version of the StatefulSet used to generate Pods in the sequence [replicas-updatedReplicas,replicas)", + Type: []string{"string"}, + Format: "", + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "collisionCount is the count of hash collisions for the StatefulSet. The StatefulSet controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ControllerRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a statefulset's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1.StatefulSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.StatefulSetCondition"}, + } +} + +func schema_k8sio_api_apps_v1_StatefulSetUpdateStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetUpdateStrategy indicates the strategy that the StatefulSet controller will use to perform updates. It includes any additional parameters necessary to perform the update for the indicated strategy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type indicates the type of the StatefulSetUpdateStrategy. Default is RollingUpdate.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "RollingUpdate is used to communicate parameters when Type is RollingUpdateStatefulSetStrategyType.", + Ref: ref("k8s.io/api/apps/v1.RollingUpdateStatefulSetStrategy"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1.RollingUpdateStatefulSetStrategy"}, + } +} + +func schema_k8sio_api_apps_v1beta1_ControllerRevision(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of ControllerRevision is deprecated by apps/v1beta2/ControllerRevision. See the release notes for more information. ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "data": { + SchemaProps: spec.SchemaProps{ + Description: "Data is the serialized representation of the state.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + "revision": { + SchemaProps: spec.SchemaProps{ + Description: "Revision indicates the revision of the state represented by Data.", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"revision"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_k8sio_api_apps_v1beta1_ControllerRevisionList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ControllerRevisionList is a resource containing a list of ControllerRevision objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of ControllerRevisions", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.ControllerRevision"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.ControllerRevision", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta1_Deployment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of Deployment is deprecated by apps/v1beta2/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the Deployment.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.DeploymentSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the Deployment.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.DeploymentStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.DeploymentSpec", "k8s.io/api/apps/v1beta1.DeploymentStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta1_DeploymentCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentCondition describes the state of a deployment at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of deployment condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastUpdateTime": { + SchemaProps: spec.SchemaProps{ + Description: "The last time this condition was updated.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1beta1_DeploymentList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentList is a list of Deployments.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of Deployments.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.Deployment"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.Deployment", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta1_DeploymentRollback(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED. DeploymentRollback stores the information required to rollback a deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Required: This must match the Name of a deployment.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "updatedAnnotations": { + SchemaProps: spec.SchemaProps{ + Description: "The annotations to be updated to a deployment", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "rollbackTo": { + SchemaProps: spec.SchemaProps{ + Description: "The config of this deployment rollback.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.RollbackConfig"), + }, + }, + }, + Required: []string{"name", "rollbackTo"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.RollbackConfig"}, + } +} + +func schema_k8sio_api_apps_v1beta1_DeploymentSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentSpec is the specification of the desired behavior of the Deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Number of desired pods. This is a pointer to distinguish between explicit zero and not specified. Defaults to 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Label selector for pods. Existing ReplicaSets whose pods are selected by this will be the ones affected by this deployment.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template describes the pods that will be created.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "strategy": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-strategy": "retainKeys", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The deployment strategy to use to replace existing pods with new ones.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.DeploymentStrategy"), + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum number of seconds for which a newly created pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of old ReplicaSets to retain to allow rollback. This is a pointer to distinguish between explicit zero and not specified. Defaults to 2.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "paused": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates that the deployment is paused.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "rollbackTo": { + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED. The config this deployment is rolling back to. Will be cleared after rollback is done.", + Ref: ref("k8s.io/api/apps/v1beta1.RollbackConfig"), + }, + }, + "progressDeadlineSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum time in seconds for a deployment to make progress before it is considered to be failed. The deployment controller will continue to process failed deployments and a condition with a ProgressDeadlineExceeded reason will be surfaced in the deployment status. Note that progress will not be estimated during the time a deployment is paused. Defaults to 600s.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"template"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.DeploymentStrategy", "k8s.io/api/apps/v1beta1.RollbackConfig", "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1beta1_DeploymentStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentStatus is the most recently observed status of the Deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "The generation observed by the deployment controller.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of non-terminated pods targeted by this deployment (their labels match the selector).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "updatedReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of non-terminated pods targeted by this deployment that have the desired template spec.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of ready pods targeted by this deployment.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "availableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of available pods (ready for at least minReadySeconds) targeted by this deployment.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "unavailableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of unavailable pods targeted by this deployment. This is the total number of pods that are still required for the deployment to have 100% available capacity. They may either be pods that are running but not yet available or pods that still have not been created.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a deployment's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.DeploymentCondition"), + }, + }, + }, + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "Count of hash collisions for the Deployment. The Deployment controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ReplicaSet.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.DeploymentCondition"}, + } +} + +func schema_k8sio_api_apps_v1beta1_DeploymentStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentStrategy describes how to replace existing pods with new ones.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of deployment. Can be \"Recreate\" or \"RollingUpdate\". Default is RollingUpdate.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "Rolling update config params. Present only if DeploymentStrategyType = RollingUpdate.", + Ref: ref("k8s.io/api/apps/v1beta1.RollingUpdateDeployment"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.RollingUpdateDeployment"}, + } +} + +func schema_k8sio_api_apps_v1beta1_RollbackConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "revision": { + SchemaProps: spec.SchemaProps{ + Description: "The revision to rollback to. If set to 0, rollback to the last revision.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_apps_v1beta1_RollingUpdateDeployment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Spec to control the desired behavior of rolling update.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of pods that can be unavailable during the update. Value can be an absolute number (ex: 5) or a percentage of desired pods (ex: 10%). Absolute number is calculated from percentage by rounding down. This can not be 0 if MaxSurge is 0. Defaults to 25%. Example: when this is set to 30%, the old ReplicaSet can be scaled down to 70% of desired pods immediately when the rolling update starts. Once new pods are ready, old ReplicaSet can be scaled down further, followed by scaling up the new ReplicaSet, ensuring that the total number of pods available at all times during the update is at least 70% of desired pods.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "maxSurge": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of pods that can be scheduled above the desired number of pods. Value can be an absolute number (ex: 5) or a percentage of desired pods (ex: 10%). This can not be 0 if MaxUnavailable is 0. Absolute number is calculated from percentage by rounding up. Defaults to 25%. Example: when this is set to 30%, the new ReplicaSet can be scaled up immediately when the rolling update starts, such that the total number of old and new pods do not exceed 130% of desired pods. Once old pods have been killed, new ReplicaSet can be scaled up further, ensuring that total number of pods running at any time during the update is at most 130% of desired pods.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_apps_v1beta1_RollingUpdateStatefulSetStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RollingUpdateStatefulSetStrategy is used to communicate parameter for RollingUpdateStatefulSetStrategyType.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "partition": { + SchemaProps: spec.SchemaProps{ + Description: "Partition indicates the ordinal at which the StatefulSet should be partitioned.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_apps_v1beta1_Scale(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Scale represents a scaling request for a resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "defines the behavior of the scale. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.ScaleSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "current status of the scale. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status. Read-only.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.ScaleStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.ScaleSpec", "k8s.io/api/apps/v1beta1.ScaleStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta1_ScaleSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ScaleSpec describes the attributes of a scale subresource", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "desired number of instances for the scaled object.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_apps_v1beta1_ScaleStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ScaleStatus represents the current status of a scale subresource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "actual number of observed instances of the scaled object.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "label query over pods that should match the replicas count. More info: http://kubernetes.io/docs/user-guide/labels#label-selectors", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "targetSelector": { + SchemaProps: spec.SchemaProps{ + Description: "label selector for pods that should match the replicas count. This is a serializated version of both map-based and more expressive set-based selectors. This is done to avoid introspection in the clients. The string will be in the same format as the query-param syntax. If the target type only supports map-based selectors, both this field and map-based selector field are populated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + } +} + +func schema_k8sio_api_apps_v1beta1_StatefulSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of StatefulSet is deprecated by apps/v1beta2/StatefulSet. See the release notes for more information. StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the desired identities of pods in this set.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.StatefulSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the current status of Pods in this StatefulSet. This data may be out of date by some window of time.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.StatefulSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.StatefulSetSpec", "k8s.io/api/apps/v1beta1.StatefulSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta1_StatefulSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetCondition describes the state of a statefulset at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of statefulset condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1beta1_StatefulSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetList is a collection of StatefulSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.StatefulSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.StatefulSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta1_StatefulSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A StatefulSetSpec is the specification of a StatefulSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "replicas is the desired number of replicas of the given Template. These are replicas in the sense that they are instantiations of the same Template, but individual replicas also have a consistent identity. If unspecified, defaults to 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is a label query over pods that should match the replica count. If empty, defaulted to labels on the pod template. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "template is the object that describes the pod that will be created if insufficient replicas are detected. Each pod stamped out by the StatefulSet will fulfill this Template, but have a unique identity from the rest of the StatefulSet.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "volumeClaimTemplates": { + SchemaProps: spec.SchemaProps{ + Description: "volumeClaimTemplates is a list of claims that pods are allowed to reference. The StatefulSet controller is responsible for mapping network identities to claims in a way that maintains the identity of a pod. Every claim in this list must have at least one matching (by name) volumeMount in one container in the template. A claim in this list takes precedence over any volumes in the template, with the same name.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaim"), + }, + }, + }, + }, + }, + "serviceName": { + SchemaProps: spec.SchemaProps{ + Description: "serviceName is the name of the service that governs this StatefulSet. This service must exist before the StatefulSet, and is responsible for the network identity of the set. Pods get DNS/hostnames that follow the pattern: pod-specific-string.serviceName.default.svc.cluster.local where \"pod-specific-string\" is managed by the StatefulSet controller.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "podManagementPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "podManagementPolicy controls how pods are created during initial scale up, when replacing pods on nodes, or when scaling down. The default policy is `OrderedReady`, where pods are created in increasing order (pod-0, then pod-1, etc) and the controller will wait until each pod is ready before continuing. When scaling down, the pods are removed in the opposite order. The alternative policy is `Parallel` which will create pods in parallel to match the desired scale without waiting, and on scale down will delete all pods at once.", + Type: []string{"string"}, + Format: "", + }, + }, + "updateStrategy": { + SchemaProps: spec.SchemaProps{ + Description: "updateStrategy indicates the StatefulSetUpdateStrategy that will be employed to update Pods in the StatefulSet when a revision is made to Template.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.StatefulSetUpdateStrategy"), + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "revisionHistoryLimit is the maximum number of revisions that will be maintained in the StatefulSet's revision history. The revision history consists of all revisions not represented by a currently applied StatefulSetSpec version. The default value is 10.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"template", "serviceName"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.StatefulSetUpdateStrategy", "k8s.io/api/core/v1.PersistentVolumeClaim", "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1beta1_StatefulSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetStatus represents the current state of a StatefulSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "observedGeneration is the most recent generation observed for this StatefulSet. It corresponds to the StatefulSet's generation, which is updated on mutation by the API Server.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "replicas is the number of Pods created by the StatefulSet controller.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "readyReplicas is the number of Pods created by the StatefulSet controller that have a Ready Condition.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "currentReplicas is the number of Pods created by the StatefulSet controller from the StatefulSet version indicated by currentRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "updatedReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "updatedReplicas is the number of Pods created by the StatefulSet controller from the StatefulSet version indicated by updateRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentRevision": { + SchemaProps: spec.SchemaProps{ + Description: "currentRevision, if not empty, indicates the version of the StatefulSet used to generate Pods in the sequence [0,currentReplicas).", + Type: []string{"string"}, + Format: "", + }, + }, + "updateRevision": { + SchemaProps: spec.SchemaProps{ + Description: "updateRevision, if not empty, indicates the version of the StatefulSet used to generate Pods in the sequence [replicas-updatedReplicas,replicas)", + Type: []string{"string"}, + Format: "", + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "collisionCount is the count of hash collisions for the StatefulSet. The StatefulSet controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ControllerRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a statefulset's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta1.StatefulSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.StatefulSetCondition"}, + } +} + +func schema_k8sio_api_apps_v1beta1_StatefulSetUpdateStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetUpdateStrategy indicates the strategy that the StatefulSet controller will use to perform updates. It includes any additional parameters necessary to perform the update for the indicated strategy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type indicates the type of the StatefulSetUpdateStrategy.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "RollingUpdate is used to communicate parameters when Type is RollingUpdateStatefulSetStrategyType.", + Ref: ref("k8s.io/api/apps/v1beta1.RollingUpdateStatefulSetStrategy"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta1.RollingUpdateStatefulSetStrategy"}, + } +} + +func schema_k8sio_api_apps_v1beta2_ControllerRevision(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of ControllerRevision is deprecated by apps/v1/ControllerRevision. See the release notes for more information. ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "data": { + SchemaProps: spec.SchemaProps{ + Description: "Data is the serialized representation of the state.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + "revision": { + SchemaProps: spec.SchemaProps{ + Description: "Revision indicates the revision of the state represented by Data.", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"revision"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_k8sio_api_apps_v1beta2_ControllerRevisionList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ControllerRevisionList is a resource containing a list of ControllerRevision objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of ControllerRevisions", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.ControllerRevision"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.ControllerRevision", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DaemonSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of DaemonSet is deprecated by apps/v1/DaemonSet. See the release notes for more information. DaemonSet represents the configuration of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "The desired behavior of this daemon set. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DaemonSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "The current status of this daemon set. This data may be out of date by some window of time. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DaemonSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.DaemonSetSpec", "k8s.io/api/apps/v1beta2.DaemonSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DaemonSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetCondition describes the state of a DaemonSet at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of DaemonSet condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DaemonSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetList is a collection of daemon sets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "A list of daemon sets.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DaemonSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.DaemonSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DaemonSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetSpec is the specification of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "A label query over pods that are managed by the daemon set. Must match in order to be controlled. It must match the pod template's labels. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "An object that describes the pod that will be created. The DaemonSet will create exactly one copy of this pod on every node that matches the template's node selector (or on every node if no node selector is specified). More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#pod-template", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "updateStrategy": { + SchemaProps: spec.SchemaProps{ + Description: "An update strategy to replace existing DaemonSet pods with new pods.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DaemonSetUpdateStrategy"), + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "The minimum number of seconds for which a newly created DaemonSet pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of old history to retain to allow rollback. This is a pointer to distinguish between explicit zero and not specified. Defaults to 10.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"selector", "template"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.DaemonSetUpdateStrategy", "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DaemonSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetStatus represents the current status of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "currentNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that are running at least 1 daemon pod and are supposed to run the daemon pod. More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberMisscheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that are running the daemon pod, but are not supposed to run the daemon pod. More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "desiredNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The total number of nodes that should be running the daemon pod (including nodes correctly running the daemon pod). More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberReady": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have one or more of the daemon pod running and ready.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "The most recent generation observed by the daemon set controller.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "updatedNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The total number of nodes that are running updated daemon pod", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberAvailable": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have one or more of the daemon pod running and available (ready for at least spec.minReadySeconds)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have none of the daemon pod running and available (ready for at least spec.minReadySeconds)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "Count of hash collisions for the DaemonSet. The DaemonSet controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ControllerRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a DaemonSet's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DaemonSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"currentNumberScheduled", "numberMisscheduled", "desiredNumberScheduled", "numberReady"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.DaemonSetCondition"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DaemonSetUpdateStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetUpdateStrategy is a struct used to control the update strategy for a DaemonSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of daemon set update. Can be \"RollingUpdate\" or \"OnDelete\". Default is RollingUpdate.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "Rolling update config params. Present only if type = \"RollingUpdate\".", + Ref: ref("k8s.io/api/apps/v1beta2.RollingUpdateDaemonSet"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.RollingUpdateDaemonSet"}, + } +} + +func schema_k8sio_api_apps_v1beta2_Deployment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of Deployment is deprecated by apps/v1/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the Deployment.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DeploymentSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the Deployment.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DeploymentStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.DeploymentSpec", "k8s.io/api/apps/v1beta2.DeploymentStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DeploymentCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentCondition describes the state of a deployment at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of deployment condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastUpdateTime": { + SchemaProps: spec.SchemaProps{ + Description: "The last time this condition was updated.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DeploymentList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentList is a list of Deployments.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of Deployments.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.Deployment"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.Deployment", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DeploymentSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentSpec is the specification of the desired behavior of the Deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Number of desired pods. This is a pointer to distinguish between explicit zero and not specified. Defaults to 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Label selector for pods. Existing ReplicaSets whose pods are selected by this will be the ones affected by this deployment. It must match the pod template's labels.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template describes the pods that will be created.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "strategy": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-strategy": "retainKeys", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The deployment strategy to use to replace existing pods with new ones.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DeploymentStrategy"), + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum number of seconds for which a newly created pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of old ReplicaSets to retain to allow rollback. This is a pointer to distinguish between explicit zero and not specified. Defaults to 10.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "paused": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates that the deployment is paused.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "progressDeadlineSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum time in seconds for a deployment to make progress before it is considered to be failed. The deployment controller will continue to process failed deployments and a condition with a ProgressDeadlineExceeded reason will be surfaced in the deployment status. Note that progress will not be estimated during the time a deployment is paused. Defaults to 600s.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"selector", "template"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.DeploymentStrategy", "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DeploymentStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentStatus is the most recently observed status of the Deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "The generation observed by the deployment controller.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of non-terminated pods targeted by this deployment (their labels match the selector).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "updatedReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of non-terminated pods targeted by this deployment that have the desired template spec.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of ready pods targeted by this deployment.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "availableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of available pods (ready for at least minReadySeconds) targeted by this deployment.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "unavailableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of unavailable pods targeted by this deployment. This is the total number of pods that are still required for the deployment to have 100% available capacity. They may either be pods that are running but not yet available or pods that still have not been created.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a deployment's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.DeploymentCondition"), + }, + }, + }, + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "Count of hash collisions for the Deployment. The Deployment controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ReplicaSet.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.DeploymentCondition"}, + } +} + +func schema_k8sio_api_apps_v1beta2_DeploymentStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentStrategy describes how to replace existing pods with new ones.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of deployment. Can be \"Recreate\" or \"RollingUpdate\". Default is RollingUpdate.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "Rolling update config params. Present only if DeploymentStrategyType = RollingUpdate.", + Ref: ref("k8s.io/api/apps/v1beta2.RollingUpdateDeployment"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.RollingUpdateDeployment"}, + } +} + +func schema_k8sio_api_apps_v1beta2_ReplicaSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1/ReplicaSet. See the release notes for more information. ReplicaSet ensures that a specified number of pod replicas are running at any given time.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "If the Labels of a ReplicaSet are empty, they are defaulted to be the same as the Pod(s) that the ReplicaSet manages. Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the specification of the desired behavior of the ReplicaSet. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.ReplicaSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the most recently observed status of the ReplicaSet. This data may be out of date by some window of time. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.ReplicaSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.ReplicaSetSpec", "k8s.io/api/apps/v1beta2.ReplicaSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_ReplicaSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetCondition describes the state of a replica set at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of replica set condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "The last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1beta2_ReplicaSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetList is a collection of ReplicaSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.ReplicaSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.ReplicaSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_ReplicaSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetSpec is the specification of a ReplicaSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Replicas is the number of desired replicas. This is a pointer to distinguish between explicit zero and unspecified. Defaults to 1. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/#what-is-a-replicationcontroller", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum number of seconds for which a newly created pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Selector is a label query over pods that should match the replica count. Label keys and values that must match in order to be controlled by this replica set. It must match the pod template's labels. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template is the object that describes the pod that will be created if insufficient replicas are detected. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#pod-template", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + }, + Required: []string{"selector"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1beta2_ReplicaSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetStatus represents the current status of a ReplicaSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Replicas is the most recently oberved number of replicas. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/#what-is-a-replicationcontroller", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "fullyLabeledReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of pods that have labels matching the labels of the pod template of the replicaset.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of ready replicas for this replica set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "availableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of available replicas (ready for at least minReadySeconds) for this replica set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "ObservedGeneration reflects the generation of the most recently observed ReplicaSet.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a replica set's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.ReplicaSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.ReplicaSetCondition"}, + } +} + +func schema_k8sio_api_apps_v1beta2_RollingUpdateDaemonSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Spec to control the desired behavior of daemon set rolling update.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of DaemonSet pods that can be unavailable during the update. Value can be an absolute number (ex: 5) or a percentage of total number of DaemonSet pods at the start of the update (ex: 10%). Absolute number is calculated from percentage by rounding up. This cannot be 0. Default value is 1. Example: when this is set to 30%, at most 30% of the total number of nodes that should be running the daemon pod (i.e. status.desiredNumberScheduled) can have their pods stopped for an update at any given time. The update starts by stopping at most 30% of those DaemonSet pods and then brings up new DaemonSet pods in their place. Once the new pods are available, it then proceeds onto other DaemonSet pods, thus ensuring that at least 70% of original number of DaemonSet pods are available at all times during the update.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_apps_v1beta2_RollingUpdateDeployment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Spec to control the desired behavior of rolling update.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of pods that can be unavailable during the update. Value can be an absolute number (ex: 5) or a percentage of desired pods (ex: 10%). Absolute number is calculated from percentage by rounding down. This can not be 0 if MaxSurge is 0. Defaults to 25%. Example: when this is set to 30%, the old ReplicaSet can be scaled down to 70% of desired pods immediately when the rolling update starts. Once new pods are ready, old ReplicaSet can be scaled down further, followed by scaling up the new ReplicaSet, ensuring that the total number of pods available at all times during the update is at least 70% of desired pods.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "maxSurge": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of pods that can be scheduled above the desired number of pods. Value can be an absolute number (ex: 5) or a percentage of desired pods (ex: 10%). This can not be 0 if MaxUnavailable is 0. Absolute number is calculated from percentage by rounding up. Defaults to 25%. Example: when this is set to 30%, the new ReplicaSet can be scaled up immediately when the rolling update starts, such that the total number of old and new pods do not exceed 130% of desired pods. Once old pods have been killed, new ReplicaSet can be scaled up further, ensuring that total number of pods running at any time during the update is at most 130% of desired pods.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_apps_v1beta2_RollingUpdateStatefulSetStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RollingUpdateStatefulSetStrategy is used to communicate parameter for RollingUpdateStatefulSetStrategyType.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "partition": { + SchemaProps: spec.SchemaProps{ + Description: "Partition indicates the ordinal at which the StatefulSet should be partitioned. Default value is 0.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_apps_v1beta2_Scale(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Scale represents a scaling request for a resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "defines the behavior of the scale. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.ScaleSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "current status of the scale. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status. Read-only.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.ScaleStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.ScaleSpec", "k8s.io/api/apps/v1beta2.ScaleStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_ScaleSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ScaleSpec describes the attributes of a scale subresource", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "desired number of instances for the scaled object.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_apps_v1beta2_ScaleStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ScaleStatus represents the current status of a scale subresource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "actual number of observed instances of the scaled object.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "label query over pods that should match the replicas count. More info: http://kubernetes.io/docs/user-guide/labels#label-selectors", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "targetSelector": { + SchemaProps: spec.SchemaProps{ + Description: "label selector for pods that should match the replicas count. This is a serializated version of both map-based and more expressive set-based selectors. This is done to avoid introspection in the clients. The string will be in the same format as the query-param syntax. If the target type only supports map-based selectors, both this field and map-based selector field are populated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + } +} + +func schema_k8sio_api_apps_v1beta2_StatefulSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of StatefulSet is deprecated by apps/v1/StatefulSet. See the release notes for more information. StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the desired identities of pods in this set.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.StatefulSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the current status of Pods in this StatefulSet. This data may be out of date by some window of time.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.StatefulSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.StatefulSetSpec", "k8s.io/api/apps/v1beta2.StatefulSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_StatefulSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetCondition describes the state of a statefulset at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of statefulset condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_apps_v1beta2_StatefulSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetList is a collection of StatefulSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.StatefulSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.StatefulSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_apps_v1beta2_StatefulSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A StatefulSetSpec is the specification of a StatefulSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "replicas is the desired number of replicas of the given Template. These are replicas in the sense that they are instantiations of the same Template, but individual replicas also have a consistent identity. If unspecified, defaults to 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is a label query over pods that should match the replica count. It must match the pod template's labels. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "template is the object that describes the pod that will be created if insufficient replicas are detected. Each pod stamped out by the StatefulSet will fulfill this Template, but have a unique identity from the rest of the StatefulSet.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "volumeClaimTemplates": { + SchemaProps: spec.SchemaProps{ + Description: "volumeClaimTemplates is a list of claims that pods are allowed to reference. The StatefulSet controller is responsible for mapping network identities to claims in a way that maintains the identity of a pod. Every claim in this list must have at least one matching (by name) volumeMount in one container in the template. A claim in this list takes precedence over any volumes in the template, with the same name.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaim"), + }, + }, + }, + }, + }, + "serviceName": { + SchemaProps: spec.SchemaProps{ + Description: "serviceName is the name of the service that governs this StatefulSet. This service must exist before the StatefulSet, and is responsible for the network identity of the set. Pods get DNS/hostnames that follow the pattern: pod-specific-string.serviceName.default.svc.cluster.local where \"pod-specific-string\" is managed by the StatefulSet controller.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "podManagementPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "podManagementPolicy controls how pods are created during initial scale up, when replacing pods on nodes, or when scaling down. The default policy is `OrderedReady`, where pods are created in increasing order (pod-0, then pod-1, etc) and the controller will wait until each pod is ready before continuing. When scaling down, the pods are removed in the opposite order. The alternative policy is `Parallel` which will create pods in parallel to match the desired scale without waiting, and on scale down will delete all pods at once.", + Type: []string{"string"}, + Format: "", + }, + }, + "updateStrategy": { + SchemaProps: spec.SchemaProps{ + Description: "updateStrategy indicates the StatefulSetUpdateStrategy that will be employed to update Pods in the StatefulSet when a revision is made to Template.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.StatefulSetUpdateStrategy"), + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "revisionHistoryLimit is the maximum number of revisions that will be maintained in the StatefulSet's revision history. The revision history consists of all revisions not represented by a currently applied StatefulSetSpec version. The default value is 10.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"selector", "template", "serviceName"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.StatefulSetUpdateStrategy", "k8s.io/api/core/v1.PersistentVolumeClaim", "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_apps_v1beta2_StatefulSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetStatus represents the current state of a StatefulSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "observedGeneration is the most recent generation observed for this StatefulSet. It corresponds to the StatefulSet's generation, which is updated on mutation by the API Server.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "replicas is the number of Pods created by the StatefulSet controller.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "readyReplicas is the number of Pods created by the StatefulSet controller that have a Ready Condition.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "currentReplicas is the number of Pods created by the StatefulSet controller from the StatefulSet version indicated by currentRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "updatedReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "updatedReplicas is the number of Pods created by the StatefulSet controller from the StatefulSet version indicated by updateRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentRevision": { + SchemaProps: spec.SchemaProps{ + Description: "currentRevision, if not empty, indicates the version of the StatefulSet used to generate Pods in the sequence [0,currentReplicas).", + Type: []string{"string"}, + Format: "", + }, + }, + "updateRevision": { + SchemaProps: spec.SchemaProps{ + Description: "updateRevision, if not empty, indicates the version of the StatefulSet used to generate Pods in the sequence [replicas-updatedReplicas,replicas)", + Type: []string{"string"}, + Format: "", + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "collisionCount is the count of hash collisions for the StatefulSet. The StatefulSet controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ControllerRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a statefulset's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/apps/v1beta2.StatefulSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.StatefulSetCondition"}, + } +} + +func schema_k8sio_api_apps_v1beta2_StatefulSetUpdateStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetUpdateStrategy indicates the strategy that the StatefulSet controller will use to perform updates. It includes any additional parameters necessary to perform the update for the indicated strategy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type indicates the type of the StatefulSetUpdateStrategy. Default is RollingUpdate.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "RollingUpdate is used to communicate parameters when Type is RollingUpdateStatefulSetStrategyType.", + Ref: ref("k8s.io/api/apps/v1beta2.RollingUpdateStatefulSetStrategy"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/apps/v1beta2.RollingUpdateStatefulSetStrategy"}, + } +} + +func schema_k8sio_api_authentication_v1_BoundObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "BoundObjectReference is a reference to an object that a token is bound to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of the referent. Valid kinds are 'Pod' and 'Secret'.", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "API version of the referent.", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent.", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID of the referent.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authentication_v1_TokenRequest(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenRequest requests a token for a given service account.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1.TokenRequestSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1.TokenRequestStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1.TokenRequestSpec", "k8s.io/api/authentication/v1.TokenRequestStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authentication_v1_TokenRequestSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenRequestSpec contains client provided parameters of a token request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "audiences": { + SchemaProps: spec.SchemaProps{ + Description: "Audiences are the intendend audiences of the token. A recipient of a token must identitfy themself with an identifier in the list of audiences of the token, and otherwise should reject the token. A token issued for multiple audiences may be used to authenticate against any of the audiences listed but implies a high degree of trust between the target audiences.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "expirationSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "ExpirationSeconds is the requested duration of validity of the request. The token issuer may return a token with a different validity duration so a client needs to check the 'expiration' field in a response.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "boundObjectRef": { + SchemaProps: spec.SchemaProps{ + Description: "BoundObjectRef is a reference to an object that the token will be bound to. The token will only be valid for as long as the bound object exists. NOTE: The API server's TokenReview endpoint will validate the BoundObjectRef, but other audiences may not. Keep ExpirationSeconds small if you want prompt revocation.", + Ref: ref("k8s.io/api/authentication/v1.BoundObjectReference"), + }, + }, + }, + Required: []string{"audiences"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1.BoundObjectReference"}, + } +} + +func schema_k8sio_api_authentication_v1_TokenRequestStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenRequestStatus is the result of a token request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "token": { + SchemaProps: spec.SchemaProps{ + Description: "Token is the opaque bearer token.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "expirationTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "ExpirationTimestamp is the time of expiration of the returned token.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + }, + Required: []string{"token", "expirationTimestamp"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_authentication_v1_TokenReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1.TokenReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates whether the request can be authenticated.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1.TokenReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1.TokenReviewSpec", "k8s.io/api/authentication/v1.TokenReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authentication_v1_TokenReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenReviewSpec is a description of the token authentication request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "token": { + SchemaProps: spec.SchemaProps{ + Description: "Token is the opaque bearer token.", + Type: []string{"string"}, + Format: "", + }, + }, + "audiences": { + SchemaProps: spec.SchemaProps{ + Description: "Audiences is a list of the identifiers that the resource server presented with the token identifies as. Audience-aware token authenticators will verify that the token was intended for at least one of the audiences in this list. If no audiences are provided, the audience will default to the audience of the Kubernetes apiserver.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authentication_v1_TokenReviewStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenReviewStatus is the result of the token authentication request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "authenticated": { + SchemaProps: spec.SchemaProps{ + Description: "Authenticated indicates that the token was associated with a known user.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "User is the UserInfo associated with the provided token.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1.UserInfo"), + }, + }, + "audiences": { + SchemaProps: spec.SchemaProps{ + Description: "Audiences are audience identifiers chosen by the authenticator that are compatible with both the TokenReview and token. An identifier is any identifier in the intersection of the TokenReviewSpec audiences and the token's audiences. A client of the TokenReview API that sets the spec.audiences field should validate that a compatible audience identifier is returned in the status.audiences field to ensure that the TokenReview server is audience aware. If a TokenReview returns an empty status.audience field where status.authenticated is \"true\", the token is valid against the audience of the Kubernetes API server.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "error": { + SchemaProps: spec.SchemaProps{ + Description: "Error indicates that the token couldn't be checked", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1.UserInfo"}, + } +} + +func schema_k8sio_api_authentication_v1_UserInfo(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "UserInfo holds the information about the user needed to implement the user.Info interface.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "username": { + SchemaProps: spec.SchemaProps{ + Description: "The name that uniquely identifies this user among all active users.", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "A unique value that identifies this user across time. If this user is deleted and another user by the same name is added, they will have different UIDs.", + Type: []string{"string"}, + Format: "", + }, + }, + "groups": { + SchemaProps: spec.SchemaProps{ + Description: "The names of groups this user is a part of.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "extra": { + SchemaProps: spec.SchemaProps{ + Description: "Any additional information provided by the authenticator.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authentication_v1beta1_TokenReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1beta1.TokenReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates whether the request can be authenticated.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1beta1.TokenReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1beta1.TokenReviewSpec", "k8s.io/api/authentication/v1beta1.TokenReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authentication_v1beta1_TokenReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenReviewSpec is a description of the token authentication request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "token": { + SchemaProps: spec.SchemaProps{ + Description: "Token is the opaque bearer token.", + Type: []string{"string"}, + Format: "", + }, + }, + "audiences": { + SchemaProps: spec.SchemaProps{ + Description: "Audiences is a list of the identifiers that the resource server presented with the token identifies as. Audience-aware token authenticators will verify that the token was intended for at least one of the audiences in this list. If no audiences are provided, the audience will default to the audience of the Kubernetes apiserver.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authentication_v1beta1_TokenReviewStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenReviewStatus is the result of the token authentication request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "authenticated": { + SchemaProps: spec.SchemaProps{ + Description: "Authenticated indicates that the token was associated with a known user.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "User is the UserInfo associated with the provided token.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1beta1.UserInfo"), + }, + }, + "audiences": { + SchemaProps: spec.SchemaProps{ + Description: "Audiences are audience identifiers chosen by the authenticator that are compatible with both the TokenReview and token. An identifier is any identifier in the intersection of the TokenReviewSpec audiences and the token's audiences. A client of the TokenReview API that sets the spec.audiences field should validate that a compatible audience identifier is returned in the status.audiences field to ensure that the TokenReview server is audience aware. If a TokenReview returns an empty status.audience field where status.authenticated is \"true\", the token is valid against the audience of the Kubernetes API server.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "error": { + SchemaProps: spec.SchemaProps{ + Description: "Error indicates that the token couldn't be checked", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1beta1.UserInfo"}, + } +} + +func schema_k8sio_api_authentication_v1beta1_UserInfo(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "UserInfo holds the information about the user needed to implement the user.Info interface.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "username": { + SchemaProps: spec.SchemaProps{ + Description: "The name that uniquely identifies this user among all active users.", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "A unique value that identifies this user across time. If this user is deleted and another user by the same name is added, they will have different UIDs.", + Type: []string{"string"}, + Format: "", + }, + }, + "groups": { + SchemaProps: spec.SchemaProps{ + Description: "The names of groups this user is a part of.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "extra": { + SchemaProps: spec.SchemaProps{ + Description: "Any additional information provided by the authenticator.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1_LocalSubjectAccessReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated. spec.namespace must be equal to the namespace you made the request against. If empty, it is defaulted.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.SubjectAccessReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates whether the request is allowed or not", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.SubjectAccessReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1.SubjectAccessReviewSpec", "k8s.io/api/authorization/v1.SubjectAccessReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authorization_v1_NonResourceAttributes(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NonResourceAttributes includes the authorization attributes available for non-resource requests to the Authorizer interface", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is the URL path of the request", + Type: []string{"string"}, + Format: "", + }, + }, + "verb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is the standard HTTP verb", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1_NonResourceRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NonResourceRule holds information that describes a rule for the non-resource", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs"}, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1_ResourceAttributes(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceAttributes includes the authorization attributes available for resource requests to the Authorizer interface", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace is the namespace of the action being requested. Currently, there is no distinction between no namespace and all namespaces \"\" (empty) is defaulted for LocalSubjectAccessReviews \"\" (empty) is empty for cluster-scoped resources \"\" (empty) means \"all\" for namespace scoped resources from a SubjectAccessReview or SelfSubjectAccessReview", + Type: []string{"string"}, + Format: "", + }, + }, + "verb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is a kubernetes resource API verb, like: get, list, watch, create, update, delete, proxy. \"*\" means all.", + Type: []string{"string"}, + Format: "", + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group is the API Group of the Resource. \"*\" means all.", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Description: "Version is the API Version of the Resource. \"*\" means all.", + Type: []string{"string"}, + Format: "", + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "Resource is one of the existing resource types. \"*\" means all.", + Type: []string{"string"}, + Format: "", + }, + }, + "subresource": { + SchemaProps: spec.SchemaProps{ + Description: "Subresource is one of the existing resource types. \"\" means none.", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of the resource being requested for a \"get\" or deleted for a \"delete\". \"\" (empty) means all.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1_ResourceRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceRule is the list of actions the subject is allowed to perform on resources. The list ordering isn't significant, may contain duplicates, and possibly be incomplete.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of the enumerated resources in any API group will be allowed. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to. \"*\" means all in the specified apiGroups.\n \"*/foo\" represents the subresource 'foo' for all resources in the specified apiGroups.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resourceNames": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs"}, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1_SelfSubjectAccessReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated. user and groups must be empty", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.SelfSubjectAccessReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates whether the request is allowed or not", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.SubjectAccessReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1.SelfSubjectAccessReviewSpec", "k8s.io/api/authorization/v1.SubjectAccessReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authorization_v1_SelfSubjectAccessReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SelfSubjectAccessReviewSpec is a description of the access request. Exactly one of ResourceAuthorizationAttributes and NonResourceAuthorizationAttributes must be set", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resourceAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceAuthorizationAttributes describes information for a resource access request", + Ref: ref("k8s.io/api/authorization/v1.ResourceAttributes"), + }, + }, + "nonResourceAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceAttributes describes information for a non-resource access request", + Ref: ref("k8s.io/api/authorization/v1.NonResourceAttributes"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1.NonResourceAttributes", "k8s.io/api/authorization/v1.ResourceAttributes"}, + } +} + +func schema_k8sio_api_authorization_v1_SelfSubjectRulesReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.SelfSubjectRulesReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates the set of actions a user can perform.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.SubjectRulesReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1.SelfSubjectRulesReviewSpec", "k8s.io/api/authorization/v1.SubjectRulesReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authorization_v1_SelfSubjectRulesReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace to evaluate rules for. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1_SubjectAccessReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SubjectAccessReview checks whether or not a user or group can perform an action.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.SubjectAccessReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates whether the request is allowed or not", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.SubjectAccessReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1.SubjectAccessReviewSpec", "k8s.io/api/authorization/v1.SubjectAccessReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authorization_v1_SubjectAccessReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SubjectAccessReviewSpec is a description of the access request. Exactly one of ResourceAuthorizationAttributes and NonResourceAuthorizationAttributes must be set", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resourceAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceAuthorizationAttributes describes information for a resource access request", + Ref: ref("k8s.io/api/authorization/v1.ResourceAttributes"), + }, + }, + "nonResourceAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceAttributes describes information for a non-resource access request", + Ref: ref("k8s.io/api/authorization/v1.NonResourceAttributes"), + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "User is the user you're testing for. If you specify \"User\" but not \"Groups\", then is it interpreted as \"What if User were not a member of any groups", + Type: []string{"string"}, + Format: "", + }, + }, + "groups": { + SchemaProps: spec.SchemaProps{ + Description: "Groups is the groups you're testing for.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "extra": { + SchemaProps: spec.SchemaProps{ + Description: "Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer it needs a reflection here.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID information about the requesting user.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1.NonResourceAttributes", "k8s.io/api/authorization/v1.ResourceAttributes"}, + } +} + +func schema_k8sio_api_authorization_v1_SubjectAccessReviewStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SubjectAccessReviewStatus", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "allowed": { + SchemaProps: spec.SchemaProps{ + Description: "Allowed is required. True if the action would be allowed, false otherwise.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "denied": { + SchemaProps: spec.SchemaProps{ + Description: "Denied is optional. True if the action would be denied, otherwise false. If both allowed is false and denied is false, then the authorizer has no opinion on whether to authorize the action. Denied may not be true if Allowed is true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "Reason is optional. It indicates why a request was allowed or denied.", + Type: []string{"string"}, + Format: "", + }, + }, + "evaluationError": { + SchemaProps: spec.SchemaProps{ + Description: "EvaluationError is an indication that some error occurred during the authorization check. It is entirely possible to get an error and be able to continue determine authorization status in spite of it. For instance, RBAC can be missing a role, but enough roles are still present and bound to reason about the request.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"allowed"}, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1_SubjectRulesReviewStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SubjectRulesReviewStatus contains the result of a rules check. This check can be incomplete depending on the set of authorizers the server is configured with and any errors experienced during evaluation. Because authorization rules are additive, if a rule appears in a list it's safe to assume the subject has that permission, even if that list is incomplete.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resourceRules": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceRules is the list of actions the subject is allowed to perform on resources. The list ordering isn't significant, may contain duplicates, and possibly be incomplete.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.ResourceRule"), + }, + }, + }, + }, + }, + "nonResourceRules": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceRules is the list of actions the subject is allowed to perform on non-resources. The list ordering isn't significant, may contain duplicates, and possibly be incomplete.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1.NonResourceRule"), + }, + }, + }, + }, + }, + "incomplete": { + SchemaProps: spec.SchemaProps{ + Description: "Incomplete is true when the rules returned by this call are incomplete. This is most commonly encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "evaluationError": { + SchemaProps: spec.SchemaProps{ + Description: "EvaluationError can appear in combination with Rules. It indicates an error occurred during rule evaluation, such as an authorizer that doesn't support rule evaluation, and that ResourceRules and/or NonResourceRules may be incomplete.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"resourceRules", "nonResourceRules", "incomplete"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1.NonResourceRule", "k8s.io/api/authorization/v1.ResourceRule"}, + } +} + +func schema_k8sio_api_authorization_v1beta1_LocalSubjectAccessReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated. spec.namespace must be equal to the namespace you made the request against. If empty, it is defaulted.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.SubjectAccessReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates whether the request is allowed or not", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.SubjectAccessReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1beta1.SubjectAccessReviewSpec", "k8s.io/api/authorization/v1beta1.SubjectAccessReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authorization_v1beta1_NonResourceAttributes(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NonResourceAttributes includes the authorization attributes available for non-resource requests to the Authorizer interface", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is the URL path of the request", + Type: []string{"string"}, + Format: "", + }, + }, + "verb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is the standard HTTP verb", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1beta1_NonResourceRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NonResourceRule holds information that describes a rule for the non-resource", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs"}, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1beta1_ResourceAttributes(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceAttributes includes the authorization attributes available for resource requests to the Authorizer interface", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace is the namespace of the action being requested. Currently, there is no distinction between no namespace and all namespaces \"\" (empty) is defaulted for LocalSubjectAccessReviews \"\" (empty) is empty for cluster-scoped resources \"\" (empty) means \"all\" for namespace scoped resources from a SubjectAccessReview or SelfSubjectAccessReview", + Type: []string{"string"}, + Format: "", + }, + }, + "verb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is a kubernetes resource API verb, like: get, list, watch, create, update, delete, proxy. \"*\" means all.", + Type: []string{"string"}, + Format: "", + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group is the API Group of the Resource. \"*\" means all.", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Description: "Version is the API Version of the Resource. \"*\" means all.", + Type: []string{"string"}, + Format: "", + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "Resource is one of the existing resource types. \"*\" means all.", + Type: []string{"string"}, + Format: "", + }, + }, + "subresource": { + SchemaProps: spec.SchemaProps{ + Description: "Subresource is one of the existing resource types. \"\" means none.", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of the resource being requested for a \"get\" or deleted for a \"delete\". \"\" (empty) means all.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1beta1_ResourceRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceRule is the list of actions the subject is allowed to perform on resources. The list ordering isn't significant, may contain duplicates, and possibly be incomplete.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of the enumerated resources in any API group will be allowed. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to. \"*\" means all in the specified apiGroups.\n \"*/foo\" represents the subresource 'foo' for all resources in the specified apiGroups.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resourceNames": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. \"*\" means all.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs"}, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1beta1_SelfSubjectAccessReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated. user and groups must be empty", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.SelfSubjectAccessReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates whether the request is allowed or not", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.SubjectAccessReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1beta1.SelfSubjectAccessReviewSpec", "k8s.io/api/authorization/v1beta1.SubjectAccessReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authorization_v1beta1_SelfSubjectAccessReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SelfSubjectAccessReviewSpec is a description of the access request. Exactly one of ResourceAuthorizationAttributes and NonResourceAuthorizationAttributes must be set", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resourceAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceAuthorizationAttributes describes information for a resource access request", + Ref: ref("k8s.io/api/authorization/v1beta1.ResourceAttributes"), + }, + }, + "nonResourceAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceAttributes describes information for a non-resource access request", + Ref: ref("k8s.io/api/authorization/v1beta1.NonResourceAttributes"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1beta1.NonResourceAttributes", "k8s.io/api/authorization/v1beta1.ResourceAttributes"}, + } +} + +func schema_k8sio_api_authorization_v1beta1_SelfSubjectRulesReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.SelfSubjectRulesReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates the set of actions a user can perform.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.SubjectRulesReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1beta1.SelfSubjectRulesReviewSpec", "k8s.io/api/authorization/v1beta1.SubjectRulesReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authorization_v1beta1_SelfSubjectRulesReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace to evaluate rules for. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1beta1_SubjectAccessReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SubjectAccessReview checks whether or not a user or group can perform an action.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the request being evaluated", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.SubjectAccessReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the server and indicates whether the request is allowed or not", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.SubjectAccessReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1beta1.SubjectAccessReviewSpec", "k8s.io/api/authorization/v1beta1.SubjectAccessReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_authorization_v1beta1_SubjectAccessReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SubjectAccessReviewSpec is a description of the access request. Exactly one of ResourceAuthorizationAttributes and NonResourceAuthorizationAttributes must be set", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resourceAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceAuthorizationAttributes describes information for a resource access request", + Ref: ref("k8s.io/api/authorization/v1beta1.ResourceAttributes"), + }, + }, + "nonResourceAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceAttributes describes information for a non-resource access request", + Ref: ref("k8s.io/api/authorization/v1beta1.NonResourceAttributes"), + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "User is the user you're testing for. If you specify \"User\" but not \"Group\", then is it interpreted as \"What if User were not a member of any groups", + Type: []string{"string"}, + Format: "", + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Groups is the groups you're testing for.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "extra": { + SchemaProps: spec.SchemaProps{ + Description: "Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer it needs a reflection here.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID information about the requesting user.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1beta1.NonResourceAttributes", "k8s.io/api/authorization/v1beta1.ResourceAttributes"}, + } +} + +func schema_k8sio_api_authorization_v1beta1_SubjectAccessReviewStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SubjectAccessReviewStatus", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "allowed": { + SchemaProps: spec.SchemaProps{ + Description: "Allowed is required. True if the action would be allowed, false otherwise.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "denied": { + SchemaProps: spec.SchemaProps{ + Description: "Denied is optional. True if the action would be denied, otherwise false. If both allowed is false and denied is false, then the authorizer has no opinion on whether to authorize the action. Denied may not be true if Allowed is true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "Reason is optional. It indicates why a request was allowed or denied.", + Type: []string{"string"}, + Format: "", + }, + }, + "evaluationError": { + SchemaProps: spec.SchemaProps{ + Description: "EvaluationError is an indication that some error occurred during the authorization check. It is entirely possible to get an error and be able to continue determine authorization status in spite of it. For instance, RBAC can be missing a role, but enough roles are still present and bound to reason about the request.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"allowed"}, + }, + }, + } +} + +func schema_k8sio_api_authorization_v1beta1_SubjectRulesReviewStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SubjectRulesReviewStatus contains the result of a rules check. This check can be incomplete depending on the set of authorizers the server is configured with and any errors experienced during evaluation. Because authorization rules are additive, if a rule appears in a list it's safe to assume the subject has that permission, even if that list is incomplete.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resourceRules": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceRules is the list of actions the subject is allowed to perform on resources. The list ordering isn't significant, may contain duplicates, and possibly be incomplete.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.ResourceRule"), + }, + }, + }, + }, + }, + "nonResourceRules": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceRules is the list of actions the subject is allowed to perform on non-resources. The list ordering isn't significant, may contain duplicates, and possibly be incomplete.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authorization/v1beta1.NonResourceRule"), + }, + }, + }, + }, + }, + "incomplete": { + SchemaProps: spec.SchemaProps{ + Description: "Incomplete is true when the rules returned by this call are incomplete. This is most commonly encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "evaluationError": { + SchemaProps: spec.SchemaProps{ + Description: "EvaluationError can appear in combination with Rules. It indicates an error occurred during rule evaluation, such as an authorizer that doesn't support rule evaluation, and that ResourceRules and/or NonResourceRules may be incomplete.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"resourceRules", "nonResourceRules", "incomplete"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authorization/v1beta1.NonResourceRule", "k8s.io/api/authorization/v1beta1.ResourceRule"}, + } +} + +func schema_k8sio_api_autoscaling_v1_ContainerResourceMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerResourceMetricSource indicates how to scale on a resource metric known to Kubernetes, as specified in the requests and limits, describing a single container in each of the pods of the current scale target(e.g. CPU or memory). The values will be averaged together before being compared to the target. Such metrics are built into Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. Only one \"target\" type should be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "targetAverageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageUtilization is the target value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "targetAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageValue is the target value of the average of the resource metric across all relevant pods, as a raw value (instead of as a percentage of the request), similar to the \"pods\" metric source type.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "container is the name of the container in the pods of the scaling target.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "container"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v1_ContainerResourceMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerResourceMetricStatus indicates the current value of a resource metric known to Kubernetes, as specified in requests and limits, describing a single container in each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "currentAverageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageUtilization is the current value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods. It will only be present if `targetAverageValue` was set in the corresponding metric specification.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageValue is the current value of the average of the resource metric across all relevant pods, as a raw value (instead of as a percentage of the request), similar to the \"pods\" metric source type. It will always be set, regardless of the corresponding metric specification.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "container is the name of the container in the pods of the scaling taget", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "currentAverageValue", "container"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v1_CrossVersionObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CrossVersionObjectReference contains enough information to let you identify the referred resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of the referent; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent; More info: http://kubernetes.io/docs/user-guide/identifiers#names", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "API version of the referent", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_autoscaling_v1_ExternalMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalMetricSource indicates how to scale on a metric not associated with any Kubernetes object (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "metricSelector": { + SchemaProps: spec.SchemaProps{ + Description: "metricSelector is used to identify a specific time series within a given metric.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "targetValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetValue is the target value of the metric (as a quantity). Mutually exclusive with TargetAverageValue.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "targetAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageValue is the target per-pod value of global metric (as a quantity). Mutually exclusive with TargetValue.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"metricName"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v1_ExternalMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalMetricStatus indicates the current value of a global metric not associated with any Kubernetes object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of a metric used for autoscaling in metric system.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "metricSelector": { + SchemaProps: spec.SchemaProps{ + Description: "metricSelector is used to identify a specific time series within a given metric.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "currentValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentValue is the current value of the metric (as a quantity)", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "currentAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageValue is the current value of metric averaged over autoscaled pods.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"metricName", "currentValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscaler(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "configuration of a horizontal pod autoscaler.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "behaviour of autoscaler. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v1.HorizontalPodAutoscalerSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "current information about the autoscaler.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v1.HorizontalPodAutoscalerStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v1.HorizontalPodAutoscalerSpec", "k8s.io/api/autoscaling/v1.HorizontalPodAutoscalerStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscalerCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerCondition describes the state of a HorizontalPodAutoscaler at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type describes the current condition", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status is the status of the condition (True, False, Unknown)", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastTransitionTime is the last time the condition transitioned from one status to another", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason is the reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "message is a human-readable explanation containing details about the transition", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscalerList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "list of horizontal pod autoscaler objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "list of horizontal pod autoscaler objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v1.HorizontalPodAutoscaler"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v1.HorizontalPodAutoscaler", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscalerSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "specification of a horizontal pod autoscaler.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "scaleTargetRef": { + SchemaProps: spec.SchemaProps{ + Description: "reference to scaled resource; horizontal pod autoscaler will learn the current resource consumption and will set the desired number of pods by using its Scale subresource.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v1.CrossVersionObjectReference"), + }, + }, + "minReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "minReplicas is the lower limit for the number of replicas to which the autoscaler can scale down. It defaults to 1 pod. minReplicas is allowed to be 0 if the alpha feature gate HPAScaleToZero is enabled and at least one Object or External metric is configured. Scaling is active as long as at least one metric value is available.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "maxReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "upper limit for the number of pods that can be set by the autoscaler; cannot be smaller than MinReplicas.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "targetCPUUtilizationPercentage": { + SchemaProps: spec.SchemaProps{ + Description: "target average CPU utilization (represented as a percentage of requested CPU) over all the pods; if not specified the default autoscaling policy will be used.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"scaleTargetRef", "maxReplicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v1.CrossVersionObjectReference"}, + } +} + +func schema_k8sio_api_autoscaling_v1_HorizontalPodAutoscalerStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "current status of a horizontal pod autoscaler", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "most recent generation observed by this autoscaler.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "lastScaleTime": { + SchemaProps: spec.SchemaProps{ + Description: "last time the HorizontalPodAutoscaler scaled the number of pods; used by the autoscaler to control how often the number of pods is changed.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "currentReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "current number of replicas of pods managed by this autoscaler.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "desiredReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "desired number of replicas of pods managed by this autoscaler.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentCPUUtilizationPercentage": { + SchemaProps: spec.SchemaProps{ + Description: "current average CPU utilization over all pods, represented as a percentage of requested CPU, e.g. 70 means that an average pod is using now 70% of its requested CPU.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"currentReplicas", "desiredReplicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_autoscaling_v1_MetricSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricSpec specifies how to scale based on a single metric (only `type` and one other matching field should be set at once).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of metric source. It should be one of \"ContainerResource\", \"External\", \"Object\", \"Pods\" or \"Resource\", each mapping to a matching field in the object. Note: \"ContainerResource\" type is available on when the feature-gate HPAContainerMetrics is enabled", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "object": { + SchemaProps: spec.SchemaProps{ + Description: "object refers to a metric describing a single kubernetes object (for example, hits-per-second on an Ingress object).", + Ref: ref("k8s.io/api/autoscaling/v1.ObjectMetricSource"), + }, + }, + "pods": { + SchemaProps: spec.SchemaProps{ + Description: "pods refers to a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Ref: ref("k8s.io/api/autoscaling/v1.PodsMetricSource"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v1.ResourceMetricSource"), + }, + }, + "containerResource": { + SchemaProps: spec.SchemaProps{ + Description: "container resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing a single container in each pod of the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. This is an alpha feature and can be enabled by the HPAContainerMetrics feature flag.", + Ref: ref("k8s.io/api/autoscaling/v1.ContainerResourceMetricSource"), + }, + }, + "external": { + SchemaProps: spec.SchemaProps{ + Description: "external refers to a global metric that is not associated with any Kubernetes object. It allows autoscaling based on information coming from components running outside of cluster (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster).", + Ref: ref("k8s.io/api/autoscaling/v1.ExternalMetricSource"), + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v1.ContainerResourceMetricSource", "k8s.io/api/autoscaling/v1.ExternalMetricSource", "k8s.io/api/autoscaling/v1.ObjectMetricSource", "k8s.io/api/autoscaling/v1.PodsMetricSource", "k8s.io/api/autoscaling/v1.ResourceMetricSource"}, + } +} + +func schema_k8sio_api_autoscaling_v1_MetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricStatus describes the last-read state of a single metric.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of metric source. It will be one of \"ContainerResource\", \"External\", \"Object\", \"Pods\" or \"Resource\", each corresponds to a matching field in the object. Note: \"ContainerResource\" type is available on when the feature-gate HPAContainerMetrics is enabled", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "object": { + SchemaProps: spec.SchemaProps{ + Description: "object refers to a metric describing a single kubernetes object (for example, hits-per-second on an Ingress object).", + Ref: ref("k8s.io/api/autoscaling/v1.ObjectMetricStatus"), + }, + }, + "pods": { + SchemaProps: spec.SchemaProps{ + Description: "pods refers to a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Ref: ref("k8s.io/api/autoscaling/v1.PodsMetricStatus"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v1.ResourceMetricStatus"), + }, + }, + "containerResource": { + SchemaProps: spec.SchemaProps{ + Description: "container resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing a single container in each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v1.ContainerResourceMetricStatus"), + }, + }, + "external": { + SchemaProps: spec.SchemaProps{ + Description: "external refers to a global metric that is not associated with any Kubernetes object. It allows autoscaling based on information coming from components running outside of cluster (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster).", + Ref: ref("k8s.io/api/autoscaling/v1.ExternalMetricStatus"), + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v1.ContainerResourceMetricStatus", "k8s.io/api/autoscaling/v1.ExternalMetricStatus", "k8s.io/api/autoscaling/v1.ObjectMetricStatus", "k8s.io/api/autoscaling/v1.PodsMetricStatus", "k8s.io/api/autoscaling/v1.ResourceMetricStatus"}, + } +} + +func schema_k8sio_api_autoscaling_v1_ObjectMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectMetricSource indicates how to scale on a metric describing a kubernetes object (for example, hits-per-second on an Ingress object).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target is the described Kubernetes object.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v1.CrossVersionObjectReference"), + }, + }, + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "targetValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetValue is the target value of the metric (as a quantity).", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric. When set, it is passed as an additional parameter to the metrics server for more specific metrics scoping When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "averageValue": { + SchemaProps: spec.SchemaProps{ + Description: "averageValue is the target value of the average of the metric across all relevant pods (as a quantity)", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"target", "metricName", "targetValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v1.CrossVersionObjectReference", "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v1_ObjectMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectMetricStatus indicates the current value of a metric describing a kubernetes object (for example, hits-per-second on an Ingress object).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target is the described Kubernetes object.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v1.CrossVersionObjectReference"), + }, + }, + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "currentValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentValue is the current value of the metric (as a quantity).", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric When set in the ObjectMetricSource, it is passed as an additional parameter to the metrics server for more specific metrics scoping. When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "averageValue": { + SchemaProps: spec.SchemaProps{ + Description: "averageValue is the current value of the average of the metric across all relevant pods (as a quantity)", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"target", "metricName", "currentValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v1.CrossVersionObjectReference", "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v1_PodsMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodsMetricSource indicates how to scale on a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "targetAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageValue is the target value of the average of the metric across all relevant pods (as a quantity)", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric When set, it is passed as an additional parameter to the metrics server for more specific metrics scoping When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + Required: []string{"metricName", "targetAverageValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v1_PodsMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodsMetricStatus indicates the current value of a metric describing each pod in the current scale target (for example, transactions-processed-per-second).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "currentAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageValue is the current value of the average of the metric across all relevant pods (as a quantity)", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric When set in the PodsMetricSource, it is passed as an additional parameter to the metrics server for more specific metrics scoping. When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + Required: []string{"metricName", "currentAverageValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v1_ResourceMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceMetricSource indicates how to scale on a resource metric known to Kubernetes, as specified in requests and limits, describing each pod in the current scale target (e.g. CPU or memory). The values will be averaged together before being compared to the target. Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. Only one \"target\" type should be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "targetAverageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageUtilization is the target value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "targetAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageValue is the target value of the average of the resource metric across all relevant pods, as a raw value (instead of as a percentage of the request), similar to the \"pods\" metric source type.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v1_ResourceMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceMetricStatus indicates the current value of a resource metric known to Kubernetes, as specified in requests and limits, describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "currentAverageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageUtilization is the current value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods. It will only be present if `targetAverageValue` was set in the corresponding metric specification.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageValue is the current value of the average of the resource metric across all relevant pods, as a raw value (instead of as a percentage of the request), similar to the \"pods\" metric source type. It will always be set, regardless of the corresponding metric specification.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"name", "currentAverageValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v1_Scale(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Scale represents a scaling request for a resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "defines the behavior of the scale. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v1.ScaleSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "current status of the scale. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status. Read-only.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v1.ScaleStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v1.ScaleSpec", "k8s.io/api/autoscaling/v1.ScaleStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_autoscaling_v1_ScaleSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ScaleSpec describes the attributes of a scale subresource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "desired number of instances for the scaled object.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_autoscaling_v1_ScaleStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ScaleStatus represents the current status of a scale subresource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "actual number of observed instances of the scaled object.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "label query over pods that should match the replicas count. This is same as the label selector but in the string format to avoid introspection by clients. The string will be in the same format as the query-param syntax. More info about label selectors: http://kubernetes.io/docs/user-guide/labels#label-selectors", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_ContainerResourceMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerResourceMetricSource indicates how to scale on a resource metric known to Kubernetes, as specified in requests and limits, describing each pod in the current scale target (e.g. CPU or memory). The values will be averaged together before being compared to the target. Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. Only one \"target\" type should be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "targetAverageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageUtilization is the target value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "targetAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageValue is the target value of the average of the resource metric across all relevant pods, as a raw value (instead of as a percentage of the request), similar to the \"pods\" metric source type.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "container is the name of the container in the pods of the scaling target", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "container"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_ContainerResourceMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerResourceMetricStatus indicates the current value of a resource metric known to Kubernetes, as specified in requests and limits, describing a single container in each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "currentAverageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageUtilization is the current value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods. It will only be present if `targetAverageValue` was set in the corresponding metric specification.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageValue is the current value of the average of the resource metric across all relevant pods, as a raw value (instead of as a percentage of the request), similar to the \"pods\" metric source type. It will always be set, regardless of the corresponding metric specification.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "container is the name of the container in the pods of the scaling target", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "currentAverageValue", "container"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_CrossVersionObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CrossVersionObjectReference contains enough information to let you identify the referred resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of the referent; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent; More info: http://kubernetes.io/docs/user-guide/identifiers#names", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "API version of the referent", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_ExternalMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalMetricSource indicates how to scale on a metric not associated with any Kubernetes object (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster). Exactly one \"target\" type should be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "metricSelector": { + SchemaProps: spec.SchemaProps{ + Description: "metricSelector is used to identify a specific time series within a given metric.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "targetValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetValue is the target value of the metric (as a quantity). Mutually exclusive with TargetAverageValue.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "targetAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageValue is the target per-pod value of global metric (as a quantity). Mutually exclusive with TargetValue.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"metricName"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_ExternalMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalMetricStatus indicates the current value of a global metric not associated with any Kubernetes object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of a metric used for autoscaling in metric system.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "metricSelector": { + SchemaProps: spec.SchemaProps{ + Description: "metricSelector is used to identify a specific time series within a given metric.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "currentValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentValue is the current value of the metric (as a quantity)", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "currentAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageValue is the current value of metric averaged over autoscaled pods.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"metricName", "currentValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscaler(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "metadata is the standard object metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec is the specification for the behaviour of the autoscaler. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status is the current information about the autoscaler.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerSpec", "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscalerCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerCondition describes the state of a HorizontalPodAutoscaler at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type describes the current condition", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status is the status of the condition (True, False, Unknown)", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastTransitionTime is the last time the condition transitioned from one status to another", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason is the reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "message is a human-readable explanation containing details about the transition", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscalerList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscaler is a list of horizontal pod autoscaler objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "metadata is the standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of horizontal pod autoscaler objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscaler"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscaler", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscalerSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerSpec describes the desired functionality of the HorizontalPodAutoscaler.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "scaleTargetRef": { + SchemaProps: spec.SchemaProps{ + Description: "scaleTargetRef points to the target resource to scale, and is used to the pods for which metrics should be collected, as well as to actually change the replica count.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.CrossVersionObjectReference"), + }, + }, + "minReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "minReplicas is the lower limit for the number of replicas to which the autoscaler can scale down. It defaults to 1 pod. minReplicas is allowed to be 0 if the alpha feature gate HPAScaleToZero is enabled and at least one Object or External metric is configured. Scaling is active as long as at least one metric value is available.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "maxReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "maxReplicas is the upper limit for the number of replicas to which the autoscaler can scale up. It cannot be less that minReplicas.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "metrics": { + SchemaProps: spec.SchemaProps{ + Description: "metrics contains the specifications for which to use to calculate the desired replica count (the maximum replica count across all metrics will be used). The desired replica count is calculated multiplying the ratio between the target value and the current value by the current number of pods. Ergo, metrics used must decrease as the pod count is increased, and vice-versa. See the individual metric source types for more information about how each type of metric must respond.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.MetricSpec"), + }, + }, + }, + }, + }, + }, + Required: []string{"scaleTargetRef", "maxReplicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta1.CrossVersionObjectReference", "k8s.io/api/autoscaling/v2beta1.MetricSpec"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_HorizontalPodAutoscalerStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerStatus describes the current status of a horizontal pod autoscaler.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "observedGeneration is the most recent generation observed by this autoscaler.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "lastScaleTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastScaleTime is the last time the HorizontalPodAutoscaler scaled the number of pods, used by the autoscaler to control how often the number of pods is changed.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "currentReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "currentReplicas is current number of replicas of pods managed by this autoscaler, as last seen by the autoscaler.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "desiredReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "desiredReplicas is the desired number of replicas of pods managed by this autoscaler, as last calculated by the autoscaler.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentMetrics": { + SchemaProps: spec.SchemaProps{ + Description: "currentMetrics is the last read state of the metrics used by this autoscaler.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.MetricStatus"), + }, + }, + }, + }, + }, + "conditions": { + SchemaProps: spec.SchemaProps{ + Description: "conditions is the set of conditions required for this autoscaler to scale its target, and indicates whether or not those conditions are met.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"currentReplicas", "desiredReplicas", "conditions"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta1.HorizontalPodAutoscalerCondition", "k8s.io/api/autoscaling/v2beta1.MetricStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_MetricSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricSpec specifies how to scale based on a single metric (only `type` and one other matching field should be set at once).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of metric source. It should be one of \"ContainerResource\", \"External\", \"Object\", \"Pods\" or \"Resource\", each mapping to a matching field in the object. Note: \"ContainerResource\" type is available on when the feature-gate HPAContainerMetrics is enabled", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "object": { + SchemaProps: spec.SchemaProps{ + Description: "object refers to a metric describing a single kubernetes object (for example, hits-per-second on an Ingress object).", + Ref: ref("k8s.io/api/autoscaling/v2beta1.ObjectMetricSource"), + }, + }, + "pods": { + SchemaProps: spec.SchemaProps{ + Description: "pods refers to a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Ref: ref("k8s.io/api/autoscaling/v2beta1.PodsMetricSource"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v2beta1.ResourceMetricSource"), + }, + }, + "containerResource": { + SchemaProps: spec.SchemaProps{ + Description: "container resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing a single container in each pod of the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. This is an alpha feature and can be enabled by the HPAContainerMetrics feature flag.", + Ref: ref("k8s.io/api/autoscaling/v2beta1.ContainerResourceMetricSource"), + }, + }, + "external": { + SchemaProps: spec.SchemaProps{ + Description: "external refers to a global metric that is not associated with any Kubernetes object. It allows autoscaling based on information coming from components running outside of cluster (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster).", + Ref: ref("k8s.io/api/autoscaling/v2beta1.ExternalMetricSource"), + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta1.ContainerResourceMetricSource", "k8s.io/api/autoscaling/v2beta1.ExternalMetricSource", "k8s.io/api/autoscaling/v2beta1.ObjectMetricSource", "k8s.io/api/autoscaling/v2beta1.PodsMetricSource", "k8s.io/api/autoscaling/v2beta1.ResourceMetricSource"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_MetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricStatus describes the last-read state of a single metric.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of metric source. It will be one of \"ContainerResource\", \"External\", \"Object\", \"Pods\" or \"Resource\", each corresponds to a matching field in the object. Note: \"ContainerResource\" type is available on when the feature-gate HPAContainerMetrics is enabled", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "object": { + SchemaProps: spec.SchemaProps{ + Description: "object refers to a metric describing a single kubernetes object (for example, hits-per-second on an Ingress object).", + Ref: ref("k8s.io/api/autoscaling/v2beta1.ObjectMetricStatus"), + }, + }, + "pods": { + SchemaProps: spec.SchemaProps{ + Description: "pods refers to a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Ref: ref("k8s.io/api/autoscaling/v2beta1.PodsMetricStatus"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v2beta1.ResourceMetricStatus"), + }, + }, + "containerResource": { + SchemaProps: spec.SchemaProps{ + Description: "container resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing a single container in each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v2beta1.ContainerResourceMetricStatus"), + }, + }, + "external": { + SchemaProps: spec.SchemaProps{ + Description: "external refers to a global metric that is not associated with any Kubernetes object. It allows autoscaling based on information coming from components running outside of cluster (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster).", + Ref: ref("k8s.io/api/autoscaling/v2beta1.ExternalMetricStatus"), + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta1.ContainerResourceMetricStatus", "k8s.io/api/autoscaling/v2beta1.ExternalMetricStatus", "k8s.io/api/autoscaling/v2beta1.ObjectMetricStatus", "k8s.io/api/autoscaling/v2beta1.PodsMetricStatus", "k8s.io/api/autoscaling/v2beta1.ResourceMetricStatus"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_ObjectMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectMetricSource indicates how to scale on a metric describing a kubernetes object (for example, hits-per-second on an Ingress object).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target is the described Kubernetes object.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.CrossVersionObjectReference"), + }, + }, + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "targetValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetValue is the target value of the metric (as a quantity).", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric When set, it is passed as an additional parameter to the metrics server for more specific metrics scoping When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "averageValue": { + SchemaProps: spec.SchemaProps{ + Description: "averageValue is the target value of the average of the metric across all relevant pods (as a quantity)", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"target", "metricName", "targetValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta1.CrossVersionObjectReference", "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_ObjectMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectMetricStatus indicates the current value of a metric describing a kubernetes object (for example, hits-per-second on an Ingress object).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target is the described Kubernetes object.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta1.CrossVersionObjectReference"), + }, + }, + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "currentValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentValue is the current value of the metric (as a quantity).", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric When set in the ObjectMetricSource, it is passed as an additional parameter to the metrics server for more specific metrics scoping. When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "averageValue": { + SchemaProps: spec.SchemaProps{ + Description: "averageValue is the current value of the average of the metric across all relevant pods (as a quantity)", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"target", "metricName", "currentValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta1.CrossVersionObjectReference", "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_PodsMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodsMetricSource indicates how to scale on a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "targetAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageValue is the target value of the average of the metric across all relevant pods (as a quantity)", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric When set, it is passed as an additional parameter to the metrics server for more specific metrics scoping When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + Required: []string{"metricName", "targetAverageValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_PodsMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodsMetricStatus indicates the current value of a metric describing each pod in the current scale target (for example, transactions-processed-per-second).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "metricName is the name of the metric in question", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "currentAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageValue is the current value of the average of the metric across all relevant pods (as a quantity)", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric When set in the PodsMetricSource, it is passed as an additional parameter to the metrics server for more specific metrics scoping. When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + Required: []string{"metricName", "currentAverageValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_ResourceMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceMetricSource indicates how to scale on a resource metric known to Kubernetes, as specified in requests and limits, describing each pod in the current scale target (e.g. CPU or memory). The values will be averaged together before being compared to the target. Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. Only one \"target\" type should be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "targetAverageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageUtilization is the target value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "targetAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "targetAverageValue is the target value of the average of the resource metric across all relevant pods, as a raw value (instead of as a percentage of the request), similar to the \"pods\" metric source type.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta1_ResourceMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceMetricStatus indicates the current value of a resource metric known to Kubernetes, as specified in requests and limits, describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "currentAverageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageUtilization is the current value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods. It will only be present if `targetAverageValue` was set in the corresponding metric specification.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentAverageValue": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageValue is the current value of the average of the resource metric across all relevant pods, as a raw value (instead of as a percentage of the request), similar to the \"pods\" metric source type. It will always be set, regardless of the corresponding metric specification.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"name", "currentAverageValue"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_ContainerResourceMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerResourceMetricSource indicates how to scale on a resource metric known to Kubernetes, as specified in requests and limits, describing each pod in the current scale target (e.g. CPU or memory). The values will be averaged together before being compared to the target. Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. Only one \"target\" type should be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target specifies the target value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricTarget"), + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "container is the name of the container in the pods of the scaling target", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "target", "container"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.MetricTarget"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_ContainerResourceMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerResourceMetricStatus indicates the current value of a resource metric known to Kubernetes, as specified in requests and limits, describing a single container in each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "current": { + SchemaProps: spec.SchemaProps{ + Description: "current contains the current value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricValueStatus"), + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "Container is the name of the container in the pods of the scaling target", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "current", "container"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.MetricValueStatus"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_CrossVersionObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CrossVersionObjectReference contains enough information to let you identify the referred resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of the referent; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent; More info: http://kubernetes.io/docs/user-guide/identifiers#names", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "API version of the referent", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_ExternalMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalMetricSource indicates how to scale on a metric not associated with any Kubernetes object (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metric": { + SchemaProps: spec.SchemaProps{ + Description: "metric identifies the target metric by name and selector", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricIdentifier"), + }, + }, + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target specifies the target value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricTarget"), + }, + }, + }, + Required: []string{"metric", "target"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.MetricIdentifier", "k8s.io/api/autoscaling/v2beta2.MetricTarget"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_ExternalMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalMetricStatus indicates the current value of a global metric not associated with any Kubernetes object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metric": { + SchemaProps: spec.SchemaProps{ + Description: "metric identifies the target metric by name and selector", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricIdentifier"), + }, + }, + "current": { + SchemaProps: spec.SchemaProps{ + Description: "current contains the current value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricValueStatus"), + }, + }, + }, + Required: []string{"metric", "current"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.MetricIdentifier", "k8s.io/api/autoscaling/v2beta2.MetricValueStatus"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_HPAScalingPolicy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HPAScalingPolicy is a single policy which must hold true for a specified past interval.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type is used to specify the scaling policy.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "Value contains the amount of change which is permitted by the policy. It must be greater than zero", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "periodSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "PeriodSeconds specifies the window of time for which the policy should hold true. PeriodSeconds must be greater than zero and less than or equal to 1800 (30 min).", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"type", "value", "periodSeconds"}, + }, + }, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_HPAScalingRules(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HPAScalingRules configures the scaling behavior for one direction. These Rules are applied after calculating DesiredReplicas from metrics for the HPA. They can limit the scaling velocity by specifying scaling policies. They can prevent flapping by specifying the stabilization window, so that the number of replicas is not set instantly, instead, the safest value from the stabilization window is chosen.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "stabilizationWindowSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "StabilizationWindowSeconds is the number of seconds for which past recommendations should be considered while scaling up or scaling down. StabilizationWindowSeconds must be greater than or equal to zero and less than or equal to 3600 (one hour). If not set, use the default values: - For scale up: 0 (i.e. no stabilization is done). - For scale down: 300 (i.e. the stabilization window is 300 seconds long).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selectPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "selectPolicy is used to specify which policy should be used. If not set, the default value MaxPolicySelect is used.", + Type: []string{"string"}, + Format: "", + }, + }, + "policies": { + SchemaProps: spec.SchemaProps{ + Description: "policies is a list of potential scaling polices which can be used during scaling. At least one policy must be specified, otherwise the HPAScalingRules will be discarded as invalid", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.HPAScalingPolicy"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.HPAScalingPolicy"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscaler(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "metadata is the standard object metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec is the specification for the behaviour of the autoscaler. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status is the current information about the autoscaler.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerSpec", "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerBehavior(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerBehavior configures the scaling behavior of the target in both Up and Down directions (scaleUp and scaleDown fields respectively).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "scaleUp": { + SchemaProps: spec.SchemaProps{ + Description: "scaleUp is scaling policy for scaling Up. If not set, the default value is the higher of:\n * increase no more than 4 pods per 60 seconds\n * double the number of pods per 60 seconds\nNo stabilization is used.", + Ref: ref("k8s.io/api/autoscaling/v2beta2.HPAScalingRules"), + }, + }, + "scaleDown": { + SchemaProps: spec.SchemaProps{ + Description: "scaleDown is scaling policy for scaling Down. If not set, the default value is to allow to scale down to minReplicas pods, with a 300 second stabilization window (i.e., the highest recommendation for the last 300sec is used).", + Ref: ref("k8s.io/api/autoscaling/v2beta2.HPAScalingRules"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.HPAScalingRules"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerCondition describes the state of a HorizontalPodAutoscaler at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type describes the current condition", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status is the status of the condition (True, False, Unknown)", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastTransitionTime is the last time the condition transitioned from one status to another", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason is the reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "message is a human-readable explanation containing details about the transition", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerList is a list of horizontal pod autoscaler objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "metadata is the standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of horizontal pod autoscaler objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscaler"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscaler", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerSpec describes the desired functionality of the HorizontalPodAutoscaler.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "scaleTargetRef": { + SchemaProps: spec.SchemaProps{ + Description: "scaleTargetRef points to the target resource to scale, and is used to the pods for which metrics should be collected, as well as to actually change the replica count.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.CrossVersionObjectReference"), + }, + }, + "minReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "minReplicas is the lower limit for the number of replicas to which the autoscaler can scale down. It defaults to 1 pod. minReplicas is allowed to be 0 if the alpha feature gate HPAScaleToZero is enabled and at least one Object or External metric is configured. Scaling is active as long as at least one metric value is available.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "maxReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "maxReplicas is the upper limit for the number of replicas to which the autoscaler can scale up. It cannot be less that minReplicas.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "metrics": { + SchemaProps: spec.SchemaProps{ + Description: "metrics contains the specifications for which to use to calculate the desired replica count (the maximum replica count across all metrics will be used). The desired replica count is calculated multiplying the ratio between the target value and the current value by the current number of pods. Ergo, metrics used must decrease as the pod count is increased, and vice-versa. See the individual metric source types for more information about how each type of metric must respond. If not set, the default metric will be set to 80% average CPU utilization.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricSpec"), + }, + }, + }, + }, + }, + "behavior": { + SchemaProps: spec.SchemaProps{ + Description: "behavior configures the scaling behavior of the target in both Up and Down directions (scaleUp and scaleDown fields respectively). If not set, the default HPAScalingRules for scale up and scale down are used.", + Ref: ref("k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerBehavior"), + }, + }, + }, + Required: []string{"scaleTargetRef", "maxReplicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.CrossVersionObjectReference", "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerBehavior", "k8s.io/api/autoscaling/v2beta2.MetricSpec"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_HorizontalPodAutoscalerStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerStatus describes the current status of a horizontal pod autoscaler.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "observedGeneration is the most recent generation observed by this autoscaler.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "lastScaleTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastScaleTime is the last time the HorizontalPodAutoscaler scaled the number of pods, used by the autoscaler to control how often the number of pods is changed.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "currentReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "currentReplicas is current number of replicas of pods managed by this autoscaler, as last seen by the autoscaler.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "desiredReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "desiredReplicas is the desired number of replicas of pods managed by this autoscaler, as last calculated by the autoscaler.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentMetrics": { + SchemaProps: spec.SchemaProps{ + Description: "currentMetrics is the last read state of the metrics used by this autoscaler.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricStatus"), + }, + }, + }, + }, + }, + "conditions": { + SchemaProps: spec.SchemaProps{ + Description: "conditions is the set of conditions required for this autoscaler to scale its target, and indicates whether or not those conditions are met.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"currentReplicas", "desiredReplicas", "conditions"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.HorizontalPodAutoscalerCondition", "k8s.io/api/autoscaling/v2beta2.MetricStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_MetricIdentifier(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricIdentifier defines the name and optionally selector for a metric", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the given metric", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector is the string-encoded form of a standard kubernetes label selector for the given metric When set, it is passed as an additional parameter to the metrics server for more specific metrics scoping. When unset, just the metricName will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_MetricSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricSpec specifies how to scale based on a single metric (only `type` and one other matching field should be set at once).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of metric source. It should be one of \"ContainerResource\", \"External\", \"Object\", \"Pods\" or \"Resource\", each mapping to a matching field in the object. Note: \"ContainerResource\" type is available on when the feature-gate HPAContainerMetrics is enabled", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "object": { + SchemaProps: spec.SchemaProps{ + Description: "object refers to a metric describing a single kubernetes object (for example, hits-per-second on an Ingress object).", + Ref: ref("k8s.io/api/autoscaling/v2beta2.ObjectMetricSource"), + }, + }, + "pods": { + SchemaProps: spec.SchemaProps{ + Description: "pods refers to a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Ref: ref("k8s.io/api/autoscaling/v2beta2.PodsMetricSource"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v2beta2.ResourceMetricSource"), + }, + }, + "containerResource": { + SchemaProps: spec.SchemaProps{ + Description: "container resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing a single container in each pod of the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. This is an alpha feature and can be enabled by the HPAContainerMetrics feature flag.", + Ref: ref("k8s.io/api/autoscaling/v2beta2.ContainerResourceMetricSource"), + }, + }, + "external": { + SchemaProps: spec.SchemaProps{ + Description: "external refers to a global metric that is not associated with any Kubernetes object. It allows autoscaling based on information coming from components running outside of cluster (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster).", + Ref: ref("k8s.io/api/autoscaling/v2beta2.ExternalMetricSource"), + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.ContainerResourceMetricSource", "k8s.io/api/autoscaling/v2beta2.ExternalMetricSource", "k8s.io/api/autoscaling/v2beta2.ObjectMetricSource", "k8s.io/api/autoscaling/v2beta2.PodsMetricSource", "k8s.io/api/autoscaling/v2beta2.ResourceMetricSource"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_MetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricStatus describes the last-read state of a single metric.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of metric source. It will be one of \"ContainerResource\", \"External\", \"Object\", \"Pods\" or \"Resource\", each corresponds to a matching field in the object. Note: \"ContainerResource\" type is available on when the feature-gate HPAContainerMetrics is enabled", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "object": { + SchemaProps: spec.SchemaProps{ + Description: "object refers to a metric describing a single kubernetes object (for example, hits-per-second on an Ingress object).", + Ref: ref("k8s.io/api/autoscaling/v2beta2.ObjectMetricStatus"), + }, + }, + "pods": { + SchemaProps: spec.SchemaProps{ + Description: "pods refers to a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Ref: ref("k8s.io/api/autoscaling/v2beta2.PodsMetricStatus"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v2beta2.ResourceMetricStatus"), + }, + }, + "containerResource": { + SchemaProps: spec.SchemaProps{ + Description: "container resource refers to a resource metric (such as those specified in requests and limits) known to Kubernetes describing a single container in each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Ref: ref("k8s.io/api/autoscaling/v2beta2.ContainerResourceMetricStatus"), + }, + }, + "external": { + SchemaProps: spec.SchemaProps{ + Description: "external refers to a global metric that is not associated with any Kubernetes object. It allows autoscaling based on information coming from components running outside of cluster (for example length of queue in cloud messaging service, or QPS from loadbalancer running outside of cluster).", + Ref: ref("k8s.io/api/autoscaling/v2beta2.ExternalMetricStatus"), + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.ContainerResourceMetricStatus", "k8s.io/api/autoscaling/v2beta2.ExternalMetricStatus", "k8s.io/api/autoscaling/v2beta2.ObjectMetricStatus", "k8s.io/api/autoscaling/v2beta2.PodsMetricStatus", "k8s.io/api/autoscaling/v2beta2.ResourceMetricStatus"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_MetricTarget(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricTarget defines the target value, average value, or average utilization of a specific metric", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type represents whether the metric type is Utilization, Value, or AverageValue", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "value is the target value of the metric (as a quantity).", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "averageValue": { + SchemaProps: spec.SchemaProps{ + Description: "averageValue is the target value of the average of the metric across all relevant pods (as a quantity)", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "averageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "averageUtilization is the target value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods. Currently only valid for Resource metric source type", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_MetricValueStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricValueStatus holds the current value for a metric", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "value": { + SchemaProps: spec.SchemaProps{ + Description: "value is the current value of the metric (as a quantity).", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "averageValue": { + SchemaProps: spec.SchemaProps{ + Description: "averageValue is the current value of the average of the metric across all relevant pods (as a quantity)", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "averageUtilization": { + SchemaProps: spec.SchemaProps{ + Description: "currentAverageUtilization is the current value of the average of the resource metric across all relevant pods, represented as a percentage of the requested value of the resource for the pods.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_ObjectMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectMetricSource indicates how to scale on a metric describing a kubernetes object (for example, hits-per-second on an Ingress object).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "describedObject": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.CrossVersionObjectReference"), + }, + }, + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target specifies the target value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricTarget"), + }, + }, + "metric": { + SchemaProps: spec.SchemaProps{ + Description: "metric identifies the target metric by name and selector", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricIdentifier"), + }, + }, + }, + Required: []string{"describedObject", "target", "metric"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.CrossVersionObjectReference", "k8s.io/api/autoscaling/v2beta2.MetricIdentifier", "k8s.io/api/autoscaling/v2beta2.MetricTarget"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_ObjectMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectMetricStatus indicates the current value of a metric describing a kubernetes object (for example, hits-per-second on an Ingress object).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metric": { + SchemaProps: spec.SchemaProps{ + Description: "metric identifies the target metric by name and selector", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricIdentifier"), + }, + }, + "current": { + SchemaProps: spec.SchemaProps{ + Description: "current contains the current value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricValueStatus"), + }, + }, + "describedObject": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.CrossVersionObjectReference"), + }, + }, + }, + Required: []string{"metric", "current", "describedObject"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.CrossVersionObjectReference", "k8s.io/api/autoscaling/v2beta2.MetricIdentifier", "k8s.io/api/autoscaling/v2beta2.MetricValueStatus"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_PodsMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodsMetricSource indicates how to scale on a metric describing each pod in the current scale target (for example, transactions-processed-per-second). The values will be averaged together before being compared to the target value.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metric": { + SchemaProps: spec.SchemaProps{ + Description: "metric identifies the target metric by name and selector", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricIdentifier"), + }, + }, + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target specifies the target value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricTarget"), + }, + }, + }, + Required: []string{"metric", "target"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.MetricIdentifier", "k8s.io/api/autoscaling/v2beta2.MetricTarget"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_PodsMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodsMetricStatus indicates the current value of a metric describing each pod in the current scale target (for example, transactions-processed-per-second).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metric": { + SchemaProps: spec.SchemaProps{ + Description: "metric identifies the target metric by name and selector", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricIdentifier"), + }, + }, + "current": { + SchemaProps: spec.SchemaProps{ + Description: "current contains the current value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricValueStatus"), + }, + }, + }, + Required: []string{"metric", "current"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.MetricIdentifier", "k8s.io/api/autoscaling/v2beta2.MetricValueStatus"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_ResourceMetricSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceMetricSource indicates how to scale on a resource metric known to Kubernetes, as specified in requests and limits, describing each pod in the current scale target (e.g. CPU or memory). The values will be averaged together before being compared to the target. Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source. Only one \"target\" type should be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "target": { + SchemaProps: spec.SchemaProps{ + Description: "target specifies the target value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricTarget"), + }, + }, + }, + Required: []string{"name", "target"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.MetricTarget"}, + } +} + +func schema_k8sio_api_autoscaling_v2beta2_ResourceMetricStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceMetricStatus indicates the current value of a resource metric known to Kubernetes, as specified in requests and limits, describing each pod in the current scale target (e.g. CPU or memory). Such metrics are built in to Kubernetes, and have special scaling options on top of those available to normal per-pod metrics using the \"pods\" source.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of the resource in question.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "current": { + SchemaProps: spec.SchemaProps{ + Description: "current contains the current value for the given metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/autoscaling/v2beta2.MetricValueStatus"), + }, + }, + }, + Required: []string{"name", "current"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/autoscaling/v2beta2.MetricValueStatus"}, + } +} + +func schema_k8sio_api_batch_v1_Job(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Job represents the configuration of a single job.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of a job. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1.JobSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Current status of a job. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1.JobStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1.JobSpec", "k8s.io/api/batch/v1.JobStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_batch_v1_JobCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobCondition describes current state of a job.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of job condition, Complete or Failed.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastProbeTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition was checked.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transit from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "(brief) reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Human readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_batch_v1_JobList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobList is a collection of jobs.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of Jobs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1.Job"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1.Job", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_batch_v1_JobSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobSpec describes how the job execution will look like.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "parallelism": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the maximum desired number of pods the job should run at any given time. The actual number of pods running in steady state will be less than this number when ((.spec.completions - .status.successful) < .spec.parallelism), i.e. when the work left to do is less than max parallelism. More info: https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "completions": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the desired number of successfully finished pods the job should be run with. Setting to nil means that the success of any pod signals the success of all pods, and allows parallelism to have any positive value. Setting to 1 means that parallelism is limited to 1 and the success of that pod signals the success of the job. More info: https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "activeDeadlineSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the duration in seconds relative to the startTime that the job may be active before the system tries to terminate it; value must be positive integer", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "backoffLimit": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the number of retries before marking this job failed. Defaults to 6", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "A label query over pods that should match the pod count. Normally, the system sets this field for you. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "manualSelector": { + SchemaProps: spec.SchemaProps{ + Description: "manualSelector controls generation of pod labels and pod selectors. Leave `manualSelector` unset unless you are certain what you are doing. When false or unset, the system pick labels unique to this job and appends those labels to the pod template. When true, the user is responsible for picking unique labels and specifying the selector. Failure to pick a unique label may cause this and other jobs to not function correctly. However, You may see `manualSelector=true` in jobs that were created with the old `extensions/v1beta1` API. More info: https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/#specifying-your-own-pod-selector", + Type: []string{"boolean"}, + Format: "", + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Describes the pod that will be created when executing a job. More info: https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "ttlSecondsAfterFinished": { + SchemaProps: spec.SchemaProps{ + Description: "ttlSecondsAfterFinished limits the lifetime of a Job that has finished execution (either Complete or Failed). If this field is set, ttlSecondsAfterFinished after the Job finishes, it is eligible to be automatically deleted. When the Job is being deleted, its lifecycle guarantees (e.g. finalizers) will be honored. If this field is unset, the Job won't be automatically deleted. If this field is set to zero, the Job becomes eligible to be deleted immediately after it finishes. This field is alpha-level and is only honored by servers that enable the TTLAfterFinished feature.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"template"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_batch_v1_JobStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobStatus represents the current state of a Job.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The latest available observations of an object's current state. When a job fails, one of the conditions will have type == \"Failed\". More info: https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1.JobCondition"), + }, + }, + }, + }, + }, + "startTime": { + SchemaProps: spec.SchemaProps{ + Description: "Represents time when the job was acknowledged by the job controller. It is not guaranteed to be set in happens-before order across separate operations. It is represented in RFC3339 form and is in UTC.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "completionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Represents time when the job was completed. It is not guaranteed to be set in happens-before order across separate operations. It is represented in RFC3339 form and is in UTC. The completion time is only set when the job finishes successfully.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "active": { + SchemaProps: spec.SchemaProps{ + Description: "The number of actively running pods.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "succeeded": { + SchemaProps: spec.SchemaProps{ + Description: "The number of pods which reached phase Succeeded.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "failed": { + SchemaProps: spec.SchemaProps{ + Description: "The number of pods which reached phase Failed.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1.JobCondition", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_batch_v1beta1_CronJob(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJob represents the configuration of a single cron job.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of a cron job, including the schedule. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1beta1.CronJobSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Current status of a cron job. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1beta1.CronJobStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1beta1.CronJobSpec", "k8s.io/api/batch/v1beta1.CronJobStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_batch_v1beta1_CronJobList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJobList is a collection of cron jobs.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of CronJobs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1beta1.CronJob"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1beta1.CronJob", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_batch_v1beta1_CronJobSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJobSpec describes how the job execution will look like and when it will actually run.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "schedule": { + SchemaProps: spec.SchemaProps{ + Description: "The schedule in Cron format, see https://en.wikipedia.org/wiki/Cron.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "startingDeadlineSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Optional deadline in seconds for starting the job if it misses scheduled time for any reason. Missed jobs executions will be counted as failed ones.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "concurrencyPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies how to treat concurrent executions of a Job. Valid values are: - \"Allow\" (default): allows CronJobs to run concurrently; - \"Forbid\": forbids concurrent runs, skipping next run if previous run hasn't finished yet; - \"Replace\": cancels currently running job and replaces it with a new one", + Type: []string{"string"}, + Format: "", + }, + }, + "suspend": { + SchemaProps: spec.SchemaProps{ + Description: "This flag tells the controller to suspend subsequent executions, it does not apply to already started executions. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "jobTemplate": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the job that will be created when executing a CronJob.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1beta1.JobTemplateSpec"), + }, + }, + "successfulJobsHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of successful finished jobs to retain. This is a pointer to distinguish between explicit zero and not specified. Defaults to 3.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "failedJobsHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of failed finished jobs to retain. This is a pointer to distinguish between explicit zero and not specified. Defaults to 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"schedule", "jobTemplate"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1beta1.JobTemplateSpec"}, + } +} + +func schema_k8sio_api_batch_v1beta1_CronJobStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJobStatus represents the current state of a cron job.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "active": { + SchemaProps: spec.SchemaProps{ + Description: "A list of pointers to currently running jobs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + }, + }, + }, + "lastScheduleTime": { + SchemaProps: spec.SchemaProps{ + Description: "Information when was the last time the job was successfully scheduled.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_batch_v1beta1_JobTemplate(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobTemplate describes a template for creating copies of a predefined pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Defines jobs that will be created from this template. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1beta1.JobTemplateSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1beta1.JobTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_batch_v1beta1_JobTemplateSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobTemplateSpec describes the data a Job should have when created from a template", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata of the jobs created from this template. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the job. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1.JobSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1.JobSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_batch_v2alpha1_CronJob(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJob represents the configuration of a single cron job.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of a cron job, including the schedule. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v2alpha1.CronJobSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Current status of a cron job. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v2alpha1.CronJobStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v2alpha1.CronJobSpec", "k8s.io/api/batch/v2alpha1.CronJobStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_batch_v2alpha1_CronJobList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJobList is a collection of cron jobs.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of CronJobs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v2alpha1.CronJob"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v2alpha1.CronJob", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_batch_v2alpha1_CronJobSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJobSpec describes how the job execution will look like and when it will actually run.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "schedule": { + SchemaProps: spec.SchemaProps{ + Description: "The schedule in Cron format, see https://en.wikipedia.org/wiki/Cron.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "startingDeadlineSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Optional deadline in seconds for starting the job if it misses scheduled time for any reason. Missed jobs executions will be counted as failed ones.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "concurrencyPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies how to treat concurrent executions of a Job. Valid values are: - \"Allow\" (default): allows CronJobs to run concurrently; - \"Forbid\": forbids concurrent runs, skipping next run if previous run hasn't finished yet; - \"Replace\": cancels currently running job and replaces it with a new one", + Type: []string{"string"}, + Format: "", + }, + }, + "suspend": { + SchemaProps: spec.SchemaProps{ + Description: "This flag tells the controller to suspend subsequent executions, it does not apply to already started executions. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "jobTemplate": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the job that will be created when executing a CronJob.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v2alpha1.JobTemplateSpec"), + }, + }, + "successfulJobsHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of successful finished jobs to retain. This is a pointer to distinguish between explicit zero and not specified.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "failedJobsHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of failed finished jobs to retain. This is a pointer to distinguish between explicit zero and not specified.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"schedule", "jobTemplate"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v2alpha1.JobTemplateSpec"}, + } +} + +func schema_k8sio_api_batch_v2alpha1_CronJobStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJobStatus represents the current state of a cron job.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "active": { + SchemaProps: spec.SchemaProps{ + Description: "A list of pointers to currently running jobs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + }, + }, + }, + "lastScheduleTime": { + SchemaProps: spec.SchemaProps{ + Description: "Information when was the last time the job was successfully scheduled.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_batch_v2alpha1_JobTemplate(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobTemplate describes a template for creating copies of a predefined pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Defines jobs that will be created from this template. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v2alpha1.JobTemplateSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v2alpha1.JobTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_batch_v2alpha1_JobTemplateSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobTemplateSpec describes the data a Job should have when created from a template", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata of the jobs created from this template. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the job. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/batch/v1.JobSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/batch/v1.JobSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_certificates_v1_CertificateSigningRequest(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CertificateSigningRequest objects provide a mechanism to obtain x509 certificates by submitting a certificate signing request, and having it asynchronously approved and issued.\n\nKubelets use this API to obtain:\n 1. client certificates to authenticate to kube-apiserver (with the \"kubernetes.io/kube-apiserver-client-kubelet\" signerName).\n 2. serving certificates for TLS endpoints kube-apiserver can connect to securely (with the \"kubernetes.io/kubelet-serving\" signerName).\n\nThis API can be used to request client certificates to authenticate to kube-apiserver (with the \"kubernetes.io/kube-apiserver-client\" signerName), or to obtain certificates from custom non-Kubernetes signers.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec contains the certificate request, and is immutable after creation. Only the request, signerName, and usages fields can be set on creation. Other fields are derived by Kubernetes and cannot be modified by users.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/certificates/v1.CertificateSigningRequestSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status contains information about whether the request is approved or denied, and the certificate issued by the signer, or the failure condition indicating signer failure.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/certificates/v1.CertificateSigningRequestStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/certificates/v1.CertificateSigningRequestSpec", "k8s.io/api/certificates/v1.CertificateSigningRequestStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_certificates_v1_CertificateSigningRequestCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CertificateSigningRequestCondition describes a condition of a CertificateSigningRequest object", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type of the condition. Known conditions are \"Approved\", \"Denied\", and \"Failed\".\n\nAn \"Approved\" condition is added via the /approval subresource, indicating the request was approved and should be issued by the signer.\n\nA \"Denied\" condition is added via the /approval subresource, indicating the request was denied and should not be issued by the signer.\n\nA \"Failed\" condition is added via the /status subresource, indicating the signer failed to issue the certificate.\n\nApproved and Denied conditions are mutually exclusive. Approved, Denied, and Failed conditions cannot be removed once added.\n\nOnly one condition of a given type is allowed.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status of the condition, one of True, False, Unknown. Approved, Denied, and Failed conditions may not be \"False\" or \"Unknown\".", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason indicates a brief reason for the request state", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "message contains a human readable message with details about the request state", + Type: []string{"string"}, + Format: "", + }, + }, + "lastUpdateTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastUpdateTime is the time of the last update to this condition", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastTransitionTime is the time the condition last transitioned from one status to another. If unset, when a new condition type is added or an existing condition's status is changed, the server defaults this to the current time.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_certificates_v1_CertificateSigningRequestList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CertificateSigningRequestList is a collection of CertificateSigningRequest objects", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is a collection of CertificateSigningRequest objects", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/certificates/v1.CertificateSigningRequest"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/certificates/v1.CertificateSigningRequest", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_certificates_v1_CertificateSigningRequestSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CertificateSigningRequestSpec contains the certificate request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "request": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "request contains an x509 certificate signing request encoded in a \"CERTIFICATE REQUEST\" PEM block. When serialized as JSON or YAML, the data is additionally base64-encoded.", + Type: []string{"string"}, + Format: "byte", + }, + }, + "signerName": { + SchemaProps: spec.SchemaProps{ + Description: "signerName indicates the requested signer, and is a qualified name.\n\nList/watch requests for CertificateSigningRequests can filter on this field using a \"spec.signerName=NAME\" fieldSelector.\n\nWell-known Kubernetes signers are:\n 1. \"kubernetes.io/kube-apiserver-client\": issues client certificates that can be used to authenticate to kube-apiserver.\n Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the \"csrsigning\" controller in kube-controller-manager.\n 2. \"kubernetes.io/kube-apiserver-client-kubelet\": issues client certificates that kubelets use to authenticate to kube-apiserver.\n Requests for this signer can be auto-approved by the \"csrapproving\" controller in kube-controller-manager, and can be issued by the \"csrsigning\" controller in kube-controller-manager.\n 3. \"kubernetes.io/kubelet-serving\" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.\n Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the \"csrsigning\" controller in kube-controller-manager.\n\nMore details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers\n\nCustom signerNames can also be specified. The signer defines:\n 1. Trust distribution: how trust (CA bundles) are distributed.\n 2. Permitted subjects: and behavior when a disallowed subject is requested.\n 3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.\n 4. Required, permitted, or forbidden key usages / extended key usages.\n 5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.\n 6. Whether or not requests for CA certificates are allowed.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "usages": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "usages specifies a set of key usages requested in the issued certificate.\n\nRequests for TLS client certificates typically request: \"digital signature\", \"key encipherment\", \"client auth\".\n\nRequests for TLS serving certificates typically request: \"key encipherment\", \"digital signature\", \"server auth\".\n\nValid values are:\n \"signing\", \"digital signature\", \"content commitment\",\n \"key encipherment\", \"key agreement\", \"data encipherment\",\n \"cert sign\", \"crl sign\", \"encipher only\", \"decipher only\", \"any\",\n \"server auth\", \"client auth\",\n \"code signing\", \"email protection\", \"s/mime\",\n \"ipsec end system\", \"ipsec tunnel\", \"ipsec user\",\n \"timestamping\", \"ocsp signing\", \"microsoft sgc\", \"netscape sgc\"", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "username": { + SchemaProps: spec.SchemaProps{ + Description: "username contains the name of the user that created the CertificateSigningRequest. Populated by the API server on creation and immutable.", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "uid contains the uid of the user that created the CertificateSigningRequest. Populated by the API server on creation and immutable.", + Type: []string{"string"}, + Format: "", + }, + }, + "groups": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "groups contains group membership of the user that created the CertificateSigningRequest. Populated by the API server on creation and immutable.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "extra": { + SchemaProps: spec.SchemaProps{ + Description: "extra contains extra attributes of the user that created the CertificateSigningRequest. Populated by the API server on creation and immutable.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + }, + Required: []string{"request", "signerName"}, + }, + }, + } +} + +func schema_k8sio_api_certificates_v1_CertificateSigningRequestStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CertificateSigningRequestStatus contains conditions used to indicate approved/denied/failed status of the request, and the issued certificate.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "conditions applied to the request. Known conditions are \"Approved\", \"Denied\", and \"Failed\".", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/certificates/v1.CertificateSigningRequestCondition"), + }, + }, + }, + }, + }, + "certificate": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "certificate is populated with an issued certificate by the signer after an Approved condition is present. This field is set via the /status subresource. Once populated, this field is immutable.\n\nIf the certificate signing request is denied, a condition of type \"Denied\" is added and this field remains empty. If the signer cannot issue the certificate, a condition of type \"Failed\" is added and this field remains empty.\n\nValidation requirements:\n 1. certificate must contain one or more PEM blocks.\n 2. All PEM blocks must have the \"CERTIFICATE\" label, contain no headers, and the encoded data\n must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.\n 3. Non-PEM content may appear before or after the \"CERTIFICATE\" PEM blocks and is unvalidated,\n to allow for explanatory text as described in section 5.2 of RFC7468.\n\nIf more than one PEM block is present, and the definition of the requested spec.signerName does not indicate otherwise, the first block is the issued certificate, and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.\n\nThe certificate is encoded in PEM format.\n\nWhen serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:\n\n base64(\n -----BEGIN CERTIFICATE-----\n ...\n -----END CERTIFICATE-----\n )", + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/certificates/v1.CertificateSigningRequestCondition"}, + } +} + +func schema_k8sio_api_certificates_v1beta1_CertificateSigningRequest(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Describes a certificate signing request", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "The certificate request itself and any additional information.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/certificates/v1beta1.CertificateSigningRequestSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Derived information about the request.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/certificates/v1beta1.CertificateSigningRequestStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/certificates/v1beta1.CertificateSigningRequestSpec", "k8s.io/api/certificates/v1beta1.CertificateSigningRequestStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type of the condition. Known conditions include \"Approved\", \"Denied\", and \"Failed\".", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown. Approved, Denied, and Failed conditions may not be \"False\" or \"Unknown\". Defaults to \"True\". If unset, should be treated as \"True\".", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "brief reason for the request state", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "human readable message with details about the request state", + Type: []string{"string"}, + Format: "", + }, + }, + "lastUpdateTime": { + SchemaProps: spec.SchemaProps{ + Description: "timestamp for the last update to this condition", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastTransitionTime is the time the condition last transitioned from one status to another. If unset, when a new condition type is added or an existing condition's status is changed, the server defaults this to the current time.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/certificates/v1beta1.CertificateSigningRequest"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/certificates/v1beta1.CertificateSigningRequest", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "This information is immutable after the request is created. Only the Request and Usages fields can be set on creation, other fields are derived by Kubernetes and cannot be modified by users.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "request": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Base64-encoded PKCS#10 CSR data", + Type: []string{"string"}, + Format: "byte", + }, + }, + "signerName": { + SchemaProps: spec.SchemaProps{ + Description: "Requested signer for the request. It is a qualified name in the form: `scope-hostname.io/name`. If empty, it will be defaulted:\n 1. If it's a kubelet client certificate, it is assigned\n \"kubernetes.io/kube-apiserver-client-kubelet\".\n 2. If it's a kubelet serving certificate, it is assigned\n \"kubernetes.io/kubelet-serving\".\n 3. Otherwise, it is assigned \"kubernetes.io/legacy-unknown\".\nDistribution of trust for signers happens out of band. You can select on this field using `spec.signerName`.", + Type: []string{"string"}, + Format: "", + }, + }, + "usages": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "allowedUsages specifies a set of usage contexts the key will be valid for. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3\n https://tools.ietf.org/html/rfc5280#section-4.2.1.12\nValid values are:\n \"signing\",\n \"digital signature\",\n \"content commitment\",\n \"key encipherment\",\n \"key agreement\",\n \"data encipherment\",\n \"cert sign\",\n \"crl sign\",\n \"encipher only\",\n \"decipher only\",\n \"any\",\n \"server auth\",\n \"client auth\",\n \"code signing\",\n \"email protection\",\n \"s/mime\",\n \"ipsec end system\",\n \"ipsec tunnel\",\n \"ipsec user\",\n \"timestamping\",\n \"ocsp signing\",\n \"microsoft sgc\",\n \"netscape sgc\"", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "username": { + SchemaProps: spec.SchemaProps{ + Description: "Information about the requesting user. See user.Info interface for details.", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID information about the requesting user. See user.Info interface for details.", + Type: []string{"string"}, + Format: "", + }, + }, + "groups": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Group information about the requesting user. See user.Info interface for details.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "extra": { + SchemaProps: spec.SchemaProps{ + Description: "Extra information about the requesting user. See user.Info interface for details.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + }, + Required: []string{"request"}, + }, + }, + } +} + +func schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Conditions applied to the request, such as approval or denial.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/certificates/v1beta1.CertificateSigningRequestCondition"), + }, + }, + }, + }, + }, + "certificate": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "If request was approved, the controller will place the issued certificate here.", + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/certificates/v1beta1.CertificateSigningRequestCondition"}, + } +} + +func schema_k8sio_api_coordination_v1_Lease(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Lease defines a lease concept.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the Lease. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/coordination/v1.LeaseSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/coordination/v1.LeaseSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_coordination_v1_LeaseList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LeaseList is a list of Lease objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/coordination/v1.Lease"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/coordination/v1.Lease", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_coordination_v1_LeaseSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LeaseSpec is a specification of a Lease.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "holderIdentity": { + SchemaProps: spec.SchemaProps{ + Description: "holderIdentity contains the identity of the holder of a current lease.", + Type: []string{"string"}, + Format: "", + }, + }, + "leaseDurationSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "leaseDurationSeconds is a duration that candidates for a lease need to wait to force acquire it. This is measure against time of last observed RenewTime.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "acquireTime": { + SchemaProps: spec.SchemaProps{ + Description: "acquireTime is a time when the current lease was acquired.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "renewTime": { + SchemaProps: spec.SchemaProps{ + Description: "renewTime is a time when the current holder of a lease has last updated the lease.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "leaseTransitions": { + SchemaProps: spec.SchemaProps{ + Description: "leaseTransitions is the number of transitions of a lease between holders.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"}, + } +} + +func schema_k8sio_api_coordination_v1beta1_Lease(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Lease defines a lease concept.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the Lease. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/coordination/v1beta1.LeaseSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/coordination/v1beta1.LeaseSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_coordination_v1beta1_LeaseList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LeaseList is a list of Lease objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/coordination/v1beta1.Lease"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/coordination/v1beta1.Lease", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_coordination_v1beta1_LeaseSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LeaseSpec is a specification of a Lease.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "holderIdentity": { + SchemaProps: spec.SchemaProps{ + Description: "holderIdentity contains the identity of the holder of a current lease.", + Type: []string{"string"}, + Format: "", + }, + }, + "leaseDurationSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "leaseDurationSeconds is a duration that candidates for a lease need to wait to force acquire it. This is measure against time of last observed RenewTime.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "acquireTime": { + SchemaProps: spec.SchemaProps{ + Description: "acquireTime is a time when the current lease was acquired.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "renewTime": { + SchemaProps: spec.SchemaProps{ + Description: "renewTime is a time when the current holder of a lease has last updated the lease.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "leaseTransitions": { + SchemaProps: spec.SchemaProps{ + Description: "leaseTransitions is the number of transitions of a lease between holders.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"}, + } +} + +func schema_k8sio_api_core_v1_AWSElasticBlockStoreVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Persistent Disk resource in AWS.\n\nAn AWS EBS disk must exist before mounting to a container. The disk must also be in the same AWS zone as the kubelet. An AWS EBS disk can only be mounted as read/write once. AWS EBS volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumeID": { + SchemaProps: spec.SchemaProps{ + Description: "Unique ID of the persistent disk resource in AWS (Amazon EBS volume). More info: https://kubernetes.io/docs/concepts/storage/volumes#awselasticblockstore", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type of the volume that you want to mount. Tip: Ensure that the filesystem type is supported by the host operating system. Examples: \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified. More info: https://kubernetes.io/docs/concepts/storage/volumes#awselasticblockstore", + Type: []string{"string"}, + Format: "", + }, + }, + "partition": { + SchemaProps: spec.SchemaProps{ + Description: "The partition in the volume that you want to mount. If omitted, the default is to mount by volume name. Examples: For volume /dev/sda1, you specify the partition as \"1\". Similarly, the volume partition for /dev/sda is \"0\" (or you can leave the property empty).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Specify \"true\" to force and set the ReadOnly property in VolumeMounts to \"true\". If omitted, the default is \"false\". More info: https://kubernetes.io/docs/concepts/storage/volumes#awselasticblockstore", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"volumeID"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_Affinity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Affinity is a group of affinity scheduling rules.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "nodeAffinity": { + SchemaProps: spec.SchemaProps{ + Description: "Describes node affinity scheduling rules for the pod.", + Ref: ref("k8s.io/api/core/v1.NodeAffinity"), + }, + }, + "podAffinity": { + SchemaProps: spec.SchemaProps{ + Description: "Describes pod affinity scheduling rules (e.g. co-locate this pod in the same node, zone, etc. as some other pod(s)).", + Ref: ref("k8s.io/api/core/v1.PodAffinity"), + }, + }, + "podAntiAffinity": { + SchemaProps: spec.SchemaProps{ + Description: "Describes pod anti-affinity scheduling rules (e.g. avoid putting this pod in the same node, zone, etc. as some other pod(s)).", + Ref: ref("k8s.io/api/core/v1.PodAntiAffinity"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeAffinity", "k8s.io/api/core/v1.PodAffinity", "k8s.io/api/core/v1.PodAntiAffinity"}, + } +} + +func schema_k8sio_api_core_v1_AttachedVolume(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AttachedVolume describes a volume attached to a node", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the attached volume", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "devicePath": { + SchemaProps: spec.SchemaProps{ + Description: "DevicePath represents the device path where the volume should be available", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "devicePath"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_AvoidPods(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AvoidPods describes pods that should avoid this node. This is the value for a Node annotation with key scheduler.alpha.kubernetes.io/preferAvoidPods and will eventually become a field of NodeStatus.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "preferAvoidPods": { + SchemaProps: spec.SchemaProps{ + Description: "Bounded-sized list of signatures of pods that should avoid this node, sorted in timestamp order from oldest to newest. Size of the slice is unspecified.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PreferAvoidPodsEntry"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PreferAvoidPodsEntry"}, + } +} + +func schema_k8sio_api_core_v1_AzureDiskVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AzureDisk represents an Azure Data Disk mount on the host and bind mount to the pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "diskName": { + SchemaProps: spec.SchemaProps{ + Description: "The Name of the data disk in the blob storage", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "diskURI": { + SchemaProps: spec.SchemaProps{ + Description: "The URI the data disk in the blob storage", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "cachingMode": { + SchemaProps: spec.SchemaProps{ + Description: "Host Caching mode: None, Read Only, Read Write.", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified.", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Expected values Shared: multiple blob disks per storage account Dedicated: single blob disk per storage account Managed: azure managed data disk (only in managed availability set). defaults to shared", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"diskName", "diskURI"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_AzureFilePersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AzureFile represents an Azure File Service mount on the host and bind mount to the pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "secretName": { + SchemaProps: spec.SchemaProps{ + Description: "the name of secret that contains Azure Storage Account Name and Key", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "shareName": { + SchemaProps: spec.SchemaProps{ + Description: "Share Name", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "secretNamespace": { + SchemaProps: spec.SchemaProps{ + Description: "the namespace of the secret that contains Azure Storage Account Name and Key default is the same as the Pod", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"secretName", "shareName"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_AzureFileVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AzureFile represents an Azure File Service mount on the host and bind mount to the pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "secretName": { + SchemaProps: spec.SchemaProps{ + Description: "the name of secret that contains Azure Storage Account Name and Key", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "shareName": { + SchemaProps: spec.SchemaProps{ + Description: "Share Name", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"secretName", "shareName"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_Binding(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Binding ties one object to another; for example, a pod is bound to a node by a scheduler. Deprecated in 1.7, please use the bindings subresource of pods instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "target": { + SchemaProps: spec.SchemaProps{ + Description: "The target object that you want to bind to the standard object.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + }, + Required: []string{"target"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_CSIPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents storage that is managed by an external CSI volume driver (Beta feature)", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "driver": { + SchemaProps: spec.SchemaProps{ + Description: "Driver is the name of the driver to use for this volume. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "volumeHandle": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeHandle is the unique volume name returned by the CSI volume plugin’s CreateVolume to refer to the volume on all subsequent calls. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: The value to pass to ControllerPublishVolumeRequest. Defaults to false (read/write).", + Type: []string{"boolean"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\".", + Type: []string{"string"}, + Format: "", + }, + }, + "volumeAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "Attributes of the volume to publish.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "controllerPublishSecretRef": { + SchemaProps: spec.SchemaProps{ + Description: "ControllerPublishSecretRef is a reference to the secret object containing sensitive information to pass to the CSI driver to complete the CSI ControllerPublishVolume and ControllerUnpublishVolume calls. This field is optional, and may be empty if no secret is required. If the secret object contains more than one secret, all secrets are passed.", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + "nodeStageSecretRef": { + SchemaProps: spec.SchemaProps{ + Description: "NodeStageSecretRef is a reference to the secret object containing sensitive information to pass to the CSI driver to complete the CSI NodeStageVolume and NodeStageVolume and NodeUnstageVolume calls. This field is optional, and may be empty if no secret is required. If the secret object contains more than one secret, all secrets are passed.", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + "nodePublishSecretRef": { + SchemaProps: spec.SchemaProps{ + Description: "NodePublishSecretRef is a reference to the secret object containing sensitive information to pass to the CSI driver to complete the CSI NodePublishVolume and NodeUnpublishVolume calls. This field is optional, and may be empty if no secret is required. If the secret object contains more than one secret, all secrets are passed.", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + "controllerExpandSecretRef": { + SchemaProps: spec.SchemaProps{ + Description: "ControllerExpandSecretRef is a reference to the secret object containing sensitive information to pass to the CSI driver to complete the CSI ControllerExpandVolume call. This is an alpha field and requires enabling ExpandCSIVolumes feature gate. This field is optional, and may be empty if no secret is required. If the secret object contains more than one secret, all secrets are passed.", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + }, + Required: []string{"driver", "volumeHandle"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SecretReference"}, + } +} + +func schema_k8sio_api_core_v1_CSIVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a source location of a volume to mount, managed by an external CSI driver", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "driver": { + SchemaProps: spec.SchemaProps{ + Description: "Driver is the name of the CSI driver that handles this volume. Consult with your admin for the correct name as registered in the cluster.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies a read-only configuration for the volume. Defaults to false (read/write).", + Type: []string{"boolean"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Ex. \"ext4\", \"xfs\", \"ntfs\". If not provided, the empty value is passed to the associated CSI driver which will determine the default filesystem to apply.", + Type: []string{"string"}, + Format: "", + }, + }, + "volumeAttributes": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttributes stores driver-specific properties that are passed to the CSI driver. Consult your driver's documentation for supported values.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nodePublishSecretRef": { + SchemaProps: spec.SchemaProps{ + Description: "NodePublishSecretRef is a reference to the secret object containing sensitive information to pass to the CSI driver to complete the CSI NodePublishVolume and NodeUnpublishVolume calls. This field is optional, and may be empty if no secret is required. If the secret object contains more than one secret, all secret references are passed.", + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + }, + Required: []string{"driver"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_Capabilities(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Adds and removes POSIX capabilities from running containers.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "add": { + SchemaProps: spec.SchemaProps{ + Description: "Added capabilities", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "drop": { + SchemaProps: spec.SchemaProps{ + Description: "Removed capabilities", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_CephFSPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Ceph Filesystem mount that lasts the lifetime of a pod Cephfs volumes do not support ownership management or SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "monitors": { + SchemaProps: spec.SchemaProps{ + Description: "Required: Monitors is a collection of Ceph monitors More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Used as the mounted root, rather than the full Ceph tree, default is /", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: User is the rados user name, default is admin More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "secretFile": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: SecretFile is the path to key ring for User, default is /etc/ceph/user.secret More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: SecretRef is reference to the authentication secret for User, default is empty. More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts. More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"monitors"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SecretReference"}, + } +} + +func schema_k8sio_api_core_v1_CephFSVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Ceph Filesystem mount that lasts the lifetime of a pod Cephfs volumes do not support ownership management or SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "monitors": { + SchemaProps: spec.SchemaProps{ + Description: "Required: Monitors is a collection of Ceph monitors More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Used as the mounted root, rather than the full Ceph tree, default is /", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: User is the rados user name, default is admin More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "secretFile": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: SecretFile is the path to key ring for User, default is /etc/ceph/user.secret More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: SecretRef is reference to the authentication secret for User, default is empty. More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts. More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"monitors"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_CinderPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a cinder volume resource in Openstack. A Cinder volume must exist before mounting to a container. The volume must also be in the same region as the kubelet. Cinder volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumeID": { + SchemaProps: spec.SchemaProps{ + Description: "volume id used to identify the volume in cinder. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Examples: \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Type: []string{"boolean"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: points to a secret object containing parameters used to connect to OpenStack.", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + }, + Required: []string{"volumeID"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SecretReference"}, + } +} + +func schema_k8sio_api_core_v1_CinderVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a cinder volume resource in Openstack. A Cinder volume must exist before mounting to a container. The volume must also be in the same region as the kubelet. Cinder volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumeID": { + SchemaProps: spec.SchemaProps{ + Description: "volume id used to identify the volume in cinder. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Examples: \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Type: []string{"boolean"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: points to a secret object containing parameters used to connect to OpenStack.", + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + }, + Required: []string{"volumeID"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_ClientIPConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClientIPConfig represents the configurations of Client IP based session affinity.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "timeoutSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "timeoutSeconds specifies the seconds of ClientIP type session sticky time. The value must be >0 && <=86400(for 1 day) if ServiceAffinity == \"ClientIP\". Default value is 10800(for 3 hours).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ComponentCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Information about the condition of a component.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of condition for a component. Valid value: \"Healthy\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition for a component. Valid values for \"Healthy\": \"True\", \"False\", or \"Unknown\".", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Message about the condition for a component. For example, information about a health check.", + Type: []string{"string"}, + Format: "", + }, + }, + "error": { + SchemaProps: spec.SchemaProps{ + Description: "Condition error code for a component. For example, a health check error code.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ComponentStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ComponentStatus (and ComponentStatusList) holds the cluster validation info. Deprecated: This API is deprecated in v1.19+", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of component conditions observed", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ComponentCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ComponentCondition", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_ComponentStatusList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Status of all the conditions for the component as a list of ComponentStatus objects. Deprecated: This API is deprecated in v1.19+", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of ComponentStatus objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ComponentStatus"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ComponentStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_ConfigMap(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConfigMap holds configuration data for pods to consume.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "immutable": { + SchemaProps: spec.SchemaProps{ + Description: "Immutable, if set to true, ensures that data stored in the ConfigMap cannot be updated (only object metadata can be modified). If not set to true, the field can be modified at any time. Defaulted to nil. This is a beta field enabled by ImmutableEphemeralVolumes feature gate.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "data": { + SchemaProps: spec.SchemaProps{ + Description: "Data contains the configuration data. Each key must consist of alphanumeric characters, '-', '_' or '.'. Values with non-UTF-8 byte sequences must use the BinaryData field. The keys stored in Data must not overlap with the keys in the BinaryData field, this is enforced during validation process.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "binaryData": { + SchemaProps: spec.SchemaProps{ + Description: "BinaryData contains the binary data. Each key must consist of alphanumeric characters, '-', '_' or '.'. BinaryData can contain byte sequences that are not in the UTF-8 range. The keys stored in BinaryData must not overlap with the ones in the Data field, this is enforced during validation process. Using this field will require 1.10+ apiserver and kubelet.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_ConfigMapEnvSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConfigMapEnvSource selects a ConfigMap to populate the environment variables with.\n\nThe contents of the target ConfigMap's Data field will represent the key-value pairs as environment variables.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + "optional": { + SchemaProps: spec.SchemaProps{ + Description: "Specify whether the ConfigMap must be defined", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ConfigMapKeySelector(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Selects a key from a ConfigMap.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + "key": { + SchemaProps: spec.SchemaProps{ + Description: "The key to select.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "optional": { + SchemaProps: spec.SchemaProps{ + Description: "Specify whether the ConfigMap or its key must be defined", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"key"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ConfigMapList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConfigMapList is a resource containing a list of ConfigMap objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of ConfigMaps.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ConfigMap"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ConfigMap", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_ConfigMapNodeConfigSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConfigMapNodeConfigSource contains the information to reference a ConfigMap as a config source for the Node.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace is the metadata.namespace of the referenced ConfigMap. This field is required in all cases.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the metadata.name of the referenced ConfigMap. This field is required in all cases.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID is the metadata.UID of the referenced ConfigMap. This field is forbidden in Node.Spec, and required in Node.Status.", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceVersion is the metadata.ResourceVersion of the referenced ConfigMap. This field is forbidden in Node.Spec, and required in Node.Status.", + Type: []string{"string"}, + Format: "", + }, + }, + "kubeletConfigKey": { + SchemaProps: spec.SchemaProps{ + Description: "KubeletConfigKey declares which key of the referenced ConfigMap corresponds to the KubeletConfiguration structure This field is required in all cases.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"namespace", "name", "kubeletConfigKey"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ConfigMapProjection(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Adapts a ConfigMap into a projected volume.\n\nThe contents of the target ConfigMap's Data field will be presented in a projected volume as files using the keys in the Data field as the file names, unless the items element is populated with specific mappings of keys to paths. Note that this is identical to a configmap volume source without the default mode.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.KeyToPath"), + }, + }, + }, + }, + }, + "optional": { + SchemaProps: spec.SchemaProps{ + Description: "Specify whether the ConfigMap or its keys must be defined", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.KeyToPath"}, + } +} + +func schema_k8sio_api_core_v1_ConfigMapVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Adapts a ConfigMap into a volume.\n\nThe contents of the target ConfigMap's Data field will be presented in a volume as files using the keys in the Data field as the file names, unless the items element is populated with specific mappings of keys to paths. ConfigMap volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.KeyToPath"), + }, + }, + }, + }, + }, + "defaultMode": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "optional": { + SchemaProps: spec.SchemaProps{ + Description: "Specify whether the ConfigMap or its keys must be defined", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.KeyToPath"}, + } +} + +func schema_k8sio_api_core_v1_Container(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A single application container that you want to run within a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the container specified as a DNS_LABEL. Each container in a pod must have a unique name (DNS_LABEL). Cannot be updated.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "image": { + SchemaProps: spec.SchemaProps{ + Description: "Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images This field is optional to allow higher level config management to default or override container images in workload controllers like Deployments and StatefulSets.", + Type: []string{"string"}, + Format: "", + }, + }, + "command": { + SchemaProps: spec.SchemaProps{ + Description: "Entrypoint array. Not executed within a shell. The docker image's ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "args": { + SchemaProps: spec.SchemaProps{ + Description: "Arguments to the entrypoint. The docker image's CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "workingDir": { + SchemaProps: spec.SchemaProps{ + Description: "Container's working directory. If not specified, the container runtime's default will be used, which might be configured in the container image. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "ports": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "containerPort", + "protocol", + }, + "x-kubernetes-list-type": "map", + "x-kubernetes-patch-merge-key": "containerPort", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of ports to expose from the container. Exposing a port here gives the system additional information about the network connections a container uses, but is primarily informational. Not specifying a port here DOES NOT prevent that port from being exposed. Any port which is listening on the default \"0.0.0.0\" address inside a container will be accessible from the network. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerPort"), + }, + }, + }, + }, + }, + "envFrom": { + SchemaProps: spec.SchemaProps{ + Description: "List of sources to populate environment variables in the container. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EnvFromSource"), + }, + }, + }, + }, + }, + "env": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of environment variables to set in the container. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EnvVar"), + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Compute Resources required by this container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ResourceRequirements"), + }, + }, + "volumeMounts": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "mountPath", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Pod volumes to mount into the container's filesystem. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.VolumeMount"), + }, + }, + }, + }, + }, + "volumeDevices": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "devicePath", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "volumeDevices is the list of block devices to be used by the container.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.VolumeDevice"), + }, + }, + }, + }, + }, + "livenessProbe": { + SchemaProps: spec.SchemaProps{ + Description: "Periodic probe of container liveness. Container will be restarted if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "readinessProbe": { + SchemaProps: spec.SchemaProps{ + Description: "Periodic probe of container service readiness. Container will be removed from service endpoints if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "startupProbe": { + SchemaProps: spec.SchemaProps{ + Description: "StartupProbe indicates that the Pod has successfully initialized. If specified, no other probes are executed until this completes successfully. If this probe fails, the Pod will be restarted, just as if the livenessProbe failed. This can be used to provide different probe parameters at the beginning of a Pod's lifecycle, when it might take a long time to load data or warm a cache, than during steady-state operation. This cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "lifecycle": { + SchemaProps: spec.SchemaProps{ + Description: "Actions that the management system should take in response to container lifecycle events. Cannot be updated.", + Ref: ref("k8s.io/api/core/v1.Lifecycle"), + }, + }, + "terminationMessagePath": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "terminationMessagePolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the container status message on both success and failure. FallbackToLogsOnError will use the last chunk of container log output if the termination message file is empty and the container exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "imagePullPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images", + Type: []string{"string"}, + Format: "", + }, + }, + "securityContext": { + SchemaProps: spec.SchemaProps{ + Description: "Security options the pod should run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/", + Ref: ref("k8s.io/api/core/v1.SecurityContext"), + }, + }, + "stdin": { + SchemaProps: spec.SchemaProps{ + Description: "Whether this container should allocate a buffer for stdin in the container runtime. If this is not set, reads from stdin in the container will always result in EOF. Default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "stdinOnce": { + SchemaProps: spec.SchemaProps{ + Description: "Whether the container runtime should close the stdin channel after it has been opened by a single attach. When stdin is true the stdin stream will remain open across multiple attach sessions. If stdinOnce is set to true, stdin is opened on container start, is empty until the first client attaches to stdin, and then remains open and accepts data until the client disconnects, at which time stdin is closed and remains closed until the container is restarted. If this flag is false, a container processes that reads from stdin will never receive an EOF. Default is false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "tty": { + SchemaProps: spec.SchemaProps{ + Description: "Whether this container should allocate a TTY for itself, also requires 'stdin' to be true. Default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ContainerPort", "k8s.io/api/core/v1.EnvFromSource", "k8s.io/api/core/v1.EnvVar", "k8s.io/api/core/v1.Lifecycle", "k8s.io/api/core/v1.Probe", "k8s.io/api/core/v1.ResourceRequirements", "k8s.io/api/core/v1.SecurityContext", "k8s.io/api/core/v1.VolumeDevice", "k8s.io/api/core/v1.VolumeMount"}, + } +} + +func schema_k8sio_api_core_v1_ContainerImage(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Describe a container image", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "names": { + SchemaProps: spec.SchemaProps{ + Description: "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "sizeBytes": { + SchemaProps: spec.SchemaProps{ + Description: "The size of the image in bytes.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"names"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ContainerPort(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerPort represents a network port in a single container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, this must be an IANA_SVC_NAME and unique within the pod. Each named port in a pod must have a unique name. Name for the port that can be referred to by services.", + Type: []string{"string"}, + Format: "", + }, + }, + "hostPort": { + SchemaProps: spec.SchemaProps{ + Description: "Number of port to expose on the host. If specified, this must be a valid port number, 0 < x < 65536. If HostNetwork is specified, this must match ContainerPort. Most containers do not need this.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "containerPort": { + SchemaProps: spec.SchemaProps{ + Description: "Number of port to expose on the pod's IP address. This must be a valid port number, 0 < x < 65536.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "protocol": { + SchemaProps: spec.SchemaProps{ + Description: "Protocol for port. Must be UDP, TCP, or SCTP. Defaults to \"TCP\".", + Default: "TCP", + Type: []string{"string"}, + Format: "", + }, + }, + "hostIP": { + SchemaProps: spec.SchemaProps{ + Description: "What host IP to bind the external port to.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"containerPort"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ContainerState(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerState holds a possible state of container. Only one of its members may be specified. If none of them is specified, the default one is ContainerStateWaiting.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "waiting": { + SchemaProps: spec.SchemaProps{ + Description: "Details about a waiting container", + Ref: ref("k8s.io/api/core/v1.ContainerStateWaiting"), + }, + }, + "running": { + SchemaProps: spec.SchemaProps{ + Description: "Details about a running container", + Ref: ref("k8s.io/api/core/v1.ContainerStateRunning"), + }, + }, + "terminated": { + SchemaProps: spec.SchemaProps{ + Description: "Details about a terminated container", + Ref: ref("k8s.io/api/core/v1.ContainerStateTerminated"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ContainerStateRunning", "k8s.io/api/core/v1.ContainerStateTerminated", "k8s.io/api/core/v1.ContainerStateWaiting"}, + } +} + +func schema_k8sio_api_core_v1_ContainerStateRunning(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerStateRunning is a running state of a container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "startedAt": { + SchemaProps: spec.SchemaProps{ + Description: "Time at which the container was last (re-)started", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_ContainerStateTerminated(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerStateTerminated is a terminated state of a container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "exitCode": { + SchemaProps: spec.SchemaProps{ + Description: "Exit status from the last termination of the container", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "signal": { + SchemaProps: spec.SchemaProps{ + Description: "Signal from the last termination of the container", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "(brief) reason from the last termination of the container", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Message regarding the last termination of the container", + Type: []string{"string"}, + Format: "", + }, + }, + "startedAt": { + SchemaProps: spec.SchemaProps{ + Description: "Time at which previous execution of the container started", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "finishedAt": { + SchemaProps: spec.SchemaProps{ + Description: "Time at which the container last terminated", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "containerID": { + SchemaProps: spec.SchemaProps{ + Description: "Container's ID in the format 'docker://'", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"exitCode"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_ContainerStateWaiting(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerStateWaiting is a waiting state of a container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "(brief) reason the container is not yet running.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Message regarding why the container is not yet running.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ContainerStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerStatus contains details for the current status of this container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "This must be a DNS_LABEL. Each container in a pod must have a unique name. Cannot be updated.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "state": { + SchemaProps: spec.SchemaProps{ + Description: "Details about the container's current condition.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerState"), + }, + }, + "lastState": { + SchemaProps: spec.SchemaProps{ + Description: "Details about the container's last termination condition.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerState"), + }, + }, + "ready": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies whether the container has passed its readiness probe.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "restartCount": { + SchemaProps: spec.SchemaProps{ + Description: "The number of times the container has been restarted, currently based on the number of dead containers that have not yet been removed. Note that this is calculated from dead containers. But those containers are subject to garbage collection. This value will get capped at 5 by GC.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "image": { + SchemaProps: spec.SchemaProps{ + Description: "The image the container is running. More info: https://kubernetes.io/docs/concepts/containers/images", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "imageID": { + SchemaProps: spec.SchemaProps{ + Description: "ImageID of the container's image.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "containerID": { + SchemaProps: spec.SchemaProps{ + Description: "Container's ID in the format 'docker://'.", + Type: []string{"string"}, + Format: "", + }, + }, + "started": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies whether the container has passed its startup probe. Initialized as false, becomes true after startupProbe is considered successful. Resets to false when the container is restarted, or if kubelet loses state temporarily. Is always true when no startupProbe is defined.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"name", "ready", "restartCount", "image", "imageID"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ContainerState"}, + } +} + +func schema_k8sio_api_core_v1_DaemonEndpoint(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonEndpoint contains information about a single Daemon endpoint.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "Port": { + SchemaProps: spec.SchemaProps{ + Description: "Port number of the given endpoint.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"Port"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_DownwardAPIProjection(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents downward API info for projecting into a projected volume. Note that this is identical to a downwardAPI volume source without the default mode.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of DownwardAPIVolume file", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.DownwardAPIVolumeFile"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.DownwardAPIVolumeFile"}, + } +} + +func schema_k8sio_api_core_v1_DownwardAPIVolumeFile(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DownwardAPIVolumeFile represents information to create the file containing the pod field", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Required: Path is the relative path name of the file to be created. Must not be absolute or contain the '..' path. Must be utf-8 encoded. The first item of the relative path must not start with '..'", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fieldRef": { + SchemaProps: spec.SchemaProps{ + Description: "Required: Selects a field of the pod: only annotations, labels, name and namespace are supported.", + Ref: ref("k8s.io/api/core/v1.ObjectFieldSelector"), + }, + }, + "resourceFieldRef": { + SchemaProps: spec.SchemaProps{ + Description: "Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, requests.cpu and requests.memory) are currently supported.", + Ref: ref("k8s.io/api/core/v1.ResourceFieldSelector"), + }, + }, + "mode": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: mode bits used to set permissions on this file, must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. If not specified, the volume defaultMode will be used. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"path"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectFieldSelector", "k8s.io/api/core/v1.ResourceFieldSelector"}, + } +} + +func schema_k8sio_api_core_v1_DownwardAPIVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DownwardAPIVolumeSource represents a volume containing downward API info. Downward API volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of downward API volume file", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.DownwardAPIVolumeFile"), + }, + }, + }, + }, + }, + "defaultMode": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: mode bits to use on created files by default. Must be a Optional: mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.DownwardAPIVolumeFile"}, + } +} + +func schema_k8sio_api_core_v1_EmptyDirVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents an empty directory for a pod. Empty directory volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "medium": { + SchemaProps: spec.SchemaProps{ + Description: "What type of storage medium should back this directory. The default is \"\" which means to use the node's default medium. Must be an empty string (default) or Memory. More info: https://kubernetes.io/docs/concepts/storage/volumes#emptydir", + Type: []string{"string"}, + Format: "", + }, + }, + "sizeLimit": { + SchemaProps: spec.SchemaProps{ + Description: "Total amount of local storage required for this EmptyDir volume. The size limit is also applicable for memory medium. The maximum usage on memory medium EmptyDir would be the minimum value between the SizeLimit specified here and the sum of memory limits of all containers in a pod. The default is nil which means that the limit is undefined. More info: http://kubernetes.io/docs/user-guide/volumes#emptydir", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_EndpointAddress(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointAddress is a tuple that describes single IP address.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ip": { + SchemaProps: spec.SchemaProps{ + Description: "The IP of this endpoint. May not be loopback (127.0.0.0/8), link-local (169.254.0.0/16), or link-local multicast ((224.0.0.0/24). IPv6 is also accepted but not fully supported on all platforms. Also, certain kubernetes components, like kube-proxy, are not IPv6 ready.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "hostname": { + SchemaProps: spec.SchemaProps{ + Description: "The Hostname of this endpoint", + Type: []string{"string"}, + Format: "", + }, + }, + "nodeName": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Node hosting this endpoint. This can be used to determine endpoints local to a node.", + Type: []string{"string"}, + Format: "", + }, + }, + "targetRef": { + SchemaProps: spec.SchemaProps{ + Description: "Reference to object providing the endpoint.", + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + }, + Required: []string{"ip"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_EndpointPort(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointPort is a tuple that describes a single port.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name of this port. This must match the 'name' field in the corresponding ServicePort. Must be a DNS_LABEL. Optional only if one port is defined.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "The port number of the endpoint.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "protocol": { + SchemaProps: spec.SchemaProps{ + Description: "The IP protocol for this port. Must be UDP, TCP, or SCTP. Default is TCP.", + Type: []string{"string"}, + Format: "", + }, + }, + "appProtocol": { + SchemaProps: spec.SchemaProps{ + Description: "The application protocol for this port. This field follows standard Kubernetes label syntax. Un-prefixed names are reserved for IANA standard service names (as per RFC-6335 and http://www.iana.org/assignments/service-names). Non-standard protocols should use prefixed names such as mycompany.com/my-custom-protocol. This is a beta field that is guarded by the ServiceAppProtocol feature gate and enabled by default.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"port"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_EndpointSubset(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointSubset is a group of addresses with a common set of ports. The expanded set of endpoints is the Cartesian product of Addresses x Ports. For example, given:\n {\n Addresses: [{\"ip\": \"10.10.1.1\"}, {\"ip\": \"10.10.2.2\"}],\n Ports: [{\"name\": \"a\", \"port\": 8675}, {\"name\": \"b\", \"port\": 309}]\n }\nThe resulting set of endpoints can be viewed as:\n a: [ 10.10.1.1:8675, 10.10.2.2:8675 ],\n b: [ 10.10.1.1:309, 10.10.2.2:309 ]", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "addresses": { + SchemaProps: spec.SchemaProps{ + Description: "IP addresses which offer the related ports that are marked as ready. These endpoints should be considered safe for load balancers and clients to utilize.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EndpointAddress"), + }, + }, + }, + }, + }, + "notReadyAddresses": { + SchemaProps: spec.SchemaProps{ + Description: "IP addresses which offer the related ports but are not currently marked as ready because they have not yet finished starting, have recently failed a readiness check, or have recently failed a liveness check.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EndpointAddress"), + }, + }, + }, + }, + }, + "ports": { + SchemaProps: spec.SchemaProps{ + Description: "Port numbers available on the related IP addresses.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EndpointPort"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.EndpointAddress", "k8s.io/api/core/v1.EndpointPort"}, + } +} + +func schema_k8sio_api_core_v1_Endpoints(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Endpoints is a collection of endpoints that implement the actual service. Example:\n Name: \"mysvc\",\n Subsets: [\n {\n Addresses: [{\"ip\": \"10.10.1.1\"}, {\"ip\": \"10.10.2.2\"}],\n Ports: [{\"name\": \"a\", \"port\": 8675}, {\"name\": \"b\", \"port\": 309}]\n },\n {\n Addresses: [{\"ip\": \"10.10.3.3\"}],\n Ports: [{\"name\": \"a\", \"port\": 93}, {\"name\": \"b\", \"port\": 76}]\n },\n ]", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "subsets": { + SchemaProps: spec.SchemaProps{ + Description: "The set of all endpoints is the union of all subsets. Addresses are placed into subsets according to the IPs they share. A single address with multiple ports, some of which are ready and some of which are not (because they come from different containers) will result in the address being displayed in different subsets for the different ports. No address will appear in both Addresses and NotReadyAddresses in the same subset. Sets of addresses and ports that comprise a service.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EndpointSubset"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.EndpointSubset", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_EndpointsList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointsList is a list of endpoints.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of endpoints.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Endpoints"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Endpoints", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_EnvFromSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EnvFromSource represents the source of a set of ConfigMaps", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "prefix": { + SchemaProps: spec.SchemaProps{ + Description: "An optional identifier to prepend to each key in the ConfigMap. Must be a C_IDENTIFIER.", + Type: []string{"string"}, + Format: "", + }, + }, + "configMapRef": { + SchemaProps: spec.SchemaProps{ + Description: "The ConfigMap to select from", + Ref: ref("k8s.io/api/core/v1.ConfigMapEnvSource"), + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "The Secret to select from", + Ref: ref("k8s.io/api/core/v1.SecretEnvSource"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ConfigMapEnvSource", "k8s.io/api/core/v1.SecretEnvSource"}, + } +} + +func schema_k8sio_api_core_v1_EnvVar(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EnvVar represents an environment variable present in a Container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the environment variable. Must be a C_IDENTIFIER.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "Variable references $(VAR_NAME) are expanded using the previous defined environment variables in the container and any service environment variables. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Defaults to \"\".", + Type: []string{"string"}, + Format: "", + }, + }, + "valueFrom": { + SchemaProps: spec.SchemaProps{ + Description: "Source for the environment variable's value. Cannot be used if value is not empty.", + Ref: ref("k8s.io/api/core/v1.EnvVarSource"), + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.EnvVarSource"}, + } +} + +func schema_k8sio_api_core_v1_EnvVarSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EnvVarSource represents a source for the value of an EnvVar.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "fieldRef": { + SchemaProps: spec.SchemaProps{ + Description: "Selects a field of the pod: supports metadata.name, metadata.namespace, `metadata.labels['']`, `metadata.annotations['']`, spec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs.", + Ref: ref("k8s.io/api/core/v1.ObjectFieldSelector"), + }, + }, + "resourceFieldRef": { + SchemaProps: spec.SchemaProps{ + Description: "Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported.", + Ref: ref("k8s.io/api/core/v1.ResourceFieldSelector"), + }, + }, + "configMapKeyRef": { + SchemaProps: spec.SchemaProps{ + Description: "Selects a key of a ConfigMap.", + Ref: ref("k8s.io/api/core/v1.ConfigMapKeySelector"), + }, + }, + "secretKeyRef": { + SchemaProps: spec.SchemaProps{ + Description: "Selects a key of a secret in the pod's namespace", + Ref: ref("k8s.io/api/core/v1.SecretKeySelector"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ConfigMapKeySelector", "k8s.io/api/core/v1.ObjectFieldSelector", "k8s.io/api/core/v1.ResourceFieldSelector", "k8s.io/api/core/v1.SecretKeySelector"}, + } +} + +func schema_k8sio_api_core_v1_EphemeralContainer(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "An EphemeralContainer is a container that may be added temporarily to an existing pod for user-initiated activities such as debugging. Ephemeral containers have no resource or scheduling guarantees, and they will not be restarted when they exit or when a pod is removed or restarted. If an ephemeral container causes a pod to exceed its resource allocation, the pod may be evicted. Ephemeral containers may not be added by directly updating the pod spec. They must be added via the pod's ephemeralcontainers subresource, and they will appear in the pod spec once added. This is an alpha feature enabled by the EphemeralContainers feature flag.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the ephemeral container specified as a DNS_LABEL. This name must be unique among all containers, init containers and ephemeral containers.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "image": { + SchemaProps: spec.SchemaProps{ + Description: "Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images", + Type: []string{"string"}, + Format: "", + }, + }, + "command": { + SchemaProps: spec.SchemaProps{ + Description: "Entrypoint array. Not executed within a shell. The docker image's ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "args": { + SchemaProps: spec.SchemaProps{ + Description: "Arguments to the entrypoint. The docker image's CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "workingDir": { + SchemaProps: spec.SchemaProps{ + Description: "Container's working directory. If not specified, the container runtime's default will be used, which might be configured in the container image. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "ports": { + SchemaProps: spec.SchemaProps{ + Description: "Ports are not allowed for ephemeral containers.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerPort"), + }, + }, + }, + }, + }, + "envFrom": { + SchemaProps: spec.SchemaProps{ + Description: "List of sources to populate environment variables in the container. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EnvFromSource"), + }, + }, + }, + }, + }, + "env": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of environment variables to set in the container. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EnvVar"), + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources are not allowed for ephemeral containers. Ephemeral containers use spare resources already allocated to the pod.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ResourceRequirements"), + }, + }, + "volumeMounts": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "mountPath", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Pod volumes to mount into the container's filesystem. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.VolumeMount"), + }, + }, + }, + }, + }, + "volumeDevices": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "devicePath", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "volumeDevices is the list of block devices to be used by the container.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.VolumeDevice"), + }, + }, + }, + }, + }, + "livenessProbe": { + SchemaProps: spec.SchemaProps{ + Description: "Probes are not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "readinessProbe": { + SchemaProps: spec.SchemaProps{ + Description: "Probes are not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "startupProbe": { + SchemaProps: spec.SchemaProps{ + Description: "Probes are not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "lifecycle": { + SchemaProps: spec.SchemaProps{ + Description: "Lifecycle is not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.Lifecycle"), + }, + }, + "terminationMessagePath": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "terminationMessagePolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the container status message on both success and failure. FallbackToLogsOnError will use the last chunk of container log output if the termination message file is empty and the container exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "imagePullPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images", + Type: []string{"string"}, + Format: "", + }, + }, + "securityContext": { + SchemaProps: spec.SchemaProps{ + Description: "SecurityContext is not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.SecurityContext"), + }, + }, + "stdin": { + SchemaProps: spec.SchemaProps{ + Description: "Whether this container should allocate a buffer for stdin in the container runtime. If this is not set, reads from stdin in the container will always result in EOF. Default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "stdinOnce": { + SchemaProps: spec.SchemaProps{ + Description: "Whether the container runtime should close the stdin channel after it has been opened by a single attach. When stdin is true the stdin stream will remain open across multiple attach sessions. If stdinOnce is set to true, stdin is opened on container start, is empty until the first client attaches to stdin, and then remains open and accepts data until the client disconnects, at which time stdin is closed and remains closed until the container is restarted. If this flag is false, a container processes that reads from stdin will never receive an EOF. Default is false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "tty": { + SchemaProps: spec.SchemaProps{ + Description: "Whether this container should allocate a TTY for itself, also requires 'stdin' to be true. Default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "targetContainerName": { + SchemaProps: spec.SchemaProps{ + Description: "If set, the name of the container from PodSpec that this ephemeral container targets. The ephemeral container will be run in the namespaces (IPC, PID, etc) of this container. If not set then the ephemeral container is run in whatever namespaces are shared for the pod. Note that the container runtime must support this feature.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ContainerPort", "k8s.io/api/core/v1.EnvFromSource", "k8s.io/api/core/v1.EnvVar", "k8s.io/api/core/v1.Lifecycle", "k8s.io/api/core/v1.Probe", "k8s.io/api/core/v1.ResourceRequirements", "k8s.io/api/core/v1.SecurityContext", "k8s.io/api/core/v1.VolumeDevice", "k8s.io/api/core/v1.VolumeMount"}, + } +} + +func schema_k8sio_api_core_v1_EphemeralContainerCommon(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EphemeralContainerCommon is a copy of all fields in Container to be inlined in EphemeralContainer. This separate type allows easy conversion from EphemeralContainer to Container and allows separate documentation for the fields of EphemeralContainer. When a new field is added to Container it must be added here as well.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the ephemeral container specified as a DNS_LABEL. This name must be unique among all containers, init containers and ephemeral containers.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "image": { + SchemaProps: spec.SchemaProps{ + Description: "Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images", + Type: []string{"string"}, + Format: "", + }, + }, + "command": { + SchemaProps: spec.SchemaProps{ + Description: "Entrypoint array. Not executed within a shell. The docker image's ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "args": { + SchemaProps: spec.SchemaProps{ + Description: "Arguments to the entrypoint. The docker image's CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "workingDir": { + SchemaProps: spec.SchemaProps{ + Description: "Container's working directory. If not specified, the container runtime's default will be used, which might be configured in the container image. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "ports": { + SchemaProps: spec.SchemaProps{ + Description: "Ports are not allowed for ephemeral containers.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerPort"), + }, + }, + }, + }, + }, + "envFrom": { + SchemaProps: spec.SchemaProps{ + Description: "List of sources to populate environment variables in the container. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EnvFromSource"), + }, + }, + }, + }, + }, + "env": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of environment variables to set in the container. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EnvVar"), + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources are not allowed for ephemeral containers. Ephemeral containers use spare resources already allocated to the pod.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ResourceRequirements"), + }, + }, + "volumeMounts": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "mountPath", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Pod volumes to mount into the container's filesystem. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.VolumeMount"), + }, + }, + }, + }, + }, + "volumeDevices": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "devicePath", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "volumeDevices is the list of block devices to be used by the container.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.VolumeDevice"), + }, + }, + }, + }, + }, + "livenessProbe": { + SchemaProps: spec.SchemaProps{ + Description: "Probes are not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "readinessProbe": { + SchemaProps: spec.SchemaProps{ + Description: "Probes are not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "startupProbe": { + SchemaProps: spec.SchemaProps{ + Description: "Probes are not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.Probe"), + }, + }, + "lifecycle": { + SchemaProps: spec.SchemaProps{ + Description: "Lifecycle is not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.Lifecycle"), + }, + }, + "terminationMessagePath": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "terminationMessagePolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the container status message on both success and failure. FallbackToLogsOnError will use the last chunk of container log output if the termination message file is empty and the container exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated.", + Type: []string{"string"}, + Format: "", + }, + }, + "imagePullPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images", + Type: []string{"string"}, + Format: "", + }, + }, + "securityContext": { + SchemaProps: spec.SchemaProps{ + Description: "SecurityContext is not allowed for ephemeral containers.", + Ref: ref("k8s.io/api/core/v1.SecurityContext"), + }, + }, + "stdin": { + SchemaProps: spec.SchemaProps{ + Description: "Whether this container should allocate a buffer for stdin in the container runtime. If this is not set, reads from stdin in the container will always result in EOF. Default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "stdinOnce": { + SchemaProps: spec.SchemaProps{ + Description: "Whether the container runtime should close the stdin channel after it has been opened by a single attach. When stdin is true the stdin stream will remain open across multiple attach sessions. If stdinOnce is set to true, stdin is opened on container start, is empty until the first client attaches to stdin, and then remains open and accepts data until the client disconnects, at which time stdin is closed and remains closed until the container is restarted. If this flag is false, a container processes that reads from stdin will never receive an EOF. Default is false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "tty": { + SchemaProps: spec.SchemaProps{ + Description: "Whether this container should allocate a TTY for itself, also requires 'stdin' to be true. Default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ContainerPort", "k8s.io/api/core/v1.EnvFromSource", "k8s.io/api/core/v1.EnvVar", "k8s.io/api/core/v1.Lifecycle", "k8s.io/api/core/v1.Probe", "k8s.io/api/core/v1.ResourceRequirements", "k8s.io/api/core/v1.SecurityContext", "k8s.io/api/core/v1.VolumeDevice", "k8s.io/api/core/v1.VolumeMount"}, + } +} + +func schema_k8sio_api_core_v1_EphemeralContainers(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A list of ephemeral containers used with the Pod ephemeralcontainers subresource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "ephemeralContainers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "A list of ephemeral containers associated with this pod. New ephemeral containers may be appended to this list, but existing ephemeral containers may not be removed or modified.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EphemeralContainer"), + }, + }, + }, + }, + }, + }, + Required: []string{"ephemeralContainers"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.EphemeralContainer", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_EphemeralVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents an ephemeral volume that is handled by a normal storage driver.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumeClaimTemplate": { + SchemaProps: spec.SchemaProps{ + Description: "Will be used to create a stand-alone PVC to provision the volume. The pod in which this EphemeralVolumeSource is embedded will be the owner of the PVC, i.e. the PVC will be deleted together with the pod. The name of the PVC will be `-` where `` is the name from the `PodSpec.Volumes` array entry. Pod validation will reject the pod if the concatenated name is not valid for a PVC (for example, too long).\n\nAn existing PVC with that name that is not owned by the pod will *not* be used for the pod to avoid using an unrelated volume by mistake. Starting the pod is then blocked until the unrelated PVC is removed. If such a pre-created PVC is meant to be used by the pod, the PVC has to updated with an owner reference to the pod once the pod exists. Normally this should not be necessary, but it may be useful when manually reconstructing a broken cluster.\n\nThis field is read-only and no changes will be made by Kubernetes to the PVC after it has been created.\n\nRequired, must not be nil.", + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaimTemplate"), + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies a read-only configuration for the volume. Defaults to false (read/write).", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeClaimTemplate"}, + } +} + +func schema_k8sio_api_core_v1_Event(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Event is a report of an event somewhere in the cluster. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "involvedObject": { + SchemaProps: spec.SchemaProps{ + Description: "The object that this event is about.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "This should be a short, machine understandable string that gives the reason for the transition into the object's current status.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human-readable description of the status of this operation.", + Type: []string{"string"}, + Format: "", + }, + }, + "source": { + SchemaProps: spec.SchemaProps{ + Description: "The component reporting this event. Should be a short machine understandable string.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EventSource"), + }, + }, + "firstTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "The time at which the event was first recorded. (Time of server receipt is in TypeMeta.)", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "The time at which the most recent occurrence of this event was recorded.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "count": { + SchemaProps: spec.SchemaProps{ + Description: "The number of times this event has occurred.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of this event (Normal, Warning), new types could be added in the future", + Type: []string{"string"}, + Format: "", + }, + }, + "eventTime": { + SchemaProps: spec.SchemaProps{ + Description: "Time when this Event was first observed.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "series": { + SchemaProps: spec.SchemaProps{ + Description: "Data about the Event series this event represents or nil if it's a singleton Event.", + Ref: ref("k8s.io/api/core/v1.EventSeries"), + }, + }, + "action": { + SchemaProps: spec.SchemaProps{ + Description: "What action was taken/failed regarding to the Regarding object.", + Type: []string{"string"}, + Format: "", + }, + }, + "related": { + SchemaProps: spec.SchemaProps{ + Description: "Optional secondary object for more complex actions.", + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "reportingComponent": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the controller that emitted this Event, e.g. `kubernetes.io/kubelet`.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "reportingInstance": { + SchemaProps: spec.SchemaProps{ + Description: "ID of the controller instance, e.g. `kubelet-xyzf`.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"metadata", "involvedObject"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.EventSeries", "k8s.io/api/core/v1.EventSource", "k8s.io/api/core/v1.ObjectReference", "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_EventList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventList is a list of events.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of events", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Event"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Event", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_EventSeries(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventSeries contain information on series of events, i.e. thing that was/is happening continuously for some time.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "count": { + SchemaProps: spec.SchemaProps{ + Description: "Number of occurrences in this series up to the last heartbeat time", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "lastObservedTime": { + SchemaProps: spec.SchemaProps{ + Description: "Time of the last occurrence observed", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"}, + } +} + +func schema_k8sio_api_core_v1_EventSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventSource contains information for an event.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "component": { + SchemaProps: spec.SchemaProps{ + Description: "Component from which the event is generated.", + Type: []string{"string"}, + Format: "", + }, + }, + "host": { + SchemaProps: spec.SchemaProps{ + Description: "Node name on which the event is generated.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ExecAction(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExecAction describes a \"run in container\" action.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "command": { + SchemaProps: spec.SchemaProps{ + Description: "Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_FCVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Fibre Channel volume. Fibre Channel volumes can only be mounted as read/write once. Fibre Channel volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "targetWWNs": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: FC target worldwide names (WWNs)", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "lun": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: FC target lun number", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified.", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "wwids": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: FC volume world wide identifiers (wwids) Either wwids or combination of targetWWNs and lun must be set, but not both simultaneously.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_FlexPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlexPersistentVolumeSource represents a generic persistent volume resource that is provisioned/attached using an exec based plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "driver": { + SchemaProps: spec.SchemaProps{ + Description: "Driver is the name of the driver to use for this volume.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". The default filesystem depends on FlexVolume script.", + Type: []string{"string"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: SecretRef is reference to the secret object containing sensitive information to pass to the plugin scripts. This may be empty if no secret object is specified. If the secret object contains more than one secret, all secrets are passed to the plugin scripts.", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "options": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Extra command options if any.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"driver"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SecretReference"}, + } +} + +func schema_k8sio_api_core_v1_FlexVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlexVolume represents a generic volume resource that is provisioned/attached using an exec based plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "driver": { + SchemaProps: spec.SchemaProps{ + Description: "Driver is the name of the driver to use for this volume.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". The default filesystem depends on FlexVolume script.", + Type: []string{"string"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: SecretRef is reference to the secret object containing sensitive information to pass to the plugin scripts. This may be empty if no secret object is specified. If the secret object contains more than one secret, all secrets are passed to the plugin scripts.", + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "options": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Extra command options if any.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"driver"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_FlockerVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Flocker volume mounted by the Flocker agent. One and only one of datasetName and datasetUUID should be set. Flocker volumes do not support ownership management or SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "datasetName": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the dataset stored as metadata -> name on the dataset for Flocker should be considered as deprecated", + Type: []string{"string"}, + Format: "", + }, + }, + "datasetUUID": { + SchemaProps: spec.SchemaProps{ + Description: "UUID of the dataset. This is unique identifier of a Flocker dataset", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_GCEPersistentDiskVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Persistent Disk resource in Google Compute Engine.\n\nA GCE PD must exist before mounting to a container. The disk must also be in the same GCE project and zone as the kubelet. A GCE PD can only be mounted as read/write once or read-only many times. GCE PDs support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "pdName": { + SchemaProps: spec.SchemaProps{ + Description: "Unique name of the PD resource in GCE. Used to identify the disk in GCE. More info: https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type of the volume that you want to mount. Tip: Ensure that the filesystem type is supported by the host operating system. Examples: \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified. More info: https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk", + Type: []string{"string"}, + Format: "", + }, + }, + "partition": { + SchemaProps: spec.SchemaProps{ + Description: "The partition in the volume that you want to mount. If omitted, the default is to mount by volume name. Examples: For volume /dev/sda1, you specify the partition as \"1\". Similarly, the volume partition for /dev/sda is \"0\" (or you can leave the property empty). More info: https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the ReadOnly setting in VolumeMounts. Defaults to false. More info: https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"pdName"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_GitRepoVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a volume that is populated with the contents of a git repository. Git repo volumes do not support ownership management. Git repo volumes support SELinux relabeling.\n\nDEPRECATED: GitRepo is deprecated. To provision a container with a git repo, mount an EmptyDir into an InitContainer that clones the repo using git, then mount the EmptyDir into the Pod's container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "repository": { + SchemaProps: spec.SchemaProps{ + Description: "Repository URL", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "revision": { + SchemaProps: spec.SchemaProps{ + Description: "Commit hash for the specified revision.", + Type: []string{"string"}, + Format: "", + }, + }, + "directory": { + SchemaProps: spec.SchemaProps{ + Description: "Target directory name. Must not contain or start with '..'. If '.' is supplied, the volume directory will be the git repository. Otherwise, if specified, the volume will contain the git repository in the subdirectory with the given name.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"repository"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_GlusterfsPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Glusterfs mount that lasts the lifetime of a pod. Glusterfs volumes do not support ownership management or SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "endpoints": { + SchemaProps: spec.SchemaProps{ + Description: "EndpointsName is the endpoint name that details Glusterfs topology. More info: https://examples.k8s.io/volumes/glusterfs/README.md#create-a-pod", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is the Glusterfs volume path. More info: https://examples.k8s.io/volumes/glusterfs/README.md#create-a-pod", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the Glusterfs volume to be mounted with read-only permissions. Defaults to false. More info: https://examples.k8s.io/volumes/glusterfs/README.md#create-a-pod", + Type: []string{"boolean"}, + Format: "", + }, + }, + "endpointsNamespace": { + SchemaProps: spec.SchemaProps{ + Description: "EndpointsNamespace is the namespace that contains Glusterfs endpoint. If this field is empty, the EndpointNamespace defaults to the same namespace as the bound PVC. More info: https://examples.k8s.io/volumes/glusterfs/README.md#create-a-pod", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"endpoints", "path"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_GlusterfsVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Glusterfs mount that lasts the lifetime of a pod. Glusterfs volumes do not support ownership management or SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "endpoints": { + SchemaProps: spec.SchemaProps{ + Description: "EndpointsName is the endpoint name that details Glusterfs topology. More info: https://examples.k8s.io/volumes/glusterfs/README.md#create-a-pod", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is the Glusterfs volume path. More info: https://examples.k8s.io/volumes/glusterfs/README.md#create-a-pod", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the Glusterfs volume to be mounted with read-only permissions. Defaults to false. More info: https://examples.k8s.io/volumes/glusterfs/README.md#create-a-pod", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"endpoints", "path"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_HTTPGetAction(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HTTPGetAction describes an action based on HTTP Get requests.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path to access on the HTTP server.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "Name or number of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "host": { + SchemaProps: spec.SchemaProps{ + Description: "Host name to connect to, defaults to the pod IP. You probably want to set \"Host\" in httpHeaders instead.", + Type: []string{"string"}, + Format: "", + }, + }, + "scheme": { + SchemaProps: spec.SchemaProps{ + Description: "Scheme to use for connecting to the host. Defaults to HTTP.", + Type: []string{"string"}, + Format: "", + }, + }, + "httpHeaders": { + SchemaProps: spec.SchemaProps{ + Description: "Custom headers to set in the request. HTTP allows repeated headers.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.HTTPHeader"), + }, + }, + }, + }, + }, + }, + Required: []string{"port"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.HTTPHeader", "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_core_v1_HTTPHeader(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HTTPHeader describes a custom header to be used in HTTP probes", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The header field name", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "The header field value", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "value"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_Handler(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Handler defines a specific action that should be taken", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "exec": { + SchemaProps: spec.SchemaProps{ + Description: "One and only one of the following should be specified. Exec specifies the action to take.", + Ref: ref("k8s.io/api/core/v1.ExecAction"), + }, + }, + "httpGet": { + SchemaProps: spec.SchemaProps{ + Description: "HTTPGet specifies the http request to perform.", + Ref: ref("k8s.io/api/core/v1.HTTPGetAction"), + }, + }, + "tcpSocket": { + SchemaProps: spec.SchemaProps{ + Description: "TCPSocket specifies an action involving a TCP port. TCP hooks not yet supported", + Ref: ref("k8s.io/api/core/v1.TCPSocketAction"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ExecAction", "k8s.io/api/core/v1.HTTPGetAction", "k8s.io/api/core/v1.TCPSocketAction"}, + } +} + +func schema_k8sio_api_core_v1_HostAlias(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the pod's hosts file.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ip": { + SchemaProps: spec.SchemaProps{ + Description: "IP address of the host file entry.", + Type: []string{"string"}, + Format: "", + }, + }, + "hostnames": { + SchemaProps: spec.SchemaProps{ + Description: "Hostnames for the above IP address.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_HostPathVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a host path mapped into a pod. Host path volumes do not support ownership management or SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path of the directory on the host. If the path is a symlink, it will follow the link to the real path. More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type for HostPath Volume Defaults to \"\" More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"path"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ISCSIPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ISCSIPersistentVolumeSource represents an ISCSI disk. ISCSI volumes can only be mounted as read/write once. ISCSI volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "targetPortal": { + SchemaProps: spec.SchemaProps{ + Description: "iSCSI Target Portal. The Portal is either an IP or ip_addr:port if the port is other than default (typically TCP ports 860 and 3260).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "iqn": { + SchemaProps: spec.SchemaProps{ + Description: "Target iSCSI Qualified Name.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lun": { + SchemaProps: spec.SchemaProps{ + Description: "iSCSI Target Lun number.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "iscsiInterface": { + SchemaProps: spec.SchemaProps{ + Description: "iSCSI Interface Name that uses an iSCSI transport. Defaults to 'default' (tcp).", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type of the volume that you want to mount. Tip: Ensure that the filesystem type is supported by the host operating system. Examples: \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified. More info: https://kubernetes.io/docs/concepts/storage/volumes#iscsi", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the ReadOnly setting in VolumeMounts. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "portals": { + SchemaProps: spec.SchemaProps{ + Description: "iSCSI Target Portal List. The Portal is either an IP or ip_addr:port if the port is other than default (typically TCP ports 860 and 3260).", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "chapAuthDiscovery": { + SchemaProps: spec.SchemaProps{ + Description: "whether support iSCSI Discovery CHAP authentication", + Type: []string{"boolean"}, + Format: "", + }, + }, + "chapAuthSession": { + SchemaProps: spec.SchemaProps{ + Description: "whether support iSCSI Session CHAP authentication", + Type: []string{"boolean"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "CHAP Secret for iSCSI target and initiator authentication", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + "initiatorName": { + SchemaProps: spec.SchemaProps{ + Description: "Custom iSCSI Initiator Name. If initiatorName is specified with iscsiInterface simultaneously, new iSCSI interface : will be created for the connection.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"targetPortal", "iqn", "lun"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SecretReference"}, + } +} + +func schema_k8sio_api_core_v1_ISCSIVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents an ISCSI disk. ISCSI volumes can only be mounted as read/write once. ISCSI volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "targetPortal": { + SchemaProps: spec.SchemaProps{ + Description: "iSCSI Target Portal. The Portal is either an IP or ip_addr:port if the port is other than default (typically TCP ports 860 and 3260).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "iqn": { + SchemaProps: spec.SchemaProps{ + Description: "Target iSCSI Qualified Name.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lun": { + SchemaProps: spec.SchemaProps{ + Description: "iSCSI Target Lun number.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "iscsiInterface": { + SchemaProps: spec.SchemaProps{ + Description: "iSCSI Interface Name that uses an iSCSI transport. Defaults to 'default' (tcp).", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type of the volume that you want to mount. Tip: Ensure that the filesystem type is supported by the host operating system. Examples: \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified. More info: https://kubernetes.io/docs/concepts/storage/volumes#iscsi", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the ReadOnly setting in VolumeMounts. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "portals": { + SchemaProps: spec.SchemaProps{ + Description: "iSCSI Target Portal List. The portal is either an IP or ip_addr:port if the port is other than default (typically TCP ports 860 and 3260).", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "chapAuthDiscovery": { + SchemaProps: spec.SchemaProps{ + Description: "whether support iSCSI Discovery CHAP authentication", + Type: []string{"boolean"}, + Format: "", + }, + }, + "chapAuthSession": { + SchemaProps: spec.SchemaProps{ + Description: "whether support iSCSI Session CHAP authentication", + Type: []string{"boolean"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "CHAP Secret for iSCSI target and initiator authentication", + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + "initiatorName": { + SchemaProps: spec.SchemaProps{ + Description: "Custom iSCSI Initiator Name. If initiatorName is specified with iscsiInterface simultaneously, new iSCSI interface : will be created for the connection.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"targetPortal", "iqn", "lun"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_KeyToPath(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Maps a string key to a path within a volume.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "key": { + SchemaProps: spec.SchemaProps{ + Description: "The key to project.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "The relative path of the file to map the key to. May not be an absolute path. May not contain the path element '..'. May not start with the string '..'.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "mode": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: mode bits used to set permissions on this file. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. If not specified, the volume defaultMode will be used. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"key", "path"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_Lifecycle(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Lifecycle describes actions that the management system should take in response to container lifecycle events. For the PostStart and PreStop lifecycle handlers, management of the container blocks until the action is complete, unless the container process fails, in which case the handler is aborted.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "postStart": { + SchemaProps: spec.SchemaProps{ + Description: "PostStart is called immediately after a container is created. If the handler fails, the container is terminated and restarted according to its restart policy. Other management of the container blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks", + Ref: ref("k8s.io/api/core/v1.Handler"), + }, + }, + "preStop": { + SchemaProps: spec.SchemaProps{ + Description: "PreStop is called immediately before a container is terminated due to an API request or management event such as liveness/startup probe failure, preemption, resource contention, etc. The handler is not called if the container crashes or exits. The reason for termination is passed to the handler. The Pod's termination grace period countdown begins before the PreStop hooked is executed. Regardless of the outcome of the handler, the container will eventually terminate within the Pod's termination grace period. Other management of the container blocks until the hook completes or until the termination grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks", + Ref: ref("k8s.io/api/core/v1.Handler"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Handler"}, + } +} + +func schema_k8sio_api_core_v1_LimitRange(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LimitRange sets resource usage limits for each kind of resource in a Namespace.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the limits enforced. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LimitRangeSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LimitRangeSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_LimitRangeItem(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LimitRangeItem defines a min/max usage limit for any resource that matches on kind.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of resource that this limit applies to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "max": { + SchemaProps: spec.SchemaProps{ + Description: "Max usage constraints on this kind by resource name.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "min": { + SchemaProps: spec.SchemaProps{ + Description: "Min usage constraints on this kind by resource name.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "default": { + SchemaProps: spec.SchemaProps{ + Description: "Default resource requirement limit value by resource name if resource limit is omitted.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "defaultRequest": { + SchemaProps: spec.SchemaProps{ + Description: "DefaultRequest is the default resource requirement request value by resource name if resource request is omitted.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "maxLimitRequestRatio": { + SchemaProps: spec.SchemaProps{ + Description: "MaxLimitRequestRatio if specified, the named resource must have a request and limit that are both non-zero where limit divided by request is less than or equal to the enumerated value; this represents the max burst for the named resource.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + Required: []string{"type"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_LimitRangeList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LimitRangeList is a list of LimitRange items.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of LimitRange objects. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LimitRange"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LimitRange", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_LimitRangeSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LimitRangeSpec defines a min/max usage limit for resources that match on kind.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "limits": { + SchemaProps: spec.SchemaProps{ + Description: "Limits is the list of LimitRangeItem objects that are enforced.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LimitRangeItem"), + }, + }, + }, + }, + }, + }, + Required: []string{"limits"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LimitRangeItem"}, + } +} + +func schema_k8sio_api_core_v1_List(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "List holds a list of objects, which may not be known by the server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of objects", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_k8sio_api_core_v1_LoadBalancerIngress(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LoadBalancerIngress represents the status of a load-balancer ingress point: traffic intended for the service should be sent to an ingress point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ip": { + SchemaProps: spec.SchemaProps{ + Description: "IP is set for load-balancer ingress points that are IP based (typically GCE or OpenStack load-balancers)", + Type: []string{"string"}, + Format: "", + }, + }, + "hostname": { + SchemaProps: spec.SchemaProps{ + Description: "Hostname is set for load-balancer ingress points that are DNS based (typically AWS load-balancers)", + Type: []string{"string"}, + Format: "", + }, + }, + "ports": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Ports is a list of records of service ports If used, every port defined in the service should have an entry in it", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PortStatus"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PortStatus"}, + } +} + +func schema_k8sio_api_core_v1_LoadBalancerStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LoadBalancerStatus represents the status of a load-balancer.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ingress": { + SchemaProps: spec.SchemaProps{ + Description: "Ingress is a list containing ingress points for the load-balancer. Traffic intended for the service should be sent to these ingress points.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LoadBalancerIngress"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LoadBalancerIngress"}, + } +} + +func schema_k8sio_api_core_v1_LocalObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LocalObjectReference contains enough information to let you locate the referenced object inside the same namespace.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_LocalVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Local represents directly-attached storage with node affinity (Beta feature)", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "The full path to the volume on the node. It can be either a directory or block device (disk, partition, ...).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. It applies only when the Path is a block device. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". The default value is to auto-select a fileystem if unspecified.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"path"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_NFSVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents an NFS mount that lasts the lifetime of a pod. NFS volumes do not support ownership management or SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "server": { + SchemaProps: spec.SchemaProps{ + Description: "Server is the hostname or IP address of the NFS server. More info: https://kubernetes.io/docs/concepts/storage/volumes#nfs", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path that is exported by the NFS server. More info: https://kubernetes.io/docs/concepts/storage/volumes#nfs", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the NFS export to be mounted with read-only permissions. Defaults to false. More info: https://kubernetes.io/docs/concepts/storage/volumes#nfs", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"server", "path"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_Namespace(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Namespace provides a scope for Names. Use of multiple namespaces is optional.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the behavior of the Namespace. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NamespaceSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status describes the current status of a Namespace. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NamespaceStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NamespaceSpec", "k8s.io/api/core/v1.NamespaceStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_NamespaceCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NamespaceCondition contains details about state of namespace.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of namespace controller condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_NamespaceList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NamespaceList is a list of Namespaces.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of Namespace objects in the list. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Namespace"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Namespace", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_NamespaceSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NamespaceSpec describes the attributes on a Namespace.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "finalizers": { + SchemaProps: spec.SchemaProps{ + Description: "Finalizers is an opaque list of values that must be empty to permanently remove object from storage. More info: https://kubernetes.io/docs/tasks/administer-cluster/namespaces/", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_NamespaceStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NamespaceStatus is information about the current status of a Namespace.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "phase": { + SchemaProps: spec.SchemaProps{ + Description: "Phase is the current lifecycle phase of the namespace. More info: https://kubernetes.io/docs/tasks/administer-cluster/namespaces/", + Type: []string{"string"}, + Format: "", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a namespace's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NamespaceCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NamespaceCondition"}, + } +} + +func schema_k8sio_api_core_v1_Node(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Node is a worker node in Kubernetes. Each node will have a unique identifier in the cache (i.e. in etcd).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the behavior of a node. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the node. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeSpec", "k8s.io/api/core/v1.NodeStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_NodeAddress(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeAddress contains information for the node's address.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Node address type, one of Hostname, ExternalIP or InternalIP.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "address": { + SchemaProps: spec.SchemaProps{ + Description: "The node address.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "address"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_NodeAffinity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Node affinity is a group of node affinity scheduling rules.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "requiredDuringSchedulingIgnoredDuringExecution": { + SchemaProps: spec.SchemaProps{ + Description: "If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to an update), the system may or may not try to eventually evict the pod from its node.", + Ref: ref("k8s.io/api/core/v1.NodeSelector"), + }, + }, + "preferredDuringSchedulingIgnoredDuringExecution": { + SchemaProps: spec.SchemaProps{ + Description: "The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding \"weight\" to the sum if the node matches the corresponding matchExpressions; the node(s) with the highest sum are the most preferred.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PreferredSchedulingTerm"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeSelector", "k8s.io/api/core/v1.PreferredSchedulingTerm"}, + } +} + +func schema_k8sio_api_core_v1_NodeCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeCondition contains condition information for a node.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of node condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastHeartbeatTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time we got an update on a given condition.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transit from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "(brief) reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Human readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_NodeConfigSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeConfigSource specifies a source of node configuration. Exactly one subfield (excluding metadata) must be non-nil.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "configMap": { + SchemaProps: spec.SchemaProps{ + Description: "ConfigMap is a reference to a Node's ConfigMap", + Ref: ref("k8s.io/api/core/v1.ConfigMapNodeConfigSource"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ConfigMapNodeConfigSource"}, + } +} + +func schema_k8sio_api_core_v1_NodeConfigStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeConfigStatus describes the status of the config assigned by Node.Spec.ConfigSource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "assigned": { + SchemaProps: spec.SchemaProps{ + Description: "Assigned reports the checkpointed config the node will try to use. When Node.Spec.ConfigSource is updated, the node checkpoints the associated config payload to local disk, along with a record indicating intended config. The node refers to this record to choose its config checkpoint, and reports this record in Assigned. Assigned only updates in the status after the record has been checkpointed to disk. When the Kubelet is restarted, it tries to make the Assigned config the Active config by loading and validating the checkpointed payload identified by Assigned.", + Ref: ref("k8s.io/api/core/v1.NodeConfigSource"), + }, + }, + "active": { + SchemaProps: spec.SchemaProps{ + Description: "Active reports the checkpointed config the node is actively using. Active will represent either the current version of the Assigned config, or the current LastKnownGood config, depending on whether attempting to use the Assigned config results in an error.", + Ref: ref("k8s.io/api/core/v1.NodeConfigSource"), + }, + }, + "lastKnownGood": { + SchemaProps: spec.SchemaProps{ + Description: "LastKnownGood reports the checkpointed config the node will fall back to when it encounters an error attempting to use the Assigned config. The Assigned config becomes the LastKnownGood config when the node determines that the Assigned config is stable and correct. This is currently implemented as a 10-minute soak period starting when the local record of Assigned config is updated. If the Assigned config is Active at the end of this period, it becomes the LastKnownGood. Note that if Spec.ConfigSource is reset to nil (use local defaults), the LastKnownGood is also immediately reset to nil, because the local default config is always assumed good. You should not make assumptions about the node's method of determining config stability and correctness, as this may change or become configurable in the future.", + Ref: ref("k8s.io/api/core/v1.NodeConfigSource"), + }, + }, + "error": { + SchemaProps: spec.SchemaProps{ + Description: "Error describes any problems reconciling the Spec.ConfigSource to the Active config. Errors may occur, for example, attempting to checkpoint Spec.ConfigSource to the local Assigned record, attempting to checkpoint the payload associated with Spec.ConfigSource, attempting to load or validate the Assigned config, etc. Errors may occur at different points while syncing config. Earlier errors (e.g. download or checkpointing errors) will not result in a rollback to LastKnownGood, and may resolve across Kubelet retries. Later errors (e.g. loading or validating a checkpointed config) will result in a rollback to LastKnownGood. In the latter case, it is usually possible to resolve the error by fixing the config assigned in Spec.ConfigSource. You can find additional information for debugging by searching the error message in the Kubelet log. Error is a human-readable description of the error state; machines can check whether or not Error is empty, but should not rely on the stability of the Error text across Kubelet versions.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeConfigSource"}, + } +} + +func schema_k8sio_api_core_v1_NodeDaemonEndpoints(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeDaemonEndpoints lists ports opened by daemons running on the Node.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kubeletEndpoint": { + SchemaProps: spec.SchemaProps{ + Description: "Endpoint on which Kubelet is listening.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.DaemonEndpoint"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.DaemonEndpoint"}, + } +} + +func schema_k8sio_api_core_v1_NodeList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeList is the whole list of all Nodes which have been registered with master.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of nodes", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Node"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Node", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_NodeProxyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeProxyOptions is the query options to a Node's proxy call.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is the URL path to use for the current proxy request to node.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_NodeResources(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeResources is an object for conveying resource information about a node. see https://kubernetes.io/docs/concepts/architecture/nodes/#capacity for more details.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "Capacity": { + SchemaProps: spec.SchemaProps{ + Description: "Capacity represents the available resources of a node", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + Required: []string{"Capacity"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_NodeSelector(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A node selector represents the union of the results of one or more label queries over a set of nodes; that is, it represents the OR of the selectors represented by the node selector terms.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "nodeSelectorTerms": { + SchemaProps: spec.SchemaProps{ + Description: "Required. A list of node selector terms. The terms are ORed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeSelectorTerm"), + }, + }, + }, + }, + }, + }, + Required: []string{"nodeSelectorTerms"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeSelectorTerm"}, + } +} + +func schema_k8sio_api_core_v1_NodeSelectorRequirement(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "key": { + SchemaProps: spec.SchemaProps{ + Description: "The label key that the selector applies to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "operator": { + SchemaProps: spec.SchemaProps{ + Description: "Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "values": { + SchemaProps: spec.SchemaProps{ + Description: "An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"key", "operator"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_NodeSelectorTerm(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A null or empty node selector term matches no objects. The requirements of them are ANDed. The TopologySelectorTerm type implements a subset of the NodeSelectorTerm.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "matchExpressions": { + SchemaProps: spec.SchemaProps{ + Description: "A list of node selector requirements by node's labels.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeSelectorRequirement"), + }, + }, + }, + }, + }, + "matchFields": { + SchemaProps: spec.SchemaProps{ + Description: "A list of node selector requirements by node's fields.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeSelectorRequirement"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeSelectorRequirement"}, + } +} + +func schema_k8sio_api_core_v1_NodeSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeSpec describes the attributes that a node is created with.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podCIDR": { + SchemaProps: spec.SchemaProps{ + Description: "PodCIDR represents the pod IP range assigned to the node.", + Type: []string{"string"}, + Format: "", + }, + }, + "podCIDRs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "podCIDRs represents the IP ranges assigned to the node for usage by Pods on that node. If this field is specified, the 0th entry must match the podCIDR field. It may contain at most 1 value for each of IPv4 and IPv6.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "providerID": { + SchemaProps: spec.SchemaProps{ + Description: "ID of the node assigned by the cloud provider in the format: ://", + Type: []string{"string"}, + Format: "", + }, + }, + "unschedulable": { + SchemaProps: spec.SchemaProps{ + Description: "Unschedulable controls node schedulability of new pods. By default, node is schedulable. More info: https://kubernetes.io/docs/concepts/nodes/node/#manual-node-administration", + Type: []string{"boolean"}, + Format: "", + }, + }, + "taints": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the node's taints.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Taint"), + }, + }, + }, + }, + }, + "configSource": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the source to get node configuration from The DynamicKubeletConfig feature gate must be enabled for the Kubelet to use this field", + Ref: ref("k8s.io/api/core/v1.NodeConfigSource"), + }, + }, + "externalID": { + SchemaProps: spec.SchemaProps{ + Description: "Deprecated. Not all kubelets will set this field. Remove field after 1.13. see: https://issues.k8s.io/61966", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeConfigSource", "k8s.io/api/core/v1.Taint"}, + } +} + +func schema_k8sio_api_core_v1_NodeStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeStatus is information about the current status of a node.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "capacity": { + SchemaProps: spec.SchemaProps{ + Description: "Capacity represents the total resources of a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#capacity", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "allocatable": { + SchemaProps: spec.SchemaProps{ + Description: "Allocatable represents the resources of a node that are available for scheduling. Defaults to Capacity.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "phase": { + SchemaProps: spec.SchemaProps{ + Description: "NodePhase is the recently observed lifecycle phase of the node. More info: https://kubernetes.io/docs/concepts/nodes/node/#phase The field is never populated, and now is deprecated.", + Type: []string{"string"}, + Format: "", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Conditions is an array of current observed node conditions. More info: https://kubernetes.io/docs/concepts/nodes/node/#condition", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeCondition"), + }, + }, + }, + }, + }, + "addresses": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of addresses reachable to the node. Queried from cloud provider, if available. More info: https://kubernetes.io/docs/concepts/nodes/node/#addresses Note: This field is declared as mergeable, but the merge key is not sufficiently unique, which can cause data corruption when it is merged. Callers should instead use a full-replacement patch. See http://pr.k8s.io/79391 for an example.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeAddress"), + }, + }, + }, + }, + }, + "daemonEndpoints": { + SchemaProps: spec.SchemaProps{ + Description: "Endpoints of daemons running on the Node.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeDaemonEndpoints"), + }, + }, + "nodeInfo": { + SchemaProps: spec.SchemaProps{ + Description: "Set of ids/uuids to uniquely identify the node. More info: https://kubernetes.io/docs/concepts/nodes/node/#info", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeSystemInfo"), + }, + }, + "images": { + SchemaProps: spec.SchemaProps{ + Description: "List of container images on this node", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerImage"), + }, + }, + }, + }, + }, + "volumesInUse": { + SchemaProps: spec.SchemaProps{ + Description: "List of attachable volumes in use (mounted) by the node.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "volumesAttached": { + SchemaProps: spec.SchemaProps{ + Description: "List of volumes that are attached to the node.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.AttachedVolume"), + }, + }, + }, + }, + }, + "config": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the config assigned to the node via the dynamic Kubelet config feature.", + Ref: ref("k8s.io/api/core/v1.NodeConfigStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.AttachedVolume", "k8s.io/api/core/v1.ContainerImage", "k8s.io/api/core/v1.NodeAddress", "k8s.io/api/core/v1.NodeCondition", "k8s.io/api/core/v1.NodeConfigStatus", "k8s.io/api/core/v1.NodeDaemonEndpoints", "k8s.io/api/core/v1.NodeSystemInfo", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_NodeSystemInfo(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeSystemInfo is a set of ids/uuids to uniquely identify the node.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "machineID": { + SchemaProps: spec.SchemaProps{ + Description: "MachineID reported by the node. For unique machine identification in the cluster this field is preferred. Learn more from man(5) machine-id: http://man7.org/linux/man-pages/man5/machine-id.5.html", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "systemUUID": { + SchemaProps: spec.SchemaProps{ + Description: "SystemUUID reported by the node. For unique machine identification MachineID is preferred. This field is specific to Red Hat hosts https://access.redhat.com/documentation/en-us/red_hat_subscription_management/1/html/rhsm/uuid", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "bootID": { + SchemaProps: spec.SchemaProps{ + Description: "Boot ID reported by the node.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kernelVersion": { + SchemaProps: spec.SchemaProps{ + Description: "Kernel Version reported by the node from 'uname -r' (e.g. 3.16.0-0.bpo.4-amd64).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "osImage": { + SchemaProps: spec.SchemaProps{ + Description: "OS Image reported by the node from /etc/os-release (e.g. Debian GNU/Linux 7 (wheezy)).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "containerRuntimeVersion": { + SchemaProps: spec.SchemaProps{ + Description: "ContainerRuntime Version reported by the node through runtime remote API (e.g. docker://1.5.0).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kubeletVersion": { + SchemaProps: spec.SchemaProps{ + Description: "Kubelet Version reported by the node.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kubeProxyVersion": { + SchemaProps: spec.SchemaProps{ + Description: "KubeProxy Version reported by the node.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "operatingSystem": { + SchemaProps: spec.SchemaProps{ + Description: "The Operating System reported by the node", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "architecture": { + SchemaProps: spec.SchemaProps{ + Description: "The Architecture reported by the node", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"machineID", "systemUUID", "bootID", "kernelVersion", "osImage", "containerRuntimeVersion", "kubeletVersion", "kubeProxyVersion", "operatingSystem", "architecture"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ObjectFieldSelector(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectFieldSelector selects an APIVersioned field of an object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "Version of the schema the FieldPath is written in terms of, defaults to \"v1\".", + Type: []string{"string"}, + Format: "", + }, + }, + "fieldPath": { + SchemaProps: spec.SchemaProps{ + Description: "Path of the field to select in the specified API version.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"fieldPath"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectReference contains enough information to let you inspect or modify the referred object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "API version of the referent.", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Description: "Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency", + Type: []string{"string"}, + Format: "", + }, + }, + "fieldPath": { + SchemaProps: spec.SchemaProps{ + Description: "If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PersistentVolume(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines a specification of a persistent volume owned by the cluster. Provisioned by an administrator. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistent-volumes", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status represents the current information/status for the persistent volume. Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistent-volumes", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeSpec", "k8s.io/api/core/v1.PersistentVolumeStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeClaim(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaim is a user's request for and claim to a persistent volume", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the desired characteristics of a volume requested by a pod author. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistentvolumeclaims", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaimSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status represents the current information/status of a persistent volume claim. Read-only. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistentvolumeclaims", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaimStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeClaimSpec", "k8s.io/api/core/v1.PersistentVolumeClaimStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeClaimCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaimCondition contails details about state of pvc", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastProbeTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time we probed the condition.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "Unique, this should be a short, machine understandable string that gives the reason for condition's last transition. If it reports \"ResizeStarted\" that means the underlying persistent volume is being resized.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeClaimList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaimList is a list of PersistentVolumeClaim items.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "A list of persistent volume claims. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistentvolumeclaims", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaim"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeClaim", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeClaimSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaimSpec describes the common attributes of storage devices and allows a Source for provider-specific attributes", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "accessModes": { + SchemaProps: spec.SchemaProps{ + Description: "AccessModes contains the desired access modes the volume should have. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "A label query over volumes to consider for binding.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources represents the minimum resources the volume should have. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#resources", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ResourceRequirements"), + }, + }, + "volumeName": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeName is the binding reference to the PersistentVolume backing this claim.", + Type: []string{"string"}, + Format: "", + }, + }, + "storageClassName": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the StorageClass required by the claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#class-1", + Type: []string{"string"}, + Format: "", + }, + }, + "volumeMode": { + SchemaProps: spec.SchemaProps{ + Description: "volumeMode defines what type of volume is required by the claim. Value of Filesystem is implied when not included in claim spec.", + Type: []string{"string"}, + Format: "", + }, + }, + "dataSource": { + SchemaProps: spec.SchemaProps{ + Description: "This field can be used to specify either: * An existing VolumeSnapshot object (snapshot.storage.k8s.io/VolumeSnapshot) * An existing PVC (PersistentVolumeClaim) * An existing custom resource that implements data population (Alpha) In order to use custom resource types that implement data population, the AnyVolumeDataSource feature gate must be enabled. If the provisioner or an external controller can support the specified data source, it will create a new volume based on the contents of the specified data source.", + Ref: ref("k8s.io/api/core/v1.TypedLocalObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ResourceRequirements", "k8s.io/api/core/v1.TypedLocalObjectReference", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeClaimStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaimStatus is the current status of a persistent volume claim.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "phase": { + SchemaProps: spec.SchemaProps{ + Description: "Phase represents the current phase of PersistentVolumeClaim.", + Type: []string{"string"}, + Format: "", + }, + }, + "accessModes": { + SchemaProps: spec.SchemaProps{ + Description: "AccessModes contains the actual access modes the volume backing the PVC has. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "capacity": { + SchemaProps: spec.SchemaProps{ + Description: "Represents the actual resources of the underlying volume.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'ResizeStarted'.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaimCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeClaimCondition", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeClaimTemplate(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaimTemplate is used to produce PersistentVolumeClaim objects as part of an EphemeralVolumeSource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "May contain labels and annotations that will be copied into the PVC when creating it. No other fields are allowed and will be rejected during validation.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "The specification for the PersistentVolumeClaim. The entire content is copied unchanged into the PVC that gets created from this template. The same fields as in a PersistentVolumeClaim are also valid here.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaimSpec"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeClaimSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeClaimVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaimVolumeSource references the user's PVC in the same namespace. This volume finds the bound PV and mounts that volume for the pod. A PersistentVolumeClaimVolumeSource is, essentially, a wrapper around another type of volume that is owned by someone else (the system).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "claimName": { + SchemaProps: spec.SchemaProps{ + Description: "ClaimName is the name of a PersistentVolumeClaim in the same namespace as the pod using this volume. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistentvolumeclaims", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Will force the ReadOnly setting in VolumeMounts. Default false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"claimName"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeList is a list of PersistentVolume items.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of persistent volumes. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PersistentVolume"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolume", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeSource is similar to VolumeSource but meant for the administrator who creates PVs. Exactly one of its members must be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "gcePersistentDisk": { + SchemaProps: spec.SchemaProps{ + Description: "GCEPersistentDisk represents a GCE Disk resource that is attached to a kubelet's host machine and then exposed to the pod. Provisioned by an admin. More info: https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk", + Ref: ref("k8s.io/api/core/v1.GCEPersistentDiskVolumeSource"), + }, + }, + "awsElasticBlockStore": { + SchemaProps: spec.SchemaProps{ + Description: "AWSElasticBlockStore represents an AWS Disk resource that is attached to a kubelet's host machine and then exposed to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes#awselasticblockstore", + Ref: ref("k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource"), + }, + }, + "hostPath": { + SchemaProps: spec.SchemaProps{ + Description: "HostPath represents a directory on the host. Provisioned by a developer or tester. This is useful for single-node development and testing only! On-host storage is not supported in any way and WILL NOT WORK in a multi-node cluster. More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath", + Ref: ref("k8s.io/api/core/v1.HostPathVolumeSource"), + }, + }, + "glusterfs": { + SchemaProps: spec.SchemaProps{ + Description: "Glusterfs represents a Glusterfs volume that is attached to a host and exposed to the pod. Provisioned by an admin. More info: https://examples.k8s.io/volumes/glusterfs/README.md", + Ref: ref("k8s.io/api/core/v1.GlusterfsPersistentVolumeSource"), + }, + }, + "nfs": { + SchemaProps: spec.SchemaProps{ + Description: "NFS represents an NFS mount on the host. Provisioned by an admin. More info: https://kubernetes.io/docs/concepts/storage/volumes#nfs", + Ref: ref("k8s.io/api/core/v1.NFSVolumeSource"), + }, + }, + "rbd": { + SchemaProps: spec.SchemaProps{ + Description: "RBD represents a Rados Block Device mount on the host that shares a pod's lifetime. More info: https://examples.k8s.io/volumes/rbd/README.md", + Ref: ref("k8s.io/api/core/v1.RBDPersistentVolumeSource"), + }, + }, + "iscsi": { + SchemaProps: spec.SchemaProps{ + Description: "ISCSI represents an ISCSI Disk resource that is attached to a kubelet's host machine and then exposed to the pod. Provisioned by an admin.", + Ref: ref("k8s.io/api/core/v1.ISCSIPersistentVolumeSource"), + }, + }, + "cinder": { + SchemaProps: spec.SchemaProps{ + Description: "Cinder represents a cinder volume attached and mounted on kubelets host machine. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Ref: ref("k8s.io/api/core/v1.CinderPersistentVolumeSource"), + }, + }, + "cephfs": { + SchemaProps: spec.SchemaProps{ + Description: "CephFS represents a Ceph FS mount on the host that shares a pod's lifetime", + Ref: ref("k8s.io/api/core/v1.CephFSPersistentVolumeSource"), + }, + }, + "fc": { + SchemaProps: spec.SchemaProps{ + Description: "FC represents a Fibre Channel resource that is attached to a kubelet's host machine and then exposed to the pod.", + Ref: ref("k8s.io/api/core/v1.FCVolumeSource"), + }, + }, + "flocker": { + SchemaProps: spec.SchemaProps{ + Description: "Flocker represents a Flocker volume attached to a kubelet's host machine and exposed to the pod for its usage. This depends on the Flocker control service being running", + Ref: ref("k8s.io/api/core/v1.FlockerVolumeSource"), + }, + }, + "flexVolume": { + SchemaProps: spec.SchemaProps{ + Description: "FlexVolume represents a generic volume resource that is provisioned/attached using an exec based plugin.", + Ref: ref("k8s.io/api/core/v1.FlexPersistentVolumeSource"), + }, + }, + "azureFile": { + SchemaProps: spec.SchemaProps{ + Description: "AzureFile represents an Azure File Service mount on the host and bind mount to the pod.", + Ref: ref("k8s.io/api/core/v1.AzureFilePersistentVolumeSource"), + }, + }, + "vsphereVolume": { + SchemaProps: spec.SchemaProps{ + Description: "VsphereVolume represents a vSphere volume attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource"), + }, + }, + "quobyte": { + SchemaProps: spec.SchemaProps{ + Description: "Quobyte represents a Quobyte mount on the host that shares a pod's lifetime", + Ref: ref("k8s.io/api/core/v1.QuobyteVolumeSource"), + }, + }, + "azureDisk": { + SchemaProps: spec.SchemaProps{ + Description: "AzureDisk represents an Azure Data Disk mount on the host and bind mount to the pod.", + Ref: ref("k8s.io/api/core/v1.AzureDiskVolumeSource"), + }, + }, + "photonPersistentDisk": { + SchemaProps: spec.SchemaProps{ + Description: "PhotonPersistentDisk represents a PhotonController persistent disk attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource"), + }, + }, + "portworxVolume": { + SchemaProps: spec.SchemaProps{ + Description: "PortworxVolume represents a portworx volume attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.PortworxVolumeSource"), + }, + }, + "scaleIO": { + SchemaProps: spec.SchemaProps{ + Description: "ScaleIO represents a ScaleIO persistent volume attached and mounted on Kubernetes nodes.", + Ref: ref("k8s.io/api/core/v1.ScaleIOPersistentVolumeSource"), + }, + }, + "local": { + SchemaProps: spec.SchemaProps{ + Description: "Local represents directly-attached storage with node affinity", + Ref: ref("k8s.io/api/core/v1.LocalVolumeSource"), + }, + }, + "storageos": { + SchemaProps: spec.SchemaProps{ + Description: "StorageOS represents a StorageOS volume that is attached to the kubelet's host machine and mounted into the pod More info: https://examples.k8s.io/volumes/storageos/README.md", + Ref: ref("k8s.io/api/core/v1.StorageOSPersistentVolumeSource"), + }, + }, + "csi": { + SchemaProps: spec.SchemaProps{ + Description: "CSI represents storage that is handled by an external CSI driver (Beta feature).", + Ref: ref("k8s.io/api/core/v1.CSIPersistentVolumeSource"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource", "k8s.io/api/core/v1.AzureDiskVolumeSource", "k8s.io/api/core/v1.AzureFilePersistentVolumeSource", "k8s.io/api/core/v1.CSIPersistentVolumeSource", "k8s.io/api/core/v1.CephFSPersistentVolumeSource", "k8s.io/api/core/v1.CinderPersistentVolumeSource", "k8s.io/api/core/v1.FCVolumeSource", "k8s.io/api/core/v1.FlexPersistentVolumeSource", "k8s.io/api/core/v1.FlockerVolumeSource", "k8s.io/api/core/v1.GCEPersistentDiskVolumeSource", "k8s.io/api/core/v1.GlusterfsPersistentVolumeSource", "k8s.io/api/core/v1.HostPathVolumeSource", "k8s.io/api/core/v1.ISCSIPersistentVolumeSource", "k8s.io/api/core/v1.LocalVolumeSource", "k8s.io/api/core/v1.NFSVolumeSource", "k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource", "k8s.io/api/core/v1.PortworxVolumeSource", "k8s.io/api/core/v1.QuobyteVolumeSource", "k8s.io/api/core/v1.RBDPersistentVolumeSource", "k8s.io/api/core/v1.ScaleIOPersistentVolumeSource", "k8s.io/api/core/v1.StorageOSPersistentVolumeSource", "k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeSpec is the specification of a persistent volume.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "capacity": { + SchemaProps: spec.SchemaProps{ + Description: "A description of the persistent volume's resources and capacity. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#capacity", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "gcePersistentDisk": { + SchemaProps: spec.SchemaProps{ + Description: "GCEPersistentDisk represents a GCE Disk resource that is attached to a kubelet's host machine and then exposed to the pod. Provisioned by an admin. More info: https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk", + Ref: ref("k8s.io/api/core/v1.GCEPersistentDiskVolumeSource"), + }, + }, + "awsElasticBlockStore": { + SchemaProps: spec.SchemaProps{ + Description: "AWSElasticBlockStore represents an AWS Disk resource that is attached to a kubelet's host machine and then exposed to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes#awselasticblockstore", + Ref: ref("k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource"), + }, + }, + "hostPath": { + SchemaProps: spec.SchemaProps{ + Description: "HostPath represents a directory on the host. Provisioned by a developer or tester. This is useful for single-node development and testing only! On-host storage is not supported in any way and WILL NOT WORK in a multi-node cluster. More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath", + Ref: ref("k8s.io/api/core/v1.HostPathVolumeSource"), + }, + }, + "glusterfs": { + SchemaProps: spec.SchemaProps{ + Description: "Glusterfs represents a Glusterfs volume that is attached to a host and exposed to the pod. Provisioned by an admin. More info: https://examples.k8s.io/volumes/glusterfs/README.md", + Ref: ref("k8s.io/api/core/v1.GlusterfsPersistentVolumeSource"), + }, + }, + "nfs": { + SchemaProps: spec.SchemaProps{ + Description: "NFS represents an NFS mount on the host. Provisioned by an admin. More info: https://kubernetes.io/docs/concepts/storage/volumes#nfs", + Ref: ref("k8s.io/api/core/v1.NFSVolumeSource"), + }, + }, + "rbd": { + SchemaProps: spec.SchemaProps{ + Description: "RBD represents a Rados Block Device mount on the host that shares a pod's lifetime. More info: https://examples.k8s.io/volumes/rbd/README.md", + Ref: ref("k8s.io/api/core/v1.RBDPersistentVolumeSource"), + }, + }, + "iscsi": { + SchemaProps: spec.SchemaProps{ + Description: "ISCSI represents an ISCSI Disk resource that is attached to a kubelet's host machine and then exposed to the pod. Provisioned by an admin.", + Ref: ref("k8s.io/api/core/v1.ISCSIPersistentVolumeSource"), + }, + }, + "cinder": { + SchemaProps: spec.SchemaProps{ + Description: "Cinder represents a cinder volume attached and mounted on kubelets host machine. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Ref: ref("k8s.io/api/core/v1.CinderPersistentVolumeSource"), + }, + }, + "cephfs": { + SchemaProps: spec.SchemaProps{ + Description: "CephFS represents a Ceph FS mount on the host that shares a pod's lifetime", + Ref: ref("k8s.io/api/core/v1.CephFSPersistentVolumeSource"), + }, + }, + "fc": { + SchemaProps: spec.SchemaProps{ + Description: "FC represents a Fibre Channel resource that is attached to a kubelet's host machine and then exposed to the pod.", + Ref: ref("k8s.io/api/core/v1.FCVolumeSource"), + }, + }, + "flocker": { + SchemaProps: spec.SchemaProps{ + Description: "Flocker represents a Flocker volume attached to a kubelet's host machine and exposed to the pod for its usage. This depends on the Flocker control service being running", + Ref: ref("k8s.io/api/core/v1.FlockerVolumeSource"), + }, + }, + "flexVolume": { + SchemaProps: spec.SchemaProps{ + Description: "FlexVolume represents a generic volume resource that is provisioned/attached using an exec based plugin.", + Ref: ref("k8s.io/api/core/v1.FlexPersistentVolumeSource"), + }, + }, + "azureFile": { + SchemaProps: spec.SchemaProps{ + Description: "AzureFile represents an Azure File Service mount on the host and bind mount to the pod.", + Ref: ref("k8s.io/api/core/v1.AzureFilePersistentVolumeSource"), + }, + }, + "vsphereVolume": { + SchemaProps: spec.SchemaProps{ + Description: "VsphereVolume represents a vSphere volume attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource"), + }, + }, + "quobyte": { + SchemaProps: spec.SchemaProps{ + Description: "Quobyte represents a Quobyte mount on the host that shares a pod's lifetime", + Ref: ref("k8s.io/api/core/v1.QuobyteVolumeSource"), + }, + }, + "azureDisk": { + SchemaProps: spec.SchemaProps{ + Description: "AzureDisk represents an Azure Data Disk mount on the host and bind mount to the pod.", + Ref: ref("k8s.io/api/core/v1.AzureDiskVolumeSource"), + }, + }, + "photonPersistentDisk": { + SchemaProps: spec.SchemaProps{ + Description: "PhotonPersistentDisk represents a PhotonController persistent disk attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource"), + }, + }, + "portworxVolume": { + SchemaProps: spec.SchemaProps{ + Description: "PortworxVolume represents a portworx volume attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.PortworxVolumeSource"), + }, + }, + "scaleIO": { + SchemaProps: spec.SchemaProps{ + Description: "ScaleIO represents a ScaleIO persistent volume attached and mounted on Kubernetes nodes.", + Ref: ref("k8s.io/api/core/v1.ScaleIOPersistentVolumeSource"), + }, + }, + "local": { + SchemaProps: spec.SchemaProps{ + Description: "Local represents directly-attached storage with node affinity", + Ref: ref("k8s.io/api/core/v1.LocalVolumeSource"), + }, + }, + "storageos": { + SchemaProps: spec.SchemaProps{ + Description: "StorageOS represents a StorageOS volume that is attached to the kubelet's host machine and mounted into the pod More info: https://examples.k8s.io/volumes/storageos/README.md", + Ref: ref("k8s.io/api/core/v1.StorageOSPersistentVolumeSource"), + }, + }, + "csi": { + SchemaProps: spec.SchemaProps{ + Description: "CSI represents storage that is handled by an external CSI driver (Beta feature).", + Ref: ref("k8s.io/api/core/v1.CSIPersistentVolumeSource"), + }, + }, + "accessModes": { + SchemaProps: spec.SchemaProps{ + Description: "AccessModes contains all ways the volume can be mounted. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "claimRef": { + SchemaProps: spec.SchemaProps{ + Description: "ClaimRef is part of a bi-directional binding between PersistentVolume and PersistentVolumeClaim. Expected to be non-nil when bound. claim.VolumeName is the authoritative bind between PV and PVC. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#binding", + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "persistentVolumeReclaimPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "What happens to a persistent volume when released from its claim. Valid options are Retain (default for manually created PersistentVolumes), Delete (default for dynamically provisioned PersistentVolumes), and Recycle (deprecated). Recycle must be supported by the volume plugin underlying this PersistentVolume. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#reclaiming", + Type: []string{"string"}, + Format: "", + }, + }, + "storageClassName": { + SchemaProps: spec.SchemaProps{ + Description: "Name of StorageClass to which this persistent volume belongs. Empty value means that this volume does not belong to any StorageClass.", + Type: []string{"string"}, + Format: "", + }, + }, + "mountOptions": { + SchemaProps: spec.SchemaProps{ + Description: "A list of mount options, e.g. [\"ro\", \"soft\"]. Not validated - mount will simply fail if one is invalid. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#mount-options", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "volumeMode": { + SchemaProps: spec.SchemaProps{ + Description: "volumeMode defines if a volume is intended to be used with a formatted filesystem or to remain in raw block state. Value of Filesystem is implied when not included in spec.", + Type: []string{"string"}, + Format: "", + }, + }, + "nodeAffinity": { + SchemaProps: spec.SchemaProps{ + Description: "NodeAffinity defines constraints that limit what nodes this volume can be accessed from. This field influences the scheduling of pods that use this volume.", + Ref: ref("k8s.io/api/core/v1.VolumeNodeAffinity"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource", "k8s.io/api/core/v1.AzureDiskVolumeSource", "k8s.io/api/core/v1.AzureFilePersistentVolumeSource", "k8s.io/api/core/v1.CSIPersistentVolumeSource", "k8s.io/api/core/v1.CephFSPersistentVolumeSource", "k8s.io/api/core/v1.CinderPersistentVolumeSource", "k8s.io/api/core/v1.FCVolumeSource", "k8s.io/api/core/v1.FlexPersistentVolumeSource", "k8s.io/api/core/v1.FlockerVolumeSource", "k8s.io/api/core/v1.GCEPersistentDiskVolumeSource", "k8s.io/api/core/v1.GlusterfsPersistentVolumeSource", "k8s.io/api/core/v1.HostPathVolumeSource", "k8s.io/api/core/v1.ISCSIPersistentVolumeSource", "k8s.io/api/core/v1.LocalVolumeSource", "k8s.io/api/core/v1.NFSVolumeSource", "k8s.io/api/core/v1.ObjectReference", "k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource", "k8s.io/api/core/v1.PortworxVolumeSource", "k8s.io/api/core/v1.QuobyteVolumeSource", "k8s.io/api/core/v1.RBDPersistentVolumeSource", "k8s.io/api/core/v1.ScaleIOPersistentVolumeSource", "k8s.io/api/core/v1.StorageOSPersistentVolumeSource", "k8s.io/api/core/v1.VolumeNodeAffinity", "k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_PersistentVolumeStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeStatus is the current status of a persistent volume.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "phase": { + SchemaProps: spec.SchemaProps{ + Description: "Phase indicates if a volume is available, bound to a claim, or released by a claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#phase", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human-readable message indicating details about why the volume is in this state.", + Type: []string{"string"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "Reason is a brief CamelCase string that describes any failure and is meant for machine parsing and tidy display in the CLI.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PhotonPersistentDiskVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Photon Controller persistent disk resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "pdID": { + SchemaProps: spec.SchemaProps{ + Description: "ID that identifies Photon Controller persistent disk", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"pdID"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_Pod(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Pod is a collection of containers that can run on a host. This resource is created by clients and scheduled onto hosts.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the pod. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the pod. This data may not be up to date. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodSpec", "k8s.io/api/core/v1.PodStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_PodAffinity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Pod affinity is a group of inter pod affinity scheduling rules.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "requiredDuringSchedulingIgnoredDuringExecution": { + SchemaProps: spec.SchemaProps{ + Description: "If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodAffinityTerm"), + }, + }, + }, + }, + }, + "preferredDuringSchedulingIgnoredDuringExecution": { + SchemaProps: spec.SchemaProps{ + Description: "The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding \"weight\" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.WeightedPodAffinityTerm"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodAffinityTerm", "k8s.io/api/core/v1.WeightedPodAffinityTerm"}, + } +} + +func schema_k8sio_api_core_v1_PodAffinityTerm(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "labelSelector": { + SchemaProps: spec.SchemaProps{ + Description: "A label query over a set of resources, in this case pods.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "namespaces": { + SchemaProps: spec.SchemaProps{ + Description: "namespaces specifies which namespaces the labelSelector applies to (matches against); null or empty list means \"this pod's namespace\"", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "topologyKey": { + SchemaProps: spec.SchemaProps{ + Description: "This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"topologyKey"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_core_v1_PodAntiAffinity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Pod anti affinity is a group of inter pod anti affinity scheduling rules.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "requiredDuringSchedulingIgnoredDuringExecution": { + SchemaProps: spec.SchemaProps{ + Description: "If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodAffinityTerm"), + }, + }, + }, + }, + }, + "preferredDuringSchedulingIgnoredDuringExecution": { + SchemaProps: spec.SchemaProps{ + Description: "The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding \"weight\" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.WeightedPodAffinityTerm"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodAffinityTerm", "k8s.io/api/core/v1.WeightedPodAffinityTerm"}, + } +} + +func schema_k8sio_api_core_v1_PodAttachOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodAttachOptions is the query options to a Pod's remote attach call.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "stdin": { + SchemaProps: spec.SchemaProps{ + Description: "Stdin if true, redirects the standard input stream of the pod for this call. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "stdout": { + SchemaProps: spec.SchemaProps{ + Description: "Stdout if true indicates that stdout is to be redirected for the attach call. Defaults to true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "stderr": { + SchemaProps: spec.SchemaProps{ + Description: "Stderr if true indicates that stderr is to be redirected for the attach call. Defaults to true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "tty": { + SchemaProps: spec.SchemaProps{ + Description: "TTY if true indicates that a tty will be allocated for the attach call. This is passed through the container runtime so the tty is allocated on the worker node by the container runtime. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "The container in which to execute the command. Defaults to only container if there is only one container in the pod.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PodCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodCondition contains details for the current condition of this pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type is the type of the condition. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-conditions", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the status of the condition. Can be True, False, Unknown. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-conditions", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastProbeTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time we probed the condition.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "Unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_PodDNSConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodDNSConfig defines the DNS parameters of a pod in addition to those generated from DNSPolicy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "nameservers": { + SchemaProps: spec.SchemaProps{ + Description: "A list of DNS name server IP addresses. This will be appended to the base nameservers generated from DNSPolicy. Duplicated nameservers will be removed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "searches": { + SchemaProps: spec.SchemaProps{ + Description: "A list of DNS search domains for host-name lookup. This will be appended to the base search paths generated from DNSPolicy. Duplicated search paths will be removed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "options": { + SchemaProps: spec.SchemaProps{ + Description: "A list of DNS resolver options. This will be merged with the base options generated from DNSPolicy. Duplicated entries will be removed. Resolution options given in Options will override those that appear in the base DNSPolicy.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodDNSConfigOption"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodDNSConfigOption"}, + } +} + +func schema_k8sio_api_core_v1_PodDNSConfigOption(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodDNSConfigOption defines DNS resolver options of a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PodExecOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodExecOptions is the query options to a Pod's remote exec call.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "stdin": { + SchemaProps: spec.SchemaProps{ + Description: "Redirect the standard input stream of the pod for this call. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "stdout": { + SchemaProps: spec.SchemaProps{ + Description: "Redirect the standard output stream of the pod for this call. Defaults to true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "stderr": { + SchemaProps: spec.SchemaProps{ + Description: "Redirect the standard error stream of the pod for this call. Defaults to true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "tty": { + SchemaProps: spec.SchemaProps{ + Description: "TTY if true indicates that a tty will be allocated for the exec call. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "Container in which to execute the command. Defaults to only container if there is only one container in the pod.", + Type: []string{"string"}, + Format: "", + }, + }, + "command": { + SchemaProps: spec.SchemaProps{ + Description: "Command is the remote command to execute. argv array. Not executed within a shell.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"command"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PodIP(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IP address information for entries in the (plural) PodIPs field. Each entry includes:\n IP: An IP address allocated to the pod. Routable at least within the cluster.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ip": { + SchemaProps: spec.SchemaProps{ + Description: "ip is an IP address (IPv4 or IPv6) assigned to the pod", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PodList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodList is a list of Pods.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of pods. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Pod"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Pod", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_PodLogOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodLogOptions is the query options for a Pod's logs REST call.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "container": { + SchemaProps: spec.SchemaProps{ + Description: "The container for which to stream logs. Defaults to only container if there is one container in the pod.", + Type: []string{"string"}, + Format: "", + }, + }, + "follow": { + SchemaProps: spec.SchemaProps{ + Description: "Follow the log stream of the pod. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "previous": { + SchemaProps: spec.SchemaProps{ + Description: "Return previous terminated container logs. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "sinceSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "A relative time in seconds before the current time from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "sinceTime": { + SchemaProps: spec.SchemaProps{ + Description: "An RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "timestamps": { + SchemaProps: spec.SchemaProps{ + Description: "If true, add an RFC3339 or RFC3339Nano timestamp at the beginning of every line of log output. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "tailLines": { + SchemaProps: spec.SchemaProps{ + Description: "If set, the number of lines from the end of the logs to show. If not specified, logs are shown from the creation of the container or sinceSeconds or sinceTime", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "limitBytes": { + SchemaProps: spec.SchemaProps{ + Description: "If set, the number of bytes to read from the server before terminating the log output. This may not display a complete final line of logging, and may return slightly more or slightly less than the specified limit.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "insecureSkipTLSVerifyBackend": { + SchemaProps: spec.SchemaProps{ + Description: "insecureSkipTLSVerifyBackend indicates that the apiserver should not confirm the validity of the serving certificate of the backend it is connecting to. This will make the HTTPS connection between the apiserver and the backend insecure. This means the apiserver cannot verify the log data it is receiving came from the real kubelet. If the kubelet is configured to verify the apiserver's TLS credentials, it does not mean the connection to the real kubelet is vulnerable to a man in the middle attack (e.g. an attacker could not intercept the actual log data coming from the real kubelet).", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_PodPortForwardOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodPortForwardOptions is the query options to a Pod's port forward call when using WebSockets. The `port` query parameter must specify the port or ports (comma separated) to forward over. Port forwarding over SPDY does not use these options. It requires the port to be passed in the `port` header as part of request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "ports": { + SchemaProps: spec.SchemaProps{ + Description: "List of ports to forward Required when using WebSockets", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PodProxyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodProxyOptions is the query options to a Pod's proxy call.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is the URL path to use for the current proxy request to pod.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PodReadinessGate(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodReadinessGate contains the reference to a pod condition", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditionType": { + SchemaProps: spec.SchemaProps{ + Description: "ConditionType refers to a condition in the pod's condition list with matching type.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"conditionType"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PodSecurityContext(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "seLinuxOptions": { + SchemaProps: spec.SchemaProps{ + Description: "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.", + Ref: ref("k8s.io/api/core/v1.SELinuxOptions"), + }, + }, + "windowsOptions": { + SchemaProps: spec.SchemaProps{ + Description: "The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.", + Ref: ref("k8s.io/api/core/v1.WindowsSecurityContextOptions"), + }, + }, + "runAsUser": { + SchemaProps: spec.SchemaProps{ + Description: "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "runAsGroup": { + SchemaProps: spec.SchemaProps{ + Description: "The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "runAsNonRoot": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "supplementalGroups": { + SchemaProps: spec.SchemaProps{ + Description: "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + }, + }, + "fsGroup": { + SchemaProps: spec.SchemaProps{ + Description: "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw----\n\nIf unset, the Kubelet will not modify the ownership and permissions of any volume.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "sysctls": { + SchemaProps: spec.SchemaProps{ + Description: "Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Sysctl"), + }, + }, + }, + }, + }, + "fsGroupChangePolicy": { + SchemaProps: spec.SchemaProps{ + Description: "fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are \"OnRootMismatch\" and \"Always\". If not specified, \"Always\" is used.", + Type: []string{"string"}, + Format: "", + }, + }, + "seccompProfile": { + SchemaProps: spec.SchemaProps{ + Description: "The seccomp options to use by the containers in this pod.", + Ref: ref("k8s.io/api/core/v1.SeccompProfile"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SELinuxOptions", "k8s.io/api/core/v1.SeccompProfile", "k8s.io/api/core/v1.Sysctl", "k8s.io/api/core/v1.WindowsSecurityContextOptions"}, + } +} + +func schema_k8sio_api_core_v1_PodSignature(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Describes the class of pods that should avoid this node. Exactly one field should be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podController": { + SchemaProps: spec.SchemaProps{ + Description: "Reference to controller whose pods should avoid this node.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.OwnerReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.OwnerReference"}, + } +} + +func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodSpec is a description of a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumes": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge,retainKeys", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of volumes that can be mounted by containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Volume"), + }, + }, + }, + }, + }, + "initContainers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of initialization containers belonging to the pod. Init containers are executed in order prior to containers being started. If any init container fails, the pod is considered to have failed and is handled according to its restartPolicy. The name for an init container or normal container must be unique among all containers. Init containers may not have Lifecycle actions, Readiness probes, Liveness probes, or Startup probes. The resourceRequirements of an init container are taken into account during scheduling by finding the highest request/limit for each resource type, and then using the max of of that value or the sum of the normal containers. Limits are applied to init containers in a similar fashion. Init containers cannot currently be added or removed. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Container"), + }, + }, + }, + }, + }, + "containers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of containers belonging to the pod. Containers cannot currently be added or removed. There must be at least one container in a Pod. Cannot be updated.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Container"), + }, + }, + }, + }, + }, + "ephemeralContainers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of ephemeral containers run in this pod. Ephemeral containers may be run in an existing pod to perform user-initiated actions such as debugging. This list cannot be specified when creating a pod, and it cannot be modified by updating the pod spec. In order to add an ephemeral container to an existing pod, use the pod's ephemeralcontainers subresource. This field is alpha-level and is only honored by servers that enable the EphemeralContainers feature.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EphemeralContainer"), + }, + }, + }, + }, + }, + "restartPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Restart policy for all containers within the pod. One of Always, OnFailure, Never. Default to Always. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy", + Type: []string{"string"}, + Format: "", + }, + }, + "terminationGracePeriodSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Optional duration in seconds the pod needs to terminate gracefully. May be decreased in delete request. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period will be used instead. The grace period is the duration in seconds after the processes running in the pod are sent a termination signal and the time when the processes are forcibly halted with a kill signal. Set this value longer than the expected cleanup time for your process. Defaults to 30 seconds.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "activeDeadlineSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Optional duration in seconds the pod may be active on the node relative to StartTime before the system will actively try to mark it failed and kill associated containers. Value must be a positive integer.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "dnsPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Set DNS policy for the pod. Defaults to \"ClusterFirst\". Valid values are 'ClusterFirstWithHostNet', 'ClusterFirst', 'Default' or 'None'. DNS parameters given in DNSConfig will be merged with the policy selected with DNSPolicy. To have DNS options set along with hostNetwork, you have to specify DNS policy explicitly to 'ClusterFirstWithHostNet'.", + Type: []string{"string"}, + Format: "", + }, + }, + "nodeSelector": { + SchemaProps: spec.SchemaProps{ + Description: "NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node's labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "serviceAccountName": { + SchemaProps: spec.SchemaProps{ + Description: "ServiceAccountName is the name of the ServiceAccount to use to run this pod. More info: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/", + Type: []string{"string"}, + Format: "", + }, + }, + "serviceAccount": { + SchemaProps: spec.SchemaProps{ + Description: "DeprecatedServiceAccount is a depreciated alias for ServiceAccountName. Deprecated: Use serviceAccountName instead.", + Type: []string{"string"}, + Format: "", + }, + }, + "automountServiceAccountToken": { + SchemaProps: spec.SchemaProps{ + Description: "AutomountServiceAccountToken indicates whether a service account token should be automatically mounted.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "nodeName": { + SchemaProps: spec.SchemaProps{ + Description: "NodeName is a request to schedule this pod onto a specific node. If it is non-empty, the scheduler simply schedules this pod onto that node, assuming that it fits resource requirements.", + Type: []string{"string"}, + Format: "", + }, + }, + "hostNetwork": { + SchemaProps: spec.SchemaProps{ + Description: "Host networking requested for this pod. Use the host's network namespace. If this option is set, the ports that will be used must be specified. Default to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "hostPID": { + SchemaProps: spec.SchemaProps{ + Description: "Use the host's pid namespace. Optional: Default to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "hostIPC": { + SchemaProps: spec.SchemaProps{ + Description: "Use the host's ipc namespace. Optional: Default to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "shareProcessNamespace": { + SchemaProps: spec.SchemaProps{ + Description: "Share a single process namespace between all of the containers in a pod. When this is set containers will be able to view and signal processes from other containers in the same pod, and the first process in each container will not be assigned PID 1. HostPID and ShareProcessNamespace cannot both be set. Optional: Default to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "securityContext": { + SchemaProps: spec.SchemaProps{ + Description: "SecurityContext holds pod-level security attributes and common container settings. Optional: Defaults to empty. See type description for default values of each field.", + Ref: ref("k8s.io/api/core/v1.PodSecurityContext"), + }, + }, + "imagePullSecrets": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "ImagePullSecrets is an optional list of references to secrets in the same namespace to use for pulling any of the images used by this PodSpec. If specified, these secrets will be passed to individual puller implementations for them to use. For example, in the case of docker, only DockerConfig type secrets are honored. More info: https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + }, + }, + }, + "hostname": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the hostname of the Pod If not specified, the pod's hostname will be set to a system-defined value.", + Type: []string{"string"}, + Format: "", + }, + }, + "subdomain": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the fully qualified Pod hostname will be \"...svc.\". If not specified, the pod will not have a domainname at all.", + Type: []string{"string"}, + Format: "", + }, + }, + "affinity": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the pod's scheduling constraints", + Ref: ref("k8s.io/api/core/v1.Affinity"), + }, + }, + "schedulerName": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the pod will be dispatched by specified scheduler. If not specified, the pod will be dispatched by default scheduler.", + Type: []string{"string"}, + Format: "", + }, + }, + "tolerations": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the pod's tolerations.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Toleration"), + }, + }, + }, + }, + }, + "hostAliases": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "ip", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "HostAliases is an optional list of hosts and IPs that will be injected into the pod's hosts file if specified. This is only valid for non-hostNetwork pods.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.HostAlias"), + }, + }, + }, + }, + }, + "priorityClassName": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, indicates the pod's priority. \"system-node-critical\" and \"system-cluster-critical\" are two special keywords which indicate the highest priorities with the former being the highest priority. Any other name must be defined by creating a PriorityClass object with that name. If not specified, the pod priority will be default or zero if there is no default.", + Type: []string{"string"}, + Format: "", + }, + }, + "priority": { + SchemaProps: spec.SchemaProps{ + Description: "The priority value. Various system components use this field to find the priority of the pod. When Priority Admission Controller is enabled, it prevents users from setting this field. The admission controller populates this field from PriorityClassName. The higher the value, the higher the priority.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "dnsConfig": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the DNS parameters of a pod. Parameters specified here will be merged to the generated DNS configuration based on DNSPolicy.", + Ref: ref("k8s.io/api/core/v1.PodDNSConfig"), + }, + }, + "readinessGates": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, all readiness gates will be evaluated for pod readiness. A pod is ready when all its containers are ready AND all conditions specified in the readiness gates have status equal to \"True\" More info: https://git.k8s.io/enhancements/keps/sig-network/0007-pod-ready%2B%2B.md", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodReadinessGate"), + }, + }, + }, + }, + }, + "runtimeClassName": { + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClassName refers to a RuntimeClass object in the node.k8s.io group, which should be used to run this pod. If no RuntimeClass resource matches the named class, the pod will not be run. If unset or empty, the \"legacy\" RuntimeClass will be used, which is an implicit class with an empty definition that uses the default runtime handler. More info: https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md This is a beta feature as of Kubernetes v1.14.", + Type: []string{"string"}, + Format: "", + }, + }, + "enableServiceLinks": { + SchemaProps: spec.SchemaProps{ + Description: "EnableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links. Optional: Defaults to true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "preemptionPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "PreemptionPolicy is the Policy for preempting pods with lower priority. One of Never, PreemptLowerPriority. Defaults to PreemptLowerPriority if unset. This field is beta-level, gated by the NonPreemptingPriority feature-gate.", + Type: []string{"string"}, + Format: "", + }, + }, + "overhead": { + SchemaProps: spec.SchemaProps{ + Description: "Overhead represents the resource overhead associated with running a pod for a given RuntimeClass. This field will be autopopulated at admission time by the RuntimeClass admission controller. If the RuntimeClass admission controller is enabled, overhead must not be set in Pod create requests. The RuntimeClass admission controller will reject Pod create requests which have the overhead already set. If RuntimeClass is configured and selected in the PodSpec, Overhead will be set to the value defined in the corresponding RuntimeClass, otherwise it will remain unset and treated as zero. More info: https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md This field is alpha-level as of Kubernetes v1.16, and is only honored by servers that enable the PodOverhead feature.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "topologySpreadConstraints": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "topologyKey", + "whenUnsatisfiable", + }, + "x-kubernetes-list-type": "map", + "x-kubernetes-patch-merge-key": "topologyKey", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "TopologySpreadConstraints describes how a group of pods ought to spread across topology domains. Scheduler will schedule pods in a way which abides by the constraints. All topologySpreadConstraints are ANDed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.TopologySpreadConstraint"), + }, + }, + }, + }, + }, + "setHostnameAsFQDN": { + SchemaProps: spec.SchemaProps{ + Description: "If true the pod's hostname will be configured as the pod's FQDN, rather than the leaf name (the default). In Linux containers, this means setting the FQDN in the hostname field of the kernel (the nodename field of struct utsname). In Windows containers, this means setting the registry value of hostname for the registry key HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters to FQDN. If a pod does not have FQDN, this has no effect. Default to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"containers"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Affinity", "k8s.io/api/core/v1.Container", "k8s.io/api/core/v1.EphemeralContainer", "k8s.io/api/core/v1.HostAlias", "k8s.io/api/core/v1.LocalObjectReference", "k8s.io/api/core/v1.PodDNSConfig", "k8s.io/api/core/v1.PodReadinessGate", "k8s.io/api/core/v1.PodSecurityContext", "k8s.io/api/core/v1.Toleration", "k8s.io/api/core/v1.TopologySpreadConstraint", "k8s.io/api/core/v1.Volume", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_PodStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodStatus represents information about the status of a pod. Status may trail the actual state of a system, especially if the node that hosts the pod cannot contact the control plane.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "phase": { + SchemaProps: spec.SchemaProps{ + Description: "The phase of a Pod is a simple, high-level summary of where the Pod is in its lifecycle. The conditions array, the reason and message fields, and the individual container status arrays contain more detail about the pod's status. There are five possible phase values:\n\nPending: The pod has been accepted by the Kubernetes system, but one or more of the container images has not been created. This includes time before being scheduled as well as time spent downloading images over the network, which could take a while. Running: The pod has been bound to a node, and all of the containers have been created. At least one container is still running, or is in the process of starting or restarting. Succeeded: All containers in the pod have terminated in success, and will not be restarted. Failed: All containers in the pod have terminated, and at least one container has terminated in failure. The container either exited with non-zero status or was terminated by the system. Unknown: For some reason the state of the pod could not be obtained, typically due to an error in communicating with the host of the pod.\n\nMore info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-phase", + Type: []string{"string"}, + Format: "", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Current service state of pod. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-conditions", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodCondition"), + }, + }, + }, + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about why the pod is in this condition.", + Type: []string{"string"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "A brief CamelCase message indicating details about why the pod is in this state. e.g. 'Evicted'", + Type: []string{"string"}, + Format: "", + }, + }, + "nominatedNodeName": { + SchemaProps: spec.SchemaProps{ + Description: "nominatedNodeName is set only when this pod preempts other pods on the node, but it cannot be scheduled right away as preemption victims receive their graceful termination periods. This field does not guarantee that the pod will be scheduled on this node. Scheduler may decide to place the pod elsewhere if other nodes become available sooner. Scheduler may also decide to give the resources on this node to a higher priority pod that is created after preemption. As a result, this field may be different than PodSpec.nodeName when the pod is scheduled.", + Type: []string{"string"}, + Format: "", + }, + }, + "hostIP": { + SchemaProps: spec.SchemaProps{ + Description: "IP address of the host to which the pod is assigned. Empty if not yet scheduled.", + Type: []string{"string"}, + Format: "", + }, + }, + "podIP": { + SchemaProps: spec.SchemaProps{ + Description: "IP address allocated to the pod. Routable at least within the cluster. Empty if not yet allocated.", + Type: []string{"string"}, + Format: "", + }, + }, + "podIPs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "ip", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "podIPs holds the IP addresses allocated to the pod. If this field is specified, the 0th entry must match the podIP field. Pods may be allocated at most 1 value for each of IPv4 and IPv6. This list is empty if no IPs have been allocated yet.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodIP"), + }, + }, + }, + }, + }, + "startTime": { + SchemaProps: spec.SchemaProps{ + Description: "RFC 3339 date and time at which the object was acknowledged by the Kubelet. This is before the Kubelet pulled the container image(s) for the pod.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "initContainerStatuses": { + SchemaProps: spec.SchemaProps{ + Description: "The list has one entry per init container in the manifest. The most recent successful init container will have ready = true, the most recently started container will have startTime set. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerStatus"), + }, + }, + }, + }, + }, + "containerStatuses": { + SchemaProps: spec.SchemaProps{ + Description: "The list has one entry per container in the manifest. Each entry is currently the output of `docker inspect`. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerStatus"), + }, + }, + }, + }, + }, + "qosClass": { + SchemaProps: spec.SchemaProps{ + Description: "The Quality of Service (QOS) classification assigned to the pod based on resource requirements See PodQOSClass type for available QOS classes More info: https://git.k8s.io/community/contributors/design-proposals/node/resource-qos.md", + Type: []string{"string"}, + Format: "", + }, + }, + "ephemeralContainerStatuses": { + SchemaProps: spec.SchemaProps{ + Description: "Status for any ephemeral containers that have run in this pod. This field is alpha-level and is only populated by servers that enable the EphemeralContainers feature.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ContainerStatus"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ContainerStatus", "k8s.io/api/core/v1.PodCondition", "k8s.io/api/core/v1.PodIP", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_PodStatusResult(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodStatusResult is a wrapper for PodStatus returned by kubelet that can be encode/decoded", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the pod. This data may not be up to date. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_PodTemplate(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodTemplate describes a template for creating copies of a predefined pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template defines the pods that will be created from this pod template. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_PodTemplateList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodTemplateList is a list of PodTemplates.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of pod templates", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplate"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplate", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_PodTemplateSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodTemplateSpec describes the data a pod should have when created from a template", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the pod. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_PortStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "port": { + SchemaProps: spec.SchemaProps{ + Description: "Port is the port number of the service port of which status is recorded here", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "protocol": { + SchemaProps: spec.SchemaProps{ + Description: "Protocol is the protocol of the service port of which status is recorded here The supported values are: \"TCP\", \"UDP\", \"SCTP\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "error": { + SchemaProps: spec.SchemaProps{ + Description: "Error is to record the problem with the service port The format of the error shall comply with the following rules: - built-in error values shall be specified in this file and those shall use\n CamelCase names\n- cloud provider specific error values must have names that comply with the\n format foo.example.com/CamelCase.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"port", "protocol"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PortworxVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PortworxVolumeSource represents a Portworx volume resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumeID": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeID uniquely identifies a Portworx volume", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "FSType represents the filesystem type to mount Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\". Implicitly inferred to be \"ext4\" if unspecified.", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"volumeID"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_PreferAvoidPodsEntry(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Describes a class of pods that should avoid this node.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podSignature": { + SchemaProps: spec.SchemaProps{ + Description: "The class of pods.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodSignature"), + }, + }, + "evictionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Time at which this entry was added to the list.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "(brief) reason why this entry was added to the list.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Human readable message indicating why this entry was added to the list.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"podSignature"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodSignature", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_PreferredSchedulingTerm(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "An empty preferred scheduling term matches all objects with implicit weight 0 (i.e. it's a no-op). A null preferred scheduling term matches no objects (i.e. is also a no-op).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "weight": { + SchemaProps: spec.SchemaProps{ + Description: "Weight associated with matching the corresponding nodeSelectorTerm, in the range 1-100.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "preference": { + SchemaProps: spec.SchemaProps{ + Description: "A node selector term, associated with the corresponding weight.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeSelectorTerm"), + }, + }, + }, + Required: []string{"weight", "preference"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeSelectorTerm"}, + } +} + +func schema_k8sio_api_core_v1_Probe(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Probe describes a health check to be performed against a container to determine whether it is alive or ready to receive traffic.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "exec": { + SchemaProps: spec.SchemaProps{ + Description: "One and only one of the following should be specified. Exec specifies the action to take.", + Ref: ref("k8s.io/api/core/v1.ExecAction"), + }, + }, + "httpGet": { + SchemaProps: spec.SchemaProps{ + Description: "HTTPGet specifies the http request to perform.", + Ref: ref("k8s.io/api/core/v1.HTTPGetAction"), + }, + }, + "tcpSocket": { + SchemaProps: spec.SchemaProps{ + Description: "TCPSocket specifies an action involving a TCP port. TCP hooks not yet supported", + Ref: ref("k8s.io/api/core/v1.TCPSocketAction"), + }, + }, + "initialDelaySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Number of seconds after the container has started before liveness probes are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "timeoutSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Number of seconds after which the probe times out. Defaults to 1 second. Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "periodSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "How often (in seconds) to perform the probe. Default to 10 seconds. Minimum value is 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "successThreshold": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum consecutive successes for the probe to be considered successful after having failed. Defaults to 1. Must be 1 for liveness and startup. Minimum value is 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "failureThreshold": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum consecutive failures for the probe to be considered failed after having succeeded. Defaults to 3. Minimum value is 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ExecAction", "k8s.io/api/core/v1.HTTPGetAction", "k8s.io/api/core/v1.TCPSocketAction"}, + } +} + +func schema_k8sio_api_core_v1_ProjectedVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a projected volume source", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "sources": { + SchemaProps: spec.SchemaProps{ + Description: "list of volume projections", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.VolumeProjection"), + }, + }, + }, + }, + }, + "defaultMode": { + SchemaProps: spec.SchemaProps{ + Description: "Mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.VolumeProjection"}, + } +} + +func schema_k8sio_api_core_v1_QuobyteVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Quobyte mount that lasts the lifetime of a pod. Quobyte volumes do not support ownership management or SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "registry": { + SchemaProps: spec.SchemaProps{ + Description: "Registry represents a single or multiple Quobyte Registry services specified as a string as host:port pair (multiple entries are separated with commas) which acts as the central registry for volumes", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "volume": { + SchemaProps: spec.SchemaProps{ + Description: "Volume is a string that references an already created Quobyte volume by name.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the Quobyte volume to be mounted with read-only permissions. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "User to map volume access to Defaults to serivceaccount user", + Type: []string{"string"}, + Format: "", + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group to map volume access to Default is no group", + Type: []string{"string"}, + Format: "", + }, + }, + "tenant": { + SchemaProps: spec.SchemaProps{ + Description: "Tenant owning the given Quobyte volume in the Backend Used with dynamically provisioned Quobyte volumes, value is set by the plugin", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"registry", "volume"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_RBDPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Rados Block Device mount that lasts the lifetime of a pod. RBD volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "monitors": { + SchemaProps: spec.SchemaProps{ + Description: "A collection of Ceph monitors. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "image": { + SchemaProps: spec.SchemaProps{ + Description: "The rados image name. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type of the volume that you want to mount. Tip: Ensure that the filesystem type is supported by the host operating system. Examples: \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified. More info: https://kubernetes.io/docs/concepts/storage/volumes#rbd", + Type: []string{"string"}, + Format: "", + }, + }, + "pool": { + SchemaProps: spec.SchemaProps{ + Description: "The rados pool name. Default is rbd. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "The rados user name. Default is admin. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "keyring": { + SchemaProps: spec.SchemaProps{ + Description: "Keyring is the path to key ring for RBDUser. Default is /etc/ceph/keyring. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "SecretRef is name of the authentication secret for RBDUser. If provided overrides keyring. Default is nil. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the ReadOnly setting in VolumeMounts. Defaults to false. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"monitors", "image"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SecretReference"}, + } +} + +func schema_k8sio_api_core_v1_RBDVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a Rados Block Device mount that lasts the lifetime of a pod. RBD volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "monitors": { + SchemaProps: spec.SchemaProps{ + Description: "A collection of Ceph monitors. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "image": { + SchemaProps: spec.SchemaProps{ + Description: "The rados image name. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type of the volume that you want to mount. Tip: Ensure that the filesystem type is supported by the host operating system. Examples: \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified. More info: https://kubernetes.io/docs/concepts/storage/volumes#rbd", + Type: []string{"string"}, + Format: "", + }, + }, + "pool": { + SchemaProps: spec.SchemaProps{ + Description: "The rados pool name. Default is rbd. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "The rados user name. Default is admin. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "keyring": { + SchemaProps: spec.SchemaProps{ + Description: "Keyring is the path to key ring for RBDUser. Default is /etc/ceph/keyring. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"string"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "SecretRef is name of the authentication secret for RBDUser. If provided overrides keyring. Default is nil. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly here will force the ReadOnly setting in VolumeMounts. Defaults to false. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"monitors", "image"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_RangeAllocation(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RangeAllocation is not a public type.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "range": { + SchemaProps: spec.SchemaProps{ + Description: "Range is string that identifies the range represented by 'data'.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "data": { + SchemaProps: spec.SchemaProps{ + Description: "Data is a bit array containing all allocated addresses in the previous segment.", + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + Required: []string{"range", "data"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_ReplicationController(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicationController represents the configuration of a replication controller.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "If the Labels of a ReplicationController are empty, they are defaulted to be the same as the Pod(s) that the replication controller manages. Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the specification of the desired behavior of the replication controller. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ReplicationControllerSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the most recently observed status of the replication controller. This data may be out of date by some window of time. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ReplicationControllerStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ReplicationControllerSpec", "k8s.io/api/core/v1.ReplicationControllerStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_ReplicationControllerCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicationControllerCondition describes the state of a replication controller at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of replication controller condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "The last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_ReplicationControllerList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicationControllerList is a collection of replication controllers.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of replication controllers. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ReplicationController"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ReplicationController", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_ReplicationControllerSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicationControllerSpec is the specification of a replication controller.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Replicas is the number of desired replicas. This is a pointer to distinguish between explicit zero and unspecified. Defaults to 1. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#what-is-a-replicationcontroller", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum number of seconds for which a newly created pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Selector is a label query over pods that should match the Replicas count. If Selector is empty, it is defaulted to the labels present on the Pod template. Label keys and values that must match in order to be controlled by this replication controller, if empty defaulted to labels on Pod template. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template is the object that describes the pod that will be created if insufficient replicas are detected. This takes precedence over a TemplateRef. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#pod-template", + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplateSpec"}, + } +} + +func schema_k8sio_api_core_v1_ReplicationControllerStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicationControllerStatus represents the current status of a replication controller.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Replicas is the most recently oberved number of replicas. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#what-is-a-replicationcontroller", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "fullyLabeledReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of pods that have labels matching the labels of the pod template of the replication controller.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of ready replicas for this replication controller.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "availableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of available replicas (ready for at least minReadySeconds) for this replication controller.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "ObservedGeneration reflects the generation of the most recently observed replication controller.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a replication controller's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ReplicationControllerCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ReplicationControllerCondition"}, + } +} + +func schema_k8sio_api_core_v1_ResourceFieldSelector(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceFieldSelector represents container resources (cpu, memory) and their output format", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "containerName": { + SchemaProps: spec.SchemaProps{ + Description: "Container name: required for volumes, optional for env vars", + Type: []string{"string"}, + Format: "", + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "Required: resource to select", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "divisor": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the output format of the exposed resources, defaults to \"1\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"resource"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_ResourceQuota(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceQuota sets aggregate quota restrictions enforced per namespace", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the desired quota. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ResourceQuotaSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status defines the actual enforced quota and its current usage. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ResourceQuotaStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ResourceQuotaSpec", "k8s.io/api/core/v1.ResourceQuotaStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_ResourceQuotaList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceQuotaList is a list of ResourceQuota items.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of ResourceQuota objects. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ResourceQuota"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ResourceQuota", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_ResourceQuotaSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceQuotaSpec defines the desired hard limits to enforce for Quota.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "hard": { + SchemaProps: spec.SchemaProps{ + Description: "hard is the set of desired hard limits for each named resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "scopes": { + SchemaProps: spec.SchemaProps{ + Description: "A collection of filters that must match each object tracked by a quota. If not specified, the quota matches all objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "scopeSelector": { + SchemaProps: spec.SchemaProps{ + Description: "scopeSelector is also a collection of filters like scopes that must match each object tracked by a quota but expressed using ScopeSelectorOperator in combination with possible values. For a resource to match, both scopes AND scopeSelector (if specified in spec), must be matched.", + Ref: ref("k8s.io/api/core/v1.ScopeSelector"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ScopeSelector", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_ResourceQuotaStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceQuotaStatus defines the enforced hard limits and observed use.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "hard": { + SchemaProps: spec.SchemaProps{ + Description: "Hard is the set of enforced hard limits for each named resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "used": { + SchemaProps: spec.SchemaProps{ + Description: "Used is the current observed total usage of the resource in the namespace.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_ResourceRequirements(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceRequirements describes the compute resource requirements.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "limits": { + SchemaProps: spec.SchemaProps{ + Description: "Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + "requests": { + SchemaProps: spec.SchemaProps{ + Description: "Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_core_v1_SELinuxOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SELinuxOptions are the labels to be applied to the container", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "user": { + SchemaProps: spec.SchemaProps{ + Description: "User is a SELinux user label that applies to the container.", + Type: []string{"string"}, + Format: "", + }, + }, + "role": { + SchemaProps: spec.SchemaProps{ + Description: "Role is a SELinux role label that applies to the container.", + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type is a SELinux type label that applies to the container.", + Type: []string{"string"}, + Format: "", + }, + }, + "level": { + SchemaProps: spec.SchemaProps{ + Description: "Level is SELinux level label that applies to the container.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ScaleIOPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ScaleIOPersistentVolumeSource represents a persistent ScaleIO volume", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "gateway": { + SchemaProps: spec.SchemaProps{ + Description: "The host address of the ScaleIO API Gateway.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "system": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the storage system as configured in ScaleIO.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "SecretRef references to the secret for ScaleIO user and other sensitive information. If this is not provided, Login operation will fail.", + Ref: ref("k8s.io/api/core/v1.SecretReference"), + }, + }, + "sslEnabled": { + SchemaProps: spec.SchemaProps{ + Description: "Flag to enable/disable SSL communication with Gateway, default false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "protectionDomain": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the ScaleIO Protection Domain for the configured storage.", + Type: []string{"string"}, + Format: "", + }, + }, + "storagePool": { + SchemaProps: spec.SchemaProps{ + Description: "The ScaleIO Storage Pool associated with the protection domain.", + Type: []string{"string"}, + Format: "", + }, + }, + "storageMode": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates whether the storage for a volume should be ThickProvisioned or ThinProvisioned. Default is ThinProvisioned.", + Type: []string{"string"}, + Format: "", + }, + }, + "volumeName": { + SchemaProps: spec.SchemaProps{ + Description: "The name of a volume already created in the ScaleIO system that is associated with this volume source.", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". Default is \"xfs\"", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"gateway", "system", "secretRef"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SecretReference"}, + } +} + +func schema_k8sio_api_core_v1_ScaleIOVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ScaleIOVolumeSource represents a persistent ScaleIO volume", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "gateway": { + SchemaProps: spec.SchemaProps{ + Description: "The host address of the ScaleIO API Gateway.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "system": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the storage system as configured in ScaleIO.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "SecretRef references to the secret for ScaleIO user and other sensitive information. If this is not provided, Login operation will fail.", + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + "sslEnabled": { + SchemaProps: spec.SchemaProps{ + Description: "Flag to enable/disable SSL communication with Gateway, default false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "protectionDomain": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the ScaleIO Protection Domain for the configured storage.", + Type: []string{"string"}, + Format: "", + }, + }, + "storagePool": { + SchemaProps: spec.SchemaProps{ + Description: "The ScaleIO Storage Pool associated with the protection domain.", + Type: []string{"string"}, + Format: "", + }, + }, + "storageMode": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates whether the storage for a volume should be ThickProvisioned or ThinProvisioned. Default is ThinProvisioned.", + Type: []string{"string"}, + Format: "", + }, + }, + "volumeName": { + SchemaProps: spec.SchemaProps{ + Description: "The name of a volume already created in the ScaleIO system that is associated with this volume source.", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". Default is \"xfs\".", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"gateway", "system", "secretRef"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_ScopeSelector(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A scope selector represents the AND of the selectors represented by the scoped-resource selector requirements.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "matchExpressions": { + SchemaProps: spec.SchemaProps{ + Description: "A list of scope selector requirements by scope of the resources.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ScopedResourceSelectorRequirement"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ScopedResourceSelectorRequirement"}, + } +} + +func schema_k8sio_api_core_v1_ScopedResourceSelectorRequirement(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A scoped-resource selector requirement is a selector that contains values, a scope name, and an operator that relates the scope name and values.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "scopeName": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the scope that the selector applies to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "operator": { + SchemaProps: spec.SchemaProps{ + Description: "Represents a scope's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "values": { + SchemaProps: spec.SchemaProps{ + Description: "An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"scopeName", "operator"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_SeccompProfile(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SeccompProfile defines a pod/container's seccomp profile settings. Only one profile source may be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type indicates which kind of seccomp profile will be applied. Valid options are:\n\nLocalhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "localhostProfile": { + SchemaProps: spec.SchemaProps{ + Description: "localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must only be set if type is \"Localhost\".", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type"}, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-unions": []interface{}{ + map[string]interface{}{ + "discriminator": "type", + "fields-to-discriminateBy": map[string]interface{}{ + "localhostProfile": "LocalhostProfile", + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_Secret(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Secret holds secret data of a certain type. The total bytes of the values in the Data field must be less than MaxSecretSize bytes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "immutable": { + SchemaProps: spec.SchemaProps{ + Description: "Immutable, if set to true, ensures that data stored in the Secret cannot be updated (only object metadata can be modified). If not set to true, the field can be modified at any time. Defaulted to nil. This is a beta field enabled by ImmutableEphemeralVolumes feature gate.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "data": { + SchemaProps: spec.SchemaProps{ + Description: "Data contains the secret data. Each key must consist of alphanumeric characters, '-', '_' or '.'. The serialized form of the secret data is a base64 encoded string, representing the arbitrary (possibly non-string) data value here. Described in https://tools.ietf.org/html/rfc4648#section-4", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + "stringData": { + SchemaProps: spec.SchemaProps{ + Description: "stringData allows specifying non-binary secret data in string form. It is provided as a write-only convenience method. All keys and values are merged into the data field on write, overwriting any existing values. It is never output when reading from the API.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Used to facilitate programmatic handling of secret data.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_SecretEnvSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SecretEnvSource selects a Secret to populate the environment variables with.\n\nThe contents of the target Secret's Data field will represent the key-value pairs as environment variables.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + "optional": { + SchemaProps: spec.SchemaProps{ + Description: "Specify whether the Secret must be defined", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_SecretKeySelector(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SecretKeySelector selects a key of a Secret.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + "key": { + SchemaProps: spec.SchemaProps{ + Description: "The key of the secret to select from. Must be a valid secret key.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "optional": { + SchemaProps: spec.SchemaProps{ + Description: "Specify whether the Secret or its key must be defined", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"key"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_SecretList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SecretList is a list of Secret.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of secret objects. More info: https://kubernetes.io/docs/concepts/configuration/secret", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Secret"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Secret", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_SecretProjection(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Adapts a secret into a projected volume.\n\nThe contents of the target Secret's Data field will be presented in a projected volume as files using the keys in the Data field as the file names. Note that this is identical to a secret volume source without the default mode.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Type: []string{"string"}, + Format: "", + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.KeyToPath"), + }, + }, + }, + }, + }, + "optional": { + SchemaProps: spec.SchemaProps{ + Description: "Specify whether the Secret or its key must be defined", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.KeyToPath"}, + } +} + +func schema_k8sio_api_core_v1_SecretReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SecretReference represents a Secret Reference. It has enough information to retrieve secret in any namespace", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is unique within a namespace to reference a secret resource.", + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace defines the space within which the secret name must be unique.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_SecretVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Adapts a Secret into a volume.\n\nThe contents of the target Secret's Data field will be presented in a volume as files using the keys in the Data field as the file names. Secret volumes support ownership management and SELinux relabeling.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "secretName": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the secret in the pod's namespace to use. More info: https://kubernetes.io/docs/concepts/storage/volumes#secret", + Type: []string{"string"}, + Format: "", + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.KeyToPath"), + }, + }, + }, + }, + }, + "defaultMode": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "optional": { + SchemaProps: spec.SchemaProps{ + Description: "Specify whether the Secret or its keys must be defined", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.KeyToPath"}, + } +} + +func schema_k8sio_api_core_v1_SecurityContext(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "capabilities": { + SchemaProps: spec.SchemaProps{ + Description: "The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime.", + Ref: ref("k8s.io/api/core/v1.Capabilities"), + }, + }, + "privileged": { + SchemaProps: spec.SchemaProps{ + Description: "Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "seLinuxOptions": { + SchemaProps: spec.SchemaProps{ + Description: "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.", + Ref: ref("k8s.io/api/core/v1.SELinuxOptions"), + }, + }, + "windowsOptions": { + SchemaProps: spec.SchemaProps{ + Description: "The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.", + Ref: ref("k8s.io/api/core/v1.WindowsSecurityContextOptions"), + }, + }, + "runAsUser": { + SchemaProps: spec.SchemaProps{ + Description: "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "runAsGroup": { + SchemaProps: spec.SchemaProps{ + Description: "The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "runAsNonRoot": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "readOnlyRootFilesystem": { + SchemaProps: spec.SchemaProps{ + Description: "Whether this container has a read-only root filesystem. Default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "allowPrivilegeEscalation": { + SchemaProps: spec.SchemaProps{ + Description: "AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN", + Type: []string{"boolean"}, + Format: "", + }, + }, + "procMount": { + SchemaProps: spec.SchemaProps{ + Description: "procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.", + Type: []string{"string"}, + Format: "", + }, + }, + "seccompProfile": { + SchemaProps: spec.SchemaProps{ + Description: "The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options.", + Ref: ref("k8s.io/api/core/v1.SeccompProfile"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Capabilities", "k8s.io/api/core/v1.SELinuxOptions", "k8s.io/api/core/v1.SeccompProfile", "k8s.io/api/core/v1.WindowsSecurityContextOptions"}, + } +} + +func schema_k8sio_api_core_v1_SerializedReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SerializedReference is a reference to serialized object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "reference": { + SchemaProps: spec.SchemaProps{ + Description: "The reference to an object in the system.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_Service(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Service is a named abstraction of software service (for example, mysql) consisting of local port (for example 3306) that the proxy listens on, and the selector that determines which pods will answer requests sent through the proxy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the behavior of a service. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ServiceSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the service. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ServiceStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ServiceSpec", "k8s.io/api/core/v1.ServiceStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_ServiceAccount(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "secrets": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Secrets is the list of secrets allowed to be used by pods running using this ServiceAccount. More info: https://kubernetes.io/docs/concepts/configuration/secret", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + }, + }, + }, + "imagePullSecrets": { + SchemaProps: spec.SchemaProps{ + Description: "ImagePullSecrets is a list of references to secrets in the same namespace to use for pulling any images in pods that reference this ServiceAccount. ImagePullSecrets are distinct from Secrets because Secrets can be mounted in the pod, but ImagePullSecrets are only accessed by the kubelet. More info: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + }, + }, + }, + "automountServiceAccountToken": { + SchemaProps: spec.SchemaProps{ + Description: "AutomountServiceAccountToken indicates whether pods running as this service account should have an API token automatically mounted. Can be overridden at the pod level.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference", "k8s.io/api/core/v1.ObjectReference", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_core_v1_ServiceAccountList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceAccountList is a list of ServiceAccount objects", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of ServiceAccounts. More info: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ServiceAccount"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ServiceAccount", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_ServiceAccountTokenProjection(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceAccountTokenProjection represents a projected service account token volume. This projection can be used to insert a service account token into the pods runtime filesystem for use against APIs (Kubernetes API Server or otherwise).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "audience": { + SchemaProps: spec.SchemaProps{ + Description: "Audience is the intended audience of the token. A recipient of a token must identify itself with an identifier specified in the audience of the token, and otherwise should reject the token. The audience defaults to the identifier of the apiserver.", + Type: []string{"string"}, + Format: "", + }, + }, + "expirationSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "ExpirationSeconds is the requested duration of validity of the service account token. As the token approaches expiration, the kubelet volume plugin will proactively rotate the service account token. The kubelet will start trying to rotate the token if the token is older than 80 percent of its time to live or if the token is older than 24 hours.Defaults to 1 hour and must be at least 10 minutes.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is the path relative to the mount point of the file to project the token into.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"path"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ServiceList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceList holds a list of services.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of services", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Service"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Service", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_core_v1_ServicePort(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServicePort contains information on service's port.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name of this port within the service. This must be a DNS_LABEL. All ports within a ServiceSpec must have unique names. When considering the endpoints for a Service, this must match the 'name' field in the EndpointPort. Optional if only one ServicePort is defined on this service.", + Type: []string{"string"}, + Format: "", + }, + }, + "protocol": { + SchemaProps: spec.SchemaProps{ + Description: "The IP protocol for this port. Supports \"TCP\", \"UDP\", and \"SCTP\". Default is TCP.", + Default: "TCP", + Type: []string{"string"}, + Format: "", + }, + }, + "appProtocol": { + SchemaProps: spec.SchemaProps{ + Description: "The application protocol for this port. This field follows standard Kubernetes label syntax. Un-prefixed names are reserved for IANA standard service names (as per RFC-6335 and http://www.iana.org/assignments/service-names). Non-standard protocols should use prefixed names such as mycompany.com/my-custom-protocol. This is a beta field that is guarded by the ServiceAppProtocol feature gate and enabled by default.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "The port that will be exposed by this service.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "targetPort": { + SchemaProps: spec.SchemaProps{ + Description: "Number or name of the port to access on the pods targeted by the service. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME. If this is a string, it will be looked up as a named port in the target Pod's container ports. If this is not specified, the value of the 'port' field is used (an identity map). This field is ignored for services with clusterIP=None, and should be omitted or set equal to the 'port' field. More info: https://kubernetes.io/docs/concepts/services-networking/service/#defining-a-service", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "nodePort": { + SchemaProps: spec.SchemaProps{ + Description: "The port on each node on which this service is exposed when type is NodePort or LoadBalancer. Usually assigned by the system. If a value is specified, in-range, and not in use it will be used, otherwise the operation will fail. If not specified, a port will be allocated if this Service requires one. If this field is specified when creating a Service which does not need it, creation will fail. This field will be wiped when updating a Service to no longer need it (e.g. changing type from NodePort to ClusterIP). More info: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"port"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_core_v1_ServiceProxyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceProxyOptions is the query options to a Service's proxy call.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is the part of URLs that include service endpoints, suffixes, and parameters to use for the current proxy request to service. For example, the whole request URL is http://localhost/api/v1/namespaces/kube-system/services/elasticsearch-logging/_search?q=user:kimchy. Path is _search?q=user:kimchy.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_ServiceSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceSpec describes the attributes that a user creates on a service.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ports": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "port", + "protocol", + }, + "x-kubernetes-list-type": "map", + "x-kubernetes-patch-merge-key": "port", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The list of ports that are exposed by this service. More info: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ServicePort"), + }, + }, + }, + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Route service traffic to pods with label keys and values matching this selector. If empty or not present, the service is assumed to have an external process managing its endpoints, which Kubernetes will not modify. Only applies to types ClusterIP, NodePort, and LoadBalancer. Ignored if type is ExternalName. More info: https://kubernetes.io/docs/concepts/services-networking/service/", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "clusterIP": { + SchemaProps: spec.SchemaProps{ + Description: "clusterIP is the IP address of the service and is usually assigned randomly. If an address is specified manually, is in-range (as per system configuration), and is not in use, it will be allocated to the service; otherwise creation of the service will fail. This field may not be changed through updates unless the type field is also being changed to ExternalName (which requires this field to be blank) or the type field is being changed from ExternalName (in which case this field may optionally be specified, as describe above). Valid values are \"None\", empty string (\"\"), or a valid IP address. Setting this to \"None\" makes a \"headless service\" (no virtual IP), which is useful when direct endpoint connections are preferred and proxying is not required. Only applies to types ClusterIP, NodePort, and LoadBalancer. If this field is specified when creating a Service of type ExternalName, creation will fail. This field will be wiped when updating a Service to type ExternalName. More info: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies", + Type: []string{"string"}, + Format: "", + }, + }, + "clusterIPs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "ClusterIPs is a list of IP addresses assigned to this service, and are usually assigned randomly. If an address is specified manually, is in-range (as per system configuration), and is not in use, it will be allocated to the service; otherwise creation of the service will fail. This field may not be changed through updates unless the type field is also being changed to ExternalName (which requires this field to be empty) or the type field is being changed from ExternalName (in which case this field may optionally be specified, as describe above). Valid values are \"None\", empty string (\"\"), or a valid IP address. Setting this to \"None\" makes a \"headless service\" (no virtual IP), which is useful when direct endpoint connections are preferred and proxying is not required. Only applies to types ClusterIP, NodePort, and LoadBalancer. If this field is specified when creating a Service of type ExternalName, creation will fail. This field will be wiped when updating a Service to type ExternalName. If this field is not specified, it will be initialized from the clusterIP field. If this field is specified, clients must ensure that clusterIPs[0] and clusterIP have the same value.\n\nUnless the \"IPv6DualStack\" feature gate is enabled, this field is limited to one value, which must be the same as the clusterIP field. If the feature gate is enabled, this field may hold a maximum of two entries (dual-stack IPs, in either order). These IPs must correspond to the values of the ipFamilies field. Both clusterIPs and ipFamilies are governed by the ipFamilyPolicy field. More info: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type determines how the Service is exposed. Defaults to ClusterIP. Valid options are ExternalName, ClusterIP, NodePort, and LoadBalancer. \"ClusterIP\" allocates a cluster-internal IP address for load-balancing to endpoints. Endpoints are determined by the selector or if that is not specified, by manual construction of an Endpoints object or EndpointSlice objects. If clusterIP is \"None\", no virtual IP is allocated and the endpoints are published as a set of endpoints rather than a virtual IP. \"NodePort\" builds on ClusterIP and allocates a port on every node which routes to the same endpoints as the clusterIP. \"LoadBalancer\" builds on NodePort and creates an external load-balancer (if supported in the current cloud) which routes to the same endpoints as the clusterIP. \"ExternalName\" aliases this service to the specified externalName. Several other fields do not apply to ExternalName services. More info: https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services-service-types", + Type: []string{"string"}, + Format: "", + }, + }, + "externalIPs": { + SchemaProps: spec.SchemaProps{ + Description: "externalIPs is a list of IP addresses for which nodes in the cluster will also accept traffic for this service. These IPs are not managed by Kubernetes. The user is responsible for ensuring that traffic arrives at a node with this IP. A common example is external load-balancers that are not part of the Kubernetes system.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "sessionAffinity": { + SchemaProps: spec.SchemaProps{ + Description: "Supports \"ClientIP\" and \"None\". Used to maintain session affinity. Enable client IP based session affinity. Must be ClientIP or None. Defaults to None. More info: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies", + Type: []string{"string"}, + Format: "", + }, + }, + "loadBalancerIP": { + SchemaProps: spec.SchemaProps{ + Description: "Only applies to Service Type: LoadBalancer LoadBalancer will get created with the IP specified in this field. This feature depends on whether the underlying cloud-provider supports specifying the loadBalancerIP when a load balancer is created. This field will be ignored if the cloud-provider does not support the feature.", + Type: []string{"string"}, + Format: "", + }, + }, + "loadBalancerSourceRanges": { + SchemaProps: spec.SchemaProps{ + Description: "If specified and supported by the platform, this will restrict traffic through the cloud-provider load-balancer will be restricted to the specified client IPs. This field will be ignored if the cloud-provider does not support the feature.\" More info: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "externalName": { + SchemaProps: spec.SchemaProps{ + Description: "externalName is the external reference that discovery mechanisms will return as an alias for this service (e.g. a DNS CNAME record). No proxying will be involved. Must be a lowercase RFC-1123 hostname (https://tools.ietf.org/html/rfc1123) and requires Type to be", + Type: []string{"string"}, + Format: "", + }, + }, + "externalTrafficPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "externalTrafficPolicy denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints. \"Local\" preserves the client source IP and avoids a second hop for LoadBalancer and Nodeport type services, but risks potentially imbalanced traffic spreading. \"Cluster\" obscures the client source IP and may cause a second hop to another node, but should have good overall load-spreading.", + Type: []string{"string"}, + Format: "", + }, + }, + "healthCheckNodePort": { + SchemaProps: spec.SchemaProps{ + Description: "healthCheckNodePort specifies the healthcheck nodePort for the service. This only applies when type is set to LoadBalancer and externalTrafficPolicy is set to Local. If a value is specified, is in-range, and is not in use, it will be used. If not specified, a value will be automatically allocated. External systems (e.g. load-balancers) can use this port to determine if a given node holds endpoints for this service or not. If this field is specified when creating a Service which does not need it, creation will fail. This field will be wiped when updating a Service to no longer need it (e.g. changing type).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "publishNotReadyAddresses": { + SchemaProps: spec.SchemaProps{ + Description: "publishNotReadyAddresses indicates that any agent which deals with endpoints for this Service should disregard any indications of ready/not-ready. The primary use case for setting this field is for a StatefulSet's Headless Service to propagate SRV DNS records for its Pods for the purpose of peer discovery. The Kubernetes controllers that generate Endpoints and EndpointSlice resources for Services interpret this to mean that all endpoints are considered \"ready\" even if the Pods themselves are not. Agents which consume only Kubernetes generated endpoints through the Endpoints or EndpointSlice resources can safely assume this behavior.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "sessionAffinityConfig": { + SchemaProps: spec.SchemaProps{ + Description: "sessionAffinityConfig contains the configurations of session affinity.", + Ref: ref("k8s.io/api/core/v1.SessionAffinityConfig"), + }, + }, + "topologyKeys": { + SchemaProps: spec.SchemaProps{ + Description: "topologyKeys is a preference-order list of topology keys which implementations of services should use to preferentially sort endpoints when accessing this Service, it can not be used at the same time as externalTrafficPolicy=Local. Topology keys must be valid label keys and at most 16 keys may be specified. Endpoints are chosen based on the first topology key with available backends. If this field is specified and all entries have no backends that match the topology of the client, the service has no backends for that client and connections should fail. The special value \"*\" may be used to mean \"any topology\". This catch-all value, if used, only makes sense as the last value in the list. If this is not specified or empty, no topology constraints will be applied. This field is alpha-level and is only honored by servers that enable the ServiceTopology feature.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "ipFamilies": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "IPFamilies is a list of IP families (e.g. IPv4, IPv6) assigned to this service, and is gated by the \"IPv6DualStack\" feature gate. This field is usually assigned automatically based on cluster configuration and the ipFamilyPolicy field. If this field is specified manually, the requested family is available in the cluster, and ipFamilyPolicy allows it, it will be used; otherwise creation of the service will fail. This field is conditionally mutable: it allows for adding or removing a secondary IP family, but it does not allow changing the primary IP family of the Service. Valid values are \"IPv4\" and \"IPv6\". This field only applies to Services of types ClusterIP, NodePort, and LoadBalancer, and does apply to \"headless\" services. This field will be wiped when updating a Service to type ExternalName.\n\nThis field may hold a maximum of two entries (dual-stack families, in either order). These families must correspond to the values of the clusterIPs field, if specified. Both clusterIPs and ipFamilies are governed by the ipFamilyPolicy field.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "ipFamilyPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "IPFamilyPolicy represents the dual-stack-ness requested or required by this Service, and is gated by the \"IPv6DualStack\" feature gate. If there is no value provided, then this field will be set to SingleStack. Services can be \"SingleStack\" (a single IP family), \"PreferDualStack\" (two IP families on dual-stack configured clusters or a single IP family on single-stack clusters), or \"RequireDualStack\" (two IP families on dual-stack configured clusters, otherwise fail). The ipFamilies and clusterIPs fields depend on the value of this field. This field will be wiped when updating a service to type ExternalName.", + Type: []string{"string"}, + Format: "", + }, + }, + "allocateLoadBalancerNodePorts": { + SchemaProps: spec.SchemaProps{ + Description: "allocateLoadBalancerNodePorts defines if NodePorts will be automatically allocated for services with type LoadBalancer. Default is \"true\". It may be set to \"false\" if the cluster load-balancer does not rely on NodePorts. allocateLoadBalancerNodePorts may only be set for services with type LoadBalancer and will be cleared if the type is changed to any other type. This field is alpha-level and is only honored by servers that enable the ServiceLBNodePortControl feature.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ServicePort", "k8s.io/api/core/v1.SessionAffinityConfig"}, + } +} + +func schema_k8sio_api_core_v1_ServiceStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceStatus represents the current status of a service.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "loadBalancer": { + SchemaProps: spec.SchemaProps{ + Description: "LoadBalancer contains the current status of the load-balancer, if one is present.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LoadBalancerStatus"), + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Current service state", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Condition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LoadBalancerStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.Condition"}, + } +} + +func schema_k8sio_api_core_v1_SessionAffinityConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SessionAffinityConfig represents the configurations of session affinity.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "clientIP": { + SchemaProps: spec.SchemaProps{ + Description: "clientIP contains the configurations of Client IP based session affinity.", + Ref: ref("k8s.io/api/core/v1.ClientIPConfig"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ClientIPConfig"}, + } +} + +func schema_k8sio_api_core_v1_StorageOSPersistentVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a StorageOS persistent volume resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumeName": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeName is the human-readable name of the StorageOS volume. Volume names are only unique within a namespace.", + Type: []string{"string"}, + Format: "", + }, + }, + "volumeNamespace": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeNamespace specifies the scope of the volume within StorageOS. If no namespace is specified then the Pod's namespace will be used. This allows the Kubernetes name scoping to be mirrored within StorageOS for tighter integration. Set VolumeName to any name to override the default behaviour. Set to \"default\" if you are not using namespaces within StorageOS. Namespaces that do not pre-exist within StorageOS will be created.", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified.", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "SecretRef specifies the secret to use for obtaining the StorageOS API credentials. If not specified, default values will be attempted.", + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_StorageOSVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a StorageOS persistent volume resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumeName": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeName is the human-readable name of the StorageOS volume. Volume names are only unique within a namespace.", + Type: []string{"string"}, + Format: "", + }, + }, + "volumeNamespace": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeNamespace specifies the scope of the volume within StorageOS. If no namespace is specified then the Pod's namespace will be used. This allows the Kubernetes name scoping to be mirrored within StorageOS for tighter integration. Set VolumeName to any name to override the default behaviour. Set to \"default\" if you are not using namespaces within StorageOS. Namespaces that do not pre-exist within StorageOS will be created.", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified.", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "secretRef": { + SchemaProps: spec.SchemaProps{ + Description: "SecretRef specifies the secret to use for obtaining the StorageOS API credentials. If not specified, default values will be attempted.", + Ref: ref("k8s.io/api/core/v1.LocalObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LocalObjectReference"}, + } +} + +func schema_k8sio_api_core_v1_Sysctl(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Sysctl defines a kernel parameter to be set", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of a property to set", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "Value of a property to set", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "value"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_TCPSocketAction(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TCPSocketAction describes an action based on opening a socket", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "port": { + SchemaProps: spec.SchemaProps{ + Description: "Number or name of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "host": { + SchemaProps: spec.SchemaProps{ + Description: "Optional: Host name to connect to, defaults to the pod IP.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"port"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_core_v1_Taint(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "The node this Taint is attached to has the \"effect\" on any pod that does not tolerate the Taint.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "key": { + SchemaProps: spec.SchemaProps{ + Description: "Required. The taint key to be applied to a node.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "The taint value corresponding to the taint key.", + Type: []string{"string"}, + Format: "", + }, + }, + "effect": { + SchemaProps: spec.SchemaProps{ + Description: "Required. The effect of the taint on pods that do not tolerate the taint. Valid effects are NoSchedule, PreferNoSchedule and NoExecute.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "timeAdded": { + SchemaProps: spec.SchemaProps{ + Description: "TimeAdded represents the time at which the taint was added. It is only written for NoExecute taints.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + }, + Required: []string{"key", "effect"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_core_v1_Toleration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "The pod this Toleration is attached to tolerates any taint that matches the triple using the matching operator .", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "key": { + SchemaProps: spec.SchemaProps{ + Description: "Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys.", + Type: []string{"string"}, + Format: "", + }, + }, + "operator": { + SchemaProps: spec.SchemaProps{ + Description: "Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category.", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string.", + Type: []string{"string"}, + Format: "", + }, + }, + "effect": { + SchemaProps: spec.SchemaProps{ + Description: "Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.", + Type: []string{"string"}, + Format: "", + }, + }, + "tolerationSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_core_v1_TopologySelectorLabelRequirement(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A topology selector requirement is a selector that matches given label. This is an alpha feature and may change in the future.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "key": { + SchemaProps: spec.SchemaProps{ + Description: "The label key that the selector applies to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "values": { + SchemaProps: spec.SchemaProps{ + Description: "An array of string values. One value must match the label to be selected. Each entry in Values is ORed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"key", "values"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_TopologySelectorTerm(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A topology selector term represents the result of label queries. A null or empty topology selector term matches no objects. The requirements of them are ANDed. It provides a subset of functionality as NodeSelectorTerm. This is an alpha feature and may change in the future.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "matchLabelExpressions": { + SchemaProps: spec.SchemaProps{ + Description: "A list of topology selector requirements by labels.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.TopologySelectorLabelRequirement"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TopologySelectorLabelRequirement"}, + } +} + +func schema_k8sio_api_core_v1_TopologySpreadConstraint(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TopologySpreadConstraint specifies how to spread matching pods among the given topology.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxSkew": { + SchemaProps: spec.SchemaProps{ + Description: "MaxSkew describes the degree to which pods may be unevenly distributed. When `whenUnsatisfiable=DoNotSchedule`, it is the maximum permitted difference between the number of matching pods in the target topology and the global minimum. For example, in a 3-zone cluster, MaxSkew is set to 1, and pods with the same labelSelector spread as 1/1/0: | zone1 | zone2 | zone3 | | P | P | | - if MaxSkew is 1, incoming pod can only be scheduled to zone3 to become 1/1/1; scheduling it onto zone1(zone2) would make the ActualSkew(2-0) on zone1(zone2) violate MaxSkew(1). - if MaxSkew is 2, incoming pod can be scheduled onto any zone. When `whenUnsatisfiable=ScheduleAnyway`, it is used to give higher precedence to topologies that satisfy it. It's a required field. Default value is 1 and 0 is not allowed.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "topologyKey": { + SchemaProps: spec.SchemaProps{ + Description: "TopologyKey is the key of node labels. Nodes that have a label with this key and identical values are considered to be in the same topology. We consider each as a \"bucket\", and try to put balanced number of pods into each bucket. It's a required field.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "whenUnsatisfiable": { + SchemaProps: spec.SchemaProps{ + Description: "WhenUnsatisfiable indicates how to deal with a pod if it doesn't satisfy the spread constraint. - DoNotSchedule (default) tells the scheduler not to schedule it. - ScheduleAnyway tells the scheduler to schedule the pod in any location,\n but giving higher precedence to topologies that would help reduce the\n skew.\nA constraint is considered \"Unsatisfiable\" for an incoming pod if and only if every possible node assigment for that pod would violate \"MaxSkew\" on some topology. For example, in a 3-zone cluster, MaxSkew is set to 1, and pods with the same labelSelector spread as 3/1/1: | zone1 | zone2 | zone3 | | P P P | P | P | If WhenUnsatisfiable is set to DoNotSchedule, incoming pod can only be scheduled to zone2(zone3) to become 3/2/1(3/1/2) as ActualSkew(2-1) on zone2(zone3) satisfies MaxSkew(1). In other words, the cluster can still be imbalanced, but scheduler won't make it *more* imbalanced. It's a required field.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "labelSelector": { + SchemaProps: spec.SchemaProps{ + Description: "LabelSelector is used to find matching pods. Pods that match this label selector are counted to determine the number of pods in their corresponding topology domain.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + Required: []string{"maxSkew", "topologyKey", "whenUnsatisfiable"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_core_v1_TypedLocalObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TypedLocalObjectReference contains enough information to let you locate the typed referenced object inside the same namespace.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup is the group for the resource being referenced. If APIGroup is not specified, the specified Kind must be in the core API group. For any other third-party types, APIGroup is required.", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is the type of resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_Volume(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Volume represents a named volume in a pod that may be accessed by any container in the pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Volume's name. Must be a DNS_LABEL and unique within the pod. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "hostPath": { + SchemaProps: spec.SchemaProps{ + Description: "HostPath represents a pre-existing file or directory on the host machine that is directly exposed to the container. This is generally used for system agents or other privileged things that are allowed to see the host machine. Most containers will NOT need this. More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath", + Ref: ref("k8s.io/api/core/v1.HostPathVolumeSource"), + }, + }, + "emptyDir": { + SchemaProps: spec.SchemaProps{ + Description: "EmptyDir represents a temporary directory that shares a pod's lifetime. More info: https://kubernetes.io/docs/concepts/storage/volumes#emptydir", + Ref: ref("k8s.io/api/core/v1.EmptyDirVolumeSource"), + }, + }, + "gcePersistentDisk": { + SchemaProps: spec.SchemaProps{ + Description: "GCEPersistentDisk represents a GCE Disk resource that is attached to a kubelet's host machine and then exposed to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk", + Ref: ref("k8s.io/api/core/v1.GCEPersistentDiskVolumeSource"), + }, + }, + "awsElasticBlockStore": { + SchemaProps: spec.SchemaProps{ + Description: "AWSElasticBlockStore represents an AWS Disk resource that is attached to a kubelet's host machine and then exposed to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes#awselasticblockstore", + Ref: ref("k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource"), + }, + }, + "gitRepo": { + SchemaProps: spec.SchemaProps{ + Description: "GitRepo represents a git repository at a particular revision. DEPRECATED: GitRepo is deprecated. To provision a container with a git repo, mount an EmptyDir into an InitContainer that clones the repo using git, then mount the EmptyDir into the Pod's container.", + Ref: ref("k8s.io/api/core/v1.GitRepoVolumeSource"), + }, + }, + "secret": { + SchemaProps: spec.SchemaProps{ + Description: "Secret represents a secret that should populate this volume. More info: https://kubernetes.io/docs/concepts/storage/volumes#secret", + Ref: ref("k8s.io/api/core/v1.SecretVolumeSource"), + }, + }, + "nfs": { + SchemaProps: spec.SchemaProps{ + Description: "NFS represents an NFS mount on the host that shares a pod's lifetime More info: https://kubernetes.io/docs/concepts/storage/volumes#nfs", + Ref: ref("k8s.io/api/core/v1.NFSVolumeSource"), + }, + }, + "iscsi": { + SchemaProps: spec.SchemaProps{ + Description: "ISCSI represents an ISCSI Disk resource that is attached to a kubelet's host machine and then exposed to the pod. More info: https://examples.k8s.io/volumes/iscsi/README.md", + Ref: ref("k8s.io/api/core/v1.ISCSIVolumeSource"), + }, + }, + "glusterfs": { + SchemaProps: spec.SchemaProps{ + Description: "Glusterfs represents a Glusterfs mount on the host that shares a pod's lifetime. More info: https://examples.k8s.io/volumes/glusterfs/README.md", + Ref: ref("k8s.io/api/core/v1.GlusterfsVolumeSource"), + }, + }, + "persistentVolumeClaim": { + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaimVolumeSource represents a reference to a PersistentVolumeClaim in the same namespace. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistentvolumeclaims", + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaimVolumeSource"), + }, + }, + "rbd": { + SchemaProps: spec.SchemaProps{ + Description: "RBD represents a Rados Block Device mount on the host that shares a pod's lifetime. More info: https://examples.k8s.io/volumes/rbd/README.md", + Ref: ref("k8s.io/api/core/v1.RBDVolumeSource"), + }, + }, + "flexVolume": { + SchemaProps: spec.SchemaProps{ + Description: "FlexVolume represents a generic volume resource that is provisioned/attached using an exec based plugin.", + Ref: ref("k8s.io/api/core/v1.FlexVolumeSource"), + }, + }, + "cinder": { + SchemaProps: spec.SchemaProps{ + Description: "Cinder represents a cinder volume attached and mounted on kubelets host machine. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Ref: ref("k8s.io/api/core/v1.CinderVolumeSource"), + }, + }, + "cephfs": { + SchemaProps: spec.SchemaProps{ + Description: "CephFS represents a Ceph FS mount on the host that shares a pod's lifetime", + Ref: ref("k8s.io/api/core/v1.CephFSVolumeSource"), + }, + }, + "flocker": { + SchemaProps: spec.SchemaProps{ + Description: "Flocker represents a Flocker volume attached to a kubelet's host machine. This depends on the Flocker control service being running", + Ref: ref("k8s.io/api/core/v1.FlockerVolumeSource"), + }, + }, + "downwardAPI": { + SchemaProps: spec.SchemaProps{ + Description: "DownwardAPI represents downward API about the pod that should populate this volume", + Ref: ref("k8s.io/api/core/v1.DownwardAPIVolumeSource"), + }, + }, + "fc": { + SchemaProps: spec.SchemaProps{ + Description: "FC represents a Fibre Channel resource that is attached to a kubelet's host machine and then exposed to the pod.", + Ref: ref("k8s.io/api/core/v1.FCVolumeSource"), + }, + }, + "azureFile": { + SchemaProps: spec.SchemaProps{ + Description: "AzureFile represents an Azure File Service mount on the host and bind mount to the pod.", + Ref: ref("k8s.io/api/core/v1.AzureFileVolumeSource"), + }, + }, + "configMap": { + SchemaProps: spec.SchemaProps{ + Description: "ConfigMap represents a configMap that should populate this volume", + Ref: ref("k8s.io/api/core/v1.ConfigMapVolumeSource"), + }, + }, + "vsphereVolume": { + SchemaProps: spec.SchemaProps{ + Description: "VsphereVolume represents a vSphere volume attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource"), + }, + }, + "quobyte": { + SchemaProps: spec.SchemaProps{ + Description: "Quobyte represents a Quobyte mount on the host that shares a pod's lifetime", + Ref: ref("k8s.io/api/core/v1.QuobyteVolumeSource"), + }, + }, + "azureDisk": { + SchemaProps: spec.SchemaProps{ + Description: "AzureDisk represents an Azure Data Disk mount on the host and bind mount to the pod.", + Ref: ref("k8s.io/api/core/v1.AzureDiskVolumeSource"), + }, + }, + "photonPersistentDisk": { + SchemaProps: spec.SchemaProps{ + Description: "PhotonPersistentDisk represents a PhotonController persistent disk attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource"), + }, + }, + "projected": { + SchemaProps: spec.SchemaProps{ + Description: "Items for all in one resources secrets, configmaps, and downward API", + Ref: ref("k8s.io/api/core/v1.ProjectedVolumeSource"), + }, + }, + "portworxVolume": { + SchemaProps: spec.SchemaProps{ + Description: "PortworxVolume represents a portworx volume attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.PortworxVolumeSource"), + }, + }, + "scaleIO": { + SchemaProps: spec.SchemaProps{ + Description: "ScaleIO represents a ScaleIO persistent volume attached and mounted on Kubernetes nodes.", + Ref: ref("k8s.io/api/core/v1.ScaleIOVolumeSource"), + }, + }, + "storageos": { + SchemaProps: spec.SchemaProps{ + Description: "StorageOS represents a StorageOS volume attached and mounted on Kubernetes nodes.", + Ref: ref("k8s.io/api/core/v1.StorageOSVolumeSource"), + }, + }, + "csi": { + SchemaProps: spec.SchemaProps{ + Description: "CSI (Container Storage Interface) represents ephemeral storage that is handled by certain external CSI drivers (Beta feature).", + Ref: ref("k8s.io/api/core/v1.CSIVolumeSource"), + }, + }, + "ephemeral": { + SchemaProps: spec.SchemaProps{ + Description: "Ephemeral represents a volume that is handled by a cluster storage driver (Alpha feature). The volume's lifecycle is tied to the pod that defines it - it will be created before the pod starts, and deleted when the pod is removed.\n\nUse this if: a) the volume is only needed while the pod runs, b) features of normal volumes like restoring from snapshot or capacity\n tracking are needed,\nc) the storage driver is specified through a storage class, and d) the storage driver supports dynamic volume provisioning through\n a PersistentVolumeClaim (see EphemeralVolumeSource for more\n information on the connection between this volume type\n and PersistentVolumeClaim).\n\nUse PersistentVolumeClaim or one of the vendor-specific APIs for volumes that persist for longer than the lifecycle of an individual pod.\n\nUse CSI for light-weight local ephemeral volumes if the CSI driver is meant to be used that way - see the documentation of the driver for more information.\n\nA pod can use both types of ephemeral volumes and persistent volumes at the same time.", + Ref: ref("k8s.io/api/core/v1.EphemeralVolumeSource"), + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource", "k8s.io/api/core/v1.AzureDiskVolumeSource", "k8s.io/api/core/v1.AzureFileVolumeSource", "k8s.io/api/core/v1.CSIVolumeSource", "k8s.io/api/core/v1.CephFSVolumeSource", "k8s.io/api/core/v1.CinderVolumeSource", "k8s.io/api/core/v1.ConfigMapVolumeSource", "k8s.io/api/core/v1.DownwardAPIVolumeSource", "k8s.io/api/core/v1.EmptyDirVolumeSource", "k8s.io/api/core/v1.EphemeralVolumeSource", "k8s.io/api/core/v1.FCVolumeSource", "k8s.io/api/core/v1.FlexVolumeSource", "k8s.io/api/core/v1.FlockerVolumeSource", "k8s.io/api/core/v1.GCEPersistentDiskVolumeSource", "k8s.io/api/core/v1.GitRepoVolumeSource", "k8s.io/api/core/v1.GlusterfsVolumeSource", "k8s.io/api/core/v1.HostPathVolumeSource", "k8s.io/api/core/v1.ISCSIVolumeSource", "k8s.io/api/core/v1.NFSVolumeSource", "k8s.io/api/core/v1.PersistentVolumeClaimVolumeSource", "k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource", "k8s.io/api/core/v1.PortworxVolumeSource", "k8s.io/api/core/v1.ProjectedVolumeSource", "k8s.io/api/core/v1.QuobyteVolumeSource", "k8s.io/api/core/v1.RBDVolumeSource", "k8s.io/api/core/v1.ScaleIOVolumeSource", "k8s.io/api/core/v1.SecretVolumeSource", "k8s.io/api/core/v1.StorageOSVolumeSource", "k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource"}, + } +} + +func schema_k8sio_api_core_v1_VolumeDevice(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "volumeDevice describes a mapping of a raw block device within a container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name must match the name of a persistentVolumeClaim in the pod", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "devicePath": { + SchemaProps: spec.SchemaProps{ + Description: "devicePath is the path inside of the container that the device will be mapped to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "devicePath"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_VolumeMount(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeMount describes a mounting of a Volume within a container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "This must match the Name of a Volume.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "Mounted read-only if true, read-write otherwise (false or unspecified). Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "mountPath": { + SchemaProps: spec.SchemaProps{ + Description: "Path within the container at which the volume should be mounted. Must not contain ':'.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "subPath": { + SchemaProps: spec.SchemaProps{ + Description: "Path within the volume from which the container's volume should be mounted. Defaults to \"\" (volume's root).", + Type: []string{"string"}, + Format: "", + }, + }, + "mountPropagation": { + SchemaProps: spec.SchemaProps{ + Description: "mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationNone is used. This field is beta in 1.10.", + Type: []string{"string"}, + Format: "", + }, + }, + "subPathExpr": { + SchemaProps: spec.SchemaProps{ + Description: "Expanded path within the volume from which the container's volume should be mounted. Behaves similarly to SubPath but environment variable references $(VAR_NAME) are expanded using the container's environment. Defaults to \"\" (volume's root). SubPathExpr and SubPath are mutually exclusive.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "mountPath"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_VolumeNodeAffinity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeNodeAffinity defines constraints that limit what nodes this volume can be accessed from.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "required": { + SchemaProps: spec.SchemaProps{ + Description: "Required specifies hard node constraints that must be met.", + Ref: ref("k8s.io/api/core/v1.NodeSelector"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeSelector"}, + } +} + +func schema_k8sio_api_core_v1_VolumeProjection(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Projection that may be projected along with other supported volume types", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "secret": { + SchemaProps: spec.SchemaProps{ + Description: "information about the secret data to project", + Ref: ref("k8s.io/api/core/v1.SecretProjection"), + }, + }, + "downwardAPI": { + SchemaProps: spec.SchemaProps{ + Description: "information about the downwardAPI data to project", + Ref: ref("k8s.io/api/core/v1.DownwardAPIProjection"), + }, + }, + "configMap": { + SchemaProps: spec.SchemaProps{ + Description: "information about the configMap data to project", + Ref: ref("k8s.io/api/core/v1.ConfigMapProjection"), + }, + }, + "serviceAccountToken": { + SchemaProps: spec.SchemaProps{ + Description: "information about the serviceAccountToken data to project", + Ref: ref("k8s.io/api/core/v1.ServiceAccountTokenProjection"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ConfigMapProjection", "k8s.io/api/core/v1.DownwardAPIProjection", "k8s.io/api/core/v1.SecretProjection", "k8s.io/api/core/v1.ServiceAccountTokenProjection"}, + } +} + +func schema_k8sio_api_core_v1_VolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents the source of a volume to mount. Only one of its members may be specified.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "hostPath": { + SchemaProps: spec.SchemaProps{ + Description: "HostPath represents a pre-existing file or directory on the host machine that is directly exposed to the container. This is generally used for system agents or other privileged things that are allowed to see the host machine. Most containers will NOT need this. More info: https://kubernetes.io/docs/concepts/storage/volumes#hostpath", + Ref: ref("k8s.io/api/core/v1.HostPathVolumeSource"), + }, + }, + "emptyDir": { + SchemaProps: spec.SchemaProps{ + Description: "EmptyDir represents a temporary directory that shares a pod's lifetime. More info: https://kubernetes.io/docs/concepts/storage/volumes#emptydir", + Ref: ref("k8s.io/api/core/v1.EmptyDirVolumeSource"), + }, + }, + "gcePersistentDisk": { + SchemaProps: spec.SchemaProps{ + Description: "GCEPersistentDisk represents a GCE Disk resource that is attached to a kubelet's host machine and then exposed to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk", + Ref: ref("k8s.io/api/core/v1.GCEPersistentDiskVolumeSource"), + }, + }, + "awsElasticBlockStore": { + SchemaProps: spec.SchemaProps{ + Description: "AWSElasticBlockStore represents an AWS Disk resource that is attached to a kubelet's host machine and then exposed to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes#awselasticblockstore", + Ref: ref("k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource"), + }, + }, + "gitRepo": { + SchemaProps: spec.SchemaProps{ + Description: "GitRepo represents a git repository at a particular revision. DEPRECATED: GitRepo is deprecated. To provision a container with a git repo, mount an EmptyDir into an InitContainer that clones the repo using git, then mount the EmptyDir into the Pod's container.", + Ref: ref("k8s.io/api/core/v1.GitRepoVolumeSource"), + }, + }, + "secret": { + SchemaProps: spec.SchemaProps{ + Description: "Secret represents a secret that should populate this volume. More info: https://kubernetes.io/docs/concepts/storage/volumes#secret", + Ref: ref("k8s.io/api/core/v1.SecretVolumeSource"), + }, + }, + "nfs": { + SchemaProps: spec.SchemaProps{ + Description: "NFS represents an NFS mount on the host that shares a pod's lifetime More info: https://kubernetes.io/docs/concepts/storage/volumes#nfs", + Ref: ref("k8s.io/api/core/v1.NFSVolumeSource"), + }, + }, + "iscsi": { + SchemaProps: spec.SchemaProps{ + Description: "ISCSI represents an ISCSI Disk resource that is attached to a kubelet's host machine and then exposed to the pod. More info: https://examples.k8s.io/volumes/iscsi/README.md", + Ref: ref("k8s.io/api/core/v1.ISCSIVolumeSource"), + }, + }, + "glusterfs": { + SchemaProps: spec.SchemaProps{ + Description: "Glusterfs represents a Glusterfs mount on the host that shares a pod's lifetime. More info: https://examples.k8s.io/volumes/glusterfs/README.md", + Ref: ref("k8s.io/api/core/v1.GlusterfsVolumeSource"), + }, + }, + "persistentVolumeClaim": { + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeClaimVolumeSource represents a reference to a PersistentVolumeClaim in the same namespace. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistentvolumeclaims", + Ref: ref("k8s.io/api/core/v1.PersistentVolumeClaimVolumeSource"), + }, + }, + "rbd": { + SchemaProps: spec.SchemaProps{ + Description: "RBD represents a Rados Block Device mount on the host that shares a pod's lifetime. More info: https://examples.k8s.io/volumes/rbd/README.md", + Ref: ref("k8s.io/api/core/v1.RBDVolumeSource"), + }, + }, + "flexVolume": { + SchemaProps: spec.SchemaProps{ + Description: "FlexVolume represents a generic volume resource that is provisioned/attached using an exec based plugin.", + Ref: ref("k8s.io/api/core/v1.FlexVolumeSource"), + }, + }, + "cinder": { + SchemaProps: spec.SchemaProps{ + Description: "Cinder represents a cinder volume attached and mounted on kubelets host machine. More info: https://examples.k8s.io/mysql-cinder-pd/README.md", + Ref: ref("k8s.io/api/core/v1.CinderVolumeSource"), + }, + }, + "cephfs": { + SchemaProps: spec.SchemaProps{ + Description: "CephFS represents a Ceph FS mount on the host that shares a pod's lifetime", + Ref: ref("k8s.io/api/core/v1.CephFSVolumeSource"), + }, + }, + "flocker": { + SchemaProps: spec.SchemaProps{ + Description: "Flocker represents a Flocker volume attached to a kubelet's host machine. This depends on the Flocker control service being running", + Ref: ref("k8s.io/api/core/v1.FlockerVolumeSource"), + }, + }, + "downwardAPI": { + SchemaProps: spec.SchemaProps{ + Description: "DownwardAPI represents downward API about the pod that should populate this volume", + Ref: ref("k8s.io/api/core/v1.DownwardAPIVolumeSource"), + }, + }, + "fc": { + SchemaProps: spec.SchemaProps{ + Description: "FC represents a Fibre Channel resource that is attached to a kubelet's host machine and then exposed to the pod.", + Ref: ref("k8s.io/api/core/v1.FCVolumeSource"), + }, + }, + "azureFile": { + SchemaProps: spec.SchemaProps{ + Description: "AzureFile represents an Azure File Service mount on the host and bind mount to the pod.", + Ref: ref("k8s.io/api/core/v1.AzureFileVolumeSource"), + }, + }, + "configMap": { + SchemaProps: spec.SchemaProps{ + Description: "ConfigMap represents a configMap that should populate this volume", + Ref: ref("k8s.io/api/core/v1.ConfigMapVolumeSource"), + }, + }, + "vsphereVolume": { + SchemaProps: spec.SchemaProps{ + Description: "VsphereVolume represents a vSphere volume attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource"), + }, + }, + "quobyte": { + SchemaProps: spec.SchemaProps{ + Description: "Quobyte represents a Quobyte mount on the host that shares a pod's lifetime", + Ref: ref("k8s.io/api/core/v1.QuobyteVolumeSource"), + }, + }, + "azureDisk": { + SchemaProps: spec.SchemaProps{ + Description: "AzureDisk represents an Azure Data Disk mount on the host and bind mount to the pod.", + Ref: ref("k8s.io/api/core/v1.AzureDiskVolumeSource"), + }, + }, + "photonPersistentDisk": { + SchemaProps: spec.SchemaProps{ + Description: "PhotonPersistentDisk represents a PhotonController persistent disk attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource"), + }, + }, + "projected": { + SchemaProps: spec.SchemaProps{ + Description: "Items for all in one resources secrets, configmaps, and downward API", + Ref: ref("k8s.io/api/core/v1.ProjectedVolumeSource"), + }, + }, + "portworxVolume": { + SchemaProps: spec.SchemaProps{ + Description: "PortworxVolume represents a portworx volume attached and mounted on kubelets host machine", + Ref: ref("k8s.io/api/core/v1.PortworxVolumeSource"), + }, + }, + "scaleIO": { + SchemaProps: spec.SchemaProps{ + Description: "ScaleIO represents a ScaleIO persistent volume attached and mounted on Kubernetes nodes.", + Ref: ref("k8s.io/api/core/v1.ScaleIOVolumeSource"), + }, + }, + "storageos": { + SchemaProps: spec.SchemaProps{ + Description: "StorageOS represents a StorageOS volume attached and mounted on Kubernetes nodes.", + Ref: ref("k8s.io/api/core/v1.StorageOSVolumeSource"), + }, + }, + "csi": { + SchemaProps: spec.SchemaProps{ + Description: "CSI (Container Storage Interface) represents ephemeral storage that is handled by certain external CSI drivers (Beta feature).", + Ref: ref("k8s.io/api/core/v1.CSIVolumeSource"), + }, + }, + "ephemeral": { + SchemaProps: spec.SchemaProps{ + Description: "Ephemeral represents a volume that is handled by a cluster storage driver (Alpha feature). The volume's lifecycle is tied to the pod that defines it - it will be created before the pod starts, and deleted when the pod is removed.\n\nUse this if: a) the volume is only needed while the pod runs, b) features of normal volumes like restoring from snapshot or capacity\n tracking are needed,\nc) the storage driver is specified through a storage class, and d) the storage driver supports dynamic volume provisioning through\n a PersistentVolumeClaim (see EphemeralVolumeSource for more\n information on the connection between this volume type\n and PersistentVolumeClaim).\n\nUse PersistentVolumeClaim or one of the vendor-specific APIs for volumes that persist for longer than the lifecycle of an individual pod.\n\nUse CSI for light-weight local ephemeral volumes if the CSI driver is meant to be used that way - see the documentation of the driver for more information.\n\nA pod can use both types of ephemeral volumes and persistent volumes at the same time.", + Ref: ref("k8s.io/api/core/v1.EphemeralVolumeSource"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource", "k8s.io/api/core/v1.AzureDiskVolumeSource", "k8s.io/api/core/v1.AzureFileVolumeSource", "k8s.io/api/core/v1.CSIVolumeSource", "k8s.io/api/core/v1.CephFSVolumeSource", "k8s.io/api/core/v1.CinderVolumeSource", "k8s.io/api/core/v1.ConfigMapVolumeSource", "k8s.io/api/core/v1.DownwardAPIVolumeSource", "k8s.io/api/core/v1.EmptyDirVolumeSource", "k8s.io/api/core/v1.EphemeralVolumeSource", "k8s.io/api/core/v1.FCVolumeSource", "k8s.io/api/core/v1.FlexVolumeSource", "k8s.io/api/core/v1.FlockerVolumeSource", "k8s.io/api/core/v1.GCEPersistentDiskVolumeSource", "k8s.io/api/core/v1.GitRepoVolumeSource", "k8s.io/api/core/v1.GlusterfsVolumeSource", "k8s.io/api/core/v1.HostPathVolumeSource", "k8s.io/api/core/v1.ISCSIVolumeSource", "k8s.io/api/core/v1.NFSVolumeSource", "k8s.io/api/core/v1.PersistentVolumeClaimVolumeSource", "k8s.io/api/core/v1.PhotonPersistentDiskVolumeSource", "k8s.io/api/core/v1.PortworxVolumeSource", "k8s.io/api/core/v1.ProjectedVolumeSource", "k8s.io/api/core/v1.QuobyteVolumeSource", "k8s.io/api/core/v1.RBDVolumeSource", "k8s.io/api/core/v1.ScaleIOVolumeSource", "k8s.io/api/core/v1.SecretVolumeSource", "k8s.io/api/core/v1.StorageOSVolumeSource", "k8s.io/api/core/v1.VsphereVirtualDiskVolumeSource"}, + } +} + +func schema_k8sio_api_core_v1_VsphereVirtualDiskVolumeSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Represents a vSphere volume resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "volumePath": { + SchemaProps: spec.SchemaProps{ + Description: "Path that identifies vSphere volume vmdk", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "fsType": { + SchemaProps: spec.SchemaProps{ + Description: "Filesystem type to mount. Must be a filesystem type supported by the host operating system. Ex. \"ext4\", \"xfs\", \"ntfs\". Implicitly inferred to be \"ext4\" if unspecified.", + Type: []string{"string"}, + Format: "", + }, + }, + "storagePolicyName": { + SchemaProps: spec.SchemaProps{ + Description: "Storage Policy Based Management (SPBM) profile name.", + Type: []string{"string"}, + Format: "", + }, + }, + "storagePolicyID": { + SchemaProps: spec.SchemaProps{ + Description: "Storage Policy Based Management (SPBM) profile ID associated with the StoragePolicyName.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"volumePath"}, + }, + }, + } +} + +func schema_k8sio_api_core_v1_WeightedPodAffinityTerm(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s)", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "weight": { + SchemaProps: spec.SchemaProps{ + Description: "weight associated with matching the corresponding podAffinityTerm, in the range 1-100.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "podAffinityTerm": { + SchemaProps: spec.SchemaProps{ + Description: "Required. A pod affinity term, associated with the corresponding weight.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodAffinityTerm"), + }, + }, + }, + Required: []string{"weight", "podAffinityTerm"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodAffinityTerm"}, + } +} + +func schema_k8sio_api_core_v1_WindowsSecurityContextOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "WindowsSecurityContextOptions contain Windows-specific options and credentials.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "gmsaCredentialSpecName": { + SchemaProps: spec.SchemaProps{ + Description: "GMSACredentialSpecName is the name of the GMSA credential spec to use.", + Type: []string{"string"}, + Format: "", + }, + }, + "gmsaCredentialSpec": { + SchemaProps: spec.SchemaProps{ + Description: "GMSACredentialSpec is where the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the GMSA credential spec named by the GMSACredentialSpecName field.", + Type: []string{"string"}, + Format: "", + }, + }, + "runAsUserName": { + SchemaProps: spec.SchemaProps{ + Description: "The UserName in Windows to run the entrypoint of the container process. Defaults to the user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_discovery_v1alpha1_Endpoint(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Endpoint represents a single logical \"backend\" implementing a service.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "addresses": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "addresses of this endpoint. The contents of this field are interpreted according to the corresponding EndpointSlice addressType field. Consumers must handle different types of addresses in the context of their own capabilities. This must contain at least one address but no more than 100.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "conditions": { + SchemaProps: spec.SchemaProps{ + Description: "conditions contains information about the current status of the endpoint.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/discovery/v1alpha1.EndpointConditions"), + }, + }, + "hostname": { + SchemaProps: spec.SchemaProps{ + Description: "hostname of this endpoint. This field may be used by consumers of endpoints to distinguish endpoints from each other (e.g. in DNS names). Multiple endpoints which use the same hostname should be considered fungible (e.g. multiple A values in DNS). Must be lowercase and pass DNS label (RFC 1123) validation.", + Type: []string{"string"}, + Format: "", + }, + }, + "targetRef": { + SchemaProps: spec.SchemaProps{ + Description: "targetRef is a reference to a Kubernetes object that represents this endpoint.", + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "topology": { + SchemaProps: spec.SchemaProps{ + Description: "topology contains arbitrary topology information associated with the endpoint. These key/value pairs must conform with the label format. https://kubernetes.io/docs/concepts/overview/working-with-objects/labels Topology may include a maximum of 16 key/value pairs. This includes, but is not limited to the following well known keys: * kubernetes.io/hostname: the value indicates the hostname of the node\n where the endpoint is located. This should match the corresponding\n node label.\n* topology.kubernetes.io/zone: the value indicates the zone where the\n endpoint is located. This should match the corresponding node label.\n* topology.kubernetes.io/region: the value indicates the region where the\n endpoint is located. This should match the corresponding node label.\nThis field is deprecated and will be removed in future api versions.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nodeName": { + SchemaProps: spec.SchemaProps{ + Description: "nodeName represents the name of the Node hosting this endpoint. This can be used to determine endpoints local to a Node. This field can be enabled with the EndpointSliceNodeName feature gate.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"addresses"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference", "k8s.io/api/discovery/v1alpha1.EndpointConditions"}, + } +} + +func schema_k8sio_api_discovery_v1alpha1_EndpointConditions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointConditions represents the current condition of an endpoint.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ready": { + SchemaProps: spec.SchemaProps{ + Description: "ready indicates that this endpoint is prepared to receive traffic, according to whatever system is managing the endpoint. A nil value indicates an unknown state. In most cases consumers should interpret this unknown state as ready. For compatibility reasons, ready should never be \"true\" for terminating endpoints.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "serving": { + SchemaProps: spec.SchemaProps{ + Description: "serving is identical to ready except that it is set regardless of the terminating state of endpoints. This condition should be set to true for a ready endpoint that is terminating. If nil, consumers should defer to the ready condition. This field can be enabled with the EndpointSliceTerminatingCondition feature gate.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "terminating": { + SchemaProps: spec.SchemaProps{ + Description: "terminating indicates that this endpoint is terminating. A nil value indicates an unknown state. Consumers should interpret this unknown state to mean that the endpoint is not terminating. This field can be enabled with the EndpointSliceTerminatingCondition feature gate.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_discovery_v1alpha1_EndpointPort(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointPort represents a Port used by an EndpointSlice", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name of this port. All ports in an EndpointSlice must have a unique name. If the EndpointSlice is dervied from a Kubernetes service, this corresponds to the Service.ports[].name. Name must either be an empty string or pass DNS_LABEL validation: * must be no more than 63 characters long. * must consist of lower case alphanumeric characters or '-'. * must start and end with an alphanumeric character. Default is empty string.", + Type: []string{"string"}, + Format: "", + }, + }, + "protocol": { + SchemaProps: spec.SchemaProps{ + Description: "The IP protocol for this port. Must be UDP, TCP, or SCTP. Default is TCP.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "The port number of the endpoint. If this is not specified, ports are not restricted and must be interpreted in the context of the specific consumer.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "appProtocol": { + SchemaProps: spec.SchemaProps{ + Description: "The application protocol for this port. This field follows standard Kubernetes label syntax. Un-prefixed names are reserved for IANA standard service names (as per RFC-6335 and http://www.iana.org/assignments/service-names). Non-standard protocols should use prefixed names. Default is empty string.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_discovery_v1alpha1_EndpointSlice(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointSlice represents a subset of the endpoints that implement a service. For a given service there may be multiple EndpointSlice objects, selected by labels, which must be joined to produce the full set of endpoints.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "addressType": { + SchemaProps: spec.SchemaProps{ + Description: "addressType specifies the type of address carried by this EndpointSlice. All addresses in this slice must be the same type. This field is immutable after creation. The following address types are currently supported: * IPv4: Represents an IPv4 Address. * IPv6: Represents an IPv6 Address. * FQDN: Represents a Fully Qualified Domain Name.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "endpoints": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "endpoints is a list of unique endpoints in this slice. Each slice may include a maximum of 1000 endpoints.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/discovery/v1alpha1.Endpoint"), + }, + }, + }, + }, + }, + "ports": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "ports specifies the list of network ports exposed by each endpoint in this slice. Each port must have a unique name. When ports is empty, it indicates that there are no defined ports. When a port is defined with a nil port value, it indicates \"all ports\". Each slice may include a maximum of 100 ports.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/discovery/v1alpha1.EndpointPort"), + }, + }, + }, + }, + }, + }, + Required: []string{"addressType", "endpoints"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/discovery/v1alpha1.Endpoint", "k8s.io/api/discovery/v1alpha1.EndpointPort", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_discovery_v1alpha1_EndpointSliceList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointSliceList represents a list of endpoint slices", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of endpoint slices", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/discovery/v1alpha1.EndpointSlice"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/discovery/v1alpha1.EndpointSlice", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_discovery_v1beta1_Endpoint(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Endpoint represents a single logical \"backend\" implementing a service.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "addresses": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "addresses of this endpoint. The contents of this field are interpreted according to the corresponding EndpointSlice addressType field. Consumers must handle different types of addresses in the context of their own capabilities. This must contain at least one address but no more than 100.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "conditions": { + SchemaProps: spec.SchemaProps{ + Description: "conditions contains information about the current status of the endpoint.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/discovery/v1beta1.EndpointConditions"), + }, + }, + "hostname": { + SchemaProps: spec.SchemaProps{ + Description: "hostname of this endpoint. This field may be used by consumers of endpoints to distinguish endpoints from each other (e.g. in DNS names). Multiple endpoints which use the same hostname should be considered fungible (e.g. multiple A values in DNS). Must be lowercase and pass DNS Label (RFC 1123) validation.", + Type: []string{"string"}, + Format: "", + }, + }, + "targetRef": { + SchemaProps: spec.SchemaProps{ + Description: "targetRef is a reference to a Kubernetes object that represents this endpoint.", + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "topology": { + SchemaProps: spec.SchemaProps{ + Description: "topology contains arbitrary topology information associated with the endpoint. These key/value pairs must conform with the label format. https://kubernetes.io/docs/concepts/overview/working-with-objects/labels Topology may include a maximum of 16 key/value pairs. This includes, but is not limited to the following well known keys: * kubernetes.io/hostname: the value indicates the hostname of the node\n where the endpoint is located. This should match the corresponding\n node label.\n* topology.kubernetes.io/zone: the value indicates the zone where the\n endpoint is located. This should match the corresponding node label.\n* topology.kubernetes.io/region: the value indicates the region where the\n endpoint is located. This should match the corresponding node label.\nThis field is deprecated and will be removed in future api versions.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nodeName": { + SchemaProps: spec.SchemaProps{ + Description: "nodeName represents the name of the Node hosting this endpoint. This can be used to determine endpoints local to a Node. This field can be enabled with the EndpointSliceNodeName feature gate.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"addresses"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference", "k8s.io/api/discovery/v1beta1.EndpointConditions"}, + } +} + +func schema_k8sio_api_discovery_v1beta1_EndpointConditions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointConditions represents the current condition of an endpoint.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ready": { + SchemaProps: spec.SchemaProps{ + Description: "ready indicates that this endpoint is prepared to receive traffic, according to whatever system is managing the endpoint. A nil value indicates an unknown state. In most cases consumers should interpret this unknown state as ready. For compatibility reasons, ready should never be \"true\" for terminating endpoints.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "serving": { + SchemaProps: spec.SchemaProps{ + Description: "serving is identical to ready except that it is set regardless of the terminating state of endpoints. This condition should be set to true for a ready endpoint that is terminating. If nil, consumers should defer to the ready condition. This field can be enabled with the EndpointSliceTerminatingCondition feature gate.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "terminating": { + SchemaProps: spec.SchemaProps{ + Description: "terminating indicates that this endpoint is terminating. A nil value indicates an unknown state. Consumers should interpret this unknown state to mean that the endpoint is not terminating. This field can be enabled with the EndpointSliceTerminatingCondition feature gate.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_discovery_v1beta1_EndpointPort(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointPort represents a Port used by an EndpointSlice", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name of this port. All ports in an EndpointSlice must have a unique name. If the EndpointSlice is dervied from a Kubernetes service, this corresponds to the Service.ports[].name. Name must either be an empty string or pass DNS_LABEL validation: * must be no more than 63 characters long. * must consist of lower case alphanumeric characters or '-'. * must start and end with an alphanumeric character. Default is empty string.", + Type: []string{"string"}, + Format: "", + }, + }, + "protocol": { + SchemaProps: spec.SchemaProps{ + Description: "The IP protocol for this port. Must be UDP, TCP, or SCTP. Default is TCP.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "The port number of the endpoint. If this is not specified, ports are not restricted and must be interpreted in the context of the specific consumer.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "appProtocol": { + SchemaProps: spec.SchemaProps{ + Description: "The application protocol for this port. This field follows standard Kubernetes label syntax. Un-prefixed names are reserved for IANA standard service names (as per RFC-6335 and http://www.iana.org/assignments/service-names). Non-standard protocols should use prefixed names such as mycompany.com/my-custom-protocol.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_discovery_v1beta1_EndpointSlice(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointSlice represents a subset of the endpoints that implement a service. For a given service there may be multiple EndpointSlice objects, selected by labels, which must be joined to produce the full set of endpoints.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "addressType": { + SchemaProps: spec.SchemaProps{ + Description: "addressType specifies the type of address carried by this EndpointSlice. All addresses in this slice must be the same type. This field is immutable after creation. The following address types are currently supported: * IPv4: Represents an IPv4 Address. * IPv6: Represents an IPv6 Address. * FQDN: Represents a Fully Qualified Domain Name.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "endpoints": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "endpoints is a list of unique endpoints in this slice. Each slice may include a maximum of 1000 endpoints.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/discovery/v1beta1.Endpoint"), + }, + }, + }, + }, + }, + "ports": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "ports specifies the list of network ports exposed by each endpoint in this slice. Each port must have a unique name. When ports is empty, it indicates that there are no defined ports. When a port is defined with a nil port value, it indicates \"all ports\". Each slice may include a maximum of 100 ports.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/discovery/v1beta1.EndpointPort"), + }, + }, + }, + }, + }, + }, + Required: []string{"addressType", "endpoints"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/discovery/v1beta1.Endpoint", "k8s.io/api/discovery/v1beta1.EndpointPort", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_discovery_v1beta1_EndpointSliceList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointSliceList represents a list of endpoint slices", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of endpoint slices", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/discovery/v1beta1.EndpointSlice"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/discovery/v1beta1.EndpointSlice", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_events_v1_Event(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "eventTime": { + SchemaProps: spec.SchemaProps{ + Description: "eventTime is the time when this Event was first observed. It is required.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "series": { + SchemaProps: spec.SchemaProps{ + Description: "series is data about the Event series this event represents or nil if it's a singleton Event.", + Ref: ref("k8s.io/api/events/v1.EventSeries"), + }, + }, + "reportingController": { + SchemaProps: spec.SchemaProps{ + Description: "reportingController is the name of the controller that emitted this Event, e.g. `kubernetes.io/kubelet`. This field cannot be empty for new Events.", + Type: []string{"string"}, + Format: "", + }, + }, + "reportingInstance": { + SchemaProps: spec.SchemaProps{ + Description: "reportingInstance is the ID of the controller instance, e.g. `kubelet-xyzf`. This field cannot be empty for new Events and it can have at most 128 characters.", + Type: []string{"string"}, + Format: "", + }, + }, + "action": { + SchemaProps: spec.SchemaProps{ + Description: "action is what action was taken/failed regarding to the regarding object. It is machine-readable. This field cannot be empty for new Events and it can have at most 128 characters.", + Type: []string{"string"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason is why the action was taken. It is human-readable. This field cannot be empty for new Events and it can have at most 128 characters.", + Type: []string{"string"}, + Format: "", + }, + }, + "regarding": { + SchemaProps: spec.SchemaProps{ + Description: "regarding contains the object this Event is about. In most cases it's an Object reporting controller implements, e.g. ReplicaSetController implements ReplicaSets and this event is emitted because it acts on some changes in a ReplicaSet object.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "related": { + SchemaProps: spec.SchemaProps{ + Description: "related is the optional secondary object for more complex actions. E.g. when regarding object triggers a creation or deletion of related object.", + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "note": { + SchemaProps: spec.SchemaProps{ + Description: "note is a human-readable description of the status of this operation. Maximal length of the note is 1kB, but libraries should be prepared to handle values up to 64kB.", + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of this event (Normal, Warning), new types could be added in the future. It is machine-readable. This field cannot be empty for new Events.", + Type: []string{"string"}, + Format: "", + }, + }, + "deprecatedSource": { + SchemaProps: spec.SchemaProps{ + Description: "deprecatedSource is the deprecated field assuring backward compatibility with core.v1 Event type.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EventSource"), + }, + }, + "deprecatedFirstTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "deprecatedFirstTimestamp is the deprecated field assuring backward compatibility with core.v1 Event type.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "deprecatedLastTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "deprecatedLastTimestamp is the deprecated field assuring backward compatibility with core.v1 Event type.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "deprecatedCount": { + SchemaProps: spec.SchemaProps{ + Description: "deprecatedCount is the deprecated field assuring backward compatibility with core.v1 Event type.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"metadata", "eventTime"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.EventSource", "k8s.io/api/core/v1.ObjectReference", "k8s.io/api/events/v1.EventSeries", "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_events_v1_EventList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventList is a list of Event objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/events/v1.Event"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/events/v1.Event", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_events_v1_EventSeries(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventSeries contain information on series of events, i.e. thing that was/is happening continuously for some time. How often to update the EventSeries is up to the event reporters. The default event reporter in \"k8s.io/client-go/tools/events/event_broadcaster.go\" shows how this struct is updated on heartbeats and can guide customized reporter implementations.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "count": { + SchemaProps: spec.SchemaProps{ + Description: "count is the number of occurrences in this series up to the last heartbeat time.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "lastObservedTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastObservedTime is the time when last Event from the series was seen before last heartbeat.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + }, + Required: []string{"count", "lastObservedTime"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"}, + } +} + +func schema_k8sio_api_events_v1beta1_Event(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "eventTime": { + SchemaProps: spec.SchemaProps{ + Description: "eventTime is the time when this Event was first observed. It is required.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "series": { + SchemaProps: spec.SchemaProps{ + Description: "series is data about the Event series this event represents or nil if it's a singleton Event.", + Ref: ref("k8s.io/api/events/v1beta1.EventSeries"), + }, + }, + "reportingController": { + SchemaProps: spec.SchemaProps{ + Description: "reportingController is the name of the controller that emitted this Event, e.g. `kubernetes.io/kubelet`. This field cannot be empty for new Events.", + Type: []string{"string"}, + Format: "", + }, + }, + "reportingInstance": { + SchemaProps: spec.SchemaProps{ + Description: "reportingInstance is the ID of the controller instance, e.g. `kubelet-xyzf`. This field cannot be empty for new Events and it can have at most 128 characters.", + Type: []string{"string"}, + Format: "", + }, + }, + "action": { + SchemaProps: spec.SchemaProps{ + Description: "action is what action was taken/failed regarding to the regarding object. It is machine-readable. This field can have at most 128 characters.", + Type: []string{"string"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason is why the action was taken. It is human-readable. This field can have at most 128 characters.", + Type: []string{"string"}, + Format: "", + }, + }, + "regarding": { + SchemaProps: spec.SchemaProps{ + Description: "regarding contains the object this Event is about. In most cases it's an Object reporting controller implements, e.g. ReplicaSetController implements ReplicaSets and this event is emitted because it acts on some changes in a ReplicaSet object.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "related": { + SchemaProps: spec.SchemaProps{ + Description: "related is the optional secondary object for more complex actions. E.g. when regarding object triggers a creation or deletion of related object.", + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "note": { + SchemaProps: spec.SchemaProps{ + Description: "note is a human-readable description of the status of this operation. Maximal length of the note is 1kB, but libraries should be prepared to handle values up to 64kB.", + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of this event (Normal, Warning), new types could be added in the future. It is machine-readable.", + Type: []string{"string"}, + Format: "", + }, + }, + "deprecatedSource": { + SchemaProps: spec.SchemaProps{ + Description: "deprecatedSource is the deprecated field assuring backward compatibility with core.v1 Event type.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.EventSource"), + }, + }, + "deprecatedFirstTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "deprecatedFirstTimestamp is the deprecated field assuring backward compatibility with core.v1 Event type.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "deprecatedLastTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "deprecatedLastTimestamp is the deprecated field assuring backward compatibility with core.v1 Event type.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "deprecatedCount": { + SchemaProps: spec.SchemaProps{ + Description: "deprecatedCount is the deprecated field assuring backward compatibility with core.v1 Event type.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"metadata", "eventTime"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.EventSource", "k8s.io/api/core/v1.ObjectReference", "k8s.io/api/events/v1beta1.EventSeries", "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_events_v1beta1_EventList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventList is a list of Event objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/events/v1beta1.Event"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/events/v1beta1.Event", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_events_v1beta1_EventSeries(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventSeries contain information on series of events, i.e. thing that was/is happening continuously for some time.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "count": { + SchemaProps: spec.SchemaProps{ + Description: "count is the number of occurrences in this series up to the last heartbeat time.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "lastObservedTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastObservedTime is the time when last Event from the series was seen before last heartbeat.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + }, + Required: []string{"count", "lastObservedTime"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_AllowedCSIDriver(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AllowedCSIDriver represents a single inline CSI Driver that is allowed to be used.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the registered name of the CSI driver", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_AllowedFlexVolume(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AllowedFlexVolume represents a single Flexvolume that is allowed to be used. Deprecated: use AllowedFlexVolume from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "driver": { + SchemaProps: spec.SchemaProps{ + Description: "driver is the name of the Flexvolume driver.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"driver"}, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_AllowedHostPath(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AllowedHostPath defines the host volume conditions that will be enabled by a policy for pods to use. It requires the path prefix to be defined. Deprecated: use AllowedHostPath from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "pathPrefix": { + SchemaProps: spec.SchemaProps{ + Description: "pathPrefix is the path prefix that the host volume must match. It does not support `*`. Trailing slashes are trimmed when validating the path prefix with a host path.\n\nExamples: `/foo` would allow `/foo`, `/foo/` and `/foo/bar` `/foo` would not allow `/food` or `/etc/foo`", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "when set to true, will allow host volumes matching the pathPrefix only if all volume mounts are readOnly.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_DaemonSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for more information. DaemonSet represents the configuration of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "The desired behavior of this daemon set. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DaemonSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "The current status of this daemon set. This data may be out of date by some window of time. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DaemonSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.DaemonSetSpec", "k8s.io/api/extensions/v1beta1.DaemonSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DaemonSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetCondition describes the state of a DaemonSet at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of DaemonSet condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DaemonSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetList is a collection of daemon sets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "A list of daemon sets.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DaemonSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.DaemonSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DaemonSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetSpec is the specification of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "A label query over pods that are managed by the daemon set. Must match in order to be controlled. If empty, defaulted to labels on Pod template. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "An object that describes the pod that will be created. The DaemonSet will create exactly one copy of this pod on every node that matches the template's node selector (or on every node if no node selector is specified). More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#pod-template", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "updateStrategy": { + SchemaProps: spec.SchemaProps{ + Description: "An update strategy to replace existing DaemonSet pods with new pods.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DaemonSetUpdateStrategy"), + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "The minimum number of seconds for which a newly created DaemonSet pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "templateGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED. A sequence number representing a specific generation of the template. Populated by the system. It can be set only during the creation.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of old history to retain to allow rollback. This is a pointer to distinguish between explicit zero and not specified. Defaults to 10.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"template"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/api/extensions/v1beta1.DaemonSetUpdateStrategy", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DaemonSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetStatus represents the current status of a daemon set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "currentNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that are running at least 1 daemon pod and are supposed to run the daemon pod. More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberMisscheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that are running the daemon pod, but are not supposed to run the daemon pod. More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "desiredNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The total number of nodes that should be running the daemon pod (including nodes correctly running the daemon pod). More info: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberReady": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have one or more of the daemon pod running and ready.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "The most recent generation observed by the daemon set controller.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "updatedNumberScheduled": { + SchemaProps: spec.SchemaProps{ + Description: "The total number of nodes that are running updated daemon pod", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberAvailable": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have one or more of the daemon pod running and available (ready for at least spec.minReadySeconds)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "numberUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The number of nodes that should be running the daemon pod and have none of the daemon pod running and available (ready for at least spec.minReadySeconds)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "Count of hash collisions for the DaemonSet. The DaemonSet controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ControllerRevision.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a DaemonSet's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DaemonSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"currentNumberScheduled", "numberMisscheduled", "desiredNumberScheduled", "numberReady"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.DaemonSetCondition"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DaemonSetUpdateStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of daemon set update. Can be \"RollingUpdate\" or \"OnDelete\". Default is OnDelete.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "Rolling update config params. Present only if type = \"RollingUpdate\".", + Ref: ref("k8s.io/api/extensions/v1beta1.RollingUpdateDaemonSet"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.RollingUpdateDaemonSet"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_Deployment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of Deployment is deprecated by apps/v1beta2/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the Deployment.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DeploymentSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the Deployment.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DeploymentStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.DeploymentSpec", "k8s.io/api/extensions/v1beta1.DeploymentStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DeploymentCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentCondition describes the state of a deployment at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of deployment condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastUpdateTime": { + SchemaProps: spec.SchemaProps{ + Description: "The last time this condition was updated.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DeploymentList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentList is a list of Deployments.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of Deployments.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.Deployment"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.Deployment", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DeploymentRollback(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED. DeploymentRollback stores the information required to rollback a deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Required: This must match the Name of a deployment.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "updatedAnnotations": { + SchemaProps: spec.SchemaProps{ + Description: "The annotations to be updated to a deployment", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "rollbackTo": { + SchemaProps: spec.SchemaProps{ + Description: "The config of this deployment rollback.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.RollbackConfig"), + }, + }, + }, + Required: []string{"name", "rollbackTo"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.RollbackConfig"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DeploymentSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentSpec is the specification of the desired behavior of the Deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Number of desired pods. This is a pointer to distinguish between explicit zero and not specified. Defaults to 1.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Label selector for pods. Existing ReplicaSets whose pods are selected by this will be the ones affected by this deployment.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template describes the pods that will be created.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + "strategy": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-strategy": "retainKeys", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The deployment strategy to use to replace existing pods with new ones.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DeploymentStrategy"), + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum number of seconds for which a newly created pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "revisionHistoryLimit": { + SchemaProps: spec.SchemaProps{ + Description: "The number of old ReplicaSets to retain to allow rollback. This is a pointer to distinguish between explicit zero and not specified. This is set to the max value of int32 (i.e. 2147483647) by default, which means \"retaining all old ReplicaSets\".", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "paused": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates that the deployment is paused and will not be processed by the deployment controller.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "rollbackTo": { + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED. The config this deployment is rolling back to. Will be cleared after rollback is done.", + Ref: ref("k8s.io/api/extensions/v1beta1.RollbackConfig"), + }, + }, + "progressDeadlineSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum time in seconds for a deployment to make progress before it is considered to be failed. The deployment controller will continue to process failed deployments and a condition with a ProgressDeadlineExceeded reason will be surfaced in the deployment status. Note that progress will not be estimated during the time a deployment is paused. This is set to the max value of int32 (i.e. 2147483647) by default, which means \"no deadline\".", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"template"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/api/extensions/v1beta1.DeploymentStrategy", "k8s.io/api/extensions/v1beta1.RollbackConfig", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DeploymentStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentStatus is the most recently observed status of the Deployment.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "The generation observed by the deployment controller.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of non-terminated pods targeted by this deployment (their labels match the selector).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "updatedReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of non-terminated pods targeted by this deployment that have the desired template spec.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of ready pods targeted by this deployment.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "availableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of available pods (ready for at least minReadySeconds) targeted by this deployment.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "unavailableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "Total number of unavailable pods targeted by this deployment. This is the total number of pods that are still required for the deployment to have 100% available capacity. They may either be pods that are running but not yet available or pods that still have not been created.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a deployment's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.DeploymentCondition"), + }, + }, + }, + }, + }, + "collisionCount": { + SchemaProps: spec.SchemaProps{ + Description: "Count of hash collisions for the Deployment. The Deployment controller uses this field as a collision avoidance mechanism when it needs to create the name for the newest ReplicaSet.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.DeploymentCondition"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_DeploymentStrategy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentStrategy describes how to replace existing pods with new ones.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of deployment. Can be \"Recreate\" or \"RollingUpdate\". Default is RollingUpdate.", + Type: []string{"string"}, + Format: "", + }, + }, + "rollingUpdate": { + SchemaProps: spec.SchemaProps{ + Description: "Rolling update config params. Present only if DeploymentStrategyType = RollingUpdate.", + Ref: ref("k8s.io/api/extensions/v1beta1.RollingUpdateDeployment"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.RollingUpdateDeployment"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_FSGroupStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FSGroupStrategyOptions defines the strategy type and options used to create the strategy. Deprecated: use FSGroupStrategyOptions from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate what FSGroup is used in the SecurityContext.", + Type: []string{"string"}, + Format: "", + }, + }, + "ranges": { + SchemaProps: spec.SchemaProps{ + Description: "ranges are the allowed ranges of fs groups. If you would like to force a single fs group then supply a single range with the same start and end. Required for MustRunAs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IDRange"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.IDRange"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_HTTPIngressPath(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HTTPIngressPath associates a path with a backend. Incoming urls matching the path are forwarded to the backend.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is matched against the path of an incoming request. Currently it can contain characters disallowed from the conventional \"path\" part of a URL as defined by RFC 3986. Paths must begin with a '/'. When unspecified, all paths from incoming requests are matched.", + Type: []string{"string"}, + Format: "", + }, + }, + "pathType": { + SchemaProps: spec.SchemaProps{ + Description: "PathType determines the interpretation of the Path matching. PathType can be one of the following values: * Exact: Matches the URL path exactly. * Prefix: Matches based on a URL path prefix split by '/'. Matching is\n done on a path element by element basis. A path element refers is the\n list of labels in the path split by the '/' separator. A request is a\n match for path p if every p is an element-wise prefix of p of the\n request path. Note that if the last element of the path is a substring\n of the last element in request path, it is not a match (e.g. /foo/bar\n matches /foo/bar/baz, but does not match /foo/barbaz).\n* ImplementationSpecific: Interpretation of the Path matching is up to\n the IngressClass. Implementations can treat this as a separate PathType\n or treat it identically to Prefix or Exact path types.\nImplementations are required to support all path types. Defaults to ImplementationSpecific.", + Type: []string{"string"}, + Format: "", + }, + }, + "backend": { + SchemaProps: spec.SchemaProps{ + Description: "Backend defines the referenced service endpoint to which the traffic will be forwarded to.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IngressBackend"), + }, + }, + }, + Required: []string{"backend"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.IngressBackend"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_HTTPIngressRuleValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HTTPIngressRuleValue is a list of http selectors pointing to backends. In the example: http:///? -> backend where where parts of the url correspond to RFC 3986, this resource will be used to match against everything after the last '/' and before the first '?' or '#'.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "paths": { + SchemaProps: spec.SchemaProps{ + Description: "A collection of paths that map requests to backends.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.HTTPIngressPath"), + }, + }, + }, + }, + }, + }, + Required: []string{"paths"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.HTTPIngressPath"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_HostPortRange(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HostPortRange defines a range of host ports that will be enabled by a policy for pods to use. It requires both the start and end to be defined. Deprecated: use HostPortRange from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "min": { + SchemaProps: spec.SchemaProps{ + Description: "min is the start of the range, inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "max": { + SchemaProps: spec.SchemaProps{ + Description: "max is the end of the range, inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"min", "max"}, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_IDRange(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IDRange provides a min/max of an allowed range of IDs. Deprecated: use IDRange from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "min": { + SchemaProps: spec.SchemaProps{ + Description: "min is the start of the range, inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + "max": { + SchemaProps: spec.SchemaProps{ + Description: "max is the end of the range, inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"min", "max"}, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_IPBlock(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED 1.9 - This group version of IPBlock is deprecated by networking/v1/IPBlock. IPBlock describes a particular CIDR (Ex. \"192.168.1.1/24\",\"2001:db9::/64\") that is allowed to the pods matched by a NetworkPolicySpec's podSelector. The except entry describes CIDRs that should not be included within this rule.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "cidr": { + SchemaProps: spec.SchemaProps{ + Description: "CIDR is a string representing the IP Block Valid examples are \"192.168.1.1/24\" or \"2001:db9::/64\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "except": { + SchemaProps: spec.SchemaProps{ + Description: "Except is a slice of CIDRs that should not be included within an IP Block Valid examples are \"192.168.1.1/24\" or \"2001:db9::/64\" Except values will be rejected if they are outside the CIDR range", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"cidr"}, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_Ingress(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Ingress is a collection of rules that allow inbound connections to reach the endpoints defined by a backend. An Ingress can be configured to give services externally-reachable urls, load balance traffic, terminate SSL, offer name based virtual hosting etc. DEPRECATED - This group version of Ingress is deprecated by networking.k8s.io/v1beta1 Ingress. See the release notes for more information.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec is the desired state of the Ingress. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IngressSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the current state of the Ingress. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IngressStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.IngressSpec", "k8s.io/api/extensions/v1beta1.IngressStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_IngressBackend(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressBackend describes all endpoints for a given service and port.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "serviceName": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the name of the referenced service.", + Type: []string{"string"}, + Format: "", + }, + }, + "servicePort": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the port of the referenced service.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "Resource is an ObjectRef to another Kubernetes resource in the namespace of the Ingress object. If resource is specified, serviceName and servicePort must not be specified.", + Ref: ref("k8s.io/api/core/v1.TypedLocalObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TypedLocalObjectReference", "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_IngressList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressList is a collection of Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of Ingress.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.Ingress"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.Ingress", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_IngressRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressRule represents the rules mapping the paths under a specified host to the related backend services. Incoming requests are first evaluated for a host match, then routed to the backend associated with the matching IngressRuleValue.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "host": { + SchemaProps: spec.SchemaProps{ + Description: "Host is the fully qualified domain name of a network host, as defined by RFC 3986. Note the following deviations from the \"host\" part of the URI as defined in RFC 3986: 1. IPs are not allowed. Currently an IngressRuleValue can only apply to\n the IP in the Spec of the parent Ingress.\n2. The `:` delimiter is not respected because ports are not allowed.\n\t Currently the port of an Ingress is implicitly :80 for http and\n\t :443 for https.\nBoth these may change in the future. Incoming requests are matched against the host before the IngressRuleValue. If the host is unspecified, the Ingress routes all traffic based on the specified IngressRuleValue.\n\nHost can be \"precise\" which is a domain name without the terminating dot of a network host (e.g. \"foo.bar.com\") or \"wildcard\", which is a domain name prefixed with a single wildcard label (e.g. \"*.foo.com\"). The wildcard character '*' must appear by itself as the first DNS label and matches only a single label. You cannot have a wildcard label by itself (e.g. Host == \"*\"). Requests will be matched against the Host field in the following way: 1. If Host is precise, the request matches this rule if the http host header is equal to Host. 2. If Host is a wildcard, then the request matches this rule if the http host header is to equal to the suffix (removing the first label) of the wildcard rule.", + Type: []string{"string"}, + Format: "", + }, + }, + "http": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/extensions/v1beta1.HTTPIngressRuleValue"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.HTTPIngressRuleValue"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_IngressRuleValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressRuleValue represents a rule to apply against incoming requests. If the rule is satisfied, the request is routed to the specified backend. Currently mixing different types of rules in a single Ingress is disallowed, so exactly one of the following must be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "http": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/extensions/v1beta1.HTTPIngressRuleValue"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.HTTPIngressRuleValue"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_IngressSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressSpec describes the Ingress the user wishes to exist.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ingressClassName": { + SchemaProps: spec.SchemaProps{ + Description: "IngressClassName is the name of the IngressClass cluster resource. The associated IngressClass defines which controller will implement the resource. This replaces the deprecated `kubernetes.io/ingress.class` annotation. For backwards compatibility, when that annotation is set, it must be given precedence over this field. The controller may emit a warning if the field and annotation have different values. Implementations of this API should ignore Ingresses without a class specified. An IngressClass resource may be marked as default, which can be used to set a default value for this field. For more information, refer to the IngressClass documentation.", + Type: []string{"string"}, + Format: "", + }, + }, + "backend": { + SchemaProps: spec.SchemaProps{ + Description: "A default backend capable of servicing requests that don't match any rule. At least one of 'backend' or 'rules' must be specified. This field is optional to allow the loadbalancer controller or defaulting logic to specify a global default.", + Ref: ref("k8s.io/api/extensions/v1beta1.IngressBackend"), + }, + }, + "tls": { + SchemaProps: spec.SchemaProps{ + Description: "TLS configuration. Currently the Ingress only supports a single TLS port, 443. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension, if the ingress controller fulfilling the ingress supports SNI.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IngressTLS"), + }, + }, + }, + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "A list of host rules used to configure the Ingress. If unspecified, or no rule matches, all traffic is sent to the default backend.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IngressRule"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.IngressBackend", "k8s.io/api/extensions/v1beta1.IngressRule", "k8s.io/api/extensions/v1beta1.IngressTLS"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_IngressStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressStatus describe the current state of the Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "loadBalancer": { + SchemaProps: spec.SchemaProps{ + Description: "LoadBalancer contains the current status of the load-balancer.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LoadBalancerStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LoadBalancerStatus"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_IngressTLS(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressTLS describes the transport layer security associated with an Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "hosts": { + SchemaProps: spec.SchemaProps{ + Description: "Hosts are a list of hosts included in the TLS certificate. The values in this list must match the name/s used in the tlsSecret. Defaults to the wildcard host setting for the loadbalancer controller fulfilling this Ingress, if left unspecified.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "secretName": { + SchemaProps: spec.SchemaProps{ + Description: "SecretName is the name of the secret used to terminate SSL traffic on 443. Field is left optional to allow SSL routing based on SNI hostname alone. If the SNI host in a listener conflicts with the \"Host\" header field used by an IngressRule, the SNI host is used for termination and value of the Host header is used for routing.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_NetworkPolicy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED 1.9 - This group version of NetworkPolicy is deprecated by networking/v1/NetworkPolicy. NetworkPolicy describes what network traffic is allowed for a set of Pods", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior for this NetworkPolicy.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.NetworkPolicySpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.NetworkPolicySpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_NetworkPolicyEgressRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED 1.9 - This group version of NetworkPolicyEgressRule is deprecated by networking/v1/NetworkPolicyEgressRule. NetworkPolicyEgressRule describes a particular set of traffic that is allowed out of pods matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and to. This type is beta-level in 1.8", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ports": { + SchemaProps: spec.SchemaProps{ + Description: "List of destination ports for outgoing traffic. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.NetworkPolicyPort"), + }, + }, + }, + }, + }, + "to": { + SchemaProps: spec.SchemaProps{ + Description: "List of destinations for outgoing traffic of pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all destinations (traffic not restricted by destination). If this field is present and contains at least one item, this rule allows traffic only if the traffic matches at least one item in the to list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.NetworkPolicyPeer"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.NetworkPolicyPeer", "k8s.io/api/extensions/v1beta1.NetworkPolicyPort"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_NetworkPolicyIngressRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED 1.9 - This group version of NetworkPolicyIngressRule is deprecated by networking/v1/NetworkPolicyIngressRule. This NetworkPolicyIngressRule matches traffic if and only if the traffic matches both ports AND from.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ports": { + SchemaProps: spec.SchemaProps{ + Description: "List of ports which should be made accessible on the pods selected for this rule. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.NetworkPolicyPort"), + }, + }, + }, + }, + }, + "from": { + SchemaProps: spec.SchemaProps{ + Description: "List of sources which should be able to access the pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all sources (traffic not restricted by source). If this field is present and contains at least one item, this rule allows traffic only if the traffic matches at least one item in the from list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.NetworkPolicyPeer"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.NetworkPolicyPeer", "k8s.io/api/extensions/v1beta1.NetworkPolicyPort"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_NetworkPolicyList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED 1.9 - This group version of NetworkPolicyList is deprecated by networking/v1/NetworkPolicyList. Network Policy List is a list of NetworkPolicy objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.NetworkPolicy"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.NetworkPolicy", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_NetworkPolicyPeer(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED 1.9 - This group version of NetworkPolicyPeer is deprecated by networking/v1/NetworkPolicyPeer.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podSelector": { + SchemaProps: spec.SchemaProps{ + Description: "This is a label selector which selects Pods. This field follows standard label selector semantics; if present but empty, it selects all pods.\n\nIf NamespaceSelector is also set, then the NetworkPolicyPeer as a whole selects the Pods matching PodSelector in the Namespaces selected by NamespaceSelector. Otherwise it selects the Pods matching PodSelector in the policy's own Namespace.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "namespaceSelector": { + SchemaProps: spec.SchemaProps{ + Description: "Selects Namespaces using cluster-scoped labels. This field follows standard label selector semantics; if present but empty, it selects all namespaces.\n\nIf PodSelector is also set, then the NetworkPolicyPeer as a whole selects the Pods matching PodSelector in the Namespaces selected by NamespaceSelector. Otherwise it selects all Pods in the Namespaces selected by NamespaceSelector.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "ipBlock": { + SchemaProps: spec.SchemaProps{ + Description: "IPBlock defines policy on a particular IPBlock. If this field is set then neither of the other fields can be.", + Ref: ref("k8s.io/api/extensions/v1beta1.IPBlock"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.IPBlock", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_NetworkPolicyPort(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED 1.9 - This group version of NetworkPolicyPort is deprecated by networking/v1/NetworkPolicyPort.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "protocol": { + SchemaProps: spec.SchemaProps{ + Description: "Optional. The protocol (TCP, UDP, or SCTP) which traffic must match. If not specified, this field defaults to TCP.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the port on the given protocol. This can either be a numerical or named port on a pod. If this field is not provided, this matches all port names and numbers. If present, only traffic on the specified protocol AND port will be matched.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_NetworkPolicySpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED 1.9 - This group version of NetworkPolicySpec is deprecated by networking/v1/NetworkPolicySpec.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podSelector": { + SchemaProps: spec.SchemaProps{ + Description: "Selects the pods to which this NetworkPolicy object applies. The array of ingress rules is applied to any pods selected by this field. Multiple network policies can select the same set of pods. In this case, the ingress rules for each are combined additively. This field is NOT optional and follows standard label selector semantics. An empty podSelector matches all pods in this namespace.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "ingress": { + SchemaProps: spec.SchemaProps{ + Description: "List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod OR if the traffic source is the pod's local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not allow any traffic (and serves solely to ensure that the pods it selects are isolated by default).", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.NetworkPolicyIngressRule"), + }, + }, + }, + }, + }, + "egress": { + SchemaProps: spec.SchemaProps{ + Description: "List of egress rules to be applied to the selected pods. Outgoing traffic is allowed if there are no NetworkPolicies selecting the pod (and cluster policy otherwise allows the traffic), OR if the traffic matches at least one egress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy limits all outgoing traffic (and serves solely to ensure that the pods it selects are isolated by default). This field is beta-level in 1.8", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.NetworkPolicyEgressRule"), + }, + }, + }, + }, + }, + "policyTypes": { + SchemaProps: spec.SchemaProps{ + Description: "List of rule types that the NetworkPolicy relates to. Valid options are \"Ingress\", \"Egress\", or \"Ingress,Egress\". If this field is not specified, it will default based on the existence of Ingress or Egress rules; policies that contain an Egress section are assumed to affect Egress, and all policies (whether or not they contain an Ingress section) are assumed to affect Ingress. If you want to write an egress-only policy, you must explicitly specify policyTypes [ \"Egress\" ]. Likewise, if you want to write a policy that specifies that no egress is allowed, you must specify a policyTypes value that include \"Egress\" (since such a policy would not include an Egress section and would otherwise default to just [ \"Ingress\" ]). This field is beta-level in 1.8", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"podSelector"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.NetworkPolicyEgressRule", "k8s.io/api/extensions/v1beta1.NetworkPolicyIngressRule", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_PodSecurityPolicy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodSecurityPolicy governs the ability to make requests that affect the Security Context that will be applied to a pod and container. Deprecated: use PodSecurityPolicy from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec defines the policy enforced.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.PodSecurityPolicySpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.PodSecurityPolicySpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_PodSecurityPolicyList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodSecurityPolicyList is a list of PodSecurityPolicy objects. Deprecated: use PodSecurityPolicyList from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.PodSecurityPolicy"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.PodSecurityPolicy", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_PodSecurityPolicySpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodSecurityPolicySpec defines the policy enforced. Deprecated: use PodSecurityPolicySpec from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "privileged": { + SchemaProps: spec.SchemaProps{ + Description: "privileged determines if a pod can request to be run as privileged.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "defaultAddCapabilities": { + SchemaProps: spec.SchemaProps{ + Description: "defaultAddCapabilities is the default set of capabilities that will be added to the container unless the pod spec specifically drops the capability. You may not list a capability in both defaultAddCapabilities and requiredDropCapabilities. Capabilities added here are implicitly allowed, and need not be included in the allowedCapabilities list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "requiredDropCapabilities": { + SchemaProps: spec.SchemaProps{ + Description: "requiredDropCapabilities are the capabilities that will be dropped from the container. These are required to be dropped and cannot be added.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allowedCapabilities": { + SchemaProps: spec.SchemaProps{ + Description: "allowedCapabilities is a list of capabilities that can be requested to add to the container. Capabilities in this field may be added at the pod author's discretion. You must not list a capability in both allowedCapabilities and requiredDropCapabilities.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "volumes": { + SchemaProps: spec.SchemaProps{ + Description: "volumes is an allowlist of volume plugins. Empty indicates that no volumes may be used. To allow all volumes you may use '*'.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "hostNetwork": { + SchemaProps: spec.SchemaProps{ + Description: "hostNetwork determines if the policy allows the use of HostNetwork in the pod spec.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "hostPorts": { + SchemaProps: spec.SchemaProps{ + Description: "hostPorts determines which host port ranges are allowed to be exposed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.HostPortRange"), + }, + }, + }, + }, + }, + "hostPID": { + SchemaProps: spec.SchemaProps{ + Description: "hostPID determines if the policy allows the use of HostPID in the pod spec.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "hostIPC": { + SchemaProps: spec.SchemaProps{ + Description: "hostIPC determines if the policy allows the use of HostIPC in the pod spec.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "seLinux": { + SchemaProps: spec.SchemaProps{ + Description: "seLinux is the strategy that will dictate the allowable labels that may be set.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.SELinuxStrategyOptions"), + }, + }, + "runAsUser": { + SchemaProps: spec.SchemaProps{ + Description: "runAsUser is the strategy that will dictate the allowable RunAsUser values that may be set.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.RunAsUserStrategyOptions"), + }, + }, + "runAsGroup": { + SchemaProps: spec.SchemaProps{ + Description: "RunAsGroup is the strategy that will dictate the allowable RunAsGroup values that may be set. If this field is omitted, the pod's RunAsGroup can take any value. This field requires the RunAsGroup feature gate to be enabled.", + Ref: ref("k8s.io/api/extensions/v1beta1.RunAsGroupStrategyOptions"), + }, + }, + "supplementalGroups": { + SchemaProps: spec.SchemaProps{ + Description: "supplementalGroups is the strategy that will dictate what supplemental groups are used by the SecurityContext.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.SupplementalGroupsStrategyOptions"), + }, + }, + "fsGroup": { + SchemaProps: spec.SchemaProps{ + Description: "fsGroup is the strategy that will dictate what fs group is used by the SecurityContext.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.FSGroupStrategyOptions"), + }, + }, + "readOnlyRootFilesystem": { + SchemaProps: spec.SchemaProps{ + Description: "readOnlyRootFilesystem when set to true will force containers to run with a read only root file system. If the container specifically requests to run with a non-read only root file system the PSP should deny the pod. If set to false the container may run with a read only root file system if it wishes but it will not be forced to.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "defaultAllowPrivilegeEscalation": { + SchemaProps: spec.SchemaProps{ + Description: "defaultAllowPrivilegeEscalation controls the default setting for whether a process can gain more privileges than its parent process.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "allowPrivilegeEscalation": { + SchemaProps: spec.SchemaProps{ + Description: "allowPrivilegeEscalation determines if a pod can request to allow privilege escalation. If unspecified, defaults to true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "allowedHostPaths": { + SchemaProps: spec.SchemaProps{ + Description: "allowedHostPaths is an allowlist of host paths. Empty indicates that all host paths may be used.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.AllowedHostPath"), + }, + }, + }, + }, + }, + "allowedFlexVolumes": { + SchemaProps: spec.SchemaProps{ + Description: "allowedFlexVolumes is an allowlist of Flexvolumes. Empty or nil indicates that all Flexvolumes may be used. This parameter is effective only when the usage of the Flexvolumes is allowed in the \"volumes\" field.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.AllowedFlexVolume"), + }, + }, + }, + }, + }, + "allowedCSIDrivers": { + SchemaProps: spec.SchemaProps{ + Description: "AllowedCSIDrivers is an allowlist of inline CSI drivers that must be explicitly set to be embedded within a pod spec. An empty value indicates that any CSI driver can be used for inline ephemeral volumes.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.AllowedCSIDriver"), + }, + }, + }, + }, + }, + "allowedUnsafeSysctls": { + SchemaProps: spec.SchemaProps{ + Description: "allowedUnsafeSysctls is a list of explicitly allowed unsafe sysctls, defaults to none. Each entry is either a plain sysctl name or ends in \"*\" in which case it is considered as a prefix of allowed sysctls. Single * means all unsafe sysctls are allowed. Kubelet has to allowlist all unsafe sysctls explicitly to avoid rejection.\n\nExamples: e.g. \"foo/*\" allows \"foo/bar\", \"foo/baz\", etc. e.g. \"foo.*\" allows \"foo.bar\", \"foo.baz\", etc.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "forbiddenSysctls": { + SchemaProps: spec.SchemaProps{ + Description: "forbiddenSysctls is a list of explicitly forbidden sysctls, defaults to none. Each entry is either a plain sysctl name or ends in \"*\" in which case it is considered as a prefix of forbidden sysctls. Single * means all sysctls are forbidden.\n\nExamples: e.g. \"foo/*\" forbids \"foo/bar\", \"foo/baz\", etc. e.g. \"foo.*\" forbids \"foo.bar\", \"foo.baz\", etc.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allowedProcMountTypes": { + SchemaProps: spec.SchemaProps{ + Description: "AllowedProcMountTypes is an allowlist of allowed ProcMountTypes. Empty or nil indicates that only the DefaultProcMountType may be used. This requires the ProcMountType feature flag to be enabled.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "runtimeClass": { + SchemaProps: spec.SchemaProps{ + Description: "runtimeClass is the strategy that will dictate the allowable RuntimeClasses for a pod. If this field is omitted, the pod's runtimeClassName field is unrestricted. Enforcement of this field depends on the RuntimeClass feature gate being enabled.", + Ref: ref("k8s.io/api/extensions/v1beta1.RuntimeClassStrategyOptions"), + }, + }, + }, + Required: []string{"seLinux", "runAsUser", "supplementalGroups", "fsGroup"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.AllowedCSIDriver", "k8s.io/api/extensions/v1beta1.AllowedFlexVolume", "k8s.io/api/extensions/v1beta1.AllowedHostPath", "k8s.io/api/extensions/v1beta1.FSGroupStrategyOptions", "k8s.io/api/extensions/v1beta1.HostPortRange", "k8s.io/api/extensions/v1beta1.RunAsGroupStrategyOptions", "k8s.io/api/extensions/v1beta1.RunAsUserStrategyOptions", "k8s.io/api/extensions/v1beta1.RuntimeClassStrategyOptions", "k8s.io/api/extensions/v1beta1.SELinuxStrategyOptions", "k8s.io/api/extensions/v1beta1.SupplementalGroupsStrategyOptions"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_ReplicaSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for more information. ReplicaSet ensures that a specified number of pod replicas are running at any given time.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "If the Labels of a ReplicaSet are empty, they are defaulted to be the same as the Pod(s) that the ReplicaSet manages. Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec defines the specification of the desired behavior of the ReplicaSet. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.ReplicaSetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the most recently observed status of the ReplicaSet. This data may be out of date by some window of time. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.ReplicaSetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.ReplicaSetSpec", "k8s.io/api/extensions/v1beta1.ReplicaSetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_ReplicaSetCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetCondition describes the state of a replica set at a certain point.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of replica set condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "The last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "The reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human readable message indicating details about the transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_ReplicaSetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetList is a collection of ReplicaSets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.ReplicaSet"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.ReplicaSet", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_ReplicaSetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetSpec is the specification of a ReplicaSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Replicas is the number of desired replicas. This is a pointer to distinguish between explicit zero and unspecified. Defaults to 1. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/#what-is-a-replicationcontroller", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "minReadySeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Minimum number of seconds for which a newly created pod should be ready without any of its container crashing, for it to be considered available. Defaults to 0 (pod will be considered available as soon as it is ready)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Selector is a label query over pods that should match the replica count. If the selector is empty, it is defaulted to the labels present on the pod template. Label keys and values that must match in order to be controlled by this replica set. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "template": { + SchemaProps: spec.SchemaProps{ + Description: "Template is the object that describes the pod that will be created if insufficient replicas are detected. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#pod-template", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.PodTemplateSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PodTemplateSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_ReplicaSetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetStatus represents the current status of a ReplicaSet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "Replicas is the most recently oberved number of replicas. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/#what-is-a-replicationcontroller", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "fullyLabeledReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of pods that have labels matching the labels of the pod template of the replicaset.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readyReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of ready replicas for this replica set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "availableReplicas": { + SchemaProps: spec.SchemaProps{ + Description: "The number of available replicas (ready for at least minReadySeconds) for this replica set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "ObservedGeneration reflects the generation of the most recently observed ReplicaSet.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Represents the latest available observations of a replica set's current state.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.ReplicaSetCondition"), + }, + }, + }, + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.ReplicaSetCondition"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_RollbackConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "revision": { + SchemaProps: spec.SchemaProps{ + Description: "The revision to rollback to. If set to 0, rollback to the last revision.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_RollingUpdateDaemonSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Spec to control the desired behavior of daemon set rolling update.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of DaemonSet pods that can be unavailable during the update. Value can be an absolute number (ex: 5) or a percentage of total number of DaemonSet pods at the start of the update (ex: 10%). Absolute number is calculated from percentage by rounding up. This cannot be 0. Default value is 1. Example: when this is set to 30%, at most 30% of the total number of nodes that should be running the daemon pod (i.e. status.desiredNumberScheduled) can have their pods stopped for an update at any given time. The update starts by stopping at most 30% of those DaemonSet pods and then brings up new DaemonSet pods in their place. Once the new pods are available, it then proceeds onto other DaemonSet pods, thus ensuring that at least 70% of original number of DaemonSet pods are available at all times during the update.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_RollingUpdateDeployment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Spec to control the desired behavior of rolling update.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of pods that can be unavailable during the update. Value can be an absolute number (ex: 5) or a percentage of desired pods (ex: 10%). Absolute number is calculated from percentage by rounding down. This can not be 0 if MaxSurge is 0. By default, a fixed value of 1 is used. Example: when this is set to 30%, the old RC can be scaled down to 70% of desired pods immediately when the rolling update starts. Once new pods are ready, old RC can be scaled down further, followed by scaling up the new RC, ensuring that the total number of pods available at all times during the update is at least 70% of desired pods.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "maxSurge": { + SchemaProps: spec.SchemaProps{ + Description: "The maximum number of pods that can be scheduled above the desired number of pods. Value can be an absolute number (ex: 5) or a percentage of desired pods (ex: 10%). This can not be 0 if MaxUnavailable is 0. Absolute number is calculated from percentage by rounding up. By default, a value of 1 is used. Example: when this is set to 30%, the new RC can be scaled up immediately when the rolling update starts, such that the total number of old and new pods do not exceed 130% of desired pods. Once old pods have been killed, new RC can be scaled up further, ensuring that total number of pods running at any time during the update is at most 130% of desired pods.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_RunAsGroupStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RunAsGroupStrategyOptions defines the strategy type and any options used to create the strategy. Deprecated: use RunAsGroupStrategyOptions from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate the allowable RunAsGroup values that may be set.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ranges": { + SchemaProps: spec.SchemaProps{ + Description: "ranges are the allowed ranges of gids that may be used. If you would like to force a single gid then supply a single range with the same start and end. Required for MustRunAs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IDRange"), + }, + }, + }, + }, + }, + }, + Required: []string{"rule"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.IDRange"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_RunAsUserStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RunAsUserStrategyOptions defines the strategy type and any options used to create the strategy. Deprecated: use RunAsUserStrategyOptions from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate the allowable RunAsUser values that may be set.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ranges": { + SchemaProps: spec.SchemaProps{ + Description: "ranges are the allowed ranges of uids that may be used. If you would like to force a single uid then supply a single range with the same start and end. Required for MustRunAs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IDRange"), + }, + }, + }, + }, + }, + }, + Required: []string{"rule"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.IDRange"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_RuntimeClassStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClassStrategyOptions define the strategy that will dictate the allowable RuntimeClasses for a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "allowedRuntimeClassNames": { + SchemaProps: spec.SchemaProps{ + Description: "allowedRuntimeClassNames is an allowlist of RuntimeClass names that may be specified on a pod. A value of \"*\" means that any RuntimeClass name is allowed, and must be the only item in the list. An empty list requires the RuntimeClassName field to be unset.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "defaultRuntimeClassName": { + SchemaProps: spec.SchemaProps{ + Description: "defaultRuntimeClassName is the default RuntimeClassName to set on the pod. The default MUST be allowed by the allowedRuntimeClassNames list. A value of nil does not mutate the Pod.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"allowedRuntimeClassNames"}, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_SELinuxStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SELinuxStrategyOptions defines the strategy type and any options used to create the strategy. Deprecated: use SELinuxStrategyOptions from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate the allowable labels that may be set.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "seLinuxOptions": { + SchemaProps: spec.SchemaProps{ + Description: "seLinuxOptions required to run as; required for MustRunAs More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/", + Ref: ref("k8s.io/api/core/v1.SELinuxOptions"), + }, + }, + }, + Required: []string{"rule"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SELinuxOptions"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_Scale(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "represents a scaling request for a resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "defines the behavior of the scale. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.ScaleSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "current status of the scale. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status. Read-only.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.ScaleStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.ScaleSpec", "k8s.io/api/extensions/v1beta1.ScaleStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_extensions_v1beta1_ScaleSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "describes the attributes of a scale subresource", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "desired number of instances for the scaled object.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_ScaleStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "represents the current status of a scale subresource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "replicas": { + SchemaProps: spec.SchemaProps{ + Description: "actual number of observed instances of the scaled object.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "label query over pods that should match the replicas count. More info: http://kubernetes.io/docs/user-guide/labels#label-selectors", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "targetSelector": { + SchemaProps: spec.SchemaProps{ + Description: "label selector for pods that should match the replicas count. This is a serializated version of both map-based and more expressive set-based selectors. This is done to avoid introspection in the clients. The string will be in the same format as the query-param syntax. If the target type only supports map-based selectors, both this field and map-based selector field are populated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"replicas"}, + }, + }, + } +} + +func schema_k8sio_api_extensions_v1beta1_SupplementalGroupsStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SupplementalGroupsStrategyOptions defines the strategy type and options used to create the strategy. Deprecated: use SupplementalGroupsStrategyOptions from policy API Group instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate what supplemental groups is used in the SecurityContext.", + Type: []string{"string"}, + Format: "", + }, + }, + "ranges": { + SchemaProps: spec.SchemaProps{ + Description: "ranges are the allowed ranges of supplemental groups. If you would like to force a single supplemental group then supply a single range with the same start and end. Required for MustRunAs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/extensions/v1beta1.IDRange"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/extensions/v1beta1.IDRange"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_FlowDistinguisherMethod(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowDistinguisherMethod specifies the method of a flow distinguisher.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` is the type of flow distinguisher method The supported types are \"ByUser\" and \"ByNamespace\". Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_FlowSchema(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with similar attributes and is identified by a pair of strings: the name of the FlowSchema and a \"flow distinguisher\".", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "`metadata` is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "`spec` is the specification of the desired behavior of a FlowSchema. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.FlowSchemaSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "`status` is the current status of a FlowSchema. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.FlowSchemaStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.FlowSchemaSpec", "k8s.io/api/flowcontrol/v1alpha1.FlowSchemaStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_FlowSchemaCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchemaCondition describes conditions for a FlowSchema.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` is the type of the condition. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "`status` is the status of the condition. Can be True, False, Unknown. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "`lastTransitionTime` is the last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "`reason` is a unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "`message` is a human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_FlowSchemaList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchemaList is a list of FlowSchema objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "`metadata` is the standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "`items` is a list of FlowSchemas.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.FlowSchema"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.FlowSchema", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_FlowSchemaSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchemaSpec describes how the FlowSchema's specification looks like.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "priorityLevelConfiguration": { + SchemaProps: spec.SchemaProps{ + Description: "`priorityLevelConfiguration` should reference a PriorityLevelConfiguration in the cluster. If the reference cannot be resolved, the FlowSchema will be ignored and marked as invalid in its status. Required.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationReference"), + }, + }, + "matchingPrecedence": { + SchemaProps: spec.SchemaProps{ + Description: "`matchingPrecedence` is used to choose among the FlowSchemas that match a given request. The chosen FlowSchema is among those with the numerically lowest (which we take to be logically highest) MatchingPrecedence. Each MatchingPrecedence value must be ranged in [1,10000]. Note that if the precedence is not specified, it will be set to 1000 as default.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "distinguisherMethod": { + SchemaProps: spec.SchemaProps{ + Description: "`distinguisherMethod` defines how to compute the flow distinguisher for requests that match this schema. `nil` specifies that the distinguisher is disabled and thus will always be the empty string.", + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.FlowDistinguisherMethod"), + }, + }, + "rules": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`rules` describes which requests will match this flow schema. This FlowSchema matches a request if and only if at least one member of rules matches the request. if it is an empty slice, there will be no requests matching the FlowSchema.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.PolicyRulesWithSubjects"), + }, + }, + }, + }, + }, + }, + Required: []string{"priorityLevelConfiguration"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.FlowDistinguisherMethod", "k8s.io/api/flowcontrol/v1alpha1.PolicyRulesWithSubjects", "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationReference"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_FlowSchemaStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchemaStatus represents the current state of a FlowSchema.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`conditions` is a list of the current states of FlowSchema.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.FlowSchemaCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.FlowSchemaCondition"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_GroupSubject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupSubject holds detailed information for group-kind subject.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the user group that matches, or \"*\" to match all user groups. See https://github.com/kubernetes/apiserver/blob/master/pkg/authentication/user/user.go for some well-known group names. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_LimitResponse(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LimitResponse defines how to handle requests that can not be executed right now.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` is \"Queue\" or \"Reject\". \"Queue\" means that requests that can not be executed upon arrival are held in a queue until they can be executed or a queuing limit is reached. \"Reject\" means that requests that can not be executed upon arrival are rejected. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "queuing": { + SchemaProps: spec.SchemaProps{ + Description: "`queuing` holds the configuration parameters for queuing. This field may be non-empty only if `type` is `\"Queue\"`.", + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.QueuingConfiguration"), + }, + }, + }, + Required: []string{"type"}, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-unions": []interface{}{ + map[string]interface{}{ + "discriminator": "type", + "fields-to-discriminateBy": map[string]interface{}{ + "queuing": "Queuing", + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.QueuingConfiguration"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_LimitedPriorityLevelConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LimitedPriorityLevelConfiguration specifies how to handle requests that are subject to limits. It addresses two issues:\n * How are requests for this priority level limited?\n * What should be done with requests that exceed the limit?", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "assuredConcurrencyShares": { + SchemaProps: spec.SchemaProps{ + Description: "`assuredConcurrencyShares` (ACS) configures the execution limit, which is a limit on the number of requests of this priority level that may be exeucting at a given time. ACS must be a positive number. The server's concurrency limit (SCL) is divided among the concurrency-controlled priority levels in proportion to their assured concurrency shares. This produces the assured concurrency value (ACV) --- the number of requests that may be executing at a time --- for each such priority level:\n\n ACV(l) = ceil( SCL * ACS(l) / ( sum[priority levels k] ACS(k) ) )\n\nbigger numbers of ACS mean more reserved concurrent requests (at the expense of every other PL). This field has a default value of 30.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "limitResponse": { + SchemaProps: spec.SchemaProps{ + Description: "`limitResponse` indicates what to do with requests that can not be executed right now", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.LimitResponse"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.LimitResponse"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_NonResourcePolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NonResourcePolicyRule is a predicate that matches non-resource requests according to their verb and the target non-resource URL. A NonResourcePolicyRule matches a request if and only if both (a) at least one member of verbs matches the request and (b) at least one member of nonResourceURLs matches the request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`verbs` is a list of matching verbs and may not be empty. \"*\" matches all verbs. If it is present, it must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`nonResourceURLs` is a set of url prefixes that a user should have access to and may not be empty. For example:\n - \"/healthz\" is legal\n - \"/hea*\" is illegal\n - \"/hea\" is legal but matches nothing\n - \"/hea/*\" also matches nothing\n - \"/healthz/*\" matches all per-component health checks.\n\"*\" matches all non-resource urls. if it is present, it must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs", "nonResourceURLs"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_PolicyRulesWithSubjects(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyRulesWithSubjects prescribes a test that applies to a request to an apiserver. The test considers the subject making the request, the verb being requested, and the resource to be acted upon. This PolicyRulesWithSubjects matches a request if and only if both (a) at least one member of subjects matches the request and (b) at least one member of resourceRules or nonResourceRules matches the request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "subjects": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "subjects is the list of normal user, serviceaccount, or group that this rule cares about. There must be at least one member in this slice. A slice that includes both the system:authenticated and system:unauthenticated user groups matches every request. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.Subject"), + }, + }, + }, + }, + }, + "resourceRules": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`resourceRules` is a slice of ResourcePolicyRules that identify matching requests according to their verb and the target resource. At least one of `resourceRules` and `nonResourceRules` has to be non-empty.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.ResourcePolicyRule"), + }, + }, + }, + }, + }, + "nonResourceRules": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`nonResourceRules` is a list of NonResourcePolicyRules that identify matching requests according to their verb and the target non-resource URL.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.NonResourcePolicyRule"), + }, + }, + }, + }, + }, + }, + Required: []string{"subjects"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.NonResourcePolicyRule", "k8s.io/api/flowcontrol/v1alpha1.ResourcePolicyRule", "k8s.io/api/flowcontrol/v1alpha1.Subject"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfiguration represents the configuration of a priority level.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "`metadata` is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "`spec` is the specification of the desired behavior of a \"request-priority\". More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "`status` is the current status of a \"request-priority\". More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationSpec", "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationCondition defines the condition of priority level.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` is the type of the condition. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "`status` is the status of the condition. Can be True, False, Unknown. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "`lastTransitionTime` is the last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "`reason` is a unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "`message` is a human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationList is a list of PriorityLevelConfiguration objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "`metadata` is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "`items` is a list of request-priorities.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfiguration"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfiguration", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationReference contains information that points to the \"request-priority\" being used.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "`name` is the name of the priority level configuration being referenced Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationSpec specifies the configuration of a priority level.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` indicates whether this priority level is subject to limitation on request execution. A value of `\"Exempt\"` means that requests of this priority level are not subject to a limit (and thus are never queued) and do not detract from the capacity made available to other priority levels. A value of `\"Limited\"` means that (a) requests of this priority level _are_ subject to limits and (b) some of the server's limited capacity is made available exclusively to this priority level. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "limited": { + SchemaProps: spec.SchemaProps{ + Description: "`limited` specifies how requests are handled for a Limited priority level. This field must be non-empty if and only if `type` is `\"Limited\"`.", + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.LimitedPriorityLevelConfiguration"), + }, + }, + }, + Required: []string{"type"}, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-unions": []interface{}{ + map[string]interface{}{ + "discriminator": "type", + "fields-to-discriminateBy": map[string]interface{}{ + "limited": "Limited", + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.LimitedPriorityLevelConfiguration"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_PriorityLevelConfigurationStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationStatus represents the current state of a \"request-priority\".", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`conditions` is the current state of \"request-priority\".", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.PriorityLevelConfigurationCondition"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_QueuingConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "QueuingConfiguration holds the configuration parameters for queuing", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "queues": { + SchemaProps: spec.SchemaProps{ + Description: "`queues` is the number of queues for this priority level. The queues exist independently at each apiserver. The value must be positive. Setting it to 1 effectively precludes shufflesharding and thus makes the distinguisher method of associated flow schemas irrelevant. This field has a default value of 64.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "handSize": { + SchemaProps: spec.SchemaProps{ + Description: "`handSize` is a small positive number that configures the shuffle sharding of requests into queues. When enqueuing a request at this priority level the request's flow identifier (a string pair) is hashed and the hash value is used to shuffle the list of queues and deal a hand of the size specified here. The request is put into one of the shortest queues in that hand. `handSize` must be no larger than `queues`, and should be significantly smaller (so that a few heavy flows do not saturate most of the queues). See the user-facing documentation for more extensive guidance on setting this field. This field has a default value of 8.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "queueLengthLimit": { + SchemaProps: spec.SchemaProps{ + Description: "`queueLengthLimit` is the maximum number of requests allowed to be waiting in a given queue of this priority level at a time; excess requests are rejected. This value must be positive. If not specified, it will be defaulted to 50.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_ResourcePolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourcePolicyRule is a predicate that matches some resource requests, testing the request's verb and the target resource. A ResourcePolicyRule matches a resource request if and only if: (a) at least one member of verbs matches the request, (b) at least one member of apiGroups matches the request, (c) at least one member of resources matches the request, and (d) least one member of namespaces matches the request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`verbs` is a list of matching verbs and may not be empty. \"*\" matches all verbs and, if present, must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`apiGroups` is a list of matching API groups and may not be empty. \"*\" matches all API groups and, if present, must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`resources` is a list of matching resources (i.e., lowercase and plural) with, if desired, subresource. For example, [ \"services\", \"nodes/status\" ]. This list may not be empty. \"*\" matches all resources and, if present, must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "clusterScope": { + SchemaProps: spec.SchemaProps{ + Description: "`clusterScope` indicates whether to match requests that do not specify a namespace (which happens either because the resource is not namespaced or the request targets all namespaces). If this field is omitted or false then the `namespaces` field must contain a non-empty list.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "namespaces": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`namespaces` is a list of target namespaces that restricts matches. A request that specifies a target namespace matches only if either (a) this list contains that target namespace or (b) this list contains \"*\". Note that \"*\" matches any specified namespace but does not match a request that _does not specify_ a namespace (see the `clusterScope` field for that). This list may be empty, but only if `clusterScope` is true.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs", "apiGroups", "resources"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_ServiceAccountSubject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceAccountSubject holds detailed information for service-account-kind subject.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "`namespace` is the namespace of matching ServiceAccount objects. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "`name` is the name of matching ServiceAccount objects, or \"*\" to match regardless of name. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"namespace", "name"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_Subject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Subject matches the originator of a request, as identified by the request authentication system. There are three ways of matching an originator; by user, group, or service account.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.UserSubject"), + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.GroupSubject"), + }, + }, + "serviceAccount": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/flowcontrol/v1alpha1.ServiceAccountSubject"), + }, + }, + }, + Required: []string{"kind"}, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-unions": []interface{}{ + map[string]interface{}{ + "discriminator": "kind", + "fields-to-discriminateBy": map[string]interface{}{ + "group": "Group", + "serviceAccount": "ServiceAccount", + "user": "User", + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1alpha1.GroupSubject", "k8s.io/api/flowcontrol/v1alpha1.ServiceAccountSubject", "k8s.io/api/flowcontrol/v1alpha1.UserSubject"}, + } +} + +func schema_k8sio_api_flowcontrol_v1alpha1_UserSubject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "UserSubject holds detailed information for user-kind subject.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "`name` is the username that matches, or \"*\" to match all usernames. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_FlowDistinguisherMethod(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowDistinguisherMethod specifies the method of a flow distinguisher.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` is the type of flow distinguisher method The supported types are \"ByUser\" and \"ByNamespace\". Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_FlowSchema(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with similar attributes and is identified by a pair of strings: the name of the FlowSchema and a \"flow distinguisher\".", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "`metadata` is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "`spec` is the specification of the desired behavior of a FlowSchema. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.FlowSchemaSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "`status` is the current status of a FlowSchema. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.FlowSchemaStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.FlowSchemaSpec", "k8s.io/api/flowcontrol/v1beta1.FlowSchemaStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_FlowSchemaCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchemaCondition describes conditions for a FlowSchema.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` is the type of the condition. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "`status` is the status of the condition. Can be True, False, Unknown. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "`lastTransitionTime` is the last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "`reason` is a unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "`message` is a human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_FlowSchemaList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchemaList is a list of FlowSchema objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "`metadata` is the standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "`items` is a list of FlowSchemas.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.FlowSchema"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.FlowSchema", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_FlowSchemaSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchemaSpec describes how the FlowSchema's specification looks like.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "priorityLevelConfiguration": { + SchemaProps: spec.SchemaProps{ + Description: "`priorityLevelConfiguration` should reference a PriorityLevelConfiguration in the cluster. If the reference cannot be resolved, the FlowSchema will be ignored and marked as invalid in its status. Required.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationReference"), + }, + }, + "matchingPrecedence": { + SchemaProps: spec.SchemaProps{ + Description: "`matchingPrecedence` is used to choose among the FlowSchemas that match a given request. The chosen FlowSchema is among those with the numerically lowest (which we take to be logically highest) MatchingPrecedence. Each MatchingPrecedence value must be ranged in [1,10000]. Note that if the precedence is not specified, it will be set to 1000 as default.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "distinguisherMethod": { + SchemaProps: spec.SchemaProps{ + Description: "`distinguisherMethod` defines how to compute the flow distinguisher for requests that match this schema. `nil` specifies that the distinguisher is disabled and thus will always be the empty string.", + Ref: ref("k8s.io/api/flowcontrol/v1beta1.FlowDistinguisherMethod"), + }, + }, + "rules": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`rules` describes which requests will match this flow schema. This FlowSchema matches a request if and only if at least one member of rules matches the request. if it is an empty slice, there will be no requests matching the FlowSchema.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.PolicyRulesWithSubjects"), + }, + }, + }, + }, + }, + }, + Required: []string{"priorityLevelConfiguration"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.FlowDistinguisherMethod", "k8s.io/api/flowcontrol/v1beta1.PolicyRulesWithSubjects", "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationReference"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_FlowSchemaStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FlowSchemaStatus represents the current state of a FlowSchema.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`conditions` is a list of the current states of FlowSchema.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.FlowSchemaCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.FlowSchemaCondition"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_GroupSubject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupSubject holds detailed information for group-kind subject.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the user group that matches, or \"*\" to match all user groups. See https://github.com/kubernetes/apiserver/blob/master/pkg/authentication/user/user.go for some well-known group names. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_LimitResponse(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LimitResponse defines how to handle requests that can not be executed right now.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` is \"Queue\" or \"Reject\". \"Queue\" means that requests that can not be executed upon arrival are held in a queue until they can be executed or a queuing limit is reached. \"Reject\" means that requests that can not be executed upon arrival are rejected. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "queuing": { + SchemaProps: spec.SchemaProps{ + Description: "`queuing` holds the configuration parameters for queuing. This field may be non-empty only if `type` is `\"Queue\"`.", + Ref: ref("k8s.io/api/flowcontrol/v1beta1.QueuingConfiguration"), + }, + }, + }, + Required: []string{"type"}, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-unions": []interface{}{ + map[string]interface{}{ + "discriminator": "type", + "fields-to-discriminateBy": map[string]interface{}{ + "queuing": "Queuing", + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.QueuingConfiguration"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_LimitedPriorityLevelConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LimitedPriorityLevelConfiguration specifies how to handle requests that are subject to limits. It addresses two issues:\n * How are requests for this priority level limited?\n * What should be done with requests that exceed the limit?", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "assuredConcurrencyShares": { + SchemaProps: spec.SchemaProps{ + Description: "`assuredConcurrencyShares` (ACS) configures the execution limit, which is a limit on the number of requests of this priority level that may be exeucting at a given time. ACS must be a positive number. The server's concurrency limit (SCL) is divided among the concurrency-controlled priority levels in proportion to their assured concurrency shares. This produces the assured concurrency value (ACV) --- the number of requests that may be executing at a time --- for each such priority level:\n\n ACV(l) = ceil( SCL * ACS(l) / ( sum[priority levels k] ACS(k) ) )\n\nbigger numbers of ACS mean more reserved concurrent requests (at the expense of every other PL). This field has a default value of 30.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "limitResponse": { + SchemaProps: spec.SchemaProps{ + Description: "`limitResponse` indicates what to do with requests that can not be executed right now", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.LimitResponse"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.LimitResponse"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_NonResourcePolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NonResourcePolicyRule is a predicate that matches non-resource requests according to their verb and the target non-resource URL. A NonResourcePolicyRule matches a request if and only if both (a) at least one member of verbs matches the request and (b) at least one member of nonResourceURLs matches the request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`verbs` is a list of matching verbs and may not be empty. \"*\" matches all verbs. If it is present, it must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`nonResourceURLs` is a set of url prefixes that a user should have access to and may not be empty. For example:\n - \"/healthz\" is legal\n - \"/hea*\" is illegal\n - \"/hea\" is legal but matches nothing\n - \"/hea/*\" also matches nothing\n - \"/healthz/*\" matches all per-component health checks.\n\"*\" matches all non-resource urls. if it is present, it must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs", "nonResourceURLs"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_PolicyRulesWithSubjects(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyRulesWithSubjects prescribes a test that applies to a request to an apiserver. The test considers the subject making the request, the verb being requested, and the resource to be acted upon. This PolicyRulesWithSubjects matches a request if and only if both (a) at least one member of subjects matches the request and (b) at least one member of resourceRules or nonResourceRules matches the request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "subjects": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "subjects is the list of normal user, serviceaccount, or group that this rule cares about. There must be at least one member in this slice. A slice that includes both the system:authenticated and system:unauthenticated user groups matches every request. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.Subject"), + }, + }, + }, + }, + }, + "resourceRules": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`resourceRules` is a slice of ResourcePolicyRules that identify matching requests according to their verb and the target resource. At least one of `resourceRules` and `nonResourceRules` has to be non-empty.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.ResourcePolicyRule"), + }, + }, + }, + }, + }, + "nonResourceRules": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`nonResourceRules` is a list of NonResourcePolicyRules that identify matching requests according to their verb and the target non-resource URL.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.NonResourcePolicyRule"), + }, + }, + }, + }, + }, + }, + Required: []string{"subjects"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.NonResourcePolicyRule", "k8s.io/api/flowcontrol/v1beta1.ResourcePolicyRule", "k8s.io/api/flowcontrol/v1beta1.Subject"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfiguration represents the configuration of a priority level.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "`metadata` is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "`spec` is the specification of the desired behavior of a \"request-priority\". More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "`status` is the current status of a \"request-priority\". More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationSpec", "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationCondition defines the condition of priority level.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` is the type of the condition. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "`status` is the status of the condition. Can be True, False, Unknown. Required.", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "`lastTransitionTime` is the last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "`reason` is a unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "`message` is a human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationList is a list of PriorityLevelConfiguration objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "`metadata` is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "`items` is a list of request-priorities.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfiguration"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfiguration", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationReference contains information that points to the \"request-priority\" being used.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "`name` is the name of the priority level configuration being referenced Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationSpec specifies the configuration of a priority level.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "`type` indicates whether this priority level is subject to limitation on request execution. A value of `\"Exempt\"` means that requests of this priority level are not subject to a limit (and thus are never queued) and do not detract from the capacity made available to other priority levels. A value of `\"Limited\"` means that (a) requests of this priority level _are_ subject to limits and (b) some of the server's limited capacity is made available exclusively to this priority level. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "limited": { + SchemaProps: spec.SchemaProps{ + Description: "`limited` specifies how requests are handled for a Limited priority level. This field must be non-empty if and only if `type` is `\"Limited\"`.", + Ref: ref("k8s.io/api/flowcontrol/v1beta1.LimitedPriorityLevelConfiguration"), + }, + }, + }, + Required: []string{"type"}, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-unions": []interface{}{ + map[string]interface{}{ + "discriminator": "type", + "fields-to-discriminateBy": map[string]interface{}{ + "limited": "Limited", + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.LimitedPriorityLevelConfiguration"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_PriorityLevelConfigurationStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityLevelConfigurationStatus represents the current state of a \"request-priority\".", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`conditions` is the current state of \"request-priority\".", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.PriorityLevelConfigurationCondition"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_QueuingConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "QueuingConfiguration holds the configuration parameters for queuing", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "queues": { + SchemaProps: spec.SchemaProps{ + Description: "`queues` is the number of queues for this priority level. The queues exist independently at each apiserver. The value must be positive. Setting it to 1 effectively precludes shufflesharding and thus makes the distinguisher method of associated flow schemas irrelevant. This field has a default value of 64.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "handSize": { + SchemaProps: spec.SchemaProps{ + Description: "`handSize` is a small positive number that configures the shuffle sharding of requests into queues. When enqueuing a request at this priority level the request's flow identifier (a string pair) is hashed and the hash value is used to shuffle the list of queues and deal a hand of the size specified here. The request is put into one of the shortest queues in that hand. `handSize` must be no larger than `queues`, and should be significantly smaller (so that a few heavy flows do not saturate most of the queues). See the user-facing documentation for more extensive guidance on setting this field. This field has a default value of 8.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "queueLengthLimit": { + SchemaProps: spec.SchemaProps{ + Description: "`queueLengthLimit` is the maximum number of requests allowed to be waiting in a given queue of this priority level at a time; excess requests are rejected. This value must be positive. If not specified, it will be defaulted to 50.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_ResourcePolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourcePolicyRule is a predicate that matches some resource requests, testing the request's verb and the target resource. A ResourcePolicyRule matches a resource request if and only if: (a) at least one member of verbs matches the request, (b) at least one member of apiGroups matches the request, (c) at least one member of resources matches the request, and (d) least one member of namespaces matches the request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`verbs` is a list of matching verbs and may not be empty. \"*\" matches all verbs and, if present, must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`apiGroups` is a list of matching API groups and may not be empty. \"*\" matches all API groups and, if present, must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`resources` is a list of matching resources (i.e., lowercase and plural) with, if desired, subresource. For example, [ \"services\", \"nodes/status\" ]. This list may not be empty. \"*\" matches all resources and, if present, must be the only entry. Required.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "clusterScope": { + SchemaProps: spec.SchemaProps{ + Description: "`clusterScope` indicates whether to match requests that do not specify a namespace (which happens either because the resource is not namespaced or the request targets all namespaces). If this field is omitted or false then the `namespaces` field must contain a non-empty list.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "namespaces": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "`namespaces` is a list of target namespaces that restricts matches. A request that specifies a target namespace matches only if either (a) this list contains that target namespace or (b) this list contains \"*\". Note that \"*\" matches any specified namespace but does not match a request that _does not specify_ a namespace (see the `clusterScope` field for that). This list may be empty, but only if `clusterScope` is true.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs", "apiGroups", "resources"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_ServiceAccountSubject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceAccountSubject holds detailed information for service-account-kind subject.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "`namespace` is the namespace of matching ServiceAccount objects. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "`name` is the name of matching ServiceAccount objects, or \"*\" to match regardless of name. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"namespace", "name"}, + }, + }, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_Subject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Subject matches the originator of a request, as identified by the request authentication system. There are three ways of matching an originator; by user, group, or service account.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/flowcontrol/v1beta1.UserSubject"), + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/flowcontrol/v1beta1.GroupSubject"), + }, + }, + "serviceAccount": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/flowcontrol/v1beta1.ServiceAccountSubject"), + }, + }, + }, + Required: []string{"kind"}, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-unions": []interface{}{ + map[string]interface{}{ + "discriminator": "kind", + "fields-to-discriminateBy": map[string]interface{}{ + "group": "Group", + "serviceAccount": "ServiceAccount", + "user": "User", + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/flowcontrol/v1beta1.GroupSubject", "k8s.io/api/flowcontrol/v1beta1.ServiceAccountSubject", "k8s.io/api/flowcontrol/v1beta1.UserSubject"}, + } +} + +func schema_k8sio_api_flowcontrol_v1beta1_UserSubject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "UserSubject holds detailed information for user-kind subject.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "`name` is the username that matches, or \"*\" to match all usernames. Required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_api_imagepolicy_v1alpha1_ImageReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ImageReview checks if the set of images in a pod are allowed.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information about the pod being evaluated", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/imagepolicy/v1alpha1.ImageReviewSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the backend and indicates whether the pod should be allowed.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/imagepolicy/v1alpha1.ImageReviewStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/imagepolicy/v1alpha1.ImageReviewSpec", "k8s.io/api/imagepolicy/v1alpha1.ImageReviewStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_imagepolicy_v1alpha1_ImageReviewContainerSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ImageReviewContainerSpec is a description of a container within the pod creation request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "image": { + SchemaProps: spec.SchemaProps{ + Description: "This can be in the form image:tag or image@SHA:012345679abcdef.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_imagepolicy_v1alpha1_ImageReviewSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ImageReviewSpec is a description of the pod creation request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "containers": { + SchemaProps: spec.SchemaProps{ + Description: "Containers is a list of a subset of the information in each container of the Pod being created.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/imagepolicy/v1alpha1.ImageReviewContainerSpec"), + }, + }, + }, + }, + }, + "annotations": { + SchemaProps: spec.SchemaProps{ + Description: "Annotations is a list of key-value pairs extracted from the Pod's annotations. It only includes keys which match the pattern `*.image-policy.k8s.io/*`. It is up to each webhook backend to determine how to interpret these annotations, if at all.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace is the namespace the pod is being created in.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/imagepolicy/v1alpha1.ImageReviewContainerSpec"}, + } +} + +func schema_k8sio_api_imagepolicy_v1alpha1_ImageReviewStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ImageReviewStatus is the result of the review for the pod creation request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "allowed": { + SchemaProps: spec.SchemaProps{ + Description: "Allowed indicates that all images were allowed to be run.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "Reason should be empty unless Allowed is false in which case it may contain a short description of what is wrong. Kubernetes may truncate excessively long errors when displaying to the user.", + Type: []string{"string"}, + Format: "", + }, + }, + "auditAnnotations": { + SchemaProps: spec.SchemaProps{ + Description: "AuditAnnotations will be added to the attributes object of the admission controller request using 'AddAnnotation'. The keys should be prefix-less (i.e., the admission controller will add an appropriate prefix).", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"allowed"}, + }, + }, + } +} + +func schema_k8sio_api_networking_v1_HTTPIngressPath(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HTTPIngressPath associates a path with a backend. Incoming urls matching the path are forwarded to the backend.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is matched against the path of an incoming request. Currently it can contain characters disallowed from the conventional \"path\" part of a URL as defined by RFC 3986. Paths must begin with a '/'. When unspecified, all paths from incoming requests are matched.", + Type: []string{"string"}, + Format: "", + }, + }, + "pathType": { + SchemaProps: spec.SchemaProps{ + Description: "PathType determines the interpretation of the Path matching. PathType can be one of the following values: * Exact: Matches the URL path exactly. * Prefix: Matches based on a URL path prefix split by '/'. Matching is\n done on a path element by element basis. A path element refers is the\n list of labels in the path split by the '/' separator. A request is a\n match for path p if every p is an element-wise prefix of p of the\n request path. Note that if the last element of the path is a substring\n of the last element in request path, it is not a match (e.g. /foo/bar\n matches /foo/bar/baz, but does not match /foo/barbaz).\n* ImplementationSpecific: Interpretation of the Path matching is up to\n the IngressClass. Implementations can treat this as a separate PathType\n or treat it identically to Prefix or Exact path types.\nImplementations are required to support all path types.", + Type: []string{"string"}, + Format: "", + }, + }, + "backend": { + SchemaProps: spec.SchemaProps{ + Description: "Backend defines the referenced service endpoint to which the traffic will be forwarded to.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.IngressBackend"), + }, + }, + }, + Required: []string{"backend"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.IngressBackend"}, + } +} + +func schema_k8sio_api_networking_v1_HTTPIngressRuleValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HTTPIngressRuleValue is a list of http selectors pointing to backends. In the example: http:///? -> backend where where parts of the url correspond to RFC 3986, this resource will be used to match against everything after the last '/' and before the first '?' or '#'.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "paths": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "A collection of paths that map requests to backends.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.HTTPIngressPath"), + }, + }, + }, + }, + }, + }, + Required: []string{"paths"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.HTTPIngressPath"}, + } +} + +func schema_k8sio_api_networking_v1_IPBlock(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IPBlock describes a particular CIDR (Ex. \"192.168.1.1/24\",\"2001:db9::/64\") that is allowed to the pods matched by a NetworkPolicySpec's podSelector. The except entry describes CIDRs that should not be included within this rule.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "cidr": { + SchemaProps: spec.SchemaProps{ + Description: "CIDR is a string representing the IP Block Valid examples are \"192.168.1.1/24\" or \"2001:db9::/64\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "except": { + SchemaProps: spec.SchemaProps{ + Description: "Except is a slice of CIDRs that should not be included within an IP Block Valid examples are \"192.168.1.1/24\" or \"2001:db9::/64\" Except values will be rejected if they are outside the CIDR range", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"cidr"}, + }, + }, + } +} + +func schema_k8sio_api_networking_v1_Ingress(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Ingress is a collection of rules that allow inbound connections to reach the endpoints defined by a backend. An Ingress can be configured to give services externally-reachable urls, load balance traffic, terminate SSL, offer name based virtual hosting etc.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec is the desired state of the Ingress. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.IngressSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the current state of the Ingress. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.IngressStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.IngressSpec", "k8s.io/api/networking/v1.IngressStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_networking_v1_IngressBackend(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressBackend describes all endpoints for a given service and port.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "service": { + SchemaProps: spec.SchemaProps{ + Description: "Service references a Service as a Backend. This is a mutually exclusive setting with \"Resource\".", + Ref: ref("k8s.io/api/networking/v1.IngressServiceBackend"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "Resource is an ObjectRef to another Kubernetes resource in the namespace of the Ingress object. If resource is specified, a service.Name and service.Port must not be specified. This is a mutually exclusive setting with \"Service\".", + Ref: ref("k8s.io/api/core/v1.TypedLocalObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TypedLocalObjectReference", "k8s.io/api/networking/v1.IngressServiceBackend"}, + } +} + +func schema_k8sio_api_networking_v1_IngressClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressClass represents the class of the Ingress, referenced by the Ingress Spec. The `ingressclass.kubernetes.io/is-default-class` annotation can be used to indicate that an IngressClass should be considered default. When a single IngressClass resource has this annotation set to true, new Ingress resources without a class specified will be assigned this default class.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec is the desired state of the IngressClass. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.IngressClassSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.IngressClassSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_networking_v1_IngressClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressClassList is a collection of IngressClasses.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of IngressClasses.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.IngressClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.IngressClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_networking_v1_IngressClassSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressClassSpec provides information about the class of an Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "controller": { + SchemaProps: spec.SchemaProps{ + Description: "Controller refers to the name of the controller that should handle this class. This allows for different \"flavors\" that are controlled by the same controller. For example, you may have different Parameters for the same implementing controller. This should be specified as a domain-prefixed path no more than 250 characters in length, e.g. \"acme.io/ingress-controller\". This field is immutable.", + Type: []string{"string"}, + Format: "", + }, + }, + "parameters": { + SchemaProps: spec.SchemaProps{ + Description: "Parameters is a link to a custom resource containing additional configuration for the controller. This is optional if the controller does not require extra parameters.", + Ref: ref("k8s.io/api/core/v1.TypedLocalObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TypedLocalObjectReference"}, + } +} + +func schema_k8sio_api_networking_v1_IngressList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressList is a collection of Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of Ingress.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.Ingress"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.Ingress", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_networking_v1_IngressRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressRule represents the rules mapping the paths under a specified host to the related backend services. Incoming requests are first evaluated for a host match, then routed to the backend associated with the matching IngressRuleValue.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "host": { + SchemaProps: spec.SchemaProps{ + Description: "Host is the fully qualified domain name of a network host, as defined by RFC 3986. Note the following deviations from the \"host\" part of the URI as defined in RFC 3986: 1. IPs are not allowed. Currently an IngressRuleValue can only apply to\n the IP in the Spec of the parent Ingress.\n2. The `:` delimiter is not respected because ports are not allowed.\n\t Currently the port of an Ingress is implicitly :80 for http and\n\t :443 for https.\nBoth these may change in the future. Incoming requests are matched against the host before the IngressRuleValue. If the host is unspecified, the Ingress routes all traffic based on the specified IngressRuleValue.\n\nHost can be \"precise\" which is a domain name without the terminating dot of a network host (e.g. \"foo.bar.com\") or \"wildcard\", which is a domain name prefixed with a single wildcard label (e.g. \"*.foo.com\"). The wildcard character '*' must appear by itself as the first DNS label and matches only a single label. You cannot have a wildcard label by itself (e.g. Host == \"*\"). Requests will be matched against the Host field in the following way: 1. If Host is precise, the request matches this rule if the http host header is equal to Host. 2. If Host is a wildcard, then the request matches this rule if the http host header is to equal to the suffix (removing the first label) of the wildcard rule.", + Type: []string{"string"}, + Format: "", + }, + }, + "http": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/networking/v1.HTTPIngressRuleValue"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.HTTPIngressRuleValue"}, + } +} + +func schema_k8sio_api_networking_v1_IngressRuleValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressRuleValue represents a rule to apply against incoming requests. If the rule is satisfied, the request is routed to the specified backend. Currently mixing different types of rules in a single Ingress is disallowed, so exactly one of the following must be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "http": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/networking/v1.HTTPIngressRuleValue"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.HTTPIngressRuleValue"}, + } +} + +func schema_k8sio_api_networking_v1_IngressServiceBackend(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressServiceBackend references a Kubernetes Service as a Backend.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the referenced service. The service must exist in the same namespace as the Ingress object.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "Port of the referenced service. A port name or port number is required for a IngressServiceBackend.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.ServiceBackendPort"), + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.ServiceBackendPort"}, + } +} + +func schema_k8sio_api_networking_v1_IngressSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressSpec describes the Ingress the user wishes to exist.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ingressClassName": { + SchemaProps: spec.SchemaProps{ + Description: "IngressClassName is the name of the IngressClass cluster resource. The associated IngressClass defines which controller will implement the resource. This replaces the deprecated `kubernetes.io/ingress.class` annotation. For backwards compatibility, when that annotation is set, it must be given precedence over this field. The controller may emit a warning if the field and annotation have different values. Implementations of this API should ignore Ingresses without a class specified. An IngressClass resource may be marked as default, which can be used to set a default value for this field. For more information, refer to the IngressClass documentation.", + Type: []string{"string"}, + Format: "", + }, + }, + "defaultBackend": { + SchemaProps: spec.SchemaProps{ + Description: "DefaultBackend is the backend that should handle requests that don't match any rule. If Rules are not specified, DefaultBackend must be specified. If DefaultBackend is not set, the handling of requests that do not match any of the rules will be up to the Ingress controller.", + Ref: ref("k8s.io/api/networking/v1.IngressBackend"), + }, + }, + "tls": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "TLS configuration. Currently the Ingress only supports a single TLS port, 443. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension, if the ingress controller fulfilling the ingress supports SNI.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.IngressTLS"), + }, + }, + }, + }, + }, + "rules": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "A list of host rules used to configure the Ingress. If unspecified, or no rule matches, all traffic is sent to the default backend.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.IngressRule"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.IngressBackend", "k8s.io/api/networking/v1.IngressRule", "k8s.io/api/networking/v1.IngressTLS"}, + } +} + +func schema_k8sio_api_networking_v1_IngressStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressStatus describe the current state of the Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "loadBalancer": { + SchemaProps: spec.SchemaProps{ + Description: "LoadBalancer contains the current status of the load-balancer.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LoadBalancerStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LoadBalancerStatus"}, + } +} + +func schema_k8sio_api_networking_v1_IngressTLS(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressTLS describes the transport layer security associated with an Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "hosts": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Hosts are a list of hosts included in the TLS certificate. The values in this list must match the name/s used in the tlsSecret. Defaults to the wildcard host setting for the loadbalancer controller fulfilling this Ingress, if left unspecified.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "secretName": { + SchemaProps: spec.SchemaProps{ + Description: "SecretName is the name of the secret used to terminate TLS traffic on port 443. Field is left optional to allow TLS routing based on SNI hostname alone. If the SNI host in a listener conflicts with the \"Host\" header field used by an IngressRule, the SNI host is used for termination and value of the Host header is used for routing.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_networking_v1_NetworkPolicy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NetworkPolicy describes what network traffic is allowed for a set of Pods", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior for this NetworkPolicy.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.NetworkPolicySpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.NetworkPolicySpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_networking_v1_NetworkPolicyEgressRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NetworkPolicyEgressRule describes a particular set of traffic that is allowed out of pods matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and to. This type is beta-level in 1.8", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ports": { + SchemaProps: spec.SchemaProps{ + Description: "List of destination ports for outgoing traffic. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.NetworkPolicyPort"), + }, + }, + }, + }, + }, + "to": { + SchemaProps: spec.SchemaProps{ + Description: "List of destinations for outgoing traffic of pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all destinations (traffic not restricted by destination). If this field is present and contains at least one item, this rule allows traffic only if the traffic matches at least one item in the to list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.NetworkPolicyPeer"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.NetworkPolicyPeer", "k8s.io/api/networking/v1.NetworkPolicyPort"}, + } +} + +func schema_k8sio_api_networking_v1_NetworkPolicyIngressRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NetworkPolicyIngressRule describes a particular set of traffic that is allowed to the pods matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and from.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ports": { + SchemaProps: spec.SchemaProps{ + Description: "List of ports which should be made accessible on the pods selected for this rule. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.NetworkPolicyPort"), + }, + }, + }, + }, + }, + "from": { + SchemaProps: spec.SchemaProps{ + Description: "List of sources which should be able to access the pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all sources (traffic not restricted by source). If this field is present and contains at least one item, this rule allows traffic only if the traffic matches at least one item in the from list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.NetworkPolicyPeer"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.NetworkPolicyPeer", "k8s.io/api/networking/v1.NetworkPolicyPort"}, + } +} + +func schema_k8sio_api_networking_v1_NetworkPolicyList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NetworkPolicyList is a list of NetworkPolicy objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.NetworkPolicy"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.NetworkPolicy", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_networking_v1_NetworkPolicyPeer(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NetworkPolicyPeer describes a peer to allow traffic to/from. Only certain combinations of fields are allowed", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podSelector": { + SchemaProps: spec.SchemaProps{ + Description: "This is a label selector which selects Pods. This field follows standard label selector semantics; if present but empty, it selects all pods.\n\nIf NamespaceSelector is also set, then the NetworkPolicyPeer as a whole selects the Pods matching PodSelector in the Namespaces selected by NamespaceSelector. Otherwise it selects the Pods matching PodSelector in the policy's own Namespace.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "namespaceSelector": { + SchemaProps: spec.SchemaProps{ + Description: "Selects Namespaces using cluster-scoped labels. This field follows standard label selector semantics; if present but empty, it selects all namespaces.\n\nIf PodSelector is also set, then the NetworkPolicyPeer as a whole selects the Pods matching PodSelector in the Namespaces selected by NamespaceSelector. Otherwise it selects all Pods in the Namespaces selected by NamespaceSelector.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "ipBlock": { + SchemaProps: spec.SchemaProps{ + Description: "IPBlock defines policy on a particular IPBlock. If this field is set then neither of the other fields can be.", + Ref: ref("k8s.io/api/networking/v1.IPBlock"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.IPBlock", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_networking_v1_NetworkPolicyPort(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NetworkPolicyPort describes a port to allow traffic on", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "protocol": { + SchemaProps: spec.SchemaProps{ + Description: "The protocol (TCP, UDP, or SCTP) which traffic must match. If not specified, this field defaults to TCP.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "The port on the given protocol. This can either be a numerical or named port on a pod. If this field is not provided, this matches all port names and numbers.", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_networking_v1_NetworkPolicySpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NetworkPolicySpec provides the specification of a NetworkPolicy", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podSelector": { + SchemaProps: spec.SchemaProps{ + Description: "Selects the pods to which this NetworkPolicy object applies. The array of ingress rules is applied to any pods selected by this field. Multiple network policies can select the same set of pods. In this case, the ingress rules for each are combined additively. This field is NOT optional and follows standard label selector semantics. An empty podSelector matches all pods in this namespace.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "ingress": { + SchemaProps: spec.SchemaProps{ + Description: "List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod (and cluster policy otherwise allows the traffic), OR if the traffic source is the pod's local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not allow any traffic (and serves solely to ensure that the pods it selects are isolated by default)", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.NetworkPolicyIngressRule"), + }, + }, + }, + }, + }, + "egress": { + SchemaProps: spec.SchemaProps{ + Description: "List of egress rules to be applied to the selected pods. Outgoing traffic is allowed if there are no NetworkPolicies selecting the pod (and cluster policy otherwise allows the traffic), OR if the traffic matches at least one egress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy limits all outgoing traffic (and serves solely to ensure that the pods it selects are isolated by default). This field is beta-level in 1.8", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1.NetworkPolicyEgressRule"), + }, + }, + }, + }, + }, + "policyTypes": { + SchemaProps: spec.SchemaProps{ + Description: "List of rule types that the NetworkPolicy relates to. Valid options are \"Ingress\", \"Egress\", or \"Ingress,Egress\". If this field is not specified, it will default based on the existence of Ingress or Egress rules; policies that contain an Egress section are assumed to affect Egress, and all policies (whether or not they contain an Ingress section) are assumed to affect Ingress. If you want to write an egress-only policy, you must explicitly specify policyTypes [ \"Egress\" ]. Likewise, if you want to write a policy that specifies that no egress is allowed, you must specify a policyTypes value that include \"Egress\" (since such a policy would not include an Egress section and would otherwise default to just [ \"Ingress\" ]). This field is beta-level in 1.8", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"podSelector"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1.NetworkPolicyEgressRule", "k8s.io/api/networking/v1.NetworkPolicyIngressRule", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_networking_v1_ServiceBackendPort(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceBackendPort is the service port being referenced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of the port on the Service. This is a mutually exclusive setting with \"Number\".", + Type: []string{"string"}, + Format: "", + }, + }, + "number": { + SchemaProps: spec.SchemaProps{ + Description: "Number is the numerical port number (e.g. 80) on the Service. This is a mutually exclusive setting with \"Name\".", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_networking_v1beta1_HTTPIngressPath(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HTTPIngressPath associates a path with a backend. Incoming urls matching the path are forwarded to the backend.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "path": { + SchemaProps: spec.SchemaProps{ + Description: "Path is matched against the path of an incoming request. Currently it can contain characters disallowed from the conventional \"path\" part of a URL as defined by RFC 3986. Paths must begin with a '/'. When unspecified, all paths from incoming requests are matched.", + Type: []string{"string"}, + Format: "", + }, + }, + "pathType": { + SchemaProps: spec.SchemaProps{ + Description: "PathType determines the interpretation of the Path matching. PathType can be one of the following values: * Exact: Matches the URL path exactly. * Prefix: Matches based on a URL path prefix split by '/'. Matching is\n done on a path element by element basis. A path element refers is the\n list of labels in the path split by the '/' separator. A request is a\n match for path p if every p is an element-wise prefix of p of the\n request path. Note that if the last element of the path is a substring\n of the last element in request path, it is not a match (e.g. /foo/bar\n matches /foo/bar/baz, but does not match /foo/barbaz).\n* ImplementationSpecific: Interpretation of the Path matching is up to\n the IngressClass. Implementations can treat this as a separate PathType\n or treat it identically to Prefix or Exact path types.\nImplementations are required to support all path types. Defaults to ImplementationSpecific.", + Type: []string{"string"}, + Format: "", + }, + }, + "backend": { + SchemaProps: spec.SchemaProps{ + Description: "Backend defines the referenced service endpoint to which the traffic will be forwarded to.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.IngressBackend"), + }, + }, + }, + Required: []string{"backend"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.IngressBackend"}, + } +} + +func schema_k8sio_api_networking_v1beta1_HTTPIngressRuleValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HTTPIngressRuleValue is a list of http selectors pointing to backends. In the example: http:///? -> backend where where parts of the url correspond to RFC 3986, this resource will be used to match against everything after the last '/' and before the first '?' or '#'.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "paths": { + SchemaProps: spec.SchemaProps{ + Description: "A collection of paths that map requests to backends.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.HTTPIngressPath"), + }, + }, + }, + }, + }, + }, + Required: []string{"paths"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.HTTPIngressPath"}, + } +} + +func schema_k8sio_api_networking_v1beta1_Ingress(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Ingress is a collection of rules that allow inbound connections to reach the endpoints defined by a backend. An Ingress can be configured to give services externally-reachable urls, load balance traffic, terminate SSL, offer name based virtual hosting etc.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec is the desired state of the Ingress. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.IngressSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the current state of the Ingress. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.IngressStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.IngressSpec", "k8s.io/api/networking/v1beta1.IngressStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressBackend(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressBackend describes all endpoints for a given service and port.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "serviceName": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the name of the referenced service.", + Type: []string{"string"}, + Format: "", + }, + }, + "servicePort": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the port of the referenced service.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "Resource is an ObjectRef to another Kubernetes resource in the namespace of the Ingress object. If resource is specified, serviceName and servicePort must not be specified.", + Ref: ref("k8s.io/api/core/v1.TypedLocalObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TypedLocalObjectReference", "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressClass represents the class of the Ingress, referenced by the Ingress Spec. The `ingressclass.kubernetes.io/is-default-class` annotation can be used to indicate that an IngressClass should be considered default. When a single IngressClass resource has this annotation set to true, new Ingress resources without a class specified will be assigned this default class.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec is the desired state of the IngressClass. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.IngressClassSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.IngressClassSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressClassList is a collection of IngressClasses.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of IngressClasses.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.IngressClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.IngressClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressClassSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressClassSpec provides information about the class of an Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "controller": { + SchemaProps: spec.SchemaProps{ + Description: "Controller refers to the name of the controller that should handle this class. This allows for different \"flavors\" that are controlled by the same controller. For example, you may have different Parameters for the same implementing controller. This should be specified as a domain-prefixed path no more than 250 characters in length, e.g. \"acme.io/ingress-controller\". This field is immutable.", + Type: []string{"string"}, + Format: "", + }, + }, + "parameters": { + SchemaProps: spec.SchemaProps{ + Description: "Parameters is a link to a custom resource containing additional configuration for the controller. This is optional if the controller does not require extra parameters.", + Ref: ref("k8s.io/api/core/v1.TypedLocalObjectReference"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TypedLocalObjectReference"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressList is a collection of Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of Ingress.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.Ingress"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.Ingress", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressRule represents the rules mapping the paths under a specified host to the related backend services. Incoming requests are first evaluated for a host match, then routed to the backend associated with the matching IngressRuleValue.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "host": { + SchemaProps: spec.SchemaProps{ + Description: "Host is the fully qualified domain name of a network host, as defined by RFC 3986. Note the following deviations from the \"host\" part of the URI as defined in RFC 3986: 1. IPs are not allowed. Currently an IngressRuleValue can only apply to\n the IP in the Spec of the parent Ingress.\n2. The `:` delimiter is not respected because ports are not allowed.\n\t Currently the port of an Ingress is implicitly :80 for http and\n\t :443 for https.\nBoth these may change in the future. Incoming requests are matched against the host before the IngressRuleValue. If the host is unspecified, the Ingress routes all traffic based on the specified IngressRuleValue.\n\nHost can be \"precise\" which is a domain name without the terminating dot of a network host (e.g. \"foo.bar.com\") or \"wildcard\", which is a domain name prefixed with a single wildcard label (e.g. \"*.foo.com\"). The wildcard character '*' must appear by itself as the first DNS label and matches only a single label. You cannot have a wildcard label by itself (e.g. Host == \"*\"). Requests will be matched against the Host field in the following way: 1. If Host is precise, the request matches this rule if the http host header is equal to Host. 2. If Host is a wildcard, then the request matches this rule if the http host header is to equal to the suffix (removing the first label) of the wildcard rule.", + Type: []string{"string"}, + Format: "", + }, + }, + "http": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/networking/v1beta1.HTTPIngressRuleValue"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.HTTPIngressRuleValue"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressRuleValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressRuleValue represents a rule to apply against incoming requests. If the rule is satisfied, the request is routed to the specified backend. Currently mixing different types of rules in a single Ingress is disallowed, so exactly one of the following must be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "http": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/api/networking/v1beta1.HTTPIngressRuleValue"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.HTTPIngressRuleValue"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressSpec describes the Ingress the user wishes to exist.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ingressClassName": { + SchemaProps: spec.SchemaProps{ + Description: "IngressClassName is the name of the IngressClass cluster resource. The associated IngressClass defines which controller will implement the resource. This replaces the deprecated `kubernetes.io/ingress.class` annotation. For backwards compatibility, when that annotation is set, it must be given precedence over this field. The controller may emit a warning if the field and annotation have different values. Implementations of this API should ignore Ingresses without a class specified. An IngressClass resource may be marked as default, which can be used to set a default value for this field. For more information, refer to the IngressClass documentation.", + Type: []string{"string"}, + Format: "", + }, + }, + "backend": { + SchemaProps: spec.SchemaProps{ + Description: "A default backend capable of servicing requests that don't match any rule. At least one of 'backend' or 'rules' must be specified. This field is optional to allow the loadbalancer controller or defaulting logic to specify a global default.", + Ref: ref("k8s.io/api/networking/v1beta1.IngressBackend"), + }, + }, + "tls": { + SchemaProps: spec.SchemaProps{ + Description: "TLS configuration. Currently the Ingress only supports a single TLS port, 443. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension, if the ingress controller fulfilling the ingress supports SNI.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.IngressTLS"), + }, + }, + }, + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "A list of host rules used to configure the Ingress. If unspecified, or no rule matches, all traffic is sent to the default backend.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/networking/v1beta1.IngressRule"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/networking/v1beta1.IngressBackend", "k8s.io/api/networking/v1beta1.IngressRule", "k8s.io/api/networking/v1beta1.IngressTLS"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressStatus describe the current state of the Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "loadBalancer": { + SchemaProps: spec.SchemaProps{ + Description: "LoadBalancer contains the current status of the load-balancer.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.LoadBalancerStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.LoadBalancerStatus"}, + } +} + +func schema_k8sio_api_networking_v1beta1_IngressTLS(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IngressTLS describes the transport layer security associated with an Ingress.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "hosts": { + SchemaProps: spec.SchemaProps{ + Description: "Hosts are a list of hosts included in the TLS certificate. The values in this list must match the name/s used in the tlsSecret. Defaults to the wildcard host setting for the loadbalancer controller fulfilling this Ingress, if left unspecified.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "secretName": { + SchemaProps: spec.SchemaProps{ + Description: "SecretName is the name of the secret used to terminate TLS traffic on port 443. Field is left optional to allow TLS routing based on SNI hostname alone. If the SNI host in a listener conflicts with the \"Host\" header field used by an IngressRule, the SNI host is used for termination and value of the Host header is used for routing.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_node_v1_Overhead(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Overhead structure represents the resource overhead associated with running a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podFixed": { + SchemaProps: spec.SchemaProps{ + Description: "PodFixed represents the fixed resource overhead associated with running a pod.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_node_v1_RuntimeClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClass defines a class of container runtime supported in the cluster. The RuntimeClass is used to determine which container runtime is used to run all containers in a pod. RuntimeClasses are manually defined by a user or cluster provisioner, and referenced in the PodSpec. The Kubelet is responsible for resolving the RuntimeClassName reference before running the pod. For more details, see https://kubernetes.io/docs/concepts/containers/runtime-class/", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "handler": { + SchemaProps: spec.SchemaProps{ + Description: "Handler specifies the underlying runtime and configuration that the CRI implementation will use to handle pods of this class. The possible values are specific to the node & CRI configuration. It is assumed that all handlers are available on every node, and handlers of the same name are equivalent on every node. For example, a handler called \"runc\" might specify that the runc OCI runtime (using native Linux containers) will be used to run the containers in a pod. The Handler must be lowercase, conform to the DNS Label (RFC 1123) requirements, and is immutable.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "overhead": { + SchemaProps: spec.SchemaProps{ + Description: "Overhead represents the resource overhead associated with running a pod for a given RuntimeClass. For more details, see\n https://kubernetes.io/docs/concepts/scheduling-eviction/pod-overhead/\nThis field is in beta starting v1.18 and is only honored by servers that enable the PodOverhead feature.", + Ref: ref("k8s.io/api/node/v1.Overhead"), + }, + }, + "scheduling": { + SchemaProps: spec.SchemaProps{ + Description: "Scheduling holds the scheduling constraints to ensure that pods running with this RuntimeClass are scheduled to nodes that support it. If scheduling is nil, this RuntimeClass is assumed to be supported by all nodes.", + Ref: ref("k8s.io/api/node/v1.Scheduling"), + }, + }, + }, + Required: []string{"handler"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/node/v1.Overhead", "k8s.io/api/node/v1.Scheduling", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_node_v1_RuntimeClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClassList is a list of RuntimeClass objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/node/v1.RuntimeClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/node/v1.RuntimeClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_node_v1_Scheduling(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Scheduling specifies the scheduling constraints for nodes supporting a RuntimeClass.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "nodeSelector": { + SchemaProps: spec.SchemaProps{ + Description: "nodeSelector lists labels that must be present on nodes that support this RuntimeClass. Pods using this RuntimeClass can only be scheduled to a node matched by this selector. The RuntimeClass nodeSelector is merged with a pod's existing nodeSelector. Any conflicts will cause the pod to be rejected in admission.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "tolerations": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "tolerations are appended (excluding duplicates) to pods running with this RuntimeClass during admission, effectively unioning the set of nodes tolerated by the pod and the RuntimeClass.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Toleration"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Toleration"}, + } +} + +func schema_k8sio_api_node_v1alpha1_Overhead(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Overhead structure represents the resource overhead associated with running a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podFixed": { + SchemaProps: spec.SchemaProps{ + Description: "PodFixed represents the fixed resource overhead associated with running a pod.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_node_v1alpha1_RuntimeClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClass defines a class of container runtime supported in the cluster. The RuntimeClass is used to determine which container runtime is used to run all containers in a pod. RuntimeClasses are (currently) manually defined by a user or cluster provisioner, and referenced in the PodSpec. The Kubelet is responsible for resolving the RuntimeClassName reference before running the pod. For more details, see https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the RuntimeClass More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/node/v1alpha1.RuntimeClassSpec"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/node/v1alpha1.RuntimeClassSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_node_v1alpha1_RuntimeClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClassList is a list of RuntimeClass objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/node/v1alpha1.RuntimeClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/node/v1alpha1.RuntimeClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_node_v1alpha1_RuntimeClassSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClassSpec is a specification of a RuntimeClass. It contains parameters that are required to describe the RuntimeClass to the Container Runtime Interface (CRI) implementation, as well as any other components that need to understand how the pod will be run. The RuntimeClassSpec is immutable.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "runtimeHandler": { + SchemaProps: spec.SchemaProps{ + Description: "RuntimeHandler specifies the underlying runtime and configuration that the CRI implementation will use to handle pods of this class. The possible values are specific to the node & CRI configuration. It is assumed that all handlers are available on every node, and handlers of the same name are equivalent on every node. For example, a handler called \"runc\" might specify that the runc OCI runtime (using native Linux containers) will be used to run the containers in a pod. The RuntimeHandler must be lowercase, conform to the DNS Label (RFC 1123) requirements, and is immutable.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "overhead": { + SchemaProps: spec.SchemaProps{ + Description: "Overhead represents the resource overhead associated with running a pod for a given RuntimeClass. For more details, see https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md This field is alpha-level as of Kubernetes v1.15, and is only honored by servers that enable the PodOverhead feature.", + Ref: ref("k8s.io/api/node/v1alpha1.Overhead"), + }, + }, + "scheduling": { + SchemaProps: spec.SchemaProps{ + Description: "Scheduling holds the scheduling constraints to ensure that pods running with this RuntimeClass are scheduled to nodes that support it. If scheduling is nil, this RuntimeClass is assumed to be supported by all nodes.", + Ref: ref("k8s.io/api/node/v1alpha1.Scheduling"), + }, + }, + }, + Required: []string{"runtimeHandler"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/node/v1alpha1.Overhead", "k8s.io/api/node/v1alpha1.Scheduling"}, + } +} + +func schema_k8sio_api_node_v1alpha1_Scheduling(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Scheduling specifies the scheduling constraints for nodes supporting a RuntimeClass.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "nodeSelector": { + SchemaProps: spec.SchemaProps{ + Description: "nodeSelector lists labels that must be present on nodes that support this RuntimeClass. Pods using this RuntimeClass can only be scheduled to a node matched by this selector. The RuntimeClass nodeSelector is merged with a pod's existing nodeSelector. Any conflicts will cause the pod to be rejected in admission.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "tolerations": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "tolerations are appended (excluding duplicates) to pods running with this RuntimeClass during admission, effectively unioning the set of nodes tolerated by the pod and the RuntimeClass.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Toleration"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Toleration"}, + } +} + +func schema_k8sio_api_node_v1beta1_Overhead(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Overhead structure represents the resource overhead associated with running a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "podFixed": { + SchemaProps: spec.SchemaProps{ + Description: "PodFixed represents the fixed resource overhead associated with running a pod.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_k8sio_api_node_v1beta1_RuntimeClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClass defines a class of container runtime supported in the cluster. The RuntimeClass is used to determine which container runtime is used to run all containers in a pod. RuntimeClasses are (currently) manually defined by a user or cluster provisioner, and referenced in the PodSpec. The Kubelet is responsible for resolving the RuntimeClassName reference before running the pod. For more details, see https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "handler": { + SchemaProps: spec.SchemaProps{ + Description: "Handler specifies the underlying runtime and configuration that the CRI implementation will use to handle pods of this class. The possible values are specific to the node & CRI configuration. It is assumed that all handlers are available on every node, and handlers of the same name are equivalent on every node. For example, a handler called \"runc\" might specify that the runc OCI runtime (using native Linux containers) will be used to run the containers in a pod. The Handler must be lowercase, conform to the DNS Label (RFC 1123) requirements, and is immutable.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "overhead": { + SchemaProps: spec.SchemaProps{ + Description: "Overhead represents the resource overhead associated with running a pod for a given RuntimeClass. For more details, see https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md This field is alpha-level as of Kubernetes v1.15, and is only honored by servers that enable the PodOverhead feature.", + Ref: ref("k8s.io/api/node/v1beta1.Overhead"), + }, + }, + "scheduling": { + SchemaProps: spec.SchemaProps{ + Description: "Scheduling holds the scheduling constraints to ensure that pods running with this RuntimeClass are scheduled to nodes that support it. If scheduling is nil, this RuntimeClass is assumed to be supported by all nodes.", + Ref: ref("k8s.io/api/node/v1beta1.Scheduling"), + }, + }, + }, + Required: []string{"handler"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/node/v1beta1.Overhead", "k8s.io/api/node/v1beta1.Scheduling", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_node_v1beta1_RuntimeClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClassList is a list of RuntimeClass objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/node/v1beta1.RuntimeClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/node/v1beta1.RuntimeClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_node_v1beta1_Scheduling(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Scheduling specifies the scheduling constraints for nodes supporting a RuntimeClass.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "nodeSelector": { + SchemaProps: spec.SchemaProps{ + Description: "nodeSelector lists labels that must be present on nodes that support this RuntimeClass. Pods using this RuntimeClass can only be scheduled to a node matched by this selector. The RuntimeClass nodeSelector is merged with a pod's existing nodeSelector. Any conflicts will cause the pod to be rejected in admission.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "tolerations": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "tolerations are appended (excluding duplicates) to pods running with this RuntimeClass during admission, effectively unioning the set of nodes tolerated by the pod and the RuntimeClass.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.Toleration"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.Toleration"}, + } +} + +func schema_k8sio_api_policy_v1beta1_AllowedCSIDriver(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AllowedCSIDriver represents a single inline CSI Driver that is allowed to be used.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the registered name of the CSI driver", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_api_policy_v1beta1_AllowedFlexVolume(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AllowedFlexVolume represents a single Flexvolume that is allowed to be used.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "driver": { + SchemaProps: spec.SchemaProps{ + Description: "driver is the name of the Flexvolume driver.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"driver"}, + }, + }, + } +} + +func schema_k8sio_api_policy_v1beta1_AllowedHostPath(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AllowedHostPath defines the host volume conditions that will be enabled by a policy for pods to use. It requires the path prefix to be defined.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "pathPrefix": { + SchemaProps: spec.SchemaProps{ + Description: "pathPrefix is the path prefix that the host volume must match. It does not support `*`. Trailing slashes are trimmed when validating the path prefix with a host path.\n\nExamples: `/foo` would allow `/foo`, `/foo/` and `/foo/bar` `/foo` would not allow `/food` or `/etc/foo`", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "when set to true, will allow host volumes matching the pathPrefix only if all volume mounts are readOnly.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_policy_v1beta1_Eviction(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Eviction evicts a pod from its node subject to certain policies and safety constraints. This is a subresource of Pod. A request to cause such an eviction is created by POSTing to .../pods//evictions.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectMeta describes the pod that is being evicted.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "deleteOptions": { + SchemaProps: spec.SchemaProps{ + Description: "DeleteOptions may be provided", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.DeleteOptions"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.DeleteOptions", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_policy_v1beta1_FSGroupStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FSGroupStrategyOptions defines the strategy type and options used to create the strategy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate what FSGroup is used in the SecurityContext.", + Type: []string{"string"}, + Format: "", + }, + }, + "ranges": { + SchemaProps: spec.SchemaProps{ + Description: "ranges are the allowed ranges of fs groups. If you would like to force a single fs group then supply a single range with the same start and end. Required for MustRunAs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.IDRange"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.IDRange"}, + } +} + +func schema_k8sio_api_policy_v1beta1_HostPortRange(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HostPortRange defines a range of host ports that will be enabled by a policy for pods to use. It requires both the start and end to be defined.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "min": { + SchemaProps: spec.SchemaProps{ + Description: "min is the start of the range, inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "max": { + SchemaProps: spec.SchemaProps{ + Description: "max is the end of the range, inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"min", "max"}, + }, + }, + } +} + +func schema_k8sio_api_policy_v1beta1_IDRange(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IDRange provides a min/max of an allowed range of IDs.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "min": { + SchemaProps: spec.SchemaProps{ + Description: "min is the start of the range, inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + "max": { + SchemaProps: spec.SchemaProps{ + Description: "max is the end of the range, inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"min", "max"}, + }, + }, + } +} + +func schema_k8sio_api_policy_v1beta1_PodDisruptionBudget(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired behavior of the PodDisruptionBudget.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.PodDisruptionBudgetSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Most recently observed status of the PodDisruptionBudget.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.PodDisruptionBudgetStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.PodDisruptionBudgetSpec", "k8s.io/api/policy/v1beta1.PodDisruptionBudgetStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_policy_v1beta1_PodDisruptionBudgetList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodDisruptionBudgetList is a collection of PodDisruptionBudgets.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.PodDisruptionBudget"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.PodDisruptionBudget", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_policy_v1beta1_PodDisruptionBudgetSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodDisruptionBudgetSpec is a description of a PodDisruptionBudget.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "minAvailable": { + SchemaProps: spec.SchemaProps{ + Description: "An eviction is allowed if at least \"minAvailable\" pods selected by \"selector\" will still be available after the eviction, i.e. even in the absence of the evicted pod. So for example you can prevent all voluntary evictions by specifying \"100%\".", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "Label query over pods whose evictions are managed by the disruption budget.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "maxUnavailable": { + SchemaProps: spec.SchemaProps{ + Description: "An eviction is allowed if at most \"maxUnavailable\" pods selected by \"selector\" are unavailable after the eviction, i.e. even in absence of the evicted pod. For example, one can prevent all voluntary evictions by specifying 0. This is a mutually exclusive setting with \"minAvailable\".", + Ref: ref("k8s.io/apimachinery/pkg/util/intstr.IntOrString"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector", "k8s.io/apimachinery/pkg/util/intstr.IntOrString"}, + } +} + +func schema_k8sio_api_policy_v1beta1_PodDisruptionBudgetStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodDisruptionBudgetStatus represents information about the status of a PodDisruptionBudget. Status may trail the actual state of a system.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "Most recent generation observed when updating this PDB status. DisruptionsAllowed and other status information is valid only if observedGeneration equals to PDB's object generation.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "disruptedPods": { + SchemaProps: spec.SchemaProps{ + Description: "DisruptedPods contains information about pods whose eviction was processed by the API server eviction subresource handler but has not yet been observed by the PodDisruptionBudget controller. A pod will be in this map from the time when the API server processed the eviction request to the time when the pod is seen by PDB controller as having been marked for deletion (or after a timeout). The key in the map is the name of the pod and the value is the time when the API server processed the eviction request. If the deletion didn't occur and a pod is still there it will be removed from the list automatically by PodDisruptionBudget controller after some time. If everything goes smooth this map should be empty for the most of the time. Large number of entries in the map may indicate problems with pod deletions.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + }, + }, + }, + "disruptionsAllowed": { + SchemaProps: spec.SchemaProps{ + Description: "Number of pod disruptions that are currently allowed.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "currentHealthy": { + SchemaProps: spec.SchemaProps{ + Description: "current number of healthy pods", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "desiredHealthy": { + SchemaProps: spec.SchemaProps{ + Description: "minimum desired number of healthy pods", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "expectedPods": { + SchemaProps: spec.SchemaProps{ + Description: "total number of pods counted by this disruption budget", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"disruptionsAllowed", "currentHealthy", "desiredHealthy", "expectedPods"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_policy_v1beta1_PodSecurityPolicy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodSecurityPolicy governs the ability to make requests that affect the Security Context that will be applied to a pod and container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec defines the policy enforced.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.PodSecurityPolicySpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.PodSecurityPolicySpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_policy_v1beta1_PodSecurityPolicyList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodSecurityPolicyList is a list of PodSecurityPolicy objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is a list of schema objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.PodSecurityPolicy"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.PodSecurityPolicy", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_policy_v1beta1_PodSecurityPolicySpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodSecurityPolicySpec defines the policy enforced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "privileged": { + SchemaProps: spec.SchemaProps{ + Description: "privileged determines if a pod can request to be run as privileged.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "defaultAddCapabilities": { + SchemaProps: spec.SchemaProps{ + Description: "defaultAddCapabilities is the default set of capabilities that will be added to the container unless the pod spec specifically drops the capability. You may not list a capability in both defaultAddCapabilities and requiredDropCapabilities. Capabilities added here are implicitly allowed, and need not be included in the allowedCapabilities list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "requiredDropCapabilities": { + SchemaProps: spec.SchemaProps{ + Description: "requiredDropCapabilities are the capabilities that will be dropped from the container. These are required to be dropped and cannot be added.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allowedCapabilities": { + SchemaProps: spec.SchemaProps{ + Description: "allowedCapabilities is a list of capabilities that can be requested to add to the container. Capabilities in this field may be added at the pod author's discretion. You must not list a capability in both allowedCapabilities and requiredDropCapabilities.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "volumes": { + SchemaProps: spec.SchemaProps{ + Description: "volumes is an allowlist of volume plugins. Empty indicates that no volumes may be used. To allow all volumes you may use '*'.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "hostNetwork": { + SchemaProps: spec.SchemaProps{ + Description: "hostNetwork determines if the policy allows the use of HostNetwork in the pod spec.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "hostPorts": { + SchemaProps: spec.SchemaProps{ + Description: "hostPorts determines which host port ranges are allowed to be exposed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.HostPortRange"), + }, + }, + }, + }, + }, + "hostPID": { + SchemaProps: spec.SchemaProps{ + Description: "hostPID determines if the policy allows the use of HostPID in the pod spec.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "hostIPC": { + SchemaProps: spec.SchemaProps{ + Description: "hostIPC determines if the policy allows the use of HostIPC in the pod spec.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "seLinux": { + SchemaProps: spec.SchemaProps{ + Description: "seLinux is the strategy that will dictate the allowable labels that may be set.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.SELinuxStrategyOptions"), + }, + }, + "runAsUser": { + SchemaProps: spec.SchemaProps{ + Description: "runAsUser is the strategy that will dictate the allowable RunAsUser values that may be set.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.RunAsUserStrategyOptions"), + }, + }, + "runAsGroup": { + SchemaProps: spec.SchemaProps{ + Description: "RunAsGroup is the strategy that will dictate the allowable RunAsGroup values that may be set. If this field is omitted, the pod's RunAsGroup can take any value. This field requires the RunAsGroup feature gate to be enabled.", + Ref: ref("k8s.io/api/policy/v1beta1.RunAsGroupStrategyOptions"), + }, + }, + "supplementalGroups": { + SchemaProps: spec.SchemaProps{ + Description: "supplementalGroups is the strategy that will dictate what supplemental groups are used by the SecurityContext.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.SupplementalGroupsStrategyOptions"), + }, + }, + "fsGroup": { + SchemaProps: spec.SchemaProps{ + Description: "fsGroup is the strategy that will dictate what fs group is used by the SecurityContext.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.FSGroupStrategyOptions"), + }, + }, + "readOnlyRootFilesystem": { + SchemaProps: spec.SchemaProps{ + Description: "readOnlyRootFilesystem when set to true will force containers to run with a read only root file system. If the container specifically requests to run with a non-read only root file system the PSP should deny the pod. If set to false the container may run with a read only root file system if it wishes but it will not be forced to.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "defaultAllowPrivilegeEscalation": { + SchemaProps: spec.SchemaProps{ + Description: "defaultAllowPrivilegeEscalation controls the default setting for whether a process can gain more privileges than its parent process.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "allowPrivilegeEscalation": { + SchemaProps: spec.SchemaProps{ + Description: "allowPrivilegeEscalation determines if a pod can request to allow privilege escalation. If unspecified, defaults to true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "allowedHostPaths": { + SchemaProps: spec.SchemaProps{ + Description: "allowedHostPaths is an allowlist of host paths. Empty indicates that all host paths may be used.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.AllowedHostPath"), + }, + }, + }, + }, + }, + "allowedFlexVolumes": { + SchemaProps: spec.SchemaProps{ + Description: "allowedFlexVolumes is an allowlist of Flexvolumes. Empty or nil indicates that all Flexvolumes may be used. This parameter is effective only when the usage of the Flexvolumes is allowed in the \"volumes\" field.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.AllowedFlexVolume"), + }, + }, + }, + }, + }, + "allowedCSIDrivers": { + SchemaProps: spec.SchemaProps{ + Description: "AllowedCSIDrivers is an allowlist of inline CSI drivers that must be explicitly set to be embedded within a pod spec. An empty value indicates that any CSI driver can be used for inline ephemeral volumes. This is a beta field, and is only honored if the API server enables the CSIInlineVolume feature gate.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.AllowedCSIDriver"), + }, + }, + }, + }, + }, + "allowedUnsafeSysctls": { + SchemaProps: spec.SchemaProps{ + Description: "allowedUnsafeSysctls is a list of explicitly allowed unsafe sysctls, defaults to none. Each entry is either a plain sysctl name or ends in \"*\" in which case it is considered as a prefix of allowed sysctls. Single * means all unsafe sysctls are allowed. Kubelet has to allowlist all allowed unsafe sysctls explicitly to avoid rejection.\n\nExamples: e.g. \"foo/*\" allows \"foo/bar\", \"foo/baz\", etc. e.g. \"foo.*\" allows \"foo.bar\", \"foo.baz\", etc.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "forbiddenSysctls": { + SchemaProps: spec.SchemaProps{ + Description: "forbiddenSysctls is a list of explicitly forbidden sysctls, defaults to none. Each entry is either a plain sysctl name or ends in \"*\" in which case it is considered as a prefix of forbidden sysctls. Single * means all sysctls are forbidden.\n\nExamples: e.g. \"foo/*\" forbids \"foo/bar\", \"foo/baz\", etc. e.g. \"foo.*\" forbids \"foo.bar\", \"foo.baz\", etc.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allowedProcMountTypes": { + SchemaProps: spec.SchemaProps{ + Description: "AllowedProcMountTypes is an allowlist of allowed ProcMountTypes. Empty or nil indicates that only the DefaultProcMountType may be used. This requires the ProcMountType feature flag to be enabled.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "runtimeClass": { + SchemaProps: spec.SchemaProps{ + Description: "runtimeClass is the strategy that will dictate the allowable RuntimeClasses for a pod. If this field is omitted, the pod's runtimeClassName field is unrestricted. Enforcement of this field depends on the RuntimeClass feature gate being enabled.", + Ref: ref("k8s.io/api/policy/v1beta1.RuntimeClassStrategyOptions"), + }, + }, + }, + Required: []string{"seLinux", "runAsUser", "supplementalGroups", "fsGroup"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.AllowedCSIDriver", "k8s.io/api/policy/v1beta1.AllowedFlexVolume", "k8s.io/api/policy/v1beta1.AllowedHostPath", "k8s.io/api/policy/v1beta1.FSGroupStrategyOptions", "k8s.io/api/policy/v1beta1.HostPortRange", "k8s.io/api/policy/v1beta1.RunAsGroupStrategyOptions", "k8s.io/api/policy/v1beta1.RunAsUserStrategyOptions", "k8s.io/api/policy/v1beta1.RuntimeClassStrategyOptions", "k8s.io/api/policy/v1beta1.SELinuxStrategyOptions", "k8s.io/api/policy/v1beta1.SupplementalGroupsStrategyOptions"}, + } +} + +func schema_k8sio_api_policy_v1beta1_RunAsGroupStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RunAsGroupStrategyOptions defines the strategy type and any options used to create the strategy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate the allowable RunAsGroup values that may be set.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ranges": { + SchemaProps: spec.SchemaProps{ + Description: "ranges are the allowed ranges of gids that may be used. If you would like to force a single gid then supply a single range with the same start and end. Required for MustRunAs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.IDRange"), + }, + }, + }, + }, + }, + }, + Required: []string{"rule"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.IDRange"}, + } +} + +func schema_k8sio_api_policy_v1beta1_RunAsUserStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RunAsUserStrategyOptions defines the strategy type and any options used to create the strategy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate the allowable RunAsUser values that may be set.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ranges": { + SchemaProps: spec.SchemaProps{ + Description: "ranges are the allowed ranges of uids that may be used. If you would like to force a single uid then supply a single range with the same start and end. Required for MustRunAs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.IDRange"), + }, + }, + }, + }, + }, + }, + Required: []string{"rule"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.IDRange"}, + } +} + +func schema_k8sio_api_policy_v1beta1_RuntimeClassStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RuntimeClassStrategyOptions define the strategy that will dictate the allowable RuntimeClasses for a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "allowedRuntimeClassNames": { + SchemaProps: spec.SchemaProps{ + Description: "allowedRuntimeClassNames is an allowlist of RuntimeClass names that may be specified on a pod. A value of \"*\" means that any RuntimeClass name is allowed, and must be the only item in the list. An empty list requires the RuntimeClassName field to be unset.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "defaultRuntimeClassName": { + SchemaProps: spec.SchemaProps{ + Description: "defaultRuntimeClassName is the default RuntimeClassName to set on the pod. The default MUST be allowed by the allowedRuntimeClassNames list. A value of nil does not mutate the Pod.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"allowedRuntimeClassNames"}, + }, + }, + } +} + +func schema_k8sio_api_policy_v1beta1_SELinuxStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SELinuxStrategyOptions defines the strategy type and any options used to create the strategy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate the allowable labels that may be set.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "seLinuxOptions": { + SchemaProps: spec.SchemaProps{ + Description: "seLinuxOptions required to run as; required for MustRunAs More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/", + Ref: ref("k8s.io/api/core/v1.SELinuxOptions"), + }, + }, + }, + Required: []string{"rule"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.SELinuxOptions"}, + } +} + +func schema_k8sio_api_policy_v1beta1_SupplementalGroupsStrategyOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SupplementalGroupsStrategyOptions defines the strategy type and options used to create the strategy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "rule": { + SchemaProps: spec.SchemaProps{ + Description: "rule is the strategy that will dictate what supplemental groups is used in the SecurityContext.", + Type: []string{"string"}, + Format: "", + }, + }, + "ranges": { + SchemaProps: spec.SchemaProps{ + Description: "ranges are the allowed ranges of supplemental groups. If you would like to force a single supplemental group then supply a single range with the same start and end. Required for MustRunAs.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/policy/v1beta1.IDRange"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/policy/v1beta1.IDRange"}, + } +} + +func schema_k8sio_api_rbac_v1_AggregationRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "clusterRoleSelectors": { + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules. If any of the selectors match, then the ClusterRole's permissions will be added", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_rbac_v1_ClusterRole(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules holds all the PolicyRules for this ClusterRole", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.PolicyRule"), + }, + }, + }, + }, + }, + "aggregationRule": { + SchemaProps: spec.SchemaProps{ + Description: "AggregationRule is an optional field that describes how to build the Rules for this ClusterRole. If AggregationRule is set, then the Rules are controller managed and direct changes to Rules will be stomped by the controller.", + Ref: ref("k8s.io/api/rbac/v1.AggregationRule"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1.AggregationRule", "k8s.io/api/rbac/v1.PolicyRule", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1_ClusterRoleBinding(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "subjects": { + SchemaProps: spec.SchemaProps{ + Description: "Subjects holds references to the objects the role applies to.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.Subject"), + }, + }, + }, + }, + }, + "roleRef": { + SchemaProps: spec.SchemaProps{ + Description: "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.RoleRef"), + }, + }, + }, + Required: []string{"roleRef"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1.RoleRef", "k8s.io/api/rbac/v1.Subject", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1_ClusterRoleBindingList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleBindingList is a collection of ClusterRoleBindings", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of ClusterRoleBindings", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.ClusterRoleBinding"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1.ClusterRoleBinding", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1_ClusterRoleList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleList is a collection of ClusterRoles", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of ClusterRoles", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.ClusterRole"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1.ClusterRole", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1_PolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyRule holds information that describes a policy rule, but does not contain information about who the rule applies to or which namespace the rule applies to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "Verbs is a list of Verbs that apply to ALL the ResourceKinds and AttributeRestrictions contained in this rule. VerbAll represents all kinds.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of the enumerated resources in any API group will be allowed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to. ResourceAll represents all resources.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resourceNames": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding. Rules can either apply to API resources (such as \"pods\" or \"secrets\") or non-resource URL paths (such as \"/api\"), but not both.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs"}, + }, + }, + } +} + +func schema_k8sio_api_rbac_v1_Role(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules holds all the PolicyRules for this Role", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.PolicyRule"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1.PolicyRule", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1_RoleBinding(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "subjects": { + SchemaProps: spec.SchemaProps{ + Description: "Subjects holds references to the objects the role applies to.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.Subject"), + }, + }, + }, + }, + }, + "roleRef": { + SchemaProps: spec.SchemaProps{ + Description: "RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.RoleRef"), + }, + }, + }, + Required: []string{"roleRef"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1.RoleRef", "k8s.io/api/rbac/v1.Subject", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1_RoleBindingList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleBindingList is a collection of RoleBindings", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of RoleBindings", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.RoleBinding"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1.RoleBinding", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1_RoleList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleList is a collection of Roles", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of Roles", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1.Role"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1.Role", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1_RoleRef(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleRef contains information that points to the role being used", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup is the group for the resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is the type of resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"apiGroup", "kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_rbac_v1_Subject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Subject contains a reference to the object or user identities a role binding applies to. This can either hold a direct API object reference, or a value for non-objects such as user and group names.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of object being referenced. Values defined by this API group are \"User\", \"Group\", and \"ServiceAccount\". If the Authorizer does not recognized the kind value, the Authorizer should report an error.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup holds the API group of the referenced subject. Defaults to \"\" for ServiceAccount subjects. Defaults to \"rbac.authorization.k8s.io\" for User and Group subjects.", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the object being referenced.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace of the referenced object. If the object kind is non-namespace, such as \"User\" or \"Group\", and this value is not empty the Authorizer should report an error.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_rbac_v1alpha1_AggregationRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "clusterRoleSelectors": { + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules. If any of the selectors match, then the ClusterRole's permissions will be added", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_ClusterRole(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRole, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules holds all the PolicyRules for this ClusterRole", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.PolicyRule"), + }, + }, + }, + }, + }, + "aggregationRule": { + SchemaProps: spec.SchemaProps{ + Description: "AggregationRule is an optional field that describes how to build the Rules for this ClusterRole. If AggregationRule is set, then the Rules are controller managed and direct changes to Rules will be stomped by the controller.", + Ref: ref("k8s.io/api/rbac/v1alpha1.AggregationRule"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1alpha1.AggregationRule", "k8s.io/api/rbac/v1alpha1.PolicyRule", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_ClusterRoleBinding(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "subjects": { + SchemaProps: spec.SchemaProps{ + Description: "Subjects holds references to the objects the role applies to.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.Subject"), + }, + }, + }, + }, + }, + "roleRef": { + SchemaProps: spec.SchemaProps{ + Description: "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.RoleRef"), + }, + }, + }, + Required: []string{"roleRef"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1alpha1.RoleRef", "k8s.io/api/rbac/v1alpha1.Subject", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_ClusterRoleBindingList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleBindingList is a collection of ClusterRoleBindings. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBindings, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of ClusterRoleBindings", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.ClusterRoleBinding"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1alpha1.ClusterRoleBinding", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_ClusterRoleList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleList is a collection of ClusterRoles. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoles, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of ClusterRoles", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.ClusterRole"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1alpha1.ClusterRole", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_PolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyRule holds information that describes a policy rule, but does not contain information about who the rule applies to or which namespace the rule applies to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "Verbs is a list of Verbs that apply to ALL the ResourceKinds and AttributeRestrictions contained in this rule. VerbAll represents all kinds.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of the enumerated resources in any API group will be allowed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to. ResourceAll represents all resources.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resourceNames": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding. Rules can either apply to API resources (such as \"pods\" or \"secrets\") or non-resource URL paths (such as \"/api\"), but not both.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs"}, + }, + }, + } +} + +func schema_k8sio_api_rbac_v1alpha1_Role(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 Role, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules holds all the PolicyRules for this Role", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.PolicyRule"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1alpha1.PolicyRule", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_RoleBinding(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBinding, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "subjects": { + SchemaProps: spec.SchemaProps{ + Description: "Subjects holds references to the objects the role applies to.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.Subject"), + }, + }, + }, + }, + }, + "roleRef": { + SchemaProps: spec.SchemaProps{ + Description: "RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.RoleRef"), + }, + }, + }, + Required: []string{"roleRef"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1alpha1.RoleRef", "k8s.io/api/rbac/v1alpha1.Subject", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_RoleBindingList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleBindingList is a collection of RoleBindings Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBindingList, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of RoleBindings", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.RoleBinding"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1alpha1.RoleBinding", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_RoleList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleList is a collection of Roles. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleList, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of Roles", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1alpha1.Role"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1alpha1.Role", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1alpha1_RoleRef(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleRef contains information that points to the role being used", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup is the group for the resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is the type of resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"apiGroup", "kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_rbac_v1alpha1_Subject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Subject contains a reference to the object or user identities a role binding applies to. This can either hold a direct API object reference, or a value for non-objects such as user and group names.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of object being referenced. Values defined by this API group are \"User\", \"Group\", and \"ServiceAccount\". If the Authorizer does not recognized the kind value, the Authorizer should report an error.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion holds the API group and version of the referenced subject. Defaults to \"v1\" for ServiceAccount subjects. Defaults to \"rbac.authorization.k8s.io/v1alpha1\" for User and Group subjects.", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the object being referenced.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace of the referenced object. If the object kind is non-namespace, such as \"User\" or \"Group\", and this value is not empty the Authorizer should report an error.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_rbac_v1beta1_AggregationRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "clusterRoleSelectors": { + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules. If any of the selectors match, then the ClusterRole's permissions will be added", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_ClusterRole(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRole, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules holds all the PolicyRules for this ClusterRole", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.PolicyRule"), + }, + }, + }, + }, + }, + "aggregationRule": { + SchemaProps: spec.SchemaProps{ + Description: "AggregationRule is an optional field that describes how to build the Rules for this ClusterRole. If AggregationRule is set, then the Rules are controller managed and direct changes to Rules will be stomped by the controller.", + Ref: ref("k8s.io/api/rbac/v1beta1.AggregationRule"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1beta1.AggregationRule", "k8s.io/api/rbac/v1beta1.PolicyRule", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_ClusterRoleBinding(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "subjects": { + SchemaProps: spec.SchemaProps{ + Description: "Subjects holds references to the objects the role applies to.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.Subject"), + }, + }, + }, + }, + }, + "roleRef": { + SchemaProps: spec.SchemaProps{ + Description: "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.RoleRef"), + }, + }, + }, + Required: []string{"roleRef"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1beta1.RoleRef", "k8s.io/api/rbac/v1beta1.Subject", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_ClusterRoleBindingList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleBindingList is a collection of ClusterRoleBindings. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBindingList, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of ClusterRoleBindings", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.ClusterRoleBinding"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1beta1.ClusterRoleBinding", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_ClusterRoleList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ClusterRoleList is a collection of ClusterRoles. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoles, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of ClusterRoles", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.ClusterRole"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1beta1.ClusterRole", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_PolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyRule holds information that describes a policy rule, but does not contain information about who the rule applies to or which namespace the rule applies to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "Verbs is a list of Verbs that apply to ALL the ResourceKinds and AttributeRestrictions contained in this rule. VerbAll represents all kinds.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "apiGroups": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of the enumerated resources in any API group will be allowed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to. '*' represents all resources in the specified apiGroups. '*/foo' represents the subresource 'foo' for all resources in the specified apiGroups.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resourceNames": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding. Rules can either apply to API resources (such as \"pods\" or \"secrets\") or non-resource URL paths (such as \"/api\"), but not both.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"verbs"}, + }, + }, + } +} + +func schema_k8sio_api_rbac_v1beta1_Role(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 Role, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules holds all the PolicyRules for this Role", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.PolicyRule"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1beta1.PolicyRule", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_RoleBinding(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBinding, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "subjects": { + SchemaProps: spec.SchemaProps{ + Description: "Subjects holds references to the objects the role applies to.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.Subject"), + }, + }, + }, + }, + }, + "roleRef": { + SchemaProps: spec.SchemaProps{ + Description: "RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.RoleRef"), + }, + }, + }, + Required: []string{"roleRef"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1beta1.RoleRef", "k8s.io/api/rbac/v1beta1.Subject", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_RoleBindingList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleBindingList is a collection of RoleBindings Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBindingList, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of RoleBindings", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.RoleBinding"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1beta1.RoleBinding", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_RoleList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleList is a collection of Roles Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleList, and will no longer be served in v1.22.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is a list of Roles", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/rbac/v1beta1.Role"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/rbac/v1beta1.Role", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_rbac_v1beta1_RoleRef(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RoleRef contains information that points to the role being used", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup is the group for the resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is the type of resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of resource being referenced", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"apiGroup", "kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_rbac_v1beta1_Subject(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Subject contains a reference to the object or user identities a role binding applies to. This can either hold a direct API object reference, or a value for non-objects such as user and group names.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of object being referenced. Values defined by this API group are \"User\", \"Group\", and \"ServiceAccount\". If the Authorizer does not recognized the kind value, the Authorizer should report an error.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup holds the API group of the referenced subject. Defaults to \"\" for ServiceAccount subjects. Defaults to \"rbac.authorization.k8s.io\" for User and Group subjects.", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the object being referenced.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace of the referenced object. If the object kind is non-namespace, such as \"User\" or \"Group\", and this value is not empty the Authorizer should report an error.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"kind", "name"}, + }, + }, + } +} + +func schema_k8sio_api_scheduling_v1_PriorityClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "The value of this priority class. This is the actual priority that pods receive when they have the name of this class in their pod spec.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "globalDefault": { + SchemaProps: spec.SchemaProps{ + Description: "globalDefault specifies whether this PriorityClass should be considered as the default priority for pods that do not have any priority class. Only one PriorityClass can be marked as `globalDefault`. However, if more than one PriorityClasses exists with their `globalDefault` field set to true, the smallest value of such global default PriorityClasses will be used as the default priority.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "description": { + SchemaProps: spec.SchemaProps{ + Description: "description is an arbitrary string that usually provides guidelines on when this priority class should be used.", + Type: []string{"string"}, + Format: "", + }, + }, + "preemptionPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "PreemptionPolicy is the Policy for preempting pods with lower priority. One of Never, PreemptLowerPriority. Defaults to PreemptLowerPriority if unset. This field is beta-level, gated by the NonPreemptingPriority feature-gate.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"value"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_scheduling_v1_PriorityClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityClassList is a collection of priority classes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of PriorityClasses", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/scheduling/v1.PriorityClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/scheduling/v1.PriorityClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_scheduling_v1alpha1_PriorityClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of PriorityClass is deprecated by scheduling.k8s.io/v1/PriorityClass. PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "The value of this priority class. This is the actual priority that pods receive when they have the name of this class in their pod spec.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "globalDefault": { + SchemaProps: spec.SchemaProps{ + Description: "globalDefault specifies whether this PriorityClass should be considered as the default priority for pods that do not have any priority class. Only one PriorityClass can be marked as `globalDefault`. However, if more than one PriorityClasses exists with their `globalDefault` field set to true, the smallest value of such global default PriorityClasses will be used as the default priority.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "description": { + SchemaProps: spec.SchemaProps{ + Description: "description is an arbitrary string that usually provides guidelines on when this priority class should be used.", + Type: []string{"string"}, + Format: "", + }, + }, + "preemptionPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "PreemptionPolicy is the Policy for preempting pods with lower priority. One of Never, PreemptLowerPriority. Defaults to PreemptLowerPriority if unset. This field is beta-level, gated by the NonPreemptingPriority feature-gate.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"value"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_scheduling_v1alpha1_PriorityClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityClassList is a collection of priority classes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of PriorityClasses", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/scheduling/v1alpha1.PriorityClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/scheduling/v1alpha1.PriorityClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_scheduling_v1beta1_PriorityClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of PriorityClass is deprecated by scheduling.k8s.io/v1/PriorityClass. PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "The value of this priority class. This is the actual priority that pods receive when they have the name of this class in their pod spec.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "globalDefault": { + SchemaProps: spec.SchemaProps{ + Description: "globalDefault specifies whether this PriorityClass should be considered as the default priority for pods that do not have any priority class. Only one PriorityClass can be marked as `globalDefault`. However, if more than one PriorityClasses exists with their `globalDefault` field set to true, the smallest value of such global default PriorityClasses will be used as the default priority.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "description": { + SchemaProps: spec.SchemaProps{ + Description: "description is an arbitrary string that usually provides guidelines on when this priority class should be used.", + Type: []string{"string"}, + Format: "", + }, + }, + "preemptionPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "PreemptionPolicy is the Policy for preempting pods with lower priority. One of Never, PreemptLowerPriority. Defaults to PreemptLowerPriority if unset. This field is beta-level, gated by the NonPreemptingPriority feature-gate.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"value"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_scheduling_v1beta1_PriorityClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityClassList is a collection of priority classes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of PriorityClasses", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/scheduling/v1beta1.PriorityClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/scheduling/v1beta1.PriorityClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1_CSIDriver(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSIDriver captures information about a Container Storage Interface (CSI) volume driver deployed on the cluster. Kubernetes attach detach controller uses this object to determine whether attach is required. Kubelet uses this object to determine whether pod information needs to be passed on mount. CSIDriver objects are non-namespaced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata. metadata.Name indicates the name of the CSI driver that this object refers to; it MUST be the same name returned by the CSI GetPluginName() call for that driver. The driver name must be 63 characters or less, beginning and ending with an alphanumeric character ([a-z0-9A-Z]) with dashes (-), dots (.), and alphanumerics between. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the CSI Driver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.CSIDriverSpec"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.CSIDriverSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1_CSIDriverList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSIDriverList is a collection of CSIDriver objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of CSIDriver", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.CSIDriver"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.CSIDriver", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1_CSIDriverSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSIDriverSpec is the specification of a CSIDriver.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "attachRequired": { + SchemaProps: spec.SchemaProps{ + Description: "attachRequired indicates this CSI volume driver requires an attach operation (because it implements the CSI ControllerPublishVolume() method), and that the Kubernetes attach detach controller should call the attach volume interface which checks the volumeattachment status and waits until the volume is attached before proceeding to mounting. The CSI external-attacher coordinates with CSI volume driver and updates the volumeattachment status when the attach operation is complete. If the CSIDriverRegistry feature gate is enabled and the value is specified to false, the attach operation will be skipped. Otherwise the attach operation will be called.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "podInfoOnMount": { + SchemaProps: spec.SchemaProps{ + Description: "If set to true, podInfoOnMount indicates this CSI volume driver requires additional pod information (like podName, podUID, etc.) during mount operations. If set to false, pod information will not be passed on mount. Default is false. The CSI driver specifies podInfoOnMount as part of driver deployment. If true, Kubelet will pass pod information as VolumeContext in the CSI NodePublishVolume() calls. The CSI driver is responsible for parsing and validating the information passed in as VolumeContext. The following VolumeConext will be passed if podInfoOnMount is set to true. This list might grow, but the prefix will be used. \"csi.storage.k8s.io/pod.name\": pod.Name \"csi.storage.k8s.io/pod.namespace\": pod.Namespace \"csi.storage.k8s.io/pod.uid\": string(pod.UID) \"csi.storage.k8s.io/ephemeral\": \"true\" iff the volume is an ephemeral inline volume\n defined by a CSIVolumeSource, otherwise \"false\"\n\n\"csi.storage.k8s.io/ephemeral\" is a new feature in Kubernetes 1.16. It is only required for drivers which support both the \"Persistent\" and \"Ephemeral\" VolumeLifecycleMode. Other drivers can leave pod info disabled and/or ignore this field. As Kubernetes 1.15 doesn't support this field, drivers can only support one mode when deployed on such a cluster and the deployment determines which mode that is, for example via a command line parameter of the driver.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "volumeLifecycleModes": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "volumeLifecycleModes defines what kind of volumes this CSI volume driver supports. The default if the list is empty is \"Persistent\", which is the usage defined by the CSI specification and implemented in Kubernetes via the usual PV/PVC mechanism. The other mode is \"Ephemeral\". In this mode, volumes are defined inline inside the pod spec with CSIVolumeSource and their lifecycle is tied to the lifecycle of that pod. A driver has to be aware of this because it is only going to get a NodePublishVolume call for such a volume. For more information about implementing this mode, see https://kubernetes-csi.github.io/docs/ephemeral-local-volumes.html A driver can support one or more of these modes and more modes may be added in the future. This field is beta.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "storageCapacity": { + SchemaProps: spec.SchemaProps{ + Description: "If set to true, storageCapacity indicates that the CSI volume driver wants pod scheduling to consider the storage capacity that the driver deployment will report by creating CSIStorageCapacity objects with capacity information.\n\nThe check can be enabled immediately when deploying a driver. In that case, provisioning new volumes with late binding will pause until the driver deployment has published some suitable CSIStorageCapacity object.\n\nAlternatively, the driver can be deployed with the field unset or false and it can be flipped later when storage capacity information has been published.\n\nThis is an alpha field and only available when the CSIStorageCapacity feature is enabled. The default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "fsGroupPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Defines if the underlying volume supports changing ownership and permission of the volume before being mounted. Refer to the specific FSGroupPolicy values for additional details. This field is alpha-level, and is only honored by servers that enable the CSIVolumeFSGroupPolicy feature gate.", + Type: []string{"string"}, + Format: "", + }, + }, + "tokenRequests": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "TokenRequests indicates the CSI driver needs pods' service account tokens it is mounting volume for to do necessary authentication. Kubelet will pass the tokens in VolumeContext in the CSI NodePublishVolume calls. The CSI driver should parse and validate the following VolumeContext: \"csi.storage.k8s.io/serviceAccount.tokens\": {\n \"\": {\n \"token\": ,\n \"expirationTimestamp\": ,\n },\n ...\n}\n\nNote: Audience in each TokenRequest should be different and at most one token is empty string. To receive a new token after expiry, RequiresRepublish can be used to trigger NodePublishVolume periodically.\n\nThis is an alpha feature and only available when the CSIServiceAccountToken feature is enabled.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.TokenRequest"), + }, + }, + }, + }, + }, + "requiresRepublish": { + SchemaProps: spec.SchemaProps{ + Description: "RequiresRepublish indicates the CSI driver wants `NodePublishVolume` being periodically called to reflect any possible change in the mounted volume. This field defaults to false.\n\nNote: After a successful initial NodePublishVolume call, subsequent calls to NodePublishVolume should only update the contents of the volume. New mount points will not be seen by a running container.\n\nThis is an alpha feature and only available when the CSIServiceAccountToken feature is enabled.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.TokenRequest"}, + } +} + +func schema_k8sio_api_storage_v1_CSINode(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSINode holds information about all CSI drivers installed on a node. CSI drivers do not need to create the CSINode object directly. As long as they use the node-driver-registrar sidecar container, the kubelet will automatically populate the CSINode object for the CSI driver as part of kubelet plugin registration. CSINode has the same name as a node. If the object is missing, it means either there are no CSI Drivers available on the node, or the Kubelet version is low enough that it doesn't create this object. CSINode has an OwnerReference that points to the corresponding node object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "metadata.name must be the Kubernetes node name.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec is the specification of CSINode", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.CSINodeSpec"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.CSINodeSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1_CSINodeDriver(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSINodeDriver holds information about the specification of one CSI driver installed on a node", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "This is the name of the CSI driver that this object refers to. This MUST be the same name returned by the CSI GetPluginName() call for that driver.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "nodeID": { + SchemaProps: spec.SchemaProps{ + Description: "nodeID of the node from the driver point of view. This field enables Kubernetes to communicate with storage systems that do not share the same nomenclature for nodes. For example, Kubernetes may refer to a given node as \"node1\", but the storage system may refer to the same node as \"nodeA\". When Kubernetes issues a command to the storage system to attach a volume to a specific node, it can use this field to refer to the node name using the ID that the storage system will understand, e.g. \"nodeA\" instead of \"node1\". This field is required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "topologyKeys": { + SchemaProps: spec.SchemaProps{ + Description: "topologyKeys is the list of keys supported by the driver. When a driver is initialized on a cluster, it provides a set of topology keys that it understands (e.g. \"company.com/zone\", \"company.com/region\"). When a driver is initialized on a node, it provides the same topology keys along with values. Kubelet will expose these topology keys as labels on its own node object. When Kubernetes does topology aware provisioning, it can use this list to determine which labels it should retrieve from the node object and pass back to the driver. It is possible for different nodes to use different topology keys. This can be empty if driver does not support topology.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allocatable": { + SchemaProps: spec.SchemaProps{ + Description: "allocatable represents the volume resources of a node that are available for scheduling. This field is beta.", + Ref: ref("k8s.io/api/storage/v1.VolumeNodeResources"), + }, + }, + }, + Required: []string{"name", "nodeID"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.VolumeNodeResources"}, + } +} + +func schema_k8sio_api_storage_v1_CSINodeList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSINodeList is a collection of CSINode objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of CSINode", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.CSINode"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.CSINode", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1_CSINodeSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSINodeSpec holds information about the specification of all CSI drivers installed on a node", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "drivers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "drivers is a list of information of all CSI Drivers existing on a node. If all drivers in the list are uninstalled, this can become empty.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.CSINodeDriver"), + }, + }, + }, + }, + }, + }, + Required: []string{"drivers"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.CSINodeDriver"}, + } +} + +func schema_k8sio_api_storage_v1_StorageClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "provisioner": { + SchemaProps: spec.SchemaProps{ + Description: "Provisioner indicates the type of the provisioner.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "parameters": { + SchemaProps: spec.SchemaProps{ + Description: "Parameters holds the parameters for the provisioner that should create volumes of this storage class.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "reclaimPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Dynamically provisioned PersistentVolumes of this storage class are created with this reclaimPolicy. Defaults to Delete.", + Type: []string{"string"}, + Format: "", + }, + }, + "mountOptions": { + SchemaProps: spec.SchemaProps{ + Description: "Dynamically provisioned PersistentVolumes of this storage class are created with these mountOptions, e.g. [\"ro\", \"soft\"]. Not validated - mount of the PVs will simply fail if one is invalid.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allowVolumeExpansion": { + SchemaProps: spec.SchemaProps{ + Description: "AllowVolumeExpansion shows whether the storage class allow volume expand", + Type: []string{"boolean"}, + Format: "", + }, + }, + "volumeBindingMode": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeBindingMode indicates how PersistentVolumeClaims should be provisioned and bound. When unset, VolumeBindingImmediate is used. This field is only honored by servers that enable the VolumeScheduling feature.", + Type: []string{"string"}, + Format: "", + }, + }, + "allowedTopologies": { + SchemaProps: spec.SchemaProps{ + Description: "Restrict the node topologies where volumes can be dynamically provisioned. Each volume plugin defines its own supported topology specifications. An empty TopologySelectorTerm list means there is no topology restriction. This field is only honored by servers that enable the VolumeScheduling feature.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.TopologySelectorTerm"), + }, + }, + }, + }, + }, + }, + Required: []string{"provisioner"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TopologySelectorTerm", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1_StorageClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StorageClassList is a collection of storage classes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of StorageClasses", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.StorageClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.StorageClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1_TokenRequest(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenRequest contains parameters of a service account token.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "audience": { + SchemaProps: spec.SchemaProps{ + Description: "Audience is the intended audience of the token in \"TokenRequestSpec\". It will default to the audiences of kube apiserver.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "expirationSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "ExpirationSeconds is the duration of validity of the token in \"TokenRequestSpec\". It has the same default value of \"ExpirationSeconds\" in \"TokenRequestSpec\".", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"audience"}, + }, + }, + } +} + +func schema_k8sio_api_storage_v1_VolumeAttachment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired attach/detach volume behavior. Populated by the Kubernetes system.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.VolumeAttachmentSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the VolumeAttachment request. Populated by the entity completing the attach or detach operation, i.e. the external-attacher.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.VolumeAttachmentStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.VolumeAttachmentSpec", "k8s.io/api/storage/v1.VolumeAttachmentStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1_VolumeAttachmentList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentList is a collection of VolumeAttachment objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of VolumeAttachments", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.VolumeAttachment"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.VolumeAttachment", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1_VolumeAttachmentSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentSource represents a volume that should be attached. Right now only PersistenVolumes can be attached via external attacher, in future we may allow also inline volumes in pods. Exactly one member can be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "persistentVolumeName": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the persistent volume to attach.", + Type: []string{"string"}, + Format: "", + }, + }, + "inlineVolumeSpec": { + SchemaProps: spec.SchemaProps{ + Description: "inlineVolumeSpec contains all the information necessary to attach a persistent volume defined by a pod's inline VolumeSource. This field is populated only for the CSIMigration feature. It contains translated fields from a pod's inline VolumeSource to a PersistentVolumeSpec. This field is alpha-level and is only honored by servers that enabled the CSIMigration feature.", + Ref: ref("k8s.io/api/core/v1.PersistentVolumeSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeSpec"}, + } +} + +func schema_k8sio_api_storage_v1_VolumeAttachmentSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentSpec is the specification of a VolumeAttachment request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "attacher": { + SchemaProps: spec.SchemaProps{ + Description: "Attacher indicates the name of the volume driver that MUST handle this request. This is the name returned by GetPluginName().", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "source": { + SchemaProps: spec.SchemaProps{ + Description: "Source represents the volume that should be attached.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1.VolumeAttachmentSource"), + }, + }, + "nodeName": { + SchemaProps: spec.SchemaProps{ + Description: "The node that the volume should be attached to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"attacher", "source", "nodeName"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.VolumeAttachmentSource"}, + } +} + +func schema_k8sio_api_storage_v1_VolumeAttachmentStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentStatus is the status of a VolumeAttachment request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "attached": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates the volume is successfully attached. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "attachmentMetadata": { + SchemaProps: spec.SchemaProps{ + Description: "Upon successful attach, this field is populated with any information returned by the attach operation that must be passed into subsequent WaitForAttach or Mount calls. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "attachError": { + SchemaProps: spec.SchemaProps{ + Description: "The last error encountered during attach operation, if any. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Ref: ref("k8s.io/api/storage/v1.VolumeError"), + }, + }, + "detachError": { + SchemaProps: spec.SchemaProps{ + Description: "The last error encountered during detach operation, if any. This field must only be set by the entity completing the detach operation, i.e. the external-attacher.", + Ref: ref("k8s.io/api/storage/v1.VolumeError"), + }, + }, + }, + Required: []string{"attached"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1.VolumeError"}, + } +} + +func schema_k8sio_api_storage_v1_VolumeError(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeError captures an error encountered during a volume operation.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "time": { + SchemaProps: spec.SchemaProps{ + Description: "Time the error was encountered.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "String detailing the error encountered during Attach or Detach operation. This string may be logged, so it should not contain sensitive information.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_storage_v1_VolumeNodeResources(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeNodeResources is a set of resource limits for scheduling of volumes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "count": { + SchemaProps: spec.SchemaProps{ + Description: "Maximum number of unique volumes managed by the CSI driver that can be used on a node. A volume that is both attached and mounted on a node is considered to be used once, not twice. The same rule applies for a unique volume that is shared among multiple pods on the same node. If this field is not specified, then the supported number of volumes on this node is unbounded.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_api_storage_v1alpha1_CSIStorageCapacity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSIStorageCapacity stores the result of one CSI GetCapacity call. For a given StorageClass, this describes the available capacity in a particular topology segment. This can be used when considering where to instantiate new PersistentVolumes.\n\nFor example this can express things like: - StorageClass \"standard\" has \"1234 GiB\" available in \"topology.kubernetes.io/zone=us-east1\" - StorageClass \"localssd\" has \"10 GiB\" available in \"kubernetes.io/hostname=knode-abc123\"\n\nThe following three cases all imply that no capacity is available for a certain combination: - no object exists with suitable topology and storage class name - such an object exists, but the capacity is unset - such an object exists, but the capacity is zero\n\nThe producer of these objects can decide which approach is more suitable.\n\nThis is an alpha feature and only available when the CSIStorageCapacity feature is enabled.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. The name has no particular meaning. It must be be a DNS subdomain (dots allowed, 253 characters). To ensure that there are no conflicts with other CSI drivers on the cluster, the recommendation is to use csisc-, a generated name, or a reverse-domain name which ends with the unique CSI driver name.\n\nObjects are namespaced.\n\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "nodeTopology": { + SchemaProps: spec.SchemaProps{ + Description: "NodeTopology defines which nodes have access to the storage for which capacity was reported. If not set, the storage is not accessible from any node in the cluster. If empty, the storage is accessible from all nodes. This field is immutable.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + "storageClassName": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the StorageClass that the reported capacity applies to. It must meet the same requirements as the name of a StorageClass object (non-empty, DNS subdomain). If that object no longer exists, the CSIStorageCapacity object is obsolete and should be removed by its creator. This field is immutable.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "capacity": { + SchemaProps: spec.SchemaProps{ + Description: "Capacity is the value reported by the CSI driver in its GetCapacityResponse for a GetCapacityRequest with topology and parameters that match the previous fields.\n\nThe semantic is currently (CSI spec 1.2) defined as: The available capacity, in bytes, of the storage that can be used to provision volumes. If not set, that information is currently unavailable and treated like zero capacity.", + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"storageClassName"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1alpha1_CSIStorageCapacityList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSIStorageCapacityList is a collection of CSIStorageCapacity objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of CSIStorageCapacity objects.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1alpha1.CSIStorageCapacity"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1alpha1.CSIStorageCapacity", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1alpha1_VolumeAttachment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired attach/detach volume behavior. Populated by the Kubernetes system.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1alpha1.VolumeAttachmentSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the VolumeAttachment request. Populated by the entity completing the attach or detach operation, i.e. the external-attacher.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1alpha1.VolumeAttachmentStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1alpha1.VolumeAttachmentSpec", "k8s.io/api/storage/v1alpha1.VolumeAttachmentStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1alpha1_VolumeAttachmentList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentList is a collection of VolumeAttachment objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of VolumeAttachments", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1alpha1.VolumeAttachment"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1alpha1.VolumeAttachment", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1alpha1_VolumeAttachmentSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentSource represents a volume that should be attached. Right now only PersistenVolumes can be attached via external attacher, in future we may allow also inline volumes in pods. Exactly one member can be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "persistentVolumeName": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the persistent volume to attach.", + Type: []string{"string"}, + Format: "", + }, + }, + "inlineVolumeSpec": { + SchemaProps: spec.SchemaProps{ + Description: "inlineVolumeSpec contains all the information necessary to attach a persistent volume defined by a pod's inline VolumeSource. This field is populated only for the CSIMigration feature. It contains translated fields from a pod's inline VolumeSource to a PersistentVolumeSpec. This field is alpha-level and is only honored by servers that enabled the CSIMigration feature.", + Ref: ref("k8s.io/api/core/v1.PersistentVolumeSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeSpec"}, + } +} + +func schema_k8sio_api_storage_v1alpha1_VolumeAttachmentSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentSpec is the specification of a VolumeAttachment request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "attacher": { + SchemaProps: spec.SchemaProps{ + Description: "Attacher indicates the name of the volume driver that MUST handle this request. This is the name returned by GetPluginName().", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "source": { + SchemaProps: spec.SchemaProps{ + Description: "Source represents the volume that should be attached.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1alpha1.VolumeAttachmentSource"), + }, + }, + "nodeName": { + SchemaProps: spec.SchemaProps{ + Description: "The node that the volume should be attached to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"attacher", "source", "nodeName"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1alpha1.VolumeAttachmentSource"}, + } +} + +func schema_k8sio_api_storage_v1alpha1_VolumeAttachmentStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentStatus is the status of a VolumeAttachment request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "attached": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates the volume is successfully attached. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "attachmentMetadata": { + SchemaProps: spec.SchemaProps{ + Description: "Upon successful attach, this field is populated with any information returned by the attach operation that must be passed into subsequent WaitForAttach or Mount calls. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "attachError": { + SchemaProps: spec.SchemaProps{ + Description: "The last error encountered during attach operation, if any. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Ref: ref("k8s.io/api/storage/v1alpha1.VolumeError"), + }, + }, + "detachError": { + SchemaProps: spec.SchemaProps{ + Description: "The last error encountered during detach operation, if any. This field must only be set by the entity completing the detach operation, i.e. the external-attacher.", + Ref: ref("k8s.io/api/storage/v1alpha1.VolumeError"), + }, + }, + }, + Required: []string{"attached"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1alpha1.VolumeError"}, + } +} + +func schema_k8sio_api_storage_v1alpha1_VolumeError(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeError captures an error encountered during a volume operation.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "time": { + SchemaProps: spec.SchemaProps{ + Description: "Time the error was encountered.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "String detailing the error encountered during Attach or Detach operation. This string maybe logged, so it should not contain sensitive information.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_storage_v1beta1_CSIDriver(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSIDriver captures information about a Container Storage Interface (CSI) volume driver deployed on the cluster. CSI drivers do not need to create the CSIDriver object directly. Instead they may use the cluster-driver-registrar sidecar container. When deployed with a CSI driver it automatically creates a CSIDriver object representing the driver. Kubernetes attach detach controller uses this object to determine whether attach is required. Kubelet uses this object to determine whether pod information needs to be passed on mount. CSIDriver objects are non-namespaced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata. metadata.Name indicates the name of the CSI driver that this object refers to; it MUST be the same name returned by the CSI GetPluginName() call for that driver. The driver name must be 63 characters or less, beginning and ending with an alphanumeric character ([a-z0-9A-Z]) with dashes (-), dots (.), and alphanumerics between. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the CSI Driver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.CSIDriverSpec"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.CSIDriverSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1beta1_CSIDriverList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSIDriverList is a collection of CSIDriver objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of CSIDriver", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.CSIDriver"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.CSIDriver", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1beta1_CSIDriverSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSIDriverSpec is the specification of a CSIDriver.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "attachRequired": { + SchemaProps: spec.SchemaProps{ + Description: "attachRequired indicates this CSI volume driver requires an attach operation (because it implements the CSI ControllerPublishVolume() method), and that the Kubernetes attach detach controller should call the attach volume interface which checks the volumeattachment status and waits until the volume is attached before proceeding to mounting. The CSI external-attacher coordinates with CSI volume driver and updates the volumeattachment status when the attach operation is complete. If the CSIDriverRegistry feature gate is enabled and the value is specified to false, the attach operation will be skipped. Otherwise the attach operation will be called.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "podInfoOnMount": { + SchemaProps: spec.SchemaProps{ + Description: "If set to true, podInfoOnMount indicates this CSI volume driver requires additional pod information (like podName, podUID, etc.) during mount operations. If set to false, pod information will not be passed on mount. Default is false. The CSI driver specifies podInfoOnMount as part of driver deployment. If true, Kubelet will pass pod information as VolumeContext in the CSI NodePublishVolume() calls. The CSI driver is responsible for parsing and validating the information passed in as VolumeContext. The following VolumeConext will be passed if podInfoOnMount is set to true. This list might grow, but the prefix will be used. \"csi.storage.k8s.io/pod.name\": pod.Name \"csi.storage.k8s.io/pod.namespace\": pod.Namespace \"csi.storage.k8s.io/pod.uid\": string(pod.UID) \"csi.storage.k8s.io/ephemeral\": \"true\" iff the volume is an ephemeral inline volume\n defined by a CSIVolumeSource, otherwise \"false\"\n\n\"csi.storage.k8s.io/ephemeral\" is a new feature in Kubernetes 1.16. It is only required for drivers which support both the \"Persistent\" and \"Ephemeral\" VolumeLifecycleMode. Other drivers can leave pod info disabled and/or ignore this field. As Kubernetes 1.15 doesn't support this field, drivers can only support one mode when deployed on such a cluster and the deployment determines which mode that is, for example via a command line parameter of the driver.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "volumeLifecycleModes": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeLifecycleModes defines what kind of volumes this CSI volume driver supports. The default if the list is empty is \"Persistent\", which is the usage defined by the CSI specification and implemented in Kubernetes via the usual PV/PVC mechanism. The other mode is \"Ephemeral\". In this mode, volumes are defined inline inside the pod spec with CSIVolumeSource and their lifecycle is tied to the lifecycle of that pod. A driver has to be aware of this because it is only going to get a NodePublishVolume call for such a volume. For more information about implementing this mode, see https://kubernetes-csi.github.io/docs/ephemeral-local-volumes.html A driver can support one or more of these modes and more modes may be added in the future.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "storageCapacity": { + SchemaProps: spec.SchemaProps{ + Description: "If set to true, storageCapacity indicates that the CSI volume driver wants pod scheduling to consider the storage capacity that the driver deployment will report by creating CSIStorageCapacity objects with capacity information.\n\nThe check can be enabled immediately when deploying a driver. In that case, provisioning new volumes with late binding will pause until the driver deployment has published some suitable CSIStorageCapacity object.\n\nAlternatively, the driver can be deployed with the field unset or false and it can be flipped later when storage capacity information has been published.\n\nThis is an alpha field and only available when the CSIStorageCapacity feature is enabled. The default is false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "fsGroupPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Defines if the underlying volume supports changing ownership and permission of the volume before being mounted. Refer to the specific FSGroupPolicy values for additional details. This field is alpha-level, and is only honored by servers that enable the CSIVolumeFSGroupPolicy feature gate.", + Type: []string{"string"}, + Format: "", + }, + }, + "tokenRequests": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "TokenRequests indicates the CSI driver needs pods' service account tokens it is mounting volume for to do necessary authentication. Kubelet will pass the tokens in VolumeContext in the CSI NodePublishVolume calls. The CSI driver should parse and validate the following VolumeContext: \"csi.storage.k8s.io/serviceAccount.tokens\": {\n \"\": {\n \"token\": ,\n \"expirationTimestamp\": ,\n },\n ...\n}\n\nNote: Audience in each TokenRequest should be different and at most one token is empty string. To receive a new token after expiry, RequiresRepublish can be used to trigger NodePublishVolume periodically.\n\nThis is an alpha feature and only available when the CSIServiceAccountToken feature is enabled.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.TokenRequest"), + }, + }, + }, + }, + }, + "requiresRepublish": { + SchemaProps: spec.SchemaProps{ + Description: "RequiresRepublish indicates the CSI driver wants `NodePublishVolume` being periodically called to reflect any possible change in the mounted volume. This field defaults to false.\n\nNote: After a successful initial NodePublishVolume call, subsequent calls to NodePublishVolume should only update the contents of the volume. New mount points will not be seen by a running container.\n\nThis is an alpha feature and only available when the CSIServiceAccountToken feature is enabled.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.TokenRequest"}, + } +} + +func schema_k8sio_api_storage_v1beta1_CSINode(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED - This group version of CSINode is deprecated by storage/v1/CSINode. See the release notes for more information. CSINode holds information about all CSI drivers installed on a node. CSI drivers do not need to create the CSINode object directly. As long as they use the node-driver-registrar sidecar container, the kubelet will automatically populate the CSINode object for the CSI driver as part of kubelet plugin registration. CSINode has the same name as a node. If the object is missing, it means either there are no CSI Drivers available on the node, or the Kubelet version is low enough that it doesn't create this object. CSINode has an OwnerReference that points to the corresponding node object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "metadata.name must be the Kubernetes node name.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec is the specification of CSINode", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.CSINodeSpec"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.CSINodeSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1beta1_CSINodeDriver(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSINodeDriver holds information about the specification of one CSI driver installed on a node", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "This is the name of the CSI driver that this object refers to. This MUST be the same name returned by the CSI GetPluginName() call for that driver.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "nodeID": { + SchemaProps: spec.SchemaProps{ + Description: "nodeID of the node from the driver point of view. This field enables Kubernetes to communicate with storage systems that do not share the same nomenclature for nodes. For example, Kubernetes may refer to a given node as \"node1\", but the storage system may refer to the same node as \"nodeA\". When Kubernetes issues a command to the storage system to attach a volume to a specific node, it can use this field to refer to the node name using the ID that the storage system will understand, e.g. \"nodeA\" instead of \"node1\". This field is required.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "topologyKeys": { + SchemaProps: spec.SchemaProps{ + Description: "topologyKeys is the list of keys supported by the driver. When a driver is initialized on a cluster, it provides a set of topology keys that it understands (e.g. \"company.com/zone\", \"company.com/region\"). When a driver is initialized on a node, it provides the same topology keys along with values. Kubelet will expose these topology keys as labels on its own node object. When Kubernetes does topology aware provisioning, it can use this list to determine which labels it should retrieve from the node object and pass back to the driver. It is possible for different nodes to use different topology keys. This can be empty if driver does not support topology.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allocatable": { + SchemaProps: spec.SchemaProps{ + Description: "allocatable represents the volume resources of a node that are available for scheduling.", + Ref: ref("k8s.io/api/storage/v1beta1.VolumeNodeResources"), + }, + }, + }, + Required: []string{"name", "nodeID"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.VolumeNodeResources"}, + } +} + +func schema_k8sio_api_storage_v1beta1_CSINodeList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSINodeList is a collection of CSINode objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items is the list of CSINode", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.CSINode"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.CSINode", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1beta1_CSINodeSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSINodeSpec holds information about the specification of all CSI drivers installed on a node", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "drivers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "name", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "drivers is a list of information of all CSI Drivers existing on a node. If all drivers in the list are uninstalled, this can become empty.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.CSINodeDriver"), + }, + }, + }, + }, + }, + }, + Required: []string{"drivers"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.CSINodeDriver"}, + } +} + +func schema_k8sio_api_storage_v1beta1_StorageClass(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "provisioner": { + SchemaProps: spec.SchemaProps{ + Description: "Provisioner indicates the type of the provisioner.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "parameters": { + SchemaProps: spec.SchemaProps{ + Description: "Parameters holds the parameters for the provisioner that should create volumes of this storage class.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "reclaimPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Dynamically provisioned PersistentVolumes of this storage class are created with this reclaimPolicy. Defaults to Delete.", + Type: []string{"string"}, + Format: "", + }, + }, + "mountOptions": { + SchemaProps: spec.SchemaProps{ + Description: "Dynamically provisioned PersistentVolumes of this storage class are created with these mountOptions, e.g. [\"ro\", \"soft\"]. Not validated - mount of the PVs will simply fail if one is invalid.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allowVolumeExpansion": { + SchemaProps: spec.SchemaProps{ + Description: "AllowVolumeExpansion shows whether the storage class allow volume expand", + Type: []string{"boolean"}, + Format: "", + }, + }, + "volumeBindingMode": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeBindingMode indicates how PersistentVolumeClaims should be provisioned and bound. When unset, VolumeBindingImmediate is used. This field is only honored by servers that enable the VolumeScheduling feature.", + Type: []string{"string"}, + Format: "", + }, + }, + "allowedTopologies": { + SchemaProps: spec.SchemaProps{ + Description: "Restrict the node topologies where volumes can be dynamically provisioned. Each volume plugin defines its own supported topology specifications. An empty TopologySelectorTerm list means there is no topology restriction. This field is only honored by servers that enable the VolumeScheduling feature.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.TopologySelectorTerm"), + }, + }, + }, + }, + }, + }, + Required: []string{"provisioner"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TopologySelectorTerm", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1beta1_StorageClassList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StorageClassList is a collection of storage classes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of StorageClasses", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.StorageClass"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.StorageClass", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1beta1_TokenRequest(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TokenRequest contains parameters of a service account token.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "audience": { + SchemaProps: spec.SchemaProps{ + Description: "Audience is the intended audience of the token in \"TokenRequestSpec\". It will default to the audiences of kube apiserver.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "expirationSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "ExpirationSeconds is the duration of validity of the token in \"TokenRequestSpec\". It has the same default value of \"ExpirationSeconds\" in \"TokenRequestSpec\"", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"audience"}, + }, + }, + } +} + +func schema_k8sio_api_storage_v1beta1_VolumeAttachment(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Specification of the desired attach/detach volume behavior. Populated by the Kubernetes system.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.VolumeAttachmentSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the VolumeAttachment request. Populated by the entity completing the attach or detach operation, i.e. the external-attacher.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.VolumeAttachmentStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.VolumeAttachmentSpec", "k8s.io/api/storage/v1beta1.VolumeAttachmentStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_k8sio_api_storage_v1beta1_VolumeAttachmentList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentList is a collection of VolumeAttachment objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "Items is the list of VolumeAttachments", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.VolumeAttachment"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.VolumeAttachment", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_k8sio_api_storage_v1beta1_VolumeAttachmentSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentSource represents a volume that should be attached. Right now only PersistenVolumes can be attached via external attacher, in future we may allow also inline volumes in pods. Exactly one member can be set.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "persistentVolumeName": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the persistent volume to attach.", + Type: []string{"string"}, + Format: "", + }, + }, + "inlineVolumeSpec": { + SchemaProps: spec.SchemaProps{ + Description: "inlineVolumeSpec contains all the information necessary to attach a persistent volume defined by a pod's inline VolumeSource. This field is populated only for the CSIMigration feature. It contains translated fields from a pod's inline VolumeSource to a PersistentVolumeSpec. This field is alpha-level and is only honored by servers that enabled the CSIMigration feature.", + Ref: ref("k8s.io/api/core/v1.PersistentVolumeSpec"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.PersistentVolumeSpec"}, + } +} + +func schema_k8sio_api_storage_v1beta1_VolumeAttachmentSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentSpec is the specification of a VolumeAttachment request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "attacher": { + SchemaProps: spec.SchemaProps{ + Description: "Attacher indicates the name of the volume driver that MUST handle this request. This is the name returned by GetPluginName().", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "source": { + SchemaProps: spec.SchemaProps{ + Description: "Source represents the volume that should be attached.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/storage/v1beta1.VolumeAttachmentSource"), + }, + }, + "nodeName": { + SchemaProps: spec.SchemaProps{ + Description: "The node that the volume should be attached to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"attacher", "source", "nodeName"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.VolumeAttachmentSource"}, + } +} + +func schema_k8sio_api_storage_v1beta1_VolumeAttachmentStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeAttachmentStatus is the status of a VolumeAttachment request.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "attached": { + SchemaProps: spec.SchemaProps{ + Description: "Indicates the volume is successfully attached. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "attachmentMetadata": { + SchemaProps: spec.SchemaProps{ + Description: "Upon successful attach, this field is populated with any information returned by the attach operation that must be passed into subsequent WaitForAttach or Mount calls. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "attachError": { + SchemaProps: spec.SchemaProps{ + Description: "The last error encountered during attach operation, if any. This field must only be set by the entity completing the attach operation, i.e. the external-attacher.", + Ref: ref("k8s.io/api/storage/v1beta1.VolumeError"), + }, + }, + "detachError": { + SchemaProps: spec.SchemaProps{ + Description: "The last error encountered during detach operation, if any. This field must only be set by the entity completing the detach operation, i.e. the external-attacher.", + Ref: ref("k8s.io/api/storage/v1beta1.VolumeError"), + }, + }, + }, + Required: []string{"attached"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/storage/v1beta1.VolumeError"}, + } +} + +func schema_k8sio_api_storage_v1beta1_VolumeError(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeError captures an error encountered during a volume operation.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "time": { + SchemaProps: spec.SchemaProps{ + Description: "Time the error was encountered.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "String detailing the error encountered during Attach or Detach operation. This string may be logged, so it should not contain sensitive information.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_api_storage_v1beta1_VolumeNodeResources(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeNodeResources is a set of resource limits for scheduling of volumes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "count": { + SchemaProps: spec.SchemaProps{ + Description: "Maximum number of unique volumes managed by the CSI driver that can be used on a node. A volume that is both attached and mounted on a node is considered to be used once, not twice. The same rule applies for a unique volume that is shared among multiple pods on the same node. If this field is nil, then the supported number of volumes on this node is unbounded.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_ConversionRequest(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConversionRequest describes the conversion request parameters.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "uid is an identifier for the individual request/response. It allows distinguishing instances of requests which are otherwise identical (parallel requests, etc). The UID is meant to track the round trip (request/response) between the Kubernetes API server and the webhook, not the user request. It is suitable for correlating log entries between the webhook and apiserver, for either auditing or debugging.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "desiredAPIVersion": { + SchemaProps: spec.SchemaProps{ + Description: "desiredAPIVersion is the version to convert given objects to. e.g. \"myapi.example.com/v1\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "objects": { + SchemaProps: spec.SchemaProps{ + Description: "objects is the list of custom resource objects to be converted.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + }, + }, + }, + Required: []string{"uid", "desiredAPIVersion", "objects"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_pkg_apis_apiextensions_v1_ConversionResponse(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConversionResponse describes a conversion response.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "uid is an identifier for the individual request/response. This should be copied over from the corresponding `request.uid`.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "convertedObjects": { + SchemaProps: spec.SchemaProps{ + Description: "convertedObjects is the list of converted version of `request.objects` if the `result` is successful, otherwise empty. The webhook is expected to set `apiVersion` of these objects to the `request.desiredAPIVersion`. The list must also have the same size as the input list with the same objects in the same order (equal kind, metadata.uid, metadata.name and metadata.namespace). The webhook is allowed to mutate labels and annotations. Any other change to the metadata is silently ignored.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + }, + }, + "result": { + SchemaProps: spec.SchemaProps{ + Description: "result contains the result of conversion with extra details if the conversion failed. `result.status` determines if the conversion failed or succeeded. The `result.status` field is required and represents the success or failure of the conversion. A successful conversion must set `result.status` to `Success`. A failed conversion must set `result.status` to `Failure` and provide more details in `result.message` and return http status 200. The `result.message` will be used to construct an error message for the end user.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Status"), + }, + }, + }, + Required: []string{"uid", "convertedObjects", "result"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Status", "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_pkg_apis_apiextensions_v1_ConversionReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConversionReview describes a conversion request/response.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "request": { + SchemaProps: spec.SchemaProps{ + Description: "request describes the attributes for the conversion request.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ConversionRequest"), + }, + }, + "response": { + SchemaProps: spec.SchemaProps{ + Description: "response describes the attributes for the conversion response.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ConversionResponse"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ConversionRequest", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ConversionResponse"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceColumnDefinition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceColumnDefinition specifies a column for server side printing.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is a human readable name for the column.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is an OpenAPI type definition for this column. See https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types for details.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "format": { + SchemaProps: spec.SchemaProps{ + Description: "format is an optional OpenAPI type definition for this column. The 'name' format is applied to the primary identifier column to assist in clients identifying column is the resource name. See https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types for details.", + Type: []string{"string"}, + Format: "", + }, + }, + "description": { + SchemaProps: spec.SchemaProps{ + Description: "description is a human readable description of this column.", + Type: []string{"string"}, + Format: "", + }, + }, + "priority": { + SchemaProps: spec.SchemaProps{ + Description: "priority is an integer defining the relative importance of this column compared to others. Lower numbers are considered higher priority. Columns that may be omitted in limited space scenarios should be given a priority greater than 0.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "jsonPath": { + SchemaProps: spec.SchemaProps{ + Description: "jsonPath is a simple JSON path (i.e. with array notation) which is evaluated against each custom resource to produce the value for this column.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "type", "jsonPath"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceConversion(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceConversion describes how to convert different versions of a CR.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "strategy": { + SchemaProps: spec.SchemaProps{ + Description: "strategy specifies how custom resources are converted between versions. Allowed values are: - `None`: The converter only change the apiVersion and would not touch any other field in the custom resource. - `Webhook`: API Server will call to an external webhook to do the conversion. Additional information\n is needed for this option. This requires spec.preserveUnknownFields to be false, and spec.conversion.webhook to be set.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "webhook": { + SchemaProps: spec.SchemaProps{ + Description: "webhook describes how to call the conversion webhook. Required when `strategy` is set to `Webhook`.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.WebhookConversion"), + }, + }, + }, + Required: []string{"strategy"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.WebhookConversion"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceDefinition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format <.spec.name>.<.spec.group>.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec describes how the user wants the resources to appear", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status indicates the actual state of the CustomResourceDefinition", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionSpec", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionCondition contains details for the current condition of this pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of the condition. Types include Established, NamesAccepted and Terminating.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status is the status of the condition. Can be True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastTransitionTime last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason is a unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "message is a human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionList is a list of CustomResourceDefinition objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items list individual CustomResourceDefinition objects", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinition"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinition", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionNames(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionNames indicates the names to serve this CustomResourceDefinition", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "plural": { + SchemaProps: spec.SchemaProps{ + Description: "plural is the plural name of the resource to serve. The custom resources are served under `/apis///.../`. Must match the name of the CustomResourceDefinition (in the form `.`). Must be all lowercase.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "singular": { + SchemaProps: spec.SchemaProps{ + Description: "singular is the singular name of the resource. It must be all lowercase. Defaults to lowercased `kind`.", + Type: []string{"string"}, + Format: "", + }, + }, + "shortNames": { + SchemaProps: spec.SchemaProps{ + Description: "shortNames are short names for the resource, exposed in API discovery documents, and used by clients to support invocations like `kubectl get `. It must be all lowercase.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "kind is the serialized kind of the resource. It is normally CamelCase and singular. Custom resource instances will use this value as the `kind` attribute in API calls.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "listKind": { + SchemaProps: spec.SchemaProps{ + Description: "listKind is the serialized kind of the list for this resource. Defaults to \"`kind`List\".", + Type: []string{"string"}, + Format: "", + }, + }, + "categories": { + SchemaProps: spec.SchemaProps{ + Description: "categories is a list of grouped resources this custom resource belongs to (e.g. 'all'). This is published in API discovery documents, and used by clients to support invocations like `kubectl get all`.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"plural", "kind"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionSpec describes how a user wants their resource to appear", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Description: "group is the API group of the defined custom resource. The custom resources are served under `/apis//...`. Must match the name of the CustomResourceDefinition (in the form `.`).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "names": { + SchemaProps: spec.SchemaProps{ + Description: "names specify the resource and kind names for the custom resource.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionNames"), + }, + }, + "scope": { + SchemaProps: spec.SchemaProps{ + Description: "scope indicates whether the defined custom resource is cluster- or namespace-scoped. Allowed values are `Cluster` and `Namespaced`.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "versions": { + SchemaProps: spec.SchemaProps{ + Description: "versions is the list of all API versions of the defined custom resource. Version names are used to compute the order in which served versions are listed in API discovery. If the version string is \"kube-like\", it will sort above non \"kube-like\" version strings, which are ordered lexicographically. \"Kube-like\" versions start with a \"v\", then are followed by a number (the major version), then optionally the string \"alpha\" or \"beta\" and another number (the minor version). These are sorted first by GA > beta > alpha (where GA is a version with no suffix such as beta or alpha), and then by comparing major version, then minor version. An example sorted list of versions: v10, v2, v1, v11beta2, v10beta3, v3beta1, v12alpha1, v11alpha2, foo1, foo10.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionVersion"), + }, + }, + }, + }, + }, + "conversion": { + SchemaProps: spec.SchemaProps{ + Description: "conversion defines conversion settings for the CRD.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceConversion"), + }, + }, + "preserveUnknownFields": { + SchemaProps: spec.SchemaProps{ + Description: "preserveUnknownFields indicates that object fields which are not specified in the OpenAPI schema should be preserved when persisting to storage. apiVersion, kind, metadata and known fields inside metadata are always preserved. This field is deprecated in favor of setting `x-preserve-unknown-fields` to true in `spec.versions[*].schema.openAPIV3Schema`. See https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/#pruning-versus-preserving-unknown-fields for details.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"group", "names", "scope", "versions"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceConversion", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionNames", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionVersion"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionStatus indicates the state of the CustomResourceDefinition", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + SchemaProps: spec.SchemaProps{ + Description: "conditions indicate state for particular aspects of a CustomResourceDefinition", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionCondition"), + }, + }, + }, + }, + }, + "acceptedNames": { + SchemaProps: spec.SchemaProps{ + Description: "acceptedNames are the names that are actually being used to serve discovery. They may be different than the names in spec.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionNames"), + }, + }, + "storedVersions": { + SchemaProps: spec.SchemaProps{ + Description: "storedVersions lists all versions of CustomResources that were ever persisted. Tracking these versions allows a migration path for stored versions in etcd. The field is mutable so a migration controller can finish a migration to another version (ensuring no old objects are left in storage), and then remove the rest of the versions from this list. Versions may not be removed from `spec.versions` while they exist in this list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionCondition", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceDefinitionNames"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceDefinitionVersion(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionVersion describes a version for CRD.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the version name, e.g. “v1”, “v2beta1”, etc. The custom resources are served under this version at `/apis///...` if `served` is true.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "served": { + SchemaProps: spec.SchemaProps{ + Description: "served is a flag enabling/disabling this version from being served via REST APIs", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "storage": { + SchemaProps: spec.SchemaProps{ + Description: "storage indicates this version should be used when persisting custom resources to storage. There must be exactly one version with storage=true.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "deprecated": { + SchemaProps: spec.SchemaProps{ + Description: "deprecated indicates this version of the custom resource API is deprecated. When set to true, API requests to this version receive a warning header in the server response. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "deprecationWarning": { + SchemaProps: spec.SchemaProps{ + Description: "deprecationWarning overrides the default warning returned to API clients. May only be set when `deprecated` is true. The default warning indicates this version is deprecated and recommends use of the newest served version of equal or greater stability, if one exists.", + Type: []string{"string"}, + Format: "", + }, + }, + "schema": { + SchemaProps: spec.SchemaProps{ + Description: "schema describes the schema used for validation, pruning, and defaulting of this version of the custom resource.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceValidation"), + }, + }, + "subresources": { + SchemaProps: spec.SchemaProps{ + Description: "subresources specify what subresources this version of the defined custom resource have.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresources"), + }, + }, + "additionalPrinterColumns": { + SchemaProps: spec.SchemaProps{ + Description: "additionalPrinterColumns specifies additional columns returned in Table output. See https://kubernetes.io/docs/reference/using-api/api-concepts/#receiving-resources-as-tables for details. If no columns are specified, a single column displaying the age of the custom resource is used.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceColumnDefinition"), + }, + }, + }, + }, + }, + }, + Required: []string{"name", "served", "storage"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceColumnDefinition", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresources", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceValidation"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceSubresourceScale(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceSubresourceScale defines how to serve the scale subresource for CustomResources.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "specReplicasPath": { + SchemaProps: spec.SchemaProps{ + Description: "specReplicasPath defines the JSON path inside of a custom resource that corresponds to Scale `spec.replicas`. Only JSON paths without the array notation are allowed. Must be a JSON Path under `.spec`. If there is no value under the given path in the custom resource, the `/scale` subresource will return an error on GET.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "statusReplicasPath": { + SchemaProps: spec.SchemaProps{ + Description: "statusReplicasPath defines the JSON path inside of a custom resource that corresponds to Scale `status.replicas`. Only JSON paths without the array notation are allowed. Must be a JSON Path under `.status`. If there is no value under the given path in the custom resource, the `status.replicas` value in the `/scale` subresource will default to 0.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "labelSelectorPath": { + SchemaProps: spec.SchemaProps{ + Description: "labelSelectorPath defines the JSON path inside of a custom resource that corresponds to Scale `status.selector`. Only JSON paths without the array notation are allowed. Must be a JSON Path under `.status` or `.spec`. Must be set to work with HorizontalPodAutoscaler. The field pointed by this JSON path must be a string field (not a complex selector struct) which contains a serialized label selector in string form. More info: https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions#scale-subresource If there is no value under the given path in the custom resource, the `status.selector` value in the `/scale` subresource will default to the empty string.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"specReplicasPath", "statusReplicasPath"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceSubresourceStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceSubresourceStatus defines how to serve the status subresource for CustomResources. Status is represented by the `.status` JSON path inside of a CustomResource. When set, * exposes a /status subresource for the custom resource * PUT requests to the /status subresource take a custom resource object, and ignore changes to anything except the status stanza * PUT/POST/PATCH requests to the custom resource ignore changes to the status stanza", + Type: []string{"object"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceSubresources(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceSubresources defines the status and scale subresources for CustomResources.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status indicates the custom resource should serve a `/status` subresource. When enabled: 1. requests to the custom resource primary endpoint ignore changes to the `status` stanza of the object. 2. requests to the custom resource `/status` subresource ignore changes to anything other than the `status` stanza of the object.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresourceStatus"), + }, + }, + "scale": { + SchemaProps: spec.SchemaProps{ + Description: "scale indicates the custom resource should serve a `/scale` subresource that returns an `autoscaling/v1` Scale object.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresourceScale"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresourceScale", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.CustomResourceSubresourceStatus"}, + } +} + +func schema_pkg_apis_apiextensions_v1_CustomResourceValidation(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceValidation is a list of validation methods for CustomResources.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "openAPIV3Schema": { + SchemaProps: spec.SchemaProps{ + Description: "openAPIV3Schema is the OpenAPI v3 schema to use for validation and pruning.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"}, + } +} + +func schema_pkg_apis_apiextensions_v1_ExternalDocumentation(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalDocumentation allows referencing an external resource for extended documentation.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "description": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "url": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_JSON(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSON represents any valid JSON value. These types are supported: bool, int64, float64, string, []interface{}, map[string]interface{} and nil.", + Type: v1.JSON{}.OpenAPISchemaType(), + Format: v1.JSON{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_JSONSchemaProps(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSONSchemaProps is a JSON-Schema following Specification Draft 4 (http://json-schema.org/).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "id": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "$schema": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "$ref": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "description": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "format": { + SchemaProps: spec.SchemaProps{ + Description: "format is an OpenAPI v3 format string. Unknown formats are ignored. The following formats are validated:\n\n- bsonobjectid: a bson object ID, i.e. a 24 characters hex string - uri: an URI as parsed by Golang net/url.ParseRequestURI - email: an email address as parsed by Golang net/mail.ParseAddress - hostname: a valid representation for an Internet host name, as defined by RFC 1034, section 3.1 [RFC1034]. - ipv4: an IPv4 IP as parsed by Golang net.ParseIP - ipv6: an IPv6 IP as parsed by Golang net.ParseIP - cidr: a CIDR as parsed by Golang net.ParseCIDR - mac: a MAC address as parsed by Golang net.ParseMAC - uuid: an UUID that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?[0-9a-f]{4}-?[0-9a-f]{4}-?[0-9a-f]{12}$ - uuid3: an UUID3 that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?3[0-9a-f]{3}-?[0-9a-f]{4}-?[0-9a-f]{12}$ - uuid4: an UUID4 that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?4[0-9a-f]{3}-?[89ab][0-9a-f]{3}-?[0-9a-f]{12}$ - uuid5: an UUID5 that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?5[0-9a-f]{3}-?[89ab][0-9a-f]{3}-?[0-9a-f]{12}$ - isbn: an ISBN10 or ISBN13 number string like \"0321751043\" or \"978-0321751041\" - isbn10: an ISBN10 number string like \"0321751043\" - isbn13: an ISBN13 number string like \"978-0321751041\" - creditcard: a credit card number defined by the regex ^(?:4[0-9]{12}(?:[0-9]{3})?|5[1-5][0-9]{14}|6(?:011|5[0-9][0-9])[0-9]{12}|3[47][0-9]{13}|3(?:0[0-5]|[68][0-9])[0-9]{11}|(?:2131|1800|35\\d{3})\\d{11})$ with any non digit characters mixed in - ssn: a U.S. social security number following the regex ^\\d{3}[- ]?\\d{2}[- ]?\\d{4}$ - hexcolor: an hexadecimal color code like \"#FFFFFF: following the regex ^#?([0-9a-fA-F]{3}|[0-9a-fA-F]{6})$ - rgbcolor: an RGB color code like rgb like \"rgb(255,255,2559\" - byte: base64 encoded binary data - password: any kind of string - date: a date string like \"2006-01-02\" as defined by full-date in RFC3339 - duration: a duration string like \"22 ns\" as parsed by Golang time.ParseDuration or compatible with Scala duration format - datetime: a date time string like \"2014-12-15T19:30:20.000Z\" as defined by date-time in RFC3339.", + Type: []string{"string"}, + Format: "", + }, + }, + "title": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "default": { + SchemaProps: spec.SchemaProps{ + Description: "default is a default value for undefined object fields. Defaulting is a beta feature under the CustomResourceDefaulting feature gate. Defaulting requires spec.preserveUnknownFields to be false.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSON"), + }, + }, + "maximum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"number"}, + Format: "double", + }, + }, + "exclusiveMaximum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"boolean"}, + Format: "", + }, + }, + "minimum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"number"}, + Format: "double", + }, + }, + "exclusiveMinimum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"boolean"}, + Format: "", + }, + }, + "maxLength": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "minLength": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "pattern": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "maxItems": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "minItems": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "uniqueItems": { + SchemaProps: spec.SchemaProps{ + Type: []string{"boolean"}, + Format: "", + }, + }, + "multipleOf": { + SchemaProps: spec.SchemaProps{ + Type: []string{"number"}, + Format: "double", + }, + }, + "enum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSON"), + }, + }, + }, + }, + }, + "maxProperties": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "minProperties": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "required": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrArray"), + }, + }, + "allOf": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "oneOf": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "anyOf": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "not": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"), + }, + }, + "properties": { + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "additionalProperties": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrBool"), + }, + }, + "patternProperties": { + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "dependencies": { + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrStringArray"), + }, + }, + }, + }, + }, + "additionalItems": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrBool"), + }, + }, + "definitions": { + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "externalDocs": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ExternalDocumentation"), + }, + }, + "example": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSON"), + }, + }, + "nullable": { + SchemaProps: spec.SchemaProps{ + Type: []string{"boolean"}, + Format: "", + }, + }, + "x-kubernetes-preserve-unknown-fields": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-preserve-unknown-fields stops the API server decoding step from pruning fields which are not specified in the validation schema. This affects fields recursively, but switches back to normal pruning behaviour if nested properties or additionalProperties are specified in the schema. This can either be true or undefined. False is forbidden.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "x-kubernetes-embedded-resource": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-embedded-resource defines that the value is an embedded Kubernetes runtime.Object, with TypeMeta and ObjectMeta. The type must be object. It is allowed to further restrict the embedded object. kind, apiVersion and metadata are validated automatically. x-kubernetes-preserve-unknown-fields is allowed to be true, but does not have to be if the object is fully specified (up to kind, apiVersion, metadata).", + Type: []string{"boolean"}, + Format: "", + }, + }, + "x-kubernetes-int-or-string": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-int-or-string specifies that this value is either an integer or a string. If this is true, an empty type is allowed and type as child of anyOf is permitted if following one of the following patterns:\n\n1) anyOf:\n - type: integer\n - type: string\n2) allOf:\n - anyOf:\n - type: integer\n - type: string\n - ... zero or more", + Type: []string{"boolean"}, + Format: "", + }, + }, + "x-kubernetes-list-map-keys": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-list-map-keys annotates an array with the x-kubernetes-list-type `map` by specifying the keys used as the index of the map.\n\nThis tag MUST only be used on lists that have the \"x-kubernetes-list-type\" extension set to \"map\". Also, the values specified for this attribute must be a scalar typed field of the child structure (no nesting is supported).\n\nThe properties specified must either be required or have a default value, to ensure those properties are present for all list items.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "x-kubernetes-list-type": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-list-type annotates an array to further describe its topology. This extension must only be used on lists and may have 3 possible values:\n\n1) `atomic`: the list is treated as a single entity, like a scalar.\n Atomic lists will be entirely replaced when updated. This extension\n may be used on any type of list (struct, scalar, ...).\n2) `set`:\n Sets are lists that must not have multiple items with the same value. Each\n value must be a scalar, an object with x-kubernetes-map-type `atomic` or an\n array with x-kubernetes-list-type `atomic`.\n3) `map`:\n These lists are like maps in that their elements have a non-index key\n used to identify them. Order is preserved upon merge. The map tag\n must only be used on a list with elements of type object.\nDefaults to atomic for arrays.", + Type: []string{"string"}, + Format: "", + }, + }, + "x-kubernetes-map-type": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-map-type annotates an object to further describe its topology. This extension must only be used when type is object and may have 2 possible values:\n\n1) `granular`:\n These maps are actual maps (key-value pairs) and each fields are independent\n from each other (they can each be manipulated by separate actors). This is\n the default behaviour for all maps.\n2) `atomic`: the list is treated as a single entity, like a scalar.\n Atomic maps will be entirely replaced when updated.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ExternalDocumentation", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSON", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaProps", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrArray", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrBool", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.JSONSchemaPropsOrStringArray"}, + } +} + +func schema_pkg_apis_apiextensions_v1_JSONSchemaPropsOrArray(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSONSchemaPropsOrArray represents a value that can either be a JSONSchemaProps or an array of JSONSchemaProps. Mainly here for serialization purposes.", + Type: v1.JSONSchemaPropsOrArray{}.OpenAPISchemaType(), + Format: v1.JSONSchemaPropsOrArray{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_JSONSchemaPropsOrBool(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSONSchemaPropsOrBool represents JSONSchemaProps or a boolean value. Defaults to true for the boolean property.", + Type: v1.JSONSchemaPropsOrBool{}.OpenAPISchemaType(), + Format: v1.JSONSchemaPropsOrBool{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_JSONSchemaPropsOrStringArray(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSONSchemaPropsOrStringArray represents a JSONSchemaProps or a string array.", + Type: v1.JSONSchemaPropsOrStringArray{}.OpenAPISchemaType(), + Format: v1.JSONSchemaPropsOrStringArray{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_ServiceReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceReference holds a reference to Service.legacy.k8s.io", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "namespace is the namespace of the service. Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the service. Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "path is an optional URL path at which the webhook will be contacted.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "port is an optional service port at which the webhook will be contacted. `port` should be a valid port number (1-65535, inclusive). Defaults to 443 for backward compatibility.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"namespace", "name"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1_WebhookClientConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "WebhookClientConfig contains the information to make a TLS connection with the webhook.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "url": { + SchemaProps: spec.SchemaProps{ + Description: "url gives the location of the webhook, in standard URL form (`scheme://host:port/path`). Exactly one of `url` or `service` must be specified.\n\nThe `host` should not refer to a service running in the cluster; use the `service` field instead. The host might be resolved via external DNS in some apiservers (e.g., `kube-apiserver` cannot resolve in-cluster DNS as that would be a layering violation). `host` may also be an IP address.\n\nPlease note that using `localhost` or `127.0.0.1` as a `host` is risky unless you take great care to run this webhook on all hosts which run an apiserver which might need to make calls to this webhook. Such installs are likely to be non-portable, i.e., not easy to turn up in a new cluster.\n\nThe scheme must be \"https\"; the URL must begin with \"https://\".\n\nA path is optional, and if present may be any string permissible in a URL. You may use the path to pass an arbitrary string to the webhook, for example, a cluster identifier.\n\nAttempting to use a user or basic auth e.g. \"user:password@\" is not allowed. Fragments (\"#...\") and query parameters (\"?...\") are not allowed, either.", + Type: []string{"string"}, + Format: "", + }, + }, + "service": { + SchemaProps: spec.SchemaProps{ + Description: "service is a reference to the service for this webhook. Either service or url must be specified.\n\nIf the webhook is running within the cluster, then you should use `service`.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ServiceReference"), + }, + }, + "caBundle": { + SchemaProps: spec.SchemaProps{ + Description: "caBundle is a PEM encoded CA bundle which will be used to validate the webhook's server certificate. If unspecified, system trust roots on the apiserver are used.", + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.ServiceReference"}, + } +} + +func schema_pkg_apis_apiextensions_v1_WebhookConversion(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "WebhookConversion describes how to call a conversion webhook", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "clientConfig": { + SchemaProps: spec.SchemaProps{ + Description: "clientConfig is the instructions for how to call the webhook if strategy is `Webhook`.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.WebhookClientConfig"), + }, + }, + "conversionReviewVersions": { + SchemaProps: spec.SchemaProps{ + Description: "conversionReviewVersions is an ordered list of preferred `ConversionReview` versions the Webhook expects. The API server will use the first version in the list which it supports. If none of the versions specified in this list are supported by API server, conversion will fail for the custom resource. If a persisted Webhook configuration specifies allowed versions and does not include any versions known to the API Server, calls to the webhook will fail.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"conversionReviewVersions"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1.WebhookClientConfig"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_ConversionRequest(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConversionRequest describes the conversion request parameters.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "uid is an identifier for the individual request/response. It allows distinguishing instances of requests which are otherwise identical (parallel requests, etc). The UID is meant to track the round trip (request/response) between the Kubernetes API server and the webhook, not the user request. It is suitable for correlating log entries between the webhook and apiserver, for either auditing or debugging.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "desiredAPIVersion": { + SchemaProps: spec.SchemaProps{ + Description: "desiredAPIVersion is the version to convert given objects to. e.g. \"myapi.example.com/v1\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "objects": { + SchemaProps: spec.SchemaProps{ + Description: "objects is the list of custom resource objects to be converted.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + }, + }, + }, + Required: []string{"uid", "desiredAPIVersion", "objects"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_ConversionResponse(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConversionResponse describes a conversion response.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "uid is an identifier for the individual request/response. This should be copied over from the corresponding `request.uid`.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "convertedObjects": { + SchemaProps: spec.SchemaProps{ + Description: "convertedObjects is the list of converted version of `request.objects` if the `result` is successful, otherwise empty. The webhook is expected to set `apiVersion` of these objects to the `request.desiredAPIVersion`. The list must also have the same size as the input list with the same objects in the same order (equal kind, metadata.uid, metadata.name and metadata.namespace). The webhook is allowed to mutate labels and annotations. Any other change to the metadata is silently ignored.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + }, + }, + "result": { + SchemaProps: spec.SchemaProps{ + Description: "result contains the result of conversion with extra details if the conversion failed. `result.status` determines if the conversion failed or succeeded. The `result.status` field is required and represents the success or failure of the conversion. A successful conversion must set `result.status` to `Success`. A failed conversion must set `result.status` to `Failure` and provide more details in `result.message` and return http status 200. The `result.message` will be used to construct an error message for the end user.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Status"), + }, + }, + }, + Required: []string{"uid", "convertedObjects", "result"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Status", "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_ConversionReview(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ConversionReview describes a conversion request/response.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "request": { + SchemaProps: spec.SchemaProps{ + Description: "request describes the attributes for the conversion request.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ConversionRequest"), + }, + }, + "response": { + SchemaProps: spec.SchemaProps{ + Description: "response describes the attributes for the conversion response.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ConversionResponse"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ConversionRequest", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ConversionResponse"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceColumnDefinition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceColumnDefinition specifies a column for server side printing.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is a human readable name for the column.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is an OpenAPI type definition for this column. See https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types for details.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "format": { + SchemaProps: spec.SchemaProps{ + Description: "format is an optional OpenAPI type definition for this column. The 'name' format is applied to the primary identifier column to assist in clients identifying column is the resource name. See https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types for details.", + Type: []string{"string"}, + Format: "", + }, + }, + "description": { + SchemaProps: spec.SchemaProps{ + Description: "description is a human readable description of this column.", + Type: []string{"string"}, + Format: "", + }, + }, + "priority": { + SchemaProps: spec.SchemaProps{ + Description: "priority is an integer defining the relative importance of this column compared to others. Lower numbers are considered higher priority. Columns that may be omitted in limited space scenarios should be given a priority greater than 0.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "JSONPath": { + SchemaProps: spec.SchemaProps{ + Description: "JSONPath is a simple JSON path (i.e. with array notation) which is evaluated against each custom resource to produce the value for this column.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "type", "JSONPath"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceConversion(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceConversion describes how to convert different versions of a CR.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "strategy": { + SchemaProps: spec.SchemaProps{ + Description: "strategy specifies how custom resources are converted between versions. Allowed values are: - `None`: The converter only change the apiVersion and would not touch any other field in the custom resource. - `Webhook`: API Server will call to an external webhook to do the conversion. Additional information\n is needed for this option. This requires spec.preserveUnknownFields to be false, and spec.conversion.webhookClientConfig to be set.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "webhookClientConfig": { + SchemaProps: spec.SchemaProps{ + Description: "webhookClientConfig is the instructions for how to call the webhook if strategy is `Webhook`. Required when `strategy` is set to `Webhook`.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.WebhookClientConfig"), + }, + }, + "conversionReviewVersions": { + SchemaProps: spec.SchemaProps{ + Description: "conversionReviewVersions is an ordered list of preferred `ConversionReview` versions the Webhook expects. The API server will use the first version in the list which it supports. If none of the versions specified in this list are supported by API server, conversion will fail for the custom resource. If a persisted Webhook configuration specifies allowed versions and does not include any versions known to the API Server, calls to the webhook will fail. Defaults to `[\"v1beta1\"]`.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"strategy"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.WebhookClientConfig"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format <.spec.name>.<.spec.group>. Deprecated in v1.16, planned for removal in v1.22. Use apiextensions.k8s.io/v1 CustomResourceDefinition instead.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "spec describes how the user wants the resources to appear", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status indicates the actual state of the CustomResourceDefinition", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionStatus"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionSpec", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionStatus", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionCondition contains details for the current condition of this pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is the type of the condition. Types include Established, NamesAccepted and Terminating.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status is the status of the condition. Can be True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastTransitionTime last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason is a unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "message is a human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionList is a list of CustomResourceDefinition objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items list individual CustomResourceDefinition objects", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinition"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinition", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionNames(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionNames indicates the names to serve this CustomResourceDefinition", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "plural": { + SchemaProps: spec.SchemaProps{ + Description: "plural is the plural name of the resource to serve. The custom resources are served under `/apis///.../`. Must match the name of the CustomResourceDefinition (in the form `.`). Must be all lowercase.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "singular": { + SchemaProps: spec.SchemaProps{ + Description: "singular is the singular name of the resource. It must be all lowercase. Defaults to lowercased `kind`.", + Type: []string{"string"}, + Format: "", + }, + }, + "shortNames": { + SchemaProps: spec.SchemaProps{ + Description: "shortNames are short names for the resource, exposed in API discovery documents, and used by clients to support invocations like `kubectl get `. It must be all lowercase.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "kind is the serialized kind of the resource. It is normally CamelCase and singular. Custom resource instances will use this value as the `kind` attribute in API calls.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "listKind": { + SchemaProps: spec.SchemaProps{ + Description: "listKind is the serialized kind of the list for this resource. Defaults to \"`kind`List\".", + Type: []string{"string"}, + Format: "", + }, + }, + "categories": { + SchemaProps: spec.SchemaProps{ + Description: "categories is a list of grouped resources this custom resource belongs to (e.g. 'all'). This is published in API discovery documents, and used by clients to support invocations like `kubectl get all`.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"plural", "kind"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionSpec describes how a user wants their resource to appear", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Description: "group is the API group of the defined custom resource. The custom resources are served under `/apis//...`. Must match the name of the CustomResourceDefinition (in the form `.`).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Description: "version is the API version of the defined custom resource. The custom resources are served under `/apis///...`. Must match the name of the first item in the `versions` list if `version` and `versions` are both specified. Optional if `versions` is specified. Deprecated: use `versions` instead.", + Type: []string{"string"}, + Format: "", + }, + }, + "names": { + SchemaProps: spec.SchemaProps{ + Description: "names specify the resource and kind names for the custom resource.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionNames"), + }, + }, + "scope": { + SchemaProps: spec.SchemaProps{ + Description: "scope indicates whether the defined custom resource is cluster- or namespace-scoped. Allowed values are `Cluster` and `Namespaced`. Default is `Namespaced`.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "validation": { + SchemaProps: spec.SchemaProps{ + Description: "validation describes the schema used for validation and pruning of the custom resource. If present, this validation schema is used to validate all versions. Top-level and per-version schemas are mutually exclusive.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceValidation"), + }, + }, + "subresources": { + SchemaProps: spec.SchemaProps{ + Description: "subresources specify what subresources the defined custom resource has. If present, this field configures subresources for all versions. Top-level and per-version subresources are mutually exclusive.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresources"), + }, + }, + "versions": { + SchemaProps: spec.SchemaProps{ + Description: "versions is the list of all API versions of the defined custom resource. Optional if `version` is specified. The name of the first item in the `versions` list must match the `version` field if `version` and `versions` are both specified. Version names are used to compute the order in which served versions are listed in API discovery. If the version string is \"kube-like\", it will sort above non \"kube-like\" version strings, which are ordered lexicographically. \"Kube-like\" versions start with a \"v\", then are followed by a number (the major version), then optionally the string \"alpha\" or \"beta\" and another number (the minor version). These are sorted first by GA > beta > alpha (where GA is a version with no suffix such as beta or alpha), and then by comparing major version, then minor version. An example sorted list of versions: v10, v2, v1, v11beta2, v10beta3, v3beta1, v12alpha1, v11alpha2, foo1, foo10.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionVersion"), + }, + }, + }, + }, + }, + "additionalPrinterColumns": { + SchemaProps: spec.SchemaProps{ + Description: "additionalPrinterColumns specifies additional columns returned in Table output. See https://kubernetes.io/docs/reference/using-api/api-concepts/#receiving-resources-as-tables for details. If present, this field configures columns for all versions. Top-level and per-version columns are mutually exclusive. If no top-level or per-version columns are specified, a single column displaying the age of the custom resource is used.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceColumnDefinition"), + }, + }, + }, + }, + }, + "conversion": { + SchemaProps: spec.SchemaProps{ + Description: "conversion defines conversion settings for the CRD.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceConversion"), + }, + }, + "preserveUnknownFields": { + SchemaProps: spec.SchemaProps{ + Description: "preserveUnknownFields indicates that object fields which are not specified in the OpenAPI schema should be preserved when persisting to storage. apiVersion, kind, metadata and known fields inside metadata are always preserved. If false, schemas must be defined for all versions. Defaults to true in v1beta for backwards compatibility. Deprecated: will be required to be false in v1. Preservation of unknown fields can be specified in the validation schema using the `x-kubernetes-preserve-unknown-fields: true` extension. See https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/#pruning-versus-preserving-unknown-fields for details.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"group", "names", "scope"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceColumnDefinition", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceConversion", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionNames", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionVersion", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresources", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceValidation"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionStatus indicates the state of the CustomResourceDefinition", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + SchemaProps: spec.SchemaProps{ + Description: "conditions indicate state for particular aspects of a CustomResourceDefinition", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionCondition"), + }, + }, + }, + }, + }, + "acceptedNames": { + SchemaProps: spec.SchemaProps{ + Description: "acceptedNames are the names that are actually being used to serve discovery. They may be different than the names in spec.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionNames"), + }, + }, + "storedVersions": { + SchemaProps: spec.SchemaProps{ + Description: "storedVersions lists all versions of CustomResources that were ever persisted. Tracking these versions allows a migration path for stored versions in etcd. The field is mutable so a migration controller can finish a migration to another version (ensuring no old objects are left in storage), and then remove the rest of the versions from this list. Versions may not be removed from `spec.versions` while they exist in this list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionCondition", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceDefinitionNames"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceDefinitionVersion(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceDefinitionVersion describes a version for CRD.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the version name, e.g. “v1”, “v2beta1”, etc. The custom resources are served under this version at `/apis///...` if `served` is true.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "served": { + SchemaProps: spec.SchemaProps{ + Description: "served is a flag enabling/disabling this version from being served via REST APIs", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "storage": { + SchemaProps: spec.SchemaProps{ + Description: "storage indicates this version should be used when persisting custom resources to storage. There must be exactly one version with storage=true.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "deprecated": { + SchemaProps: spec.SchemaProps{ + Description: "deprecated indicates this version of the custom resource API is deprecated. When set to true, API requests to this version receive a warning header in the server response. Defaults to false.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "deprecationWarning": { + SchemaProps: spec.SchemaProps{ + Description: "deprecationWarning overrides the default warning returned to API clients. May only be set when `deprecated` is true. The default warning indicates this version is deprecated and recommends use of the newest served version of equal or greater stability, if one exists.", + Type: []string{"string"}, + Format: "", + }, + }, + "schema": { + SchemaProps: spec.SchemaProps{ + Description: "schema describes the schema used for validation and pruning of this version of the custom resource. Top-level and per-version schemas are mutually exclusive. Per-version schemas must not all be set to identical values (top-level validation schema should be used instead).", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceValidation"), + }, + }, + "subresources": { + SchemaProps: spec.SchemaProps{ + Description: "subresources specify what subresources this version of the defined custom resource have. Top-level and per-version subresources are mutually exclusive. Per-version subresources must not all be set to identical values (top-level subresources should be used instead).", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresources"), + }, + }, + "additionalPrinterColumns": { + SchemaProps: spec.SchemaProps{ + Description: "additionalPrinterColumns specifies additional columns returned in Table output. See https://kubernetes.io/docs/reference/using-api/api-concepts/#receiving-resources-as-tables for details. Top-level and per-version columns are mutually exclusive. Per-version columns must not all be set to identical values (top-level columns should be used instead). If no top-level or per-version columns are specified, a single column displaying the age of the custom resource is used.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceColumnDefinition"), + }, + }, + }, + }, + }, + }, + Required: []string{"name", "served", "storage"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceColumnDefinition", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresources", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceValidation"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceSubresourceScale(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceSubresourceScale defines how to serve the scale subresource for CustomResources.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "specReplicasPath": { + SchemaProps: spec.SchemaProps{ + Description: "specReplicasPath defines the JSON path inside of a custom resource that corresponds to Scale `spec.replicas`. Only JSON paths without the array notation are allowed. Must be a JSON Path under `.spec`. If there is no value under the given path in the custom resource, the `/scale` subresource will return an error on GET.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "statusReplicasPath": { + SchemaProps: spec.SchemaProps{ + Description: "statusReplicasPath defines the JSON path inside of a custom resource that corresponds to Scale `status.replicas`. Only JSON paths without the array notation are allowed. Must be a JSON Path under `.status`. If there is no value under the given path in the custom resource, the `status.replicas` value in the `/scale` subresource will default to 0.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "labelSelectorPath": { + SchemaProps: spec.SchemaProps{ + Description: "labelSelectorPath defines the JSON path inside of a custom resource that corresponds to Scale `status.selector`. Only JSON paths without the array notation are allowed. Must be a JSON Path under `.status` or `.spec`. Must be set to work with HorizontalPodAutoscaler. The field pointed by this JSON path must be a string field (not a complex selector struct) which contains a serialized label selector in string form. More info: https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions#scale-subresource If there is no value under the given path in the custom resource, the `status.selector` value in the `/scale` subresource will default to the empty string.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"specReplicasPath", "statusReplicasPath"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceSubresourceStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceSubresourceStatus defines how to serve the status subresource for CustomResources. Status is represented by the `.status` JSON path inside of a CustomResource. When set, * exposes a /status subresource for the custom resource * PUT requests to the /status subresource take a custom resource object, and ignore changes to anything except the status stanza * PUT/POST/PATCH requests to the custom resource ignore changes to the status stanza", + Type: []string{"object"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceSubresources(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceSubresources defines the status and scale subresources for CustomResources.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status indicates the custom resource should serve a `/status` subresource. When enabled: 1. requests to the custom resource primary endpoint ignore changes to the `status` stanza of the object. 2. requests to the custom resource `/status` subresource ignore changes to anything other than the `status` stanza of the object.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresourceStatus"), + }, + }, + "scale": { + SchemaProps: spec.SchemaProps{ + Description: "scale indicates the custom resource should serve a `/scale` subresource that returns an `autoscaling/v1` Scale object.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresourceScale"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresourceScale", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.CustomResourceSubresourceStatus"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_CustomResourceValidation(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CustomResourceValidation is a list of validation methods for CustomResources.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "openAPIV3Schema": { + SchemaProps: spec.SchemaProps{ + Description: "openAPIV3Schema is the OpenAPI v3 schema to use for validation and pruning.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_ExternalDocumentation(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalDocumentation allows referencing an external resource for extended documentation.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "description": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "url": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_JSON(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSON represents any valid JSON value. These types are supported: bool, int64, float64, string, []interface{}, map[string]interface{} and nil.", + Type: v1beta1.JSON{}.OpenAPISchemaType(), + Format: v1beta1.JSON{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_JSONSchemaProps(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSONSchemaProps is a JSON-Schema following Specification Draft 4 (http://json-schema.org/).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "id": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "$schema": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "$ref": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "description": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "format": { + SchemaProps: spec.SchemaProps{ + Description: "format is an OpenAPI v3 format string. Unknown formats are ignored. The following formats are validated:\n\n- bsonobjectid: a bson object ID, i.e. a 24 characters hex string - uri: an URI as parsed by Golang net/url.ParseRequestURI - email: an email address as parsed by Golang net/mail.ParseAddress - hostname: a valid representation for an Internet host name, as defined by RFC 1034, section 3.1 [RFC1034]. - ipv4: an IPv4 IP as parsed by Golang net.ParseIP - ipv6: an IPv6 IP as parsed by Golang net.ParseIP - cidr: a CIDR as parsed by Golang net.ParseCIDR - mac: a MAC address as parsed by Golang net.ParseMAC - uuid: an UUID that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?[0-9a-f]{4}-?[0-9a-f]{4}-?[0-9a-f]{12}$ - uuid3: an UUID3 that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?3[0-9a-f]{3}-?[0-9a-f]{4}-?[0-9a-f]{12}$ - uuid4: an UUID4 that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?4[0-9a-f]{3}-?[89ab][0-9a-f]{3}-?[0-9a-f]{12}$ - uuid5: an UUID5 that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?5[0-9a-f]{3}-?[89ab][0-9a-f]{3}-?[0-9a-f]{12}$ - isbn: an ISBN10 or ISBN13 number string like \"0321751043\" or \"978-0321751041\" - isbn10: an ISBN10 number string like \"0321751043\" - isbn13: an ISBN13 number string like \"978-0321751041\" - creditcard: a credit card number defined by the regex ^(?:4[0-9]{12}(?:[0-9]{3})?|5[1-5][0-9]{14}|6(?:011|5[0-9][0-9])[0-9]{12}|3[47][0-9]{13}|3(?:0[0-5]|[68][0-9])[0-9]{11}|(?:2131|1800|35\\d{3})\\d{11})$ with any non digit characters mixed in - ssn: a U.S. social security number following the regex ^\\d{3}[- ]?\\d{2}[- ]?\\d{4}$ - hexcolor: an hexadecimal color code like \"#FFFFFF: following the regex ^#?([0-9a-fA-F]{3}|[0-9a-fA-F]{6})$ - rgbcolor: an RGB color code like rgb like \"rgb(255,255,2559\" - byte: base64 encoded binary data - password: any kind of string - date: a date string like \"2006-01-02\" as defined by full-date in RFC3339 - duration: a duration string like \"22 ns\" as parsed by Golang time.ParseDuration or compatible with Scala duration format - datetime: a date time string like \"2014-12-15T19:30:20.000Z\" as defined by date-time in RFC3339.", + Type: []string{"string"}, + Format: "", + }, + }, + "title": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "default": { + SchemaProps: spec.SchemaProps{ + Description: "default is a default value for undefined object fields. Defaulting is a beta feature under the CustomResourceDefaulting feature gate. CustomResourceDefinitions with defaults must be created using the v1 (or newer) CustomResourceDefinition API.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSON"), + }, + }, + "maximum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"number"}, + Format: "double", + }, + }, + "exclusiveMaximum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"boolean"}, + Format: "", + }, + }, + "minimum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"number"}, + Format: "double", + }, + }, + "exclusiveMinimum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"boolean"}, + Format: "", + }, + }, + "maxLength": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "minLength": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "pattern": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "maxItems": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "minItems": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "uniqueItems": { + SchemaProps: spec.SchemaProps{ + Type: []string{"boolean"}, + Format: "", + }, + }, + "multipleOf": { + SchemaProps: spec.SchemaProps{ + Type: []string{"number"}, + Format: "double", + }, + }, + "enum": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSON"), + }, + }, + }, + }, + }, + "maxProperties": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "minProperties": { + SchemaProps: spec.SchemaProps{ + Type: []string{"integer"}, + Format: "int64", + }, + }, + "required": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrArray"), + }, + }, + "allOf": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "oneOf": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "anyOf": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "not": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"), + }, + }, + "properties": { + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "additionalProperties": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrBool"), + }, + }, + "patternProperties": { + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "dependencies": { + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrStringArray"), + }, + }, + }, + }, + }, + "additionalItems": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrBool"), + }, + }, + "definitions": { + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps"), + }, + }, + }, + }, + }, + "externalDocs": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ExternalDocumentation"), + }, + }, + "example": { + SchemaProps: spec.SchemaProps{ + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSON"), + }, + }, + "nullable": { + SchemaProps: spec.SchemaProps{ + Type: []string{"boolean"}, + Format: "", + }, + }, + "x-kubernetes-preserve-unknown-fields": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-preserve-unknown-fields stops the API server decoding step from pruning fields which are not specified in the validation schema. This affects fields recursively, but switches back to normal pruning behaviour if nested properties or additionalProperties are specified in the schema. This can either be true or undefined. False is forbidden.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "x-kubernetes-embedded-resource": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-embedded-resource defines that the value is an embedded Kubernetes runtime.Object, with TypeMeta and ObjectMeta. The type must be object. It is allowed to further restrict the embedded object. kind, apiVersion and metadata are validated automatically. x-kubernetes-preserve-unknown-fields is allowed to be true, but does not have to be if the object is fully specified (up to kind, apiVersion, metadata).", + Type: []string{"boolean"}, + Format: "", + }, + }, + "x-kubernetes-int-or-string": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-int-or-string specifies that this value is either an integer or a string. If this is true, an empty type is allowed and type as child of anyOf is permitted if following one of the following patterns:\n\n1) anyOf:\n - type: integer\n - type: string\n2) allOf:\n - anyOf:\n - type: integer\n - type: string\n - ... zero or more", + Type: []string{"boolean"}, + Format: "", + }, + }, + "x-kubernetes-list-map-keys": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-list-map-keys annotates an array with the x-kubernetes-list-type `map` by specifying the keys used as the index of the map.\n\nThis tag MUST only be used on lists that have the \"x-kubernetes-list-type\" extension set to \"map\". Also, the values specified for this attribute must be a scalar typed field of the child structure (no nesting is supported).\n\nThe properties specified must either be required or have a default value, to ensure those properties are present for all list items.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "x-kubernetes-list-type": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-list-type annotates an array to further describe its topology. This extension must only be used on lists and may have 3 possible values:\n\n1) `atomic`: the list is treated as a single entity, like a scalar.\n Atomic lists will be entirely replaced when updated. This extension\n may be used on any type of list (struct, scalar, ...).\n2) `set`:\n Sets are lists that must not have multiple items with the same value. Each\n value must be a scalar, an object with x-kubernetes-map-type `atomic` or an\n array with x-kubernetes-list-type `atomic`.\n3) `map`:\n These lists are like maps in that their elements have a non-index key\n used to identify them. Order is preserved upon merge. The map tag\n must only be used on a list with elements of type object.\nDefaults to atomic for arrays.", + Type: []string{"string"}, + Format: "", + }, + }, + "x-kubernetes-map-type": { + SchemaProps: spec.SchemaProps{ + Description: "x-kubernetes-map-type annotates an object to further describe its topology. This extension must only be used when type is object and may have 2 possible values:\n\n1) `granular`:\n These maps are actual maps (key-value pairs) and each fields are independent\n from each other (they can each be manipulated by separate actors). This is\n the default behaviour for all maps.\n2) `atomic`: the list is treated as a single entity, like a scalar.\n Atomic maps will be entirely replaced when updated.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ExternalDocumentation", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSON", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaProps", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrArray", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrBool", "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.JSONSchemaPropsOrStringArray"}, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_JSONSchemaPropsOrArray(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSONSchemaPropsOrArray represents a value that can either be a JSONSchemaProps or an array of JSONSchemaProps. Mainly here for serialization purposes.", + Type: v1beta1.JSONSchemaPropsOrArray{}.OpenAPISchemaType(), + Format: v1beta1.JSONSchemaPropsOrArray{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_JSONSchemaPropsOrBool(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSONSchemaPropsOrBool represents JSONSchemaProps or a boolean value. Defaults to true for the boolean property.", + Type: v1beta1.JSONSchemaPropsOrBool{}.OpenAPISchemaType(), + Format: v1beta1.JSONSchemaPropsOrBool{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_JSONSchemaPropsOrStringArray(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JSONSchemaPropsOrStringArray represents a JSONSchemaProps or a string array.", + Type: v1beta1.JSONSchemaPropsOrStringArray{}.OpenAPISchemaType(), + Format: v1beta1.JSONSchemaPropsOrStringArray{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_ServiceReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceReference holds a reference to Service.legacy.k8s.io", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "namespace is the namespace of the service. Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the service. Required", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "path": { + SchemaProps: spec.SchemaProps{ + Description: "path is an optional URL path at which the webhook will be contacted.", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "port is an optional service port at which the webhook will be contacted. `port` should be a valid port number (1-65535, inclusive). Defaults to 443 for backward compatibility.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"namespace", "name"}, + }, + }, + } +} + +func schema_pkg_apis_apiextensions_v1beta1_WebhookClientConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "WebhookClientConfig contains the information to make a TLS connection with the webhook.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "url": { + SchemaProps: spec.SchemaProps{ + Description: "url gives the location of the webhook, in standard URL form (`scheme://host:port/path`). Exactly one of `url` or `service` must be specified.\n\nThe `host` should not refer to a service running in the cluster; use the `service` field instead. The host might be resolved via external DNS in some apiservers (e.g., `kube-apiserver` cannot resolve in-cluster DNS as that would be a layering violation). `host` may also be an IP address.\n\nPlease note that using `localhost` or `127.0.0.1` as a `host` is risky unless you take great care to run this webhook on all hosts which run an apiserver which might need to make calls to this webhook. Such installs are likely to be non-portable, i.e., not easy to turn up in a new cluster.\n\nThe scheme must be \"https\"; the URL must begin with \"https://\".\n\nA path is optional, and if present may be any string permissible in a URL. You may use the path to pass an arbitrary string to the webhook, for example, a cluster identifier.\n\nAttempting to use a user or basic auth e.g. \"user:password@\" is not allowed. Fragments (\"#...\") and query parameters (\"?...\") are not allowed, either.", + Type: []string{"string"}, + Format: "", + }, + }, + "service": { + SchemaProps: spec.SchemaProps{ + Description: "service is a reference to the service for this webhook. Either service or url must be specified.\n\nIf the webhook is running within the cluster, then you should use `service`.", + Ref: ref("k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ServiceReference"), + }, + }, + "caBundle": { + SchemaProps: spec.SchemaProps{ + Description: "caBundle is a PEM encoded CA bundle which will be used to validate the webhook's server certificate. If unspecified, system trust roots on the apiserver are used.", + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1.ServiceReference"}, + } +} + +func schema_apimachinery_pkg_api_resource_Quantity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Quantity is a fixed-point representation of a number. It provides convenient marshaling/unmarshaling in JSON and YAML, in addition to String() and AsInt64() accessors.\n\nThe serialization format is:\n\n ::= \n (Note that may be empty, from the \"\" case in .)\n ::= 0 | 1 | ... | 9 ::= | ::= | . | . | . ::= \"+\" | \"-\" ::= | ::= | | ::= Ki | Mi | Gi | Ti | Pi | Ei\n (International System of units; See: http://physics.nist.gov/cuu/Units/binary.html)\n ::= m | \"\" | k | M | G | T | P | E\n (Note that 1024 = 1Ki but 1000 = 1k; I didn't choose the capitalization.)\n ::= \"e\" | \"E\" \n\nNo matter which of the three exponent forms is used, no quantity may represent a number greater than 2^63-1 in magnitude, nor may it have more than 3 decimal places. Numbers larger or more precise will be capped or rounded up. (E.g.: 0.1m will rounded up to 1m.) This may be extended in the future if we require larger or smaller quantities.\n\nWhen a Quantity is parsed from a string, it will remember the type of suffix it had, and will use the same type again when it is serialized.\n\nBefore serializing, Quantity will be put in \"canonical form\". This means that Exponent/suffix will be adjusted up or down (with a corresponding increase or decrease in Mantissa) such that:\n a. No precision is lost\n b. No fractional digits will be emitted\n c. The exponent (or suffix) is as large as possible.\nThe sign will be omitted unless the number is negative.\n\nExamples:\n 1.5 will be serialized as \"1500m\"\n 1.5Gi will be serialized as \"1536Mi\"\n\nNote that the quantity will NEVER be internally represented by a floating point number. That is the whole point of this exercise.\n\nNon-canonical values will still parse as long as they are well formed, but will be re-emitted in their canonical form. (So always use canonical form, or don't diff.)\n\nThis format is intended to make it difficult to use these numbers without writing some sort of special handling code in the hopes that that will cause implementors to also use a fixed point implementation.", + Type: resource.Quantity{}.OpenAPISchemaType(), + Format: resource.Quantity{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_apimachinery_pkg_api_resource_int64Amount(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "int64Amount represents a fixed precision numerator and arbitrary scale exponent. It is faster than operations on inf.Dec for values that can be represented as int64.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "value": { + SchemaProps: spec.SchemaProps{ + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + "scale": { + SchemaProps: spec.SchemaProps{ + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"value", "scale"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_APIGroup(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIGroup contains the name, the supported versions, and the preferred version of a group.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the group.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "versions": { + SchemaProps: spec.SchemaProps{ + Description: "versions are the versions supported in this group.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.GroupVersionForDiscovery"), + }, + }, + }, + }, + }, + "preferredVersion": { + SchemaProps: spec.SchemaProps{ + Description: "preferredVersion is the version preferred by the API server, which probably is the storage version.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.GroupVersionForDiscovery"), + }, + }, + "serverAddressByClientCIDRs": { + SchemaProps: spec.SchemaProps{ + Description: "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ServerAddressByClientCIDR"), + }, + }, + }, + }, + }, + }, + Required: []string{"name", "versions"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.GroupVersionForDiscovery", "k8s.io/apimachinery/pkg/apis/meta/v1.ServerAddressByClientCIDR"}, + } +} + +func schema_pkg_apis_meta_v1_APIGroupList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIGroupList is a list of APIGroup, to allow clients to discover the API at /apis.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "groups": { + SchemaProps: spec.SchemaProps{ + Description: "groups is a list of APIGroup.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.APIGroup"), + }, + }, + }, + }, + }, + }, + Required: []string{"groups"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.APIGroup"}, + } +} + +func schema_pkg_apis_meta_v1_APIResource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIResource specifies the name of a resource and whether it is namespaced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the plural name of the resource.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "singularName": { + SchemaProps: spec.SchemaProps{ + Description: "singularName is the singular name of the resource. This allows clients to handle plural and singular opaquely. The singularName is more correct for reporting status on a single item and both singular and plural are allowed from the kubectl CLI interface.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "namespaced": { + SchemaProps: spec.SchemaProps{ + Description: "namespaced indicates if a resource is namespaced or not.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "group is the preferred group of the resource. Empty implies the group of the containing resource list. For subresources, this may have a different value, for example: Scale\".", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Description: "version is the preferred version of the resource. Empty implies the version of the containing resource list For subresources, this may have a different value, for example: v1 (while inside a v1beta1 version of the core resource's group)\".", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "kind is the kind for the resource (e.g. 'Foo' is the kind for a resource 'foo')", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "verbs is a list of supported kube verbs (this includes get, list, watch, create, update, patch, delete, deletecollection, and proxy)", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "shortNames": { + SchemaProps: spec.SchemaProps{ + Description: "shortNames is a list of suggested short names of the resource.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "categories": { + SchemaProps: spec.SchemaProps{ + Description: "categories is a list of the grouped resources this resource belongs to (e.g. 'all')", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "storageVersionHash": { + SchemaProps: spec.SchemaProps{ + Description: "The hash value of the storage version, the version this resource is converted to when written to the data store. Value must be treated as opaque by clients. Only equality comparison on the value is valid. This is an alpha feature and may change or be removed in the future. The field is populated by the apiserver only if the StorageVersionHash feature gate is enabled. This field will remain optional even if it graduates.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "singularName", "namespaced", "kind", "verbs"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_APIResourceList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIResourceList is a list of APIResource, it is used to expose the name of the resources supported in a specific group and version, and if the resource is namespaced.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "groupVersion": { + SchemaProps: spec.SchemaProps{ + Description: "groupVersion is the group and version this APIResourceList is for.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "resources contains the name of the resources and if they are namespaced.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.APIResource"), + }, + }, + }, + }, + }, + }, + Required: []string{"groupVersion", "resources"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.APIResource"}, + } +} + +func schema_pkg_apis_meta_v1_APIVersions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIVersions lists the versions that are available, to allow clients to discover the API at /api, which is the root path of the legacy v1 API.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "versions": { + SchemaProps: spec.SchemaProps{ + Description: "versions are the api versions that are available.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "serverAddressByClientCIDRs": { + SchemaProps: spec.SchemaProps{ + Description: "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ServerAddressByClientCIDR"), + }, + }, + }, + }, + }, + }, + Required: []string{"versions", "serverAddressByClientCIDRs"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ServerAddressByClientCIDR"}, + } +} + +func schema_pkg_apis_meta_v1_Condition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Condition contains details for one aspect of the current state of this API Resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type of condition in CamelCase or in foo.example.com/CamelCase.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "observedGeneration": { + SchemaProps: spec.SchemaProps{ + Description: "observedGeneration represents the .metadata.generation that the condition was set based upon. For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date with respect to the current state of the instance.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "lastTransitionTime is the last time the condition transitioned from one status to another. This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "reason contains a programmatic identifier indicating the reason for the condition's last transition. Producers of specific condition types may define expected values and meanings for this field, and whether the values are considered a guaranteed API. The value should be a CamelCase string. This field may not be empty.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "message is a human readable message indicating details about the transition. This may be an empty string.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status", "lastTransitionTime", "reason", "message"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_meta_v1_CreateOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CreateOptions may be provided when creating an API object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "dryRun": { + SchemaProps: spec.SchemaProps{ + Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "fieldManager": { + SchemaProps: spec.SchemaProps{ + Description: "fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_DeleteOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeleteOptions may be provided when deleting an API object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "gracePeriodSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "preconditions": { + SchemaProps: spec.SchemaProps{ + Description: "Must be fulfilled before a deletion is carried out. If not possible, a 409 Conflict status will be returned.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Preconditions"), + }, + }, + "orphanDependents": { + SchemaProps: spec.SchemaProps{ + Description: "Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the \"orphan\" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "propagationPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.", + Type: []string{"string"}, + Format: "", + }, + }, + "dryRun": { + SchemaProps: spec.SchemaProps{ + Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Preconditions"}, + } +} + +func schema_pkg_apis_meta_v1_Duration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Duration is a wrapper around time.Duration which supports correct marshaling to YAML and JSON. In particular, it marshals into strings, which can be used as map keys in json.", + Type: metav1.Duration{}.OpenAPISchemaType(), + Format: metav1.Duration{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_meta_v1_ExportOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExportOptions is the query options to the standard REST get call. Deprecated. Planned for removal in 1.18.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "export": { + SchemaProps: spec.SchemaProps{ + Description: "Should this value be exported. Export strips fields that a user can not specify. Deprecated. Planned for removal in 1.18.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "exact": { + SchemaProps: spec.SchemaProps{ + Description: "Should the export be exact. Exact export maintains cluster-specific fields like 'Namespace'. Deprecated. Planned for removal in 1.18.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"export", "exact"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_FieldsV1(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "FieldsV1 stores a set of fields in a data structure like a Trie, in JSON format.\n\nEach key is either a '.' representing the field itself, and will always map to an empty set, or a string representing a sub-field or item. The string will follow one of these four formats: 'f:', where is the name of a field in a struct, or key in a map 'v:', where is the exact json formatted value of a list item 'i:', where is position of a item in a list 'k:', where is a map of a list item's key fields to their unique values If a key maps to an empty Fields value, the field that key represents is part of the set.\n\nThe exact format is defined in sigs.k8s.io/structured-merge-diff", + Type: []string{"object"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_GetOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GetOptions is the standard query options to the standard REST get call.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Description: "resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.\n\nDefaults to unset", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_GroupKind(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupKind specifies a Group and a Kind, but does not force a version. This is useful for identifying concepts during lookup stages without having partially valid types", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"group", "kind"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_GroupResource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupResource specifies a Group and a Resource, but does not force a version. This is useful for identifying concepts during lookup stages without having partially valid types", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"group", "resource"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_GroupVersion(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupVersion contains the \"group\" and the \"version\", which uniquely identifies the API.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"group", "version"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_GroupVersionForDiscovery(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupVersion contains the \"group/version\" and \"version\" string of a version. It is made a struct to keep extensibility.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "groupVersion": { + SchemaProps: spec.SchemaProps{ + Description: "groupVersion specifies the API group and version in the form \"group/version\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Description: "version specifies the version in the form of \"version\". This is to save the clients the trouble of splitting the GroupVersion.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"groupVersion", "version"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_GroupVersionKind(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupVersionKind unambiguously identifies a kind. It doesn't anonymously include GroupVersion to avoid automatic coersion. It doesn't use a GroupVersion to avoid custom marshalling", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"group", "version", "kind"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_GroupVersionResource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupVersionResource unambiguously identifies a resource. It doesn't anonymously include GroupVersion to avoid automatic coersion. It doesn't use a GroupVersion to avoid custom marshalling", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"group", "version", "resource"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_InternalEvent(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "InternalEvent makes watch.Event versioned", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "Type": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "Object": { + SchemaProps: spec.SchemaProps{ + Description: "Object is:\n * If Type is Added or Modified: the new state of the object.\n * If Type is Deleted: the state of the object immediately before deletion.\n * If Type is Bookmark: the object (instance of a type being watched) where\n only ResourceVersion field is set. On successful restart of watch from a\n bookmark resourceVersion, client is guaranteed to not get repeat event\n nor miss any events.\n * If Type is Error: *api.Status is recommended; other types may make sense\n depending on context.", + Ref: ref("k8s.io/apimachinery/pkg/runtime.Object"), + }, + }, + }, + Required: []string{"Type", "Object"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/runtime.Object"}, + } +} + +func schema_pkg_apis_meta_v1_LabelSelector(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A label selector is a label query over a set of resources. The result of matchLabels and matchExpressions are ANDed. An empty label selector matches all objects. A null label selector matches no objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "matchLabels": { + SchemaProps: spec.SchemaProps{ + Description: "matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is \"key\", the operator is \"In\", and the values array contains only \"value\". The requirements are ANDed.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "matchExpressions": { + SchemaProps: spec.SchemaProps{ + Description: "matchExpressions is a list of label selector requirements. The requirements are ANDed.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelectorRequirement"), + }, + }, + }, + }, + }, + }, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-map-type": "atomic", + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelectorRequirement"}, + } +} + +func schema_pkg_apis_meta_v1_LabelSelectorRequirement(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "key": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "key", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "key is the label key that the selector applies to.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "operator": { + SchemaProps: spec.SchemaProps{ + Description: "operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "values": { + SchemaProps: spec.SchemaProps{ + Description: "values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"key", "operator"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_List(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "List holds a list of objects, which may not be known by the server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of objects", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_pkg_apis_meta_v1_ListMeta(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ListMeta describes metadata that synthetic resources must have, including lists and various status objects. A resource may have only one of {ObjectMeta, ListMeta}.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "selfLink": { + SchemaProps: spec.SchemaProps{ + Description: "selfLink is a URL representing this object. Populated by the system. Read-only.\n\nDEPRECATED Kubernetes will stop propagating this field in 1.20 release and the field is planned to be removed in 1.21 release.", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Description: "String that identifies the server's internal version of this object that can be used by clients to determine when objects have changed. Value must be treated as opaque by clients and passed unmodified back to the server. Populated by the system. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency", + Type: []string{"string"}, + Format: "", + }, + }, + "continue": { + SchemaProps: spec.SchemaProps{ + Description: "continue may be set if the user set a limit on the number of items returned, and indicates that the server has more data available. The value is opaque and may be used to issue another request to the endpoint that served this list to retrieve the next set of available objects. Continuing a consistent list may not be possible if the server configuration has changed or more than a few minutes have passed. The resourceVersion field returned when using this continue value will be identical to the value in the first response, unless you have received this token from an error message.", + Type: []string{"string"}, + Format: "", + }, + }, + "remainingItemCount": { + SchemaProps: spec.SchemaProps{ + Description: "remainingItemCount is the number of subsequent items in the list which are not included in this list response. If the list request contained label or field selectors, then the number of remaining items is unknown and the field will be left unset and omitted during serialization. If the list is complete (either because it is not chunking or because this is the last chunk), then there are no more remaining items and this field will be left unset and omitted during serialization. Servers older than v1.15 do not set this field. The intended use of the remainingItemCount is *estimating* the size of a collection. Clients should not rely on the remainingItemCount to be set or to be exact.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_ListOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ListOptions is the query options to a standard REST list call.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "labelSelector": { + SchemaProps: spec.SchemaProps{ + Description: "A selector to restrict the list of returned objects by their labels. Defaults to everything.", + Type: []string{"string"}, + Format: "", + }, + }, + "fieldSelector": { + SchemaProps: spec.SchemaProps{ + Description: "A selector to restrict the list of returned objects by their fields. Defaults to everything.", + Type: []string{"string"}, + Format: "", + }, + }, + "watch": { + SchemaProps: spec.SchemaProps{ + Description: "Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "allowWatchBookmarks": { + SchemaProps: spec.SchemaProps{ + Description: "allowWatchBookmarks requests watch events with type \"BOOKMARK\". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Description: "resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.\n\nDefaults to unset", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersionMatch": { + SchemaProps: spec.SchemaProps{ + Description: "resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.\n\nDefaults to unset", + Type: []string{"string"}, + Format: "", + }, + }, + "timeoutSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "limit": { + SchemaProps: spec.SchemaProps{ + Description: "limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.\n\nThe server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "continue": { + SchemaProps: spec.SchemaProps{ + Description: "The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the \"next key\".\n\nThis field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_ManagedFieldsEntry(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "manager": { + SchemaProps: spec.SchemaProps{ + Description: "Manager is an identifier of the workflow managing these fields.", + Type: []string{"string"}, + Format: "", + }, + }, + "operation": { + SchemaProps: spec.SchemaProps{ + Description: "Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the version of this resource that this field set applies to. The format is \"group/version\" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.", + Type: []string{"string"}, + Format: "", + }, + }, + "time": { + SchemaProps: spec.SchemaProps{ + Description: "Time is timestamp of when these fields were set. It should always be empty if Operation is 'Apply'", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "fieldsType": { + SchemaProps: spec.SchemaProps{ + Description: "FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: \"FieldsV1\"", + Type: []string{"string"}, + Format: "", + }, + }, + "fieldsV1": { + SchemaProps: spec.SchemaProps{ + Description: "FieldsV1 holds the first JSON version format as described in the \"FieldsV1\" type.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.FieldsV1"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.FieldsV1", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_meta_v1_MicroTime(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MicroTime is version of Time with microsecond level precision.", + Type: metav1.MicroTime{}.OpenAPISchemaType(), + Format: metav1.MicroTime{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_meta_v1_ObjectMeta(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/identifiers#names", + Type: []string{"string"}, + Format: "", + }, + }, + "generateName": { + SchemaProps: spec.SchemaProps{ + Description: "GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.\n\nIf this field is specified and the generated name exists, the server will NOT return a 409 - instead, it will either return 201 Created or 500 with Reason ServerTimeout indicating a unique name could not be found in the time allotted, and the client should retry (optionally after the time indicated in the Retry-After header).\n\nApplied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency", + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the \"default\" namespace, but \"default\" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.\n\nMust be a DNS_LABEL. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/namespaces", + Type: []string{"string"}, + Format: "", + }, + }, + "selfLink": { + SchemaProps: spec.SchemaProps{ + Description: "SelfLink is a URL representing this object. Populated by the system. Read-only.\n\nDEPRECATED Kubernetes will stop propagating this field in 1.20 release and the field is planned to be removed in 1.21 release.", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.\n\nPopulated by the system. Read-only. More info: http://kubernetes.io/docs/user-guide/identifiers#uids", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Description: "An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.\n\nPopulated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency", + Type: []string{"string"}, + Format: "", + }, + }, + "generation": { + SchemaProps: spec.SchemaProps{ + Description: "A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "creationTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.\n\nPopulated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "deletionTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.\n\nPopulated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "deletionGracePeriodSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "labels": { + SchemaProps: spec.SchemaProps{ + Description: "Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: http://kubernetes.io/docs/user-guide/labels", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "annotations": { + SchemaProps: spec.SchemaProps{ + Description: "Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "ownerReferences": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-merge-key": "uid", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.OwnerReference"), + }, + }, + }, + }, + }, + "finalizers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "clusterName": { + SchemaProps: spec.SchemaProps{ + Description: "The name of the cluster which the object belongs to. This is used to distinguish resources with same name and namespace in different clusters. This field is not set anywhere right now and apiserver is going to ignore it if set in create or update request.", + Type: []string{"string"}, + Format: "", + }, + }, + "managedFields": { + SchemaProps: spec.SchemaProps{ + Description: "ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like \"ci-cd\". The set of fields is always in the version that the workflow used when modifying the object.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ManagedFieldsEntry"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ManagedFieldsEntry", "k8s.io/apimachinery/pkg/apis/meta/v1.OwnerReference", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_meta_v1_OwnerReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "API version of the referent.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#uids", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "controller": { + SchemaProps: spec.SchemaProps{ + Description: "If true, this reference points to the managing controller.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "blockOwnerDeletion": { + SchemaProps: spec.SchemaProps{ + Description: "If true, AND if the owner has the \"foregroundDeletion\" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. Defaults to false. To set this field, a user needs \"delete\" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"apiVersion", "kind", "name", "uid"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_PartialObjectMetadata(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PartialObjectMetadata is a generic representation of any object with ObjectMeta. It allows clients to get access to a particular ObjectMeta schema without knowing the details of the version.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"}, + } +} + +func schema_pkg_apis_meta_v1_PartialObjectMetadataList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PartialObjectMetadataList contains a list of objects containing only their metadata", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items contains each of the included items.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.PartialObjectMetadata"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.PartialObjectMetadata"}, + } +} + +func schema_pkg_apis_meta_v1_Patch(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Patch is provided to give a concrete name and type to the Kubernetes PATCH request body.", + Type: []string{"object"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_PatchOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PatchOptions may be provided when patching an API object. PatchOptions is meant to be a superset of UpdateOptions.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "dryRun": { + SchemaProps: spec.SchemaProps{ + Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "force": { + SchemaProps: spec.SchemaProps{ + Description: "Force is going to \"force\" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "fieldManager": { + SchemaProps: spec.SchemaProps{ + Description: "fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch).", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_Preconditions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Preconditions must be fulfilled before an operation (update, delete, etc.) is carried out.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the target UID.", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Description: "Specifies the target ResourceVersion", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_RootPaths(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RootPaths lists the paths available at root. For example: \"/healthz\", \"/apis\".", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "paths": { + SchemaProps: spec.SchemaProps{ + Description: "paths are the paths available at root.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"paths"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_ServerAddressByClientCIDR(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServerAddressByClientCIDR helps the client to determine the server address that they should use, depending on the clientCIDR that they match.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "clientCIDR": { + SchemaProps: spec.SchemaProps{ + Description: "The CIDR with which clients can match their IP to figure out the server address that they should use.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "serverAddress": { + SchemaProps: spec.SchemaProps{ + Description: "Address of this server, suitable for a client that matches the above CIDR. This can be a hostname, hostname:port, IP or IP:port.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"clientCIDR", "serverAddress"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_Status(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Status is a return value for calls that don't return other objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the operation. One of: \"Success\" or \"Failure\". More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human-readable description of the status of this operation.", + Type: []string{"string"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "A machine-readable description of why this operation is in the \"Failure\" status. If this value is empty there is no information available. A Reason clarifies an HTTP status code but does not override it.", + Type: []string{"string"}, + Format: "", + }, + }, + "details": { + SchemaProps: spec.SchemaProps{ + Description: "Extended data associated with the reason. Each reason may define its own extended details. This field is optional and the data returned is not guaranteed to conform to any schema except that defined by the reason type.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.StatusDetails"), + }, + }, + "code": { + SchemaProps: spec.SchemaProps{ + Description: "Suggested HTTP return code for this status, 0 if not set.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.StatusDetails"}, + } +} + +func schema_pkg_apis_meta_v1_StatusCause(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatusCause provides more information about an api.Status failure, including cases when multiple errors are encountered.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "A machine-readable description of the cause of the error. If this value is empty there is no information available.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "A human-readable description of the cause of the error. This field may be presented as-is to a reader.", + Type: []string{"string"}, + Format: "", + }, + }, + "field": { + SchemaProps: spec.SchemaProps{ + Description: "The field of the resource that has caused this error, as named by its JSON serialization. May include dot and postfix notation for nested attributes. Arrays are zero-indexed. Fields may appear more than once in an array of causes due to fields having multiple errors. Optional.\n\nExamples:\n \"name\" - the field \"name\" on the current resource\n \"items[0].name\" - the field \"name\" on the first array entry in \"items\"", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_StatusDetails(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatusDetails is a set of additional properties that MAY be set by the server to provide additional information about a response. The Reason field of a Status object defines what attributes will be set. Clients must ignore fields that do not match the defined type of each attribute, and should assume that any attribute may be empty, invalid, or under defined.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "The name attribute of the resource associated with the status StatusReason (when there is a single name which can be described).", + Type: []string{"string"}, + Format: "", + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "The group attribute of the resource associated with the status StatusReason.", + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "The kind attribute of the resource associated with the status StatusReason. On some operations may differ from the requested resource Kind. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Description: "UID of the resource. (when there is a single resource which can be described). More info: http://kubernetes.io/docs/user-guide/identifiers#uids", + Type: []string{"string"}, + Format: "", + }, + }, + "causes": { + SchemaProps: spec.SchemaProps{ + Description: "The Causes array includes more details associated with the StatusReason failure. Not all StatusReasons may provide detailed causes.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.StatusCause"), + }, + }, + }, + }, + }, + "retryAfterSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the time in seconds before the operation should be retried. Some errors may indicate the client must take an alternate action - for those errors this field may indicate how long to wait before taking the alternate action.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.StatusCause"}, + } +} + +func schema_pkg_apis_meta_v1_Table(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Table is a tabular representation of a set of API resources. The server transforms the object into a set of preferred columns for quickly reviewing the objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "columnDefinitions": { + SchemaProps: spec.SchemaProps{ + Description: "columnDefinitions describes each column in the returned items array. The number of cells per row will always match the number of column definitions.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.TableColumnDefinition"), + }, + }, + }, + }, + }, + "rows": { + SchemaProps: spec.SchemaProps{ + Description: "rows is the list of items in the table.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.TableRow"), + }, + }, + }, + }, + }, + }, + Required: []string{"columnDefinitions", "rows"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.TableColumnDefinition", "k8s.io/apimachinery/pkg/apis/meta/v1.TableRow"}, + } +} + +func schema_pkg_apis_meta_v1_TableColumnDefinition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TableColumnDefinition contains information about a column returned in the Table.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is a human readable name for the column.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type is an OpenAPI type definition for this column, such as number, integer, string, or array. See https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types for more.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "format": { + SchemaProps: spec.SchemaProps{ + Description: "format is an optional OpenAPI type modifier for this column. A format modifies the type and imposes additional rules, like date or time formatting for a string. The 'name' format is applied to the primary identifier column which has type 'string' to assist in clients identifying column is the resource name. See https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types for more.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "description": { + SchemaProps: spec.SchemaProps{ + Description: "description is a human readable description of this column.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "priority": { + SchemaProps: spec.SchemaProps{ + Description: "priority is an integer defining the relative importance of this column compared to others. Lower numbers are considered higher priority. Columns that may be omitted in limited space scenarios should be given a higher priority.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"name", "type", "format", "description", "priority"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_TableOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TableOptions are used when a Table is requested by the caller.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "includeObject": { + SchemaProps: spec.SchemaProps{ + Description: "includeObject decides whether to include each object along with its columnar information. Specifying \"None\" will return no object, specifying \"Object\" will return the full object contents, and specifying \"Metadata\" (the default) will return the object's metadata in the PartialObjectMetadata kind in version v1beta1 of the meta.k8s.io API group.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_TableRow(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TableRow is an individual row in a table.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "cells": { + SchemaProps: spec.SchemaProps{ + Description: "cells will be as wide as the column definitions array and may contain strings, numbers (float64 or int64), booleans, simple maps, lists, or null. See the type field of the column definition for a more detailed description.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Format: "", + }, + }, + }, + }, + }, + "conditions": { + SchemaProps: spec.SchemaProps{ + Description: "conditions describe additional status of a row that are relevant for a human user. These conditions apply to the row, not to the object, and will be specific to table output. The only defined condition type is 'Completed', for a row that indicates a resource that has run to completion and can be given less visual priority.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.TableRowCondition"), + }, + }, + }, + }, + }, + "object": { + SchemaProps: spec.SchemaProps{ + Description: "This field contains the requested additional information about each object based on the includeObject policy when requesting the Table. If \"None\", this field is empty, if \"Object\" this will be the default serialization of the object for the current API version, and if \"Metadata\" (the default) will contain the object metadata. Check the returned kind and apiVersion of the object before parsing. The media type of the object will always match the enclosing list - if this as a JSON table, these will be JSON encoded objects.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + Required: []string{"cells"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.TableRowCondition", "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_pkg_apis_meta_v1_TableRowCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TableRowCondition allows a row to be marked with additional information.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type of row condition. The only defined value is 'Completed' indicating that the object this row represents has reached a completed state and may be given less visual priority than other rows. Clients are not required to honor any conditions but should be consistent where possible about handling the conditions.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status of the condition, one of True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "(brief) machine readable reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Human readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_Time(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers.", + Type: metav1.Time{}.OpenAPISchemaType(), + Format: metav1.Time{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_pkg_apis_meta_v1_Timestamp(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Timestamp is a struct that is equivalent to Time, but intended for protobuf marshalling/unmarshalling. It is generated into a serialization that matches Time. Do not use in Go structs.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "seconds": { + SchemaProps: spec.SchemaProps{ + Description: "Represents seconds of UTC time since Unix epoch 1970-01-01T00:00:00Z. Must be from 0001-01-01T00:00:00Z to 9999-12-31T23:59:59Z inclusive.", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + "nanos": { + SchemaProps: spec.SchemaProps{ + Description: "Non-negative fractions of a second at nanosecond resolution. Negative second values with fractions must still have non-negative nanos values that count forward in time. Must be from 0 to 999,999,999 inclusive. This field may be limited in precision depending on context.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"seconds", "nanos"}, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_TypeMeta(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TypeMeta describes an individual object in an API response or request with strings representing the type of the object and its API schema version. Structures that are versioned or persisted should inline TypeMeta.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_UpdateOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "UpdateOptions may be provided when updating an API object. All fields in UpdateOptions should also be present in PatchOptions.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "dryRun": { + SchemaProps: spec.SchemaProps{ + Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "fieldManager": { + SchemaProps: spec.SchemaProps{ + Description: "fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_meta_v1_WatchEvent(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Event represents a single event to a watched resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "object": { + SchemaProps: spec.SchemaProps{ + Description: "Object is:\n * If Type is Added or Modified: the new state of the object.\n * If Type is Deleted: the state of the object immediately before deletion.\n * If Type is Error: *Status is recommended; other types may make sense\n depending on context.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + Required: []string{"type", "object"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_pkg_apis_meta_v1beta1_PartialObjectMetadataList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PartialObjectMetadataList contains a list of objects containing only their metadata.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "items contains each of the included items.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.PartialObjectMetadata"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.PartialObjectMetadata"}, + } +} + +func schema_k8sio_apimachinery_pkg_runtime_RawExtension(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RawExtension is used to hold extensions in external versions.\n\nTo use this, make a field which has RawExtension as its type in your external, versioned struct, and Object in your internal struct. You also need to register your various plugin types.\n\n// Internal package: type MyAPIObject struct {\n\truntime.TypeMeta `json:\",inline\"`\n\tMyPlugin runtime.Object `json:\"myPlugin\"`\n} type PluginA struct {\n\tAOption string `json:\"aOption\"`\n}\n\n// External package: type MyAPIObject struct {\n\truntime.TypeMeta `json:\",inline\"`\n\tMyPlugin runtime.RawExtension `json:\"myPlugin\"`\n} type PluginA struct {\n\tAOption string `json:\"aOption\"`\n}\n\n// On the wire, the JSON will look something like this: {\n\t\"kind\":\"MyAPIObject\",\n\t\"apiVersion\":\"v1\",\n\t\"myPlugin\": {\n\t\t\"kind\":\"PluginA\",\n\t\t\"aOption\":\"foo\",\n\t},\n}\n\nSo what happens? Decode first uses json or yaml to unmarshal the serialized data into your external MyAPIObject. That causes the raw JSON to be stored, but not unpacked. The next step is to copy (using pkg/conversion) into the internal struct. The runtime package's DefaultScheme has conversion functions installed which will unpack the JSON stored in RawExtension, turning it into the correct object type, and storing it in the Object. (TODO: In the case where the object is of an unknown type, a runtime.Unknown object will be created and stored.)", + Type: []string{"object"}, + }, + }, + } +} + +func schema_k8sio_apimachinery_pkg_runtime_TypeMeta(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TypeMeta is shared by all top level objects. The proper way to use it is to inline it in your type, like this: type MyAwesomeAPIObject struct {\n runtime.TypeMeta `json:\",inline\"`\n ... // other fields\n} func (obj *MyAwesomeAPIObject) SetGroupVersionKind(gvk *metav1.GroupVersionKind) { metav1.UpdateTypeMeta(obj,gvk) }; GroupVersionKind() *GroupVersionKind\n\nTypeMeta is provided here for convenience. You may use it directly from this package or define your own with the same fields.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_apimachinery_pkg_runtime_Unknown(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Unknown allows api objects with unknown types to be passed-through. This can be used to deal with the API objects from a plug-in. Unknown objects still have functioning TypeMeta features-- kind, version, etc. metadata and field mutatation.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "kind": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "Raw": { + SchemaProps: spec.SchemaProps{ + Description: "Raw will hold the complete serialized object which couldn't be matched with a registered type. Most likely, nothing should be done with this except for passing it through the system.", + Type: []string{"string"}, + Format: "byte", + }, + }, + "ContentEncoding": { + SchemaProps: spec.SchemaProps{ + Description: "ContentEncoding is encoding used to encode 'Raw' data. Unspecified means no encoding.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ContentType": { + SchemaProps: spec.SchemaProps{ + Description: "ContentType is serialization method used to serialize 'Raw'. Unspecified means ContentTypeJSON.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"Raw", "ContentEncoding", "ContentType"}, + }, + }, + } +} + +func schema_apimachinery_pkg_util_intstr_IntOrString(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "IntOrString is a type that can hold an int32 or a string. When used in JSON or YAML marshalling and unmarshalling, it produces or consumes the inner type. This allows you to have, for example, a JSON field that can accept a name or number.", + Type: intstr.IntOrString{}.OpenAPISchemaType(), + Format: intstr.IntOrString{}.OpenAPISchemaFormat(), + }, + }, + } +} + +func schema_k8sio_apimachinery_pkg_version_Info(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Info contains versioning information. how we'll want to distribute that information.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "major": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "minor": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "gitVersion": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "gitCommit": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "gitTreeState": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "buildDate": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "goVersion": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "compiler": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "platform": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"major", "minor", "gitVersion", "gitCommit", "gitTreeState", "buildDate", "goVersion", "compiler", "platform"}, + }, + }, + } +} + +func schema_pkg_apis_audit_v1_Event(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Event captures all the information that can be included in an API audit log.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "level": { + SchemaProps: spec.SchemaProps{ + Description: "AuditLevel at which event was generated", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "auditID": { + SchemaProps: spec.SchemaProps{ + Description: "Unique audit ID, generated for each request.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "stage": { + SchemaProps: spec.SchemaProps{ + Description: "Stage of the request handling when this event instance was generated.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "requestURI": { + SchemaProps: spec.SchemaProps{ + Description: "RequestURI is the request URI as sent by the client to a server.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "verb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is the kubernetes verb associated with the request. For non-resource requests, this is the lower-cased HTTP method.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "Authenticated user information.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1.UserInfo"), + }, + }, + "impersonatedUser": { + SchemaProps: spec.SchemaProps{ + Description: "Impersonated user information.", + Ref: ref("k8s.io/api/authentication/v1.UserInfo"), + }, + }, + "sourceIPs": { + SchemaProps: spec.SchemaProps{ + Description: "Source IPs, from where the request originated and intermediate proxies.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "userAgent": { + SchemaProps: spec.SchemaProps{ + Description: "UserAgent records the user agent string reported by the client. Note that the UserAgent is provided by the client, and must not be trusted.", + Type: []string{"string"}, + Format: "", + }, + }, + "objectRef": { + SchemaProps: spec.SchemaProps{ + Description: "Object reference this request is targeted at. Does not apply for List-type requests, or non-resource requests.", + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1.ObjectReference"), + }, + }, + "responseStatus": { + SchemaProps: spec.SchemaProps{ + Description: "The response status, populated even when the ResponseObject is not a Status type. For successful responses, this will only include the Code and StatusSuccess. For non-status type error responses, this will be auto-populated with the error Message.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Status"), + }, + }, + "requestObject": { + SchemaProps: spec.SchemaProps{ + Description: "API object from the request, in JSON format. The RequestObject is recorded as-is in the request (possibly re-encoded as JSON), prior to version conversion, defaulting, admission or merging. It is an external versioned object type, and may not be a valid object on its own. Omitted for non-resource requests. Only logged at Request Level and higher.", + Ref: ref("k8s.io/apimachinery/pkg/runtime.Unknown"), + }, + }, + "responseObject": { + SchemaProps: spec.SchemaProps{ + Description: "API object returned in the response, in JSON. The ResponseObject is recorded after conversion to the external type, and serialized as JSON. Omitted for non-resource requests. Only logged at Response Level.", + Ref: ref("k8s.io/apimachinery/pkg/runtime.Unknown"), + }, + }, + "requestReceivedTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "Time the request reached the apiserver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "stageTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "Time the request reached current audit stage.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "annotations": { + SchemaProps: spec.SchemaProps{ + Description: "Annotations is an unstructured key value map stored with an audit event that may be set by plugins invoked in the request serving chain, including authentication, authorization and admission plugins. Note that these annotations are for the audit event, and do not correspond to the metadata.annotations of the submitted object. Keys should uniquely identify the informing component to avoid name collisions (e.g. podsecuritypolicy.admission.k8s.io/policy). Values should be short. Annotations are included in the Metadata level.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"level", "auditID", "stage", "requestURI", "verb", "user"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1.UserInfo", "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime", "k8s.io/apimachinery/pkg/apis/meta/v1.Status", "k8s.io/apimachinery/pkg/runtime.Unknown", "k8s.io/apiserver/pkg/apis/audit/v1.ObjectReference"}, + } +} + +func schema_pkg_apis_audit_v1_EventList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventList is a list of audit Events.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1.Event"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apiserver/pkg/apis/audit/v1.Event"}, + } +} + +func schema_pkg_apis_audit_v1_GroupResources(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupResources represents resource kinds in an API group.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group is the name of the API group that contains the resources. The empty string represents the core API group.", + Type: []string{"string"}, + Format: "", + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to.\n\nFor example: 'pods' matches pods. 'pods/log' matches the log subresource of pods. '*' matches all resources and their subresources. 'pods/*' matches all subresources of pods. '*/scale' matches all scale subresources.\n\nIf wildcard is present, the validation rule will ensure resources do not overlap with each other.\n\nAn empty list implies all resources and subresources in this API groups apply.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resourceNames": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceNames is a list of resource instance names that the policy matches. Using this field requires Resources to be specified. An empty list implies that every instance of the resource is matched.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_audit_v1_ObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectReference contains enough information to let you inspect or modify the referred object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resource": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup is the name of the API group that contains the referred object. The empty string represents the core API group.", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion is the version of the API group that contains the referred object.", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "subresource": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_audit_v1_Policy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Policy defines the configuration of audit logging, and the rules for how different request categories are logged.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectMeta is included for interoperability with API infrastructure.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules specify the audit Level a request should be recorded at. A request may match multiple rules, in which case the FIRST matching rule is used. The default audit level is None, but can be overridden by a catch-all rule at the end of the list. PolicyRules are strictly ordered.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1.PolicyRule"), + }, + }, + }, + }, + }, + "omitStages": { + SchemaProps: spec.SchemaProps{ + Description: "OmitStages is a list of stages for which no events are created. Note that this can also be specified per rule in which case the union of both are omitted.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"rules"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apiserver/pkg/apis/audit/v1.PolicyRule"}, + } +} + +func schema_pkg_apis_audit_v1_PolicyList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyList is a list of audit Policies.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1.Policy"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apiserver/pkg/apis/audit/v1.Policy"}, + } +} + +func schema_pkg_apis_audit_v1_PolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyRule maps requests based off metadata to an audit Level. Requests must match the rules of every field (an intersection of rules).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "level": { + SchemaProps: spec.SchemaProps{ + Description: "The Level that requests matching this rule are recorded at.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "users": { + SchemaProps: spec.SchemaProps{ + Description: "The users (by authenticated user name) this rule applies to. An empty list implies every user.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "userGroups": { + SchemaProps: spec.SchemaProps{ + Description: "The user groups this rule applies to. A user is considered matching if it is a member of any of the UserGroups. An empty list implies every user group.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "The verbs that match this rule. An empty list implies every verb.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources that this rule matches. An empty list implies all kinds in all API groups.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1.GroupResources"), + }, + }, + }, + }, + }, + "namespaces": { + SchemaProps: spec.SchemaProps{ + Description: "Namespaces that this rule matches. The empty string \"\" matches non-namespaced resources. An empty list implies every namespace.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceURLs is a set of URL paths that should be audited. *s are allowed, but only as the full, final step in the path. Examples:\n \"/metrics\" - Log requests for apiserver metrics\n \"/healthz*\" - Log all health checks", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "omitStages": { + SchemaProps: spec.SchemaProps{ + Description: "OmitStages is a list of stages for which no events are created. Note that this can also be specified policy wide in which case the union of both are omitted. An empty list means no restrictions will apply.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"level"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiserver/pkg/apis/audit/v1.GroupResources"}, + } +} + +func schema_pkg_apis_audit_v1alpha1_Event(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Event captures all the information that can be included in an API audit log.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectMeta is included for interoperability with API infrastructure.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "level": { + SchemaProps: spec.SchemaProps{ + Description: "AuditLevel at which event was generated", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "Time the request reached the apiserver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "auditID": { + SchemaProps: spec.SchemaProps{ + Description: "Unique audit ID, generated for each request.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "stage": { + SchemaProps: spec.SchemaProps{ + Description: "Stage of the request handling when this event instance was generated.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "requestURI": { + SchemaProps: spec.SchemaProps{ + Description: "RequestURI is the request URI as sent by the client to a server.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "verb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is the kubernetes verb associated with the request. For non-resource requests, this is the lower-cased HTTP method.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "Authenticated user information.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1.UserInfo"), + }, + }, + "impersonatedUser": { + SchemaProps: spec.SchemaProps{ + Description: "Impersonated user information.", + Ref: ref("k8s.io/api/authentication/v1.UserInfo"), + }, + }, + "sourceIPs": { + SchemaProps: spec.SchemaProps{ + Description: "Source IPs, from where the request originated and intermediate proxies.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "userAgent": { + SchemaProps: spec.SchemaProps{ + Description: "UserAgent records the user agent string reported by the client. Note that the UserAgent is provided by the client, and must not be trusted.", + Type: []string{"string"}, + Format: "", + }, + }, + "objectRef": { + SchemaProps: spec.SchemaProps{ + Description: "Object reference this request is targeted at. Does not apply for List-type requests, or non-resource requests.", + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1alpha1.ObjectReference"), + }, + }, + "responseStatus": { + SchemaProps: spec.SchemaProps{ + Description: "The response status, populated even when the ResponseObject is not a Status type. For successful responses, this will only include the Code and StatusSuccess. For non-status type error responses, this will be auto-populated with the error Message.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Status"), + }, + }, + "requestObject": { + SchemaProps: spec.SchemaProps{ + Description: "API object from the request, in JSON format. The RequestObject is recorded as-is in the request (possibly re-encoded as JSON), prior to version conversion, defaulting, admission or merging. It is an external versioned object type, and may not be a valid object on its own. Omitted for non-resource requests. Only logged at Request Level and higher.", + Ref: ref("k8s.io/apimachinery/pkg/runtime.Unknown"), + }, + }, + "responseObject": { + SchemaProps: spec.SchemaProps{ + Description: "API object returned in the response, in JSON. The ResponseObject is recorded after conversion to the external type, and serialized as JSON. Omitted for non-resource requests. Only logged at Response Level.", + Ref: ref("k8s.io/apimachinery/pkg/runtime.Unknown"), + }, + }, + "requestReceivedTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "Time the request reached the apiserver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "stageTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "Time the request reached current audit stage.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "annotations": { + SchemaProps: spec.SchemaProps{ + Description: "Annotations is an unstructured key value map stored with an audit event that may be set by plugins invoked in the request serving chain, including authentication, authorization and admission plugins. Note that these annotations are for the audit event, and do not correspond to the metadata.annotations of the submitted object. Keys should uniquely identify the informing component to avoid name collisions (e.g. podsecuritypolicy.admission.k8s.io/policy). Values should be short. Annotations are included in the Metadata level.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"level", "timestamp", "auditID", "stage", "requestURI", "verb", "user"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1.UserInfo", "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Status", "k8s.io/apimachinery/pkg/apis/meta/v1.Time", "k8s.io/apimachinery/pkg/runtime.Unknown", "k8s.io/apiserver/pkg/apis/audit/v1alpha1.ObjectReference"}, + } +} + +func schema_pkg_apis_audit_v1alpha1_EventList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventList is a list of audit Events.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1alpha1.Event"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apiserver/pkg/apis/audit/v1alpha1.Event"}, + } +} + +func schema_pkg_apis_audit_v1alpha1_GroupResources(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupResources represents resource kinds in an API group.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group is the name of the API group that contains the resources. The empty string represents the core API group.", + Type: []string{"string"}, + Format: "", + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to.\n\nFor example: 'pods' matches pods. 'pods/log' matches the log subresource of pods. '*' matches all resources and their subresources. 'pods/*' matches all subresources of pods. '*/scale' matches all scale subresources.\n\nIf wildcard is present, the validation rule will ensure resources do not overlap with each other.\n\nAn empty list implies all resources and subresources in this API groups apply.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resourceNames": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceNames is a list of resource instance names that the policy matches. Using this field requires Resources to be specified. An empty list implies that every instance of the resource is matched.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_audit_v1alpha1_ObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectReference contains enough information to let you inspect or modify the referred object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resource": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "subresource": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_audit_v1alpha1_Policy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Policy defines the configuration of audit logging, and the rules for how different request categories are logged.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectMeta is included for interoperability with API infrastructure.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules specify the audit Level a request should be recorded at. A request may match multiple rules, in which case the FIRST matching rule is used. The default audit level is None, but can be overridden by a catch-all rule at the end of the list. PolicyRules are strictly ordered.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1alpha1.PolicyRule"), + }, + }, + }, + }, + }, + "omitStages": { + SchemaProps: spec.SchemaProps{ + Description: "OmitStages is a list of stages for which no events are created. Note that this can also be specified per rule in which case the union of both are omitted.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"rules"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apiserver/pkg/apis/audit/v1alpha1.PolicyRule"}, + } +} + +func schema_pkg_apis_audit_v1alpha1_PolicyList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyList is a list of audit Policies.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1alpha1.Policy"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apiserver/pkg/apis/audit/v1alpha1.Policy"}, + } +} + +func schema_pkg_apis_audit_v1alpha1_PolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyRule maps requests based off metadata to an audit Level. Requests must match the rules of every field (an intersection of rules).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "level": { + SchemaProps: spec.SchemaProps{ + Description: "The Level that requests matching this rule are recorded at.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "users": { + SchemaProps: spec.SchemaProps{ + Description: "The users (by authenticated user name) this rule applies to. An empty list implies every user.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "userGroups": { + SchemaProps: spec.SchemaProps{ + Description: "The user groups this rule applies to. A user is considered matching if it is a member of any of the UserGroups. An empty list implies every user group.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "The verbs that match this rule. An empty list implies every verb.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources that this rule matches. An empty list implies all kinds in all API groups.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1alpha1.GroupResources"), + }, + }, + }, + }, + }, + "namespaces": { + SchemaProps: spec.SchemaProps{ + Description: "Namespaces that this rule matches. The empty string \"\" matches non-namespaced resources. An empty list implies every namespace.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceURLs is a set of URL paths that should be audited. *s are allowed, but only as the full, final step in the path. Examples:\n \"/metrics\" - Log requests for apiserver metrics\n \"/healthz*\" - Log all health checks", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "omitStages": { + SchemaProps: spec.SchemaProps{ + Description: "OmitStages is a list of stages for which no events are created. Note that this can also be specified policy wide in which case the union of both are omitted. An empty list means no restrictions will apply.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"level"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiserver/pkg/apis/audit/v1alpha1.GroupResources"}, + } +} + +func schema_pkg_apis_audit_v1beta1_Event(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Event captures all the information that can be included in an API audit log.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectMeta is included for interoperability with API infrastructure. DEPRECATED: Use StageTimestamp which supports micro second instead of ObjectMeta.CreateTimestamp and the rest of the object is not used", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "level": { + SchemaProps: spec.SchemaProps{ + Description: "AuditLevel at which event was generated", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "Time the request reached the apiserver. DEPRECATED: Use RequestReceivedTimestamp which supports micro second instead.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "auditID": { + SchemaProps: spec.SchemaProps{ + Description: "Unique audit ID, generated for each request.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "stage": { + SchemaProps: spec.SchemaProps{ + Description: "Stage of the request handling when this event instance was generated.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "requestURI": { + SchemaProps: spec.SchemaProps{ + Description: "RequestURI is the request URI as sent by the client to a server.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "verb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb is the kubernetes verb associated with the request. For non-resource requests, this is the lower-cased HTTP method.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "user": { + SchemaProps: spec.SchemaProps{ + Description: "Authenticated user information.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/authentication/v1.UserInfo"), + }, + }, + "impersonatedUser": { + SchemaProps: spec.SchemaProps{ + Description: "Impersonated user information.", + Ref: ref("k8s.io/api/authentication/v1.UserInfo"), + }, + }, + "sourceIPs": { + SchemaProps: spec.SchemaProps{ + Description: "Source IPs, from where the request originated and intermediate proxies.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "userAgent": { + SchemaProps: spec.SchemaProps{ + Description: "UserAgent records the user agent string reported by the client. Note that the UserAgent is provided by the client, and must not be trusted.", + Type: []string{"string"}, + Format: "", + }, + }, + "objectRef": { + SchemaProps: spec.SchemaProps{ + Description: "Object reference this request is targeted at. Does not apply for List-type requests, or non-resource requests.", + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1beta1.ObjectReference"), + }, + }, + "responseStatus": { + SchemaProps: spec.SchemaProps{ + Description: "The response status, populated even when the ResponseObject is not a Status type. For successful responses, this will only include the Code and StatusSuccess. For non-status type error responses, this will be auto-populated with the error Message.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Status"), + }, + }, + "requestObject": { + SchemaProps: spec.SchemaProps{ + Description: "API object from the request, in JSON format. The RequestObject is recorded as-is in the request (possibly re-encoded as JSON), prior to version conversion, defaulting, admission or merging. It is an external versioned object type, and may not be a valid object on its own. Omitted for non-resource requests. Only logged at Request Level and higher.", + Ref: ref("k8s.io/apimachinery/pkg/runtime.Unknown"), + }, + }, + "responseObject": { + SchemaProps: spec.SchemaProps{ + Description: "API object returned in the response, in JSON. The ResponseObject is recorded after conversion to the external type, and serialized as JSON. Omitted for non-resource requests. Only logged at Response Level.", + Ref: ref("k8s.io/apimachinery/pkg/runtime.Unknown"), + }, + }, + "requestReceivedTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "Time the request reached the apiserver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "stageTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "Time the request reached current audit stage.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime"), + }, + }, + "annotations": { + SchemaProps: spec.SchemaProps{ + Description: "Annotations is an unstructured key value map stored with an audit event that may be set by plugins invoked in the request serving chain, including authentication, authorization and admission plugins. Note that these annotations are for the audit event, and do not correspond to the metadata.annotations of the submitted object. Keys should uniquely identify the informing component to avoid name collisions (e.g. podsecuritypolicy.admission.k8s.io/policy). Values should be short. Annotations are included in the Metadata level.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"level", "timestamp", "auditID", "stage", "requestURI", "verb", "user"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/authentication/v1.UserInfo", "k8s.io/apimachinery/pkg/apis/meta/v1.MicroTime", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Status", "k8s.io/apimachinery/pkg/apis/meta/v1.Time", "k8s.io/apimachinery/pkg/runtime.Unknown", "k8s.io/apiserver/pkg/apis/audit/v1beta1.ObjectReference"}, + } +} + +func schema_pkg_apis_audit_v1beta1_EventList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EventList is a list of audit Events.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1beta1.Event"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apiserver/pkg/apis/audit/v1beta1.Event"}, + } +} + +func schema_pkg_apis_audit_v1beta1_GroupResources(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupResources represents resource kinds in an API group.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group is the name of the API group that contains the resources. The empty string represents the core API group.", + Type: []string{"string"}, + Format: "", + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources is a list of resources this rule applies to.\n\nFor example: 'pods' matches pods. 'pods/log' matches the log subresource of pods. '*' matches all resources and their subresources. 'pods/*' matches all subresources of pods. '*/scale' matches all scale subresources.\n\nIf wildcard is present, the validation rule will ensure resources do not overlap with each other.\n\nAn empty list implies all resources and subresources in this API groups apply.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resourceNames": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceNames is a list of resource instance names that the policy matches. Using this field requires Resources to be specified. An empty list implies that every instance of the resource is matched.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_audit_v1beta1_ObjectReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ObjectReference contains enough information to let you inspect or modify the referred object.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "resource": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "uid": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup is the name of the API group that contains the referred object. The empty string represents the core API group.", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion is the version of the API group that contains the referred object.", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceVersion": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + "subresource": { + SchemaProps: spec.SchemaProps{ + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_audit_v1beta1_Policy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Policy defines the configuration of audit logging, and the rules for how different request categories are logged.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "ObjectMeta is included for interoperability with API infrastructure.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "rules": { + SchemaProps: spec.SchemaProps{ + Description: "Rules specify the audit Level a request should be recorded at. A request may match multiple rules, in which case the FIRST matching rule is used. The default audit level is None, but can be overridden by a catch-all rule at the end of the list. PolicyRules are strictly ordered.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1beta1.PolicyRule"), + }, + }, + }, + }, + }, + "omitStages": { + SchemaProps: spec.SchemaProps{ + Description: "OmitStages is a list of stages for which no events are created. Note that this can also be specified per rule in which case the union of both are omitted.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"rules"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apiserver/pkg/apis/audit/v1beta1.PolicyRule"}, + } +} + +func schema_pkg_apis_audit_v1beta1_PolicyList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyList is a list of audit Policies.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1beta1.Policy"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/apiserver/pkg/apis/audit/v1beta1.Policy"}, + } +} + +func schema_pkg_apis_audit_v1beta1_PolicyRule(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicyRule maps requests based off metadata to an audit Level. Requests must match the rules of every field (an intersection of rules).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "level": { + SchemaProps: spec.SchemaProps{ + Description: "The Level that requests matching this rule are recorded at.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "users": { + SchemaProps: spec.SchemaProps{ + Description: "The users (by authenticated user name) this rule applies to. An empty list implies every user.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "userGroups": { + SchemaProps: spec.SchemaProps{ + Description: "The user groups this rule applies to. A user is considered matching if it is a member of any of the UserGroups. An empty list implies every user group.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "verbs": { + SchemaProps: spec.SchemaProps{ + Description: "The verbs that match this rule. An empty list implies every verb.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Description: "Resources that this rule matches. An empty list implies all kinds in all API groups.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apiserver/pkg/apis/audit/v1beta1.GroupResources"), + }, + }, + }, + }, + }, + "namespaces": { + SchemaProps: spec.SchemaProps{ + Description: "Namespaces that this rule matches. The empty string \"\" matches non-namespaced resources. An empty list implies every namespace.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "nonResourceURLs": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourceURLs is a set of URL paths that should be audited. *s are allowed, but only as the full, final step in the path. Examples:\n \"/metrics\" - Log requests for apiserver metrics\n \"/healthz*\" - Log all health checks", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "omitStages": { + SchemaProps: spec.SchemaProps{ + Description: "OmitStages is a list of stages for which no events are created. Note that this can also be specified policy wide in which case the union of both are omitted. An empty list means no restrictions will apply.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"level"}, + }, + }, + Dependencies: []string{ + "k8s.io/apiserver/pkg/apis/audit/v1beta1.GroupResources"}, + } +} + +func schema_pkg_apis_clientauthentication_v1alpha1_ExecCredential(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExecCredential is used by exec-based plugins to communicate credentials to HTTP transports.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information passed to the plugin by the transport. This contains request and runtime specific information, such as if the session is interactive.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.ExecCredentialSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the plugin and holds the credentials that the transport should use to contact the API.", + Ref: ref("k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.ExecCredentialStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.ExecCredentialSpec", "k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.ExecCredentialStatus"}, + } +} + +func schema_pkg_apis_clientauthentication_v1alpha1_ExecCredentialSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExecCredentialSpec holds request and runtime specific information provided by the transport.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "response": { + SchemaProps: spec.SchemaProps{ + Description: "Response is populated when the transport encounters HTTP status codes, such as 401, suggesting previous credentials were invalid.", + Ref: ref("k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.Response"), + }, + }, + "interactive": { + SchemaProps: spec.SchemaProps{ + Description: "Interactive is true when the transport detects the command is being called from an interactive prompt.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1.Response"}, + } +} + +func schema_pkg_apis_clientauthentication_v1alpha1_ExecCredentialStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExecCredentialStatus holds credentials for the transport to use.\n\nToken and ClientKeyData are sensitive fields. This data should only be transmitted in-memory between client and exec plugin process. Exec plugin itself should at least be protected via file permissions.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "expirationTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "ExpirationTimestamp indicates a time when the provided credentials expire.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "token": { + SchemaProps: spec.SchemaProps{ + Description: "Token is a bearer token used by the client for request authentication.", + Type: []string{"string"}, + Format: "", + }, + }, + "clientCertificateData": { + SchemaProps: spec.SchemaProps{ + Description: "PEM-encoded client TLS certificates (including intermediates, if any).", + Type: []string{"string"}, + Format: "", + }, + }, + "clientKeyData": { + SchemaProps: spec.SchemaProps{ + Description: "PEM-encoded private key for the above certificate.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_clientauthentication_v1alpha1_Response(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Response defines metadata about a failed request, including HTTP status code and response headers.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "header": { + SchemaProps: spec.SchemaProps{ + Description: "Header holds HTTP headers returned by the server.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + "code": { + SchemaProps: spec.SchemaProps{ + Description: "Code is the HTTP status code returned by the server.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_clientauthentication_v1beta1_Cluster(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Cluster contains information to allow an exec plugin to communicate with the kubernetes cluster being authenticated to.\n\nTo ensure that this struct contains everything someone would need to communicate with a kubernetes cluster (just like they would via a kubeconfig), the fields should shadow \"k8s.io/client-go/tools/clientcmd/api/v1\".Cluster, with the exception of CertificateAuthority, since CA data will always be passed to the plugin as bytes.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "server": { + SchemaProps: spec.SchemaProps{ + Description: "Server is the address of the kubernetes cluster (https://hostname:port).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "tls-server-name": { + SchemaProps: spec.SchemaProps{ + Description: "TLSServerName is passed to the server for SNI and is used in the client to check server certificates against. If ServerName is empty, the hostname used to contact the server is used.", + Type: []string{"string"}, + Format: "", + }, + }, + "insecure-skip-tls-verify": { + SchemaProps: spec.SchemaProps{ + Description: "InsecureSkipTLSVerify skips the validity check for the server's certificate. This will make your HTTPS connections insecure.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "certificate-authority-data": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "CAData contains PEM-encoded certificate authority certificates. If empty, system roots should be used.", + Type: []string{"string"}, + Format: "byte", + }, + }, + "proxy-url": { + SchemaProps: spec.SchemaProps{ + Description: "ProxyURL is the URL to the proxy to be used for all requests to this cluster.", + Type: []string{"string"}, + Format: "", + }, + }, + "config": { + SchemaProps: spec.SchemaProps{ + Description: "Config holds additional config data that is specific to the exec plugin with regards to the cluster being authenticated to.\n\nThis data is sourced from the clientcmd Cluster object's extensions[client.authentication.k8s.io/exec] field:\n\nclusters: - name: my-cluster\n cluster:\n ...\n extensions:\n - name: client.authentication.k8s.io/exec # reserved extension name for per cluster exec config\n extension:\n audience: 06e3fbd18de8 # arbitrary config\n\nIn some environments, the user config may be exactly the same across many clusters (i.e. call this exec plugin) minus some details that are specific to each cluster such as the audience. This field allows the per cluster config to be directly specified with the cluster info. Using this field to store secret data is not recommended as one of the prime benefits of exec plugins is that no secrets need to be stored directly in the kubeconfig.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + Required: []string{"server"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_pkg_apis_clientauthentication_v1beta1_ExecCredential(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExecCredential is used by exec-based plugins to communicate credentials to HTTP transports.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec holds information passed to the plugin by the transport.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.ExecCredentialSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is filled in by the plugin and holds the credentials that the transport should use to contact the API.", + Ref: ref("k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.ExecCredentialStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.ExecCredentialSpec", "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.ExecCredentialStatus"}, + } +} + +func schema_pkg_apis_clientauthentication_v1beta1_ExecCredentialSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExecCredentialSpec holds request and runtime specific information provided by the transport.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "cluster": { + SchemaProps: spec.SchemaProps{ + Description: "Cluster contains information to allow an exec plugin to communicate with the kubernetes cluster being authenticated to. Note that Cluster is non-nil only when provideClusterInfo is set to true in the exec provider config (i.e., ExecConfig.ProvideClusterInfo).", + Ref: ref("k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.Cluster"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1.Cluster"}, + } +} + +func schema_pkg_apis_clientauthentication_v1beta1_ExecCredentialStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExecCredentialStatus holds credentials for the transport to use.\n\nToken and ClientKeyData are sensitive fields. This data should only be transmitted in-memory between client and exec plugin process. Exec plugin itself should at least be protected via file permissions.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "expirationTimestamp": { + SchemaProps: spec.SchemaProps{ + Description: "ExpirationTimestamp indicates a time when the provided credentials expire.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "token": { + SchemaProps: spec.SchemaProps{ + Description: "Token is a bearer token used by the client for request authentication.", + Type: []string{"string"}, + Format: "", + }, + }, + "clientCertificateData": { + SchemaProps: spec.SchemaProps{ + Description: "PEM-encoded client TLS certificates (including intermediates, if any).", + Type: []string{"string"}, + Format: "", + }, + }, + "clientKeyData": { + SchemaProps: spec.SchemaProps{ + Description: "PEM-encoded private key for the above certificate.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_k8sio_cloud_provider_config_v1alpha1_CloudControllerManagerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "Generic": { + SchemaProps: spec.SchemaProps{ + Description: "Generic holds configuration for a generic controller-manager", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/controller-manager/config/v1alpha1.GenericControllerManagerConfiguration"), + }, + }, + "KubeCloudShared": { + SchemaProps: spec.SchemaProps{ + Description: "KubeCloudSharedConfiguration holds configuration for shared related features both in cloud controller manager and kube-controller manager.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/cloud-provider/config/v1alpha1.KubeCloudSharedConfiguration"), + }, + }, + "ServiceController": { + SchemaProps: spec.SchemaProps{ + Description: "ServiceControllerConfiguration holds configuration for ServiceController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/cloud-provider/controllers/service/config/v1alpha1.ServiceControllerConfiguration"), + }, + }, + "NodeStatusUpdateFrequency": { + SchemaProps: spec.SchemaProps{ + Description: "NodeStatusUpdateFrequency is the frequency at which the controller updates nodes' status", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"Generic", "KubeCloudShared", "ServiceController", "NodeStatusUpdateFrequency"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/cloud-provider/config/v1alpha1.KubeCloudSharedConfiguration", "k8s.io/cloud-provider/controllers/service/config/v1alpha1.ServiceControllerConfiguration", "k8s.io/controller-manager/config/v1alpha1.GenericControllerManagerConfiguration"}, + } +} + +func schema_k8sio_cloud_provider_config_v1alpha1_CloudProviderConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CloudProviderConfiguration contains basically elements about cloud provider.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "Name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the provider for cloud services.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "CloudConfigFile": { + SchemaProps: spec.SchemaProps{ + Description: "cloudConfigFile is the path to the cloud provider configuration file.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"Name", "CloudConfigFile"}, + }, + }, + } +} + +func schema_k8sio_cloud_provider_config_v1alpha1_KubeCloudSharedConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeCloudSharedConfiguration contains elements shared by both kube-controller manager and cloud-controller manager, but not genericconfig.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "CloudProvider": { + SchemaProps: spec.SchemaProps{ + Description: "CloudProviderConfiguration holds configuration for CloudProvider related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/cloud-provider/config/v1alpha1.CloudProviderConfiguration"), + }, + }, + "ExternalCloudVolumePlugin": { + SchemaProps: spec.SchemaProps{ + Description: "externalCloudVolumePlugin specifies the plugin to use when cloudProvider is \"external\". It is currently used by the in repo cloud providers to handle node and volume control in the KCM.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "UseServiceAccountCredentials": { + SchemaProps: spec.SchemaProps{ + Description: "useServiceAccountCredentials indicates whether controllers should be run with individual service account credentials.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "AllowUntaggedCloud": { + SchemaProps: spec.SchemaProps{ + Description: "run with untagged cloud instances", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "RouteReconciliationPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "routeReconciliationPeriod is the period for reconciling routes created for Nodes by cloud provider..", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "NodeMonitorPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "nodeMonitorPeriod is the period for syncing NodeStatus in NodeController.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "ClusterName": { + SchemaProps: spec.SchemaProps{ + Description: "clusterName is the instance prefix for the cluster.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ClusterCIDR": { + SchemaProps: spec.SchemaProps{ + Description: "clusterCIDR is CIDR Range for Pods in cluster.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "AllocateNodeCIDRs": { + SchemaProps: spec.SchemaProps{ + Description: "AllocateNodeCIDRs enables CIDRs for Pods to be allocated and, if ConfigureCloudRoutes is true, to be set on the cloud provider.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "CIDRAllocatorType": { + SchemaProps: spec.SchemaProps{ + Description: "CIDRAllocatorType determines what kind of pod CIDR allocator will be used.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ConfigureCloudRoutes": { + SchemaProps: spec.SchemaProps{ + Description: "configureCloudRoutes enables CIDRs allocated with allocateNodeCIDRs to be configured on the cloud provider.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "NodeSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "nodeSyncPeriod is the period for syncing nodes from cloudprovider. Longer periods will result in fewer calls to cloud provider, but may delay addition of new nodes to cluster.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"CloudProvider", "ExternalCloudVolumePlugin", "UseServiceAccountCredentials", "AllowUntaggedCloud", "RouteReconciliationPeriod", "NodeMonitorPeriod", "ClusterName", "ClusterCIDR", "AllocateNodeCIDRs", "CIDRAllocatorType", "ConfigureCloudRoutes", "NodeSyncPeriod"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/cloud-provider/config/v1alpha1.CloudProviderConfiguration"}, + } +} + +func schema_k8sio_controller_manager_config_v1alpha1_ControllerLeaderConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ControllerLeaderConfiguration provides the configuration for a migrating leader lock.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of the controller being migrated E.g. service-controller, route-controller, cloud-node-controller, etc", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "component": { + SchemaProps: spec.SchemaProps{ + Description: "Component is the name of the component in which the controller should be running. E.g. kube-controller-manager, cloud-controller-manager, etc", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "component"}, + }, + }, + } +} + +func schema_k8sio_controller_manager_config_v1alpha1_GenericControllerManagerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GenericControllerManagerConfiguration holds configuration for a generic controller-manager.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "Port": { + SchemaProps: spec.SchemaProps{ + Description: "port is the port that the controller-manager's http service runs on.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "Address": { + SchemaProps: spec.SchemaProps{ + Description: "address is the IP address to serve on (set to 0.0.0.0 for all interfaces).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "MinResyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "minResyncPeriod is the resync period in reflectors; will be random between minResyncPeriod and 2*minResyncPeriod.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "ClientConnection": { + SchemaProps: spec.SchemaProps{ + Description: "ClientConnection specifies the kubeconfig file and client connection settings for the proxy server to use when communicating with the apiserver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/component-base/config/v1alpha1.ClientConnectionConfiguration"), + }, + }, + "ControllerStartInterval": { + SchemaProps: spec.SchemaProps{ + Description: "How long to wait between starting controller managers", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "LeaderElection": { + SchemaProps: spec.SchemaProps{ + Description: "leaderElection defines the configuration of leader election client.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/component-base/config/v1alpha1.LeaderElectionConfiguration"), + }, + }, + "Controllers": { + SchemaProps: spec.SchemaProps{ + Description: "Controllers is the list of controllers to enable or disable '*' means \"all enabled by default controllers\" 'foo' means \"enable 'foo'\" '-foo' means \"disable 'foo'\" first item for a particular name wins", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "Debugging": { + SchemaProps: spec.SchemaProps{ + Description: "DebuggingConfiguration holds configuration for Debugging related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/component-base/config/v1alpha1.DebuggingConfiguration"), + }, + }, + }, + Required: []string{"Port", "Address", "MinResyncPeriod", "ClientConnection", "ControllerStartInterval", "LeaderElection", "Controllers", "Debugging"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/component-base/config/v1alpha1.ClientConnectionConfiguration", "k8s.io/component-base/config/v1alpha1.DebuggingConfiguration", "k8s.io/component-base/config/v1alpha1.LeaderElectionConfiguration"}, + } +} + +func schema_k8sio_controller_manager_config_v1alpha1_LeaderMigrationConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LeaderMigrationConfiguration provides versioned configuration for all migrating leader locks.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "leaderName": { + SchemaProps: spec.SchemaProps{ + Description: "LeaderName is the name of the leader election resource that protects the migration E.g. 1-20-KCM-to-1-21-CCM", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "resourceLock": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceLock indicates the resource object type that will be used to lock Should be \"leases\" or \"endpoints\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "controllerLeaders": { + SchemaProps: spec.SchemaProps{ + Description: "ControllerLeaders contains a list of migrating leader lock configurations", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/controller-manager/config/v1alpha1.ControllerLeaderConfiguration"), + }, + }, + }, + }, + }, + }, + Required: []string{"leaderName", "resourceLock", "controllerLeaders"}, + }, + }, + Dependencies: []string{ + "k8s.io/controller-manager/config/v1alpha1.ControllerLeaderConfiguration"}, + } +} + +func schema_pkg_apis_apiregistration_v1_APIService(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIService represents a server for a particular GroupVersion. Name must be \"version.group\".", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec contains information for locating and communicating with a server", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status contains derived information about an API server", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceSpec", "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceStatus"}, + } +} + +func schema_pkg_apis_apiregistration_v1_APIServiceCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIServiceCondition describes the state of an APIService at a particular point", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type is the type of the condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the status of the condition. Can be True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "Unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_apiregistration_v1_APIServiceList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIServiceList is a list of APIService objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIService"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIService"}, + } +} + +func schema_pkg_apis_apiregistration_v1_APIServiceSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIServiceSpec contains information for locating and communicating with a server. Only https is supported, though you are able to disable certificate verification.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "service": { + SchemaProps: spec.SchemaProps{ + Description: "Service is a reference to the service for this API server. It must communicate on port 443. If the Service is nil, that means the handling for the API groupversion is handled locally on this server. The call will simply delegate to the normal handler chain to be fulfilled.", + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.ServiceReference"), + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group is the API group name this server hosts", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Description: "Version is the API version this server hosts. For example, \"v1\"", + Type: []string{"string"}, + Format: "", + }, + }, + "insecureSkipTLSVerify": { + SchemaProps: spec.SchemaProps{ + Description: "InsecureSkipTLSVerify disables TLS certificate verification when communicating with this server. This is strongly discouraged. You should use the CABundle instead.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "caBundle": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "CABundle is a PEM encoded CA bundle which will be used to validate an API server's serving certificate. If unspecified, system trust roots on the apiserver are used.", + Type: []string{"string"}, + Format: "byte", + }, + }, + "groupPriorityMinimum": { + SchemaProps: spec.SchemaProps{ + Description: "GroupPriorityMininum is the priority this group should have at least. Higher priority means that the group is preferred by clients over lower priority ones. Note that other versions of this group might specify even higher GroupPriorityMininum values such that the whole group gets a higher priority. The primary sort is based on GroupPriorityMinimum, ordered highest number to lowest (20 before 10). The secondary sort is based on the alphabetical comparison of the name of the object. (v1.bar before v1.foo) We'd recommend something like: *.k8s.io (except extensions) at 18000 and PaaSes (OpenShift, Deis) are recommended to be in the 2000s", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "versionPriority": { + SchemaProps: spec.SchemaProps{ + Description: "VersionPriority controls the ordering of this API version inside of its group. Must be greater than zero. The primary sort is based on VersionPriority, ordered highest to lowest (20 before 10). Since it's inside of a group, the number can be small, probably in the 10s. In case of equal version priorities, the version string will be used to compute the order inside a group. If the version string is \"kube-like\", it will sort above non \"kube-like\" version strings, which are ordered lexicographically. \"Kube-like\" versions start with a \"v\", then are followed by a number (the major version), then optionally the string \"alpha\" or \"beta\" and another number (the minor version). These are sorted first by GA > beta > alpha (where GA is a version with no suffix such as beta or alpha), and then by comparing major version, then minor version. An example sorted list of versions: v10, v2, v1, v11beta2, v10beta3, v3beta1, v12alpha1, v11alpha2, foo1, foo10.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"groupPriorityMinimum", "versionPriority"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.ServiceReference"}, + } +} + +func schema_pkg_apis_apiregistration_v1_APIServiceStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIServiceStatus contains derived information about an API server", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Current service state of apiService.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1.APIServiceCondition"}, + } +} + +func schema_pkg_apis_apiregistration_v1_ServiceReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceReference holds a reference to Service.legacy.k8s.io", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace is the namespace of the service", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of the service", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the port on the service that hosting webhook. Default to 443 for backward compatibility. `port` should be a valid port number (1-65535, inclusive).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_apiregistration_v1beta1_APIService(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIService represents a server for a particular GroupVersion. Name must be \"version.group\".", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec contains information for locating and communicating with a server", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceSpec"), + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status contains derived information about an API server", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceStatus"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceSpec", "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceStatus"}, + } +} + +func schema_pkg_apis_apiregistration_v1beta1_APIServiceCondition(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIServiceCondition describes the state of an APIService at a particular point", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "Type is the type of the condition.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "status": { + SchemaProps: spec.SchemaProps{ + Description: "Status is the status of the condition. Can be True, False, Unknown.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "lastTransitionTime": { + SchemaProps: spec.SchemaProps{ + Description: "Last time the condition transitioned from one status to another.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "reason": { + SchemaProps: spec.SchemaProps{ + Description: "Unique, one-word, CamelCase reason for the condition's last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + "message": { + SchemaProps: spec.SchemaProps{ + Description: "Human-readable message indicating details about last transition.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type", "status"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_apiregistration_v1beta1_APIServiceList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIServiceList is a list of APIService objects.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIService"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIService"}, + } +} + +func schema_pkg_apis_apiregistration_v1beta1_APIServiceSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIServiceSpec contains information for locating and communicating with a server. Only https is supported, though you are able to disable certificate verification.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "service": { + SchemaProps: spec.SchemaProps{ + Description: "Service is a reference to the service for this API server. It must communicate on port 443. If the Service is nil, that means the handling for the API groupversion is handled locally on this server. The call will simply delegate to the normal handler chain to be fulfilled.", + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.ServiceReference"), + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group is the API group name this server hosts", + Type: []string{"string"}, + Format: "", + }, + }, + "version": { + SchemaProps: spec.SchemaProps{ + Description: "Version is the API version this server hosts. For example, \"v1\"", + Type: []string{"string"}, + Format: "", + }, + }, + "insecureSkipTLSVerify": { + SchemaProps: spec.SchemaProps{ + Description: "InsecureSkipTLSVerify disables TLS certificate verification when communicating with this server. This is strongly discouraged. You should use the CABundle instead.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "caBundle": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "CABundle is a PEM encoded CA bundle which will be used to validate an API server's serving certificate. If unspecified, system trust roots on the apiserver are used.", + Type: []string{"string"}, + Format: "byte", + }, + }, + "groupPriorityMinimum": { + SchemaProps: spec.SchemaProps{ + Description: "GroupPriorityMininum is the priority this group should have at least. Higher priority means that the group is preferred by clients over lower priority ones. Note that other versions of this group might specify even higher GroupPriorityMininum values such that the whole group gets a higher priority. The primary sort is based on GroupPriorityMinimum, ordered highest number to lowest (20 before 10). The secondary sort is based on the alphabetical comparison of the name of the object. (v1.bar before v1.foo) We'd recommend something like: *.k8s.io (except extensions) at 18000 and PaaSes (OpenShift, Deis) are recommended to be in the 2000s", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "versionPriority": { + SchemaProps: spec.SchemaProps{ + Description: "VersionPriority controls the ordering of this API version inside of its group. Must be greater than zero. The primary sort is based on VersionPriority, ordered highest to lowest (20 before 10). Since it's inside of a group, the number can be small, probably in the 10s. In case of equal version priorities, the version string will be used to compute the order inside a group. If the version string is \"kube-like\", it will sort above non \"kube-like\" version strings, which are ordered lexicographically. \"Kube-like\" versions start with a \"v\", then are followed by a number (the major version), then optionally the string \"alpha\" or \"beta\" and another number (the minor version). These are sorted first by GA > beta > alpha (where GA is a version with no suffix such as beta or alpha), and then by comparing major version, then minor version. An example sorted list of versions: v10, v2, v1, v11beta2, v10beta3, v3beta1, v12alpha1, v11alpha2, foo1, foo10.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"groupPriorityMinimum", "versionPriority"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.ServiceReference"}, + } +} + +func schema_pkg_apis_apiregistration_v1beta1_APIServiceStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "APIServiceStatus contains derived information about an API server", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", + "x-kubernetes-patch-merge-key": "type", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Current service state of apiService.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceCondition"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1.APIServiceCondition"}, + } +} + +func schema_pkg_apis_apiregistration_v1beta1_ServiceReference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceReference holds a reference to Service.legacy.k8s.io", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace is the namespace of the service", + Type: []string{"string"}, + Format: "", + }, + }, + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the name of the service", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "If specified, the port on the service that hosting webhook. Default to 443 for backward compatibility. `port` should be a valid port number (1-65535, inclusive).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_AttachDetachControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AttachDetachControllerConfiguration contains elements describing AttachDetachController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "DisableAttachDetachReconcilerSync": { + SchemaProps: spec.SchemaProps{ + Description: "Reconciler runs a periodic loop to reconcile the desired state of the with the actual state of the world by triggering attach detach operations. This flag enables or disables reconcile. Is false by default, and thus enabled.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "ReconcilerSyncLoopPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "ReconcilerSyncLoopPeriod is the amount of time the reconciler sync states loop wait between successive executions. Is set to 5 sec by default.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"DisableAttachDetachReconcilerSync", "ReconcilerSyncLoopPeriod"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_CSRSigningConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSRSigningConfiguration holds information about a particular CSR signer", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "CertFile": { + SchemaProps: spec.SchemaProps{ + Description: "certFile is the filename containing a PEM-encoded X509 CA certificate used to issue certificates", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "KeyFile": { + SchemaProps: spec.SchemaProps{ + Description: "keyFile is the filename containing a PEM-encoded RSA or ECDSA private key used to issue certificates", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"CertFile", "KeyFile"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_CSRSigningControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CSRSigningControllerConfiguration contains elements describing CSRSigningController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ClusterSigningCertFile": { + SchemaProps: spec.SchemaProps{ + Description: "clusterSigningCertFile is the filename containing a PEM-encoded X509 CA certificate used to issue cluster-scoped certificates", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ClusterSigningKeyFile": { + SchemaProps: spec.SchemaProps{ + Description: "clusterSigningCertFile is the filename containing a PEM-encoded RSA or ECDSA private key used to issue cluster-scoped certificates", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "KubeletServingSignerConfiguration": { + SchemaProps: spec.SchemaProps{ + Description: "kubeletServingSignerConfiguration holds the certificate and key used to issue certificates for the kubernetes.io/kubelet-serving signer", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningConfiguration"), + }, + }, + "KubeletClientSignerConfiguration": { + SchemaProps: spec.SchemaProps{ + Description: "kubeletClientSignerConfiguration holds the certificate and key used to issue certificates for the kubernetes.io/kube-apiserver-client-kubelet", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningConfiguration"), + }, + }, + "KubeAPIServerClientSignerConfiguration": { + SchemaProps: spec.SchemaProps{ + Description: "kubeAPIServerClientSignerConfiguration holds the certificate and key used to issue certificates for the kubernetes.io/kube-apiserver-client", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningConfiguration"), + }, + }, + "LegacyUnknownSignerConfiguration": { + SchemaProps: spec.SchemaProps{ + Description: "legacyUnknownSignerConfiguration holds the certificate and key used to issue certificates for the kubernetes.io/legacy-unknown", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningConfiguration"), + }, + }, + "ClusterSigningDuration": { + SchemaProps: spec.SchemaProps{ + Description: "clusterSigningDuration is the length of duration signed certificates will be given.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"ClusterSigningCertFile", "ClusterSigningKeyFile", "KubeletServingSignerConfiguration", "KubeletClientSignerConfiguration", "KubeAPIServerClientSignerConfiguration", "LegacyUnknownSignerConfiguration", "ClusterSigningDuration"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningConfiguration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_CronJobControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CronJobControllerConfiguration contains elements describing CrongJob2Controller.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentCronJobSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentCronJobSyncs is the number of job objects that are allowed to sync concurrently. Larger number = more responsive jobs, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ConcurrentCronJobSyncs"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_DaemonSetControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetControllerConfiguration contains elements describing DaemonSetController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentDaemonSetSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentDaemonSetSyncs is the number of daemonset objects that are allowed to sync concurrently. Larger number = more responsive daemonset, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ConcurrentDaemonSetSyncs"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_DeploymentControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeploymentControllerConfiguration contains elements describing DeploymentController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentDeploymentSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentDeploymentSyncs is the number of deployment objects that are allowed to sync concurrently. Larger number = more responsive deployments, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "DeploymentControllerSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "deploymentControllerSyncPeriod is the period for syncing the deployments.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"ConcurrentDeploymentSyncs", "DeploymentControllerSyncPeriod"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_DeprecatedControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DeprecatedControllerConfiguration contains elements be deprecated.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "DeletingPodsQPS": { + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED: deletingPodsQps is the number of nodes per second on which pods are deleted in case of node failure.", + Default: 0, + Type: []string{"number"}, + Format: "float", + }, + }, + "DeletingPodsBurst": { + SchemaProps: spec.SchemaProps{ + Description: "DEPRECATED: deletingPodsBurst is the number of nodes on which pods are bursty deleted in case of node failure. For more details look into RateLimiter.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "RegisterRetryCount": { + SchemaProps: spec.SchemaProps{ + Description: "registerRetryCount is the number of retries for initial node registration. Retry interval equals node-sync-period.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"DeletingPodsQPS", "DeletingPodsBurst", "RegisterRetryCount"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_EndpointControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointControllerConfiguration contains elements describing EndpointController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentEndpointSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentEndpointSyncs is the number of endpoint syncing operations that will be done concurrently. Larger number = faster endpoint updating, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "EndpointUpdatesBatchPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "EndpointUpdatesBatchPeriod describes the length of endpoint updates batching period. Processing of pod changes will be delayed by this duration to join them with potential upcoming updates and reduce the overall number of endpoints updates.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"ConcurrentEndpointSyncs", "EndpointUpdatesBatchPeriod"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_EndpointSliceControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointSliceControllerConfiguration contains elements describing EndpointSliceController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentServiceEndpointSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentServiceEndpointSyncs is the number of service endpoint syncing operations that will be done concurrently. Larger number = faster endpoint slice updating, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "MaxEndpointsPerSlice": { + SchemaProps: spec.SchemaProps{ + Description: "maxEndpointsPerSlice is the maximum number of endpoints that will be added to an EndpointSlice. More endpoints per slice will result in fewer and larger endpoint slices, but larger resources.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "EndpointUpdatesBatchPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "EndpointUpdatesBatchPeriod describes the length of endpoint updates batching period. Processing of pod changes will be delayed by this duration to join them with potential upcoming updates and reduce the overall number of endpoints updates.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"ConcurrentServiceEndpointSyncs", "MaxEndpointsPerSlice", "EndpointUpdatesBatchPeriod"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_EndpointSliceMirroringControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "EndpointSliceMirroringControllerConfiguration contains elements describing EndpointSliceMirroringController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "MirroringConcurrentServiceEndpointSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "mirroringConcurrentServiceEndpointSyncs is the number of service endpoint syncing operations that will be done concurrently. Larger number = faster endpoint slice updating, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "MirroringMaxEndpointsPerSubset": { + SchemaProps: spec.SchemaProps{ + Description: "mirroringMaxEndpointsPerSubset is the maximum number of endpoints that will be mirrored to an EndpointSlice for an EndpointSubset.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "MirroringEndpointUpdatesBatchPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "mirroringEndpointUpdatesBatchPeriod can be used to batch EndpointSlice updates. All updates triggered by EndpointSlice changes will be delayed by up to 'mirroringEndpointUpdatesBatchPeriod'. If other addresses in the same Endpoints resource change in that period, they will be batched to a single EndpointSlice update. Default 0 value means that each Endpoints update triggers an EndpointSlice update.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"MirroringConcurrentServiceEndpointSyncs", "MirroringMaxEndpointsPerSubset", "MirroringEndpointUpdatesBatchPeriod"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_GarbageCollectorControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GarbageCollectorControllerConfiguration contains elements describing GarbageCollectorController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "EnableGarbageCollector": { + SchemaProps: spec.SchemaProps{ + Description: "enables the generic garbage collector. MUST be synced with the corresponding flag of the kube-apiserver. WARNING: the generic garbage collector is an alpha feature.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "ConcurrentGCSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentGCSyncs is the number of garbage collector workers that are allowed to sync concurrently.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "GCIgnoredResources": { + SchemaProps: spec.SchemaProps{ + Description: "gcIgnoredResources is the list of GroupResources that garbage collection should ignore.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.GroupResource"), + }, + }, + }, + }, + }, + }, + Required: []string{"EnableGarbageCollector", "ConcurrentGCSyncs", "GCIgnoredResources"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-controller-manager/config/v1alpha1.GroupResource"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_GroupResource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "GroupResource describes an group resource.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "Group": { + SchemaProps: spec.SchemaProps{ + Description: "group is the group portion of the GroupResource.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "Resource": { + SchemaProps: spec.SchemaProps{ + Description: "resource is the resource portion of the GroupResource.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"Group", "Resource"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_HPAControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "HPAControllerConfiguration contains elements describing HPAController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "HorizontalPodAutoscalerSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerSyncPeriod is the period for syncing the number of pods in horizontal pod autoscaler.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "HorizontalPodAutoscalerUpscaleForbiddenWindow": { + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerUpscaleForbiddenWindow is a period after which next upscale allowed.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "HorizontalPodAutoscalerDownscaleStabilizationWindow": { + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerDowncaleStabilizationWindow is a period for which autoscaler will look backwards and not scale down below any recommendation it made during that period.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "HorizontalPodAutoscalerDownscaleForbiddenWindow": { + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerDownscaleForbiddenWindow is a period after which next downscale allowed.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "HorizontalPodAutoscalerTolerance": { + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerTolerance is the tolerance for when resource usage suggests upscaling/downscaling", + Default: 0, + Type: []string{"number"}, + Format: "double", + }, + }, + "HorizontalPodAutoscalerUseRESTClients": { + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerUseRESTClients causes the HPA controller to use REST clients through the kube-aggregator when enabled, instead of using the legacy metrics client through the API server proxy.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "HorizontalPodAutoscalerCPUInitializationPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerCPUInitializationPeriod is the period after pod start when CPU samples might be skipped.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "HorizontalPodAutoscalerInitialReadinessDelay": { + SchemaProps: spec.SchemaProps{ + Description: "HorizontalPodAutoscalerInitialReadinessDelay is period after pod start during which readiness changes are treated as readiness being set for the first time. The only effect of this is that HPA will disregard CPU samples from unready pods that had last readiness change during that period.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"HorizontalPodAutoscalerSyncPeriod", "HorizontalPodAutoscalerUpscaleForbiddenWindow", "HorizontalPodAutoscalerDownscaleStabilizationWindow", "HorizontalPodAutoscalerDownscaleForbiddenWindow", "HorizontalPodAutoscalerTolerance", "HorizontalPodAutoscalerUseRESTClients", "HorizontalPodAutoscalerCPUInitializationPeriod", "HorizontalPodAutoscalerInitialReadinessDelay"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_JobControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "JobControllerConfiguration contains elements describing JobController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentJobSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentJobSyncs is the number of job objects that are allowed to sync concurrently. Larger number = more responsive jobs, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ConcurrentJobSyncs"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_KubeControllerManagerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeControllerManagerConfiguration contains elements describing kube-controller manager.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "Generic": { + SchemaProps: spec.SchemaProps{ + Description: "Generic holds configuration for a generic controller-manager", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/controller-manager/config/v1alpha1.GenericControllerManagerConfiguration"), + }, + }, + "KubeCloudShared": { + SchemaProps: spec.SchemaProps{ + Description: "KubeCloudSharedConfiguration holds configuration for shared related features both in cloud controller manager and kube-controller manager.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/cloud-provider/config/v1alpha1.KubeCloudSharedConfiguration"), + }, + }, + "AttachDetachController": { + SchemaProps: spec.SchemaProps{ + Description: "AttachDetachControllerConfiguration holds configuration for AttachDetachController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.AttachDetachControllerConfiguration"), + }, + }, + "CSRSigningController": { + SchemaProps: spec.SchemaProps{ + Description: "CSRSigningControllerConfiguration holds configuration for CSRSigningController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningControllerConfiguration"), + }, + }, + "DaemonSetController": { + SchemaProps: spec.SchemaProps{ + Description: "DaemonSetControllerConfiguration holds configuration for DaemonSetController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.DaemonSetControllerConfiguration"), + }, + }, + "DeploymentController": { + SchemaProps: spec.SchemaProps{ + Description: "DeploymentControllerConfiguration holds configuration for DeploymentController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.DeploymentControllerConfiguration"), + }, + }, + "StatefulSetController": { + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetControllerConfiguration holds configuration for StatefulSetController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.StatefulSetControllerConfiguration"), + }, + }, + "DeprecatedController": { + SchemaProps: spec.SchemaProps{ + Description: "DeprecatedControllerConfiguration holds configuration for some deprecated features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.DeprecatedControllerConfiguration"), + }, + }, + "EndpointController": { + SchemaProps: spec.SchemaProps{ + Description: "EndpointControllerConfiguration holds configuration for EndpointController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.EndpointControllerConfiguration"), + }, + }, + "EndpointSliceController": { + SchemaProps: spec.SchemaProps{ + Description: "EndpointSliceControllerConfiguration holds configuration for EndpointSliceController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.EndpointSliceControllerConfiguration"), + }, + }, + "EndpointSliceMirroringController": { + SchemaProps: spec.SchemaProps{ + Description: "EndpointSliceMirroringControllerConfiguration holds configuration for EndpointSliceMirroringController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.EndpointSliceMirroringControllerConfiguration"), + }, + }, + "GarbageCollectorController": { + SchemaProps: spec.SchemaProps{ + Description: "GarbageCollectorControllerConfiguration holds configuration for GarbageCollectorController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.GarbageCollectorControllerConfiguration"), + }, + }, + "HPAController": { + SchemaProps: spec.SchemaProps{ + Description: "HPAControllerConfiguration holds configuration for HPAController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.HPAControllerConfiguration"), + }, + }, + "JobController": { + SchemaProps: spec.SchemaProps{ + Description: "JobControllerConfiguration holds configuration for JobController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.JobControllerConfiguration"), + }, + }, + "CronJobController": { + SchemaProps: spec.SchemaProps{ + Description: "CronJobControllerConfiguration holds configuration for CronJobController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.CronJobControllerConfiguration"), + }, + }, + "NamespaceController": { + SchemaProps: spec.SchemaProps{ + Description: "NamespaceControllerConfiguration holds configuration for NamespaceController related features. NamespaceControllerConfiguration holds configuration for NamespaceController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.NamespaceControllerConfiguration"), + }, + }, + "NodeIPAMController": { + SchemaProps: spec.SchemaProps{ + Description: "NodeIPAMControllerConfiguration holds configuration for NodeIPAMController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.NodeIPAMControllerConfiguration"), + }, + }, + "NodeLifecycleController": { + SchemaProps: spec.SchemaProps{ + Description: "NodeLifecycleControllerConfiguration holds configuration for NodeLifecycleController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.NodeLifecycleControllerConfiguration"), + }, + }, + "PersistentVolumeBinderController": { + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeBinderControllerConfiguration holds configuration for PersistentVolumeBinderController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.PersistentVolumeBinderControllerConfiguration"), + }, + }, + "PodGCController": { + SchemaProps: spec.SchemaProps{ + Description: "PodGCControllerConfiguration holds configuration for PodGCController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.PodGCControllerConfiguration"), + }, + }, + "ReplicaSetController": { + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetControllerConfiguration holds configuration for ReplicaSet related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.ReplicaSetControllerConfiguration"), + }, + }, + "ReplicationController": { + SchemaProps: spec.SchemaProps{ + Description: "ReplicationControllerConfiguration holds configuration for ReplicationController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.ReplicationControllerConfiguration"), + }, + }, + "ResourceQuotaController": { + SchemaProps: spec.SchemaProps{ + Description: "ResourceQuotaControllerConfiguration holds configuration for ResourceQuotaController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.ResourceQuotaControllerConfiguration"), + }, + }, + "SAController": { + SchemaProps: spec.SchemaProps{ + Description: "SAControllerConfiguration holds configuration for ServiceAccountController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.SAControllerConfiguration"), + }, + }, + "ServiceController": { + SchemaProps: spec.SchemaProps{ + Description: "ServiceControllerConfiguration holds configuration for ServiceController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/cloud-provider/controllers/service/config/v1alpha1.ServiceControllerConfiguration"), + }, + }, + "TTLAfterFinishedController": { + SchemaProps: spec.SchemaProps{ + Description: "TTLAfterFinishedControllerConfiguration holds configuration for TTLAfterFinishedController related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.TTLAfterFinishedControllerConfiguration"), + }, + }, + }, + Required: []string{"Generic", "KubeCloudShared", "AttachDetachController", "CSRSigningController", "DaemonSetController", "DeploymentController", "StatefulSetController", "DeprecatedController", "EndpointController", "EndpointSliceController", "EndpointSliceMirroringController", "GarbageCollectorController", "HPAController", "JobController", "CronJobController", "NamespaceController", "NodeIPAMController", "NodeLifecycleController", "PersistentVolumeBinderController", "PodGCController", "ReplicaSetController", "ReplicationController", "ResourceQuotaController", "SAController", "ServiceController", "TTLAfterFinishedController"}, + }, + }, + Dependencies: []string{ + "k8s.io/cloud-provider/config/v1alpha1.KubeCloudSharedConfiguration", "k8s.io/cloud-provider/controllers/service/config/v1alpha1.ServiceControllerConfiguration", "k8s.io/controller-manager/config/v1alpha1.GenericControllerManagerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.AttachDetachControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.CSRSigningControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.CronJobControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.DaemonSetControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.DeploymentControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.DeprecatedControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.EndpointControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.EndpointSliceControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.EndpointSliceMirroringControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.GarbageCollectorControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.HPAControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.JobControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.NamespaceControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.NodeIPAMControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.NodeLifecycleControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.PersistentVolumeBinderControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.PodGCControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.ReplicaSetControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.ReplicationControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.ResourceQuotaControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.SAControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.StatefulSetControllerConfiguration", "k8s.io/kube-controller-manager/config/v1alpha1.TTLAfterFinishedControllerConfiguration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_NamespaceControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NamespaceControllerConfiguration contains elements describing NamespaceController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "NamespaceSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "namespaceSyncPeriod is the period for syncing namespace life-cycle updates.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "ConcurrentNamespaceSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentNamespaceSyncs is the number of namespace objects that are allowed to sync concurrently.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"NamespaceSyncPeriod", "ConcurrentNamespaceSyncs"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_NodeIPAMControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeIPAMControllerConfiguration contains elements describing NodeIpamController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ServiceCIDR": { + SchemaProps: spec.SchemaProps{ + Description: "serviceCIDR is CIDR Range for Services in cluster.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "SecondaryServiceCIDR": { + SchemaProps: spec.SchemaProps{ + Description: "secondaryServiceCIDR is CIDR Range for Services in cluster. This is used in dual stack clusters. SecondaryServiceCIDR must be of different IP family than ServiceCIDR", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "NodeCIDRMaskSize": { + SchemaProps: spec.SchemaProps{ + Description: "NodeCIDRMaskSize is the mask size for node cidr in cluster.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "NodeCIDRMaskSizeIPv4": { + SchemaProps: spec.SchemaProps{ + Description: "NodeCIDRMaskSizeIPv4 is the mask size for node cidr in dual-stack cluster.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "NodeCIDRMaskSizeIPv6": { + SchemaProps: spec.SchemaProps{ + Description: "NodeCIDRMaskSizeIPv6 is the mask size for node cidr in dual-stack cluster.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ServiceCIDR", "SecondaryServiceCIDR", "NodeCIDRMaskSize", "NodeCIDRMaskSizeIPv4", "NodeCIDRMaskSizeIPv6"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_NodeLifecycleControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeLifecycleControllerConfiguration contains elements describing NodeLifecycleController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "EnableTaintManager": { + SchemaProps: spec.SchemaProps{ + Description: "If set to true enables NoExecute Taints and will evict all not-tolerating Pod running on Nodes tainted with this kind of Taints.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "NodeEvictionRate": { + SchemaProps: spec.SchemaProps{ + Description: "nodeEvictionRate is the number of nodes per second on which pods are deleted in case of node failure when a zone is healthy", + Default: 0, + Type: []string{"number"}, + Format: "float", + }, + }, + "SecondaryNodeEvictionRate": { + SchemaProps: spec.SchemaProps{ + Description: "secondaryNodeEvictionRate is the number of nodes per second on which pods are deleted in case of node failure when a zone is unhealthy", + Default: 0, + Type: []string{"number"}, + Format: "float", + }, + }, + "NodeStartupGracePeriod": { + SchemaProps: spec.SchemaProps{ + Description: "nodeStartupGracePeriod is the amount of time which we allow starting a node to be unresponsive before marking it unhealthy.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "NodeMonitorGracePeriod": { + SchemaProps: spec.SchemaProps{ + Description: "nodeMontiorGracePeriod is the amount of time which we allow a running node to be unresponsive before marking it unhealthy. Must be N times more than kubelet's nodeStatusUpdateFrequency, where N means number of retries allowed for kubelet to post node status.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "PodEvictionTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "podEvictionTimeout is the grace period for deleting pods on failed nodes.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "LargeClusterSizeThreshold": { + SchemaProps: spec.SchemaProps{ + Description: "secondaryNodeEvictionRate is implicitly overridden to 0 for clusters smaller than or equal to largeClusterSizeThreshold", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "UnhealthyZoneThreshold": { + SchemaProps: spec.SchemaProps{ + Description: "Zone is treated as unhealthy in nodeEvictionRate and secondaryNodeEvictionRate when at least unhealthyZoneThreshold (no less than 3) of Nodes in the zone are NotReady", + Default: 0, + Type: []string{"number"}, + Format: "float", + }, + }, + }, + Required: []string{"EnableTaintManager", "NodeEvictionRate", "SecondaryNodeEvictionRate", "NodeStartupGracePeriod", "NodeMonitorGracePeriod", "PodEvictionTimeout", "LargeClusterSizeThreshold", "UnhealthyZoneThreshold"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_PersistentVolumeBinderControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeBinderControllerConfiguration contains elements describing PersistentVolumeBinderController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "PVClaimBinderSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "pvClaimBinderSyncPeriod is the period for syncing persistent volumes and persistent volume claims.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "VolumeConfiguration": { + SchemaProps: spec.SchemaProps{ + Description: "volumeConfiguration holds configuration for volume related features.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.VolumeConfiguration"), + }, + }, + "VolumeHostCIDRDenylist": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeHostCIDRDenylist is a list of CIDRs that should not be reachable by the controller from plugins.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "VolumeHostAllowLocalLoopback": { + SchemaProps: spec.SchemaProps{ + Description: "VolumeHostAllowLocalLoopback indicates if local loopback hosts (127.0.0.1, etc) should be allowed from plugins.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"PVClaimBinderSyncPeriod", "VolumeConfiguration", "VolumeHostCIDRDenylist", "VolumeHostAllowLocalLoopback"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/kube-controller-manager/config/v1alpha1.VolumeConfiguration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_PersistentVolumeRecyclerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PersistentVolumeRecyclerConfiguration contains elements describing persistent volume plugins.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "MaximumRetry": { + SchemaProps: spec.SchemaProps{ + Description: "maximumRetry is number of retries the PV recycler will execute on failure to recycle PV.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "MinimumTimeoutNFS": { + SchemaProps: spec.SchemaProps{ + Description: "minimumTimeoutNFS is the minimum ActiveDeadlineSeconds to use for an NFS Recycler pod.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "PodTemplateFilePathNFS": { + SchemaProps: spec.SchemaProps{ + Description: "podTemplateFilePathNFS is the file path to a pod definition used as a template for NFS persistent volume recycling", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "IncrementTimeoutNFS": { + SchemaProps: spec.SchemaProps{ + Description: "incrementTimeoutNFS is the increment of time added per Gi to ActiveDeadlineSeconds for an NFS scrubber pod.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "PodTemplateFilePathHostPath": { + SchemaProps: spec.SchemaProps{ + Description: "podTemplateFilePathHostPath is the file path to a pod definition used as a template for HostPath persistent volume recycling. This is for development and testing only and will not work in a multi-node cluster.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "MinimumTimeoutHostPath": { + SchemaProps: spec.SchemaProps{ + Description: "minimumTimeoutHostPath is the minimum ActiveDeadlineSeconds to use for a HostPath Recycler pod. This is for development and testing only and will not work in a multi-node cluster.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "IncrementTimeoutHostPath": { + SchemaProps: spec.SchemaProps{ + Description: "incrementTimeoutHostPath is the increment of time added per Gi to ActiveDeadlineSeconds for a HostPath scrubber pod. This is for development and testing only and will not work in a multi-node cluster.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"MaximumRetry", "MinimumTimeoutNFS", "PodTemplateFilePathNFS", "IncrementTimeoutNFS", "PodTemplateFilePathHostPath", "MinimumTimeoutHostPath", "IncrementTimeoutHostPath"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_PodGCControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodGCControllerConfiguration contains elements describing PodGCController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "TerminatedPodGCThreshold": { + SchemaProps: spec.SchemaProps{ + Description: "terminatedPodGCThreshold is the number of terminated pods that can exist before the terminated pod garbage collector starts deleting terminated pods. If <= 0, the terminated pod garbage collector is disabled.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"TerminatedPodGCThreshold"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_ReplicaSetControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicaSetControllerConfiguration contains elements describing ReplicaSetController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentRSSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentRSSyncs is the number of replica sets that are allowed to sync concurrently. Larger number = more responsive replica management, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ConcurrentRSSyncs"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_ReplicationControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ReplicationControllerConfiguration contains elements describing ReplicationController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentRCSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentRCSyncs is the number of replication controllers that are allowed to sync concurrently. Larger number = more responsive replica management, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ConcurrentRCSyncs"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_ResourceQuotaControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceQuotaControllerConfiguration contains elements describing ResourceQuotaController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ResourceQuotaSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "resourceQuotaSyncPeriod is the period for syncing quota usage status in the system.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "ConcurrentResourceQuotaSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentResourceQuotaSyncs is the number of resource quotas that are allowed to sync concurrently. Larger number = more responsive quota management, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ResourceQuotaSyncPeriod", "ConcurrentResourceQuotaSyncs"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_SAControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SAControllerConfiguration contains elements describing ServiceAccountController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ServiceAccountKeyFile": { + SchemaProps: spec.SchemaProps{ + Description: "serviceAccountKeyFile is the filename containing a PEM-encoded private RSA key used to sign service account tokens.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ConcurrentSATokenSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentSATokenSyncs is the number of service account token syncing operations that will be done concurrently.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "RootCAFile": { + SchemaProps: spec.SchemaProps{ + Description: "rootCAFile is the root certificate authority will be included in service account's token secret. This must be a valid PEM-encoded CA bundle.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"ServiceAccountKeyFile", "ConcurrentSATokenSyncs", "RootCAFile"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_StatefulSetControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "StatefulSetControllerConfiguration contains elements describing StatefulSetController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentStatefulSetSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentStatefulSetSyncs is the number of statefulset objects that are allowed to sync concurrently. Larger number = more responsive statefulsets, but more CPU (and network) load.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ConcurrentStatefulSetSyncs"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_TTLAfterFinishedControllerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "TTLAfterFinishedControllerConfiguration contains elements describing TTLAfterFinishedController.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "ConcurrentTTLSyncs": { + SchemaProps: spec.SchemaProps{ + Description: "concurrentTTLSyncs is the number of TTL-after-finished collector workers that are allowed to sync concurrently.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"ConcurrentTTLSyncs"}, + }, + }, + } +} + +func schema_k8sio_kube_controller_manager_config_v1alpha1_VolumeConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeConfiguration contains *all* enumerated flags meant to configure all volume plugins. From this config, the controller-manager binary will create many instances of volume.VolumeConfig, each containing only the configuration needed for that plugin which are then passed to the appropriate plugin. The ControllerManager binary is the only part of the code which knows what plugins are supported and which flags correspond to each plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "EnableHostPathProvisioning": { + SchemaProps: spec.SchemaProps{ + Description: "enableHostPathProvisioning enables HostPath PV provisioning when running without a cloud provider. This allows testing and development of provisioning features. HostPath provisioning is not supported in any way, won't work in a multi-node cluster, and should not be used for anything other than testing or development.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "EnableDynamicProvisioning": { + SchemaProps: spec.SchemaProps{ + Description: "enableDynamicProvisioning enables the provisioning of volumes when running within an environment that supports dynamic provisioning. Defaults to true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "PersistentVolumeRecyclerConfiguration": { + SchemaProps: spec.SchemaProps{ + Description: "persistentVolumeRecyclerConfiguration holds configuration for persistent volume plugins.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-controller-manager/config/v1alpha1.PersistentVolumeRecyclerConfiguration"), + }, + }, + "FlexVolumePluginDir": { + SchemaProps: spec.SchemaProps{ + Description: "volumePluginDir is the full path of the directory in which the flex volume plugin should search for additional third party volume plugins", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"EnableHostPathProvisioning", "EnableDynamicProvisioning", "PersistentVolumeRecyclerConfiguration", "FlexVolumePluginDir"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-controller-manager/config/v1alpha1.PersistentVolumeRecyclerConfiguration"}, + } +} + +func schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeProxyConfiguration contains everything necessary to configure the Kubernetes proxy server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "featureGates": { + SchemaProps: spec.SchemaProps{ + Description: "featureGates is a map of feature names to bools that enable or disable alpha/experimental features.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + "bindAddress": { + SchemaProps: spec.SchemaProps{ + Description: "bindAddress is the IP address for the proxy server to serve on (set to 0.0.0.0 for all interfaces)", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "healthzBindAddress": { + SchemaProps: spec.SchemaProps{ + Description: "healthzBindAddress is the IP address and port for the health check server to serve on, defaulting to 0.0.0.0:10256", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "metricsBindAddress": { + SchemaProps: spec.SchemaProps{ + Description: "metricsBindAddress is the IP address and port for the metrics server to serve on, defaulting to 127.0.0.1:10249 (set to 0.0.0.0 for all interfaces)", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "bindAddressHardFail": { + SchemaProps: spec.SchemaProps{ + Description: "bindAddressHardFail, if true, kube-proxy will treat failure to bind to a port as fatal and exit", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "enableProfiling": { + SchemaProps: spec.SchemaProps{ + Description: "enableProfiling enables profiling via web interface on /debug/pprof handler. Profiling handlers will be handled by metrics server.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "clusterCIDR": { + SchemaProps: spec.SchemaProps{ + Description: "clusterCIDR is the CIDR range of the pods in the cluster. It is used to bridge traffic coming from outside of the cluster. If not provided, no off-cluster bridging will be performed.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "hostnameOverride": { + SchemaProps: spec.SchemaProps{ + Description: "hostnameOverride, if non-empty, will be used as the identity instead of the actual hostname.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "clientConnection": { + SchemaProps: spec.SchemaProps{ + Description: "clientConnection specifies the kubeconfig file and client connection settings for the proxy server to use when communicating with the apiserver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/component-base/config/v1alpha1.ClientConnectionConfiguration"), + }, + }, + "iptables": { + SchemaProps: spec.SchemaProps{ + Description: "iptables contains iptables-related configuration options.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-proxy/config/v1alpha1.KubeProxyIPTablesConfiguration"), + }, + }, + "ipvs": { + SchemaProps: spec.SchemaProps{ + Description: "ipvs contains ipvs-related configuration options.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-proxy/config/v1alpha1.KubeProxyIPVSConfiguration"), + }, + }, + "oomScoreAdj": { + SchemaProps: spec.SchemaProps{ + Description: "oomScoreAdj is the oom-score-adj value for kube-proxy process. Values must be within the range [-1000, 1000]", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "mode": { + SchemaProps: spec.SchemaProps{ + Description: "mode specifies which proxy mode to use.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "portRange": { + SchemaProps: spec.SchemaProps{ + Description: "portRange is the range of host ports (beginPort-endPort, inclusive) that may be consumed in order to proxy service traffic. If unspecified (0-0) then ports will be randomly chosen.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "udpIdleTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "udpIdleTimeout is how long an idle UDP connection will be kept open (e.g. '250ms', '2s'). Must be greater than 0. Only applicable for proxyMode=userspace.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "conntrack": { + SchemaProps: spec.SchemaProps{ + Description: "conntrack contains conntrack-related configuration options.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-proxy/config/v1alpha1.KubeProxyConntrackConfiguration"), + }, + }, + "configSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "configSyncPeriod is how often configuration from the apiserver is refreshed. Must be greater than 0.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "nodePortAddresses": { + SchemaProps: spec.SchemaProps{ + Description: "nodePortAddresses is the --nodeport-addresses value for kube-proxy process. Values must be valid IP blocks. These values are as a parameter to select the interfaces where nodeport works. In case someone would like to expose a service on localhost for local visit and some other interfaces for particular purpose, a list of IP blocks would do that. If set it to \"127.0.0.0/8\", kube-proxy will only select the loopback interface for NodePort. If set it to a non-zero IP block, kube-proxy will filter that down to just the IPs that applied to the node. An empty string slice is meant to select all network interfaces.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "winkernel": { + SchemaProps: spec.SchemaProps{ + Description: "winkernel contains winkernel-related configuration options.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-proxy/config/v1alpha1.KubeProxyWinkernelConfiguration"), + }, + }, + "showHiddenMetricsForVersion": { + SchemaProps: spec.SchemaProps{ + Description: "ShowHiddenMetricsForVersion is the version for which you want to show hidden metrics.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "detectLocalMode": { + SchemaProps: spec.SchemaProps{ + Description: "DetectLocalMode determines mode to use for detecting local traffic, defaults to LocalModeClusterCIDR", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"bindAddress", "healthzBindAddress", "metricsBindAddress", "bindAddressHardFail", "enableProfiling", "clusterCIDR", "hostnameOverride", "clientConnection", "iptables", "ipvs", "oomScoreAdj", "mode", "portRange", "udpIdleTimeout", "conntrack", "configSyncPeriod", "nodePortAddresses", "winkernel", "showHiddenMetricsForVersion", "detectLocalMode"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/component-base/config/v1alpha1.ClientConnectionConfiguration", "k8s.io/kube-proxy/config/v1alpha1.KubeProxyConntrackConfiguration", "k8s.io/kube-proxy/config/v1alpha1.KubeProxyIPTablesConfiguration", "k8s.io/kube-proxy/config/v1alpha1.KubeProxyIPVSConfiguration", "k8s.io/kube-proxy/config/v1alpha1.KubeProxyWinkernelConfiguration"}, + } +} + +func schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyConntrackConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeProxyConntrackConfiguration contains conntrack settings for the Kubernetes proxy server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "maxPerCore": { + SchemaProps: spec.SchemaProps{ + Description: "maxPerCore is the maximum number of NAT connections to track per CPU core (0 to leave the limit as-is and ignore min).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "min": { + SchemaProps: spec.SchemaProps{ + Description: "min is the minimum value of connect-tracking records to allocate, regardless of conntrackMaxPerCore (set maxPerCore=0 to leave the limit as-is).", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "tcpEstablishedTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "tcpEstablishedTimeout is how long an idle TCP connection will be kept open (e.g. '2s'). Must be greater than 0 to set.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "tcpCloseWaitTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "tcpCloseWaitTimeout is how long an idle conntrack entry in CLOSE_WAIT state will remain in the conntrack table. (e.g. '60s'). Must be greater than 0 to set.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"maxPerCore", "min", "tcpEstablishedTimeout", "tcpCloseWaitTimeout"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyIPTablesConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeProxyIPTablesConfiguration contains iptables-related configuration details for the Kubernetes proxy server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "masqueradeBit": { + SchemaProps: spec.SchemaProps{ + Description: "masqueradeBit is the bit of the iptables fwmark space to use for SNAT if using the pure iptables proxy mode. Values must be within the range [0, 31].", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "masqueradeAll": { + SchemaProps: spec.SchemaProps{ + Description: "masqueradeAll tells kube-proxy to SNAT everything if using the pure iptables proxy mode.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "syncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "syncPeriod is the period that iptables rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "minSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "minSyncPeriod is the minimum period that iptables rules are refreshed (e.g. '5s', '1m', '2h22m').", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"masqueradeBit", "masqueradeAll", "syncPeriod", "minSyncPeriod"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyIPVSConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeProxyIPVSConfiguration contains ipvs-related configuration details for the Kubernetes proxy server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "syncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "syncPeriod is the period that ipvs rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "minSyncPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "minSyncPeriod is the minimum period that ipvs rules are refreshed (e.g. '5s', '1m', '2h22m').", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "scheduler": { + SchemaProps: spec.SchemaProps{ + Description: "ipvs scheduler", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "excludeCIDRs": { + SchemaProps: spec.SchemaProps{ + Description: "excludeCIDRs is a list of CIDR's which the ipvs proxier should not touch when cleaning up ipvs services.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "strictARP": { + SchemaProps: spec.SchemaProps{ + Description: "strict ARP configure arp_ignore and arp_announce to avoid answering ARP queries from kube-ipvs0 interface", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + "tcpTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "tcpTimeout is the timeout value used for idle IPVS TCP sessions. The default value is 0, which preserves the current timeout value on the system.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "tcpFinTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "tcpFinTimeout is the timeout value used for IPVS TCP sessions after receiving a FIN. The default value is 0, which preserves the current timeout value on the system.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "udpTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "udpTimeout is the timeout value used for IPVS UDP packets. The default value is 0, which preserves the current timeout value on the system.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + Required: []string{"syncPeriod", "minSyncPeriod", "scheduler", "excludeCIDRs", "strictARP", "tcpTimeout", "tcpFinTimeout", "udpTimeout"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kube_proxy_config_v1alpha1_KubeProxyWinkernelConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeProxyWinkernelConfiguration contains Windows/HNS settings for the Kubernetes proxy server.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "networkName": { + SchemaProps: spec.SchemaProps{ + Description: "networkName is the name of the network kube-proxy will use to create endpoints and policies", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "sourceVip": { + SchemaProps: spec.SchemaProps{ + Description: "sourceVip is the IP address of the source VIP endoint used for NAT when loadbalancing", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "enableDSR": { + SchemaProps: spec.SchemaProps{ + Description: "enableDSR tells kube-proxy whether HNS policies should be created with DSR", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"networkName", "sourceVip", "enableDSR"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1_ExtenderManagedResource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExtenderManagedResource describes the arguments of extended resources managed by an extender.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name is the extended resource name.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "ignoredByScheduler": { + SchemaProps: spec.SchemaProps{ + Description: "IgnoredByScheduler indicates whether kube-scheduler should ignore this resource when applying predicates.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1_ExtenderTLSConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExtenderTLSConfig contains settings to enable TLS with extender", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "insecure": { + SchemaProps: spec.SchemaProps{ + Description: "Server should be accessed without verifying the TLS certificate. For testing only.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "serverName": { + SchemaProps: spec.SchemaProps{ + Description: "ServerName is passed to the server for SNI and is used in the client to check server certificates against. If ServerName is empty, the hostname used to contact the server is used.", + Type: []string{"string"}, + Format: "", + }, + }, + "certFile": { + SchemaProps: spec.SchemaProps{ + Description: "Server requires TLS client certificate authentication", + Type: []string{"string"}, + Format: "", + }, + }, + "keyFile": { + SchemaProps: spec.SchemaProps{ + Description: "Server requires TLS client certificate authentication", + Type: []string{"string"}, + Format: "", + }, + }, + "caFile": { + SchemaProps: spec.SchemaProps{ + Description: "Trusted root certificates for server", + Type: []string{"string"}, + Format: "", + }, + }, + "certData": { + SchemaProps: spec.SchemaProps{ + Description: "CertData holds PEM-encoded bytes (typically read from a client certificate file). CertData takes precedence over CertFile", + Type: []string{"string"}, + Format: "byte", + }, + }, + "keyData": { + SchemaProps: spec.SchemaProps{ + Description: "KeyData holds PEM-encoded bytes (typically read from a client certificate key file). KeyData takes precedence over KeyFile", + Type: []string{"string"}, + Format: "byte", + }, + }, + "caData": { + SchemaProps: spec.SchemaProps{ + Description: "CAData holds PEM-encoded bytes (typically read from a root certificates bundle). CAData takes precedence over CAFile", + Type: []string{"string"}, + Format: "byte", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1_LabelPreference(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LabelPreference holds the parameters that are used to configure the corresponding priority function", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "label": { + SchemaProps: spec.SchemaProps{ + Description: "Used to identify node \"groups\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "presence": { + SchemaProps: spec.SchemaProps{ + Description: "This is a boolean flag If true, higher priority is given to nodes that have the label If false, higher priority is given to nodes that do not have the label", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"label", "presence"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1_LabelsPresence(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LabelsPresence holds the parameters that are used to configure the corresponding predicate in scheduler policy configuration.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "labels": { + SchemaProps: spec.SchemaProps{ + Description: "The list of labels that identify node \"groups\" All of the labels should be either present (or absent) for the node to be considered a fit for hosting the pod", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "presence": { + SchemaProps: spec.SchemaProps{ + Description: "The boolean flag that indicates whether the labels should be present or absent from the node", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"labels", "presence"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1_LegacyExtender(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "LegacyExtender holds the parameters used to communicate with the extender. If a verb is unspecified/empty, it is assumed that the extender chose not to provide that extension.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "urlPrefix": { + SchemaProps: spec.SchemaProps{ + Description: "URLPrefix at which the extender is available", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "filterVerb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb for the filter call, empty if not supported. This verb is appended to the URLPrefix when issuing the filter call to extender.", + Type: []string{"string"}, + Format: "", + }, + }, + "preemptVerb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb for the preempt call, empty if not supported. This verb is appended to the URLPrefix when issuing the preempt call to extender.", + Type: []string{"string"}, + Format: "", + }, + }, + "prioritizeVerb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb for the prioritize call, empty if not supported. This verb is appended to the URLPrefix when issuing the prioritize call to extender.", + Type: []string{"string"}, + Format: "", + }, + }, + "weight": { + SchemaProps: spec.SchemaProps{ + Description: "The numeric multiplier for the node scores that the prioritize call generates. The weight should be a positive integer", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "bindVerb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb for the bind call, empty if not supported. This verb is appended to the URLPrefix when issuing the bind call to extender. If this method is implemented by the extender, it is the extender's responsibility to bind the pod to apiserver. Only one extender can implement this function.", + Type: []string{"string"}, + Format: "", + }, + }, + "enableHttps": { + SchemaProps: spec.SchemaProps{ + Description: "EnableHTTPS specifies whether https should be used to communicate with the extender", + Type: []string{"boolean"}, + Format: "", + }, + }, + "tlsConfig": { + SchemaProps: spec.SchemaProps{ + Description: "TLSConfig specifies the transport layer security config", + Ref: ref("k8s.io/kube-scheduler/config/v1.ExtenderTLSConfig"), + }, + }, + "httpTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "HTTPTimeout specifies the timeout duration for a call to the extender. Filter timeout fails the scheduling of the pod. Prioritize timeout is ignored, k8s/other extenders priorities are used to select the node.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "nodeCacheCapable": { + SchemaProps: spec.SchemaProps{ + Description: "NodeCacheCapable specifies that the extender is capable of caching node information, so the scheduler should only send minimal information about the eligible nodes assuming that the extender already cached full details of all nodes in the cluster", + Type: []string{"boolean"}, + Format: "", + }, + }, + "managedResources": { + SchemaProps: spec.SchemaProps{ + Description: "ManagedResources is a list of extended resources that are managed by this extender. - A pod will be sent to the extender on the Filter, Prioritize and Bind\n (if the extender is the binder) phases iff the pod requests at least\n one of the extended resources in this list. If empty or unspecified,\n all pods will be sent to this extender.\n- If IgnoredByScheduler is set to true for a resource, kube-scheduler\n will skip checking the resource in predicates.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1.ExtenderManagedResource"), + }, + }, + }, + }, + }, + "ignorable": { + SchemaProps: spec.SchemaProps{ + Description: "Ignorable specifies if the extender is ignorable, i.e. scheduling should not fail when the extender returns an error or is not reachable.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"urlPrefix"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1.ExtenderManagedResource", "k8s.io/kube-scheduler/config/v1.ExtenderTLSConfig"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1_Policy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Policy describes a struct for a policy resource used in api.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "predicates": { + SchemaProps: spec.SchemaProps{ + Description: "Holds the information to configure the fit predicate functions", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1.PredicatePolicy"), + }, + }, + }, + }, + }, + "priorities": { + SchemaProps: spec.SchemaProps{ + Description: "Holds the information to configure the priority functions", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1.PriorityPolicy"), + }, + }, + }, + }, + }, + "extenders": { + SchemaProps: spec.SchemaProps{ + Description: "Holds the information to communicate with the extender(s)", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1.LegacyExtender"), + }, + }, + }, + }, + }, + "hardPodAffinitySymmetricWeight": { + SchemaProps: spec.SchemaProps{ + Description: "RequiredDuringScheduling affinity is not symmetric, but there is an implicit PreferredDuringScheduling affinity rule corresponding to every RequiredDuringScheduling affinity rule. HardPodAffinitySymmetricWeight represents the weight of implicit PreferredDuringScheduling affinity rule, in the range 1-100.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "alwaysCheckAllPredicates": { + SchemaProps: spec.SchemaProps{ + Description: "When AlwaysCheckAllPredicates is set to true, scheduler checks all the configured predicates even after one or more of them fails. When the flag is set to false, scheduler skips checking the rest of the predicates after it finds one predicate that failed.", + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"predicates", "priorities", "extenders", "hardPodAffinitySymmetricWeight", "alwaysCheckAllPredicates"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1.LegacyExtender", "k8s.io/kube-scheduler/config/v1.PredicatePolicy", "k8s.io/kube-scheduler/config/v1.PriorityPolicy"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1_PredicateArgument(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PredicateArgument represents the arguments to configure predicate functions in scheduler policy configuration. Only one of its members may be specified", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "serviceAffinity": { + SchemaProps: spec.SchemaProps{ + Description: "The predicate that provides affinity for pods belonging to a service It uses a label to identify nodes that belong to the same \"group\"", + Ref: ref("k8s.io/kube-scheduler/config/v1.ServiceAffinity"), + }, + }, + "labelsPresence": { + SchemaProps: spec.SchemaProps{ + Description: "The predicate that checks whether a particular node has a certain label defined or not, regardless of value", + Ref: ref("k8s.io/kube-scheduler/config/v1.LabelsPresence"), + }, + }, + }, + Required: []string{"serviceAffinity", "labelsPresence"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1.LabelsPresence", "k8s.io/kube-scheduler/config/v1.ServiceAffinity"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1_PredicatePolicy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PredicatePolicy describes a struct of a predicate policy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Identifier of the predicate policy For a custom predicate, the name can be user-defined For the Kubernetes provided predicates, the name is the identifier of the pre-defined predicate", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "argument": { + SchemaProps: spec.SchemaProps{ + Description: "Holds the parameters to configure the given predicate", + Ref: ref("k8s.io/kube-scheduler/config/v1.PredicateArgument"), + }, + }, + }, + Required: []string{"name", "argument"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1.PredicateArgument"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1_PriorityArgument(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityArgument represents the arguments to configure priority functions in scheduler policy configuration. Only one of its members may be specified", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "serviceAntiAffinity": { + SchemaProps: spec.SchemaProps{ + Description: "The priority function that ensures a good spread (anti-affinity) for pods belonging to a service It uses a label to identify nodes that belong to the same \"group\"", + Ref: ref("k8s.io/kube-scheduler/config/v1.ServiceAntiAffinity"), + }, + }, + "labelPreference": { + SchemaProps: spec.SchemaProps{ + Description: "The priority function that checks whether a particular node has a certain label defined or not, regardless of value", + Ref: ref("k8s.io/kube-scheduler/config/v1.LabelPreference"), + }, + }, + "requestedToCapacityRatioArguments": { + SchemaProps: spec.SchemaProps{ + Description: "The RequestedToCapacityRatio priority function is parametrized with function shape.", + Ref: ref("k8s.io/kube-scheduler/config/v1.RequestedToCapacityRatioArguments"), + }, + }, + }, + Required: []string{"serviceAntiAffinity", "labelPreference", "requestedToCapacityRatioArguments"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1.LabelPreference", "k8s.io/kube-scheduler/config/v1.RequestedToCapacityRatioArguments", "k8s.io/kube-scheduler/config/v1.ServiceAntiAffinity"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1_PriorityPolicy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PriorityPolicy describes a struct of a priority policy.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Identifier of the priority policy For a custom priority, the name can be user-defined For the Kubernetes provided priority functions, the name is the identifier of the pre-defined priority function", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "weight": { + SchemaProps: spec.SchemaProps{ + Description: "The numeric multiplier for the node scores that the priority function generates The weight should be non-zero and can be a positive or a negative integer", + Default: 0, + Type: []string{"integer"}, + Format: "int64", + }, + }, + "argument": { + SchemaProps: spec.SchemaProps{ + Description: "Holds the parameters to configure the given priority function", + Ref: ref("k8s.io/kube-scheduler/config/v1.PriorityArgument"), + }, + }, + }, + Required: []string{"name", "weight", "argument"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1.PriorityArgument"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1_RequestedToCapacityRatioArguments(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RequestedToCapacityRatioArguments holds arguments specific to RequestedToCapacityRatio priority function.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "shape": { + SchemaProps: spec.SchemaProps{ + Description: "Array of point defining priority function shape.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1.UtilizationShapePoint"), + }, + }, + }, + }, + }, + "resources": { + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1.ResourceSpec"), + }, + }, + }, + }, + }, + }, + Required: []string{"shape"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1.ResourceSpec", "k8s.io/kube-scheduler/config/v1.UtilizationShapePoint"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1_ResourceSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceSpec represents single resource and weight for bin packing of priority RequestedToCapacityRatioArguments.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the resource to be managed by RequestedToCapacityRatio function.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "weight": { + SchemaProps: spec.SchemaProps{ + Description: "Weight of the resource.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1_ServiceAffinity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceAffinity holds the parameters that are used to configure the corresponding predicate in scheduler policy configuration.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "labels": { + SchemaProps: spec.SchemaProps{ + Description: "The list of labels that identify node \"groups\" All of the labels should match for the node to be considered a fit for hosting the pod", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + Required: []string{"labels"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1_ServiceAntiAffinity(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceAntiAffinity holds the parameters that are used to configure the corresponding priority function", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "label": { + SchemaProps: spec.SchemaProps{ + Description: "Used to identify node \"groups\"", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"label"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1_UtilizationShapePoint(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "UtilizationShapePoint represents single point of priority function shape.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "utilization": { + SchemaProps: spec.SchemaProps{ + Description: "Utilization (x axis). Valid values are 0 to 100. Fully utilized node maps to 100.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "score": { + SchemaProps: spec.SchemaProps{ + Description: "Score assigned to given utilization (y axis). Valid values are 0 to 10.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"utilization", "score"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_DefaultPreemptionArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "DefaultPreemptionArgs holds arguments used to configure the DefaultPreemption plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "minCandidateNodesPercentage": { + SchemaProps: spec.SchemaProps{ + Description: "MinCandidateNodesPercentage is the minimum number of candidates to shortlist when dry running preemption as a percentage of number of nodes. Must be in the range [0, 100]. Defaults to 10% of the cluster size if unspecified.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "minCandidateNodesAbsolute": { + SchemaProps: spec.SchemaProps{ + Description: "MinCandidateNodesAbsolute is the absolute minimum number of candidates to shortlist. The likely number of candidates enumerated for dry running preemption is given by the formula: numCandidates = max(numNodes * minCandidateNodesPercentage, minCandidateNodesAbsolute) We say \"likely\" because there are other factors such as PDB violations that play a role in the number of candidates shortlisted. Must be at least 0 nodes. Defaults to 100 nodes if unspecified.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_Extender(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Extender holds the parameters used to communicate with the extender. If a verb is unspecified/empty, it is assumed that the extender chose not to provide that extension.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "urlPrefix": { + SchemaProps: spec.SchemaProps{ + Description: "URLPrefix at which the extender is available", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "filterVerb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb for the filter call, empty if not supported. This verb is appended to the URLPrefix when issuing the filter call to extender.", + Type: []string{"string"}, + Format: "", + }, + }, + "preemptVerb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb for the preempt call, empty if not supported. This verb is appended to the URLPrefix when issuing the preempt call to extender.", + Type: []string{"string"}, + Format: "", + }, + }, + "prioritizeVerb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb for the prioritize call, empty if not supported. This verb is appended to the URLPrefix when issuing the prioritize call to extender.", + Type: []string{"string"}, + Format: "", + }, + }, + "weight": { + SchemaProps: spec.SchemaProps{ + Description: "The numeric multiplier for the node scores that the prioritize call generates. The weight should be a positive integer", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "bindVerb": { + SchemaProps: spec.SchemaProps{ + Description: "Verb for the bind call, empty if not supported. This verb is appended to the URLPrefix when issuing the bind call to extender. If this method is implemented by the extender, it is the extender's responsibility to bind the pod to apiserver. Only one extender can implement this function.", + Type: []string{"string"}, + Format: "", + }, + }, + "enableHTTPS": { + SchemaProps: spec.SchemaProps{ + Description: "EnableHTTPS specifies whether https should be used to communicate with the extender", + Type: []string{"boolean"}, + Format: "", + }, + }, + "tlsConfig": { + SchemaProps: spec.SchemaProps{ + Description: "TLSConfig specifies the transport layer security config", + Ref: ref("k8s.io/kube-scheduler/config/v1.ExtenderTLSConfig"), + }, + }, + "httpTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "HTTPTimeout specifies the timeout duration for a call to the extender. Filter timeout fails the scheduling of the pod. Prioritize timeout is ignored, k8s/other extenders priorities are used to select the node.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "nodeCacheCapable": { + SchemaProps: spec.SchemaProps{ + Description: "NodeCacheCapable specifies that the extender is capable of caching node information, so the scheduler should only send minimal information about the eligible nodes assuming that the extender already cached full details of all nodes in the cluster", + Type: []string{"boolean"}, + Format: "", + }, + }, + "managedResources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "ManagedResources is a list of extended resources that are managed by this extender. - A pod will be sent to the extender on the Filter, Prioritize and Bind\n (if the extender is the binder) phases iff the pod requests at least\n one of the extended resources in this list. If empty or unspecified,\n all pods will be sent to this extender.\n- If IgnoredByScheduler is set to true for a resource, kube-scheduler\n will skip checking the resource in predicates.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1.ExtenderManagedResource"), + }, + }, + }, + }, + }, + "ignorable": { + SchemaProps: spec.SchemaProps{ + Description: "Ignorable specifies if the extender is ignorable, i.e. scheduling should not fail when the extender returns an error or is not reachable.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + Required: []string{"urlPrefix"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/kube-scheduler/config/v1.ExtenderManagedResource", "k8s.io/kube-scheduler/config/v1.ExtenderTLSConfig"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_InterPodAffinityArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "InterPodAffinityArgs holds arguments used to configure the InterPodAffinity plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "hardPodAffinityWeight": { + SchemaProps: spec.SchemaProps{ + Description: "HardPodAffinityWeight is the scoring weight for existing pods with a matching hard affinity to the incoming pod.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_KubeSchedulerConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeSchedulerConfiguration configures a scheduler", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "parallelism": { + SchemaProps: spec.SchemaProps{ + Description: "Parallelism defines the amount of parallelism in algorithms for scheduling a Pods. Must be greater than 0. Defaults to 16", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "leaderElection": { + SchemaProps: spec.SchemaProps{ + Description: "LeaderElection defines the configuration of leader election client.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/component-base/config/v1alpha1.LeaderElectionConfiguration"), + }, + }, + "clientConnection": { + SchemaProps: spec.SchemaProps{ + Description: "ClientConnection specifies the kubeconfig file and client connection settings for the proxy server to use when communicating with the apiserver.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/component-base/config/v1alpha1.ClientConnectionConfiguration"), + }, + }, + "healthzBindAddress": { + SchemaProps: spec.SchemaProps{ + Description: "HealthzBindAddress is the IP address and port for the health check server to serve on, defaulting to 0.0.0.0:10251", + Type: []string{"string"}, + Format: "", + }, + }, + "metricsBindAddress": { + SchemaProps: spec.SchemaProps{ + Description: "MetricsBindAddress is the IP address and port for the metrics server to serve on, defaulting to 0.0.0.0:10251.", + Type: []string{"string"}, + Format: "", + }, + }, + "enableProfiling": { + SchemaProps: spec.SchemaProps{ + Description: "enableProfiling enables profiling via web interface host:port/debug/pprof/", + Type: []string{"boolean"}, + Format: "", + }, + }, + "enableContentionProfiling": { + SchemaProps: spec.SchemaProps{ + Description: "enableContentionProfiling enables lock contention profiling, if enableProfiling is true.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "percentageOfNodesToScore": { + SchemaProps: spec.SchemaProps{ + Description: "PercentageOfNodesToScore is the percentage of all nodes that once found feasible for running a pod, the scheduler stops its search for more feasible nodes in the cluster. This helps improve scheduler's performance. Scheduler always tries to find at least \"minFeasibleNodesToFind\" feasible nodes no matter what the value of this flag is. Example: if the cluster size is 500 nodes and the value of this flag is 30, then scheduler stops finding further feasible nodes once it finds 150 feasible ones. When the value is 0, default percentage (5%--50% based on the size of the cluster) of the nodes will be scored.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "podInitialBackoffSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "PodInitialBackoffSeconds is the initial backoff for unschedulable pods. If specified, it must be greater than 0. If this value is null, the default value (1s) will be used.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "podMaxBackoffSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "PodMaxBackoffSeconds is the max backoff for unschedulable pods. If specified, it must be greater than podInitialBackoffSeconds. If this value is null, the default value (10s) will be used.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "profiles": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "schedulerName", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Profiles are scheduling profiles that kube-scheduler supports. Pods can choose to be scheduled under a particular profile by setting its associated scheduler name. Pods that don't specify any scheduler name are scheduled with the \"default-scheduler\" profile, if present here.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.KubeSchedulerProfile"), + }, + }, + }, + }, + }, + "extenders": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Extenders are the list of scheduler extenders, each holding the values of how to communicate with the extender. These extenders are shared by all scheduler profiles.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.Extender"), + }, + }, + }, + }, + }, + }, + Required: []string{"leaderElection", "clientConnection"}, + }, + }, + Dependencies: []string{ + "k8s.io/component-base/config/v1alpha1.ClientConnectionConfiguration", "k8s.io/component-base/config/v1alpha1.LeaderElectionConfiguration", "k8s.io/kube-scheduler/config/v1beta1.Extender", "k8s.io/kube-scheduler/config/v1beta1.KubeSchedulerProfile"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_KubeSchedulerProfile(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeSchedulerProfile is a scheduling profile.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "schedulerName": { + SchemaProps: spec.SchemaProps{ + Description: "SchedulerName is the name of the scheduler associated to this profile. If SchedulerName matches with the pod's \"spec.schedulerName\", then the pod is scheduled with this profile.", + Type: []string{"string"}, + Format: "", + }, + }, + "plugins": { + SchemaProps: spec.SchemaProps{ + Description: "Plugins specify the set of plugins that should be enabled or disabled. Enabled plugins are the ones that should be enabled in addition to the default plugins. Disabled plugins are any of the default plugins that should be disabled. When no enabled or disabled plugin is specified for an extension point, default plugins for that extension point will be used if there is any. If a QueueSort plugin is specified, the same QueueSort Plugin and PluginConfig must be specified for all profiles.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.Plugins"), + }, + }, + "pluginConfig": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "PluginConfig is an optional set of custom plugin arguments for each plugin. Omitting config args for a plugin is equivalent to using the default config for that plugin.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginConfig"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1beta1.PluginConfig", "k8s.io/kube-scheduler/config/v1beta1.Plugins"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_NodeAffinityArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeAffinityArgs holds arguments to configure the NodeAffinity plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "addedAffinity": { + SchemaProps: spec.SchemaProps{ + Description: "AddedAffinity is applied to all Pods additionally to the NodeAffinity specified in the PodSpec. That is, Nodes need to satisfy AddedAffinity AND .spec.NodeAffinity. AddedAffinity is empty by default (all Nodes match). When AddedAffinity is used, some Pods with affinity requirements that match a specific Node (such as Daemonset Pods) might remain unschedulable.", + Ref: ref("k8s.io/api/core/v1.NodeAffinity"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeAffinity"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_NodeLabelArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeLabelArgs holds arguments used to configure the NodeLabel plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "presentLabels": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "PresentLabels should be present for the node to be considered a fit for hosting the pod", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "absentLabels": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "AbsentLabels should be absent for the node to be considered a fit for hosting the pod", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "presentLabelsPreference": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Nodes that have labels in the list will get a higher score.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "absentLabelsPreference": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Nodes that don't have labels in the list will get a higher score.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_NodeResourcesFitArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeResourcesFitArgs holds arguments used to configure the NodeResourcesFit plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "ignoredResources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "IgnoredResources is the list of resources that NodeResources fit filter should ignore.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "ignoredResourceGroups": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "IgnoredResourceGroups defines the list of resource groups that NodeResources fit filter should ignore. e.g. if group is [\"example.com\"], it will ignore all resource names that begin with \"example.com\", such as \"example.com/aaa\" and \"example.com/bbb\". A resource group name can't contain '/'.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_NodeResourcesLeastAllocatedArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeResourcesLeastAllocatedArgs holds arguments used to configure NodeResourcesLeastAllocated plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "resources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Resources to be managed, if no resource is provided, default resource set with both the weight of \"cpu\" and \"memory\" set to \"1\" will be applied. Resource with \"0\" weight will not accountable for the final score.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.ResourceSpec"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1beta1.ResourceSpec"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_NodeResourcesMostAllocatedArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeResourcesMostAllocatedArgs holds arguments used to configure NodeResourcesMostAllocated plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "resources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Resources to be managed, if no resource is provided, default resource set with both the weight of \"cpu\" and \"memory\" set to \"1\" will be applied. Resource with \"0\" weight will not accountable for the final score.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.ResourceSpec"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1beta1.ResourceSpec"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_Plugin(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Plugin specifies a plugin name and its weight when applicable. Weight is used only for Score plugins.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name defines the name of plugin", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "weight": { + SchemaProps: spec.SchemaProps{ + Description: "Weight defines the weight of plugin, only used for Score plugins.", + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_PluginConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PluginConfig specifies arguments that should be passed to a plugin at the time of initialization. A plugin that is invoked at multiple extension points is initialized once. Args can have arbitrary structure. It is up to the plugin to process these Args.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name defines the name of plugin being configured", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "args": { + SchemaProps: spec.SchemaProps{ + Description: "Args defines the arguments passed to the plugins at the time of initialization. Args can have arbitrary structure.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/runtime.RawExtension"), + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/runtime.RawExtension"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_PluginSet(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PluginSet specifies enabled and disabled plugins for an extension point. If an array is empty, missing, or nil, default plugins at that extension point will be used.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "enabled": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Enabled specifies plugins that should be enabled in addition to default plugins. These are called after default plugins and in the same order specified here.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.Plugin"), + }, + }, + }, + }, + }, + "disabled": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Disabled specifies default plugins that should be disabled. When all default plugins need to be disabled, an array containing only one \"*\" should be provided.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.Plugin"), + }, + }, + }, + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1beta1.Plugin"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_Plugins(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Plugins include multiple extension points. When specified, the list of plugins for a particular extension point are the only ones enabled. If an extension point is omitted from the config, then the default set of plugins is used for that extension point. Enabled plugins are called in the order specified here, after default plugins. If they need to be invoked before default plugins, default plugins must be disabled and re-enabled here in desired order.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "queueSort": { + SchemaProps: spec.SchemaProps{ + Description: "QueueSort is a list of plugins that should be invoked when sorting pods in the scheduling queue.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "preFilter": { + SchemaProps: spec.SchemaProps{ + Description: "PreFilter is a list of plugins that should be invoked at \"PreFilter\" extension point of the scheduling framework.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "filter": { + SchemaProps: spec.SchemaProps{ + Description: "Filter is a list of plugins that should be invoked when filtering out nodes that cannot run the Pod.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "postFilter": { + SchemaProps: spec.SchemaProps{ + Description: "PostFilter is a list of plugins that are invoked after filtering phase, no matter whether filtering succeeds or not.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "preScore": { + SchemaProps: spec.SchemaProps{ + Description: "PreScore is a list of plugins that are invoked before scoring.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "score": { + SchemaProps: spec.SchemaProps{ + Description: "Score is a list of plugins that should be invoked when ranking nodes that have passed the filtering phase.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "reserve": { + SchemaProps: spec.SchemaProps{ + Description: "Reserve is a list of plugins invoked when reserving/unreserving resources after a node is assigned to run the pod.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "permit": { + SchemaProps: spec.SchemaProps{ + Description: "Permit is a list of plugins that control binding of a Pod. These plugins can prevent or delay binding of a Pod.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "preBind": { + SchemaProps: spec.SchemaProps{ + Description: "PreBind is a list of plugins that should be invoked before a pod is bound.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "bind": { + SchemaProps: spec.SchemaProps{ + Description: "Bind is a list of plugins that should be invoked at \"Bind\" extension point of the scheduling framework. The scheduler call these plugins in order. Scheduler skips the rest of these plugins as soon as one returns success.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + "postBind": { + SchemaProps: spec.SchemaProps{ + Description: "PostBind is a list of plugins that should be invoked after a pod is successfully bound.", + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.PluginSet"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1beta1.PluginSet"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_PodTopologySpreadArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodTopologySpreadArgs holds arguments used to configure the PodTopologySpread plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "defaultConstraints": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "DefaultConstraints defines topology spread constraints to be applied to Pods that don't define any in `pod.spec.topologySpreadConstraints`. `.defaultConstraints[*].labelSelectors` must be empty, as they are deduced from the Pod's membership to Services, ReplicationControllers, ReplicaSets or StatefulSets. When not empty, .defaultingType must be \"List\".", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.TopologySpreadConstraint"), + }, + }, + }, + }, + }, + "defaultingType": { + SchemaProps: spec.SchemaProps{ + Description: "DefaultingType determines how .defaultConstraints are deduced. Can be one of \"System\" or \"List\".\n\n- \"System\": Use kubernetes defined constraints that spread Pods among\n Nodes and Zones.\n- \"List\": Use constraints defined in .defaultConstraints.\n\nDefaults to \"List\" if feature gate DefaultPodTopologySpread is disabled and to \"System\" if enabled.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.TopologySpreadConstraint"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_RequestedToCapacityRatioArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "RequestedToCapacityRatioArgs holds arguments used to configure RequestedToCapacityRatio plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "shape": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Points defining priority function shape", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.UtilizationShapePoint"), + }, + }, + }, + }, + }, + "resources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Resources to be managed", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kube-scheduler/config/v1beta1.ResourceSpec"), + }, + }, + }, + }, + }, + }, + Required: []string{"shape"}, + }, + }, + Dependencies: []string{ + "k8s.io/kube-scheduler/config/v1beta1.ResourceSpec", "k8s.io/kube-scheduler/config/v1beta1.UtilizationShapePoint"}, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_ResourceSpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ResourceSpec represents single resource and weight for bin packing of priority RequestedToCapacityRatioArguments.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name of the resource to be managed by RequestedToCapacityRatio function.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "weight": { + SchemaProps: spec.SchemaProps{ + Description: "Weight of the resource.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + Required: []string{"name"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_ServiceAffinityArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ServiceAffinityArgs holds arguments used to configure the ServiceAffinity plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "affinityLabels": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "AffinityLabels are homogeneous for pods that are scheduled to a node. (i.e. it returns true IFF this pod can be added to this node such that all other pods in the same service are running on nodes with the exact same values for Labels).", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "antiAffinityLabelsPreference": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "AntiAffinityLabelsPreference are the labels to consider for service anti affinity scoring.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_UtilizationShapePoint(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "UtilizationShapePoint represents single point of priority function shape.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "utilization": { + SchemaProps: spec.SchemaProps{ + Description: "Utilization (x axis). Valid values are 0 to 100. Fully utilized node maps to 100.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + "score": { + SchemaProps: spec.SchemaProps{ + Description: "Score assigned to given utilization (y axis). Valid values are 0 to 10.", + Default: 0, + Type: []string{"integer"}, + Format: "int32", + }, + }, + }, + Required: []string{"utilization", "score"}, + }, + }, + } +} + +func schema_k8sio_kube_scheduler_config_v1beta1_VolumeBindingArgs(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeBindingArgs holds arguments used to configure the VolumeBinding plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "bindTimeoutSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "BindTimeoutSeconds is the timeout in seconds in volume binding operation. Value must be non-negative integer. The value zero indicates no waiting. If this value is nil, the default value (600) will be used.", + Type: []string{"integer"}, + Format: "int64", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kubelet_config_v1alpha1_CredentialProvider(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CredentialProvider represents an exec plugin to be invoked by the kubelet. The plugin is only invoked when an image being pulled matches the images handled by the plugin (see matchImages).", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the required name of the credential provider. It must match the name of the provider executable as seen by the kubelet. The executable must be in the kubelet's bin directory (set by the --image-credential-provider-bin-dir flag).", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "matchImages": { + SchemaProps: spec.SchemaProps{ + Description: "matchImages is a required list of strings used to match against images in order to determine if this provider should be invoked. If one of the strings matches the requested image from the kubelet, the plugin will be invoked and given a chance to provide credentials. Images are expected to contain the registry domain and URL path.\n\nEach entry in matchImages is a pattern which can optionally contain a port and a path. Globs can be used in the domain, but not in the port or the path. Globs are supported as subdomains like '*.k8s.io' or 'k8s.*.io', and top-level-domains such as 'k8s.*'. Matching partial subdomains like 'app*.k8s.io' is also supported. Each glob can only match a single subdomain segment, so *.io does not match *.k8s.io.\n\nA match exists between an image and a matchImage when all of the below are true: - Both contain the same number of domain parts and each part matches. - The URL path of an imageMatch must be a prefix of the target image URL path. - If the imageMatch contains a port, then the port must match in the image as well.\n\nExample values of matchImages:\n - 123456789.dkr.ecr.us-east-1.amazonaws.com\n - *.azurecr.io\n - gcr.io\n - *.*.registry.io\n - registry.io:8080/path", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "defaultCacheDuration": { + SchemaProps: spec.SchemaProps{ + Description: "defaultCacheDuration is the default duration the plugin will cache credentials in-memory if a cache duration is not provided in the plugin response. This field is required.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "Required input version of the exec CredentialProviderRequest. The returned CredentialProviderResponse MUST use the same encoding version as the input. Current supported values are: - credentialprovider.kubelet.k8s.io/v1alpha1", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "args": { + SchemaProps: spec.SchemaProps{ + Description: "Arguments to pass to the command when executing it.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "env": { + SchemaProps: spec.SchemaProps{ + Description: "Env defines additional environment variables to expose to the process. These are unioned with the host's environment, as well as variables client-go uses to pass argument to the plugin.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubelet/config/v1alpha1.ExecEnvVar"), + }, + }, + }, + }, + }, + }, + Required: []string{"name", "matchImages", "defaultCacheDuration", "apiVersion"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/kubelet/config/v1alpha1.ExecEnvVar"}, + } +} + +func schema_k8sio_kubelet_config_v1alpha1_CredentialProviderConfig(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "CredentialProviderConfig is the configuration containing information about each exec credential provider. Kubelet reads this configuration from disk and enables each provider as specified by the CredentialProvider type.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "providers": { + SchemaProps: spec.SchemaProps{ + Description: "providers is a list of credential provider plugins that will be enabled by the kubelet. Multiple providers may match against a single image, in which case credentials from all providers will be returned to the kubelet. If multiple providers are called for a single image, the results are combined. If providers return overlapping auth keys, the value from the provider earlier in this list is used.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubelet/config/v1alpha1.CredentialProvider"), + }, + }, + }, + }, + }, + }, + Required: []string{"providers"}, + }, + }, + Dependencies: []string{ + "k8s.io/kubelet/config/v1alpha1.CredentialProvider"}, + } +} + +func schema_k8sio_kubelet_config_v1alpha1_ExecEnvVar(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExecEnvVar is used for setting environment variables when executing an exec-based credential plugin.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "value"}, + }, + }, + } +} + +func schema_k8sio_kubelet_config_v1beta1_KubeletAnonymousAuthentication(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "enabled": { + SchemaProps: spec.SchemaProps{ + Description: "enabled allows anonymous requests to the kubelet server. Requests that are not rejected by another authentication method are treated as anonymous requests. Anonymous requests have a username of system:anonymous, and a group name of system:unauthenticated.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kubelet_config_v1beta1_KubeletAuthentication(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "x509": { + SchemaProps: spec.SchemaProps{ + Description: "x509 contains settings related to x509 client certificate authentication", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubelet/config/v1beta1.KubeletX509Authentication"), + }, + }, + "webhook": { + SchemaProps: spec.SchemaProps{ + Description: "webhook contains settings related to webhook bearer token authentication", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubelet/config/v1beta1.KubeletWebhookAuthentication"), + }, + }, + "anonymous": { + SchemaProps: spec.SchemaProps{ + Description: "anonymous contains settings related to anonymous authentication", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubelet/config/v1beta1.KubeletAnonymousAuthentication"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kubelet/config/v1beta1.KubeletAnonymousAuthentication", "k8s.io/kubelet/config/v1beta1.KubeletWebhookAuthentication", "k8s.io/kubelet/config/v1beta1.KubeletX509Authentication"}, + } +} + +func schema_k8sio_kubelet_config_v1beta1_KubeletAuthorization(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "mode": { + SchemaProps: spec.SchemaProps{ + Description: "mode is the authorization mode to apply to requests to the kubelet server. Valid values are AlwaysAllow and Webhook. Webhook mode uses the SubjectAccessReview API to determine authorization.", + Type: []string{"string"}, + Format: "", + }, + }, + "webhook": { + SchemaProps: spec.SchemaProps{ + Description: "webhook contains settings related to Webhook authorization.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubelet/config/v1beta1.KubeletWebhookAuthorization"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/kubelet/config/v1beta1.KubeletWebhookAuthorization"}, + } +} + +func schema_k8sio_kubelet_config_v1beta1_KubeletConfiguration(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "KubeletConfiguration contains the configuration for the Kubelet", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "enableServer": { + SchemaProps: spec.SchemaProps{ + Description: "enableServer enables Kubelet's secured server. Note: Kubelet's insecure port is controlled by the readOnlyPort option. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "staticPodPath": { + SchemaProps: spec.SchemaProps{ + Description: "staticPodPath is the path to the directory containing local (static) pods to run, or the path to a single static pod file. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that the set of static pods specified at the new path may be different than the ones the Kubelet initially started with, and this may disrupt your node. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "syncFrequency": { + SchemaProps: spec.SchemaProps{ + Description: "syncFrequency is the max period between synchronizing running containers and config. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that shortening this duration may have a negative performance impact, especially as the number of Pods on the node increases. Alternatively, increasing this duration will result in longer refresh times for ConfigMaps and Secrets. Default: \"1m\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "fileCheckFrequency": { + SchemaProps: spec.SchemaProps{ + Description: "fileCheckFrequency is the duration between checking config files for new data Dynamic Kubelet Config (beta): If dynamically updating this field, consider that shortening the duration will cause the Kubelet to reload local Static Pod configurations more frequently, which may have a negative performance impact. Default: \"20s\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "httpCheckFrequency": { + SchemaProps: spec.SchemaProps{ + Description: "httpCheckFrequency is the duration between checking http for new data Dynamic Kubelet Config (beta): If dynamically updating this field, consider that shortening the duration will cause the Kubelet to poll staticPodURL more frequently, which may have a negative performance impact. Default: \"20s\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "staticPodURL": { + SchemaProps: spec.SchemaProps{ + Description: "staticPodURL is the URL for accessing static pods to run Dynamic Kubelet Config (beta): If dynamically updating this field, consider that the set of static pods specified at the new URL may be different than the ones the Kubelet initially started with, and this may disrupt your node. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "staticPodURLHeader": { + SchemaProps: spec.SchemaProps{ + Description: "staticPodURLHeader is a map of slices with HTTP headers to use when accessing the podURL Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt the ability to read the latest set of static pods from StaticPodURL. Default: nil", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + }, + }, + }, + "address": { + SchemaProps: spec.SchemaProps{ + Description: "address is the IP address for the Kubelet to serve on (set to 0.0.0.0 for all interfaces). Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: \"0.0.0.0\"", + Type: []string{"string"}, + Format: "", + }, + }, + "port": { + SchemaProps: spec.SchemaProps{ + Description: "port is the port for the Kubelet to serve on. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: 10250", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "readOnlyPort": { + SchemaProps: spec.SchemaProps{ + Description: "readOnlyPort is the read-only port for the Kubelet to serve on with no authentication/authorization. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: 0 (disabled)", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "tlsCertFile": { + SchemaProps: spec.SchemaProps{ + Description: "tlsCertFile is the file containing x509 Certificate for HTTPS. (CA cert, if any, concatenated after server cert). If tlsCertFile and tlsPrivateKeyFile are not provided, a self-signed certificate and key are generated for the public address and saved to the directory passed to the Kubelet's --cert-dir flag. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "tlsPrivateKeyFile": { + SchemaProps: spec.SchemaProps{ + Description: "tlsPrivateKeyFile is the file containing x509 private key matching tlsCertFile Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "tlsCipherSuites": { + SchemaProps: spec.SchemaProps{ + Description: "TLSCipherSuites is the list of allowed cipher suites for the server. Values are from tls package constants (https://golang.org/pkg/crypto/tls/#pkg-constants). Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: nil", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "tlsMinVersion": { + SchemaProps: spec.SchemaProps{ + Description: "TLSMinVersion is the minimum TLS version supported. Values are from tls package constants (https://golang.org/pkg/crypto/tls/#pkg-constants). Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "rotateCertificates": { + SchemaProps: spec.SchemaProps{ + Description: "rotateCertificates enables client certificate rotation. The Kubelet will request a new certificate from the certificates.k8s.io API. This requires an approver to approve the certificate signing requests. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that disabling it may disrupt the Kubelet's ability to authenticate with the API server after the current certificate expires. Default: false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "serverTLSBootstrap": { + SchemaProps: spec.SchemaProps{ + Description: "serverTLSBootstrap enables server certificate bootstrap. Instead of self signing a serving certificate, the Kubelet will request a certificate from the certificates.k8s.io API. This requires an approver to approve the certificate signing requests. The RotateKubeletServerCertificate feature must be enabled. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that disabling it will stop the renewal of Kubelet server certificates, which can disrupt components that interact with the Kubelet server in the long term, due to certificate expiration. Default: false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "authentication": { + SchemaProps: spec.SchemaProps{ + Description: "authentication specifies how requests to the Kubelet's server are authenticated Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Defaults:\n anonymous:\n enabled: false\n webhook:\n enabled: true\n cacheTTL: \"2m\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubelet/config/v1beta1.KubeletAuthentication"), + }, + }, + "authorization": { + SchemaProps: spec.SchemaProps{ + Description: "authorization specifies how requests to the Kubelet's server are authorized Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Defaults:\n mode: Webhook\n webhook:\n cacheAuthorizedTTL: \"5m\"\n cacheUnauthorizedTTL: \"30s\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubelet/config/v1beta1.KubeletAuthorization"), + }, + }, + "registryPullQPS": { + SchemaProps: spec.SchemaProps{ + Description: "registryPullQPS is the limit of registry pulls per second. Set to 0 for no limit. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact scalability by changing the amount of traffic produced by image pulls. Default: 5", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "registryBurst": { + SchemaProps: spec.SchemaProps{ + Description: "registryBurst is the maximum size of bursty pulls, temporarily allows pulls to burst to this number, while still not exceeding registryPullQPS. Only used if registryPullQPS > 0. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact scalability by changing the amount of traffic produced by image pulls. Default: 10", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "eventRecordQPS": { + SchemaProps: spec.SchemaProps{ + Description: "eventRecordQPS is the maximum event creations per second. If 0, there is no limit enforced. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact scalability by changing the amount of traffic produced by event creations. Default: 5", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "eventBurst": { + SchemaProps: spec.SchemaProps{ + Description: "eventBurst is the maximum size of a burst of event creations, temporarily allows event creations to burst to this number, while still not exceeding eventRecordQPS. Only used if eventRecordQPS > 0. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact scalability by changing the amount of traffic produced by event creations. Default: 10", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "enableDebuggingHandlers": { + SchemaProps: spec.SchemaProps{ + Description: "enableDebuggingHandlers enables server endpoints for log access and local running of containers and commands, including the exec, attach, logs, and portforward features. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that disabling it may disrupt components that interact with the Kubelet server. Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "enableContentionProfiling": { + SchemaProps: spec.SchemaProps{ + Description: "enableContentionProfiling enables lock contention profiling, if enableDebuggingHandlers is true. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that enabling it may carry a performance impact. Default: false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "healthzPort": { + SchemaProps: spec.SchemaProps{ + Description: "healthzPort is the port of the localhost healthz endpoint (set to 0 to disable) Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that monitor Kubelet health. Default: 10248", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "healthzBindAddress": { + SchemaProps: spec.SchemaProps{ + Description: "healthzBindAddress is the IP address for the healthz server to serve on Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that monitor Kubelet health. Default: \"127.0.0.1\"", + Type: []string{"string"}, + Format: "", + }, + }, + "oomScoreAdj": { + SchemaProps: spec.SchemaProps{ + Description: "oomScoreAdj is The oom-score-adj value for kubelet process. Values must be within the range [-1000, 1000]. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact the stability of nodes under memory pressure. Default: -999", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "clusterDomain": { + SchemaProps: spec.SchemaProps{ + Description: "clusterDomain is the DNS domain for this cluster. If set, kubelet will configure all containers to search this domain in addition to the host's search domains. Dynamic Kubelet Config (beta): Dynamically updating this field is not recommended, as it should be kept in sync with the rest of the cluster. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "clusterDNS": { + SchemaProps: spec.SchemaProps{ + Description: "clusterDNS is a list of IP addresses for the cluster DNS server. If set, kubelet will configure all containers to use this for DNS resolution instead of the host's DNS servers. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that changes will only take effect on Pods created after the update. Draining the node is recommended before changing this field. Default: nil", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "streamingConnectionIdleTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "streamingConnectionIdleTimeout is the maximum time a streaming connection can be idle before the connection is automatically closed. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact components that rely on infrequent updates over streaming connections to the Kubelet server. Default: \"4h\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "nodeStatusUpdateFrequency": { + SchemaProps: spec.SchemaProps{ + Description: "nodeStatusUpdateFrequency is the frequency that kubelet computes node status. If node lease feature is not enabled, it is also the frequency that kubelet posts node status to master. Note: When node lease feature is not enabled, be cautious when changing the constant, it must work with nodeMonitorGracePeriod in nodecontroller. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact node scalability, and also that the node controller's nodeMonitorGracePeriod must be set to N*NodeStatusUpdateFrequency, where N is the number of retries before the node controller marks the node unhealthy. Default: \"10s\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "nodeStatusReportFrequency": { + SchemaProps: spec.SchemaProps{ + Description: "nodeStatusReportFrequency is the frequency that kubelet posts node status to master if node status does not change. Kubelet will ignore this frequency and post node status immediately if any change is detected. It is only used when node lease feature is enabled. nodeStatusReportFrequency's default value is 1m. But if nodeStatusUpdateFrequency is set explicitly, nodeStatusReportFrequency's default value will be set to nodeStatusUpdateFrequency for backward compatibility. Default: \"1m\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "nodeLeaseDurationSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "nodeLeaseDurationSeconds is the duration the Kubelet will set on its corresponding Lease, when the NodeLease feature is enabled. This feature provides an indicator of node health by having the Kubelet create and periodically renew a lease, named after the node, in the kube-node-lease namespace. If the lease expires, the node can be considered unhealthy. The lease is currently renewed every 10s, per KEP-0009. In the future, the lease renewal interval may be set based on the lease duration. Requires the NodeLease feature gate to be enabled. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that decreasing the duration may reduce tolerance for issues that temporarily prevent the Kubelet from renewing the lease (e.g. a short-lived network issue). Default: 40", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "imageMinimumGCAge": { + SchemaProps: spec.SchemaProps{ + Description: "imageMinimumGCAge is the minimum age for an unused image before it is garbage collected. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may trigger or delay garbage collection, and may change the image overhead on the node. Default: \"2m\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "imageGCHighThresholdPercent": { + SchemaProps: spec.SchemaProps{ + Description: "imageGCHighThresholdPercent is the percent of disk usage after which image garbage collection is always run. The percent is calculated as this field value out of 100. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may trigger or delay garbage collection, and may change the image overhead on the node. Default: 85", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "imageGCLowThresholdPercent": { + SchemaProps: spec.SchemaProps{ + Description: "imageGCLowThresholdPercent is the percent of disk usage before which image garbage collection is never run. Lowest disk usage to garbage collect to. The percent is calculated as this field value out of 100. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may trigger or delay garbage collection, and may change the image overhead on the node. Default: 80", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "volumeStatsAggPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "How frequently to calculate and cache volume disk usage for all pods Dynamic Kubelet Config (beta): If dynamically updating this field, consider that shortening the period may carry a performance impact. Default: \"1m\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "kubeletCgroups": { + SchemaProps: spec.SchemaProps{ + Description: "kubeletCgroups is the absolute name of cgroups to isolate the kubelet in Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "systemCgroups": { + SchemaProps: spec.SchemaProps{ + Description: "systemCgroups is absolute name of cgroups in which to place all non-kernel processes that are not already in a container. Empty for no container. Rolling back the flag requires a reboot. Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "cgroupRoot": { + SchemaProps: spec.SchemaProps{ + Description: "cgroupRoot is the root cgroup to use for pods. This is handled by the container runtime on a best effort basis. Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "cgroupsPerQOS": { + SchemaProps: spec.SchemaProps{ + Description: "Enable QoS based Cgroup hierarchy: top level cgroups for QoS Classes And all Burstable and BestEffort pods are brought up under their specific top level QoS cgroup. Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "cgroupDriver": { + SchemaProps: spec.SchemaProps{ + Description: "driver that the kubelet uses to manipulate cgroups on the host (cgroupfs or systemd) Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: \"cgroupfs\"", + Type: []string{"string"}, + Format: "", + }, + }, + "cpuManagerPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "CPUManagerPolicy is the name of the policy to use. Requires the CPUManager feature gate to be enabled. Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: \"none\"", + Type: []string{"string"}, + Format: "", + }, + }, + "cpuManagerReconcilePeriod": { + SchemaProps: spec.SchemaProps{ + Description: "CPU Manager reconciliation period. Requires the CPUManager feature gate to be enabled. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that shortening the period may carry a performance impact. Default: \"10s\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "topologyManagerPolicy": { + SchemaProps: spec.SchemaProps{ + Description: "TopologyManagerPolicy is the name of the policy to use. Policies other than \"none\" require the TopologyManager feature gate to be enabled. Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: \"none\"", + Type: []string{"string"}, + Format: "", + }, + }, + "topologyManagerScope": { + SchemaProps: spec.SchemaProps{ + Description: "TopologyManagerScope represents the scope of topology hint generation that topology manager requests and hint providers generate. \"pod\" scope requires the TopologyManager feature gate to be enabled. Default: \"container\"", + Type: []string{"string"}, + Format: "", + }, + }, + "qosReserved": { + SchemaProps: spec.SchemaProps{ + Description: "qosReserved is a set of resource name to percentage pairs that specify the minimum percentage of a resource reserved for exclusive use by the guaranteed QoS tier. Currently supported resources: \"memory\" Requires the QOSReserved feature gate to be enabled. Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: nil", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "runtimeRequestTimeout": { + SchemaProps: spec.SchemaProps{ + Description: "runtimeRequestTimeout is the timeout for all runtime requests except long running requests - pull, logs, exec and attach. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may disrupt components that interact with the Kubelet server. Default: \"2m\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "hairpinMode": { + SchemaProps: spec.SchemaProps{ + Description: "hairpinMode specifies how the Kubelet should configure the container bridge for hairpin packets. Setting this flag allows endpoints in a Service to loadbalance back to themselves if they should try to access their own Service. Values:\n \"promiscuous-bridge\": make the container bridge promiscuous.\n \"hairpin-veth\": set the hairpin flag on container veth interfaces.\n \"none\": do nothing.\nGenerally, one must set --hairpin-mode=hairpin-veth to achieve hairpin NAT, because promiscuous-bridge assumes the existence of a container bridge named cbr0. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may require a node reboot, depending on the network plugin. Default: \"promiscuous-bridge\"", + Type: []string{"string"}, + Format: "", + }, + }, + "maxPods": { + SchemaProps: spec.SchemaProps{ + Description: "maxPods is the number of pods that can run on this Kubelet. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that changes may cause Pods to fail admission on Kubelet restart, and may change the value reported in Node.Status.Capacity[v1.ResourcePods], thus affecting future scheduling decisions. Increasing this value may also decrease performance, as more Pods can be packed into a single node. Default: 110", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "podCIDR": { + SchemaProps: spec.SchemaProps{ + Description: "The CIDR to use for pod IP addresses, only used in standalone mode. In cluster mode, this is obtained from the master. Dynamic Kubelet Config (beta): This field should always be set to the empty default. It should only set for standalone Kubelets, which cannot use Dynamic Kubelet Config. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "podPidsLimit": { + SchemaProps: spec.SchemaProps{ + Description: "PodPidsLimit is the maximum number of pids in any pod. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that lowering it may prevent container processes from forking after the change. Default: -1", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "resolvConf": { + SchemaProps: spec.SchemaProps{ + Description: "ResolverConfig is the resolver configuration file used as the basis for the container DNS resolution configuration. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that changes will only take effect on Pods created after the update. Draining the node is recommended before changing this field. Default: \"/etc/resolv.conf\"", + Type: []string{"string"}, + Format: "", + }, + }, + "runOnce": { + SchemaProps: spec.SchemaProps{ + Description: "RunOnce causes the Kubelet to check the API server once for pods, run those in addition to the pods specified by static pod files, and exit. Default: false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "cpuCFSQuota": { + SchemaProps: spec.SchemaProps{ + Description: "cpuCFSQuota enables CPU CFS quota enforcement for containers that specify CPU limits. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that disabling it may reduce node stability. Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "cpuCFSQuotaPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "CPUCFSQuotaPeriod is the CPU CFS quota period value, cpu.cfs_period_us. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that limits set for containers will result in different cpu.cfs_quota settings. This will trigger container restarts on the node being reconfigured. Default: \"100ms\"", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "nodeStatusMaxImages": { + SchemaProps: spec.SchemaProps{ + Description: "nodeStatusMaxImages caps the number of images reported in Node.Status.Images. Note: If -1 is specified, no cap will be applied. If 0 is specified, no image is returned. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that different values can be reported on node status. Default: 50", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "maxOpenFiles": { + SchemaProps: spec.SchemaProps{ + Description: "maxOpenFiles is Number of files that can be opened by Kubelet process. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact the ability of the Kubelet to interact with the node's filesystem. Default: 1000000", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "contentType": { + SchemaProps: spec.SchemaProps{ + Description: "contentType is contentType of requests sent to apiserver. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact the ability for the Kubelet to communicate with the API server. If the Kubelet loses contact with the API server due to a change to this field, the change cannot be reverted via dynamic Kubelet config. Default: \"application/vnd.kubernetes.protobuf\"", + Type: []string{"string"}, + Format: "", + }, + }, + "kubeAPIQPS": { + SchemaProps: spec.SchemaProps{ + Description: "kubeAPIQPS is the QPS to use while talking with kubernetes apiserver Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact scalability by changing the amount of traffic the Kubelet sends to the API server. Default: 5", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "kubeAPIBurst": { + SchemaProps: spec.SchemaProps{ + Description: "kubeAPIBurst is the burst to allow while talking with kubernetes apiserver Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact scalability by changing the amount of traffic the Kubelet sends to the API server. Default: 10", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "serializeImagePulls": { + SchemaProps: spec.SchemaProps{ + Description: "serializeImagePulls when enabled, tells the Kubelet to pull images one at a time. We recommend *not* changing the default value on nodes that run docker daemon with version < 1.9 or an Aufs storage backend. Issue #10959 has more details. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact the performance of image pulls. Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "evictionHard": { + SchemaProps: spec.SchemaProps{ + Description: "Map of signal names to quantities that defines hard eviction thresholds. For example: {\"memory.available\": \"300Mi\"}. To explicitly disable, pass a 0% or 100% threshold on an arbitrary resource. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may trigger or delay Pod evictions. Default:\n memory.available: \"100Mi\"\n nodefs.available: \"10%\"\n nodefs.inodesFree: \"5%\"\n imagefs.available: \"15%\"", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "evictionSoft": { + SchemaProps: spec.SchemaProps{ + Description: "Map of signal names to quantities that defines soft eviction thresholds. For example: {\"memory.available\": \"300Mi\"}. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may trigger or delay Pod evictions, and may change the allocatable reported by the node. Default: nil", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "evictionSoftGracePeriod": { + SchemaProps: spec.SchemaProps{ + Description: "Map of signal names to quantities that defines grace periods for each soft eviction signal. For example: {\"memory.available\": \"30s\"}. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may trigger or delay Pod evictions. Default: nil", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "evictionPressureTransitionPeriod": { + SchemaProps: spec.SchemaProps{ + Description: "Duration for which the kubelet has to wait before transitioning out of an eviction pressure condition. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that lowering it may decrease the stability of the node when the node is overcommitted. Default: \"5m\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "evictionMaxPodGracePeriod": { + SchemaProps: spec.SchemaProps{ + Description: "Maximum allowed grace period (in seconds) to use when terminating pods in response to a soft eviction threshold being met. This value effectively caps the Pod's TerminationGracePeriodSeconds value during soft evictions. Note: Due to issue #64530, the behavior has a bug where this value currently just overrides the grace period during soft eviction, which can increase the grace period from what is set on the Pod. This bug will be fixed in a future release. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that lowering it decreases the amount of time Pods will have to gracefully clean up before being killed during a soft eviction. Default: 0", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "evictionMinimumReclaim": { + SchemaProps: spec.SchemaProps{ + Description: "Map of signal names to quantities that defines minimum reclaims, which describe the minimum amount of a given resource the kubelet will reclaim when performing a pod eviction while that resource is under pressure. For example: {\"imagefs.available\": \"2Gi\"} Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may change how well eviction can manage resource pressure. Default: nil", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "podsPerCore": { + SchemaProps: spec.SchemaProps{ + Description: "podsPerCore is the maximum number of pods per core. Cannot exceed MaxPods. If 0, this field is ignored. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that changes may cause Pods to fail admission on Kubelet restart, and may change the value reported in Node.Status.Capacity[v1.ResourcePods], thus affecting future scheduling decisions. Increasing this value may also decrease performance, as more Pods can be packed into a single node. Default: 0", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "enableControllerAttachDetach": { + SchemaProps: spec.SchemaProps{ + Description: "enableControllerAttachDetach enables the Attach/Detach controller to manage attachment/detachment of volumes scheduled to this node, and disables kubelet from executing any attach/detach operations Dynamic Kubelet Config (beta): If dynamically updating this field, consider that changing which component is responsible for volume management on a live node may result in volumes refusing to detach if the node is not drained prior to the update, and if Pods are scheduled to the node before the volumes.kubernetes.io/controller-managed-attach-detach annotation is updated by the Kubelet. In general, it is safest to leave this value set the same as local config. Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "protectKernelDefaults": { + SchemaProps: spec.SchemaProps{ + Description: "protectKernelDefaults, if true, causes the Kubelet to error if kernel flags are not as it expects. Otherwise the Kubelet will attempt to modify kernel flags to match its expectation. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that enabling it may cause the Kubelet to crash-loop if the Kernel is not configured as Kubelet expects. Default: false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "makeIPTablesUtilChains": { + SchemaProps: spec.SchemaProps{ + Description: "If true, Kubelet ensures a set of iptables rules are present on host. These rules will serve as utility rules for various components, e.g. KubeProxy. The rules will be created based on IPTablesMasqueradeBit and IPTablesDropBit. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that disabling it will prevent the Kubelet from healing locally misconfigured iptables rules. Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "iptablesMasqueradeBit": { + SchemaProps: spec.SchemaProps{ + Description: "iptablesMasqueradeBit is the bit of the iptables fwmark space to mark for SNAT Values must be within the range [0, 31]. Must be different from other mark bits. Warning: Please match the value of the corresponding parameter in kube-proxy. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it needs to be coordinated with other components, like kube-proxy, and the update will only be effective if MakeIPTablesUtilChains is enabled. Default: 14", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "iptablesDropBit": { + SchemaProps: spec.SchemaProps{ + Description: "iptablesDropBit is the bit of the iptables fwmark space to mark for dropping packets. Values must be within the range [0, 31]. Must be different from other mark bits. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it needs to be coordinated with other components, like kube-proxy, and the update will only be effective if MakeIPTablesUtilChains is enabled. Default: 15", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "featureGates": { + SchemaProps: spec.SchemaProps{ + Description: "featureGates is a map of feature names to bools that enable or disable alpha/experimental features. This field modifies piecemeal the built-in default values from \"k8s.io/kubernetes/pkg/features/kube_features.go\". Dynamic Kubelet Config (beta): If dynamically updating this field, consider the documentation for the features you are enabling or disabling. While we encourage feature developers to make it possible to dynamically enable and disable features, some changes may require node reboots, and some features may require careful coordination to retroactively disable. Default: nil", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: false, + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, + "failSwapOn": { + SchemaProps: spec.SchemaProps{ + Description: "failSwapOn tells the Kubelet to fail to start if swap is enabled on the node. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that setting it to true will cause the Kubelet to crash-loop if swap is enabled. Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "containerLogMaxSize": { + SchemaProps: spec.SchemaProps{ + Description: "A quantity defines the maximum size of the container log file before it is rotated. For example: \"5Mi\" or \"256Ki\". Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may trigger log rotation. Default: \"10Mi\"", + Type: []string{"string"}, + Format: "", + }, + }, + "containerLogMaxFiles": { + SchemaProps: spec.SchemaProps{ + Description: "Maximum number of container log files that can be present for a container. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that lowering it may cause log files to be deleted. Default: 5", + Type: []string{"integer"}, + Format: "int32", + }, + }, + "configMapAndSecretChangeDetectionStrategy": { + SchemaProps: spec.SchemaProps{ + Description: "ConfigMapAndSecretChangeDetectionStrategy is a mode in which config map and secret managers are running. Default: \"Watch\"", + Type: []string{"string"}, + Format: "", + }, + }, + "systemReserved": { + SchemaProps: spec.SchemaProps{ + Description: "systemReserved is a set of ResourceName=ResourceQuantity (e.g. cpu=200m,memory=150G) pairs that describe resources reserved for non-kubernetes components. Currently only cpu and memory are supported. See http://kubernetes.io/docs/user-guide/compute-resources for more detail. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may not be possible to increase the reserved resources, because this requires resizing cgroups. Always look for a NodeAllocatableEnforced event after updating this field to ensure that the update was successful. Default: nil", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "kubeReserved": { + SchemaProps: spec.SchemaProps{ + Description: "A set of ResourceName=ResourceQuantity (e.g. cpu=200m,memory=150G) pairs that describe resources reserved for kubernetes system components. Currently cpu, memory and local storage for root file system are supported. See http://kubernetes.io/docs/user-guide/compute-resources for more detail. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may not be possible to increase the reserved resources, because this requires resizing cgroups. Always look for a NodeAllocatableEnforced event after updating this field to ensure that the update was successful. Default: nil", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "reservedSystemCPUs": { + SchemaProps: spec.SchemaProps{ + Description: "This ReservedSystemCPUs option specifies the cpu list reserved for the host level system threads and kubernetes related threads. This provide a \"static\" CPU list rather than the \"dynamic\" list by system-reserved and kube-reserved. This option overwrites CPUs provided by system-reserved and kube-reserved.", + Type: []string{"string"}, + Format: "", + }, + }, + "showHiddenMetricsForVersion": { + SchemaProps: spec.SchemaProps{ + Description: "The previous version for which you want to show hidden metrics. Only the previous minor version is meaningful, other values will not be allowed. The format is ., e.g.: '1.16'. The purpose of this format is make sure you have the opportunity to notice if the next release hides additional metrics, rather than being surprised when they are permanently removed in the release after that. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "systemReservedCgroup": { + SchemaProps: spec.SchemaProps{ + Description: "This flag helps kubelet identify absolute name of top level cgroup used to enforce `SystemReserved` compute resource reservation for OS system daemons. Refer to [Node Allocatable](https://git.k8s.io/community/contributors/design-proposals/node/node-allocatable.md) doc for more information. Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "kubeReservedCgroup": { + SchemaProps: spec.SchemaProps{ + Description: "This flag helps kubelet identify absolute name of top level cgroup used to enforce `KubeReserved` compute resource reservation for Kubernetes node system daemons. Refer to [Node Allocatable](https://git.k8s.io/community/contributors/design-proposals/node/node-allocatable.md) doc for more information. Dynamic Kubelet Config (beta): This field should not be updated without a full node reboot. It is safest to keep this value the same as the local config. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "enforceNodeAllocatable": { + SchemaProps: spec.SchemaProps{ + Description: "This flag specifies the various Node Allocatable enforcements that Kubelet needs to perform. This flag accepts a list of options. Acceptable options are `none`, `pods`, `system-reserved` & `kube-reserved`. If `none` is specified, no other options may be specified. Refer to [Node Allocatable](https://git.k8s.io/community/contributors/design-proposals/node/node-allocatable.md) doc for more information. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that removing enforcements may reduce the stability of the node. Alternatively, adding enforcements may reduce the stability of components which were using more than the reserved amount of resources; for example, enforcing kube-reserved may cause Kubelets to OOM if it uses more than the reserved resources, and enforcing system-reserved may cause system daemons to OOM if they use more than the reserved resources. Default: [\"pods\"]", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "allowedUnsafeSysctls": { + SchemaProps: spec.SchemaProps{ + Description: "A comma separated whitelist of unsafe sysctls or sysctl patterns (ending in *). Unsafe sysctl groups are kernel.shm*, kernel.msg*, kernel.sem, fs.mqueue.*, and net.*. These sysctls are namespaced but not allowed by default. For example: \"kernel.msg*,net.ipv4.route.min_pmtu\" Default: []", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "volumePluginDir": { + SchemaProps: spec.SchemaProps{ + Description: "volumePluginDir is the full path of the directory in which to search for additional third party volume plugins. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that changing the volumePluginDir may disrupt workloads relying on third party volume plugins. Default: \"/usr/libexec/kubernetes/kubelet-plugins/volume/exec/\"", + Type: []string{"string"}, + Format: "", + }, + }, + "providerID": { + SchemaProps: spec.SchemaProps{ + Description: "providerID, if set, sets the unique id of the instance that an external provider (i.e. cloudprovider) can use to identify a specific node. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact the ability of the Kubelet to interact with cloud providers. Default: \"\"", + Type: []string{"string"}, + Format: "", + }, + }, + "kernelMemcgNotification": { + SchemaProps: spec.SchemaProps{ + Description: "kernelMemcgNotification, if set, the kubelet will integrate with the kernel memcg notification to determine if memory eviction thresholds are crossed rather than polling. Dynamic Kubelet Config (beta): If dynamically updating this field, consider that it may impact the way Kubelet interacts with the kernel. Default: false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "logging": { + SchemaProps: spec.SchemaProps{ + Description: "Logging specifies the options of logging. Refer [Logs Options](https://github.com/kubernetes/component-base/blob/master/logs/options.go) for more information. Defaults:\n Format: text", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/component-base/config/v1alpha1.LoggingConfiguration"), + }, + }, + "enableSystemLogHandler": { + SchemaProps: spec.SchemaProps{ + Description: "enableSystemLogHandler enables system logs via web interface host:port/logs/ Default: true", + Type: []string{"boolean"}, + Format: "", + }, + }, + "shutdownGracePeriod": { + SchemaProps: spec.SchemaProps{ + Description: "ShutdownGracePeriod specifies the total duration that the node should delay the shutdown and total grace period for pod termination during a node shutdown. Default: \"30s\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "shutdownGracePeriodCriticalPods": { + SchemaProps: spec.SchemaProps{ + Description: "ShutdownGracePeriodCriticalPods specifies the duration used to terminate critical pods during a node shutdown. This should be less than ShutdownGracePeriod. For example, if ShutdownGracePeriod=30s, and ShutdownGracePeriodCriticalPods=10s, during a node shutdown the first 20 seconds would be reserved for gracefully terminating normal pods, and the last 10 seconds would be reserved for terminating critical pods. Default: \"10s\"", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/component-base/config/v1alpha1.LoggingConfiguration", "k8s.io/kubelet/config/v1beta1.KubeletAuthentication", "k8s.io/kubelet/config/v1beta1.KubeletAuthorization"}, + } +} + +func schema_k8sio_kubelet_config_v1beta1_KubeletWebhookAuthentication(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "enabled": { + SchemaProps: spec.SchemaProps{ + Description: "enabled allows bearer token authentication backed by the tokenreviews.authentication.k8s.io API", + Type: []string{"boolean"}, + Format: "", + }, + }, + "cacheTTL": { + SchemaProps: spec.SchemaProps{ + Description: "cacheTTL enables caching of authentication results", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kubelet_config_v1beta1_KubeletWebhookAuthorization(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "cacheAuthorizedTTL": { + SchemaProps: spec.SchemaProps{ + Description: "cacheAuthorizedTTL is the duration to cache 'authorized' responses from the webhook authorizer.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "cacheUnauthorizedTTL": { + SchemaProps: spec.SchemaProps{ + Description: "cacheUnauthorizedTTL is the duration to cache 'unauthorized' responses from the webhook authorizer.", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration"}, + } +} + +func schema_k8sio_kubelet_config_v1beta1_KubeletX509Authentication(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "clientCAFile": { + SchemaProps: spec.SchemaProps{ + Description: "clientCAFile is the path to a PEM-encoded certificate bundle. If set, any request presenting a client certificate signed by one of the authorities in the bundle is authenticated with a username corresponding to the CommonName, and groups corresponding to the Organization in the client certificate.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_k8sio_kubelet_config_v1beta1_SerializedNodeConfigSource(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "SerializedNodeConfigSource allows us to serialize v1.NodeConfigSource. This type is used internally by the Kubelet for tracking checkpointed dynamic configs. It exists in the kubeletconfig API group because it is classified as a versioned input to the Kubelet.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "source": { + SchemaProps: spec.SchemaProps{ + Description: "Source is the source that we are serializing", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeConfigSource"), + }, + }, + }, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.NodeConfigSource"}, + } +} + +func schema_pkg_apis_abac_v1beta1_Policy(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "Policy contains a single ABAC policy rule", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "spec": { + SchemaProps: spec.SchemaProps{ + Description: "Spec describes the policy rule", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/kubernetes/pkg/apis/abac/v1beta1.PolicySpec"), + }, + }, + }, + Required: []string{"spec"}, + }, + }, + Dependencies: []string{ + "k8s.io/kubernetes/pkg/apis/abac/v1beta1.PolicySpec"}, + } +} + +func schema_pkg_apis_abac_v1beta1_PolicySpec(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PolicySpec contains the attributes for a policy rule", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "user": { + SchemaProps: spec.SchemaProps{ + Description: "User is the username this rule applies to. Either user or group is required to match the request. \"*\" matches all users.", + Type: []string{"string"}, + Format: "", + }, + }, + "group": { + SchemaProps: spec.SchemaProps{ + Description: "Group is the group this rule applies to. Either user or group is required to match the request. \"*\" matches all groups.", + Type: []string{"string"}, + Format: "", + }, + }, + "readonly": { + SchemaProps: spec.SchemaProps{ + Description: "Readonly matches readonly requests when true, and all requests when false", + Type: []string{"boolean"}, + Format: "", + }, + }, + "apiGroup": { + SchemaProps: spec.SchemaProps{ + Description: "APIGroup is the name of an API group. APIGroup, Resource, and Namespace are required to match resource requests. \"*\" matches all API groups", + Type: []string{"string"}, + Format: "", + }, + }, + "resource": { + SchemaProps: spec.SchemaProps{ + Description: "Resource is the name of a resource. APIGroup, Resource, and Namespace are required to match resource requests. \"*\" matches all resources", + Type: []string{"string"}, + Format: "", + }, + }, + "namespace": { + SchemaProps: spec.SchemaProps{ + Description: "Namespace is the name of a namespace. APIGroup, Resource, and Namespace are required to match resource requests. \"*\" matches all namespaces (including unnamespaced requests)", + Type: []string{"string"}, + Format: "", + }, + }, + "nonResourcePath": { + SchemaProps: spec.SchemaProps{ + Description: "NonResourcePath matches non-resource request paths. \"*\" matches all paths \"/foo/*\" matches all subpaths of foo", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_custom_metrics_v1beta1_MetricListOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricListOptions is used to select metrics by their label selectors", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "labelSelector": { + SchemaProps: spec.SchemaProps{ + Description: "A selector to restrict the list of returned objects by their labels. Defaults to everything.", + Type: []string{"string"}, + Format: "", + }, + }, + "metricLabelSelector": { + SchemaProps: spec.SchemaProps{ + Description: "A selector to restrict the list of returned metrics by their labels", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_custom_metrics_v1beta1_MetricValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricValue is a metric value for some object", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "describedObject": { + SchemaProps: spec.SchemaProps{ + Description: "a reference to the described object", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "the name of the metric", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "indicates the time at which the metrics were produced", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "window": { + SchemaProps: spec.SchemaProps{ + Description: "indicates the window ([Timestamp-Window, Timestamp]) from which these metrics were calculated, when returning rate metrics calculated from cumulative metrics (or zero for non-calculated instantaneous metrics).", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "the value of the metric for this", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector represents the label selector that could be used to select this metric, and will generally just be the selector passed in to the query used to fetch this metric. When left blank, only the metric's Name will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + Required: []string{"describedObject", "metricName", "timestamp", "value"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference", "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_custom_metrics_v1beta1_MetricValueList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricValueList is a list of values for a given metric for some set of objects", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "the value of the metric across the described objects", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/custom_metrics/v1beta1.MetricValue"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/metrics/pkg/apis/custom_metrics/v1beta1.MetricValue"}, + } +} + +func schema_pkg_apis_custom_metrics_v1beta2_MetricIdentifier(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricIdentifier identifies a metric by name and, optionally, selector", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "name is the name of the given metric", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "selector": { + SchemaProps: spec.SchemaProps{ + Description: "selector represents the label selector that could be used to select this metric, and will generally just be the selector passed in to the query used to fetch this metric. When left blank, only the metric's Name will be used to gather metrics.", + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"), + }, + }, + }, + Required: []string{"name"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.LabelSelector"}, + } +} + +func schema_pkg_apis_custom_metrics_v1beta2_MetricListOptions(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricListOptions is used to select metrics by their label selectors", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "labelSelector": { + SchemaProps: spec.SchemaProps{ + Description: "A selector to restrict the list of returned objects by their labels. Defaults to everything.", + Type: []string{"string"}, + Format: "", + }, + }, + "metricLabelSelector": { + SchemaProps: spec.SchemaProps{ + Description: "A selector to restrict the list of returned metrics by their labels", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + } +} + +func schema_pkg_apis_custom_metrics_v1beta2_MetricValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricValue is the metric value for some object", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "describedObject": { + SchemaProps: spec.SchemaProps{ + Description: "a reference to the described object", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.ObjectReference"), + }, + }, + "metric": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/custom_metrics/v1beta2.MetricIdentifier"), + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "indicates the time at which the metrics were produced", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "windowSeconds": { + SchemaProps: spec.SchemaProps{ + Description: "indicates the window ([Timestamp-Window, Timestamp]) from which these metrics were calculated, when returning rate metrics calculated from cumulative metrics (or zero for non-calculated instantaneous metrics).", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "the value of the metric for this", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"describedObject", "metric", "timestamp", "value"}, + }, + }, + Dependencies: []string{ + "k8s.io/api/core/v1.ObjectReference", "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.Time", "k8s.io/metrics/pkg/apis/custom_metrics/v1beta2.MetricIdentifier"}, + } +} + +func schema_pkg_apis_custom_metrics_v1beta2_MetricValueList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "MetricValueList is a list of values for a given metric for some set of objects", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "the value of the metric across the described objects", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/custom_metrics/v1beta2.MetricValue"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/metrics/pkg/apis/custom_metrics/v1beta2.MetricValue"}, + } +} + +func schema_pkg_apis_external_metrics_v1beta1_ExternalMetricValue(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalMetricValue is a metric value for external metric A single metric value is identified by metric name and a set of string labels. For one metric there can be multiple values with different sets of labels.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metricName": { + SchemaProps: spec.SchemaProps{ + Description: "the name of the metric", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "metricLabels": { + SchemaProps: spec.SchemaProps{ + Description: "a set of labels that identify a single time series for the metric", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + }, + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "indicates the time at which the metrics were produced", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "window": { + SchemaProps: spec.SchemaProps{ + Description: "indicates the window ([Timestamp-Window, Timestamp]) from which these metrics were calculated, when returning rate metrics calculated from cumulative metrics (or zero for non-calculated instantaneous metrics).", + Type: []string{"integer"}, + Format: "int64", + }, + }, + "value": { + SchemaProps: spec.SchemaProps{ + Description: "the value of the metric", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + Required: []string{"metricName", "metricLabels", "timestamp", "value"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_external_metrics_v1beta1_ExternalMetricValueList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ExternalMetricValueList is a list of values for a given metric for some set labels", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "value of the metric matching a given set of labels", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/external_metrics/v1beta1.ExternalMetricValue"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/metrics/pkg/apis/external_metrics/v1beta1.ExternalMetricValue"}, + } +} + +func schema_pkg_apis_metrics_v1alpha1_ContainerMetrics(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerMetrics sets resource usage metrics of a container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Container name corresponding to the one from pod.spec.containers.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "usage": { + SchemaProps: spec.SchemaProps{ + Description: "The memory usage is the memory working set.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + Required: []string{"name", "usage"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_pkg_apis_metrics_v1alpha1_NodeMetrics(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeMetrics sets resource usage metrics of a node.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "The following fields define time interval from which metrics were collected from the interval [Timestamp-Window, Timestamp].", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "window": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "usage": { + SchemaProps: spec.SchemaProps{ + Description: "The memory usage is the memory working set.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + Required: []string{"timestamp", "window", "usage"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_metrics_v1alpha1_NodeMetricsList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeMetricsList is a list of NodeMetrics.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of node metrics.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/metrics/v1alpha1.NodeMetrics"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/metrics/pkg/apis/metrics/v1alpha1.NodeMetrics"}, + } +} + +func schema_pkg_apis_metrics_v1alpha1_PodMetrics(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodMetrics sets resource usage metrics of a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "The following fields define time interval from which metrics were collected from the interval [Timestamp-Window, Timestamp].", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "window": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "containers": { + SchemaProps: spec.SchemaProps{ + Description: "Metrics for all containers are collected within the same time window.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/metrics/v1alpha1.ContainerMetrics"), + }, + }, + }, + }, + }, + }, + Required: []string{"timestamp", "window", "containers"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Time", "k8s.io/metrics/pkg/apis/metrics/v1alpha1.ContainerMetrics"}, + } +} + +func schema_pkg_apis_metrics_v1alpha1_PodMetricsList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodMetricsList is a list of PodMetrics.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of pod metrics.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/metrics/v1alpha1.PodMetrics"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/metrics/pkg/apis/metrics/v1alpha1.PodMetrics"}, + } +} + +func schema_pkg_apis_metrics_v1beta1_ContainerMetrics(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "ContainerMetrics sets resource usage metrics of a container.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Container name corresponding to the one from pod.spec.containers.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "usage": { + SchemaProps: spec.SchemaProps{ + Description: "The memory usage is the memory working set.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + Required: []string{"name", "usage"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + } +} + +func schema_pkg_apis_metrics_v1beta1_NodeMetrics(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeMetrics sets resource usage metrics of a node.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "The following fields define time interval from which metrics were collected from the interval [Timestamp-Window, Timestamp].", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "window": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "usage": { + SchemaProps: spec.SchemaProps{ + Description: "The memory usage is the memory working set.", + Type: []string{"object"}, + AdditionalProperties: &spec.SchemaOrBool{ + Allows: true, + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), + }, + }, + }, + }, + }, + }, + Required: []string{"timestamp", "window", "usage"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/api/resource.Quantity", "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Time"}, + } +} + +func schema_pkg_apis_metrics_v1beta1_NodeMetricsList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeMetricsList is a list of NodeMetrics.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of node metrics.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/metrics/v1beta1.NodeMetrics"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/metrics/pkg/apis/metrics/v1beta1.NodeMetrics"}, + } +} + +func schema_pkg_apis_metrics_v1beta1_PodMetrics(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodMetrics sets resource usage metrics of a pod.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"), + }, + }, + "timestamp": { + SchemaProps: spec.SchemaProps{ + Description: "The following fields define time interval from which metrics were collected from the interval [Timestamp-Window, Timestamp].", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Time"), + }, + }, + "window": { + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"), + }, + }, + "containers": { + SchemaProps: spec.SchemaProps{ + Description: "Metrics for all containers are collected within the same time window.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/metrics/v1beta1.ContainerMetrics"), + }, + }, + }, + }, + }, + }, + Required: []string{"timestamp", "window", "containers"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.Duration", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta", "k8s.io/apimachinery/pkg/apis/meta/v1.Time", "k8s.io/metrics/pkg/apis/metrics/v1beta1.ContainerMetrics"}, + } +} + +func schema_pkg_apis_metrics_v1beta1_PodMetricsList(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "PodMetricsList is a list of PodMetrics.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "kind": { + SchemaProps: spec.SchemaProps{ + Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Type: []string{"string"}, + Format: "", + }, + }, + "apiVersion": { + SchemaProps: spec.SchemaProps{ + Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources", + Type: []string{"string"}, + Format: "", + }, + }, + "metadata": { + SchemaProps: spec.SchemaProps{ + Description: "Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds", + Default: map[string]interface{}{}, + Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"), + }, + }, + "items": { + SchemaProps: spec.SchemaProps{ + Description: "List of pod metrics.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/metrics/pkg/apis/metrics/v1beta1.PodMetrics"), + }, + }, + }, + }, + }, + }, + Required: []string{"items"}, + }, + }, + Dependencies: []string{ + "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta", "k8s.io/metrics/pkg/apis/metrics/v1beta1.PodMetrics"}, + } +} diff --git a/test/e2e/generated/bindata.go b/test/e2e/generated/bindata.go new file mode 100644 index 0000000000000..a7df569b68d3d --- /dev/null +++ b/test/e2e/generated/bindata.go @@ -0,0 +1,9354 @@ +// Package generated Code generated by go-bindata. (@generated) DO NOT EDIT. +// sources: +// test/conformance/testdata/OWNERS +// test/conformance/testdata/conformance.yaml +// test/e2e/testing-manifests/flexvolume/attachable-with-long-mount +// test/e2e/testing-manifests/flexvolume/dummy +// test/e2e/testing-manifests/flexvolume/dummy-attachable +// test/e2e/testing-manifests/guestbook/agnhost-primary-deployment.yaml.in +// test/e2e/testing-manifests/guestbook/agnhost-primary-service.yaml +// test/e2e/testing-manifests/guestbook/agnhost-replica-deployment.yaml.in +// test/e2e/testing-manifests/guestbook/agnhost-replica-service.yaml +// test/e2e/testing-manifests/guestbook/frontend-deployment.yaml.in +// test/e2e/testing-manifests/guestbook/frontend-service.yaml +// test/e2e/testing-manifests/guestbook/legacy/frontend-controller.yaml +// test/e2e/testing-manifests/guestbook/legacy/redis-master-controller.yaml +// test/e2e/testing-manifests/guestbook/legacy/redis-slave-controller.yaml +// test/e2e/testing-manifests/guestbook/redis-master-deployment.yaml.in +// test/e2e/testing-manifests/guestbook/redis-master-service.yaml +// test/e2e/testing-manifests/guestbook/redis-slave-deployment.yaml.in +// test/e2e/testing-manifests/guestbook/redis-slave-service.yaml +// test/e2e/testing-manifests/ingress/gce/static-ip-2/ing.yaml +// test/e2e/testing-manifests/ingress/gce/static-ip-2/rc.yaml +// test/e2e/testing-manifests/ingress/gce/static-ip-2/svc.yaml +// test/e2e/testing-manifests/ingress/http/ing.yaml +// test/e2e/testing-manifests/ingress/http/rc.yaml +// test/e2e/testing-manifests/ingress/http/svc.yaml +// test/e2e/testing-manifests/ingress/http2/ing.yaml +// test/e2e/testing-manifests/ingress/http2/rc.yaml +// test/e2e/testing-manifests/ingress/http2/svc.yaml +// test/e2e/testing-manifests/ingress/multiple-certs/ing.yaml +// test/e2e/testing-manifests/ingress/multiple-certs/rc.yaml +// test/e2e/testing-manifests/ingress/multiple-certs/svc.yaml +// test/e2e/testing-manifests/ingress/neg/ing.yaml +// test/e2e/testing-manifests/ingress/neg/rc.yaml +// test/e2e/testing-manifests/ingress/neg/svc.yaml +// test/e2e/testing-manifests/ingress/neg-clusterip/ing.yaml +// test/e2e/testing-manifests/ingress/neg-clusterip/rc.yaml +// test/e2e/testing-manifests/ingress/neg-clusterip/svc.yaml +// test/e2e/testing-manifests/ingress/neg-exposed/ing.yaml +// test/e2e/testing-manifests/ingress/neg-exposed/rc.yaml +// test/e2e/testing-manifests/ingress/neg-exposed/svc.yaml +// test/e2e/testing-manifests/ingress/nginx/rc.yaml +// test/e2e/testing-manifests/ingress/pre-shared-cert/ing.yaml +// test/e2e/testing-manifests/ingress/pre-shared-cert/rc.yaml +// test/e2e/testing-manifests/ingress/pre-shared-cert/svc.yaml +// test/e2e/testing-manifests/ingress/static-ip/ing.yaml +// test/e2e/testing-manifests/ingress/static-ip/rc.yaml +// test/e2e/testing-manifests/ingress/static-ip/secret.yaml +// test/e2e/testing-manifests/ingress/static-ip/svc.yaml +// test/e2e/testing-manifests/kubectl/agnhost-primary-controller.json.in +// test/e2e/testing-manifests/kubectl/agnhost-primary-pod.yaml +// test/e2e/testing-manifests/kubectl/agnhost-primary-service.json +// test/e2e/testing-manifests/kubectl/busybox-cronjob.yaml.in +// test/e2e/testing-manifests/kubectl/busybox-pod.yaml.in +// test/e2e/testing-manifests/kubectl/httpd-deployment1.yaml.in +// test/e2e/testing-manifests/kubectl/httpd-deployment2.yaml.in +// test/e2e/testing-manifests/kubectl/httpd-deployment3.yaml.in +// test/e2e/testing-manifests/kubectl/httpd-rc.yaml.in +// test/e2e/testing-manifests/kubectl/pause-pod.yaml.in +// test/e2e/testing-manifests/kubectl/pod-with-readiness-probe.yaml.in +// test/e2e/testing-manifests/pod +// test/e2e/testing-manifests/rbd-storage-class.yaml +// test/e2e/testing-manifests/sample-device-plugin.yaml +// test/e2e/testing-manifests/scheduling/nvidia-driver-installer.yaml +// test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml +// test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml +// test/e2e/testing-manifests/serviceloadbalancer/netexecsvc.yaml +// test/e2e/testing-manifests/serviceloadbalancer/nginxrc.yaml +// test/e2e/testing-manifests/serviceloadbalancer/nginxsvc.yaml +// test/e2e/testing-manifests/statefulset/cassandra/controller.yaml +// test/e2e/testing-manifests/statefulset/cassandra/pdb.yaml +// test/e2e/testing-manifests/statefulset/cassandra/service.yaml +// test/e2e/testing-manifests/statefulset/cassandra/statefulset.yaml +// test/e2e/testing-manifests/statefulset/cassandra/tester.yaml +// test/e2e/testing-manifests/statefulset/cockroachdb/service.yaml +// test/e2e/testing-manifests/statefulset/cockroachdb/statefulset.yaml +// test/e2e/testing-manifests/statefulset/etcd/pdb.yaml +// test/e2e/testing-manifests/statefulset/etcd/service.yaml +// test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml +// test/e2e/testing-manifests/statefulset/etcd/tester.yaml +// test/e2e/testing-manifests/statefulset/mysql-galera/service.yaml +// test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml +// test/e2e/testing-manifests/statefulset/mysql-upgrade/configmap.yaml +// test/e2e/testing-manifests/statefulset/mysql-upgrade/service.yaml +// test/e2e/testing-manifests/statefulset/mysql-upgrade/statefulset.yaml +// test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml +// test/e2e/testing-manifests/statefulset/nginx/service.yaml +// test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml +// test/e2e/testing-manifests/statefulset/redis/service.yaml +// test/e2e/testing-manifests/statefulset/redis/statefulset.yaml +// test/e2e/testing-manifests/statefulset/zookeeper/service.yaml +// test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml +// test/e2e/testing-manifests/storage-csi/OWNERS +// test/e2e/testing-manifests/storage-csi/controller-role.yaml +// test/e2e/testing-manifests/storage-csi/external-attacher/rbac.yaml +// test/e2e/testing-manifests/storage-csi/external-provisioner/rbac.yaml +// test/e2e/testing-manifests/storage-csi/external-resizer/rbac.yaml +// test/e2e/testing-manifests/storage-csi/external-snapshotter/rbac.yaml +// test/e2e/testing-manifests/storage-csi/gce-pd/controller_ss.yaml +// test/e2e/testing-manifests/storage-csi/gce-pd/csi-controller-rbac.yaml +// test/e2e/testing-manifests/storage-csi/gce-pd/node_ds.yaml +// test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-attacher.yaml +// test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-driverinfo.yaml +// test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-plugin.yaml +// test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-provisioner.yaml +// test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-resizer.yaml +// test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-snapshotter.yaml +// test/e2e/testing-manifests/storage-csi/hostpath/hostpath/e2e-test-rbac.yaml +// test/e2e/testing-manifests/storage-csi/hostpath/usage/csi-storageclass.yaml +// test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-attacher.yaml +// test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-resizer.yaml +// test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-snapshotter.yaml +// test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver.yaml +// test/e2e/testing-manifests/storage-csi/mock/csi-mock-driverinfo.yaml +// test/e2e/testing-manifests/storage-csi/mock/csi-mock-rbac.yaml +// test/e2e/testing-manifests/storage-csi/mock/csi-storageclass.yaml +// test/e2e_node/testing-manifests/sriovdp-cm.yaml +// test/e2e_node/testing-manifests/sriovdp-ds.yaml +// test/e2e_node/testing-manifests/sriovdp-sa.yaml +// test/images/Makefile +// test/images/OWNERS +// test/images/agnhost/.gitignore +// test/images/agnhost/BASEIMAGE +// test/images/agnhost/Dockerfile +// test/images/agnhost/Dockerfile_windows +// test/images/agnhost/Makefile +// test/images/agnhost/OWNERS +// test/images/agnhost/VERSION +// test/images/agnhost/agnhost.go +// test/images/agnhost/audit-proxy/main.go +// test/images/agnhost/connect/connect.go +// test/images/agnhost/crd-conversion-webhook/config.go +// test/images/agnhost/crd-conversion-webhook/converter/converter_test.go +// test/images/agnhost/crd-conversion-webhook/converter/example_converter.go +// test/images/agnhost/crd-conversion-webhook/converter/framework.go +// test/images/agnhost/crd-conversion-webhook/main.go +// test/images/agnhost/dns/common.go +// test/images/agnhost/dns/dns.go +// test/images/agnhost/dns/dns_windows.go +// test/images/agnhost/entrypoint-tester/ep.go +// test/images/agnhost/fakegitserver/gitserver.go +// test/images/agnhost/guestbook/guestbook.go +// test/images/agnhost/inclusterclient/main.go +// test/images/agnhost/liveness/server.go +// test/images/agnhost/logs-generator/logs_generator.go +// test/images/agnhost/mounttest/filePermissions.ps1 +// test/images/agnhost/mounttest/mt.go +// test/images/agnhost/mounttest/mt_utils.go +// test/images/agnhost/mounttest/mt_utils_windows.go +// test/images/agnhost/net/common/common.go +// test/images/agnhost/net/main.go +// test/images/agnhost/net/nat/closewait.go +// test/images/agnhost/netexec/netexec.go +// test/images/agnhost/nettest/nettest.go +// test/images/agnhost/no-snat-test/main.go +// test/images/agnhost/no-snat-test-proxy/main.go +// test/images/agnhost/openidmetadata/openidmetadata.go +// test/images/agnhost/pause/pause.go +// test/images/agnhost/port-forward-tester/portforwardtester.go +// test/images/agnhost/porter/localhost.crt +// test/images/agnhost/porter/localhost.key +// test/images/agnhost/porter/porter.go +// test/images/agnhost/resource-consumer-controller/controller.go +// test/images/agnhost/serve-hostname/serve_hostname.go +// test/images/agnhost/test-webserver/test-webserver.go +// test/images/agnhost/webhook/addlabel.go +// test/images/agnhost/webhook/addlabel_test.go +// test/images/agnhost/webhook/alwaysallow.go +// test/images/agnhost/webhook/alwaysdeny.go +// test/images/agnhost/webhook/config.go +// test/images/agnhost/webhook/configmap.go +// test/images/agnhost/webhook/convert.go +// test/images/agnhost/webhook/convert_test.go +// test/images/agnhost/webhook/crd.go +// test/images/agnhost/webhook/customresource.go +// test/images/agnhost/webhook/main.go +// test/images/agnhost/webhook/patch_test.go +// test/images/agnhost/webhook/pods.go +// test/images/agnhost/webhook/scheme.go +// test/images/apparmor-loader/BASEIMAGE +// test/images/apparmor-loader/Dockerfile +// test/images/apparmor-loader/Makefile +// test/images/apparmor-loader/OWNERS +// test/images/apparmor-loader/VERSION +// test/images/apparmor-loader/example-configmap.yaml +// test/images/apparmor-loader/example-daemon.yaml +// test/images/apparmor-loader/example-namespace.yaml +// test/images/apparmor-loader/example-pod.yaml +// test/images/apparmor-loader/loader.go +// test/images/busybox/BASEIMAGE +// test/images/busybox/Dockerfile_windows +// test/images/busybox/Makefile +// test/images/busybox/OWNERS +// test/images/busybox/VERSION +// test/images/busybox/hostname.go +// test/images/cloudbuild.yaml +// test/images/cuda-vector-add/BASEIMAGE +// test/images/cuda-vector-add/Dockerfile +// test/images/cuda-vector-add/OWNERS +// test/images/cuda-vector-add/VERSION +// test/images/echoserver/BASEIMAGE +// test/images/echoserver/Dockerfile +// test/images/echoserver/Dockerfile_windows +// test/images/echoserver/OWNERS +// test/images/echoserver/VERSION +// test/images/echoserver/install-deps.sh +// test/images/echoserver/nginx.conf +// test/images/echoserver/run.sh +// test/images/echoserver/template.lua +// test/images/image-util.sh +// test/images/ipc-utils/BASEIMAGE +// test/images/ipc-utils/Dockerfile +// test/images/ipc-utils/VERSION +// test/images/jessie-dnsutils/BASEIMAGE +// test/images/jessie-dnsutils/Dockerfile +// test/images/jessie-dnsutils/Dockerfile_windows +// test/images/jessie-dnsutils/OWNERS +// test/images/jessie-dnsutils/VERSION +// test/images/jessie-dnsutils/fixup-apt-list.sh +// test/images/kitten/BASEIMAGE +// test/images/kitten/Dockerfile +// test/images/kitten/OWNERS +// test/images/kitten/VERSION +// test/images/kitten/html/data.json +// test/images/metadata-concealment/Dockerfile +// test/images/metadata-concealment/Makefile +// test/images/metadata-concealment/OWNERS +// test/images/metadata-concealment/VERSION +// test/images/metadata-concealment/check_metadata_concealment.go +// test/images/nautilus/BASEIMAGE +// test/images/nautilus/Dockerfile +// test/images/nautilus/OWNERS +// test/images/nautilus/VERSION +// test/images/nautilus/html/data.json +// test/images/node-perf/npb-ep/BASEIMAGE +// test/images/node-perf/npb-ep/Dockerfile +// test/images/node-perf/npb-ep/VERSION +// test/images/node-perf/npb-is/BASEIMAGE +// test/images/node-perf/npb-is/Dockerfile +// test/images/node-perf/npb-is/VERSION +// test/images/node-perf/tf-wide-deep/BASEIMAGE +// test/images/node-perf/tf-wide-deep/Dockerfile +// test/images/node-perf/tf-wide-deep/VERSION +// test/images/nonewprivs/.gitignore +// test/images/nonewprivs/BASEIMAGE +// test/images/nonewprivs/Dockerfile +// test/images/nonewprivs/Makefile +// test/images/nonewprivs/OWNERS +// test/images/nonewprivs/VERSION +// test/images/nonewprivs/nnp.go +// test/images/nonroot/BASEIMAGE +// test/images/nonroot/Dockerfile +// test/images/nonroot/Dockerfile_windows +// test/images/nonroot/OWNERS +// test/images/nonroot/VERSION +// test/images/pets/peer-finder/BASEIMAGE +// test/images/pets/peer-finder/Dockerfile +// test/images/pets/peer-finder/Makefile +// test/images/pets/peer-finder/VERSION +// test/images/pets/peer-finder/peer-finder.go +// test/images/pets/redis-installer/BASEIMAGE +// test/images/pets/redis-installer/Dockerfile +// test/images/pets/redis-installer/Makefile +// test/images/pets/redis-installer/VERSION +// test/images/pets/redis-installer/install.sh +// test/images/pets/redis-installer/on-start.sh +// test/images/pets/zookeeper-installer/BASEIMAGE +// test/images/pets/zookeeper-installer/Dockerfile +// test/images/pets/zookeeper-installer/Makefile +// test/images/pets/zookeeper-installer/VERSION +// test/images/pets/zookeeper-installer/install.sh +// test/images/pets/zookeeper-installer/on-start.sh +// test/images/redis/BASEIMAGE +// test/images/redis/Dockerfile +// test/images/redis/Dockerfile_windows +// test/images/redis/OWNERS +// test/images/redis/VERSION +// test/images/redis/redis.conf +// test/images/regression-issue-74839/.gitignore +// test/images/regression-issue-74839/Dockerfile +// test/images/regression-issue-74839/Makefile +// test/images/regression-issue-74839/OWNERS +// test/images/regression-issue-74839/VERSION +// test/images/regression-issue-74839/main.go +// test/images/regression-issue-74839/tcp.go +// test/images/regression-issue-74839/tcp_test.go +// test/images/resource-consumer/.gitignore +// test/images/resource-consumer/BASEIMAGE +// test/images/resource-consumer/Dockerfile +// test/images/resource-consumer/Makefile +// test/images/resource-consumer/VERSION +// test/images/resource-consumer/common/common.go +// test/images/resource-consumer/consume-cpu/consume_cpu.go +// test/images/resource-consumer/resource_consumer.go +// test/images/resource-consumer/resource_consumer_handler.go +// test/images/resource-consumer/utils.go +// test/images/sample-apiserver/BASEIMAGE +// test/images/sample-apiserver/Dockerfile +// test/images/sample-apiserver/Dockerfile_windows +// test/images/sample-apiserver/Makefile +// test/images/sample-apiserver/OWNERS +// test/images/sample-apiserver/VERSION +// test/images/sample-device-plugin/BASEIMAGE +// test/images/sample-device-plugin/Dockerfile +// test/images/sample-device-plugin/Makefile +// test/images/sample-device-plugin/VERSION +// test/images/sample-device-plugin/sampledeviceplugin.go +// test/images/volume/OWNERS +// test/images/volume/gluster/BASEIMAGE +// test/images/volume/gluster/Dockerfile +// test/images/volume/gluster/VERSION +// test/images/volume/gluster/glusterd.vol +// test/images/volume/gluster/index.html +// test/images/volume/gluster/run_gluster.sh +// test/images/volume/iscsi/BASEIMAGE +// test/images/volume/iscsi/Dockerfile +// test/images/volume/iscsi/VERSION +// test/images/volume/iscsi/block.tar.gz +// test/images/volume/iscsi/create_block.sh +// test/images/volume/iscsi/run_iscsi_target.sh +// test/images/volume/nfs/BASEIMAGE +// test/images/volume/nfs/Dockerfile +// test/images/volume/nfs/VERSION +// test/images/volume/nfs/index.html +// test/images/volume/nfs/run_nfs.sh +// test/images/volume/rbd/BASEIMAGE +// test/images/volume/rbd/Dockerfile +// test/images/volume/rbd/VERSION +// test/images/volume/rbd/block.tar.gz +// test/images/volume/rbd/bootstrap.sh +// test/images/volume/rbd/ceph.conf.sh +// test/images/volume/rbd/create_block.sh +// test/images/volume/rbd/keyring +// test/images/volume/rbd/mon.sh +// test/images/volume/rbd/osd.sh +// test/images/windows/Makefile +// test/images/windows/busybox-helper/Dockerfile +// test/images/windows/busybox-helper/VERSION +// test/images/windows/powershell-helper/Dockerfile +// test/images/windows/powershell-helper/VERSION +// test/images/windows-servercore-cache/BASEIMAGE +// test/images/windows-servercore-cache/Dockerfile +// test/images/windows-servercore-cache/VERSION +// test/fixtures/doc-yaml/admin/daemon.yaml +// test/fixtures/doc-yaml/admin/high-availability/etcd.yaml +// test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml +// test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml +// test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml +// test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml +// test/fixtures/doc-yaml/admin/limitrange/limits.yaml +// test/fixtures/doc-yaml/admin/limitrange/namespace.yaml +// test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml +// test/fixtures/doc-yaml/admin/namespaces/namespace-dev.json +// test/fixtures/doc-yaml/admin/namespaces/namespace-prod.json +// test/fixtures/doc-yaml/admin/resourcequota/limits.yaml +// test/fixtures/doc-yaml/admin/resourcequota/namespace.yaml +// test/fixtures/doc-yaml/admin/resourcequota/quota.yaml +// test/fixtures/doc-yaml/user-guide/configmap/configmap.yaml +// test/fixtures/doc-yaml/user-guide/deployment.yaml +// test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml.in +// test/fixtures/doc-yaml/user-guide/job.yaml +// test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml.in +// test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml.in +// test/fixtures/doc-yaml/user-guide/multi-pod.yaml +// test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-01.yaml +// test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-02.yaml +// test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-03.json +// test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/gce.yaml +// test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-01.yaml +// test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-02.yaml +// test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/nfs.yaml +// test/fixtures/doc-yaml/user-guide/pod.yaml +// test/fixtures/doc-yaml/user-guide/replicaset/redis-slave.yaml +// test/fixtures/doc-yaml/user-guide/replication.yaml +// test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml +// test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml.in +// test/fixtures/doc-yaml/user-guide/secrets/secret.yaml +// test/fixtures/doc-yaml/user-guide/update-demo/images/kitten/html/data.json +// test/fixtures/doc-yaml/user-guide/update-demo/images/nautilus/html/data.json +// test/fixtures/doc-yaml/user-guide/update-demo/kitten-rc.yaml.in +// test/fixtures/doc-yaml/user-guide/update-demo/nautilus-rc.yaml.in +// test/fixtures/doc-yaml/user-guide/walkthrough/podtemplate.json +// test/fixtures/pkg/kubectl/OWNERS +// test/fixtures/pkg/kubectl/plugins/bar/kubectl-bar +// test/fixtures/pkg/kubectl/plugins/foo/kubectl-foo +// test/fixtures/pkg/kubectl/plugins/kubectl-foo +// test/fixtures/pkg/kubectl/plugins/version/kubectl-version +package generated + +import ( + "bytes" + "compress/gzip" + "fmt" + "io" + "io/ioutil" + "os" + "path/filepath" + "strings" + "time" +) + +func bindataRead(data []byte, name string) ([]byte, error) { + gz, err := gzip.NewReader(bytes.NewBuffer(data)) + if err != nil { + return nil, fmt.Errorf("Read %q: %v", name, err) + } + + var buf bytes.Buffer + _, err = io.Copy(&buf, gz) + clErr := gz.Close() + + if err != nil { + return nil, fmt.Errorf("Read %q: %v", name, err) + } + if clErr != nil { + return nil, err + } + + return buf.Bytes(), nil +} + +type asset struct { + bytes []byte + info os.FileInfo +} + +type bindataFileInfo struct { + name string + size int64 + mode os.FileMode + modTime time.Time +} + +// Name return file name +func (fi bindataFileInfo) Name() string { + return fi.name +} + +// Size return file size +func (fi bindataFileInfo) Size() int64 { + return fi.size +} + +// Mode return file mode +func (fi bindataFileInfo) Mode() os.FileMode { + return fi.mode +} + +// Mode return file modify time +func (fi bindataFileInfo) ModTime() time.Time { + return fi.modTime +} + +// IsDir return file whether a directory +func (fi bindataFileInfo) IsDir() bool { + return fi.mode&os.ModeDir != 0 +} + +// Sys return file is sys mode +func (fi bindataFileInfo) Sys() interface{} { + return nil +} + +var _testConformanceTestdataOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4c\x8f\xc1\x6a\xc3\x30\x0c\x86\xef\x7e\x0a\x41\xcf\x89\xaf\x23\xf7\x5d\x37\x58\x07\x3b\x16\xd9\x51\x62\x6d\xb1\x65\x64\x35\x5d\xde\x7e\x34\x19\xa5\xb7\xff\x13\x9f\x24\xfe\x13\x9c\x89\xc0\x12\xc1\xfb\xd7\xdb\xeb\xc7\x19\x46\x89\x0d\xd0\x20\x99\xd5\x36\x78\x3f\x4b\xff\xf3\xd2\x7a\x16\x2f\xb7\x42\xda\x9c\x3b\xc1\xa7\x40\x20\xb8\xf3\x08\x61\x83\xc6\x73\x87\x1a\x13\x1b\x45\xbb\x2a\xf5\x4e\xaa\xb1\x94\x36\x38\x80\x22\x97\x8a\x4a\xc5\x2e\xc7\xfe\x00\xa6\x57\x72\x4a\x2b\xd3\xed\xce\x0e\xa0\x83\x96\x51\x8d\x34\x2e\xb8\x99\x94\x63\x54\x79\x9a\x7e\xeb\x9e\x8d\xb3\x58\xda\x5a\xdc\x69\xe4\xdc\xf6\xf0\x2d\xa9\x04\x5a\x30\xa3\x72\x74\x58\xab\xca\xfa\x38\x19\xa5\x4c\xa2\x19\x4b\xa4\x2e\x50\xc2\x95\x45\xbb\x87\xe3\x16\x0c\xb4\xfc\xab\xa8\x84\xfe\xc9\x3f\xfe\xf3\xec\x9f\x5b\xb9\xbf\x00\x00\x00\xff\xff\xbd\x28\x57\xaf\x2b\x01\x00\x00") + +func testConformanceTestdataOwnersBytes() ([]byte, error) { + return bindataRead( + _testConformanceTestdataOwners, + "test/conformance/testdata/OWNERS", + ) +} + +func testConformanceTestdataOwners() (*asset, error) { + bytes, err := testConformanceTestdataOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/conformance/testdata/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testConformanceTestdataConformanceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\xbd\x5b\x73\x1c\x37\x92\x28\xfc\xbe\xbf\x02\xe1\x17\x8e\x4f\x34\x5b\x94\x7c\x1d\xcf\xe7\x2f\x42\xa6\x64\x8f\x76\x6d\x89\x23\xca\xf6\x83\xd7\xa1\x83\xae\x42\xb3\x31\xac\x2e\xd4\x14\x50\xa4\x7a\x4f\x9c\xff\x7e\x02\x99\x89\x5b\x5d\xba\xab\xaf\xa4\x3c\xde\x9d\x98\x11\xbb\xaa\x12\x89\xcc\x44\x22\x91\xc8\xcb\x39\x33\x42\x9b\x92\x2f\xc5\x37\xec\x4a\xe5\xec\x47\x39\x17\xd9\x2a\x2b\xc4\x84\x55\x4a\x1b\xa6\x0d\xaf\x0d\x13\x1f\x44\xc6\x16\x4a\xdd\xfe\x07\x63\x99\xca\x05\xbe\x7f\xf6\xdb\xed\xd7\x7a\x2a\xd5\xef\xec\x52\x95\x86\xcb\x52\xd4\xe1\x7b\xf6\x77\xa5\x6e\xd9\xfd\x42\x94\x2c\xab\x05\x37\x82\x71\x56\xa9\x9c\xdd\x4b\xb3\x60\x85\x7f\x8b\x80\x32\xa6\x17\xaa\x29\x72\x18\xa9\x31\x02\x06\x6f\x8d\xcd\xaa\x5a\x55\xa2\x2e\x56\xec\xb7\xd7\x2a\x17\x97\xaa\x9c\xab\x7a\xc9\xcb\x4c\xfc\xce\x7e\x8b\xff\x3a\xfb\x0f\xc6\x72\xa1\xb3\x5a\x56\x46\xaa\xf2\x1b\xf6\xab\xc5\x82\xc7\x13\x5a\xf0\x32\x2f\x44\xcd\xa4\x66\xba\x12\x99\x9c\x4b\x91\x33\x59\x32\xb3\x10\x2c\xf3\x93\x09\x68\x36\x5a\x96\x37\x80\x27\x67\x67\x2f\x3f\x88\xec\x8c\xf1\xcc\x02\x9f\xd8\x4f\xf0\x3b\x07\xf3\xa7\x9f\xaf\xdf\xb1\x99\x60\xb2\xbc\x53\xb7\x22\x67\x7c\x6e\x44\x0d\x6f\xe0\xd8\x6a\x9e\x0e\x33\x05\xb8\xcf\x99\x16\xf5\x9d\xa8\x81\x48\x52\x13\xd1\x72\x66\x16\xdc\xb0\x7b\x59\x14\xf8\x9c\x2d\x8c\xa9\x58\x2d\xfe\xd5\x08\x6d\xf4\x24\xd0\x56\x8b\x4c\x95\xb9\x27\x31\xe1\xda\x37\x17\x9c\xf0\x4a\x96\x37\x29\x4d\x60\x24\x44\x5a\x23\xba\x01\xa1\x30\x7f\x3b\xf9\xe7\x30\x75\x66\x14\xbb\xe3\x85\xcc\x2d\x02\xf0\xb1\xfd\x28\x02\x28\xb5\x63\x67\x6e\xe7\x58\x8b\x42\x70\x2d\xbe\x61\x77\x4f\xa7\x7f\xfd\x0f\xc6\xe6\xb2\x10\xdf\x80\xf8\x3d\x11\xcf\xc4\x93\x4c\x2d\x97\xaa\x7c\xe2\xf1\x7c\x6f\x79\x3e\xbd\x51\xff\x31\x4e\x44\x81\x2e\x0f\x24\xa2\x7e\xec\xc7\x22\xa2\x7f\x37\xa6\xfa\x41\x98\x7f\x2f\x19\x8d\xc4\x11\x20\x3f\x90\x48\xd6\x42\x1b\x55\x3d\x84\xca\x6c\x8f\xbc\xbf\x34\xd6\xe2\x1c\x40\x9e\x52\x5d\xce\xc4\x5c\xd5\xa2\x05\x5a\x6a\x66\x44\xbd\x94\x25\x27\xce\x3d\x9c\x30\x3a\x9a\x1c\x48\x5d\x3a\x70\xa7\x93\xcc\x07\xd0\x94\xed\x91\x1f\x89\x64\x92\x9a\xfc\x37\x13\xce\x61\x3d\x79\x44\x59\x0c\x42\xf5\xb6\x29\x8d\x5c\x8a\x09\x7b\x47\x34\x93\xaa\xfc\x49\x68\xcd\x6f\xc4\x84\xcd\x6b\xb5\x64\x85\xba\x61\xaa\x31\x55\x03\xfb\x90\x6e\xb2\x4c\x88\xdc\x4e\xd0\xcf\x7f\xa3\xe4\xd2\x20\x6c\x56\xf0\xec\x76\xa6\x3e\x00\x26\xcc\x2e\x42\xcf\xa8\x88\x9a\x28\xae\x40\x8c\x5a\x54\xca\xee\x33\x01\x37\xb6\x44\xe4\xd8\x6f\x3f\xca\xb2\xf9\xf0\xa6\x2c\x56\xbf\x33\xae\x99\x58\x56\x66\x85\x6b\xc2\x52\x95\xd0\xd4\x8c\x97\x79\xcf\xd4\xae\x54\x21\xb3\x15\x0c\xf1\x3d\x2f\x8a\x19\xcf\x6e\xdf\xa9\x1f\xd5\x8d\x7e\x53\xbe\xac\x6b\x85\x02\x2c\xcc\xd6\xeb\xe1\xec\xb2\xb3\x1e\x79\x19\xed\xdb\x81\x26\x67\x67\xda\x51\x55\x6a\x56\x8b\x4c\xd5\x39\xac\x15\x40\xca\xd2\xdc\x62\x1e\x88\x22\x3e\x48\xa3\x71\x5a\x5a\xcf\x9b\xa2\x58\x01\x78\xd5\x18\x3b\x82\xb0\x48\x4f\x71\x39\x0e\xac\x84\x09\x4a\x57\x87\x14\xb8\xa8\x16\xfc\x4e\xb0\x52\xc1\xc7\xa2\x34\x96\xa2\x11\x43\x90\x98\xd3\x98\xe6\xdf\xb0\x4b\x5e\x96\xca\x00\xd4\xa5\x6a\x4a\x03\x82\xa8\xed\x6a\xff\x55\x96\xb9\xba\xd7\x61\xb2\x7a\x7a\xd6\x12\xdc\xa7\x5f\x0c\x4a\x6e\x8d\xc2\xb2\x8f\xc8\x5a\xc0\x8f\x56\x58\x03\x86\x7f\x14\x69\xe5\x38\x1d\x8b\x7c\xaa\x8a\x77\x13\xda\x44\x50\x45\x3e\x19\x14\xda\x25\x37\xd9\x02\xf1\x76\xe3\x5a\xd9\xf5\x04\x4e\x05\x16\xc0\xa2\xd0\x3e\x3a\x81\xf5\xd3\x3f\xd3\xa9\xbe\x05\xa4\xe7\x5c\x16\x8f\x50\x86\x23\x44\xe5\xfc\x23\x14\xdb\x21\x25\xeb\x20\x8e\x51\xaa\x31\xa5\x50\x15\x76\x05\xd4\xca\xa6\xf8\x50\x89\xcc\x52\x9d\xd0\xf1\xb8\xb4\xd8\x8f\xfc\xff\x08\x04\xf7\x8a\x9b\xc5\x84\x95\xaa\x3c\xaf\x95\x32\xac\xd1\xa2\x06\x62\xda\x5f\x72\x31\xe7\x4d\x81\x5b\x43\xc5\xc1\x5e\x7a\x58\x71\xed\x17\x4f\x6e\x16\x4e\x04\xb9\xf6\x53\x01\xb8\x7e\x3a\xdc\x30\x1e\xcf\x09\xe6\x73\x10\x89\x8d\x26\x64\x14\xab\x9b\x92\x49\xc0\x83\xb7\x88\x8a\x6f\x03\x56\x59\xa3\x8d\x5a\x0e\x4d\x45\x0b\x33\x85\x43\x46\x2d\x72\x59\x8b\xcc\xa0\xa9\x49\x02\x67\x14\x19\x95\xea\x4e\x5a\xb9\x23\xbe\xb0\x44\x3b\x93\xb0\xaf\xb1\xa7\xc1\x28\xef\xa5\x77\x10\x78\x32\x63\xbb\x42\x5f\xa8\x9b\x9b\x70\x1e\xf0\xa8\xd0\xb4\x2c\x46\x2d\x13\xe3\x1d\x87\x0f\xfc\x4f\x00\x39\x6f\x84\x9d\x4d\xa3\x61\x8b\x3f\x3b\x6b\x64\x7e\x76\x06\xcc\x6a\x4a\x3e\x2b\xe0\xe1\x03\x2d\x93\xb7\x02\xfd\x1a\xa8\xf9\x26\xc0\x8d\xab\x05\xd7\x42\xef\xb8\x04\xc0\x42\x00\x98\x78\xa2\x88\x64\x66\xc1\x51\x54\x69\x8f\xc5\x23\x9e\x15\x23\xbf\x1f\x7a\xf2\x6b\xc3\x4d\xa3\xb7\x96\xda\x57\xe8\x75\xaa\x69\x52\x15\x4c\xca\xad\x18\xa3\xd8\xd9\xf3\xe2\x9e\xaf\xf4\x19\xce\xd3\x9d\xcd\xe8\x75\x91\x03\xf2\x9d\xbd\xfc\xd5\xbc\x07\xe0\xd9\x9b\xf2\x7b\x2e\x8b\xa6\x16\x2d\x60\x0e\x94\x2a\x8b\x95\x5d\xc5\xd2\x74\xed\x03\x9c\xb0\x5d\x34\xff\x23\x6a\x05\xf4\x00\x5a\x4f\x87\x27\x70\xf6\x5a\xdc\x89\x3a\x1a\x0b\x40\x96\xf6\xc7\x64\x0a\x53\xf6\xbc\x28\x2c\x0c\x6d\x0f\x99\xb5\x10\xc8\x95\xcc\x72\x14\x71\xbc\x13\xb5\x9c\xaf\x92\x61\x32\x2b\x7b\x88\x24\xcf\xac\x96\x97\xe5\x4d\xb1\x6a\x9f\xdc\x9e\x7e\xb6\xad\xbc\xbd\x50\xd9\xad\xa8\x83\x08\xe8\x09\xe9\x86\xfa\xa6\x59\x0a\x1c\xb2\x4f\xc6\xe8\xbb\x20\xfb\x4e\x58\x66\x82\xb9\xf5\xa2\xee\x44\x5d\xcb\x1c\x8f\xd2\x72\xc9\x6f\x84\xdd\x89\x62\x3d\xee\x47\x61\x7f\xc9\x09\x91\x65\xfe\xe9\xd6\x32\xf5\x82\xd4\xa8\x9d\x2a\xe8\xd7\x32\x67\xb8\x07\xda\x91\x09\x32\x20\xc0\x44\x69\xea\x55\xa5\x64\x69\xbc\x38\x34\x5a\xa0\xde\x87\x75\x61\x99\x97\x2b\x61\x55\xb7\x71\x07\xef\x96\xee\x72\xc3\xcc\x1a\x3c\x53\x87\x59\xc0\x98\x16\x82\xfd\x10\x60\xc2\x20\x9e\x10\xb8\xf2\x9c\x0f\x63\xfc\xb9\x1b\xa7\xf0\x3e\x70\x69\x2c\x1b\x09\xd5\xa3\x32\xd1\x91\xc3\xb1\x30\x90\x78\x7f\x4e\x8e\x63\xe2\xeb\x37\x9e\x91\x41\x3f\x38\x36\x58\x52\xeb\x7e\x0e\x4e\x19\xbb\x8c\x07\x72\x9f\xb4\xb8\x66\x16\x22\x99\x28\x6d\x35\x80\xcb\xe9\x78\x88\x96\xc3\x49\x96\x65\xef\x88\x07\x59\x95\xad\xa5\xb2\x89\xb3\x80\x4d\x9b\xbb\x63\x38\x9b\x0e\x16\xf1\x19\x17\x03\x1b\x5a\xb3\x5d\xce\x0f\xa0\x7f\x5a\x19\xb0\x67\xdb\x83\x88\x41\xa3\x23\xb6\x3b\x9e\x6b\xbb\x09\x66\x5d\x02\x69\xc6\x6b\xb0\x1d\xca\xdb\x07\x63\x7e\x87\xf1\xe3\x74\xf3\xe1\x38\x22\x4b\x69\xce\xfd\xe3\x73\xd8\x8d\xf5\x39\xaf\xaa\x73\xda\x9a\x39\xd8\x2b\xe7\x95\x1a\xd2\xb2\xaf\x4a\x69\x82\x49\xd6\x25\x24\xb1\x06\x3d\xb9\x30\x5e\xc4\x7f\x20\x82\x2a\x19\x77\x66\x20\x9a\x47\x60\xf2\xaf\xe7\xc0\xcb\x52\x37\x35\xdd\x42\xf0\xa2\x48\xd1\x40\xd6\x3a\x43\x08\x98\x53\x14\xd1\xb0\x56\xbe\x71\x46\x2c\x7d\xcb\x30\x4b\x55\x7b\x8c\x6a\x59\xf3\xda\xc8\xa2\xb0\xa6\x62\x69\x8d\x4a\x3c\x87\x07\x9b\xdc\x1e\x06\xac\x61\x3d\x13\xce\x35\x9f\x5a\x74\xc0\xda\x05\xd7\x6d\xb3\x8a\xeb\x74\xde\x1d\x83\xe7\xd9\x20\x67\x2d\x21\x03\x5f\xb7\x66\x2b\xd8\x6d\x27\xe3\x2a\x98\x8e\xa7\x64\xaa\x7d\xf3\x4e\x15\x4d\x69\x78\x2d\x8b\x55\xc7\xf2\x05\x83\x97\x4c\xfc\x8b\x89\xf7\xc2\xe9\x95\x36\x62\x69\x79\x6b\x97\xe0\x8d\xb2\xbc\x36\x2a\x66\x28\xe3\xe5\x8a\xae\x96\xb5\x88\x07\x1f\xc7\x66\x20\xc4\xb1\xb8\x3c\xe7\xb2\xd0\x70\xfd\x71\x0c\x56\x83\x52\x42\x12\x54\x55\x9b\xd9\x60\x63\x70\x59\xd0\x65\x75\x0e\xe7\x8e\x54\x28\xf0\xf9\xde\x52\x11\x8f\xed\x18\x95\x2c\xb5\x64\x0d\x27\x73\xf3\x7e\x41\x6d\xed\x04\xc7\xce\xfc\x71\x72\xed\x50\x7a\x77\x2d\xdb\xc6\x70\x69\x37\x8d\xbc\x99\x4d\xdd\xe5\x6d\x87\xa6\xb3\xca\x3a\xfe\x88\x9c\xcd\x55\xcd\xe6\xe2\x9e\xa9\x2c\x6b\xea\x5a\x94\x99\xc0\x6b\x80\xaa\x97\x93\x28\xa1\xc7\x52\xb5\xff\xd5\xcc\x44\x21\xcc\x84\x2d\x94\x36\xcf\x0b\xb9\xc6\x73\x41\xaf\xd2\x39\x29\x5b\x88\xbc\x29\xd0\x47\x31\x6b\xf4\x6a\xa6\x3e\xc0\x54\x41\x41\x45\xc0\x62\xdf\xdd\x7d\x2d\x0d\x5a\x12\x60\x1b\x2a\xf6\x44\x98\xec\x89\x7d\x59\x27\xce\xbb\x6d\xed\x19\xef\x6b\xeb\x45\x00\x74\x6d\xc4\xcf\xc4\x6e\xb7\x26\x37\xb8\xaa\x00\xc1\x08\x1f\xc2\x12\xfc\x6b\xe8\xa2\xd5\xd1\xbd\x19\x78\xbd\xec\xe4\xdd\x64\xd4\x3c\xba\xfe\x4e\x69\xc9\x9c\x27\x2e\x5c\xa9\xf6\x8d\x63\xc9\x5b\x97\xc2\x08\x8d\xbe\x2c\x34\x9e\xa3\x37\xe1\xc6\x45\x96\xa4\xd1\xa5\xd1\x89\x25\xba\x50\xf7\x76\x9d\x4f\xf0\x63\x8b\x9a\x2c\x73\x79\x27\xf3\x86\x17\xce\x2d\x46\x82\xdc\x54\x95\x22\x1f\x8b\xf3\x93\xa1\xc3\x39\xd8\x59\xec\x7b\x55\x33\xb3\x00\x17\x3a\xd7\x78\x33\x0f\x5e\x41\x0d\x7e\xf5\x25\xaf\x6f\x63\x2f\xdd\x16\xae\x8e\x5b\x94\xa2\x41\x39\x0c\x57\x0c\x93\xe8\xd8\xb3\x9b\x3c\x46\x67\x42\xf4\xc3\x92\x56\xa9\x6a\x59\x1a\xef\xb3\x0c\xee\x52\x60\xf2\xb6\xc2\xf7\xdd\xca\xe1\x49\xe1\x5b\x39\x5e\x76\xe5\xf6\x9f\xa2\xae\x83\x3d\xed\x4c\x2d\xb0\xb3\xfc\x05\x7f\xb8\x52\xab\x62\x37\x98\x28\x83\x07\xd7\x4b\xe0\x01\xe9\x8c\xea\xca\xc2\xb6\x74\x2e\x04\xc4\x22\xec\x47\x66\x32\x7c\x40\xe1\xc2\xbe\x80\x82\xda\x22\xfe\x0c\xe2\xc1\xb4\xa4\x03\x2f\x8e\x7d\x80\x25\x1f\x19\x49\xd6\x34\x12\x53\xf6\x6e\x91\x38\xb2\x13\xfa\xda\xf3\xb6\x5b\x9b\x33\x41\x58\x74\x9c\x3e\x07\xa2\x6f\x84\x03\x2e\xa7\x13\x91\x1a\x54\x15\x2f\xbb\xe3\x1f\x85\xdc\xde\x8b\x0b\xc3\x82\xff\x36\x39\x88\x4c\x53\x25\x13\x85\xf6\x74\x80\xc1\xf2\x09\xb0\xfa\xa6\x70\x40\x56\xf9\x1b\x9a\x5a\x70\x72\x3c\xc3\x65\x0c\x28\x5c\x34\xaa\xb7\x66\x58\x00\x15\x58\xd7\x73\x9b\x65\xf5\x31\xee\x8a\x46\x85\x41\xc9\x90\x3f\xec\x96\xa8\x45\xd6\xd4\xd2\xac\xf0\xd2\xfc\x83\x01\x9f\x3e\x3c\x79\x2b\x78\x6e\x47\x79\xab\x94\xf9\x5e\x16\xe2\xda\x4d\x99\x39\xbf\xbf\xa9\x1b\x58\x4f\x02\xc0\x61\x90\x96\xdb\xc3\x3d\xfa\xb0\x5d\x61\x1c\x06\x1e\x2d\xed\x7c\x26\xf4\x5c\x55\xa2\x0e\x57\xa6\xf4\x76\x7b\xc2\xc0\x71\x30\xe1\xb8\xf6\x77\x19\x7e\x1d\xf7\x6f\x3d\x4c\xcb\x32\xc3\xa5\xec\xee\x7c\x82\x17\x02\x77\x3a\x8c\xea\x4a\xae\xd3\x75\x60\xf8\x39\x70\x89\xc3\x95\xd8\x01\x85\x6a\xc9\x4b\x7e\x23\x72\x26\x4c\x06\xf6\xc0\x06\xab\xea\x27\x7c\xfd\xa5\xc9\xfe\x0e\x9b\x3d\xad\x60\x98\x35\x0d\xe5\x41\x06\x9b\x00\xcf\x04\x96\xe4\x87\x95\x95\x36\x9d\xec\x60\xaf\x85\xb9\x57\xf5\xad\x13\x89\x39\x2f\xb4\x98\xc0\x0a\xa7\x98\x85\xc4\xd7\xb3\xd6\x88\xb1\xa8\x60\x94\x9f\xd2\x66\x1a\xc6\xa7\xa0\xbb\xab\x38\xe8\xae\x67\x68\x94\xc6\xa7\x41\x20\xdb\x38\x7e\x0b\xc8\x45\x0a\xa4\x45\x31\x35\x4f\x10\x25\xb2\xce\xd0\x5d\x45\x0c\x99\xb2\x67\x1b\x07\xa0\x3b\x06\x72\xcb\xba\xe5\x4d\x13\xef\x4c\xda\x99\x01\x38\xe9\x77\x3d\x74\x01\x84\xad\xe0\xce\x10\xe6\x10\x66\x9f\xad\xc1\xcc\x12\x87\x4d\x7a\x41\x7b\x8d\x33\x13\x83\xa0\x47\xac\x35\xbf\xce\xb2\x76\x38\x58\xd7\xe2\x2c\x63\xa3\x72\xb4\xdf\x8f\x04\xfe\xbd\x30\xd9\x7b\x98\x43\x7b\x95\x01\x10\xf6\xfc\xea\x55\xec\x41\xbf\xe3\xb2\xa0\x6d\xbd\x6f\xa1\xfd\x08\xdf\xac\xfd\x72\xc3\x3a\xf9\x84\x04\x15\x21\xa9\xd9\x3f\x45\x66\xd0\xfb\x72\x23\x0c\x93\xe6\x6f\x3e\x7c\x94\x7e\xf2\xc6\x9c\xbf\x70\xf7\xee\x86\xeb\x4a\x64\x2e\xc8\x1f\xf6\x0a\x04\x1a\xc5\x90\xb8\x37\x54\x2d\x6f\x64\xc9\x0b\x7c\x63\xca\x7e\xae\x28\x80\x99\x10\xf1\x20\x1d\x12\x0d\xbe\x30\x8c\xc4\x7f\x9b\x0d\x18\x90\xf0\xc5\x58\x20\xd0\xdc\x21\x71\xe5\xc3\x5c\xf0\xab\x78\xfc\x0a\x9e\xb5\x86\x6f\x05\x1e\x6c\x49\x03\x00\x19\x46\x47\x3e\x90\xd5\x4c\x4a\x03\xbf\xc5\x78\x68\x3e\x13\x05\x9e\xfb\x0a\xa9\x0d\x3e\xd2\x09\x77\xe0\xf7\x35\xec\x09\xcf\x6b\x61\x9a\xba\x64\x33\x65\x01\x03\xa0\x29\x7b\x81\x36\xab\xc5\x9b\xc6\x42\xb1\xba\x93\xdc\xd9\xb3\x99\x2a\x0a\x01\x41\xcd\x7f\xf3\xca\x91\x1e\x75\x87\x0d\xe6\x0e\xbd\x02\x5b\x52\x1b\xfc\x94\xfd\x68\xb1\x42\x24\x10\xea\xc0\x34\x02\x3c\xc2\xfe\x9f\x8d\x36\x44\xe6\x25\x97\xe0\x04\x26\x90\xf1\x54\xec\x2f\x08\x77\x10\xd3\x29\xfb\x41\x98\xe8\xed\xc0\x62\x1a\xc9\xaa\x97\xb9\x6a\xca\x9c\x62\xa9\x3e\x69\xef\xa8\x5f\x0d\xc7\x2f\x03\x46\xdd\x10\x7a\x3d\x61\xcf\x33\x23\xef\xc4\x0b\xc1\xf3\x42\x96\xe2\x1a\x38\x3e\xb4\xa1\xda\x2f\xdc\xe2\xe6\x45\xa1\xee\x21\xb8\xbc\xf3\x35\x19\xfe\x4e\xae\x3b\x7b\x26\xd0\x61\xdb\x7d\x93\xb3\xa6\x94\xff\x6a\x88\x6f\x53\xf6\x8f\x46\xd4\x2b\xf0\xf7\x98\x58\x5f\x7b\xce\x3a\xdf\x8e\x16\x56\x58\x54\xdd\x4b\x71\xa7\xea\xa5\xf6\xd8\x02\x94\x21\xa2\xa0\xd5\x46\x36\x98\xbb\x3b\x8b\xcc\x73\x6f\x4a\xbb\xb5\x17\x1c\x17\x10\x8f\x22\x0a\x5e\x59\x31\x1f\xad\xae\x2b\x95\x77\x34\x34\xf2\xcd\x87\xa4\x8f\xe0\x15\xcc\x7a\xb6\x94\xc6\xf9\xc7\x6b\xb1\x54\x77\x7d\xac\xd9\xc0\x96\xe7\x8e\x5a\x2e\xe6\xbf\x97\x35\x71\xcc\x09\x1a\x7f\x70\x22\x05\x4b\xfe\x5f\x8d\xa8\x25\xf9\xf2\x20\x5f\x21\x70\x2c\xb0\xaa\xa9\x14\x25\x63\x48\x55\x4e\xd9\xf3\x3c\x67\x9c\xdd\x5b\x45\x35\x61\xd9\x42\x64\xb7\x4c\xce\x3d\x0b\xa4\x76\xb7\x2f\x53\x7f\xff\x0d\x66\x34\x1d\x3c\x27\xc0\x65\x7b\x10\x81\x1f\x20\x5b\x45\x2e\x85\x36\x7c\x09\xd9\x00\x6a\x06\xf9\x03\x39\x4a\x03\x8c\x12\x2f\x3b\xaf\x62\x3c\x04\x6b\x79\xde\x89\xd2\x38\x19\xf4\x72\xe7\xb7\x13\x3f\x91\x58\x3c\xdb\x30\x31\xc6\xde\xaa\x99\x43\x88\x03\x8a\xef\x38\x59\x18\x5c\x98\x8f\x63\x51\x46\xbb\x30\xa5\x74\x64\x0b\x5e\xde\xe0\x2f\x77\xbc\x68\xfc\xea\xfa\x11\x46\x05\xa0\x6b\x46\x2e\xc5\x3d\x7d\xe6\x1e\xa3\xb8\xf5\x8c\x7d\x00\x46\x58\x61\x92\x99\x60\xa2\xbc\x93\xb5\x2a\x97\xa2\x34\xec\x8e\xd7\xd2\x1a\x41\x63\xf4\x2a\x19\xbb\xfd\xdf\xc3\x0c\x68\x84\x1e\x77\xda\x36\x8a\x95\x92\x66\x2c\xa5\xac\x0c\x0a\xbc\xbe\x2c\x19\x9c\xea\xfe\xfa\xd9\x57\x5f\x4e\xd9\x73\x76\x4d\x93\xc9\x78\x51\x80\x77\x5d\xd1\xe0\xe8\x13\x09\x7a\xc0\x51\x76\x2d\xd4\xaf\xbf\xfa\xf2\x0b\x66\x78\x7d\x23\xe0\xc4\x88\xbf\x5d\x7c\x7d\x01\xb1\x65\x9c\xa2\xc6\xee\xdb\x2a\xc6\x25\x3c\x15\x8d\xa6\x3c\xce\x32\x5d\x53\x70\x0c\xb1\xbf\x04\xf4\x62\xea\x01\xdc\x40\xc1\x60\x91\xd2\xa9\x41\x6a\x37\x2a\x6a\x00\xfb\x07\x99\x33\xe9\x10\xc3\x30\x75\x63\xad\x32\xcd\xbe\x7f\xf3\xe6\xfa\xe5\xdb\x5f\x5e\x5d\xbe\x7c\xef\xfe\xf7\xef\x6f\xae\xdf\x4d\xfa\x1e\x5c\xbd\x79\x9b\x3e\x80\x1f\x30\xbe\x3b\xfd\xf1\xbd\xa5\xdb\xfb\x77\x97\x57\xfd\xdf\x44\x8f\xdf\xbe\x79\xf7\x66\xf8\xb9\xb7\xc0\x06\x01\x3c\x7f\xf1\xe2\x2d\xf9\xbf\x6a\xbb\xf8\xaa\xa6\x08\x5a\x1e\xd3\xda\x70\x25\x1d\x64\x07\x23\x4b\x88\x47\x06\xdd\x88\xf5\xd1\xf3\x15\x98\xb1\xf6\x95\x4d\x9b\x17\x6c\xde\xf4\x6e\x77\x13\x6b\x6d\x42\xf7\x0b\xe9\x76\x82\x99\x40\xc3\x2b\x44\xcb\x81\x70\x93\xc0\xb4\xa0\xba\x3d\xc2\x1b\x8a\xaf\xdf\xbc\xb3\xc8\xdf\xb3\xa6\x8a\x3f\xb6\xe7\x43\x49\xa7\xe6\x74\xe8\x8e\xab\x64\x17\xea\x72\xad\xe5\x4d\x49\x37\x26\xb2\x1a\x41\x59\x6b\x6f\x72\x78\x9d\xbd\xba\xda\x6b\x73\x40\x13\x80\x6e\xd1\x63\x13\x36\x49\x5e\x89\xb2\x05\x34\xe3\x98\xb7\x07\xd4\x78\x75\xc5\x78\x9e\xd7\x3d\x4e\xa3\x5d\x08\x91\xa9\x65\x55\xc0\xdd\x0f\xa8\x7e\x9f\x5c\xa8\xe6\xb4\x93\xb9\x3b\xfe\x2b\x95\x5f\x03\xca\x23\x68\x55\x37\x56\x09\xd5\xaa\xb9\x59\x74\xc1\xc2\x8b\x74\x3f\xe9\x21\x6e\x52\xcc\x43\xa6\x95\xa5\xa2\xcc\x48\x42\x22\x99\xf4\x69\x64\xaf\x4c\xf2\x43\x90\xd1\xca\x5d\xa4\x85\x2d\xcf\x4d\x15\x6c\x19\x6e\xb8\xcb\xc7\xb0\x36\x15\x38\x57\xc1\x36\xac\x0a\x9e\xb9\xef\xd2\x29\x48\xb3\x7e\x70\x1c\x18\xed\xac\x00\xa0\xcd\xc5\x67\x17\x3b\xb0\xd1\x9a\xac\x26\x44\xa5\xe1\x15\x0f\x2c\x7e\xbb\xe1\xdc\x8b\x99\x56\xd9\xad\x18\xba\xd0\x8a\x79\xe7\x5c\x97\x23\x21\x12\xf3\xf6\xb4\x94\xa7\xec\x57\x07\x30\xc9\x99\x55\x76\x69\xd4\x52\xd8\xfd\xe5\x83\xc8\x3c\x36\xd1\xcd\x69\xd8\xa7\x2a\xbb\xb4\x5c\xd2\x96\xfb\x2e\x47\x9f\x5f\x00\xdf\xce\xe6\xf2\x91\xeb\x76\x80\x24\xce\x11\x07\xd9\xc2\x33\xbb\xe6\x38\xa2\x6e\x28\xbc\x2d\x21\xdc\x78\x5e\xc0\x64\xe0\xf4\xec\x21\xa5\x11\x6e\x96\x2b\x28\xdc\x7e\x80\x53\x70\x05\x2e\x4d\xe7\xf1\x2d\xf7\x41\x98\x12\xe7\xa8\x1d\x8a\x0d\xac\x90\x77\xa2\x14\x5a\xdb\xbd\x7a\x26\x26\x74\xc0\x82\x3c\x6c\x51\xe6\x10\x61\x88\xb7\x67\x4d\x3d\x78\x54\xa8\xd5\x2c\x71\xe7\x3b\x4e\xfd\xaf\x52\x99\xff\xd5\x4a\x49\x40\x0d\xf5\x64\x21\x78\x61\x16\xff\x83\x3e\x65\x3b\x58\x8a\xc7\x81\x4e\x99\x2d\xa0\xaa\x4c\x27\xc6\xce\x9e\x9c\x4d\xd9\x8f\xf4\x12\x66\x4b\xb9\x17\x81\x4f\xfe\x45\x48\x51\x07\x67\x0a\x97\x05\x69\xc0\x16\x70\x7f\xcd\xe1\x42\x97\x4a\xef\x8c\x4e\x12\x13\xdc\xe6\xb6\xb4\x16\xfb\xff\x88\x5a\x8d\xdf\xb0\x3c\x81\xdf\xc3\x90\xe3\xd9\x59\xa8\x8c\x9c\xc0\x13\x56\x2a\x87\xcf\xe1\xd8\x09\x6a\xe8\x93\x8c\x12\x62\x9e\x98\x65\x45\x0c\xfe\x64\x5f\xbe\x8e\xe0\x2a\x18\x9f\x8d\x16\x9a\x9d\x09\x28\xad\x11\x05\x93\x04\x94\x84\xc7\x89\x32\x53\x7f\x4c\xa1\x78\x67\x3f\xb2\x4f\x91\xd3\x80\x3e\x71\x9b\x60\xa0\x1c\x23\x6e\xba\xcd\x1d\xf9\x79\x71\x02\x66\x9a\xac\x62\xa8\x21\x8e\xc3\x4c\x93\x55\xdf\xd8\x23\x16\xb9\x34\x4f\xb2\x2c\xc3\x9c\xe8\x74\x67\x8d\x64\x2c\x8f\x81\x95\x27\x5c\x14\xa8\x3f\x00\xe2\x92\x24\x1b\x11\x57\x75\x5d\xab\x5a\x53\xe9\x9e\xa7\x17\xe4\x89\xd6\x13\x9f\x7b\x42\x03\xd0\x87\x96\x5f\x08\xb5\x12\xe5\x7e\xe2\x90\x88\x02\xad\xf8\x7e\x71\x78\xfa\xf5\xe1\xe5\xa1\xa5\xab\x77\x94\x87\x75\x5a\x3a\xd5\xd0\x91\x9e\x3c\x8d\x96\x76\x68\x80\x54\x84\x1d\xc3\xd5\x24\x21\xd7\xaa\x47\x36\x16\x0c\x1e\x89\x46\x47\x32\xe8\xfe\xcc\x69\x69\x42\xcd\x67\x9e\xc1\xdd\x1b\x29\x6b\xdd\x14\x86\xc9\x48\xe7\xa3\x38\xd0\xbe\x18\x9c\xc2\x24\x36\xf7\xee\x8a\xe5\x56\x82\x13\x04\x6d\x64\x47\x5d\x59\x66\xb5\x58\x0a\x0c\x0b\x4b\x45\xc8\x28\xf6\xf4\xc4\xfb\xc1\x01\xe5\xc5\x6f\x03\xc9\x16\x70\x08\x3d\xd2\x75\x23\x0e\x6e\x02\x51\x85\x21\x27\x21\xeb\x37\x02\xcb\xbb\x10\x06\x83\x47\x71\x3c\xf8\xc1\x55\x6d\xf2\x45\x4b\x84\xa8\xa4\x47\x2d\x6f\x6e\x44\x0d\x84\x6d\x61\xa5\xc8\x60\xe8\x91\x8f\xcd\xb2\xd1\x63\x3b\x9c\x48\x3e\x5a\x2a\x65\xd9\x14\x46\x56\x85\xe7\xb8\x66\x7f\xd1\x85\xba\xff\x74\x5b\x99\xc1\x58\x4d\x55\x2a\xa3\x4a\x99\x71\x7b\xa0\x87\xf9\x72\x1d\xad\x84\x68\x6f\xfd\x53\xbd\x1c\x43\xbd\x00\xb4\x16\x51\x96\x8d\x36\x3e\xa2\x9d\xf1\x1b\xbb\x79\xe1\x7c\x1c\x00\x45\x73\x49\x89\x33\x57\x75\xa0\x8c\x28\x2d\x41\xf3\xe8\xae\x8b\x24\xd8\xd2\x4a\x33\x5e\xae\xa5\x96\x3f\xbe\xc1\x78\x53\x9f\xca\x8d\xd9\xbc\x38\x75\x3f\x35\xbc\x0d\xb9\x13\xf5\x0a\xee\xc8\x68\x75\x06\xaa\xe9\x09\x5b\x0a\x0e\x21\xe4\x4d\x65\x14\xfb\xc2\xcd\xe3\xa0\x8b\xa7\x16\x3c\x97\xf1\xea\x01\x79\x93\xa5\x34\x92\x17\x56\x93\xf0\xd5\xe8\x25\xe2\x03\xa0\x22\x80\x71\xd8\xfd\x0c\x2f\xe5\x57\x54\x72\x8b\x02\x0c\xa3\x91\xb0\xf8\x03\x64\x41\x38\x9e\xed\xa5\x65\xb1\x64\x16\x44\x35\xcf\xe5\x4d\x53\x07\x35\x9f\x0e\x1b\xdd\x6e\x7a\xf4\x83\x89\x30\x65\x97\xc0\x14\xe7\x7d\xbf\xc6\xb2\x85\x96\x69\x56\x2b\xab\x65\xc5\x6b\x1f\xae\x96\x00\x4e\xa5\xde\x25\xb8\x21\x0d\x30\x46\x2c\xd4\x68\x8c\x2a\x9d\xc5\x10\x8e\xca\xeb\x6d\xcf\xc4\xbd\x0c\x06\x22\x63\x16\x89\xe3\xb5\x70\x3e\x0b\x3f\xdb\x03\x33\x96\xb8\xb8\x06\x95\x4c\x95\x1a\x6e\x62\x4c\x54\x91\x82\xd2\xfe\x53\x0d\x3b\xe9\xb9\x5b\x89\xb2\xf8\x79\xbe\x9a\x44\x7f\x53\xc2\x5b\xa4\xae\x22\x65\xef\xbc\xe6\x07\x3d\x12\x5f\xbb\x28\xcb\x4b\x8c\xb2\x9c\x58\x24\x9e\xeb\x9f\xb5\xa8\xbf\xfd\xf2\x8b\x2f\x3e\xfb\x7c\x80\x7d\xed\xef\xc8\xe7\xe9\x02\x17\x3b\xf9\x0b\x1e\x6a\x72\x08\x68\xda\x95\x3c\xe0\xdd\x46\xe6\x0c\xc6\xde\x2b\x4a\xf0\xec\x32\xce\x88\x49\x36\xbc\x80\x8c\x82\x97\xd9\x6c\xc5\x2a\xae\x61\x93\x0d\x83\xbb\x54\xb4\xa6\x64\x5c\xb3\xa6\xac\x6a\x79\x27\x0b\x91\xdf\x08\x48\x7d\xad\xd3\x3b\x79\x59\xb2\x6b\xf4\xd7\x8a\x9c\x55\x0b\x08\x56\x49\x2b\x85\xb8\x48\x35\x77\xcd\x47\xd1\x6a\x5c\x0f\x06\xac\x75\x02\x43\xbd\x80\x68\xf6\xf3\xab\x17\xec\x09\xfb\xe1\xd5\x8b\x6d\xea\x84\xb8\x98\xda\xf7\x14\x53\xbb\x59\x1a\x68\xd2\x37\x22\xc7\x18\xc2\xe9\xae\xf2\xe0\x83\x96\x03\xc4\xf5\xa2\x10\xd3\xfc\xc6\x79\xc1\x31\x8e\x71\x3f\xb1\x70\x4b\xbd\x5b\xdd\xa6\x4c\x47\x5c\xaa\x5c\x58\xd1\xd0\xc2\xd0\xdd\x6a\x7e\x76\xa6\xfd\x54\x69\xa6\xb8\xe8\xc3\x57\x24\x52\x5c\x23\xb2\x3b\x48\x09\x55\x0f\x49\x62\x1a\x7b\xa4\x44\x82\x3c\x68\xc6\xf1\xc9\x39\x29\x79\xef\xee\x3e\xae\x60\xd4\xad\x20\x6c\x0c\x89\x3e\x94\x90\xf4\x43\xc7\x60\xa1\xf8\xb2\xa8\xa3\x3b\xee\x6b\x69\xe0\x22\xba\x56\xca\xcc\x29\x51\x74\x1d\xae\x3b\x5d\x44\xa4\xaa\x25\xec\xff\x24\x48\x6b\xa6\xe0\x43\x91\x31\xc2\xe2\xd7\x34\xd8\x3c\x44\xf8\x14\x85\xba\x27\xc3\x75\x50\x7e\x30\x8f\xe1\x98\x4c\x06\x34\xbc\x6c\xbf\xd4\x19\x2f\x00\xcf\x2d\xd9\x7c\x9f\xb0\xb9\x1d\xac\xfd\x7c\x60\x90\x98\xdb\x56\x09\x62\x70\x9c\x5f\x9f\x4c\xf8\x37\x47\xeb\x86\x11\x57\x86\x76\xdb\x00\x76\xba\xbb\xb6\x21\x1a\x44\x41\xe5\x5e\x4f\xc3\xbb\x21\xb8\xa9\x0f\x55\xcf\xeb\x29\x7b\x9e\x26\x6d\x76\xec\xc8\xb5\xc4\xf7\x81\x07\x9c\xdd\xd8\xa3\x0a\x6c\x5c\x7f\x79\x7a\x71\x71\xf1\x29\xdd\x68\x52\xfa\xdc\xc5\x50\xc9\xac\xba\x29\x27\x49\x5d\x37\x74\xf6\x61\x76\xd9\xe0\x7d\x17\x3d\xc7\xaa\x42\xa9\x01\x57\x73\x12\x7d\x8f\x10\x6e\x75\x53\x31\xb5\x7f\x7c\x6b\x91\x1b\xda\x14\x47\x84\x6f\x3b\x2a\x53\x68\xee\xf0\x8e\x38\x61\xaa\xee\x25\xfe\x21\x35\xe2\xcb\xbe\x50\xa2\x89\xa5\x13\x2f\xf5\x70\xd4\xc5\x2f\xf4\x2a\x7b\xe9\x5e\x4c\x63\x3f\xad\xc1\xaf\x34\x66\x6a\xde\x59\xc0\x1a\x52\x28\x59\x29\x50\xae\xfc\xaf\xfb\x5b\xb8\xbd\xc1\x50\xd3\xfe\x89\xb1\x5c\xcc\x65\x99\x84\x18\x56\xb5\xb8\x93\xaa\xd1\xc5\xca\x3d\x1c\x08\xaf\x02\x51\x02\xba\x80\x82\xdc\x31\xe4\xc5\x13\x76\x24\x23\x7c\xad\x10\xaa\x13\xb2\x37\x67\x74\x33\xd3\x46\x9a\x06\x74\x18\x62\x8f\x09\x6c\x9d\x25\x04\xd5\x4e\x8e\xc4\x9f\x56\x39\xc8\xf6\x2c\x75\x1a\x03\xba\x8c\x2a\x4d\x76\xdf\x8d\x62\x45\xd7\xb3\x10\x80\x3e\x2c\x1b\x4f\xc7\x3d\x37\xe2\x69\x19\x18\xca\x8c\x0f\xb1\x6d\x2c\xb3\x5a\x8c\x72\x9e\x86\x83\x32\xeb\x17\x55\x34\x4b\x71\xdd\xcc\x2a\x6e\x16\x2f\xcb\x3b\x4f\xf4\x89\x25\x34\x14\xa0\x3c\x1a\xc3\xee\x60\x6c\xda\x04\x70\xac\xdf\xb4\xbc\x39\xd7\x46\xd5\xfc\x66\x23\x9b\x7e\xe2\xb7\x82\x81\xdf\x8b\x27\xf1\x02\x0e\x56\xc6\x4b\xcc\x67\x36\x44\x71\x5e\x86\xb9\x30\x35\x1f\x8e\x58\xdc\x22\xc2\x6c\x1f\xc2\xa2\x6d\x30\xd3\xaa\x80\x4a\xf9\xc3\xc5\x4b\x87\x29\x0c\x3e\xcc\x6d\x08\xdc\x1d\x33\xa5\xf9\x6f\xd7\x85\xba\x3f\x04\xe5\xc9\x91\x37\x48\x7d\xb7\x07\xf6\x88\x3d\xd6\xb9\x48\x70\x94\x1a\xec\x84\xa2\xa7\x3c\xde\x31\x99\x33\xe3\xd9\xad\x91\xd9\xed\x50\xac\xce\xa1\x19\xe3\xc7\x7b\xa4\x4c\x09\xf8\x41\x49\xa1\xd3\x72\x04\x8b\x94\xda\x63\xd6\xf6\xec\x70\x01\x78\xb2\x04\x08\x76\xea\x04\x16\x38\x92\x06\x2f\x6d\x4f\xfb\x4f\x7e\x71\xa5\x39\xa1\x86\x6f\x47\x73\x3a\x5d\x04\x35\xcb\x7c\xe6\xb2\xcb\x54\x34\xca\x23\x83\x67\xc9\xa7\xd3\xff\x36\x10\xef\xe9\x7e\x17\x1f\xaa\x9a\xd1\x7d\x54\xec\xee\x70\x36\xf3\xb3\xe9\x7f\x1b\x20\xcf\x5c\xd5\x2c\xf9\x32\x10\x8c\xb1\xcf\xa6\xff\x6d\xa2\x54\xad\x44\x17\x82\x6f\x39\x1a\x4c\xea\xf2\xcc\x40\x7b\x0a\x59\x53\x00\x3b\x0a\x2d\xcb\x0a\xc1\xcb\xa6\xea\xa4\x57\x1d\x87\xe9\xe8\x16\xc6\x2a\xeb\x58\xd7\x00\xce\xca\x5b\x0b\xc0\x5d\xc2\x20\x57\xe4\xbc\x6f\x8b\x63\x8e\x59\x4b\x95\xa3\xa7\x3d\x0f\x47\xc8\x56\x7c\x6c\xe0\xc4\xf6\x32\xf3\xcb\x38\x8c\xd6\x60\x43\xb7\xcd\xfd\x18\x1d\x62\x51\x5a\xfb\x07\x72\x79\xf4\xc4\x11\x10\xfe\x44\x7e\x5c\x63\xd5\x01\x2a\x5e\x4d\x79\xbc\x03\x8c\x01\xf2\x94\x2a\x17\xbf\xb3\x97\x00\x30\xce\xbd\xb2\x10\x67\x2b\x97\x6c\xae\x43\x55\x31\x37\x00\xda\xe2\x33\xd5\x18\x0c\x23\x8f\xeb\x1d\x94\xb9\x5f\x05\x5b\x98\x75\x13\xb6\xf4\xea\xd2\x37\x41\xb1\xd3\x25\x6a\x53\x1e\x56\x94\x21\x0e\x13\xa7\x1c\xb7\x56\xfa\xd2\xad\x2c\xf3\x6f\xe3\x50\x69\xad\x9a\x3a\x13\x50\xcc\x7a\x21\x02\x9d\x28\x8d\x92\x56\x1b\x12\x36\x18\xe4\x33\x91\x94\xe0\x6a\x0f\x9d\x0e\xbb\x7e\x48\x00\xea\x13\xab\xbb\x83\x0e\x0c\xf8\x9d\x32\x8b\x7e\xae\x86\x7b\x29\x2d\x4a\x27\x13\xdd\xda\x13\x11\x2f\x78\x5f\x64\x73\x8f\x08\x5a\x99\x78\x82\xf0\xfa\xa4\xef\xe5\x9d\xa4\xfe\x3c\xef\x54\xe1\x5c\x6b\x85\x5c\xca\xc1\xf0\xd9\x48\xd2\x5e\xab\x97\x58\xe9\xe6\x1d\x97\x25\xd5\x39\xa8\xd9\x4f\xee\x86\x1f\x02\x6d\x7f\xbb\x16\xb5\xe4\xc5\xef\x4c\xd8\x91\xe8\x36\xcf\x3e\x80\xfd\x78\x29\xcb\x30\xae\x4b\xdf\xfc\xed\x85\xd4\x75\x53\x19\x79\xb7\xb9\xaa\xb5\xdd\xec\x21\xa4\xe0\x9c\x04\x57\x94\xbc\x96\x8a\xb2\xaf\xda\xa0\x27\x2e\xfa\x3c\x70\x08\xd0\xa2\xd3\x3a\xd7\xac\xa2\x6b\xc0\xf0\x29\x5e\x30\x02\x49\x3a\x4b\xfe\xcb\x01\x7a\x5b\x0d\xd1\xa5\x37\x50\x69\x92\x90\x1d\x6e\x3b\xed\xcf\x98\x12\xc9\x8b\x5d\x89\x7e\x2d\xcb\x1b\x24\x79\xa0\x38\x80\xf4\x67\x25\x18\x25\xb3\x64\x2c\x34\xce\xda\x8e\xbf\x05\xad\x93\xba\x04\x2d\xfa\x58\xcd\xe1\xb4\x49\x8e\x55\xda\x60\x40\x91\x33\x7b\x36\xf4\x21\x70\xee\x32\x92\xa8\xee\xf2\x28\x11\x39\x28\x49\x85\x89\xa1\xae\x17\x54\x8b\x0b\xa2\xcc\xbb\x67\x87\xed\x98\x80\xe1\xe2\xff\x78\x73\xbd\x99\xd2\x20\xbf\x2f\x3f\x18\x51\xe6\x22\x67\x69\xfc\xf8\xb5\x30\x16\x08\xbb\x2c\xb8\x4e\x0a\xa1\x91\xf5\xa7\x4a\x7c\x0f\xa5\xdc\x65\x42\xd4\x82\xd4\x88\x6b\x4b\x45\x19\xe9\x76\xb9\x81\xda\x59\x8a\xa5\xaa\x29\x35\xa5\x6a\xb6\x3e\x46\x5f\x5e\xfd\x8c\x79\x3f\x08\x86\x46\x89\x06\xe9\x64\xc6\x60\x8c\x0a\xbf\x13\x76\x36\x34\x19\x2c\xc5\x71\xa5\xf2\x7f\xbc\xb9\xfe\xa1\xe1\x35\x2f\x8d\x18\x55\x35\x1b\xc8\x3e\x1c\xa3\xef\x5b\x95\x0d\xf7\x47\x8b\xa9\x5f\x8b\x6b\xfb\xb6\xcb\x4b\xe4\x45\xe1\x21\x80\x62\xbc\x95\x45\x11\xee\x42\xb6\xcc\x3b\xac\xe2\xcb\x6b\x6d\xe2\x30\x6e\x30\xe8\xce\x70\xd7\xc2\xcc\x4f\x4d\xf7\x07\x6f\x45\x26\xe4\x1d\x29\x8b\xb9\x14\x45\xbc\x7f\x45\xd7\xe1\xad\x0e\x6a\x08\x0a\x5a\x5a\xfa\x62\x3a\xae\x5e\x1e\x8d\xaa\x42\x9e\x6f\x48\x61\x9c\x26\x26\x4c\x92\x57\x1a\x46\x50\xea\x36\x4e\x41\x8e\xb2\xfe\xfd\x15\xbb\xcf\x44\x4d\xbe\x9a\xb2\xef\x42\xc3\x35\xba\x89\xf7\x29\xcb\x9d\x1e\x70\x71\xad\x07\xca\xc6\xbc\xa7\x56\x2a\xe4\x89\xef\xc7\xb6\x95\x90\xc6\x91\x8f\xe0\x14\x4b\x84\x01\xae\x79\xc1\x04\x92\x98\x9a\xe6\x73\x82\x28\x8c\xc7\x0a\x6c\x4d\xf4\x77\x31\x22\x11\xa9\xc6\x0a\x67\x2d\xde\xdb\x61\xdb\x02\xfa\x3c\x5f\x4a\x0d\xd6\xe0\xbd\x98\x59\x94\x26\x58\x80\x61\xd9\x18\xbc\x89\xa1\x9f\xdb\x9b\xa2\x15\x57\x5e\xc9\xf3\x25\xb7\x0b\x5c\xd4\xab\xdf\x03\xa8\x5f\xf1\x13\xf6\x5b\xb8\xf1\xfc\xe6\x12\xb3\x48\xed\x3b\xe5\xef\x30\x84\xd3\xcf\x9d\x91\x9c\xe0\x43\x79\x9c\x51\xc2\xfd\xf4\xa2\x03\xc5\xf3\x07\x94\xa8\x86\x6b\xaa\x24\xdf\x70\xca\x9e\x1b\x23\x96\x15\xd5\xcc\x53\x38\x6d\x4b\xdc\x7e\x08\x41\x97\xf9\xac\xae\xbf\x01\x50\xb8\x33\x71\x91\x03\xf8\xa9\x2b\x9e\x13\x7f\xee\xb6\x5d\xcb\x7e\xc8\x61\xa7\xe1\x21\x82\xc7\x15\xf1\xa0\x02\x2c\x7f\xc3\xac\x76\xf8\x77\x22\x80\x30\x4b\x68\xe8\x10\x3e\xc6\x9d\x63\x3b\xcc\x43\x29\x22\x94\xd1\xa8\xb2\x07\x12\xaa\x1f\x90\x9b\x83\xab\x2c\xd7\x9d\x03\xdd\x38\x0d\xce\x83\x4a\xab\xbb\x79\x8c\xd8\xd1\x78\x25\xbd\x8c\x3d\x21\xbc\xc6\x0a\x31\x75\x24\x3c\x89\x18\xf7\x8c\xb5\x93\x20\x77\xe1\xfc\x01\x44\x99\x7e\x8d\x45\x39\x17\xa5\x3c\x94\x24\x77\xa5\x18\xe5\x70\x1f\x49\xee\x9f\x42\x38\x54\x91\x24\xd3\x34\x8e\x27\xc8\x54\xf9\xa8\xad\xdf\x0e\x2a\xc7\x2e\x61\xf5\x09\x0c\x16\x7a\x99\x76\x94\xea\x78\x81\x7e\x2b\x6e\x24\x94\x0d\x88\xa0\xf0\xf6\xec\x52\xae\x24\x05\x28\x62\xf1\x33\x0a\x2f\xce\xab\xaa\x58\x39\x3b\x82\x98\x14\xa2\x22\xb0\x58\xfc\x06\x26\xc6\x50\x3d\x17\x51\x19\x45\xaa\x2a\x2e\x05\xe5\x30\x35\x6a\xfd\xf8\x48\x31\x0c\xf9\xdd\x02\x13\xba\x43\xef\x60\x70\x74\x79\xea\xaa\x99\x93\x48\x54\x8f\x76\xdb\x49\xa6\x22\x38\x8f\x54\xaa\x72\x51\xae\x22\x98\xbb\xc8\x14\xca\x53\x08\xe2\xd8\x4a\xa6\xda\xe3\x1f\x4f\xa2\x60\x24\x6e\x0c\xcf\xda\xb7\x4c\xfb\xc9\x50\x7a\xb6\xe4\xbe\xb6\xae\x1f\x8d\xe2\xed\x46\x4b\x4d\xb9\x49\x56\xd0\x82\x07\x95\x0e\xa1\x36\xa5\xdd\x4d\x9c\x1b\x41\xe1\x79\xeb\x4c\xd3\xe8\x4c\x37\xb3\x73\x77\xae\xf5\x1b\x08\x1c\x74\xe8\x85\xb0\xc9\x1c\x79\x8f\x00\x9a\x50\xff\x39\x7f\xd2\x8e\x2a\xc3\xf5\xd6\x42\x3e\x1a\x73\x7a\x11\x01\x4f\x5b\x54\xc5\xcf\x97\x84\x3a\x12\xf3\x5a\x63\xfa\x45\xe4\xc7\x55\xf3\x36\xa2\x3a\x65\x22\xd2\xaf\x8b\xb4\xa0\xef\x5c\x62\x11\x7e\x7b\x6a\x66\x3b\x6b\xe4\x24\x1c\xad\xc8\x1d\x8c\xf4\x5e\xf2\xca\xd3\xf7\xd0\xec\xb3\x2f\x19\xdd\x1d\x90\x1a\xa0\x77\xd8\x03\x0d\xf3\xa0\xd0\x88\xe4\x25\xf9\xf0\x93\x0f\x35\x04\x7a\x21\x0f\x9f\x60\x15\x47\xff\x7a\x70\xc9\xa6\x9f\x50\x19\xbd\x14\x74\x8b\xbf\xec\x79\xd9\xa7\x90\x1d\x48\x72\xa2\x70\x48\xa6\xe3\xb1\xc6\x5f\xf0\xf2\xa6\x9d\xb1\x14\xbd\x40\x2e\x45\x48\xef\x99\xf8\xde\x48\xae\x74\x88\x27\xfb\x38\x6c\x5a\x53\xf0\x33\xa4\xbc\x17\x3b\xee\x42\x1a\x41\x65\x71\xac\x18\xe9\x8a\x67\x82\xcd\xb8\x0e\xbe\x06\x87\x5a\x78\xdc\x29\x22\x46\x91\xa8\xa7\xd6\x70\x10\xe2\x22\x7b\xca\x17\x1d\x6c\x21\xd0\x5a\xcb\xb7\x97\xf7\xc0\xd1\x58\x2b\x0d\x4e\xc0\x5b\x09\xad\x93\x9c\xe7\xe4\xf0\xa7\xc9\x09\xcb\x39\x3e\x4f\xa6\x8d\x16\xaa\x54\xb5\x13\xdb\x63\xb1\x21\x19\x64\x03\x0b\x7e\xc6\xe8\x83\x94\xfe\xf7\xdc\x6a\x95\x2f\x7c\x9a\x1c\x79\xd9\x41\xdb\x80\x11\x89\x66\x14\xc4\x92\x91\x5b\xcf\xaf\x3b\x07\xc8\xb5\xd8\x98\x51\xcb\x58\xe8\x8f\x41\x38\x69\xdf\x6e\xa7\x81\xfa\x5d\xd0\xad\x86\x22\xa9\xa2\xa3\x25\x1e\xa6\xa3\xdc\x82\xb9\xbc\x61\x56\x9d\x62\x28\x18\xcf\x92\x01\xa6\xec\xad\x73\x96\x63\x8d\x4b\x9a\x3f\x5d\x1d\x04\x07\xa4\x2b\xce\x92\x68\x10\xa9\x59\x21\xb4\xb6\xf3\x2f\xa3\x99\xf7\xe0\x29\x35\xe5\xd7\xfa\xe1\x7c\x22\xa3\x35\x90\x5b\xc3\x76\x3f\x96\x37\xa5\xaa\x45\x1b\x5b\x6b\x03\x47\x9f\x6e\xc6\x36\xca\x62\xfc\xcb\xb2\xc9\x16\xac\x50\xe5\x0d\xb6\x88\x4d\x15\x91\x65\x26\xcb\x69\xdb\xf8\xf4\x98\x4a\x47\xea\x4c\xdd\x89\x7a\xc5\x72\x95\x35\x14\xcc\x75\x14\x01\x97\x65\x56\x34\x79\x98\x62\x30\x2b\x64\xd9\x83\xc6\xa6\x82\x6b\xef\x16\x22\x6c\xb7\x35\xe8\x24\x3a\x0c\xe1\x75\x03\xd4\x8a\xbe\xa9\x55\x53\xb9\x40\x40\xa9\x43\x8b\x41\x4b\x2e\xbc\xae\xec\x8e\x3c\xdd\x08\xfb\xc9\xdd\xd3\x00\xfe\xc9\x9d\xa8\xb5\xdb\xaf\x30\x04\xa8\x3b\xd4\xe0\x30\xce\x71\x40\x54\x69\xb9\x70\xdc\xde\x18\x8e\x82\xfd\xef\xb5\x4c\x34\x40\x20\x19\xff\xc9\x86\xe9\x0c\x91\xe2\x78\x82\xa7\xea\x5c\xd4\x22\x27\x02\x1c\x6f\x7b\x23\xbf\x43\x30\xeb\xb6\xf7\xe9\xf4\xdb\x72\x78\xf1\x72\xaf\x82\x2b\x34\x58\x77\x91\x47\x91\xec\xb3\xd2\xb5\xa8\xca\xad\x82\x82\xfa\x68\xec\x56\xac\x52\x45\x67\xd1\xe3\x05\x06\xed\x2c\xa0\xc1\xb8\xcf\x65\xba\x15\xab\x49\x38\x25\x97\xca\x2c\xa8\xb3\xb4\x83\x18\x01\xb3\xff\xe4\x79\x1e\xaa\xc4\xcf\x65\xad\x8d\x9f\x86\xd4\xde\xab\x19\x5b\x9c\xe9\x56\xec\xf5\xf6\xdf\xb0\x84\xf6\xad\x58\x45\x81\x0f\x00\xdc\x9d\xe8\xfd\xab\x47\x94\x16\xc7\xc5\xd4\x42\x38\xb6\xcc\xb4\xec\x91\xdd\xec\x22\x04\xa6\xbb\xf6\xcd\xd0\xd5\x42\x7b\xd8\xc4\x43\xdb\x7a\xe6\x38\x72\xfc\xcb\x86\x01\x9a\xa0\x6b\x5a\xce\xe7\xa2\x86\x30\x1b\xa3\xec\xa2\x26\x95\x78\x62\xfe\xac\xc5\x65\x4f\xee\xb5\xcf\xd1\xcc\xdb\xb3\xd8\xcf\x1e\x0e\x5f\xb8\x9e\x22\x50\x6b\x8c\x61\x8c\x20\xbd\x7b\x0a\x15\x8b\x13\x4c\xa3\x6b\xe7\x9e\x53\x78\xec\x64\x5b\x03\x9e\xda\xee\xdf\x3d\xb3\xf0\xf1\x96\x35\x19\xa3\xbd\xf2\xab\x41\xa0\x74\x0b\x53\x8a\x7b\xbc\x15\x87\xf9\x82\xdd\x87\x22\x59\xf9\xa2\xd6\xfe\x5c\x8d\x81\xad\x49\x41\xce\x07\x92\xcc\xaa\x6e\x4a\xf4\x6e\x9d\x5c\x10\x69\xe8\xb1\x72\xd7\xbd\x22\x0e\xda\x1d\xe8\x8e\x1e\x01\x1c\x89\x4c\xf9\xa9\xff\x9c\x5c\xcf\x6b\x04\xc2\x55\xfc\xcc\x16\x62\xc9\xa9\x66\x03\x5a\x64\x3a\xf4\x7c\xa2\x38\x37\xbb\x3b\x61\xd9\x10\xab\xf5\x93\xad\xc4\x61\x97\x28\xaf\xce\xc0\x7f\xa3\x6d\x07\xd0\xa6\x61\x9c\x15\xe8\x83\x13\x97\xbc\x7d\xcb\x86\x96\x3b\x08\x99\xb5\xca\xdd\x87\x7d\x1f\xe1\xd5\x14\x25\x75\xf8\xcd\xec\x98\x12\xe6\x89\x48\x5d\xe3\x8e\x2f\x56\xce\x43\x84\x0e\x74\xdf\x57\x1a\xcb\x59\x78\x9c\x76\xb7\x67\x22\xf3\xa1\x6c\x35\xf6\xb4\x1a\x41\xe5\x7a\xf8\xac\x5e\xa9\x1c\x99\x9c\x7e\xd7\xb2\x10\x16\x82\xbd\xa3\xae\x05\x52\x95\x54\xc7\xf2\x2a\xb4\xc7\x0c\x47\x78\x98\xdb\x51\x37\xb0\xe0\x9b\xcb\x54\x69\x6a\x55\x84\x4c\x55\x74\x04\xf5\x9a\x79\x98\x0b\x8a\xcb\xed\x58\xec\xa6\xbc\x02\xe7\x8e\x24\xee\x43\xee\x26\x06\xaf\xc6\x0e\xdd\x7e\x63\x94\x30\x1c\x2b\x0c\xa9\x8e\xa1\x01\xd1\xfb\x5b\xae\x36\x0f\x17\x13\xa5\xff\x5a\x39\x2a\xa5\xbd\x0e\x61\x32\x2e\xfd\x6d\x50\x2b\xa0\x37\x4a\xfe\x1e\xbc\x30\x5f\x13\x7a\x91\x2a\xac\xe3\x49\x16\x64\xab\x64\x85\xd2\xa2\xdd\x35\xf7\x60\x22\xd2\x94\x99\x2a\x73\xd0\xe4\x50\x0d\xab\x16\x30\xe9\x40\x38\x2b\xc0\x11\x1e\x9e\x56\x5b\x5b\x3d\xb4\x4f\xc4\xb0\x5c\x67\xe2\x32\xf7\x7d\xf3\x2f\x9f\xb3\x59\x53\xe6\xd4\x8b\x51\x2b\xda\x50\x0c\xf5\x96\xb2\x4c\xc0\x40\xb2\x20\x1e\x11\xae\xf0\x32\x65\x47\x60\x6e\x79\x9b\xa8\x21\xb8\xe1\x38\x5e\x3e\x7e\x73\x53\x8b\x1b\x6e\x54\x7d\x4e\x19\xd4\xfa\xdc\x2c\xc4\xb9\xe6\xcb\xaa\x10\x96\x67\x18\x7e\x36\x82\x9f\x1e\x12\xbb\x0e\x9d\xa9\x68\x29\xbb\xec\x6c\x3b\xc7\xa7\xd3\xa7\x5f\xb1\x6b\x80\x8f\xc6\xd7\xd5\x2b\x68\x81\x20\xea\x28\xa5\x11\x1b\x0b\x9b\x18\xea\xf8\xf6\xc7\xb0\x47\xb6\x26\x00\xe8\x63\xc6\x01\x20\x80\xb7\x00\xcb\x0a\x92\x41\xe0\xee\x95\xdc\x60\xf0\x14\x4a\x96\xc1\x2d\x35\x39\xc6\xbb\xf8\x3c\x79\x7e\xf5\xea\x1c\xf1\xee\x30\xa3\xa7\x47\x50\xc2\x8c\x40\xf5\x36\x3f\x2e\xd1\x7e\x78\xeb\x0c\x97\x17\xc1\x70\xb9\x54\xa5\x33\xe1\x7f\x75\x2b\x2e\x83\xdf\x0c\x5b\xca\x0f\x91\x85\x5f\x48\x3d\xc2\x7b\x85\x43\xb9\x91\x02\xf4\x8d\xeb\x31\xae\xc3\x10\xf1\xd8\xe1\x02\x37\x11\x6c\xa1\x96\xea\x46\x94\x42\x35\x1a\x43\x94\xd4\x9c\x5d\xbe\x1d\xad\x98\x39\x81\x4b\xee\x90\x28\xb6\x72\xd0\xb6\x6b\x35\xd6\x6a\xbf\x48\x96\x3f\x37\x96\x47\xec\x32\xb4\x3b\x59\x63\x2d\x52\x2e\x8e\xdb\xf6\xef\x9e\x75\x0e\x25\xbd\xf0\x9f\x25\xbb\x81\x0f\xd1\x6a\x1f\x9e\x10\x51\xfb\xfe\xdf\x28\x2f\x48\x1b\x77\x55\x04\xeb\xdd\xf5\x29\x81\xdd\xa1\x73\xf4\xc2\x91\xb6\xd5\x04\x59\x9d\xbf\x0f\xc4\x7d\x3f\xa0\x18\x76\x12\x44\xb4\x2a\xb6\xf5\x4d\x1c\x4b\x10\x61\xb1\x5f\xbe\xb5\x67\x4b\xa3\xe0\x1f\xcf\x4e\x29\x7e\x77\x4f\x07\x1d\x1d\x1a\x23\xe0\x78\x6e\x77\x0a\xe0\x62\x5a\xf1\xff\xd4\x2c\x9d\x60\x47\xa6\x6d\x59\x15\xc9\xc4\xaf\x70\xf8\x5d\xcf\xa9\x0d\x1f\x63\x53\xa8\xae\x00\xc5\xcb\x71\x9c\x79\xe7\x57\xe8\xf0\x8c\x93\xf5\x89\x23\x4b\x17\x59\x43\xa4\x20\xfb\x8b\x3a\x57\xf9\x10\x01\xc8\xa0\x5b\xc5\xa6\x1d\xe5\x1d\xed\xc2\x34\x18\x6b\x1b\x3e\x8d\x8d\x05\x18\xa4\x75\xd0\x1e\xeb\x99\x75\x2d\xed\xfe\x39\x0c\xc7\x55\xef\x79\xe2\xfb\x50\x6c\x66\x1b\xde\x06\xa9\xfa\x56\x8f\x4e\x64\xb0\xc6\x81\xf8\x60\x04\x25\x31\x16\xd2\x9d\x8e\xb1\xe4\x01\xe3\xac\xe6\x65\xae\x96\xeb\x96\x25\x0a\x1f\x42\xdc\xa0\xee\xc9\xc2\x76\x6d\xcd\x98\xa4\xdb\x09\x7f\x25\x1c\x87\x95\x24\x36\xfa\x56\xfd\xad\x52\x39\x00\x74\xde\x3b\x74\xde\x47\x98\x6f\x21\x18\x94\x3c\x10\xc7\x29\x3d\x02\x29\xb9\xc1\x4a\x69\x3e\x32\xf0\x89\x6f\x97\xb2\xf6\x7e\x9f\xf5\x4d\x67\x4b\xc9\x59\xa7\xa7\x93\x38\x64\x9e\x27\x71\x3f\x95\x5f\xfe\xd2\xe8\x3e\x3c\x30\x7c\xda\x3b\x11\x12\x14\x23\xdb\xde\x09\xc6\x9d\x84\xc6\x7c\xce\x82\xd0\xcd\x4c\x8b\x7f\x35\x02\x92\xe1\xf8\xb8\x44\xaf\x23\x88\xcb\x2e\x26\xe2\x11\xe4\x83\x82\xea\xc7\xa8\xfc\xfd\xf5\xc6\xc4\x29\x8d\xa7\x17\x18\x4f\x2e\xf2\x35\x03\x6b\x7f\xcb\xe4\xcc\xb7\xa5\xab\x76\xd0\xea\x24\xb5\xc1\x76\x4b\x7b\xa1\x92\xfb\x6f\xcd\xb8\xdd\xf6\xac\xeb\xf1\x64\x77\x92\x47\xe9\x1d\x71\xe7\x56\x74\x62\xee\xd8\xb5\x75\x04\xa6\x0f\x23\xbb\xdb\xf8\x1d\xf7\x96\xe0\x9e\xe9\xd3\xe0\x90\xca\x98\xa4\x38\x82\xc1\x49\x27\x86\x83\x69\x2b\xef\x6a\xa0\x91\xfd\x01\xe4\xf2\x2d\x34\xed\x24\xd6\xc3\x33\x2a\x14\xcb\x73\x6b\xed\x36\xa5\xc1\xb6\x2a\xfe\xa9\xd4\xee\x4a\x22\x9c\x62\xe8\x06\xd5\x02\x7b\x8b\x29\x19\xf4\x36\xdd\xb2\xe6\xb9\xff\xdc\xce\xd7\xbd\x1f\x6e\x40\xd2\xe1\xc2\xed\x08\xe4\xc4\x91\x37\x13\x3b\x4a\xa8\x22\x45\x56\x1b\xbe\xea\xca\xd0\xa6\xb3\xf3\x81\x64\xc8\x5d\xf1\x9f\x40\x84\xe8\x84\xe2\xe2\x3e\xd6\xb0\x7a\xcf\x50\x90\xef\x85\xb5\x63\x21\xce\x61\xe2\xc2\x1d\x2a\xe9\xd5\xa0\xa6\x30\x07\x6c\xf9\x3d\xfc\x7c\x38\x0c\x42\xe3\xa7\xc2\xf9\x5a\xc4\x0a\x5a\xa6\x67\x20\x8e\x43\x64\x5a\x37\x44\x74\x96\xad\xa3\x3e\xe6\x27\x54\x2c\x6f\x2a\x51\xda\xcd\xe2\xaa\x99\x15\x52\x2f\xac\x21\xa5\x2a\xec\xfe\x59\xde\x8c\xbf\xbf\x4d\x67\x4f\xc0\x1c\xec\xf5\xe2\x81\x99\x50\x3a\x96\x03\x54\x24\x95\xc8\x30\xfd\x54\x95\xc2\xfb\x76\x6e\x84\xd1\x94\xb0\x9b\xbb\xb4\x86\x19\x25\x89\x8e\x8f\x8e\xdf\x78\x41\xe6\x1b\x18\xd0\xb8\x7a\xea\x28\xe5\x96\xb0\xdf\x7e\xfc\xdd\x15\x4e\x9a\xca\xbc\xac\xdd\xe0\xa2\x2c\x8d\x9e\x9b\xdd\xd6\xf5\x2d\xd4\x3b\x86\x23\x58\x74\x33\xd7\x41\xab\x83\x92\xbb\x84\x75\x7d\x78\x09\x92\xdb\x95\x23\x20\xbe\x70\x7b\xa9\x5c\x1c\x1a\x35\x2b\xde\xe5\x48\x47\x64\x78\xaf\x2a\x51\xf2\x4a\x6e\x2d\x7f\x0e\xa9\x1a\xc4\xed\xa8\x92\x87\xa4\xc1\x6b\xf1\xc0\xbd\x35\x72\x87\x38\x1d\x53\xcc\xfe\x76\x48\x31\x7b\x0b\xe8\x46\x62\x83\x31\x64\x34\x94\x13\xa5\x35\x38\xde\x49\xce\x38\x9e\x08\xfe\xb6\x5e\xd0\xe8\x00\x01\x07\x8a\xb9\x35\xbf\xa8\xbc\xbf\x45\xe0\x41\xc4\x08\xc8\xfb\xe1\x1c\xee\x84\xeb\x3b\x71\xde\x94\xb7\xa5\xba\x2f\xcf\xe9\x2e\x9a\x1b\x28\x88\x7c\x54\xf1\x42\x0b\xc8\x72\xe9\xf2\xed\x0b\x46\x98\x40\x49\x75\xc4\x85\x05\x5c\xa2\x5b\x6d\x8b\xd6\xe1\x04\x6c\x90\x02\x3d\x97\xf0\x76\xe4\xa1\x5b\x3c\xbc\x7a\xe6\xae\x49\x76\x67\xe0\x89\xb7\xc2\x6f\x9b\x99\xc8\x4c\xf1\x37\x3a\x74\x9c\x6b\x99\x87\x0c\x3c\x17\xcd\xcf\xb3\x4c\x54\xc6\x13\x02\xcb\x31\x1a\x19\x47\x10\x13\x1c\x0a\xa4\xac\x0a\x2e\xc9\x9e\x8f\x0b\xf2\x42\xc7\xdb\x3e\x21\xfe\xaf\x57\xaf\x5f\x3c\x46\xb9\x93\x25\x13\xcb\x99\xc8\x5d\x18\x04\x9e\xee\x1e\x85\x18\x42\x36\xa7\xc7\xce\x5d\xa7\x9e\x4e\x12\xbb\x83\xef\x2c\x8c\xa8\xe7\x24\x7f\x10\x61\xe4\xa6\x6f\xae\x01\xaa\xdd\x69\x9b\x90\x73\x82\x37\xff\x02\xb2\x52\xb0\xda\xc8\x83\x89\x6d\x44\x18\x54\x09\x27\x94\xcb\x7e\x04\x0e\x27\x7e\x49\x1a\x2d\x01\xa7\xae\x25\x2e\xeb\x51\xcd\x43\x6a\x04\xaf\x6b\xbe\xc2\x53\x6d\x55\xcb\xa5\x34\xf2\x4e\x0c\x86\x38\x0c\xc8\x63\x6a\xd4\x51\x9c\x1f\x54\x15\x0c\xc2\x30\x19\x2f\xa6\x15\xd7\x3a\x0d\xd7\x6b\xc5\x4c\x50\xb3\x90\x8e\x18\x27\x17\xf6\xbe\x16\x61\x78\x8e\x77\xec\xeb\x86\xa6\x28\x03\x10\x78\x3f\x5c\x67\x75\x24\x2b\x03\x29\x1a\xad\x0e\x7a\xd8\xab\xad\xd7\x2c\x39\xff\x9d\xab\x2a\x38\xf8\x69\x77\x41\xc6\x43\xd2\x0a\xeb\x5e\xce\xb1\x78\xf4\xc7\xb9\x63\x9c\x7c\x93\x70\xc2\x72\xc4\xf5\x38\xca\x30\xb1\x47\xd1\x42\xdc\x89\xe2\xe3\xdc\x10\xdc\x59\x8b\x74\x0f\x7b\xf1\xf2\xfa\xf2\xed\xab\xab\x77\xaf\xde\xbc\x66\xda\xf0\xf2\x7f\xf8\xc3\x9c\xb0\x78\x0d\x8d\x0a\x20\x6b\x65\x44\x30\xdb\x41\xc4\xca\x9f\x74\x2e\xdf\xbe\x80\xa3\x47\x88\xcf\x46\x3c\xc6\xc7\xc7\x12\xa0\x75\x2e\x61\x5d\x71\x2c\xa0\xd8\x1e\xc5\x3b\xb5\x3b\x07\xae\x3d\x0f\x5b\x0f\xc9\xc8\x5b\x59\xe6\x0f\xc6\x47\x6d\x8f\x98\x98\x5f\x15\xd1\x15\x1c\x9e\x81\xf8\x80\xe1\x41\x39\xec\x8e\x2e\xc9\xe8\xf1\xf9\x16\x30\xe8\x91\x03\x40\x65\x0b\xae\x1f\xfe\x12\xe0\x80\x9c\x77\x52\xfc\x08\x98\x9f\x32\xdc\x3b\x19\x3e\x0e\x57\xc9\x11\x78\xf8\xc2\x79\x8f\x29\xcf\xb6\xc6\x5e\x95\x57\xb5\x98\x8b\xba\x16\xf9\x2f\x24\xa6\x16\x35\xc8\x86\xe5\x95\x44\x52\x6e\x66\xa6\x87\xed\xeb\x32\xe3\x0e\xb6\x06\xbc\x0b\x35\xfc\x01\x98\x35\x3e\x96\x90\xfb\xe8\x35\x48\x5f\x84\xea\x9d\xa6\x96\xe2\x4e\xe4\x53\xf6\x32\xc1\x9b\xcd\x55\x53\x46\xcd\x17\x7d\xcb\x53\xdc\xfd\x3a\xa8\x35\x25\x25\xed\x3a\x11\xd2\xcd\x7c\x2e\x3f\xd8\x31\xc4\x07\x08\x5f\x9c\x66\x6a\x39\xa6\x02\x73\xc2\x1b\xef\xb6\xef\x74\xd4\xb8\xa3\x4b\x50\x0a\x48\x0e\x17\x85\x9b\x29\x9e\x96\x5b\xee\x01\x01\x9d\x10\xee\x46\x5c\x52\x3c\xc7\xca\xa1\xfe\xed\x76\x2f\xbe\xf6\xed\x2a\x35\x2f\x72\x32\x0d\x34\xc6\x65\xb9\x10\x78\x81\x8c\xbd\x61\x45\x17\x6e\x5c\x93\xd1\x87\x45\xc3\x29\xb5\xa9\xe2\xcf\xd9\x6c\xe5\x2f\xfc\xd3\xc1\xdb\xc4\x7f\x76\xb1\x81\xf8\xfd\x35\x88\x81\x7a\x61\xe5\xf9\x62\xdb\xdb\xd2\x5d\xc4\x82\x59\x52\x45\x67\xaa\x35\x3d\x17\x26\x5b\x08\x6a\xb0\x0c\x2e\x4b\x91\x4f\x42\xad\x4b\x77\x91\xbd\xd1\x7b\xeb\x2f\x06\x11\xfc\x24\x14\x7c\x8e\x72\x6a\x91\xe0\xf8\xab\xd4\x6e\x38\x62\x20\x9d\xe8\xef\xd9\x12\xf3\x1c\x10\x04\xb6\x9a\x05\x10\x50\x89\xd5\xfe\xe6\xea\x9d\xe1\x7b\x2d\xa0\x11\xf7\xd2\x6a\x4b\x1d\x0e\xc2\xa5\x7c\x51\x0c\x04\x62\xed\xc8\xb3\x1f\x78\x3d\xe3\x37\x82\x5d\xa2\x88\xab\xda\xaf\x9c\x5c\x54\x85\x5a\x2d\x81\x38\x60\x1c\xf3\x1b\x34\x9e\x29\x3e\x7c\xc6\xb3\x5b\xbb\xa0\xcb\x11\x51\xf0\x6e\x94\xcc\x8d\xd2\x5a\x62\x6f\xaf\xfd\xea\x98\xad\xa2\x91\xc3\x0a\x28\x95\x61\xaa\xae\x16\x7c\x44\x92\x95\xbf\x6e\x0e\x80\x42\x7d\xd8\xaa\x90\x19\xd7\xc2\x4c\xd9\x9b\x12\x8a\xf7\xba\x1f\xe2\x25\x3a\x89\x23\x0d\xf0\x6e\xd9\x43\x8a\xcb\xf3\xbd\xa9\x70\x63\xb9\x0a\xe4\xc1\x74\x17\x57\x78\xf7\x3b\x4f\x24\x3c\xd3\xbf\x70\x61\x64\x2d\xa0\x71\x7c\x02\xba\xd4\x3d\x5a\x11\x61\x5a\x1f\x39\x91\xe1\x85\x56\xae\x48\x2b\x45\xdb\xcf\x44\xa1\xec\x28\xaa\xf5\x4d\xb7\x4c\xe0\x96\x61\x5c\x37\xc8\xc9\xf7\x9e\x93\xe3\x05\x8a\xe6\x64\xa2\x9c\x9c\x42\xd4\x93\x63\xcb\x16\x54\xc3\x89\x88\x58\x67\x7b\x4a\x55\xff\x3c\x50\x2c\x9e\x01\x0f\x48\xb6\xde\x5e\xc6\x32\x15\x17\xbe\xc1\x0c\xed\x76\xcb\x5c\xb7\x18\x2e\xb7\x11\x31\x80\x19\x89\x59\x2a\x62\x6f\x23\x5c\x2f\x03\xae\x78\x6e\xe5\x8d\xee\x92\xc7\x8a\x0f\xe6\xb5\x5e\x52\xd1\xa0\xc7\x23\x29\x98\x0a\xa7\xee\x4b\xc8\x52\x19\x73\x18\x1a\x14\x8e\x5b\x21\x2a\x5c\x69\x19\xe3\x40\x39\x0c\xed\xf0\x89\x28\x54\xb3\x09\xaf\xec\x9d\x92\xa6\x8c\xfb\x84\x33\x4c\xf3\x95\x66\x5a\x1d\x42\x7c\x96\xfc\x83\x5c\x36\x4b\x48\x85\xca\x38\x76\xf4\x84\x45\x3d\x13\xe6\x5e\x08\xf4\x8d\x3d\xbd\x80\x6d\xee\xe9\xc5\x85\x57\x13\x43\x02\x87\xd9\x36\x45\x81\x40\xec\x4c\xba\xc2\x86\xab\x61\x0b\x9d\xf6\xbd\xaa\xc5\x26\x61\xc3\x60\xd4\xd1\x02\xd7\x11\x36\x5f\x34\x7e\xe1\x66\x75\x52\x29\xac\x44\x99\x8b\x32\x5b\xb1\x91\xf6\xcb\xa0\x98\x51\xdc\xc2\xac\x50\xd9\xad\xdf\xdc\x08\x38\x1e\x39\x65\x9d\x15\x9b\x6a\x0d\xf8\xa8\xde\x5a\x20\xfd\x26\x21\x81\x7b\x89\xbc\x7b\x73\x0f\x2d\x6e\x04\x1c\xcc\x32\xa1\x99\x6e\xe0\x39\x14\x2b\xcf\x31\x0c\x65\xc1\x41\xa4\x3f\x9b\xd8\xff\x7e\xe6\xfe\x7c\x8a\xee\x6f\x95\x7f\xe6\x7e\x81\x24\x72\xd5\x06\x58\x0b\x5d\x59\x23\xf8\x4e\x14\x2b\x17\xbc\x87\x56\x98\x85\x11\x6f\x60\x50\xdd\x1d\xd4\xe0\x3b\xdc\x7c\x12\x6a\xfa\xfe\x01\x48\x15\x3c\x18\xa4\xf4\xa3\x70\xe6\x63\xf3\xd9\x9f\x35\x61\xae\xfb\x68\x13\x3b\x9b\x60\x36\xc1\x74\x8d\x0e\xaa\x14\x2c\x41\x70\xe3\xe3\x19\x09\x69\x6b\xc9\x8e\xff\xb2\x2f\x9e\x9d\x69\x28\x03\xe4\x42\xee\x62\x38\xc9\xca\xd8\x4f\xcd\xbc\xbd\x7c\x3a\x59\xaf\x6b\x28\xa2\x04\xf4\x4d\xbf\xae\xa1\x31\xb0\xb4\xd1\xf0\x40\xcf\xe0\x53\x2d\xdc\x76\x12\x89\x95\x9d\xe0\x82\x17\x73\x0c\x4e\x50\x5a\x74\x35\xd9\xd3\x75\xaa\x0c\xb5\x74\xaf\x3a\x7b\xba\xab\x2e\x03\x98\x7f\xf7\x48\xc5\xd6\x94\x5d\x17\x09\xfe\x41\x84\x23\x8d\xd5\x18\x64\x34\x4f\x43\xe7\x8d\x5c\x0a\x6d\xf8\xb2\xda\x62\x6b\x8e\xe4\x29\x60\x61\xe7\x0b\x7b\x1f\x72\x68\x15\xe4\xb7\x9f\x05\x63\x3a\x1e\x1e\x6a\xc7\x8e\x0f\x0b\x3d\xf6\x1c\xda\x58\x7b\x2c\x30\x04\x30\xe2\x9c\xb0\x89\xef\x52\xb3\x37\x08\xeb\xa3\x39\x43\x20\xbe\x41\x7a\xbc\x15\xd9\x3e\x3f\xe0\xfe\x3a\xfa\xf8\x80\x6a\x05\x29\xeb\x4e\xd4\xe9\x51\x62\xf0\xdb\x70\x8c\x70\x9f\x3f\x02\xeb\xf0\x88\x72\x37\x70\x86\x90\x73\x1f\x53\x1e\x6c\xc1\x7f\x27\x53\xb0\x2d\x9a\x6b\x14\x5b\x70\x6e\x8c\x31\x03\x8f\x26\x56\xbe\xe4\xe7\xb9\x53\xd2\xe7\x14\x99\x7a\x3e\xee\x44\xf1\xda\x01\x88\xda\x61\xf5\xf9\xad\xc8\x06\xb2\x94\x8e\xe2\x5f\xa9\xd3\x0a\x8f\x4a\x8f\x46\x3e\xa0\xf1\xfe\x5a\x39\x1f\x82\x01\x79\x5d\xf1\xe8\x7e\xe4\x79\x4d\xc1\x0a\x00\xc1\x7f\xdc\xf1\xbc\x3e\xdd\x40\xe3\xf0\xe5\x78\xda\x42\x30\x52\xd6\xe9\x45\xb9\x1f\x7d\x23\xa0\x2c\x99\xe9\xc9\x68\xec\x30\x88\x47\x07\x6c\x20\xb4\xf9\x58\x74\xf6\x24\xf2\x35\xe9\xf7\x22\x2b\x1e\x25\x78\x04\x76\x93\x6b\xfb\x75\x4c\x14\x5a\xc3\x68\xec\x27\x4f\xc8\x5f\xda\x7e\x92\x78\x3a\x4b\x75\xef\x53\x06\x30\x80\xe3\x9e\xfd\x08\x1d\x40\xda\xe4\xfa\x7a\x57\x72\xb9\xdb\xb0\x7f\x34\xca\xf0\x9e\xe2\xd7\x9b\x89\x97\x40\xe8\x49\xc5\xee\x03\xc9\xd2\xaf\xa6\x63\xf7\x84\x74\x2c\x08\xd5\x48\x1b\x81\xfd\x0b\x1e\xb8\x16\x60\x97\x71\xf9\x64\x17\x0c\x1e\x65\x69\xb2\x5f\xad\xac\xa6\x40\xa5\x8e\xc3\xc5\x29\xd3\x77\xcd\x28\x93\x38\xf6\x37\xce\xe0\xa6\x50\x24\x82\x45\x3d\x7b\x7b\x50\x76\xc8\x76\x71\xc1\x6d\x34\x6a\x56\x25\x4d\x62\x5c\xfb\x5c\x09\x77\x13\x3c\xbc\x9c\x36\x5d\xe6\xf9\xac\x09\x98\xda\x06\x21\xa1\xb0\xc8\x4c\x35\xa5\x41\x5a\x4c\x92\x5a\xd3\xbb\x08\x4c\xd6\xcf\x62\x28\xd1\xc1\x2b\x13\x17\xe8\x2d\xe4\x3c\xb4\x28\x9d\xcb\x9b\x9f\x78\xb5\x9b\x00\xb5\x04\xa4\x27\x33\x4e\x1a\x9d\x7e\x72\x0d\xb9\xa0\x61\x85\x2e\xd1\xd3\xa0\x98\xf8\x60\xcf\xff\x22\xc7\xb0\x46\x6c\xb3\x6e\x78\xe1\xeb\xf6\xf8\x8b\x1f\x94\x1d\xa4\x9d\x95\x10\x59\xa6\x6c\x63\x51\xea\x7a\x98\xde\x2b\xa3\xbb\xc5\xc0\x5b\xc8\x46\x61\x76\x68\xae\xd9\x21\xe2\xb2\x26\x96\x78\x1e\x66\xab\xdd\x94\xa3\x32\x14\x18\xeb\x99\xb2\x3b\xf7\xa5\x04\x0c\x6e\x7b\x91\x42\x77\x56\x8f\xc3\xd6\xad\x89\x4d\x78\xfa\xb0\xb9\x41\x3c\x49\xac\x29\xd3\x6e\x1b\x4c\x4f\xbb\x20\x2a\x35\xc2\x3d\x7f\xb8\xa5\x50\xa9\xfc\x8f\xb9\x08\x7c\x5f\xbf\x76\x4b\x49\xfa\x9c\x34\xea\x84\xd4\xe9\x84\xbd\xac\x16\x62\x29\x6a\x5e\x5c\x53\x16\xa6\xdb\x52\x5d\x83\x4b\x37\x17\xbb\xe9\x62\x9b\xc8\x11\x2b\x8b\xbc\x7b\x69\xd4\x64\x2c\xc0\x7b\xad\xa3\xa4\x6a\x08\xa5\x57\x0e\x4f\x5c\x7c\xb0\x6b\x09\xdb\x6c\x2e\xb9\x84\xeb\x19\x14\xd3\xee\x6c\xd0\xe0\xe2\xb2\x70\xb5\x2f\x53\x20\x2d\xce\xfa\xcd\x28\xca\xce\x8a\x2b\x57\x3a\x7b\xc6\xb9\x36\xcf\x74\xb7\xd3\x27\x7d\xec\xc9\xe9\x06\xe7\xbe\x2b\x32\x38\x70\x56\x25\x5f\xca\x0c\x0a\x78\x45\x2d\x3b\xa4\x69\x41\x94\xb5\x80\x33\x75\x92\x11\xdd\x87\x12\xf6\x91\xb4\x43\x24\x9a\xc7\xef\xfa\x59\x5b\xa8\x5d\x58\x2f\x28\x05\x77\x00\xb4\xa7\xc9\x58\x50\x81\xb7\x7a\x50\xd7\xb8\x98\xe9\x47\xa0\x6f\xe8\x88\x7b\xdd\x69\x9c\x7d\x54\xb5\x43\xa3\x32\xf0\xf7\xfc\x11\xd5\xcf\x5b\x4f\xd6\xdd\x37\x61\x5c\xd6\x61\x83\x8b\x80\x1e\x65\x17\x8e\x71\xde\x6d\x1b\xf6\x9c\x1e\xc6\xf4\x63\xd9\x87\x23\x37\x52\xe2\x6f\x39\xf5\x12\x69\xf9\xb1\xfe\xd0\xab\x25\x25\xf6\x2e\x0b\x07\xaf\xff\xda\x96\x61\x3f\xfc\x2d\xd7\xd0\xb0\xce\xee\x59\x43\xed\x99\xf4\x2e\x27\x1f\x50\xbd\xc9\xb2\x1d\x87\xbf\x5b\x59\xc1\x57\xf2\x78\x57\x97\x16\x59\x7d\xda\x1d\x07\x47\xfc\x63\x2e\x9f\x6b\x9a\xdb\xc1\x4e\x7b\x08\xd0\x71\x2e\xfe\x0c\x49\x7d\x8c\x95\xe3\x26\x31\x76\xe7\x19\x58\xea\x29\xea\xdb\xee\x3a\x3d\x3e\xa6\x07\x58\x1b\xe0\xff\x3c\xed\xe2\x80\x21\xff\xa8\xab\x83\x26\x77\xc0\xe5\x01\x10\x4f\xbd\x3e\x68\x1a\x7b\x2f\x90\x04\xf9\x6d\x56\x48\x64\xde\x3d\xb0\x6d\x86\xaf\xc0\x9f\x23\xae\x3f\xb6\x5d\x28\x78\x27\xe2\x0f\x96\x54\xc8\x0d\x7a\xbe\xa8\x65\x65\xec\xe1\x91\x17\x59\x53\xa0\x8b\xfe\x0f\xb3\x66\x8e\xc7\x44\x1c\x59\x67\xaa\x12\x13\xf6\x9d\xd0\xe6\xe5\x7c\xae\x6a\x5c\x39\xaf\x95\x89\x7e\x81\x77\x76\xe4\xe8\x9d\xa8\xe5\x7c\xd5\x7a\x06\xae\x90\x99\xa0\xd5\x2b\xa2\x51\x46\x72\xce\xdc\xab\x14\x24\xb5\x22\x02\xc0\x67\x01\xf5\x33\x84\x1a\x37\x17\x0a\x57\xbf\x67\xc9\x2c\xcf\x1c\x02\x9b\x84\xc0\x2c\x84\xac\x1f\x50\x75\x26\xd3\xbb\x52\x70\xa7\x5c\x2a\x03\x69\x9b\x32\x93\x76\x25\x60\x77\xa5\x15\x7a\x95\x7c\x92\x02\x74\xe7\x44\x95\x44\xde\x1d\x00\x3c\xc6\x69\xb6\x83\x73\xcc\x29\xd0\x2e\x37\xf2\x96\x34\xcc\x9a\xa8\xca\xbd\x2c\xfb\xf9\x92\x6f\x38\x27\x7b\x8f\x51\x3e\xa8\x89\xed\xd3\xde\xad\x24\x6e\x6d\x3f\xca\x28\xd9\x38\xa7\x56\xe9\xe0\xf6\x8c\x88\x6b\x3b\x70\xcc\x7e\x8a\x7b\xc8\x11\x39\x36\x82\xfe\x5d\xa6\x3d\x72\x8e\x8d\x94\xa9\x13\xa9\x5b\xdf\x3c\xa4\xbc\x71\xfa\x36\xfe\xe9\x38\x0a\xd7\x84\x11\x80\x70\x30\x8a\x3e\x88\xc6\x8d\x90\x1f\x52\xb9\x67\xe9\x1c\xbd\xba\xa5\xce\x93\x3e\x72\x07\xa4\xde\xfb\x6a\xbb\x57\xac\xad\x62\xeb\x35\xe6\x89\xd9\x17\x87\x5c\xf1\x8f\x58\x97\xfb\x7b\x01\xea\x87\x27\xf2\xf6\x74\x1d\x6e\x6f\x23\xff\x39\x9b\xf3\xa2\x70\xa0\xff\xe5\x6f\x97\x9d\xbf\xff\xd8\x0a\xbd\x97\x91\x1b\xf5\x43\xcf\x27\x7d\xc1\x03\xfb\x2a\x88\xc8\xc0\xde\xea\x9c\x39\x6a\x56\x2d\xee\x55\x5d\xee\x71\xb8\x59\x7a\x21\x78\x5e\xc8\x52\x5c\x47\x8d\x5b\xeb\x5e\x46\x52\x3e\x76\x8b\xe9\x1d\xfe\x6e\xcf\xdb\x1e\x3a\x8c\xf0\x47\xf7\x71\xa9\x27\x8e\xa1\x6f\xc7\xde\x4c\xbc\xb5\xbc\x0d\x0b\x6e\x9b\x0d\x60\x33\x6f\xbd\xd4\x8e\x62\xee\x01\xd5\x3f\xfa\x3c\x34\x5c\x1e\x33\x51\xde\xc9\x5a\x95\x10\x8d\x0a\x65\x41\x36\x2b\x77\xfa\x3e\x0a\xc2\xc9\x54\xa9\x9b\x25\xc4\x88\xc0\x6c\x21\xee\x4d\x96\x16\x38\xbb\xe3\x35\x4e\xf5\xb7\xd7\x2a\x17\xb1\x42\x1f\x7b\x14\x72\xbe\xb8\xae\x6e\x8a\xba\x67\x61\x3f\xec\xac\xe0\x35\x34\x7e\x8c\xa6\x85\xa5\x0a\x78\x2d\x01\x3f\xcc\xf1\x8d\x72\x2a\xe0\xa6\x0f\xbd\x40\xee\x8e\x0f\x54\xaa\xa9\xb9\x3d\xac\x43\x6b\x4f\x08\xab\x71\x01\x65\xee\xf5\x60\xa3\xa6\xa9\xa6\x31\x45\xfd\xb0\xd8\xb8\x1d\xd1\xd5\x54\xe7\xc4\x81\xa5\x0d\xe2\x56\x60\x3a\x0a\x25\x0c\x86\x41\x36\x04\x5f\x66\x6a\xb9\x54\xe5\x13\x7c\xbf\x93\x5c\x3a\xcc\x6c\xa8\xfc\xe9\x6e\x99\xf7\x61\xf9\x9d\xe4\xed\x89\x3f\x22\x86\x63\x35\xa8\xb3\x97\xe5\xdd\xf7\xb5\x5a\x9e\xed\x24\x00\x04\xb1\x4f\x08\xf6\x11\x80\x18\x6c\x10\x82\x63\x09\x00\x76\x03\x5f\x56\x66\x75\x8e\x53\xda\x8e\xe7\x70\xc1\x1e\x8a\x01\x11\xc5\xf2\x06\xa2\xef\x00\x2c\x9a\x6e\xf8\xbb\x9d\xc7\x86\x10\xc6\x9e\x1e\xb8\xe4\x8d\xc5\x20\xff\x12\xa1\x5a\x50\xad\xd6\x08\xfe\xc2\xbf\xa3\x18\xbf\xd8\x8d\x3a\x5b\x04\x71\xb6\xa8\xe2\x02\x37\x69\xda\x9b\xa2\x36\x69\xb8\x38\x64\xf3\xc7\x28\xad\xdc\x01\xa7\x98\x01\x2c\xea\xe0\xe8\x50\x48\x4d\x3a\xe7\x07\x79\x27\x30\x14\xcf\x37\x39\x80\xa2\xe0\x82\xfe\x20\xe7\x20\x42\x9b\xb0\xa8\x31\x24\xe6\xd5\xff\xab\xe1\x85\x8f\xf4\xa4\x7e\xf2\x00\xf8\x5d\xf0\x88\x47\xa1\xb6\xb3\x15\x93\xe6\x0c\x1d\x5b\x32\xa3\xd0\x50\x8f\xab\xb5\x73\x29\xdd\x7f\x2e\xa1\x55\xda\xc4\x57\xa9\x4f\xb3\xe9\xe3\x18\x53\x55\xcb\x1b\x7c\xdb\x2f\xba\xeb\x5e\x79\xef\x8b\x39\x5d\xcf\xd2\xe7\x57\xaf\xd8\x52\x18\x0e\x0d\x9f\xff\xfe\xee\xdd\x15\x51\x72\x0c\x6f\xeb\x3b\x51\x53\x75\x37\xd7\x48\xcc\xae\xcc\x77\xb8\x84\x6b\x5e\x6a\xe0\x2e\xd6\xe9\x0a\xbd\xe2\x7c\xfd\x8d\xcf\x2f\xbe\xc4\xe2\xe5\x90\x3e\x2d\xca\x9c\xd4\x4d\xae\x84\xc6\x06\x9b\xcb\xaa\x00\x0b\x2b\xa0\xb8\x5e\x66\x5e\x69\xdd\xd8\xa5\x41\x13\xc1\x13\x09\x69\x88\xe7\x57\xaf\xa6\xe9\x83\x44\x70\xf0\x91\x0e\xc6\x06\x34\x26\x53\x73\x8b\xe5\xd6\x26\x05\x64\x3f\x44\xad\x7f\xda\x54\x87\xfe\x32\xe7\xa1\x01\xf7\x39\x76\xb2\x3b\xe7\x65\x7e\x5e\x0b\x6d\x78\x6d\xc6\xf4\xea\x83\x06\x3d\x96\x07\xdd\x08\x5f\x82\x82\x23\x41\x8a\x5e\x08\xa6\x17\xac\xe0\x3a\xaa\x7b\xe1\x2a\x13\x51\x4b\x1d\x9f\x3e\x53\xd5\xe2\x4e\xaa\x46\x53\x23\x9e\x6d\x8a\xb3\xe0\x17\x54\x02\xa3\x16\xaa\x12\xa5\x33\xee\x06\xc7\x47\x13\x6f\x2d\x0e\x13\x17\x27\x04\x8d\xe0\xec\x06\x21\xcb\x06\x32\xda\xa4\x3d\x2f\x97\x37\x56\x6c\xe4\x9c\xae\x73\x75\x2b\xb2\xbd\x52\xb2\xc4\xb6\xf3\xb2\xa7\xfa\xef\xa6\xe8\xf6\xde\x9e\x40\x1d\x46\xda\xd1\x7c\xdf\x91\xf3\xd1\x75\xca\xd7\x70\xb2\x87\x8f\x54\xcb\xc3\x37\x5f\xef\x70\x72\x67\x56\xc5\x8c\xe2\xac\xe2\xb5\x91\x59\x53\xf0\xba\x9f\x59\xd2\xe9\x55\x3a\xf7\x43\xa3\x8a\x84\x03\x6c\xc1\xab\x4a\x40\x34\x1c\xe6\xc2\x53\x6b\xc5\x16\xbe\x90\x29\x38\x1b\xa8\xee\x7d\x18\xc6\x58\x35\x75\xee\x12\x10\xcf\xef\x89\xde\xdb\x73\xc6\xf5\x9d\xe2\xb9\xef\x4f\x33\x89\xbb\x4e\x85\x36\x55\x29\x21\x30\xd2\x84\xb0\xd9\x82\x41\x3e\x67\xd2\xa1\x8c\x25\xf9\xfd\x32\xcf\x84\xbc\xc3\x3c\xa9\x18\x23\x1f\xfe\x40\x58\xad\xc3\x05\x87\xa1\xad\xb9\x55\xe4\x07\x40\x40\x85\x76\x52\xdd\x38\x5c\x0a\x0e\xaa\x58\x05\x78\x4e\x89\x83\x0a\x27\xb7\x8b\x1d\x62\x7d\x09\x9f\x03\xb1\x19\x06\x39\xa7\x42\xfc\x7b\x70\xd7\xf7\x6d\xf5\x4e\x0b\x39\x67\x12\xa9\xa0\x8d\xaa\x34\x5b\x8a\x90\x41\x16\x47\x45\x3a\x83\xc2\xd3\x70\xeb\xc5\x18\xaa\x1c\x6f\x1e\x89\x3e\x39\xd3\x64\x4f\xba\xd4\x43\xdf\x31\x0d\x55\xa5\x9f\x17\x09\xc4\x84\x8a\xaf\x16\xd8\x65\xd8\x3d\xee\xd1\x9e\x8a\xd6\x2c\x61\x84\xed\x44\xa4\x01\xa4\x74\x32\x51\x08\x3c\x8d\xb0\x83\x8b\xd1\x03\xb3\x59\x5b\xdb\x09\x4b\x11\x6c\xc9\x59\x27\xba\x54\x86\x0a\x97\x80\x6b\x1f\x8a\x64\xf7\x35\x3e\xa1\x7c\x9c\xaa\x73\xb1\x0d\xf3\xba\xe0\x30\x69\xd1\x21\x4d\x96\x3a\xd4\x54\xc3\x68\x62\x6b\x2a\x96\xd2\xc8\xe0\xca\xe5\xa5\x5d\xc5\xd4\x46\x97\xf8\x07\x95\xd2\x10\x69\x9a\x43\xb4\x91\x62\x5d\x16\xda\x1b\x09\x18\xf6\xba\x74\x01\x17\xdd\x5d\x7e\x1e\x4a\x47\xa1\x18\x40\x09\x28\x14\x30\x4a\x54\x6b\x7f\x84\xa2\x56\x50\x5d\x51\x44\x06\x56\xf6\xd4\x55\xc2\xb2\x53\xad\x6a\x95\x37\x99\x43\xef\xbe\x96\x06\x7a\xb7\x93\x7d\x87\x59\xeb\xec\x46\xd5\xaa\x31\xb2\xec\x6e\xc0\x3d\xc7\x91\xcd\x92\x71\x49\x35\xec\x30\xce\x42\xd4\xe3\x5b\x83\xa4\xef\xfb\x83\x9b\x24\xff\x75\xeb\xf1\x16\x8b\xb8\x04\xa3\xba\xf5\xbd\x37\x85\x7c\x91\xba\xef\x94\x81\x7a\x18\x6c\xc9\xff\x49\xee\x43\xcb\x8c\xa5\x2c\x55\x1d\xe8\x8e\xbd\x0e\xed\xbe\x3a\x03\xad\x24\x4b\x23\x6e\x7a\x5a\xdb\x6e\xca\x33\x45\x74\xde\x0f\xd8\xa3\x2f\xb8\x58\xaa\xf2\x5a\x98\xf3\xef\xb9\x2c\x44\x7e\xa5\x72\xe7\x72\xef\x25\x64\xa5\x7f\xa7\x6f\xc0\x6b\xdf\x4e\xd0\xb3\xb3\x5c\xf9\x56\x84\x70\xf8\x14\x39\xcb\xf1\x83\xca\x95\x43\xd8\x74\xfc\xcb\xdc\x63\xc3\xfe\xab\x99\x89\xba\x14\x56\x9e\x72\xa9\x4d\x2d\x67\x4d\x38\xdb\xd2\x81\xd8\x1e\xcf\xfc\x3c\x42\xd1\x05\x48\xad\x84\x96\x38\xbd\x67\xe0\xde\x22\x64\x95\x7e\x82\xc8\xbe\xd7\xc2\x0c\xd3\xea\xad\x2a\x0a\x2b\xd9\x3b\x91\x88\xbe\xf5\x35\x8d\x9b\xb2\x14\x99\xd0\x9a\xe3\xdd\x88\x35\xfa\x0e\x4b\x26\x77\x44\xe3\x8d\x51\x4b\xcc\xa3\x5e\xca\x52\x2e\xed\xb1\x12\x33\xff\xa5\xae\x9b\x0a\x33\x2a\x1c\x76\x6a\x1e\xba\x91\x28\xc6\xc3\xe4\x0f\x4a\xc8\xd7\x2a\x17\xd7\x62\x5d\xd1\xc3\x4d\xd4\x6c\xb0\x05\x24\x34\x09\xca\x94\x3d\x36\x7e\x70\xf2\x76\x68\xfa\x25\x32\xc6\x4a\x95\x8b\x68\xeb\x75\xdd\x49\x52\x5b\xa7\x5b\xc8\x73\x1f\x6a\xed\xb5\x32\x63\x42\x69\xec\x02\x78\x24\x3a\x99\xd8\x09\xa5\xe6\x61\x02\xe4\x3e\xf9\x15\x73\x9e\x53\x72\xc6\x99\x95\x16\x40\x78\x9a\xb5\x6b\x33\xc5\x35\x09\x78\x26\xbc\x2f\xf3\x4a\x75\x8f\x10\xfb\xae\x72\x59\xde\xfc\xec\x12\x62\xb6\xa6\x39\xe5\xa1\xc2\x2d\x93\x9d\x33\x36\xf2\xe1\x3e\xa7\xd5\xab\x7e\x7a\x51\x9b\x9a\x1b\x71\x03\xa5\x3f\x92\xc1\x8f\x28\xca\xc9\x38\x07\x11\xd7\x50\xb6\xe3\xad\x58\xd3\x1d\x17\x68\xd7\x7d\x37\xfa\x29\x2d\x8e\xa7\x8a\x9c\x0a\x05\x94\x79\xe8\xba\x8b\x75\x2d\x55\x29\x36\x57\x39\xdd\x45\x8c\x5f\xa4\x25\x55\xe8\xbe\xd3\xf9\x76\x89\x5d\x1d\xa2\x3d\x1b\x22\x9a\x87\xb6\x8e\x68\xe3\xa4\x6e\xe0\x83\x8d\xe4\xf3\x32\x17\x6d\x9e\xa7\x25\x5f\x22\xd8\x47\xa2\xa1\xb8\x93\xd6\xda\xf9\xbb\xd4\x46\xd5\xab\x1f\xe5\x52\xf6\x87\xc5\xb7\x48\x99\xaf\xa3\x5e\x94\x5d\x75\x38\x6a\x65\x85\xe0\x25\x6b\xaa\x08\x8b\x33\x1d\x25\xfa\x50\x8d\x2b\x1e\xda\xb3\xa4\x6f\xfe\xef\xa9\x55\x2a\xd3\xba\x67\xc2\xff\xfb\xb0\x34\xbd\xaa\x95\xe5\x2b\x1e\x50\xae\x33\x5e\x0c\xdd\x03\x6c\xa4\xa9\x93\x90\x2a\x86\xa8\x3d\xc4\xc3\x1b\x3e\x11\x36\xf1\x98\x14\x43\x03\xe3\x4e\x98\x9c\x8a\x69\xf2\xb8\x58\xc1\x43\xbb\xd3\x0c\x31\xc7\x95\xef\x78\x91\x96\x77\x92\x1a\xbf\xec\x6e\x47\x7b\x6b\x06\x75\x37\x90\x2f\x35\x9a\xea\x35\x41\x39\x26\x95\xdd\x18\xe8\x8d\x02\xca\x42\x90\x0d\xe3\xf5\x4c\x9a\xda\x5a\xba\x65\xb3\x9c\x89\xda\x9a\x07\xe8\xb2\x01\x33\x33\x17\x1a\x5a\xc1\x68\x63\x75\x43\xde\x80\x63\xb7\x46\x85\x11\x27\xa6\x46\x25\x17\x61\xa8\xc6\xd8\xe3\x9b\xd4\x8b\x9e\x1d\x6c\x1f\x92\x4f\xc8\xa4\x74\x3d\xf9\x7c\x9d\x68\x74\xc0\x24\x6c\xdf\xc8\x92\xc8\x10\x5b\x0b\x6b\x03\x63\x7e\x6d\x8b\x5c\x5c\x3d\xc9\x25\xd2\x26\x55\x2f\x22\xef\x51\x4e\x74\x77\x41\x15\xa1\x14\xd3\xab\xf6\x97\x74\x7a\x6a\x0d\xe4\x0b\xa5\x00\x1a\xb4\x78\xbc\xcb\x21\x4f\xde\x8d\xe1\xd1\x07\xfe\xee\xcd\x37\xf6\x76\xee\xad\x30\x0c\x05\xb3\x48\xd3\x89\x28\x19\xc0\x32\x8f\x4b\x3a\x05\x38\xe3\xca\x4e\xaf\x95\x84\xff\x54\x33\x3d\x89\x2b\x6b\x4d\x58\x2d\xce\x79\x8e\x35\xb4\x06\x99\xfe\x9f\x6a\xe6\xb8\x0d\xef\xa2\xc7\x04\xae\x1c\x01\x94\x8b\x27\xc2\x64\xe7\x52\x95\xe7\xcb\x70\xb1\xca\xd0\xca\x19\x19\x03\x50\xf1\x9a\x17\x85\x28\xd8\x3f\xd5\x0c\xaf\x7f\xc3\xc2\x82\xf2\x59\xad\xab\x4c\x6a\x5e\x33\xf7\x1f\x4a\xbd\x44\xab\x9c\x6a\xcd\x71\x17\xdb\x8a\xc5\x56\x2c\xd2\xd2\x74\x6a\x6c\xe2\x50\x76\x9e\x74\x95\x86\x44\xa1\x3b\x4b\xaa\x64\xc6\xb0\x0e\xc2\x4f\x58\xb5\xc5\xb8\x36\xd6\xe0\x52\x8a\x3a\x87\xfe\xa7\x9a\x9d\x69\x2a\x46\xdc\x82\x1a\xb2\xc1\xfb\x6c\xfb\xde\xbb\xb8\x4a\x3f\xb1\xa4\xe8\x65\x24\xc6\x76\x11\x23\x6f\x6a\x9e\x89\x79\x53\x84\xa8\xca\x71\x1c\xf5\xa5\xf6\xff\xa9\x66\x63\xb9\x04\xcc\xf1\xae\x22\x11\x23\xe2\xdb\x53\x02\x43\x44\x61\x19\xd2\xa9\x20\xd3\x76\xea\xdb\x87\x00\xd3\xd3\x2a\xaa\xee\x18\xe7\xe3\x8f\x73\xb5\xad\xa3\x19\x29\x40\xb8\xab\xc1\x7b\x1c\xae\x6f\xc1\xa3\x82\xc9\x1c\x1b\xe9\x05\x07\x4f\x20\x96\x51\x31\x34\x54\x30\x5c\xdf\x6a\xa6\xd5\x52\x40\xed\x49\x80\xeb\x27\x0b\x57\xe6\x0a\xab\x12\xf8\xbb\xd1\x4d\xfe\xb8\x10\x91\x1d\x6a\x0c\xe2\x28\x46\x61\x70\x86\x2a\x33\x41\x1e\x53\x4b\x21\xf6\x1c\xa6\x45\x03\x58\x53\xc0\x5f\x96\x7a\xea\x8a\x0f\x22\x6b\xb0\x9b\x68\x98\xc1\x3e\xf2\x48\x36\x04\xbb\x16\x66\xd2\xd6\x11\xfe\x90\x13\x29\x88\xf4\xe9\x20\xd9\xa3\x04\xf1\x7e\xfd\x03\xb0\x55\x19\x8e\xe7\xd1\x38\x74\x75\xe5\x3a\xee\xa6\xdf\x6c\x32\x16\xda\x05\xc2\xb1\xee\x58\x3c\x4f\xf6\x97\xb7\xd7\x9f\xb2\x7b\x28\xa1\xda\x6e\x28\x21\xc9\xc1\xec\xee\x8c\x28\xbc\xd0\x6a\x83\xb7\xd7\xc4\x02\x09\x9e\xf3\xa0\x66\xec\x88\x50\x7c\x16\x97\x23\x95\x77\x85\x7a\x5e\xd1\x69\x83\xc3\x01\x07\xa0\xfd\xea\x76\x34\xa7\x85\xca\x58\x0b\x81\xb2\xc4\x7a\xdd\x74\x01\xfd\xf6\xda\xb5\xef\x82\x4e\xc5\x44\x97\x16\x9e\x6f\xaf\xcf\xda\x2d\x2a\x26\xee\xeb\x3e\x25\x16\x1f\xf7\xe9\x27\xba\xc1\x69\x57\x31\x6e\x4b\xd7\x67\x03\xd2\x45\x5b\x78\xdf\x51\x3c\x91\x32\xbb\x0e\x67\x5c\xcb\x8c\xc9\x25\x86\x97\x8e\x95\x21\x77\x81\x14\x7d\x6d\x89\x07\xf7\x19\xee\x50\x14\x11\x1c\xda\xd0\xb8\xf7\xc6\xe7\x71\xf9\x51\xa9\x76\xa9\x23\x16\x67\x5a\x96\x37\x85\x08\x41\x6d\x53\xf6\x13\xbf\x15\xcc\x3b\xde\xfd\x7a\x25\x21\xac\x1b\x68\xb1\x84\x31\x67\xd7\x7f\x7f\xf3\xf3\x8f\x2f\x98\x16\x00\x0a\x8b\x1a\xd7\x42\x57\xaa\xd4\x02\x75\xd0\xbf\x1a\x51\xcb\x91\xf5\x1b\x47\xd1\xbb\x55\x4e\xb2\x77\x81\x6f\x22\x7f\x2b\x29\x7d\xdc\x6a\x1e\x73\x78\x2a\x51\xd0\xa0\xd1\xcd\xfa\x45\xdb\x9a\x06\xfb\xcb\xdb\xcb\x4f\x99\xd4\x21\x79\x05\xec\xaf\x81\xe5\xdc\xbb\x94\x2f\xfb\x97\xb2\x0f\x10\x5d\xbb\x9c\xc3\x52\x1e\xbd\x32\xb2\xb1\x0c\x72\x8b\x74\x77\xce\x04\x5d\xdd\xab\x3f\x47\x1d\x6b\xd7\xd3\x3d\xb0\xc9\x25\x32\xb6\xcb\xa3\x46\xde\xd5\xf5\x6a\xae\x47\xad\xc5\x2a\xed\xb2\xab\xd2\x42\x8e\xea\xe5\x78\xb5\xd6\x51\x69\x9d\x1d\xf3\x00\x9c\xdb\x4e\xab\xf5\x33\x6f\x84\x82\x0b\x49\x87\xdb\x29\xb8\xb5\x5d\x2d\x3a\x71\xbb\xdf\x01\x02\xaf\x96\x54\x28\x2b\xea\x5c\x45\x87\x46\x4a\x29\x0f\xe7\xba\xaa\x56\x77\x32\xb7\x27\xbf\x25\x34\xec\xc1\x6f\x9d\x49\x68\x84\x76\x05\xa8\x25\x9e\xd4\x64\x49\x7d\x38\x62\x68\x10\x97\x58\xe2\x09\xaa\x56\xcd\xcd\x82\xbd\xbb\xbc\x9a\xb0\x9f\x5f\x5c\x01\x16\x7f\x7f\xf7\xee\x6a\xb4\x76\x1c\xcd\x39\x6c\x3f\x34\x57\x35\x93\x5a\x37\x42\xb3\x42\xde\x8a\xa8\x9a\x56\xa8\xff\xe4\x12\x64\x76\xe1\x6c\x53\xcf\xa1\x90\xa7\xb3\x58\x59\xa6\x4a\xbc\x66\x77\xfd\x5b\x39\xc3\x38\x49\x44\x23\xc6\xc2\x0d\xbd\x43\x84\xee\x00\xdb\x81\x6d\xa0\xb5\xc3\x3c\x7d\xc7\x65\x5f\x75\x94\xaa\x87\xf5\xc7\xf2\x8e\x35\xe8\xc7\x33\x62\x7d\xf3\xab\x8d\x24\x36\x82\x52\xe0\x5b\x0e\x8d\xde\x8f\x0e\xaa\x07\x6b\xc1\xf3\x49\xe8\xac\x15\xce\x47\x79\x58\xad\x90\x4c\x47\xc0\x46\x3b\x04\xba\xb4\xbb\x36\xdc\xd8\xc3\x22\x58\x52\xdf\x35\xb5\x36\x1b\x5d\xa0\xd1\x27\xec\xb7\xdb\xaf\xf5\x54\xaa\xdf\x69\x81\xc7\x8f\xe6\x4d\x99\xa1\xbf\x51\x9a\x15\xfb\x2d\x7a\x04\xef\x62\xc3\x43\x1c\xd1\x79\x5b\x62\x47\x52\x72\xa4\x12\x77\xa2\x74\x3d\x97\x17\x82\x17\x66\xb1\x22\xeb\xfd\xba\x50\xf7\x9b\xf2\x0a\x62\xac\x3a\x9e\xfc\x2b\xe7\x67\xb8\x52\xf9\x4f\xbc\xe4\x37\x70\xed\x46\x25\xb6\xed\x22\x9e\x59\x14\x63\x8f\xaa\x15\x60\xa9\x51\x3c\x7c\x5c\x2f\xb6\x8a\xc0\xd0\x90\xaa\x16\xd0\xba\x0c\xba\x61\x8a\x39\x6f\x0a\xc3\xa8\x4a\xe0\x65\xc1\xb5\xb6\xe6\x00\xea\x5d\x2a\x4f\x87\xca\x4e\x4b\x55\x76\xc3\x20\x86\xf4\x91\xa6\x49\xf5\x58\x6b\x09\x4f\x4f\xc9\xcd\xeb\x94\x8f\x18\x28\x69\xcf\xfc\x55\x2d\x72\x99\x61\x01\x75\x0c\x42\xb2\x32\xbd\xe0\x05\x56\x78\x2e\x57\xcc\x4d\x07\xee\x14\xa5\x0e\x7c\xc6\x85\xb5\x13\x9b\x49\x69\x5d\x51\x32\x12\xd7\x99\x28\x73\x74\x56\xe5\x18\xab\xa4\xea\x5c\x96\xbc\x60\xb2\xcc\xc5\x07\x30\x9a\x63\x46\xb3\xa6\x4a\xe2\x20\x1d\x20\x3b\x6a\x02\xe9\x3e\x76\x19\xe6\xea\xbe\x9c\x7a\x52\x40\x8f\x49\x06\x06\xa0\xba\xf7\xed\xc5\xed\xf9\x9d\x26\x4e\xf5\xe4\xad\xb1\x22\x43\xb7\xb0\x78\x2e\xd6\x10\xf2\xe4\x40\xe1\xc3\x8d\x6e\x3f\x01\x3c\x85\xf0\xf9\x1b\x45\x8c\xc1\x21\x1b\xf7\x04\x82\xe8\x03\xe4\x70\x78\x71\x27\x21\x3f\x36\xc2\x7b\x5b\x61\x4a\xec\xf7\x44\xb2\x8c\x35\x07\x29\xe6\xf4\x46\x81\x21\xc2\x38\xcd\x98\x82\x2b\x21\xa2\x16\xba\x01\x71\x1d\x85\xef\x60\xc5\xf2\x7f\x62\xee\x2e\xc4\xc4\x21\x9a\xb3\x15\xe3\xec\xb5\xca\x45\x9f\xaa\x71\xfe\xe8\xc7\xc6\xed\x10\x61\xe7\x4e\xe7\xfa\x84\xaa\xc7\xab\x1c\xb0\x77\xef\x55\x7d\x8b\xd9\xea\xbc\xb0\xe7\xe9\x99\xc7\x6d\xe4\xa9\xbd\x6f\x5e\x53\xf6\x5a\xdc\xc7\xf9\x2a\x7d\x73\xf7\x86\x2d\x61\x82\x18\xa0\x5f\x78\xca\xbe\xab\x9d\x37\xdf\xff\xde\x5e\xed\x21\xa7\xb4\x02\x65\x70\xaf\xa6\xf1\x73\xaf\x9f\x82\x2d\xcc\x0d\xa4\xc0\xfb\x1b\x8f\xb1\xde\xbb\xd1\x8b\x98\xae\xa9\xe8\x62\x1b\xb6\xe1\x2b\x5e\x1b\xb9\xd6\xb1\x7c\x04\xe6\x56\xa2\xb6\xac\x63\x19\x2f\x79\xbd\xf2\x51\x5c\x70\xe3\xb2\x80\x8b\xe4\xf4\x46\x0d\xe3\x96\xc5\xb2\x2a\xa0\xf5\xa7\xca\x5b\x81\xc0\xa3\x35\xc0\x59\x3b\x6a\xc5\xc7\xb3\xf4\x99\x13\x48\x18\x70\x7b\x2f\x85\x21\xd3\x10\x02\xca\x2d\xde\xb2\x8b\xb1\x6a\x8c\x9e\xb2\x57\x73\x3a\x30\x45\x99\x57\xf7\x0b\x09\xd7\xb4\xe9\xbc\x9c\xaf\x02\x36\x56\x75\x53\x0b\xad\x27\x5d\x85\x55\x0b\x6d\xdc\x5d\xa2\x3b\x87\xa9\xc6\xb0\x3b\xa9\x0a\xee\x6f\x95\x3c\xbe\x2e\x01\x6c\x7f\xcb\xe6\x24\x1b\x4b\x22\x93\x0f\x21\x84\x6d\x51\x83\x8d\x41\x15\x05\x04\x06\xaf\x91\xbc\x7d\x6c\xd5\x01\x21\xb4\xfb\x0d\x46\x40\x62\xa5\x63\x0a\x92\x46\x27\x13\xba\x7f\x4b\x50\x13\x1c\xd2\x84\xc2\x0d\xa8\x15\x0b\x8f\x25\xdd\x56\xe3\xf1\x2c\x15\x7e\xdd\x2a\x3c\x21\xcb\xdc\x4e\x87\x8a\xb1\x63\x84\xb8\x8b\x4c\x01\x42\x20\x86\xee\x27\x90\x6d\xb8\xae\x70\x63\x49\xe7\xaa\xc9\x5d\xc6\xb3\x4b\xd6\xa8\x6a\xa9\x6a\xe6\xa2\x3e\x7a\xc4\x3a\x17\x46\x64\x96\x1c\x52\x63\xb9\x67\x1f\xd8\x29\x4b\x6d\x04\xcf\xdd\x0d\xb0\x8f\xd5\x45\xf7\x5a\xed\x91\xd9\x5e\xc6\xd1\xa6\x38\x91\x9c\x5f\x8a\x9a\x32\x16\xc4\xb5\xbc\x29\x65\x79\xe3\xea\x90\x60\x03\xf6\x8e\xa4\x37\x66\xf1\x7b\xfc\x95\x66\x6b\x1b\xcd\xb7\xc2\x26\xb0\xc8\xc3\xf5\x5b\xf8\x48\x55\xa2\x1e\x25\xa6\x67\x78\x88\x8f\x06\x9d\xe2\xf2\x02\x30\xd8\x63\xfc\x27\xdf\xc3\x59\xbb\x7b\xbf\x27\xd0\xd9\xdc\xb7\x0d\x47\x53\x46\x65\x0d\x5c\x51\x0f\x81\x7c\x72\xf7\x34\x40\x7d\xe2\xa2\xcf\x03\xf4\x04\xf8\x93\x1e\x00\x2e\x14\x98\x1a\xb9\x0f\x0f\x88\xe4\x76\x15\x8d\x26\x6b\x9e\x59\x2e\xd6\xea\x8e\x17\x21\x2d\x69\xcd\xcb\x54\x11\xce\xd7\x87\xd9\x06\xf9\x27\x77\x4f\x77\xc4\x3f\x98\x12\xcb\xc6\x1e\xb2\x49\x91\xa0\xf9\x82\x78\xdf\x58\x5d\x5a\x48\x6d\x26\x2e\xe1\xc2\xa5\x7f\x55\xf8\x67\x9c\x5a\x83\xff\x8e\xda\x43\x6e\x18\xdf\xd3\x28\x4d\xda\x48\x90\x01\x04\x92\x31\x37\x42\x8d\x94\xd1\x68\x98\x67\x63\x72\x0b\x1a\xb3\x48\x19\xd0\x49\x15\x47\xa7\x22\xcf\xb0\xd0\x87\x51\xb7\xa2\xd4\xa0\x7a\xd9\x12\x7e\xc1\xe8\x09\x52\xc1\xfd\xeb\x94\x80\x3c\xcf\xa8\x8c\x90\xbb\xff\x80\x20\x22\xfb\xbd\x3d\x54\x36\xd0\x5d\xde\xca\x3c\x8c\x81\xda\x1d\x46\xd8\x22\x69\xc3\xa1\x4b\x43\xb1\x5b\xb1\x42\xa7\x3a\x40\x82\x5a\x2b\x46\x85\x0b\xc7\xb2\x58\x85\x03\xf0\xf3\xc6\xa8\x9f\xec\x6b\x04\xe4\x1d\xa0\x21\x51\x59\x52\xdf\xb1\x39\x2f\xb4\x98\xb2\x5f\x45\x70\x94\xcd\xad\x31\x73\x8f\x86\xb7\xb0\xb6\x8e\xd2\x6c\x21\x6a\x2a\x2d\xf4\xd4\x17\x74\xb8\x52\xf9\x04\xef\xb0\x2a\x91\x41\x67\xc7\xe7\x6e\x86\x29\x7d\x70\x5c\x1a\xb0\x94\x05\xe3\x9f\xba\x79\x21\x9e\x59\xa8\x65\xe4\x0d\x12\x48\x68\x9f\xb0\xd9\xa7\x1d\x12\xd8\x2d\xc3\xe5\x09\x42\xb9\x99\x75\xc3\x52\x08\x3c\x26\x5b\xd7\x16\x62\x76\x40\x88\x40\x3d\xf6\x6c\x4f\x92\x58\xbc\x50\x01\x75\x51\x1b\x4f\x93\x08\x7d\xf8\xe8\x10\x54\xd9\x15\x26\xd2\xe5\xb3\x3d\xe9\x02\x50\xfe\x88\x84\x79\xb7\x88\xae\x8b\xfd\x85\x30\x6d\x22\xae\xa3\x1f\xec\x2e\x54\x6c\x0d\x54\x41\x54\xc7\x15\xe0\xfe\xa2\x8a\x66\x49\x8d\x83\xb9\x59\x80\x14\x7b\x2d\x26\x22\x65\xb0\x05\xe5\x49\x33\x38\x7b\x0e\xd1\xb5\xdb\x46\xfa\xb2\x4b\xba\x1c\x0b\xcf\x75\x57\x07\x78\x13\x34\xfb\x7c\x1d\x09\x68\xcf\xc2\xb5\xd0\xec\x29\x9f\x3c\x9d\x4d\x9e\xf1\xc9\xb3\x19\x0c\xfa\x2c\x9b\xb2\x57\x25\x19\x9d\xe1\xad\x6c\xf2\x19\x9f\x7c\x36\xf3\x7b\xf6\x67\xd9\x00\x6d\xd2\x06\x58\x11\x6d\xc6\x18\x78\x76\x23\xa1\x1b\xa8\xf7\xb4\x59\x0c\x6e\x26\x8e\x2c\xef\x70\x33\xf9\xc9\x6e\x64\x5e\xfb\x6e\xbb\x8b\xe0\x1e\x41\xd9\x7a\xb8\x75\x80\x92\x07\xa9\x38\xca\xd6\x11\x85\x2e\xf8\xf2\x8f\xae\xc6\x0d\xb6\xca\xce\x82\xb4\xc2\xb5\x23\xdc\xa1\xd7\x82\xe7\x9d\x51\x00\xe1\x09\xab\x95\x32\xec\xf2\x39\x99\x1c\xc1\xfe\x0e\xd7\x48\x71\x17\xec\x90\x37\xea\x56\xb4\x9d\x3b\x8a\x10\xd0\x10\x24\x7c\xca\x9e\x17\x05\x2d\x11\x40\x0b\x65\x4a\x16\xa9\x2d\xe6\x0a\xfd\xb5\x31\x5b\x7a\x40\xc1\xe9\x12\xaf\x17\x24\x06\x5a\xd2\x9e\x20\x07\x12\x14\x98\x0a\x9d\x00\xae\x6a\xf5\x4f\xca\xc8\x4a\x39\x6e\x8f\x20\xe4\x46\xbc\x43\xf9\xc5\x7b\x54\x20\x03\x14\x40\xc2\xd3\x7d\x04\x0b\x8a\x87\xec\x26\x60\x61\x30\xdd\x67\x12\x8d\xf0\xad\xc4\xc2\xb6\x01\x9a\x55\x4e\x03\x6b\xaf\xf7\x9a\x6b\x8b\xc5\xe7\xd8\x1b\xee\xf7\x0c\x16\xfe\xdd\x8a\x26\x78\x83\x8d\xb7\xcb\x3d\xb7\x85\xe9\x57\x23\x68\x83\x1b\x9f\xee\x7c\xea\x2e\xe9\xe3\x2a\x3c\x41\x1c\xf3\x5c\xe4\xf6\x3c\xac\x17\xea\xde\x57\xb2\xc0\x6c\x6b\x48\x6e\x9e\xb2\xab\x38\x28\xb9\x05\x3a\x2e\x1b\x03\xa5\x7e\xec\x89\x19\x6b\x54\x99\x95\x2f\x51\xe4\xaf\xd7\xdb\x94\x88\x3f\xf7\x2a\xb7\x0f\x7b\x80\x4d\xf7\x9a\x49\xe1\xa1\xce\xcb\x45\x11\x47\x7e\xba\x90\x01\xcc\x65\xe6\xc1\x3f\x16\x4d\x70\xac\x89\xbf\x49\x38\xfe\xab\x99\x89\xcc\x14\x13\x76\x63\x97\xc9\x4c\xa9\x5b\xc6\x2b\x7f\x6f\xdb\x23\x1d\x59\x21\x7f\x77\x5f\xb1\xac\x90\xa2\x34\xec\x87\xbe\x6f\xdb\xa5\xc4\x29\x69\x91\x2e\xeb\x9d\xcf\x3a\xfe\x60\x9c\xbb\xba\x7f\xb0\xb4\xe0\x18\x2f\x19\xbf\x29\x17\x4a\xdb\x05\x27\x97\xbc\x5e\x51\x3a\x37\x1e\x04\x9f\xf9\xa7\xce\x8d\x3c\xb1\x9a\xb5\x34\x10\x5d\x16\xa0\x46\xbf\xfa\xd5\x6a\xdf\x48\x41\x93\xdd\xd2\x7d\x1e\x32\x8d\xa8\x38\xfd\xcf\x9a\x0a\xc0\x24\x30\x27\x41\x8a\x40\x12\x20\xef\xde\x55\x13\x10\xa5\xa9\x57\x61\x07\xea\xe5\x12\x15\xec\x80\x8f\x83\x17\xb4\xf5\x25\x55\x68\x42\xb8\x84\x20\xbc\x3c\x65\xcf\x23\x50\x73\x7b\x32\x03\xe1\xb3\x1c\xb2\x6b\xcc\x97\x5b\x75\xfb\x05\x94\x71\xb2\x48\x1a\x91\xb6\x03\x0b\xad\x33\xa1\xb0\x09\x1f\x63\x3e\xdc\xa2\x24\xb9\xff\x1d\x14\x4f\x0c\x33\x71\xee\x10\xf0\x12\x8c\x91\x4c\xf7\x27\xaf\xe4\xb9\x4f\xc9\x77\x82\x09\x20\xe5\x9c\xdd\x41\xe7\x7f\x49\x71\x24\x7e\x12\xbc\x92\x21\x8d\x7f\x53\x7c\x50\x53\x32\x9a\x82\x9d\xfc\x8d\x30\xc9\xe7\x13\x7b\xca\xad\x5c\xb1\x4e\x12\x53\xd2\x21\x22\xf7\xaf\x85\x78\x87\xb3\xbb\xa7\x67\x54\x67\xec\x90\x44\x44\xcf\x18\x93\xe5\x5c\x6d\x49\x40\xfa\xf4\xdc\x7e\xda\x21\x60\xc8\x2b\xf2\x36\x51\xad\x0a\x56\x15\xbc\x14\xa1\x63\x71\xb0\x65\xa1\xf2\x69\x02\x71\xd3\xd2\xe7\x45\xd1\xa6\x6f\xfc\x7d\x3f\x7d\xe3\x37\xc8\x83\x42\x04\xb7\xa2\x1c\x25\x43\xa5\x08\x53\xa8\xe9\x4c\xf8\x08\xd4\xc3\x71\x00\x67\x35\xc3\x64\x62\x55\x63\x5b\xf7\x6d\xf8\xe0\x01\xb4\x79\x70\xdb\x7a\x01\xcf\x3b\xb5\xc4\xb2\x23\x85\xb8\xe3\x50\x3a\x2b\x14\x74\x9b\xc3\xf0\x78\x3b\x33\xc2\x62\xc6\x84\x9c\x58\xb3\x46\x09\xdd\x58\x63\x3a\xe8\x15\xa7\xf0\xda\x58\x87\xbc\x18\x22\x72\xb4\x8d\x5a\x0a\x4c\x82\xdd\x3b\xa1\xc0\xc7\x09\x65\x91\x41\x79\x2a\x08\x38\x8d\x27\xc1\x51\xe2\x9c\x8e\xea\x8e\xc8\x54\xc9\xea\x6c\x12\x74\x6d\xa9\x72\x04\x16\x2c\x6c\xc2\x85\x17\x5a\x85\xe2\x79\xcc\x95\x2d\x8d\x86\x3b\xa4\x20\xc8\xf9\x7c\x7d\xe2\xd9\x5a\x29\xb0\x5f\x0f\x4a\x80\x7d\x68\x4d\x07\x4a\x12\x86\x1f\x30\x74\x13\x98\x1e\x46\x1d\x9d\x9e\xd4\x4a\x00\x66\x0b\x63\x2a\x1f\xab\xf8\x02\xcb\x92\xe2\x45\x2f\x5f\xf6\xa7\x0b\x07\x2c\x0c\x7e\x37\x61\xb3\x46\xaf\x66\xea\xc3\x94\xbd\xb0\x08\xab\x39\x2b\xe4\x5d\xe7\x63\x57\xf4\x34\x8f\x1f\xf8\x4d\x27\xae\xb1\x18\xcd\x72\x26\xcc\xbd\x10\x25\x02\xc4\x93\x15\x01\x41\x94\x47\x18\x4f\xa3\x55\xaa\xab\x0f\x4a\xe2\xd5\xdf\x98\x6e\x4b\xf6\x8a\x0f\x95\xd2\xa2\x65\x40\x79\x3d\x4a\x0b\x77\x2c\xef\xa0\x74\x33\x79\x4e\xdc\x02\x8d\x22\x45\xed\x79\xb9\x36\xec\xcb\xcf\xbe\xfa\xab\x33\x50\x68\xce\x6e\x65\x29\xd7\xc9\xb3\x65\x51\xf5\x4f\x55\x33\x28\xd4\x57\x1b\xf6\xf4\xd9\x67\x9f\x4f\xd9\x2f\xbc\x90\x14\x4f\x1c\x85\xf8\xf7\x7f\x6b\xb7\x88\x80\x1a\x94\x9a\x21\x38\xde\xf8\x30\xbc\xb6\xca\x1f\x1e\x48\x1d\xfb\x60\xec\x0c\x26\x8c\x6e\x0f\xb9\xe9\xa0\x1b\xc3\x6e\xcd\xb4\x67\x96\x4e\x7d\xc2\xa7\x70\xf3\xe6\x2d\x3c\x1a\xfd\xd9\x67\x9f\x7f\x81\xee\x7b\xf7\xc4\x1d\x4f\xba\x53\xb0\xef\x7a\x37\x4c\xff\x34\xb6\x9e\xc2\xe1\x74\x11\x06\x89\x37\x43\x97\xcb\xeb\x24\x95\xe2\xcb\x93\x3a\x19\x3e\x68\x1d\x6f\x18\xfd\xb5\xc5\xb8\x84\xd8\x34\xf9\x23\x34\xcf\xa7\x23\x20\xd5\x37\xbe\x8d\xc7\x3f\x83\xd0\x5f\x5e\xe6\xa1\xac\x6b\x91\x9c\x17\x7d\x5a\x6d\x19\x32\x19\x9e\x07\x20\xc8\x89\xfc\x0c\x15\xce\x79\x41\x37\x1b\x94\xa8\x1f\xbb\x79\x5c\xc8\x77\xdb\xdd\x88\xc3\xf9\x12\x51\x3c\x07\x73\xdb\x4a\x99\x68\xe1\x8a\xff\x7d\x7e\xe6\xa4\xb6\x16\x4b\x75\x17\xd1\x6c\xba\x19\x2d\xda\xae\x4a\x85\xeb\x98\xdc\x41\x21\x60\x16\xc7\xa1\xce\xc4\xf8\x87\x25\x28\x0c\x74\x48\x6b\xb2\x50\x37\x7d\x59\x16\x6b\xc5\x45\xdd\xf4\xd7\x3a\xc5\xa2\x5a\xbe\xab\xf4\x5c\x16\xd6\x4e\x85\xd7\x77\x11\x1b\x4c\x81\x71\x59\xd4\x37\xa2\x14\xb5\x15\x22\x0b\x0f\xe2\x8b\x6a\xba\x2a\xb7\x5f\x45\x85\x6d\x29\x8a\xc9\x9f\x78\x0a\x75\xc3\x0a\x59\xda\x23\x92\xb5\x0d\xec\x9f\x24\x69\xc4\x0b\xbd\xe6\xa8\xe4\x2c\x90\x9c\x8e\x47\x85\xba\x8f\x98\x0b\x53\x3b\x37\x5c\x16\xdf\x3e\x3d\x73\x24\xf1\x88\x72\x67\xcf\x52\x8a\xad\x45\x62\x12\x0a\xaf\xda\x3f\x9d\xd7\x03\x7e\x54\x37\x11\xe8\xf3\x73\x68\x52\x70\x3e\x5b\x19\xa1\xfb\xa1\x53\x2a\x96\x7d\x83\x46\x0a\xdf\x03\xe0\x73\x42\xcd\xfe\x43\x2e\x85\x36\x7c\x59\x75\xe0\x38\xcc\xc8\xfd\xe6\xdf\x93\x25\x7b\xfb\xfd\xe5\x67\x9f\x7d\xf6\x57\x86\xa6\x13\x80\x8c\xf0\xd3\xb2\xcc\xc4\xb7\x4f\xb5\x47\x8d\x66\x0b\x44\x41\xcd\x57\x0b\xf4\xcb\x3f\x65\x1a\x7a\x37\x30\x55\xe4\xa2\x46\xff\x67\xa9\xee\xfb\x21\x3e\xfb\x7c\x31\x0a\x64\xce\x57\x5d\x78\x07\x5a\x15\x95\x6b\x53\xc2\xcb\x52\x99\xed\x35\x2a\x7e\xef\x13\xc5\x72\x07\xc7\x17\xea\xf4\x79\x48\xf6\x04\xb9\xd1\x0c\x00\x61\xef\xec\xff\x98\x90\x37\xd4\x44\xd7\xa7\x1e\x61\x74\xb2\xcb\x5c\x21\x7d\x9c\x2a\x60\x40\xd7\x2b\xe0\x36\xc2\xb8\x3f\x86\x1f\x92\x7e\x41\xe8\xc5\xb3\xcb\x9f\xb0\xf3\x19\xb3\xe1\x04\x16\x7b\x13\x9c\xdb\x2f\xa6\x87\x65\x1f\x16\x64\x9c\xc7\xe9\x83\x41\x11\x34\x65\x2e\xea\x35\x26\xc7\x01\xf5\x21\xc5\x20\x6d\xc9\x6f\x17\xb9\x94\xee\xa1\x6e\x89\x9e\xfb\x8d\xc7\x1d\x9d\xce\xce\xf4\xc8\x9c\x4c\x62\x89\x67\x15\x8d\x74\x86\xdb\xb2\x8f\xfa\xf1\x59\x4b\x18\x39\x04\xc5\xad\x80\x4d\x51\xa1\x0e\x4b\x3f\xca\xa7\xc2\xd8\xa6\xb0\x1f\xa6\x97\x72\x6e\x6f\x3d\x9f\xbb\xdd\xca\xa8\x2e\x06\xe8\x04\x45\x26\xcf\x95\xb5\x0d\x80\xc5\xe7\x64\xe9\x22\xb7\x5c\x18\xea\x3b\xaa\xdc\x1e\x65\x81\xfa\xde\x03\x29\x75\x60\x16\xf6\xd5\x90\x18\xe7\x11\x3f\x24\x9f\x1b\x28\x22\xb1\x2d\x9f\xf1\xab\x4e\x83\x45\xfb\x1b\x56\x6b\x26\x47\x36\x90\x19\xae\x23\x5d\x09\x70\xa9\xd9\x6b\x71\x27\xea\xed\x39\xde\x94\x67\xad\x1c\xb5\x4a\xe5\x13\x57\xee\x06\x87\xb2\x13\x00\x1b\xd4\xf5\xce\x89\x77\x16\x8b\xb5\x33\xae\x28\xc3\xbe\xf5\xb3\xfd\xbb\x8e\x9d\x26\x38\x25\x50\xb9\x34\x57\x10\xb5\xc0\x21\xbb\x6d\x74\xe5\x07\x4e\x8f\xbe\x7d\xcf\xa1\x79\x86\xde\xdf\x73\x2d\x73\xc1\xf2\x7a\x75\x6e\x27\xd0\x1f\x9e\xbf\x8e\x87\x7d\x50\x5a\xa7\x70\x98\xa6\xa3\xbf\x35\x08\xdd\x7b\xb4\xb0\xaf\x36\x67\xe1\x43\x44\x50\x2f\x2b\x21\xf0\x27\xeb\x74\x3d\xea\x21\x9d\xbf\x43\x24\xae\x4d\x68\xb9\xb4\xa0\xe2\x66\x63\x01\x9d\x57\xec\xff\x4c\xa7\xd3\xff\xcb\xce\xcf\x09\xe3\x6f\x71\xb6\x67\xb1\x81\x94\xa6\x86\x86\xd1\xed\xa2\x8b\xa4\x89\x93\x73\xbb\x4d\x2b\x51\x5a\x7d\x4e\x69\xc4\x29\x9e\x38\x37\x6b\xd3\xe2\xe2\x3d\xe4\x19\x7d\xb8\xa2\xec\x3a\x66\xb7\xea\xca\x12\x83\x35\x94\xd7\x05\x17\x38\xed\x8c\xe0\x63\x13\xf9\xa6\xc5\xd9\xcb\x55\x1a\xe3\xac\x73\xa7\x04\x25\x65\x27\xad\x5a\xb2\x13\xc6\x7e\x90\xc6\xae\x72\x69\xf0\x22\x43\x98\xcc\x69\xe4\x4b\xc4\x3e\xbe\xd4\x75\xd5\xda\xed\xdf\x6e\xc4\x34\x26\x03\xf2\xce\xca\x12\x42\x4c\xd5\x01\x97\x5b\x55\xab\x0f\x2b\xa6\x55\x76\xdb\xdb\xc7\xbc\x8f\xec\x57\xf8\x09\xa2\xdd\xaa\x75\x75\x7e\xde\x94\xf2\xc3\x39\xc2\xfb\xf6\x09\x5c\x4d\x8f\xb2\x7b\xb8\xc3\x04\xc1\xaa\x92\xcd\x56\x5e\xe3\x84\x55\x60\xdf\x71\xc7\xac\x64\xa8\xff\x4f\xab\x28\x72\xe4\xff\x9f\xa2\x23\x9a\x12\x76\x03\x5c\x0b\x14\xef\x99\xf1\x4a\x2b\xba\x37\x00\xd5\x0e\xfe\xb2\x6f\x9e\x3c\x29\x54\xc6\xad\xfd\xf5\xcd\xc5\x13\x5e\xc9\x70\x5a\x4d\x80\x61\xd2\x14\xe6\x03\x33\x6e\x98\x65\x88\x01\xa5\xe9\x25\xd2\xd4\x78\x3f\x79\x50\x6e\x01\xa5\xff\x47\xd4\x63\x6f\x06\xd6\x31\x0c\x21\x12\x41\x7d\xdc\xed\xc5\xae\x4c\xf3\xa8\x8d\x60\x9f\x7d\xf7\xdb\x0b\x6a\x10\xb7\x13\xb7\xac\x00\x90\xec\x4e\x3b\xec\x09\x61\xe1\x23\x58\x74\x60\xe3\x72\x67\xbf\x22\x85\xd0\xbf\x10\x4b\x35\x70\x2b\x9b\x9e\x06\xe2\x5b\x9c\x62\x84\xdd\x11\xbb\x1a\xf1\x68\x11\xf6\x77\x32\x2d\x6f\xa0\x89\x0f\x79\x8c\x2f\x9d\x06\x5a\x37\x28\x1e\x0c\xd8\xb3\xa8\xb8\x59\x5a\x17\x2b\x58\x9e\xda\x70\xe8\x6d\x15\x8a\x23\x04\x17\x71\xd4\xfe\x27\x7c\x49\x10\xc1\xef\x46\xe5\x18\x07\x3c\x92\x78\xb5\x2a\x35\x7b\x76\x48\x6b\x04\x32\x9a\x0e\xcd\x52\x57\xe5\x70\x60\x26\x7f\x32\xd1\x32\x31\xe4\xd0\x24\x8e\x68\x72\xc0\x3e\x9d\xb2\xd7\xe3\x51\xb3\xd6\xee\xd3\x0d\x10\x9f\x6d\x0d\xf1\x00\x82\xf6\x5a\xdc\x63\x59\xff\xb8\x87\x31\xc5\xe9\x4c\xe0\x3d\x74\x7f\x81\xfb\x50\xcd\xa9\x21\x40\x8f\xe4\x59\x44\x6b\x08\xbf\x07\x9a\xfe\xee\x9a\x05\x40\x7d\xfc\x56\x1d\xb5\x10\x2a\x9f\x80\x1c\x2d\x77\x29\x32\x68\xb0\x52\xa7\x82\x10\xb4\x86\xe2\x23\x42\xcb\x82\xd8\xf1\xe9\xe3\x66\x5e\xbf\x79\x07\xa1\x41\xac\xa9\xf0\xac\x53\x44\x5d\xc7\xf0\xe3\x31\xf6\x65\x6b\xf6\x4f\xe8\xcb\x1d\x89\x4d\x3e\x37\x00\xb2\x1b\xa9\x45\xda\xa4\x00\x20\x39\xa7\x33\x54\x64\x14\xf9\xc4\x19\x2b\x58\x4b\xc1\x97\xe2\xb6\xa4\xa1\xb6\x65\xe3\xd8\x51\xba\xfe\x12\x9e\x0d\xfd\x5c\x88\x8a\x49\x92\x96\x40\x93\x5e\xdc\x5b\x63\x9e\x9c\x96\x68\x3b\xa7\x6d\x03\xe9\x28\x61\x5f\x6a\x81\xa3\xaa\xda\x91\x53\xc2\x45\xd8\x48\xa1\x37\x02\xc4\xd7\x5a\x20\x3b\x91\x55\xaf\xdf\xbc\x73\x69\x6e\xa7\x91\x92\x17\xaf\xaf\x7d\xfc\x45\x0f\xf7\x4b\x61\xee\x55\x7d\xfb\xbb\x7d\xcf\xe7\xde\x91\x81\xf1\x44\x98\xec\x89\x35\x1b\x35\xc4\xf4\x48\xba\x02\x04\x3a\x50\x40\xc7\x6f\x3f\xca\xb2\xf9\xf0\xa6\x2c\x56\xbf\x8f\x58\x72\xa9\xcb\x3c\x2e\x1b\x05\x47\x41\x1f\x65\x17\x3a\x91\xa9\xe2\x2e\x0c\x96\x53\xa0\x8a\x43\xc6\x65\x7a\xdf\xfa\x80\x8a\xa9\x8f\x37\x97\x3c\x42\xbf\x43\xcd\xcf\xbb\xd4\x24\x42\x3c\xc9\xcb\x7e\x12\xda\x99\xbf\xfc\x60\x44\x5d\xf2\xe2\xb5\x3d\x37\x52\x2c\x5d\x9f\xf6\x5a\x47\x54\xfb\x53\x07\x96\xbf\x62\x1d\xdd\xb9\x33\x2a\xe3\x23\x22\x48\xd3\x44\xa3\xb7\x09\xe9\x2e\x95\x78\x9e\xd7\x42\x3b\x6e\xc2\x35\x20\xc2\xb3\x64\xbb\x7c\xfd\xfc\xa7\x97\xe4\x8b\x8d\x41\xe3\x96\x11\xbd\x1c\xb2\x0b\x71\xf1\xfb\x91\xfd\x70\x0a\x5b\x6b\xbc\xbe\xa6\x98\x30\x27\x3d\x3e\x4c\xe3\x92\xfc\x65\xd1\x5d\xa6\x59\x55\x22\xb4\x9c\x4b\x10\x30\x8a\x51\x8a\xdd\xab\xab\x49\x77\x38\x3b\x8e\xef\xe9\x89\xc0\x66\x68\x3d\xdb\xb5\xf5\x9c\xd5\x22\x53\x75\xde\x15\x86\x9e\x0a\x38\x9b\x84\x21\x22\x28\xb3\x12\x66\x1f\xed\x28\x07\xe0\x7b\xb6\xff\xf8\x3b\xc1\xd9\x72\x4d\x79\x99\x58\x08\x9e\x43\x55\xb6\x44\x38\xe8\x6e\xaf\xdb\xe2\x15\xef\xe7\x5c\x4a\x68\x1c\x4a\xe8\xaa\x77\x51\x2b\x53\x37\x3f\x57\x4c\xaf\x99\xe5\x6a\xc9\x5d\xaf\x23\x1e\xc6\x2b\x13\xf9\xf3\xb1\x79\x2d\x19\x94\x46\x33\x28\x2d\xca\xac\x69\x85\x9e\x23\x02\x58\x12\xc0\x7b\x51\xc0\x35\xa2\x1f\x39\xb0\xd1\x45\x27\x3a\x6e\x62\xbf\x22\x6e\x70\xf0\x03\x73\xd6\x4f\x75\x5f\xd6\x5e\x7b\x9a\xfd\xdb\xf2\x32\x0c\x75\x42\x66\xea\xfd\x54\xb4\xd7\xca\xe3\xb6\xb5\x0e\xd3\xda\x7b\x5c\x3b\x5c\xa3\x45\x4e\x24\x07\x39\x0e\x7c\xbd\x6d\xf7\x91\x28\x73\xe8\x42\xa9\xa3\x6b\xb2\xbe\x81\x78\xb9\xc2\xeb\xb3\x10\x43\x00\xcc\x0d\x51\x67\xe0\xf0\xec\xdf\x1d\x62\xc5\x69\x31\x71\x1d\xbf\xdc\xf5\xf2\x8b\xd7\xd7\x21\x49\x64\xc4\x71\x61\x13\x83\x76\xb3\x4b\x1c\x7f\x62\x43\xe4\x51\x59\x1e\x2f\x5e\x5f\x1f\x80\x38\x57\xff\x78\xf1\x3a\x91\xc3\x91\x64\x8a\xf7\x43\x2c\xd4\x6d\x24\x2f\xa2\x25\x0a\xdc\x6b\x43\x66\xf1\xbe\xb3\x29\x2d\x7d\x58\x51\x41\x80\xa3\xfd\xb0\x08\xbb\xbc\xef\x57\xe6\x17\xd4\x3a\xa5\xd2\xc5\xd7\x19\x10\xd2\x9f\x5b\x65\xdd\x5d\x17\x6c\x16\x05\xc4\xc7\x1b\x3e\xde\xec\xbe\xfd\xc5\x1b\x00\xf1\x4c\xbf\x61\xcf\x35\xfb\x55\x96\xb9\xba\xd7\x8c\xba\xf0\x15\xab\xb4\x0a\x90\xef\x7c\x00\x18\xc2\xd5\xe5\x3f\x5e\xbc\xd6\xdd\x74\xe7\xaf\x76\x58\x01\x8d\x36\x6a\x69\x05\x0c\xdd\x1a\x23\x79\xec\xb3\xcc\xc9\x17\x02\x44\xb4\x92\x6c\xdf\x01\xfe\x52\x8f\xe5\x2d\x7c\x2f\xb0\x43\xbc\x78\x7d\x4d\x45\xd9\xb8\x66\xaf\xa1\xa0\x45\x99\x3b\x2c\x2d\x70\x3f\x22\xe6\x29\xe0\xf5\xcf\xca\x69\xf3\x78\x68\xbc\x8c\xe1\x75\xb6\xc0\x9c\x2e\x62\x21\x6e\x2b\x69\x61\xc2\x99\x88\xaa\x8e\x63\x64\x30\xd5\xa5\x04\xa8\x9d\x71\x43\x80\x55\xb8\x52\x88\xee\x81\xf7\xe3\xcb\xab\x12\x6a\xbd\x0c\xd4\x81\xf0\xdc\x88\x5e\xeb\x70\xc5\xd5\xc4\x88\xdf\x09\x45\x1f\x46\x58\x75\x67\x74\xfb\x6c\x28\x5d\x65\x5d\xd9\x87\xf1\x55\x1f\x3a\xf0\xb6\xab\xf9\xd0\xf9\x7c\x6d\xc5\x04\x89\x73\x17\x63\x0a\x32\xf4\x21\xb6\x25\xf0\xde\xea\x0b\xdd\xca\x0b\xd1\x6d\xe2\x16\xd5\x17\xfc\x70\xed\x1a\x13\x30\x6a\xa2\x24\x5c\x1c\x85\xeb\x4f\x31\xa6\x26\x82\x13\x46\x1a\x66\x40\x20\xb1\x24\xca\x38\xa9\xf4\xef\xb2\x4d\xb2\x09\x6f\x62\x96\xff\x76\x95\x49\xce\x0f\x2e\xa2\x03\x10\x8f\x25\xa4\xe7\x31\x6b\x33\x4b\x86\x58\x9c\x0e\x22\xaa\xdd\x21\x46\xcb\x2b\x86\x2d\x6c\x5f\x2d\x64\x07\x79\x03\xc4\xba\xde\x45\x37\xcf\x09\x93\xa5\xa9\xf1\xda\x7f\x61\x4c\xb5\x4e\xfc\xc2\x57\xec\x87\x9a\x97\xd0\x00\xfc\x72\x21\xb2\x5b\xfd\x0d\x46\x20\xb8\x66\xa9\x54\x0a\x0a\xeb\xf7\x5a\xf0\xe7\x95\x4f\x6c\x5e\x2e\x9b\x92\x9c\xe9\xdf\xc0\x88\xec\xb7\xd7\x2a\x17\xb1\x3c\x8e\x3e\x48\x29\x6d\xc4\x07\x91\x85\xd0\x10\x6b\xfe\xf1\x0a\x4b\x64\xce\xed\x8e\x5f\xa0\x9f\xc2\x64\x90\xc7\x07\xf7\xe4\xda\x1d\xb2\x28\x83\x00\x52\xe4\xae\x1c\x04\x48\x77\xe3\x99\xc1\xe8\xec\x7b\x31\xa3\xeb\x3d\x48\xaf\xb3\xf6\x08\x46\x75\x63\x60\x59\x6d\x34\xfb\xfa\xe2\xeb\x0b\x34\x58\xb3\xca\xfb\x8b\xbf\xbe\xf8\xfa\x29\xfc\xd8\xe4\x95\xd7\xce\xee\x52\x93\x6c\x9b\xaa\x56\x1f\xa4\x48\x6a\x74\x33\x55\x46\x21\x17\x69\x33\x9e\x52\xe5\xce\x01\x19\xe2\xcb\x45\xe6\xee\x28\x02\xa6\xad\xa0\xe2\x1a\x02\xd9\x38\x92\x1a\xc4\x91\xee\x53\xc0\xf6\xc7\x20\xb7\x04\xa7\x55\x64\x75\xd1\xe2\x70\x96\xb2\x0b\x03\xa0\x8b\xce\x9e\xed\x7d\x9a\x26\x70\x23\x39\x5d\x83\x0c\xe0\x87\x0f\xf0\x51\x84\x5a\x7c\x32\x01\xfc\xac\xa9\x22\xcb\x56\xe4\xd0\x92\x7f\xa0\xfe\xb1\x10\x86\x1a\x7c\xae\xb5\xd0\xd6\x32\x87\xc4\x37\xe8\xce\x05\xe1\x79\xf2\x5f\x4d\x70\xde\x74\x0f\x33\x13\x58\x3c\x5f\x77\x17\x0f\x56\x7b\x8e\xf5\xc0\xa8\x95\xd3\xe4\x27\x5e\x38\x4d\xfe\xe7\xba\x39\xcd\xba\xb1\x94\xfe\x73\xd9\x1c\x67\xd9\x58\x9d\x34\x71\xd1\xd2\xf9\x5a\x27\xeb\x4e\x4b\xc8\x02\x5d\xbf\xf5\xc4\xa7\xe2\x3f\x97\xd3\x47\xb2\x0d\x61\xb0\xb8\x87\xa5\xcd\x5f\xaa\x5a\x19\x95\xa9\xe2\x5b\x93\x55\x9f\x32\x9f\xf0\xb1\x61\xd1\x6d\xbd\xe0\x92\x9c\xfc\xde\x45\xb7\xcb\x82\xc3\x24\x11\xbf\xe8\xa2\xda\x8a\x52\xb3\x25\xaf\x6f\x45\xce\xbc\x9c\x32\xc8\x49\x80\xfb\x04\x5a\x12\xbe\xa4\x18\x5a\x9b\xc0\x3e\xe4\x16\xe4\xb5\x56\x05\x37\x56\x88\xa9\x85\x02\x79\x43\x46\x78\xb0\x3e\xc2\x35\x0d\xbb\xe2\x9f\x4b\xfa\x8f\xb5\xa4\x9b\xfc\xcf\x25\x7d\xaa\x25\x0d\xd1\x97\x13\x4a\xa8\x6b\xf9\x60\xd7\xad\x64\x8c\xda\x0c\x75\x34\x22\xa7\xfe\x87\x95\xaf\xec\xc3\xd3\x7a\x26\xb0\xb8\x36\xc5\x6e\x42\x8f\x21\xb8\xf7\x80\x14\xfb\x96\xd8\x18\xc5\x64\x79\xa7\x6e\x05\x63\x4f\x00\x69\x87\x2c\x23\x89\x72\x1c\x7e\x02\x42\xfe\x84\x62\x2e\xa3\x5a\xe6\xbe\xf4\x95\x15\xfd\x82\x92\x67\x89\x61\x1e\x98\x13\x34\x90\x1a\xab\x03\xb6\xb8\x00\x80\x21\x87\x2a\x97\xf9\x11\x0a\x6e\x44\x99\xad\x26\x50\x59\x4b\x2f\x54\xd1\xdb\x6a\xca\xd3\xbb\xfd\xbd\x76\x00\x1c\xe1\xa9\xea\x1a\x78\x2c\x16\xf2\x66\x63\x60\xf3\xdb\xa6\x64\x4f\x2f\x2e\x98\x34\xde\x45\xe4\xca\xff\xf6\xf4\x15\x8a\x93\xbf\xe1\x96\x85\x37\x54\x2a\x90\x92\xf0\x97\x82\xfb\x76\x96\x50\x2e\x59\x1a\x66\xf8\x2d\x5d\x4c\x78\x2f\x55\x6c\xc3\x3a\x23\xd9\x93\xc4\x27\xf9\xc7\x6f\xb9\xb4\x12\x5f\x4f\x05\xf4\x96\x86\x76\xc0\x84\x37\x68\x3d\x5e\x19\xf0\x1b\xdb\xe1\xd2\x79\xf9\x6e\x55\x28\x49\xe9\x77\x1a\x57\x1b\x35\x4e\xb1\x8a\xe3\x8b\x0b\xb3\x98\xb0\xbf\x5e\x98\x05\x60\xf8\xd7\xbf\x9a\x05\xab\x44\x9d\x89\xd2\x48\x1a\x9d\x62\xb0\xbc\x26\x11\xb5\xe7\x86\xaf\x80\x87\x1d\x7d\x58\x21\x67\xa2\xc6\xe6\xd1\xc2\x44\xbc\xb6\xc4\x7e\x76\x81\xd4\xb1\x23\x46\x43\x78\xcd\xff\xc5\x45\x88\xd0\xf9\x6b\xfa\xce\x16\xe2\xe8\x2a\x37\x11\x86\x03\x82\x39\xf1\xc9\x4e\xab\x4a\x4c\x42\x60\x86\xa5\x4c\x1c\xdb\x32\x42\x46\xfb\x32\x73\xb3\x10\x19\xe2\x23\x42\xc2\x20\x2e\x89\x39\x09\xa2\xd9\x32\x76\x46\xcd\x11\xb2\x07\x3a\xf5\x6b\x66\xcd\xe5\x04\xde\x5a\xad\x18\xd7\x54\x30\x37\x9d\x79\x12\xdd\xf2\xb3\x0f\x0c\x4b\x23\x5b\xd6\x12\x8b\xe1\x05\xb9\x01\xe9\x87\x58\x1c\x0a\x9e\x81\x34\xdf\x38\xd2\xc7\x61\x4b\x1e\xe7\xfe\x8b\x94\x64\xf3\xf2\xb2\xb6\xb0\x06\x86\xd6\x2a\x93\xb0\xf3\xf7\x90\x60\x30\x84\x08\xfd\xa9\xaf\xae\x7c\x10\x11\x44\xb5\x9b\xa6\x2e\xd3\x4b\x37\x88\x19\x84\x1a\xb5\xe1\x92\x1a\x56\xad\x2b\xfe\xe0\x1a\x8f\x25\x93\x1a\xd1\x54\xa1\x25\xa6\xe3\xc4\xf3\xe5\x50\x1c\xd1\x21\xc5\xb3\xc3\xc9\x78\xa0\x5d\xc5\x33\x06\x3a\x49\x28\xe8\x08\x07\xd7\xcd\xad\xb5\x91\xd4\xd5\x04\x51\xf5\xf5\x13\x3b\xf2\x19\x2b\xcf\xce\x3c\xda\xc4\x62\xc8\xef\xa5\x82\x7b\xd0\xe4\x4d\x10\xd3\x49\xb4\x32\xc0\x56\xfa\xfa\x22\x8e\x2b\x81\x9f\xac\xaa\x7a\x77\x79\x65\x7f\x77\x26\x5c\x52\x9e\x6e\x8d\x44\x8f\x5a\x79\xd4\xe0\x30\x10\x22\xde\x97\x99\x8a\xec\xe0\xd7\x2e\x16\x26\x80\x52\x65\x10\xcd\x18\xeb\x93\x89\xa6\x3d\x90\x5c\x61\xe6\xca\x51\x25\xd3\x8d\xf3\x11\x0b\xa6\x9b\x02\x55\x87\x1f\x23\x78\x93\x8e\xe4\xf9\x57\x52\xa9\xa3\x4b\xbd\x58\xf2\xfc\xe1\xcb\x93\x02\x82\x95\x6b\x34\x3c\xcf\x34\x43\xf1\xa1\x7e\x05\xb0\x87\xfb\x29\x46\x5c\x65\x88\x47\x10\x39\xaf\x6b\x23\x7a\xd4\xaa\x89\xb6\x0e\x57\x95\xbd\xab\x9f\xbd\x5c\xa3\xf1\xdf\x27\xdb\x98\xa4\x17\xc9\x37\xbd\x70\x05\x66\x6c\x02\x10\x2a\x51\xf5\x43\x4d\xa6\xe8\x66\x73\xb4\x45\xe1\x85\xf3\x88\xd6\x44\xc2\x92\x03\x19\x13\x9e\x30\xdb\xd8\x12\x87\x90\xab\x96\x4c\x25\xba\x6f\x8c\x5c\xf5\x2c\xb9\x91\x94\xda\xcf\x5c\x69\x2f\x33\x98\x46\x62\xa7\x04\xd1\x8d\x2c\x96\x90\x7e\x1c\x54\xfe\x24\xb4\xfc\x04\xa8\x9e\x34\x61\xad\x80\xa4\xe6\x63\xac\x9c\x21\x0b\x07\x6f\xca\x1f\x8f\x95\xe3\x27\x19\xea\xf5\xef\xb4\x40\x9c\x40\x3b\x47\x9a\xc5\x3f\x61\xbb\x9b\xe0\xc8\x85\x61\xb5\xac\xc7\xcd\x17\x29\x03\x75\x24\xa0\x42\x29\x28\x18\x09\x9d\x80\xb0\x0a\x01\x25\x98\xb9\x50\x72\x6a\x50\x41\x29\x9f\x3d\x31\x7a\x1c\x64\x06\x84\xa0\x3d\x90\x8f\x31\xa5\xe3\xa0\x3f\x20\x39\xa7\x00\x2e\xa8\xf6\xfd\x08\xe2\xa7\x4a\x74\x77\x9d\x31\x59\xd2\x3e\xc6\xcb\xc0\x40\xf6\xea\x4a\xc7\x5e\xac\x63\xa8\xc2\xa0\xfd\x40\x19\x6a\xa1\xb1\xe5\xcf\x7c\x2e\x4b\x4b\x30\xd8\xfa\xca\x5d\x79\xad\xef\x25\x54\x7a\x69\x43\x9d\xab\x3a\x5d\x37\x9e\xe5\x3b\x04\x06\xb6\x15\xe3\x27\x0e\xea\x27\x71\x78\x57\xd7\x2e\xec\x35\x08\xcf\xce\xb4\x43\xf7\xb9\xc3\x36\x14\x2f\xfb\x04\x33\xd0\x5f\x5d\x7d\xb2\xe3\x09\x8e\x5b\x10\xa4\x64\x3e\xe9\xb3\x25\x49\xaf\xc4\x6b\x02\x6a\x99\x50\xac\x2e\x7a\x47\xf1\x7e\x6e\x43\x03\x5f\x6b\x1d\x45\xc9\x54\x9f\x51\xe9\x99\x5a\x84\x4a\x39\x76\xbc\xda\x15\x6a\x73\x45\x9c\x56\xa9\x66\x56\xd4\x72\xda\xc7\x73\x53\xa0\x2e\x54\x66\xc0\x0a\x1e\xd4\x9c\x06\x5c\x16\xa2\x34\x6d\x1b\x2b\xc1\xb6\x24\xa7\xa1\xca\x31\x88\xfc\x36\xec\x0c\x23\x6c\xb3\x1e\xee\xb8\x8d\xe2\x13\x2b\xa6\x9f\x8c\x38\xaa\x4e\x5d\x84\x6e\x82\xf8\x92\xe7\x22\xae\xfa\x1e\xed\x8f\xb0\x33\xe2\xd6\x68\x29\xe6\x2d\xc1\xfe\x20\x6b\xa4\x56\x9c\xad\x11\x52\x4c\x5c\xc0\x34\x91\x90\xb2\x28\x09\xa1\xa1\x29\x16\xab\x38\x61\x0c\xfa\x62\x25\x92\x38\xe9\x9e\xbb\x07\x70\x40\x4a\xda\xbf\xba\x48\x80\x33\xc7\x4a\x59\xa6\x4a\x2d\xb2\xc6\x48\x8a\x12\x1f\x61\x0f\xee\x60\x0b\x26\x67\xb0\x7e\x7b\x30\xb2\x05\xbb\xc6\x60\x1a\x57\x4b\x3e\x67\x8a\xf1\x12\x89\xbb\xba\xa3\x7c\xb6\x0a\x5b\xda\xa4\x3e\xa3\x73\xe1\x43\xe8\xcf\xd4\x17\x6a\x95\x5f\x16\x9c\x00\x87\x50\xa5\x41\x59\x4d\xd7\x6b\x48\x42\x67\x17\x2d\x99\x6a\xc8\x68\x48\xb7\xb4\xd3\x3c\xae\x7d\xd5\x9e\xdf\xa1\x63\xd5\xb7\x9f\xda\xa3\xc9\x77\x55\xdf\x1e\x6a\xaf\xed\x6c\xee\x23\xfb\xf6\x6a\x8f\xee\x02\x87\x54\x5f\x30\x9f\xa4\x19\xa5\xd6\xac\x4a\xc3\x74\xdc\x3f\xd5\x9a\x53\x6b\x7d\xaa\xe9\x34\x6a\xe9\x7b\x99\xd6\xfc\x76\x53\x83\x0e\xd7\x98\x33\xf2\xda\xe5\xe6\x6c\xa3\x91\xa8\x47\x43\xe2\x20\x89\x13\x89\x7d\xc2\xcf\x98\x78\xf3\x1f\xa1\x2f\x4b\x51\x84\x51\x24\xda\x37\x1e\x35\x0d\xb9\x71\x95\xe5\x98\xeb\x4e\x89\x25\x90\x79\xd2\x2a\xcc\x8e\x9a\x4c\xd7\x9f\xd4\x3c\x24\x2b\x0d\x34\xf3\x8e\xd1\xdc\x13\x38\x74\x40\xa3\xd9\xc9\x71\xa8\x1b\xa9\x9a\xad\xfc\x6c\x90\xf3\xdd\x85\x8c\x80\xb0\x1a\xe7\xc7\x6f\x45\x53\xe2\xc6\xc0\x24\xc3\xae\xb2\xc3\x3e\xd2\xb1\xb4\x75\x24\x3a\x1b\x2c\x6d\x8a\x41\x18\xbd\xd5\x90\xae\x1e\x67\x65\x8f\xdd\x6a\xbc\x5a\x1d\x67\x65\x8f\xd9\x6a\x7a\x36\xd4\x35\x06\x6e\x4b\x35\xae\x33\x6c\xb7\xd4\xc0\x61\x36\x4d\x69\x64\xe1\x18\x4e\x75\xdc\x10\x22\xfe\x34\x09\xaf\x7a\x86\x5b\x3c\xa8\x9e\x60\xa8\xb7\x0e\x64\x6f\x6f\x40\x31\xfe\x2e\x07\x6c\x1f\xf5\xde\xb5\x58\x07\xa0\x6e\x63\xb5\x76\xb6\x06\x12\xfa\x07\xb6\x5a\x4f\xa9\xc0\x1e\xbb\x19\xbb\x49\x4d\xad\x57\x51\x3d\xee\xfd\x5e\x73\x77\x5b\x53\xd7\xad\xe6\x2d\x4f\xf9\x1b\xf5\x8f\x8b\xc4\xda\xee\x94\xbf\xa3\xfe\x19\xa7\x64\xd6\x29\x18\x00\x3a\x5e\xc9\x30\xf1\xa1\x92\xb5\x55\xef\x54\xea\xb3\x57\xd1\xb8\x75\xbd\xa3\xb2\x59\xaf\x68\xfc\x16\xb4\x5e\xd9\x6c\x65\x47\x22\xcc\x63\x28\x8b\x2d\x8c\x9d\xfd\xd5\x83\x53\x0b\x03\x0e\xe1\x8f\xc5\xae\x39\x94\x77\x70\xa4\x67\x30\xb1\x57\xe8\x88\x77\x30\xaf\xa0\x4b\x76\xde\xee\x78\xcc\x8f\xe6\x17\x5c\x67\xb1\x74\xdd\x4a\x1f\xc9\x99\xf1\xdf\xc4\x15\x76\x04\x45\x11\x9b\xf5\x8f\xd5\x7e\xf8\xd3\x0d\xb6\x83\x1b\x2c\x3e\xea\x1f\x72\x29\x87\x65\xdc\x5d\x79\xfb\x9e\x0f\xe2\xa5\x08\xd0\x4f\xea\xfe\xe9\x7a\x7e\xb6\x59\x67\x61\x27\xcc\x1a\xf0\x0a\xc2\xf5\xa5\x93\x84\x0d\x6b\xe7\xbb\x95\xf7\x30\x91\xfa\xbf\x8d\x5a\xcf\xb9\x96\x7c\x49\xef\x92\x3a\xba\x38\xc1\x42\xb7\xf8\xfa\x59\xb2\xe5\xb7\x4a\xef\x13\xa8\xed\x43\x4c\x07\xd5\x96\x0f\x5a\xde\x86\x56\x28\x8a\x9c\xcd\xb8\x96\x59\x08\x12\x06\x71\x1c\xd3\x68\xae\xbf\xba\x1a\x4f\xc3\x8d\xad\xb1\xca\xcb\x15\x24\x9f\x74\xab\xfa\xe0\x8e\xd4\x94\x78\x36\x59\xa8\x7b\x26\x96\x95\x59\xc5\xc5\x7b\x9e\xe7\x2e\xae\xbd\xe7\xa2\xb1\x53\x25\xe8\x8e\x9a\x58\x39\x75\x03\x30\xdd\xbd\x63\x08\xed\x76\x41\xbf\x98\x15\x82\x4d\xa5\xbc\xde\xc0\xce\x08\xd0\x1f\x03\x57\x3a\xe6\x9b\x88\x70\x87\xed\x2a\x60\x5a\xc0\x57\x6d\x10\x33\x15\x42\xba\xc3\x81\x1f\x10\x03\x9c\x61\x2b\xc8\x54\x8d\xde\xc1\xdc\x69\x31\x37\x0d\x87\xe4\x94\xbd\x29\x33\x77\x6f\x08\x8d\x55\xa8\x18\x8f\x2b\x91\x68\x16\xd4\x58\x5e\xcd\x3b\x61\xf5\x00\xd1\xd1\x22\xf7\x84\x80\xae\x2a\x38\x67\xaf\x74\xe6\xb2\xd6\x26\xca\x43\xf1\x2d\x58\x68\x4a\x84\x87\x9d\x95\x73\xe6\x24\x05\x3d\xdb\x94\xf5\xca\xac\xa5\x92\x80\xb1\xc7\x10\x79\x14\xbb\x65\x53\x18\x59\x15\xc4\xd2\xed\x97\x01\x7e\x6f\x95\x5a\x6b\x2e\xbb\xaf\x04\x73\xaf\x88\xd8\xb3\xc6\xb0\x52\xa1\x40\x58\xd2\xf9\x86\x2a\x11\xa1\x80\xb8\x2b\x7b\x04\xef\xb6\x2a\xeb\x59\x21\x2d\xc6\xfb\x85\x72\x15\x16\x0a\x70\x96\x78\xd6\xb9\xe9\x45\x11\x2e\xa3\xe4\x00\xb7\x26\x2c\x04\xd7\xa7\x17\x33\x37\x5a\x6b\x21\xdd\xca\x41\x34\x87\x06\xf0\x6b\x21\xc2\xf3\x05\xd6\xa1\x0d\xb2\xe7\x40\xf6\x2e\x68\xc2\xb3\x58\xa5\x99\x0c\xe9\xf0\xb0\x62\x23\xb8\xf8\xb3\x8b\x8c\xe9\x00\xa6\x0e\x06\xf7\xb8\x14\x07\xe8\xb9\xb7\xa4\xbe\x74\xb8\x76\xab\xcd\x6e\x23\x9e\x10\xfe\x63\x3a\x0d\xbc\xcb\x00\x7f\x74\x9d\x58\xfa\x60\x92\x92\xb2\x53\x2d\xd6\x3d\x08\x37\x5b\xc1\x2e\xc5\xd6\x33\x54\x22\x8f\x53\x79\x57\xee\xdb\x8d\xc4\x17\x77\x70\xdf\x02\xdb\x1d\x04\x13\xea\x14\x3a\xa6\xb6\x68\xd4\x62\x69\x5d\x5a\x18\xe2\xd5\xd5\xdd\xe7\x3e\xa0\x8c\x7b\x11\xeb\x0e\x89\x9d\x31\xfc\x66\x32\x38\x60\xac\x3a\x67\x2b\x6c\xf9\xed\xe7\x81\x0d\xbb\xb1\x65\x5f\xd8\x1d\xe2\x92\xc5\x5b\xb6\xf4\xde\x20\x1b\x58\xbb\xea\x27\xee\xd2\x3a\x45\x79\x27\x6b\x55\x42\xcf\xcc\xb9\x14\x45\x5f\xbf\x13\x7b\x72\xfa\x3d\x7c\x19\x5d\xb4\x5b\xbb\xb0\x59\x82\xb9\x77\x27\x79\x02\xec\x8e\xd7\x12\x1e\x74\xf2\x36\x47\x5c\x72\x75\xab\x5d\x81\x14\xf5\x40\x87\x9e\xe9\xb0\x86\x5c\xd6\x21\xfe\xe2\x7d\xeb\x1e\xed\x29\x7b\x1e\xcd\x01\xdf\xf2\x16\x14\x9c\x22\xa4\x05\xe8\x2c\x25\xbf\x2d\x45\xc3\x8e\xcf\xca\xc3\x6a\x57\x4b\x5e\x6d\x43\x7f\x37\xa9\xde\x4d\x64\x2c\x0f\x70\x85\x05\xa0\x07\x22\x7f\x02\x33\x4e\xb7\x8b\xe9\x5b\x14\xe1\x4f\x67\x08\x34\x22\x98\x22\x51\xe3\x6c\xdd\x3f\xf3\x0e\xf9\x0f\x4b\x72\xac\xc2\x6b\xd5\xee\xf9\xad\x58\x8d\x27\xf3\x9c\xcb\x22\x0a\xbe\x0c\xcf\x03\x40\x76\x2b\x56\x1b\xc8\xfa\xdc\x18\xfb\x6a\x12\xc5\xd9\x02\x65\xc5\xdc\x41\xa3\xb8\xca\xf8\xc8\x8b\xce\x5a\x2e\x8b\x31\x75\x92\x47\xd3\x65\xfd\xf6\xd0\x4f\x11\x6b\x18\x84\x54\xd0\x1e\x50\xfb\xd0\x62\xca\xae\xb0\x45\xde\x22\xe4\x3c\x47\x0f\xbf\x17\x26\x5b\x38\xeb\x15\x4e\x94\x7e\x78\x4a\xe5\x9d\x43\xa2\xa9\xd7\xc6\xdf\xad\xb0\xf8\xb9\xbb\x70\x4f\xbe\xd1\xb0\x6c\xa8\x79\x28\x19\xc4\xf6\x73\x55\xfb\x28\x0e\xbf\xa1\x84\x81\x9c\x22\xd7\x86\x1b\x99\xb9\x86\x9a\x65\xee\x43\x32\x40\xf4\x81\x85\xa9\x1a\xf2\x45\x3d\xa3\x2d\xe1\x32\x14\x85\x1a\xa1\xe1\x37\xf1\xf5\x85\xba\x2f\xef\x79\x9d\x3f\xbf\x7a\x35\x49\xf5\xbb\xaa\xd9\xe5\xd5\xcf\x80\xe6\x52\x2c\x95\x4b\x82\xc6\x6d\x2e\xba\x65\xe8\x97\x01\x07\x37\xae\xa3\xe7\x4e\xbd\x7e\xbd\x9e\xd9\xcd\x0d\x80\x4e\xb3\xaa\x79\x82\xc3\x78\x23\xcb\xfb\x0e\xc2\x33\x52\x05\x56\x05\xe8\xad\x73\xfc\x13\x94\xc8\x9c\x80\x36\xbd\x76\x9a\x2e\xb3\x1c\x52\xbc\x71\x2c\xf7\x13\x25\x6c\x5a\xe9\x05\xdc\xfa\x75\x11\x87\xae\x88\x98\xf2\xba\xb3\x5a\xca\x09\xc5\xf7\xbc\x92\x5b\x71\xca\x39\x04\x8e\xc4\x31\x07\xbe\xc3\xac\xb0\x75\x62\x1f\x74\xf4\x9b\xf7\x6f\xe5\x07\x66\x0f\xcd\xed\x63\xe0\x0e\xf4\xc8\x94\xbd\x85\xa2\x36\x92\x1e\xbe\x85\x2c\x09\x32\x6b\xec\xac\x76\xda\xa8\x07\x09\xec\x0e\x1f\xa1\x82\x02\x18\x77\x7a\x70\xe3\x25\x6f\x1e\xd6\x08\x8d\x31\xec\xb5\xba\x42\x05\x4f\xf8\x04\x8e\x96\x77\x12\x0d\xa8\xc0\x17\xb4\xb4\x4f\xcf\x1b\x8b\xd6\xcf\xaf\x5e\xec\xc4\x9b\x0a\xbf\x5d\xaf\x95\xf6\xe5\x8c\x1d\x20\x12\xf2\x41\x23\x90\x3d\xb0\x90\x97\x90\x30\x18\xea\x51\x43\xb6\xe6\x6e\x32\x6f\xe9\xda\x07\x2e\x24\xef\x50\x66\xe0\x11\x36\x83\x3d\x17\x83\xfd\xfc\xf5\x00\xea\xe3\xd7\x07\xda\xc3\x9d\x35\x72\x24\xb6\x5e\xa9\xfc\x9d\x58\x56\x05\x14\xa3\xec\xe9\xbf\x33\xc8\xc3\xe8\x43\xbd\xa1\x7f\x0f\x78\x46\xfd\xbb\x1b\xcc\x3d\xe7\xe6\xb0\x24\x09\x03\x84\x0a\xdf\xee\x98\x41\xdd\xe2\x9d\x05\x86\x6d\x99\xe2\x90\x82\xb9\x6a\xca\x3c\x34\x63\x71\xad\x22\x87\xc0\xf7\xb5\x75\x71\x2d\x5d\xf0\x78\x1d\x20\xa1\x51\xa7\x5b\x38\x6c\x61\x92\x55\x2a\xf7\x04\x59\xc3\x91\x11\xf6\x76\x1f\x1b\xd0\xe4\x6e\xb9\x63\x92\x17\xb7\x37\xb9\xa3\xcf\xfb\x8c\xee\xe4\x71\xc7\xec\x8e\xa7\x34\xde\xf0\x4e\x30\x1e\x6f\x7a\xc7\x83\x8d\x34\xbe\x01\xe2\xbb\xd6\xb7\x2d\xf3\xfb\x40\xdc\x7d\x8b\xab\x79\x6d\xe1\x5f\x60\x6c\xf2\x62\xbb\xe2\x6f\xfc\x50\xec\x5e\x8b\x5a\xe5\x62\x87\x12\xbf\xa1\x18\xae\xa7\x5b\x04\x69\xbb\xd2\xbe\xcb\x08\x85\x75\x65\xae\x49\x09\x8e\x2f\xe9\x9b\x22\xb4\x0b\xe8\x71\xc5\xa7\x5d\x21\x5f\x74\x62\xef\x50\xcc\xf7\xd9\xc5\xa0\x1c\xc5\x98\xb5\xe5\xe8\x47\x6b\x01\xbf\xb5\xab\x67\x12\x8a\x71\xf7\x08\x93\xce\x16\x22\x6f\x0a\x59\xde\xfc\x1e\x7d\xd3\xe9\x1c\x1d\x3d\x02\xfd\x4a\x46\xbf\xf6\x07\x32\xba\xe4\x86\x5a\x6f\x5c\x33\xb3\xb0\xfb\xa5\x7b\x8b\xf1\xaa\x2a\xa4\xd5\xb0\x23\xdc\x45\xe8\x7c\x83\x01\x6b\x18\xd0\x82\xbf\x13\x35\x96\x9c\x0f\x5a\x85\x36\x8f\xf0\x22\xd1\x3a\x56\x2c\x6d\x28\x78\x9d\xe4\xc0\x84\xa7\xd3\x30\x34\xdc\x70\xc0\x1c\x43\x0d\x73\x57\x54\xc5\x5d\x47\xf9\xab\xf7\xe8\x95\x5a\xb8\x59\x3a\xcf\x7e\x00\x3f\x22\xe4\x3d\xf0\xe1\x09\x1c\x5e\xde\x23\x5e\xed\xab\x23\x7c\x4b\xd4\x93\xd8\x25\x6f\xcf\x3a\x1b\x58\xeb\x3f\xbc\xaa\x45\x2e\x33\x54\xf2\xd7\xa2\x96\xbc\xf8\xdd\x4f\x4b\xf7\x00\x65\xb4\x41\xeb\x70\xab\x66\x0f\x72\xf7\xbe\x9b\xfe\xc6\x5a\x5d\x1e\x8b\xe8\x36\x11\xdc\x60\xd2\x85\x08\xd0\x98\x3e\x02\x81\xca\x22\xfd\xc4\xad\xbe\x87\xb2\x4d\x3c\x93\xa3\x6e\xde\x22\x2a\x56\x7e\xa2\x6b\x88\x08\x07\x53\xbf\x55\x40\x2b\x1d\x14\x9f\x03\xd0\x12\xe8\x65\x2d\xcf\x6b\x82\xef\xee\x0b\x6a\xa1\xa9\xb7\x8a\x9c\xfb\x31\x37\x6a\xe4\xd0\xbb\x10\x36\x29\xca\x65\x86\x09\xfc\x9f\xdb\x6f\xd8\xdd\xff\x05\x6d\x55\x26\x3b\xb2\xb3\x85\x3a\x58\x50\x64\x8c\xfb\x10\xca\x2b\x62\x90\x89\x70\x6c\xa1\xab\x5a\x9a\xb8\x5d\xbb\xbe\x07\x4d\x0c\x0e\x27\x40\x87\x0c\xb8\x09\x89\x13\xb7\xfd\xd7\xfe\x3a\x0e\x14\x6f\x5b\xc7\x1d\x9c\x93\xa5\x32\x0f\xc2\xcd\x78\xdc\x5d\x7c\xe3\x09\x65\x89\x49\xee\x22\x02\x30\xf0\xf1\x2b\xa1\xed\x13\xef\xab\x81\x37\x65\xd7\x92\xee\xde\xed\x8a\xad\xad\xa4\x60\x78\x62\xc0\x0f\x35\xa9\x34\x76\xae\x8e\xe5\x21\xca\x87\x0a\xb6\x04\xfe\x1f\x96\x67\x50\x1f\xf4\xef\x4a\x1b\x57\xc9\x82\x5d\x51\xa0\x27\x22\x88\x0f\x5f\x5d\xe9\x28\xdc\x77\xd6\xe0\x7d\x2f\x85\x77\x39\xc7\x13\xbe\xc8\xfe\x72\x31\x85\xff\xff\xf4\x80\x0c\x47\xf2\x81\xfd\x80\x63\x66\xaa\x9c\x17\x32\xb3\xa4\x31\xf7\x42\x94\xa8\x1a\x81\x7b\x10\xfa\xb4\x88\x67\xe4\x42\x57\x3d\xe2\x78\xb3\x44\x78\xc2\xbb\x54\xb6\x63\xbd\xa4\x84\x2d\xc9\x87\x58\xf5\x52\x6e\x02\x03\x05\x7a\x11\x05\x27\xe1\xd8\x03\x67\x16\x9a\xbf\xbf\x80\x86\x56\x51\x20\x42\x73\xc0\x12\x42\xb7\xec\xf6\x6d\xa9\x8f\xf7\x9b\x6d\x5a\xab\xb9\x9b\x05\x35\x2d\x80\xd3\x55\x2d\xaa\x5a\x68\x6c\x97\x5a\xb8\xaa\x09\x3e\x50\x6c\x4c\xb5\x84\xdd\x25\xc8\x4b\xb5\x25\x08\x61\x99\x48\x55\xa9\xcc\xf9\x11\x54\x02\x4a\x08\x49\x64\xa9\xc6\x0b\x48\xca\xaa\x45\xc0\xd8\x49\xcd\x9e\x82\xd1\xba\x97\xa4\x44\xe6\x44\x27\xc7\x69\xf6\xb1\x10\x58\x60\x8e\xd1\x75\xa0\xa0\x8c\xd6\xe2\xc1\x98\x69\x95\x5f\x55\x0b\x7b\x9e\x84\x22\xa1\xd6\xce\x0b\xfd\x9d\xc7\x72\xc9\x7d\xee\xb9\x14\x7e\x7b\x09\xb5\x5e\xa5\x2a\xaf\x38\x85\xff\xd4\x4d\xa9\x5d\xb8\xe6\xb5\xc0\x88\x47\xb4\x2f\x63\x4c\x5c\xc0\x1b\xf4\x31\x5a\xcf\x86\xef\x55\x53\xb3\x42\xdc\x89\x42\xd3\x49\x1a\xae\x1f\xe3\x21\xd0\x68\xf6\xec\x8e\x5e\xae\xa5\xaa\xa5\x59\x4d\x28\xb2\x59\x9b\x5a\x66\xe4\x42\xc0\x16\xd8\x97\x57\x3f\x3b\x7f\x36\x86\x93\xf0\xa6\xcc\x16\x53\xff\x25\x7b\xca\xce\xd9\x67\x91\x71\xa5\x2b\x7e\x5f\x46\xa1\x33\x73\x45\x06\xdb\x6c\x15\x3e\xfa\x3c\x14\x5c\xe9\xe0\xf9\xd6\x75\xbb\x06\x70\xe4\x50\xc2\xfb\x60\xea\x0a\x87\xd2\xee\x7b\x4d\xbb\x0f\xc6\x9c\x81\x53\xa9\x20\x6a\xaf\xd9\xd8\x7f\x41\xce\x38\xc4\xf1\xbc\xbb\x2e\x58\x70\x0b\x19\x19\x02\xc9\x9c\x3c\x0c\xbc\xe2\x1a\x21\xe3\x99\xda\xf9\x9c\x22\xc5\xfb\xee\xdd\x15\x5b\x0a\xb3\xb0\x3c\x59\x2f\x3b\x34\x3d\xd0\x25\x1b\x46\x73\x5e\x2a\x2c\x9b\x51\xae\xd8\xb2\x31\xbe\x60\x17\x38\x22\xed\x12\x15\x12\x43\x7b\x29\x1e\x45\xd5\xde\x97\xe1\x3c\x21\x10\xea\x9c\x00\x92\x4b\x02\xe5\xc1\xe0\x75\xc9\x46\x50\x7d\x37\xc8\x7d\x07\xd6\x6d\x99\xfe\x1d\xc4\x73\x06\xa6\xed\xc3\xe6\xa0\xb0\x31\x4a\xb4\x8a\xa1\x32\x08\x60\xdf\xc4\x24\xd7\xed\x51\xde\x00\x3d\xdc\x1a\xaa\x92\xd6\x82\xd4\x07\x0f\xb5\x28\x5e\xe7\x97\xe0\x94\x8f\x8f\xdf\x60\x32\x82\xe7\x91\x22\x49\x1d\xe6\x48\x4f\xc2\xcd\x5a\xf9\xea\xbe\x3d\x14\x84\xcf\xf9\xcd\xdb\xee\xaa\x92\xee\xb5\xe2\xd7\x8e\xb1\x06\x23\xb2\x62\xa5\x5e\x69\x64\xc6\x0b\x86\x05\xd7\x0f\xc0\x99\x74\xb6\x3e\xe3\x36\x52\xc7\xb3\x55\x32\xec\x38\x86\x25\x5f\x6c\xc3\x29\xb7\x02\x76\xe4\x94\x3d\x49\xc5\x8c\x72\x78\xb8\x89\x1d\x8c\x47\x21\x18\xe0\x17\x55\x34\x4b\xe8\x01\xff\xc1\xb0\x9c\x1b\x3e\x61\x33\x59\xf2\x7a\x05\x7f\xf4\x71\xc9\xa8\x9a\xdf\x24\x11\x19\xd1\x07\x51\x58\x10\xf9\x62\xb1\xdd\xde\x1d\x0c\xb3\xd3\x45\xd6\xbb\x24\xec\xc1\x97\xcf\x8f\xbd\xf6\x1e\x79\xe0\x50\x8c\x4e\x1c\x14\x1c\xc5\x58\x61\xcd\xf6\x3c\x84\xec\x96\xe2\xbe\x58\xc5\x5e\xe7\x50\xf1\xdb\xe1\xbe\x54\x4d\x69\xfc\xf8\x4b\x5e\x55\xc2\xc7\x83\x52\xd3\x43\xd8\xf3\xa3\xe6\x82\x01\xef\x33\xbd\x19\x49\x32\x62\x42\x1d\x27\x8b\xa2\x3f\x70\xa9\xd2\x08\x17\xa2\x6e\x7f\x00\x74\x44\x0e\xec\xd7\xeb\x3a\x1a\x3e\xdb\x1c\xc0\xf1\x1e\xa7\xb8\x59\x4a\x9c\xbb\x32\xea\x5c\x87\x8e\xc8\x71\x82\xa2\x80\xa5\xbc\xa0\xef\xf5\x7a\x69\x41\xd9\xd8\xf2\x0e\x6e\xbd\xb4\xf4\x84\xdb\xf5\x8b\x02\x1e\xda\xb6\x15\x87\x75\xa2\xf0\x6b\x1c\x45\x8f\x94\xb7\x5f\xc5\x45\x54\x42\x00\xa7\x3b\x63\x45\xef\xb5\x85\x24\x12\x90\x18\xec\xb0\x90\x24\xd8\x3c\x2f\xb4\xc2\x9b\x27\xfb\x93\x34\x62\xf9\x17\xfb\xce\xa7\xd1\x8d\x15\x2a\x32\x0f\xc9\x51\xb3\xd5\xab\x80\x33\x51\xd7\xaa\x8e\x64\xd5\x12\xc4\xc3\xdb\x21\x7a\x6e\xb4\x30\xba\x1c\x0b\x4b\xfb\x81\xc3\x59\x57\x04\x7b\xc3\x16\x43\xb4\xfb\x7e\xaa\xea\xb2\x13\x48\x36\x49\xfd\x6a\x40\x1d\x60\x8a\x66\xdc\x8d\x84\x21\xbe\x55\x03\xf7\x3a\x9e\x97\xf4\x10\x2d\x44\xd0\xac\x46\x45\xbd\x4b\xa3\x68\xb4\xcd\x22\xef\xae\x2e\x0f\xa1\x01\x71\x3c\xda\x1c\x98\x17\x39\xca\xdb\x02\x41\x8b\x52\xb1\x72\x0c\xb6\x74\x9e\x78\x49\x9b\x28\xbc\xb6\x04\xb7\x12\xbc\x4c\x6e\x02\xa7\x4e\x2f\x3e\x7c\xf9\xf9\xe7\x27\x14\x9d\x09\x2b\x55\x79\x5e\x2b\x65\x58\xa3\x7b\x7b\x4c\xef\x23\x49\x5c\x7b\xf0\x3b\xa9\xb4\x87\x91\x2a\xf2\xe3\x42\xfe\x85\x06\x67\x61\x44\xa1\xd0\x4e\xa1\x91\xf9\xb7\x4f\x2f\x2e\x2e\xc6\x88\xe1\x21\x35\x2f\x8e\x07\x72\x44\xbe\x22\x7a\x0a\x03\x41\x76\x83\x17\xb2\xd8\x75\xed\x7b\x6f\x83\x9b\x43\xcd\x1f\x40\xd6\xfc\x34\xc0\xf3\xdc\x57\x93\x63\x1f\x69\xf3\x9c\xa1\x99\xfe\x44\xc3\x1c\xa6\x95\xd1\x49\x45\xf0\x7b\xc7\x40\x10\x24\xd8\x18\x73\xf4\x6c\xe3\x26\x1b\x22\xbc\x2d\x23\xcf\x2e\x3e\x7c\x7e\x71\x71\xb6\xa7\x20\x7a\x34\xb7\xd7\x87\x83\xba\xd0\xa9\xdf\xf1\xfa\x70\x26\x9c\xbc\xc2\xb6\x8e\x26\x45\x7b\xa6\x74\x4b\xbe\xb9\x17\xd0\x9a\x24\x56\x2c\xc6\x4c\xdd\x89\x32\xf2\x08\x14\x82\x55\xa2\x5e\x4a\xc8\x70\xdd\xa2\x13\xd0\x6e\x6b\xe3\x48\xfb\xb7\x5f\x07\x04\x7e\xfb\x70\xae\x87\x13\x7a\x57\xd7\xcf\xd9\x94\x3c\x36\x27\x51\xea\x91\xc0\x0f\xa2\x74\xd7\xca\x7a\x2c\xe7\xfe\x92\x7f\xcc\xde\x7f\xb2\x7d\xff\xe4\x8a\xd8\x0b\x20\xc4\xec\x19\xb1\xf4\x23\x7e\xa4\x3a\x79\xbc\x78\x6e\xd2\xe0\xa3\xb4\xb7\x73\x7f\x6d\x2d\xd5\x6b\x25\x1a\x59\xb3\x83\x54\xaf\x93\xe8\x70\x0d\x3a\x4a\x83\x8f\xd1\xde\x9b\xca\x10\xa4\x1a\xfc\xc1\xb4\xf7\x71\x4d\xe8\x9e\xb5\x14\x8c\xea\x3f\xe4\xca\xd9\x6c\x7e\x8f\x35\xbd\x13\x99\x3c\xc8\x09\xd0\x87\xe7\x8d\x33\xbf\x1f\xce\xf4\xf6\x99\xf1\x0e\x7d\x5e\xf5\xde\xfc\x8c\x94\x4c\x59\xb6\x21\xea\x98\x75\xbe\x86\xc9\x47\xe7\xb3\x0a\x15\x04\xb8\x59\xb4\x9d\x89\xc8\x6a\xa7\x19\x7b\xb0\xc1\x3a\xc2\x14\x5c\x4b\x40\xe3\x01\x8f\xaa\x83\x1a\x57\x6c\x79\x04\x53\x47\x79\x1d\x8f\xe0\xa3\x7e\x2c\x5e\xc7\x80\xe1\x83\x38\x1d\x0f\x26\x05\x51\xca\x08\xd1\x65\x12\xdd\x76\xaf\x93\x85\x24\x43\x83\x48\xba\x2e\x91\x30\xab\x1a\x84\xba\x93\xe3\xe6\xb9\xd3\xe2\x38\x21\x68\x21\x09\x9a\x3b\x9a\x00\xca\xf1\x35\x46\x32\xda\x2d\xa6\xf3\x0c\xf6\x0d\xef\x6b\xe3\xb2\xb4\xdb\x81\xb4\x66\xa4\x4b\xd6\x0f\x73\x9f\xfa\xb5\x8a\x69\x26\x2e\xc7\xa3\xbf\x21\x0a\xe6\x85\x86\x30\x81\x50\xc0\xc4\x77\xab\x05\x81\x22\x0d\xef\xf8\x4a\x4c\xd9\x3a\x4d\x84\x57\x72\x4b\x86\x52\x64\xe7\xa1\x39\x1a\xc0\x3e\x6e\x9e\x12\x9e\x3b\x32\xd5\xa5\x37\x3e\x2a\xae\x26\x39\xa4\x87\xe4\x6b\x94\xe7\x8b\x7d\x95\x1f\x2b\x63\x13\x0a\xec\xc0\xda\x34\x0b\xf7\x31\x32\xf7\x08\xab\x36\xe2\xae\x13\xeb\x47\xce\xdf\xed\xd6\x6e\x74\x3f\xdd\x02\xf0\xb8\x38\xec\x37\x8b\x89\xb7\xe6\xdb\x39\xda\x7b\xb2\xbd\x93\xf2\xfd\x97\xac\x6a\x3e\x75\xa9\x99\x6e\x50\xbf\x2f\xbb\xb0\x43\xfa\x83\x0e\xc7\xe2\xf1\x8a\x47\xbc\x57\x47\x5b\xaf\xc3\xdc\xf3\xd8\xbd\x9f\xa4\x65\xb2\xad\xd4\xc5\x88\xad\x1d\x13\x35\xfa\x24\xc9\x57\x8e\x4a\xe3\x41\x87\xb8\x7e\xca\x7d\xe3\x84\xb2\x87\xc3\x76\xc4\x2f\xc6\xe6\xa3\x93\xc0\xd6\x06\x94\xee\x27\x43\x72\x18\x43\x14\xf5\x76\xdb\xd6\xc0\x96\x85\x67\xe6\x11\x4a\xed\x91\x89\xa2\x4b\x24\xdf\x53\xd8\x2a\x95\x63\x41\xd6\xb2\x58\xed\x74\xe6\x3c\x95\xbc\x5c\xd1\x7c\x77\xb0\x55\xdc\xa7\x8f\x6b\x13\x8b\xdd\xfe\x17\x9f\x5f\x5c\xec\xc8\x48\xbb\xc6\x5f\x44\x77\xac\xaa\xa4\x58\xac\xc8\xa9\x7f\x9a\x23\x86\x8f\xe4\x27\xa7\x14\xfc\x4a\xfe\xed\xe0\x7e\x3b\xaf\xcf\xe9\xff\xd6\x48\xc2\x3a\x29\xc0\xe0\xed\xad\x25\x61\x9d\x14\xb8\xec\xd6\x21\x49\xd8\xe9\x7a\x13\x15\xcb\xe1\x1d\xe4\xbb\x49\x5b\x70\x83\xee\x29\x6b\x4b\x12\x32\x64\x8b\x85\x7a\x72\x41\xdb\x53\x83\x04\x41\xed\xf8\x86\x83\x70\xb6\x84\xcb\x65\x5e\xec\x28\x60\x7d\xc2\xd5\xba\x40\x7d\x3c\xf7\xe7\xbb\x09\x98\x8f\xc5\x2c\x95\xf1\x89\xfa\xbb\x08\x59\x17\x90\x25\xdc\x52\xe5\x71\x66\xcd\x23\x92\x32\x57\x8a\xd8\xca\x1a\x56\xae\x14\x3c\x5b\xb8\xbb\x3b\xac\xb9\xe2\xa7\x32\xa0\xb3\xd2\xcb\x91\xae\x58\xc5\xc4\xd8\x41\xba\xa2\x0e\xa8\x31\xa4\xd9\x8a\xf1\x3c\xc7\x84\xf5\x52\xdc\x47\xcf\x9c\x0f\xd6\x65\x11\x25\x3e\xf8\xd6\xab\xdd\xa2\x86\x1d\x17\xec\x69\x36\x54\x12\x9c\x82\x8a\x68\xec\x21\x7b\x00\xe2\xa3\x17\x3b\x9c\xc5\xba\x5d\xd2\x07\x64\x76\x25\x8e\x48\xb0\x9d\xc5\xd4\xee\x39\x49\x40\xda\x72\x86\x29\xe0\x3d\x22\xe6\xc5\x0b\xdf\xe8\x48\x56\x2b\x16\xf8\x68\xd2\xf5\x72\x59\x99\xd5\x0b\x59\x4f\xd8\xf5\x82\xd7\x7e\x08\xed\xb3\x22\x3d\x39\xd7\x2a\x39\x07\xc6\x7f\x6e\x6d\xf6\x56\xa9\x13\xdd\x3b\x40\x7a\xce\xd9\x5c\x54\xc8\x72\x2c\x2d\x20\x54\xb2\x33\x41\xc3\x9f\xf9\x5b\x2a\x37\xf6\x02\xea\x94\xf5\x0c\x99\x1c\xf5\x43\x3c\x7f\xe5\x78\x63\xee\x15\x9b\x35\x7a\x35\x53\x1f\x98\x5c\xf2\x1b\x11\x23\x69\xa1\x3b\xe0\x91\x19\x18\x22\x1c\x42\x6d\x09\x0f\x70\xc9\x65\x44\x4d\x02\x71\xcf\xa5\x71\xdd\x96\xac\xe8\x35\xb3\xe8\x95\xbc\x56\x15\xd5\xed\x00\xfe\x62\x1d\x92\x16\x1c\xee\x1b\xad\x13\x7d\x73\x6e\x78\x27\x25\xe1\x8b\x41\x11\x01\xd2\xbd\xcf\x65\x3d\x2c\x19\x4b\x91\xcb\x66\xe9\x8e\x7f\x2d\x73\xfe\xcb\xcf\x3f\xdf\x4a\x30\x5a\x42\xf1\x17\x77\xcd\x3e\xb1\x90\x26\x34\x06\x9e\xff\xf7\x89\xd5\x19\x2d\x28\xc9\x55\x5f\x30\x8f\x2e\xe8\xa2\x9c\xd1\x8b\x60\xac\x10\x67\x65\x19\xee\xed\x88\x0b\xf7\x90\x5c\x1c\xfe\x1e\x0c\x24\x08\x7b\x4b\xe7\xfa\x1e\x86\x3f\xaf\xef\xad\x65\x56\xd3\x99\x81\x6e\x1f\x57\x55\x08\x6e\x59\x56\x73\xed\x0f\xe8\x74\x15\x98\x86\xc1\xb8\xb8\x99\xfd\x6c\x2d\x17\xc3\xbb\xde\x98\x9f\x30\x55\x87\x46\x48\x1a\xea\xdc\x3d\x61\x3f\xbc\x7a\x31\x5e\x49\x8d\x97\x40\x74\x6b\x74\x05\x70\x8b\x50\x98\x2d\xe5\x11\xa8\xfd\xe9\x81\xec\xfe\x8d\xd2\x08\x6c\x3d\xc3\xc9\x9e\x59\x6a\x9e\x61\x95\xcc\xb3\x49\x2b\x5a\xa5\x2b\xaa\x3b\x89\xa9\xaf\x8c\xd1\x2f\xaa\xbb\x88\x69\x1c\xf9\xdd\x2f\xaa\xdb\x8a\x29\x42\xdc\xee\x58\xb0\x49\x4c\x01\xa6\x17\x55\x78\x88\x8e\x3a\x10\xb3\x6f\x3d\xdd\x8f\x21\xc4\x03\x6a\xf4\xcb\x2f\x0f\x25\xb6\x5f\x7e\xf9\x98\xd4\xe8\x97\x5f\x3e\x98\x1a\x85\xff\xfc\xa9\x46\x47\xaa\xd1\x2f\xbf\x9c\x1c\x49\x8f\x7e\xf9\xe5\x47\xa2\x47\xbf\xfc\xf2\x41\xf4\x68\x9f\x9c\xfe\xa9\x47\x77\xd3\xa3\x5f\x7d\xf5\xd5\x81\xc4\xf6\xab\xaf\xbe\x7a\x44\x7a\xf4\xab\xaf\xbe\x7a\x20\x3d\xfa\x01\xff\xf3\xa7\x1e\x1d\xa7\x47\xad\xd8\x1c\x45\x8d\x5a\xc0\x1f\x85\x1a\xb5\xa2\x7a\x7a\x35\xda\x2f\xa6\x7f\xaa\xd1\x87\x39\xd5\x77\x4f\xf4\xa7\x12\xda\x11\x27\xfa\x3f\x4f\xdf\x07\x3d\x7d\x1f\x48\x50\x3e\x0a\xdd\x06\x47\xed\x1d\xe5\xc7\xe5\xda\x1f\x46\x0f\x1d\x24\x57\xa9\x47\x7e\x00\xe2\xe3\xd1\x43\x7b\x1e\x8b\xbb\x47\xe2\x47\xa0\x87\xdc\x91\xf8\xcf\xe3\xeb\x41\x8f\xaf\x07\x12\x94\x8f\x43\x0f\xd9\xa3\xea\x8e\xf2\xf3\xa7\x1e\x3a\xfd\xb1\xb2\x7b\xa4\x7c\x78\x3d\x04\x76\xba\xef\x56\xd6\x2f\x48\xf6\x5d\xae\xff\x3c\x06\xee\x72\x0c\x3c\x90\xc0\x7c\x14\xfa\xc8\xcb\xd2\xf6\x72\x84\xea\x68\xa3\x2c\xfd\x79\x4e\xeb\xd1\x4b\xa1\x8a\xd3\x78\x49\xa3\xef\x55\x19\x05\x57\xc3\x08\x24\x82\xc0\xb4\x10\x80\x5c\xd7\x22\xa3\x50\xb8\x53\x3b\xc0\x52\x19\xf2\x47\xf9\xd1\xfa\xe8\x14\x3b\xd7\xa9\x14\xca\x7e\x9c\xc6\x25\xd5\x62\xb0\x63\x6e\x88\x5b\x3d\x01\x83\xc7\xeb\x97\x7d\x76\xa2\x88\xf3\xce\xa9\xb4\x6f\xa4\x61\x57\x37\x60\x2a\xc7\xf1\x55\x00\xfb\xb5\xe6\x55\x25\x6a\xbf\x44\x42\x56\x31\x71\x7a\xc2\x4a\xc5\x6a\x9e\xad\x8d\x90\xf7\xe0\xee\x09\x5c\x6b\xeb\xb1\x93\xcf\x78\xa3\x05\x40\xb2\x7a\x37\x97\xa1\xf6\xee\x42\x94\xac\xd1\x94\x9e\xe0\xd3\x85\xa3\x6a\xeb\xa3\x0a\x40\x7c\x71\x11\x37\x61\xfd\x85\x10\xb0\x8c\xfc\x82\xd5\xae\x96\x35\xf5\x19\x73\xa1\xab\x3a\x4a\xa3\xee\x89\xb3\x99\x86\x36\x16\xaf\xdf\x50\xbf\x92\x7b\x2e\x81\x77\x16\x57\x1a\xa4\x13\x11\xf3\x59\x4f\x21\x57\x24\x55\xe0\xc8\x7b\x22\xd5\x68\xce\x5c\x8b\xac\x16\xc6\x75\x9e\xeb\x61\x92\x2b\x3a\xbf\x37\xa3\x5c\xf1\xfa\x0d\x2d\x5d\x10\x9f\x28\xab\xa3\x8d\x56\xa7\xb2\x2b\x84\x0f\xc5\xad\x41\x30\x00\x89\xc2\xe6\xb4\xe1\xb5\xc1\x17\xd7\xcd\x75\x8d\xd3\xf7\xa0\x8c\xb8\xaa\xd5\x3f\xb1\x9a\x40\xa7\x00\x45\x85\x8f\x36\x45\xe7\x06\x08\x99\x5a\xce\x64\x29\xf2\x28\x6d\xc4\x3e\x81\x3a\x0b\x99\x5a\x56\xaa\x04\x33\x04\x2b\x95\xf0\x5b\xa4\x4b\x53\x61\x90\x97\x1f\x0c\x22\x2d\x7f\xbb\xf2\x7f\xff\xbe\x7b\x14\x65\xda\x25\xaf\xf2\x88\xba\x38\x4e\xea\xc8\x0d\xfd\x47\x2c\x2b\xf4\x84\x16\xa6\x6b\xc5\x0d\xc5\x62\xa3\xe8\x51\x80\x14\xba\x32\x66\x55\x33\xd0\x65\xb6\xf5\xc4\xb7\xf0\xf5\x29\x26\xed\xf8\x5d\xa8\xac\x00\x31\x68\x1d\x4c\x5c\x43\x70\x6f\xcf\x25\xb0\x43\xfa\x30\x14\x98\xb9\x17\x45\x61\xff\x77\x00\x81\x6e\x40\x64\x7f\xf8\xe8\x78\xe5\xeb\xa9\xfa\xde\xb1\x7f\xb3\x88\x75\x6a\xd8\x6c\x59\x9d\x37\x16\xb9\x6d\xea\xf4\xe2\x4e\x36\x5c\x35\x63\xeb\x2e\x36\x66\x51\x8b\x24\xac\x11\x7e\x8d\x14\xb4\x45\xbf\x58\x41\x79\x6e\xe1\x5b\xa3\x75\xe6\x1a\x67\xa9\x5d\xfa\x6e\xe9\xe1\x8a\xa7\x44\xad\xe1\xca\x72\x58\xf5\x05\xdb\xba\x9f\xfd\x46\xb8\xc1\xf8\x6f\x2d\x8a\xcb\x56\x73\x7f\x6b\x4f\xc0\xbf\xce\x9f\x9e\xa1\xb4\xfa\x59\x07\x5a\xbb\xfe\x3b\xf8\xc4\x0f\x32\xf1\xd1\xc4\x83\xd2\x9d\x2e\x2f\x2f\x8c\x6d\x48\x49\x14\x7a\x67\x5c\x9a\x67\x34\xae\x1b\xb3\x1d\xa3\xec\xc7\x75\x95\x43\x5a\x8b\x6a\xca\x5e\x20\xa1\x7a\xc7\xf1\x82\x98\xa4\x11\xfa\xf9\xb9\xfe\xf6\xdd\xc9\x85\x89\x75\xf8\xbb\xd3\xba\x1a\xe8\x59\xbe\x76\x61\x6d\x69\xfa\xf6\x2d\xa9\xb1\xa5\xae\xf6\x8c\x75\x8f\x05\x72\x48\x47\x9f\x85\xaa\xe4\xb8\x89\x2a\x6a\x0e\x1b\x8b\x65\xdc\xad\x2f\xb2\x33\x81\x06\xd3\x8d\x72\x69\xcf\xc8\x68\x90\xce\x5b\x95\x67\xa0\x89\x84\xd6\xf3\xa6\xb0\x4b\x99\xb4\xb0\x4b\x6d\x6a\x9f\xb6\x66\xf1\x1d\xc6\xe9\xd8\x3d\xfa\xbe\x7c\x6f\x46\xef\x53\xc5\xec\x08\x4c\x8f\xd1\x49\xea\x8c\x31\xac\x33\xf6\xc7\x66\xfb\x36\x79\xa1\x7b\x73\x3e\x5e\x5f\x07\x29\xd1\x7b\x2c\x1d\xd0\x5a\xfb\xde\xc7\xf6\xf9\xa9\x05\x22\x4e\x10\xa4\x36\x1b\x87\xca\xdb\x03\x81\xc2\x5c\xd4\x5d\x7c\x29\xfb\x0a\x9e\xef\x25\x71\x64\x71\xdb\xb9\x12\xee\xc9\xf7\x97\x77\xed\x6a\x65\xbc\xd0\x2a\xa9\x9b\x18\x55\x80\xae\xb8\x59\x8c\x13\xc5\xae\x18\x06\xab\x09\x0b\xa8\x41\x15\x01\xe7\x66\xf8\x18\x94\x16\xd2\xe4\x21\x94\xd7\x91\xca\xda\x3e\x88\x1e\xdb\x20\x6f\x0e\x62\x28\xb2\xb7\xaf\xbc\xa1\x21\x9c\xca\xdc\x4e\x3a\x91\xe4\xed\x0f\xaa\x13\x4f\x69\x8b\xb5\x84\xfa\xe3\xb2\xcc\x36\x2a\xcc\x58\xe0\x0e\xa8\x30\xd1\x63\x72\x00\x01\x3e\x9d\x60\xb5\x6a\xc2\x42\xc9\xd3\x83\x08\x56\x4f\x79\x58\xe7\x24\x31\xae\xcd\xe6\x2e\xe5\x61\xb7\xf5\xc1\x8d\x11\x28\x9f\x9c\x1c\x24\x26\x08\x8b\xb9\x57\x51\x53\x42\xbf\xb3\x40\x29\xd7\xcd\xee\x81\x96\xe8\x64\xfd\x26\x9f\x97\x23\x3b\x58\xb4\x0a\xb7\xad\x18\xbb\xaf\x38\x6c\xae\x1f\xdb\xc7\xff\xe3\xf5\xaf\x3a\x86\xee\x28\x73\xab\xc3\xed\x98\xda\x7b\xcf\xe0\x57\x72\xfe\x18\x05\xb9\xdf\xe4\xc5\xe9\xd1\x0b\xa8\x3c\xf0\xbb\x94\xa7\x80\x1d\xf9\xb8\xfa\x55\x4a\x13\x9c\x4f\xe8\x15\x8b\x2a\x26\x5b\x38\x37\x12\x4a\xe6\x2a\x82\xf2\xec\xc8\xac\x8f\x5c\xb4\x63\x8b\xc6\x06\x20\xb1\xfb\xfa\x14\x65\x63\xc7\xfb\xdc\xdb\x8e\x75\xdc\xb8\xf7\x70\xae\x77\x78\xe9\xe2\xb4\xc2\x3a\x77\x93\x3c\xaa\x23\x3c\xaa\x19\xb0\x03\x73\x47\x94\xa2\xdc\x8d\xbb\x87\x29\x21\xfb\xe8\xf9\xdb\x29\x42\xf9\x98\x18\x3c\xba\x96\xec\xf6\x2c\x3e\x60\x35\xd9\x47\xcd\xe3\x81\x62\xb2\x8f\x90\xcb\x47\x59\xc9\x07\x2d\x2b\xfb\x31\x30\xfa\x51\xaf\xe7\xa8\xb8\xec\x36\x85\x3d\x47\xb1\xfd\xe1\xcb\xca\x3e\xa4\x78\xe0\xf1\xf0\xea\xe7\xf6\x55\x77\xe8\x5b\x3c\x87\x16\x9e\x74\xaf\x6d\xdf\x72\x60\x6b\x01\x81\x2c\xeb\x0a\xd3\x6e\x3e\x12\x74\xe8\xfb\xb8\x75\xcd\xe9\x84\xf0\x61\xea\xcb\xfe\x29\x8a\xe6\x63\xd8\xf9\xc6\x14\x9a\x1d\x25\x77\x07\x2c\x35\xfb\xa8\x37\xb9\xaa\x53\x07\xf2\x31\xb1\x73\x37\x0f\x7d\x0f\x5b\x4f\x50\x78\xf6\x21\xd9\xfc\x2e\x5e\xa5\x2e\xd2\xda\x2d\xf5\xd8\x19\x65\x31\x1d\x7f\x1b\x99\x08\x07\x8a\xce\x46\x01\x09\x95\xa7\x23\xde\x2d\x1b\x6d\x3e\x9e\x1b\xc9\x47\x22\xaf\xc7\x2c\x5e\xfb\xa7\xb0\xfe\x29\xac\x9d\xda\xb5\x3b\x4b\xeb\xd1\xab\xe0\x3e\x9c\xb8\xc2\x6f\x51\x01\x59\xa8\x60\x3a\x22\x8c\xb6\xb7\x08\xee\xe6\xad\x95\xb1\xe7\xd1\x87\x54\x9c\xb2\x74\xe1\x83\x1b\x56\x80\x0b\x32\xa4\x78\xdd\xb9\xaa\xfd\x32\x88\xa0\x3e\x88\x90\x61\x71\xd5\x7d\x05\xec\x28\xa5\x6e\x1f\x58\xb6\xb0\x7a\x2c\x8a\x95\xaf\x18\x3f\xc8\xe2\x76\xa5\xdb\x0d\x12\xc5\x7e\x74\x74\x67\xfb\x0b\x13\xfc\x8c\x00\x8f\x2e\x43\xd7\x3e\x0a\x3d\x8d\xcf\xde\x26\x36\x1b\x23\xd9\x47\x05\x66\x33\x59\xc6\x89\x4b\xc7\x0a\xcc\xa6\xd8\xfa\x4e\x54\x76\xb8\x51\x63\xfb\x44\x65\x63\x50\x36\xa7\x61\x36\x42\x1d\x8c\xc9\x26\xc2\xd1\xdd\x96\x9f\x1c\xfd\x2c\xa3\xea\xbb\xdb\x07\x60\x13\x90\x56\xe4\x75\x3b\xc6\x39\x8a\xbe\xf6\xa3\x6e\x08\xbd\x6e\x8f\xe6\x91\x74\x82\x9c\xce\x2a\x8a\xbb\x4e\x47\xe8\xd2\x3e\x39\x1f\x77\x82\xae\xdb\x13\x3a\x44\xc4\x35\xc2\xdc\x62\x95\xec\x1c\x6c\x4d\xd8\x3f\x40\xa4\xf5\x9a\xbb\x78\x44\x2a\xdc\xce\x52\x24\x06\xe1\xea\x84\xd4\xbb\x34\x6e\xc5\x6a\xfb\xd0\x6b\x72\xa0\xf4\xdf\xbf\x5b\x88\xc3\x71\x19\xdd\xd0\x35\x36\x5b\xb9\xc1\x0f\xce\xee\x2e\xb3\x7d\x41\x31\x17\x9b\x32\xd7\x3f\xd4\xaa\xa9\x8e\xc7\xf1\x38\x92\xa6\x13\x84\x0b\xdd\xbc\x11\x83\x23\x05\xb2\x1d\x54\x54\x92\xa2\x1b\x0b\xae\x87\x83\xdc\x3e\xbf\x98\xb0\xb9\xbe\x21\xd2\xfa\x22\x64\x4f\x2f\x2e\x9e\x62\x24\x80\x16\xb5\xfb\x31\x04\x1a\xc9\xdc\x4a\xd1\xe6\xd8\x6f\xaf\xf2\x76\x90\xbb\x73\x3a\x9a\xa4\xe9\xd1\x18\x0b\x72\xb4\x24\xd9\xfd\x8a\x31\x1c\x48\xb9\x8d\x3f\x54\xef\x22\xe7\x27\x0a\x30\x3f\x82\xea\x1b\x12\xe2\x0f\x9f\x5f\x5c\xb8\x40\x32\x68\x5a\xb0\xd1\xc2\xdc\x45\x24\x01\x62\xfb\xb8\xbc\xef\x51\x19\x27\xbe\x7f\xd6\xfe\x1e\x92\xb7\x4d\x90\xf9\xce\xf2\x76\xe0\x08\xf3\x53\xee\xab\xef\x22\xeb\x29\x09\x9f\x74\x6e\xe6\x3d\xe2\x7f\xdb\x82\xe7\xcd\xd8\x5e\x7d\x88\xff\xe7\x1a\x7d\xc4\xfd\xd4\x4f\x28\x28\x27\x57\x55\xdd\x70\xf2\x3f\x86\xd6\xf2\xf1\xe5\xa9\x70\xd1\x06\x17\x12\x1a\xbc\x76\xc0\x0e\x6b\xc7\x16\x2f\xd6\x2b\x5f\x27\x28\x62\x73\x52\x19\x0e\xf9\xf7\xe3\xa3\x7c\xd7\x49\xf0\x9a\x10\x5f\x7e\x9a\xd8\xde\x5d\x8d\xc4\x20\x7d\xe3\xe2\x7c\x37\x7b\x05\x37\x6d\xae\xeb\x23\x7c\x77\x92\xcf\x03\x0a\x0f\x89\x8a\x17\x9d\x9d\x72\xe7\x1d\x90\x91\x6e\x99\x7d\x0e\x9e\xdb\xba\x65\x12\xb1\x71\x5e\x1a\x17\x1a\x3c\x34\xd7\xed\x73\xe7\x01\x22\xb8\x6a\x52\x47\xcd\x1e\x4e\x9a\x34\x51\x3e\x75\x68\xec\xec\xa4\xd9\x22\x45\x7e\xac\x93\x66\x63\x7e\xfc\xae\x4e\x9a\x74\xe9\x1d\xd1\x49\x43\xb2\x32\xd0\x8b\xab\xbd\x42\x7a\xfc\x32\x93\x44\xef\x40\x82\x03\xdc\x5a\xc9\x32\xe8\x15\x98\x8d\xfd\x55\x57\x1b\x4a\x02\xb9\x01\xc3\xe2\x71\xa4\xa5\x1b\x34\xab\x64\x09\x8b\x5a\xdc\xf0\x3a\x2f\x5c\xa3\x59\x35\x67\x3c\x52\x65\x84\x95\xf8\x20\x35\x6c\x46\x6b\xd0\x0b\xa8\xed\x14\x19\xd1\x96\xd3\xee\x48\x56\xfb\xf9\x31\xf4\xb4\xbb\x90\x63\xfd\x9d\x2a\xfb\xa8\x73\x5d\x4f\xe5\x9a\xcd\x27\x72\xa7\x0b\x06\x1a\xb7\x45\xeb\xa1\xd3\xa4\xce\x2e\x5f\x08\x17\x71\x30\xee\x17\x32\x5b\x78\xdf\x3b\xd7\x5a\x65\x32\x2c\xe1\x40\x44\x2c\xa2\x5e\x25\x9b\x1a\xee\x40\xa1\xe7\x27\xed\x18\xd1\xca\xdc\xca\x0d\xf5\xf4\xd9\x81\x24\x7a\x84\x77\xb1\x2b\x93\xeb\xed\xd9\x43\x08\x51\x8f\x8c\x6c\x92\x0f\x32\x42\xb6\x93\x91\x8e\x26\x49\xc5\xa3\xa5\x32\x7b\x45\xc4\x0c\xf3\xb5\x87\xa7\xa8\x31\x77\x70\x2f\xee\xae\xa8\x9c\xe7\x0b\x5d\x7a\xc1\xdd\x45\x89\x73\x07\x65\x7d\xe4\x59\xec\xf7\xc0\x1c\xd2\xbb\x78\x34\x99\xc1\x6f\x3b\x0d\x7a\x2f\x3e\x7c\xfe\xf9\x45\x4f\x1f\x84\x34\x11\xd1\x9f\x3c\xdc\x34\xf1\xf7\x81\xd4\xa0\x93\x0b\xa2\xf3\x35\xce\xd0\x12\x72\x72\x78\x02\x17\xcf\x01\x4a\xc0\xee\xb3\x08\x0e\x2c\xe9\x6d\xc9\xf6\x2e\xe5\x8f\x4c\xa2\x37\xc6\xe1\xf4\x19\x8f\xdb\x6d\xa2\x6b\x04\xb3\xb5\xf3\xf9\x93\x4f\xa4\x21\xb7\x96\x4c\xb4\xb6\x8e\x73\x1e\xdf\x4e\x00\xc9\x9f\x73\x78\xb9\x73\x8e\xa2\xfd\x8e\x51\xc7\x11\xb2\x6d\x7c\x84\x91\xd2\xeb\x44\x78\xb5\x65\x2b\x1c\xe8\x13\xf8\x07\x35\xab\x0e\xcc\xf8\x53\xa8\xa0\x44\x14\x0e\xeb\x37\x3c\xa5\xa0\xe0\x8e\xb9\x59\x3f\xe1\x34\xb7\xdb\x3c\x37\xc9\x10\xc0\x5c\x23\x47\x83\xc5\x26\x1e\x8b\x97\x70\x27\xe1\xdc\xbe\x0a\xc0\x5a\x01\xed\x71\x0b\x7a\x97\xe0\xb1\xd4\x94\x3d\x57\xf6\x49\xa0\x1e\x21\x82\xb2\xec\xba\xff\x22\xa1\xe8\x89\xb5\xef\x44\xa2\xb4\xa5\x6e\xa6\xb0\x3e\x6e\x4b\xfc\x74\xea\x06\xec\x95\xc1\x83\x31\xfb\xec\xba\x99\x5d\x71\xb3\xf8\x86\xbd\x15\x1c\xda\x9e\x3b\x1f\x25\x20\xc1\x43\xa5\x60\xe7\xef\x3e\x5b\xcb\xf2\x66\x06\xab\xf3\xb9\x51\x4b\x99\xb1\xfb\x5a\x9a\x6e\xf9\x5b\x2f\xd1\xf8\xb2\x0e\x47\xfa\x30\x18\x38\x86\x63\x5d\xb4\x9e\xf7\xc1\x5d\xe6\xdd\xca\x19\x2f\x71\xc1\x0f\x4e\xa8\xc7\x64\x86\x23\x3b\xbb\xe7\xdd\x16\xf8\xdc\xa1\xbb\x95\x81\x81\xb3\x82\x60\x50\xef\x91\xc9\xe5\x9d\xcc\x1b\x5e\x50\x06\x82\x2c\x23\xf4\xc7\x9c\xdb\x5d\x6d\x5d\x87\xcf\x47\xc4\x51\xdc\x81\x2c\x1d\xae\xa0\x31\xff\x3c\xf8\x9b\xda\x01\xee\x8f\x88\xe3\x18\x03\x5c\x68\xc5\x1a\x0d\x67\x11\x84\x03\x8f\xa0\x98\xb0\xd4\xd1\x65\x14\x5a\xbe\x72\xdb\x36\x19\x6b\x85\xc4\x5d\x98\x9c\x56\x50\xe2\x78\xd7\x13\x88\x8a\x1b\xee\x88\x6b\x3f\x9e\xd1\xbf\xe9\xea\x6f\xdf\x92\x1d\x95\xa5\x61\xb0\xe3\xf1\x34\x8c\xf1\x6f\xca\xd1\xc4\xa2\x39\x2a\x3b\x69\xa4\xe3\xf1\x92\x06\x68\x99\xe3\xc1\x8f\x7e\x38\x46\x12\x13\xc3\xed\xea\x71\x18\xf9\x1f\xff\x2f\x00\x00\xff\xff\xd3\xc8\x0d\x6b\xee\xa9\x02\x00") + +func testConformanceTestdataConformanceYamlBytes() ([]byte, error) { + return bindataRead( + _testConformanceTestdataConformanceYaml, + "test/conformance/testdata/conformance.yaml", + ) +} + +func testConformanceTestdataConformanceYaml() (*asset, error) { + bytes, err := testConformanceTestdataConformanceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/conformance/testdata/conformance.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsFlexvolumeAttachableWithLongMount = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x56\x6f\x6f\xda\xc8\x13\x7e\xef\x4f\x31\x5d\xd0\x4f\x4d\x45\x20\xe1\x57\xa9\x52\xa2\x54\xc7\x85\xe4\x8a\x4a\xa0\x0a\x34\xbd\xea\x38\x45\x8b\x3d\xb6\x47\xb7\xde\x75\x77\xd7\x21\x5c\xc4\x77\x3f\xad\x6d\x08\xe6\x5f\x93\x3b\xbf\x63\x77\xe6\x99\x67\x9e\xf9\xb3\xd4\xde\xb4\xa6\x24\x5b\x26\xf6\xbc\x1a\x5c\xaa\x74\xae\x29\x8a\x2d\xb4\x4f\x4e\x3f\xc0\x38\x46\xf8\x9c\x4d\x51\x4b\xb4\x68\xa0\x93\xd9\x58\x69\xd3\xf4\x6a\x5e\x0d\xfa\xe4\xa3\x34\x18\x40\x26\x03\xd4\x60\x63\x84\x4e\xca\xfd\x18\x97\x37\x0d\xb8\x43\x6d\x48\x49\x68\x37\x4f\xe0\xad\x33\x60\xe5\x15\x3b\x3a\xf7\x6a\x30\x57\x19\x24\x7c\x0e\x52\x59\xc8\x0c\x82\x8d\xc9\x40\x48\x02\x01\x1f\x7d\x4c\x2d\x90\x04\x5f\x25\xa9\x20\x2e\x7d\x84\x19\xd9\x38\x0f\x53\x82\x34\xbd\x1a\x7c\x2f\x21\xd4\xd4\x72\x92\xc0\xc1\x57\xe9\x1c\x54\xb8\x6e\x07\xdc\xe6\x84\xdd\x17\x5b\x9b\x9e\xb5\x5a\xb3\xd9\xac\xc9\x73\xb2\x4d\xa5\xa3\x96\x28\x0c\x4d\xab\xdf\xbb\xbc\x1a\x8c\xae\x8e\xdb\xcd\x93\xdc\xe5\xab\x14\x68\x0c\x68\xfc\x91\x91\xc6\x00\xa6\x73\xe0\x69\x2a\xc8\xe7\x53\x81\x20\xf8\x0c\x94\x06\x1e\x69\xc4\x00\xac\x72\x7c\x67\x9a\x2c\xc9\xa8\x01\x46\x85\x76\xc6\x35\x7a\x35\x08\xc8\x58\x4d\xd3\xcc\x56\xc4\x5a\xb2\x23\x53\x31\x50\x12\xb8\x04\xd6\x19\x41\x6f\xc4\xe0\xd7\xce\xa8\x37\x6a\x78\x35\xf8\xd6\x1b\x7f\x1a\x7e\x1d\xc3\xb7\xce\xed\x6d\x67\x30\xee\x5d\x8d\x60\x78\x0b\x97\xc3\x41\xb7\x37\xee\x0d\x07\x23\x18\x5e\x43\x67\xf0\x1d\x3e\xf7\x06\xdd\x06\x20\xd9\x18\x35\xe0\x63\xaa\x1d\x7f\xa5\x81\x9c\x8c\x18\x38\xcd\x46\x88\x15\x02\xa1\x2a\x08\x99\x14\x7d\x0a\xc9\x07\xc1\x65\x94\xf1\x08\x21\x52\x0f\xa8\x25\xc9\x08\x52\xd4\x09\x19\x57\x4c\x03\x5c\x06\x5e\x0d\x04\x25\x64\xb9\xcd\x4f\xb6\x92\x6a\xba\x5e\x1a\xbb\x72\x06\x9a\x1e\x50\xbb\x24\x31\xc7\xe7\x42\xcc\x21\x40\x43\x91\x2c\x34\xb3\x68\x2c\x70\x10\x4a\x46\x90\xa8\x4c\x3a\xf5\xc0\xf8\x28\xb9\x26\xe5\xd5\x60\x16\x93\x1f\x83\xcf\x25\xf8\xdc\x35\x09\x87\x07\x25\xb2\x04\x9d\xef\x14\x21\x40\xeb\xca\x18\x38\x3b\x81\x05\x82\x8b\x46\x12\x52\xad\x22\x97\x7e\xd3\xf3\xbc\xeb\xfe\xd5\xef\xf7\xdd\xaf\x37\x37\xdf\xef\xfb\xc3\xdf\x2e\xea\x4f\xd5\x83\xb3\x63\xd6\xb2\x49\xda\x0a\x05\x3e\x1e\x07\x59\x92\xcc\x9b\x42\x45\x6c\xe1\x79\x77\x9d\x7e\xaf\x7b\x7f\x33\x18\x77\xaf\xee\x7a\x97\x57\x17\xa1\x52\x2e\x37\x6e\x5d\x58\xe0\x62\xc6\xe7\xae\x3f\x6c\xa6\xa5\x01\x25\x11\x1e\xb8\xa0\xa0\xe4\x11\xe0\x03\xf9\x08\x46\x01\x87\x80\xc2\x10\x35\xae\x4e\xbd\x1a\x98\x58\xcd\x5c\xb6\x59\x0a\x79\xef\x9a\x6c\x6a\xf0\x47\x96\xdb\x14\xb2\xf9\x5c\x88\xb2\x74\x06\x38\x4c\xb3\xc8\xcb\xf1\xb9\xc5\x1b\x17\xa1\x9b\x43\x0d\x75\x97\xf0\xed\x11\x3c\x79\x50\x7e\xcf\x7c\xeb\xa7\xab\xc3\xcb\x4e\xbf\x7f\x51\x6f\xaf\x7e\x53\x08\x7f\x00\xab\xaf\x6c\x19\xbc\xb9\x00\x56\xdf\xc8\x98\xc1\x9f\xe7\xae\xb4\x72\xe5\xb7\xfc\x84\x8a\x80\x3d\x4d\x98\xb1\xdc\x66\x66\xc2\xce\x26\xec\x9a\x93\xc8\x34\x4e\x58\x63\xc2\x12\x34\x86\x47\x98\x9f\xe7\x79\xb0\xfa\x93\xa3\xb0\x60\xae\x2f\xd1\x77\xcd\x5e\x0a\xc4\xea\x4f\x1b\x51\x17\xac\x01\x91\xb2\x6b\x06\x6b\x57\x13\xb6\x60\x5b\x6c\xf0\x91\x2c\x9c\xac\x8e\x43\xf2\x16\x9e\x27\x54\x54\xd1\x25\xd5\x24\x6d\x08\xac\xfe\x8e\xc1\xc7\xff\x9d\x3a\x93\x00\xa7\x59\xd5\x08\xfd\x58\x01\xab\xbf\x75\x2a\x1f\x41\x6e\xfa\xd1\x31\xa8\xb6\xcc\x82\x39\xef\xa2\x0f\x2a\xee\x39\x20\xb0\xb2\x43\xea\xbf\x3c\x53\xdd\x21\xd8\x28\xf3\x7d\x34\x26\x17\xac\xc8\x35\x3f\xde\x25\x48\x25\xeb\x32\xdb\x9c\xff\x3e\x06\xc5\x4d\x85\x41\x0d\xc6\xc3\xee\x10\xc8\x98\x0c\xe1\xfd\xfb\x0f\xff\xff\x50\x0e\x90\x1b\x99\x94\x1b\xb7\xce\xbf\xdc\x81\xe4\x09\x36\xf2\xb5\xbc\xde\xc7\x2f\xca\x63\x27\xc7\x19\x27\x1b\x2a\xbd\x5f\xac\x8a\x41\x85\xf1\xce\x4e\xde\x37\x03\xd5\x6e\xae\xa2\xfe\xcb\x32\xfc\xbc\x00\x64\x8a\x00\x18\xec\xca\xec\xf9\xf6\x35\xad\xb0\xf4\x99\xb0\x33\xab\x33\xdc\x5d\x78\x95\x17\xa7\xa0\xbb\xb3\xfe\xeb\x06\xfb\x44\x6d\xbf\x56\xd4\x0a\x6a\x05\xf2\x4b\x67\xfc\x69\xbd\x4a\xc9\x5f\x01\x69\x38\x4e\x21\x57\xd1\xdd\x2e\xe0\x63\x2b\xc0\x87\x96\xcc\x84\x80\xb6\x1b\xc0\x95\x6d\xde\x67\xc7\x16\x6c\x92\x86\x06\xa4\xdb\xa4\x2f\x70\x33\x02\x31\x85\xd3\xf6\xc9\xc6\xf0\x7e\x42\x21\x14\x84\x5a\x25\xe0\x56\x7a\xf1\x62\xbc\x59\x0e\xf2\x12\xb6\x45\x32\xc0\xc7\x66\x6c\x13\xf1\xb2\xca\xec\xac\x43\x26\x7f\x52\x87\x8a\xc1\x66\x1d\x36\x45\xd3\xc9\x3e\x86\x7b\x45\xc8\x0a\xf1\x5e\x20\xd7\xab\x73\xc3\xc7\x94\xcb\xa0\x90\x6f\x57\x6a\xeb\xf7\x2f\xee\xef\x03\x91\x42\xb3\x3f\x4a\x68\xfe\x5b\x04\x95\x3a\x9d\xbd\xf2\xd5\x53\x29\x83\x0b\x60\x24\xc9\x6e\xbf\x70\xcb\xd9\x95\x64\x5f\x33\xb5\x3e\x4f\xf9\x94\x04\x59\x42\x77\xf9\xb4\x9c\xe3\x72\x8a\x1b\x30\x61\xe5\x3f\x49\x73\x3d\xba\x45\x43\x7f\xe3\x72\xc0\xb7\x19\x87\xe4\x79\x26\xa6\xd0\x7a\x9e\xcf\x0d\x96\x94\xe9\x99\x64\x81\x7d\xb4\xf5\x10\x2e\x97\xe8\xbb\xad\x9b\xf3\xf3\xb5\x0c\x77\x3b\x2f\xdf\x8c\x83\xce\x95\xbd\xba\x8d\xb1\xb1\xcc\x0f\x42\x3d\xaf\xc7\x6d\x9c\xf5\xd5\x79\x10\x64\x6d\xbc\x76\x64\x54\xdd\x82\x07\x81\x2a\x93\xba\x0d\xb5\x31\xc8\x07\xa1\xd6\x27\x63\x1b\xa9\x3a\x37\x2f\x00\x0a\xcd\x3e\x10\x37\x16\x07\x01\xde\x6d\x7b\xee\xe8\xe3\x81\xb2\x60\xb2\x34\x55\xda\xba\x67\x67\xff\x1f\x2c\x34\xdc\x77\xe3\x4a\x16\x4e\xbd\x7f\x02\x00\x00\xff\xff\x9b\x84\xf0\xd3\x3c\x0e\x00\x00") + +func testE2eTestingManifestsFlexvolumeAttachableWithLongMountBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsFlexvolumeAttachableWithLongMount, + "test/e2e/testing-manifests/flexvolume/attachable-with-long-mount", + ) +} + +func testE2eTestingManifestsFlexvolumeAttachableWithLongMount() (*asset, error) { + bytes, err := testE2eTestingManifestsFlexvolumeAttachableWithLongMountBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/flexvolume/attachable-with-long-mount", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsFlexvolumeDummy = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\x5f\x4f\xe3\x46\x14\xc5\x9f\x3d\x9f\xe2\xec\x24\xaa\x16\x44\x6c\xe0\xa5\x12\x08\xd4\x14\xd8\x12\x2d\x24\x15\x09\xdd\xa2\xa6\x5a\x4d\xec\x6b\x7b\xd4\xf1\xcc\x74\x66\x4c\x12\x45\xf9\xee\x95\x1d\x87\x2e\x65\x85\xea\x37\xdf\xbf\xbf\x73\xee\xf4\x3e\x24\x0b\xa9\x13\x5f\x32\xd6\xc3\x95\xb1\x6b\x27\x8b\x32\xe0\xf4\xf8\xe4\x47\xcc\x4a\xc2\xe7\x7a\x41\x4e\x53\x20\x8f\x61\x1d\x4a\xe3\x7c\xcc\x7a\xac\x87\x3b\x99\x92\xf6\x94\xa1\xd6\x19\x39\x84\x92\x30\xb4\x22\x2d\x69\x9f\x39\xc2\x6f\xe4\xbc\x34\x1a\xa7\xf1\x31\x3e\x36\x05\xbc\x4b\xf1\x83\x73\xd6\xc3\xda\xd4\xa8\xc4\x1a\xda\x04\xd4\x9e\x10\x4a\xe9\x91\x4b\x45\xa0\x55\x4a\x36\x40\x6a\xa4\xa6\xb2\x4a\x0a\x9d\x12\x96\x32\x94\xed\x9a\x6e\x48\xcc\x7a\x78\xea\x46\x98\x45\x10\x52\x43\x20\x35\x76\x0d\x93\x7f\x5b\x07\x11\x5a\xe0\xe6\x2b\x43\xb0\x67\x49\xb2\x5c\x2e\x63\xd1\xc2\xc6\xc6\x15\x89\xda\x15\xfa\xe4\x6e\x74\x75\x33\x9e\xde\x0c\x4e\xe3\xe3\xb6\xe5\x51\x2b\xf2\x1e\x8e\xfe\xae\xa5\xa3\x0c\x8b\x35\x84\xb5\x4a\xa6\x62\xa1\x08\x4a\x2c\x61\x1c\x44\xe1\x88\x32\x04\xd3\xf0\x2e\x9d\x0c\x52\x17\x47\xf0\x26\x0f\x4b\xe1\x88\xf5\x90\x49\x1f\x9c\x5c\xd4\xe1\x95\x59\x7b\x3a\xe9\x5f\x15\x18\x0d\xa1\xc1\x87\x53\x8c\xa6\x1c\x3f\x0f\xa7\xa3\xe9\x11\xeb\xe1\xcb\x68\x76\x3b\x79\x9c\xe1\xcb\xf0\xe1\x61\x38\x9e\x8d\x6e\xa6\x98\x3c\xe0\x6a\x32\xbe\x1e\xcd\x46\x93\xf1\x14\x93\x4f\x18\x8e\x9f\xf0\x79\x34\xbe\x3e\x02\xc9\x50\x92\x03\xad\xac\x6b\xf8\x8d\x83\x6c\x6c\xa4\xac\xf1\x6c\x4a\xf4\x0a\x20\x37\x3b\x20\x6f\x29\x95\xb9\x4c\xa1\x84\x2e\x6a\x51\x10\x0a\xf3\x4c\x4e\x4b\x5d\xc0\x92\xab\xa4\x6f\x8e\xe9\x21\x74\xc6\x7a\x50\xb2\x92\x41\x84\x36\xf2\x46\x54\xdc\xbc\xa5\x59\x73\xce\xcc\xc9\x67\xda\xad\xa7\x8a\x74\xf0\x10\x08\x95\xcd\xfd\xee\x9c\x02\xd6\xd1\xc0\x1a\x5b\x2b\xd1\xa8\x6f\xaf\x2f\x75\x46\xab\xb8\x0c\x95\x8a\x19\xfb\x74\x77\xf3\xfb\xd7\xeb\xc7\xfb\xfb\xa7\xaf\x77\x93\x5f\x2e\xfa\x9b\xd7\x81\xb3\x01\x4f\x42\x65\x93\x5c\xd1\x6a\x90\xd5\x55\xb5\x8e\x95\x29\xf8\x96\x31\x65\x8a\x8f\x07\xd8\xb0\xc8\x3a\xa9\x43\x0e\xde\x3f\xe4\xb8\xfc\xe1\x84\x6d\x19\xcb\x68\x51\x77\x59\x4a\x4b\x03\xde\xff\x98\x89\x40\x07\x68\x6b\x2e\xc1\xff\xbb\x66\xcb\xdb\x36\x53\x99\x5a\x87\x5d\x63\x3b\x03\xbc\x8b\xa1\xff\x13\x67\xd1\xfd\x78\xf6\xeb\x70\x76\x7b\xd1\x3f\x61\x51\xf5\x57\x26\x1d\x06\x16\xfd\x4d\x17\xde\xe2\x32\xc9\xe8\x39\xd1\xb5\x52\x38\x6d\x50\xa2\x5d\xef\x20\x74\x9e\x68\xa3\xe9\xdd\xfa\x1d\xed\x2d\x29\x65\x90\x3b\x53\xa1\xd1\xfd\x6c\x54\x5d\xd1\x87\x3d\xf9\xbe\x3b\xf9\xd7\x47\xce\x22\x65\x0a\xf0\xcd\x9c\xfb\x20\x42\xed\xe7\xfc\x6c\xce\xa7\x75\x9a\x92\xf7\x73\xbe\xe5\x2c\xa2\x95\x0c\x38\x6e\x54\xd6\xfa\xad\xca\x2e\xf6\x56\xa5\xab\xf0\xdd\x8d\x6f\xd1\xeb\x6e\xc2\x3b\xea\xfe\x3f\xa3\xb1\xcd\x76\x26\x73\xfc\x01\xde\x37\x96\xe3\x02\x5c\x6a\x19\x38\xfe\x3c\x6f\x5e\xa2\x7e\x41\x6f\xa2\x3b\xee\xf7\xc6\x1f\xcd\x79\x2a\xac\x58\x48\x25\x83\xa4\x26\xb9\x99\x73\x11\x82\x48\xcb\x39\x3f\xcb\x85\xf2\xb4\xfd\x06\x21\x97\x8c\xf9\x52\xe6\x81\xb1\x54\x78\xea\x18\xa4\xee\x2e\x7a\xc0\xa2\xe8\xe5\x61\x1c\xb2\x28\x3a\x3f\x67\x51\xe7\x61\x93\x7b\xb1\x73\x9f\x3b\x6c\xa2\xdf\xe1\x1b\x9b\x00\x5f\x5b\x6b\x5c\xa0\x6c\x67\xc2\x1e\x81\xbc\x48\x19\x6b\x7f\x4e\xd8\x3f\x01\x00\x00\xff\xff\x5b\x74\xc1\x62\xc5\x05\x00\x00") + +func testE2eTestingManifestsFlexvolumeDummyBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsFlexvolumeDummy, + "test/e2e/testing-manifests/flexvolume/dummy", + ) +} + +func testE2eTestingManifestsFlexvolumeDummy() (*asset, error) { + bytes, err := testE2eTestingManifestsFlexvolumeDummyBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/flexvolume/dummy", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsFlexvolumeDummyAttachable = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x55\x7d\x4f\xdb\xc8\x13\xfe\xdb\xfb\x29\xa6\x9b\xe8\xa7\x52\xe5\x05\xf8\x55\xaa\x04\xa2\xba\x1c\x81\x6b\xd4\x90\x54\x24\xa5\x57\x5d\x4e\xd5\xc6\x1e\xdb\xab\xb3\x77\xb7\xfb\x42\xc8\xa1\x7c\xf7\xd3\xfa\x05\x6c\xa0\x94\xfa\xcf\x99\xc7\x33\xcf\x3c\xf3\xb2\x9d\x57\xc3\x35\x17\x43\x93\x12\xd2\x81\x53\xa9\xb6\x9a\x27\xa9\x85\xc3\xfd\x83\x77\xb0\x4c\x11\x3e\xba\x35\x6a\x81\x16\x0d\x8c\x9c\x4d\xa5\x36\x03\xd2\x21\x1d\x98\xf2\x10\x85\xc1\x08\x9c\x88\x50\x83\x4d\x11\x46\x8a\x85\x29\xd6\x9e\x1e\x5c\xa1\x36\x5c\x0a\x38\x1c\xec\xc3\x6b\x0f\xa0\x95\x8b\xee\x1d\x93\x0e\x6c\xa5\x83\x9c\x6d\x41\x48\x0b\xce\x20\xd8\x94\x1b\x88\x79\x86\x80\x37\x21\x2a\x0b\x5c\x40\x28\x73\x95\x71\x26\x42\x84\x0d\xb7\x69\x91\xa6\x0a\x32\x20\x1d\xf8\x5a\x85\x90\x6b\xcb\xb8\x00\x06\xa1\x54\x5b\x90\x71\x13\x07\xcc\x16\x84\xfd\x97\x5a\xab\x8e\x86\xc3\xcd\x66\x33\x60\x05\xd9\x81\xd4\xc9\x30\x2b\x81\x66\x38\x9d\x9c\x9e\xcd\x16\x67\xfd\xc3\xc1\x7e\xf1\xcb\x67\x91\xa1\x31\xa0\xf1\xbb\xe3\x1a\x23\x58\x6f\x81\x29\x95\xf1\x90\xad\x33\x84\x8c\x6d\x40\x6a\x60\x89\x46\x8c\xc0\x4a\xcf\x77\xa3\xb9\xe5\x22\xe9\x81\x91\xb1\xdd\x30\x8d\xa4\x03\x11\x37\x56\xf3\xb5\xb3\x2d\xb1\x6a\x76\xdc\xb4\x00\x52\x00\x13\x40\x47\x0b\x98\x2c\x28\xfc\x3e\x5a\x4c\x16\x3d\xd2\x81\x2f\x93\xe5\x87\xf9\xe7\x25\x7c\x19\x5d\x5e\x8e\x66\xcb\xc9\xd9\x02\xe6\x97\x70\x3a\x9f\x8d\x27\xcb\xc9\x7c\xb6\x80\xf9\x39\x8c\x66\x5f\xe1\xe3\x64\x36\xee\x01\x72\x9b\xa2\x06\xbc\x51\xda\xf3\x97\x1a\xb8\x97\x11\x23\xaf\xd9\x02\xb1\x45\x20\x96\x25\x21\xa3\x30\xe4\x31\x0f\x21\x63\x22\x71\x2c\x41\x48\xe4\x35\x6a\xc1\x45\x02\x0a\x75\xce\x8d\x6f\xa6\x01\x26\x22\xd2\x81\x8c\xe7\xdc\x32\x5b\x58\x1e\x15\x35\xf0\xb3\xb4\xf4\xed\x8c\x34\xbf\xc6\x32\x3d\xe6\x28\xac\x01\x06\x36\x57\xb1\x29\xdb\xc9\x40\x69\xec\x2b\xa9\x5c\xc6\x7c\xf5\x45\xf7\xb9\x88\xf0\x66\x90\xda\x3c\xf3\x74\x47\xd6\xb2\x30\xf5\x32\xd5\x6d\xe8\xc1\xda\x59\xe0\xd6\xdb\x18\x08\xd9\x97\x0a\x6c\xca\x2c\xb0\x6c\xc3\xb6\x1e\x67\x9d\x16\x06\x8c\x0b\x43\x34\x66\x40\xc8\xf9\xf4\xec\xcf\x6f\xe3\xcf\x17\x17\x5f\xbf\x4d\xe7\x7f\x9c\x74\x6f\xdb\x86\xa3\x3e\x1d\xda\x5c\x0d\xe3\x0c\x6f\xfa\x91\xcb\xf3\xed\x20\x93\x09\xdd\x11\x72\x35\x9a\x4e\xc6\xdf\x2e\x66\xcb\xf1\xd9\xd5\xe4\xf4\xec\x24\x96\xd2\x97\xc6\x4a\x4e\x0f\xf2\x49\x81\x70\xcd\x32\x1e\x41\x2e\x9d\xb0\x10\xe1\x35\x0f\x11\x8c\x04\x06\x11\x8f\x63\xd4\x78\x67\x25\x1d\x30\xa9\xdc\x78\x6d\x9d\x82\x62\x74\x8d\x5b\x1b\xfc\xee\x0a\x4c\xa9\x5a\xc8\xb2\xac\xea\x9c\xaf\x74\xed\x12\x52\xc4\x67\x16\x2f\x7c\x86\x71\x11\x6a\xae\xc7\x1c\x5f\xef\xc1\x2d\x09\xee\x89\x76\x0f\x48\x70\x3a\x9a\x4e\x4f\xba\x87\x24\xe0\x31\xfc\x05\xb4\x7b\xe7\xa5\xf0\xea\x04\x68\xf7\x41\x71\x14\xfe\x3e\xf6\x4d\x14\x24\x08\x32\x99\x00\xbd\x5d\x51\x63\x99\x75\x66\x45\x8f\x56\xf4\x9c\xf1\xcc\x69\x5c\xd1\xde\x8a\xe6\x68\x0c\x4b\xb0\xb0\x17\x24\x69\xf7\xd6\x67\xdb\x51\x3f\x73\x18\xfa\x56\x56\xd5\xd3\xee\xed\x83\x3c\x3b\xda\x83\x44\xda\x06\xa0\xe1\x5a\xd1\x1d\x25\x41\x80\x37\xdc\xc2\x3e\x09\x62\x4e\x76\x84\x64\x32\x29\xeb\x53\x9a\x0b\x1b\x03\xed\xbe\xa1\xf0\xfe\x7f\x07\xde\x17\xe1\xda\x55\x5e\x0c\x53\x09\xb4\xfb\xda\xeb\xb3\x07\x05\xe6\xbd\x0f\xdf\x6e\xf6\x8e\xfa\xdf\xca\x0e\x96\xff\x15\x21\x80\x56\x4d\xed\xfe\x46\xc9\x53\xf5\x2f\xca\x69\x2a\xea\x2f\xa9\x17\xe6\xa7\xea\x2b\x8b\xa8\x6a\x28\x38\x3e\x4a\x56\x9a\xca\x64\x1d\x58\xce\xc7\x73\xe0\xc6\x38\x84\xb7\x6f\xdf\xfd\xff\x1d\x54\x6e\x6e\x40\x31\xe3\x8f\xec\xa7\x2b\x10\x2c\xc7\x5e\x71\x2c\x9b\xe3\xf5\x3c\xd7\x36\x8f\x0d\xe3\x36\x96\xfa\x89\xda\x5b\x9e\x92\x55\x7b\x96\x7e\x34\x77\xed\xb1\x6a\xc7\xf9\x55\x1d\x9f\x51\x90\x9b\x32\x24\x46\x2d\xda\xf7\xe6\x17\xb5\xad\x06\xaf\xe8\x91\xd5\x0e\x1f\x34\x49\x16\xb2\x96\x94\xda\xbd\x6a\x7a\x1e\x89\x73\xf8\x62\x71\x5a\x71\xca\x20\x9f\x46\xcb\x0f\x85\xbe\xf9\x3f\x11\xd7\xd0\x57\x50\xc8\xe0\xcd\x3b\x78\x3f\x8c\xf0\x7a\x28\x5c\x96\xc1\xa1\x9f\xf6\xa0\xec\x7b\xdf\x56\x17\x54\xf8\x83\xf3\x1c\xbe\x5c\x88\x0f\x98\x65\x12\x62\x2d\x73\xf0\x07\xee\x5a\x66\x2e\xc7\x57\xf5\x72\xd4\x7f\x0f\xef\xaf\xee\x4f\x84\x6c\xcb\xe6\xc4\x8f\x64\x6b\x79\xee\x64\xbb\xab\x58\xe7\x3f\x4a\xff\xb8\x10\x57\x56\xfe\x5c\xad\x2f\x67\x8c\x37\x8a\x89\xa8\x94\xa1\x45\xb8\xe9\xf8\xf9\x3c\x3d\x15\x34\x36\x4f\x04\x8c\xcd\xaf\x06\x93\xca\x2b\x44\xaa\xb3\x2d\x15\x85\x13\xa0\x5c\x70\xdb\x38\xd1\xf5\x06\x08\x6e\x5f\x34\xfb\x21\x53\x6c\xcd\x33\x6e\x39\x7a\xe7\x6d\xbd\x0d\xd5\x2e\xf4\x60\x45\xab\xf7\xd5\x9c\x2f\x2e\xd1\xf0\x7f\xb1\x5e\x93\x06\xb9\x98\x13\x62\x52\x1e\x5b\x42\x42\x66\xb0\x62\xc7\x05\x09\xca\x68\x7b\x24\x08\xea\x23\xf2\x86\x04\xc1\xf1\xb1\x67\x5a\x7b\xea\xa3\x57\x7b\x5a\xd7\xc2\x03\x1e\x9c\xa1\x1a\x77\xbf\xe6\x1e\xd4\x5c\xfa\x1a\xd1\x98\xb4\x22\x51\x7b\x63\x6b\x54\x6b\x22\x3d\xee\xc1\x88\xd6\xb8\xe6\x20\xec\x15\xaf\x51\x73\x30\xda\xa8\xd8\xdc\x23\x7c\xa7\x6b\xef\x9b\xbd\xa7\x9f\xd1\x99\xb4\x60\x9c\x52\x52\x5b\x7f\x88\x9a\xaf\x1d\x1a\x16\xfa\x49\xe2\x16\x0e\xc8\x7f\x01\x00\x00\xff\xff\xae\x82\x6a\x82\x97\x0b\x00\x00") + +func testE2eTestingManifestsFlexvolumeDummyAttachableBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsFlexvolumeDummyAttachable, + "test/e2e/testing-manifests/flexvolume/dummy-attachable", + ) +} + +func testE2eTestingManifestsFlexvolumeDummyAttachable() (*asset, error) { + bytes, err := testE2eTestingManifestsFlexvolumeDummyAttachableBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/flexvolume/dummy-attachable", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookAgnhostPrimaryDeploymentYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x90\xcb\x4a\x03\x41\x10\x45\xf7\xfd\x15\x97\x59\x3b\x9a\x20\x28\xf6\x4e\x70\x23\x28\xb8\x72\x23\x2e\x2a\x9d\x62\xd2\xa4\x5f\x56\x57\x84\x10\xf2\xef\xd2\xe6\x39\x9a\xda\xcd\x29\xe6\x9e\x5b\x4d\xc5\xbf\xb3\x54\x9f\x93\x05\x95\x52\x6f\xbe\xa7\x66\xe9\xd3\xdc\xe2\x89\x4b\xc8\xeb\xc8\x49\x4d\x64\xa5\x39\x29\x59\x03\x24\x8a\x6c\x41\x43\x5a\xe4\xaa\x7d\x11\x1f\x49\xd6\xa6\x16\x76\x6d\x2b\x5c\x82\x77\x54\x2d\xa6\x06\xa8\x1c\xd8\x69\x96\xb6\x01\x22\xa9\x5b\xbc\xd0\x8c\x43\xdd\x01\x34\xe3\x31\x6b\x8f\x24\x07\xb6\x38\xe4\xee\x98\x7a\x16\x8b\x19\xb9\x25\xa7\xb9\x01\x94\x63\x09\xa4\xbc\xcf\x3d\x6b\xd7\x26\x8c\x14\x17\x25\x97\x35\xff\x45\xc0\xe1\xb0\x36\x2e\x27\x25\x9f\x58\x8e\xe1\xfd\xfe\x39\xfe\xe6\xf8\x48\x03\x5b\x6c\x36\xd7\x8f\x3b\xef\x73\x03\xdb\xed\xa9\x93\x0c\xd5\xe2\x03\xdd\xb0\xe2\xaa\xb3\x9c\x97\xdd\x15\xba\xbe\x5f\xa8\x96\xbe\x64\xd1\xf6\x79\x77\x7b\xff\xd0\xe1\xf3\xd4\x99\x6b\x5e\x89\xe3\xb3\xdb\x1a\xfc\x6a\x11\x23\x06\xb8\xb2\xb2\x98\x4e\x26\x71\x44\x23\xc7\x2c\xeb\xdf\xc5\xab\x3f\x6e\x9a\xee\xec\xf7\xfe\x74\xe7\x5b\x16\xb5\x68\x35\xcc\x4f\x00\x00\x00\xff\xff\xa6\xad\xbd\xcc\x28\x02\x00\x00") + +func testE2eTestingManifestsGuestbookAgnhostPrimaryDeploymentYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookAgnhostPrimaryDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/agnhost-primary-deployment.yaml.in", + ) +} + +func testE2eTestingManifestsGuestbookAgnhostPrimaryDeploymentYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookAgnhostPrimaryDeploymentYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/agnhost-primary-deployment.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookAgnhostPrimaryServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\xcd\x41\x8a\xc3\x30\x0c\x85\xe1\xbd\x4f\xf1\x2e\x90\xc5\x30\x30\x43\x75\x8a\x42\xa1\x7b\xc5\x79\xa4\x26\x8e\x6d\x64\x11\xe8\xed\x4b\x52\x68\xbb\xee\x4e\xfc\x7c\x92\xb4\xa5\x2b\xad\xa7\x5a\x04\xdb\x4f\x58\x52\x99\x04\x17\xda\x96\x22\xc3\x4a\xd7\x49\x5d\x25\x00\x45\x57\x0a\x74\x2e\xb7\xda\x7d\x68\x96\x56\xb5\x7b\x00\xb2\x8e\xcc\x7d\x17\x80\xb6\xf6\x22\x47\xb0\x9a\x29\x78\x63\xc0\x13\x4d\x30\x6a\x5c\x58\xa6\xd0\x1b\xe3\xbe\xda\xaa\xf9\x71\x63\x38\x46\xc1\xdf\xef\xff\xe9\xe9\xd5\x66\xfa\xf9\x33\x76\x66\x46\xaf\xf6\xe5\xcf\x47\x00\x00\x00\xff\xff\x31\x9c\x65\x89\xf2\x00\x00\x00") + +func testE2eTestingManifestsGuestbookAgnhostPrimaryServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookAgnhostPrimaryServiceYaml, + "test/e2e/testing-manifests/guestbook/agnhost-primary-service.yaml", + ) +} + +func testE2eTestingManifestsGuestbookAgnhostPrimaryServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookAgnhostPrimaryServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/agnhost-primary-service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookAgnhostReplicaDeploymentYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x90\x41\x4f\xc3\x30\x0c\x85\xef\xf9\x15\x56\xcf\x14\x36\x90\x40\xe4\x86\xc4\x05\x09\x24\x4e\x5c\x10\x07\x2f\x33\x5d\xb4\x24\x0e\x8e\x87\x34\x4d\xfb\xef\x28\xac\xdd\x5a\x58\x6e\x7e\xaf\x7d\x9f\xfd\x30\xfb\x37\x92\xe2\x39\x59\xc0\x9c\xcb\xd5\xf7\xdc\xac\x7d\x5a\x5a\x78\xa4\x1c\x78\x1b\x29\xa9\x89\xa4\xb8\x44\x45\x6b\x00\x12\x46\xb2\x80\x5d\x5a\x71\xd1\x56\x28\x07\xef\xd0\x94\x4c\xae\xba\xfd\x5c\x2c\x5c\x1b\x80\x42\x81\x9c\xb2\x54\x07\x20\xa2\xba\xd5\x33\x2e\x28\x94\x83\x00\x95\x78\xcc\xea\x25\xe1\x40\x76\xc8\xe9\x35\xf5\x24\x16\x16\xe8\xd6\x94\x96\x06\x40\x29\xe6\x80\x4a\x7d\xee\x68\xbb\xfa\xc2\x04\x71\x16\x72\x1e\xf3\x1f\x04\x30\x1c\x56\x9f\xe3\xa4\xe8\x13\xc9\x31\xbc\xed\xeb\xf8\x9b\xe3\x23\x76\x64\x61\xb7\xbb\x7c\x38\x70\x9f\xaa\xb0\xdf\x9f\x76\x92\xae\x58\x78\x87\xa6\xdb\x50\xd1\x05\xf3\xba\xb9\x80\xa6\x1d\xfa\xe4\xcf\x3a\x0e\x25\x67\xf1\x11\x65\x7b\xf8\x62\xa5\x9a\xdb\xcc\xa2\x75\xbc\xbd\xb9\xbb\x6f\xe0\xe3\x74\x15\x15\xde\x88\xa3\xd1\xf5\x55\xfc\xaa\x90\x89\x06\xe0\xf2\xc6\xc2\x7c\x36\x8b\x13\x35\x52\x64\xd9\xfe\x1a\x2f\xfe\xe8\x54\xdc\xe8\xf7\xf6\xd4\xc4\x2b\x8b\x5a\xa8\x6b\x98\x9f\x00\x00\x00\xff\xff\x15\xa2\x0c\xb6\x4a\x02\x00\x00") + +func testE2eTestingManifestsGuestbookAgnhostReplicaDeploymentYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookAgnhostReplicaDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/agnhost-replica-deployment.yaml.in", + ) +} + +func testE2eTestingManifestsGuestbookAgnhostReplicaDeploymentYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookAgnhostReplicaDeploymentYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/agnhost-replica-deployment.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookAgnhostReplicaServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\xcc\x41\xaa\xc3\x30\x0c\x84\xe1\xbd\x4f\x31\x17\xc8\xe2\xf1\xa0\xa5\xba\x46\xa1\x7b\xc5\x19\x5a\x13\xc7\x16\xb2\xc8\xf9\x4b\xb2\x68\xf7\xdd\x09\xf1\xcd\xaf\x56\x1e\xf4\x51\x7a\x13\xec\x7f\x69\x2d\x6d\x11\xdc\xe9\x7b\xc9\x4c\x1b\x43\x17\x0d\x95\x04\x34\xdd\x28\xd0\x67\x7b\xf5\x11\x93\xd3\x6a\xc9\x9a\x80\xaa\x33\xeb\x38\x04\xa0\x66\x1f\x72\x3e\xbc\x57\x0a\xbe\x18\x88\x42\x17\xcc\x9a\x57\xb6\x25\x0d\x63\x3e\xa6\xd6\x3d\xce\xc6\x74\x9e\x82\xcb\xff\xf5\x96\x80\xc1\xca\x1c\xdd\x7f\xcc\xbf\x03\x00\x00\xff\xff\xa5\xe8\x39\x6d\xdd\x00\x00\x00") + +func testE2eTestingManifestsGuestbookAgnhostReplicaServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookAgnhostReplicaServiceYaml, + "test/e2e/testing-manifests/guestbook/agnhost-replica-service.yaml", + ) +} + +func testE2eTestingManifestsGuestbookAgnhostReplicaServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookAgnhostReplicaServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/agnhost-replica-service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookFrontendDeploymentYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8f\xcb\x4a\x33\x41\x10\x85\xf7\xf3\x14\x87\x59\xff\xf3\x9b\x10\xf0\xd2\x3b\xc1\x8d\xa0\xe0\xca\x8d\xb8\xa8\xf4\x94\x93\x26\x7d\xb3\xba\x22\x84\x90\x77\x97\xd6\x38\x99\x01\xad\xe5\x57\xd4\x57\xe7\x50\x76\xcf\x2c\xc5\xa5\x68\x40\x39\x97\x8b\x8f\x65\xb3\x75\xb1\x37\xb8\xe3\xec\xd3\x3e\x70\xd4\x26\xb0\x52\x4f\x4a\xa6\x01\x22\x05\x36\x78\x93\x14\x95\x63\xdf\x94\xcc\xb6\x62\xe1\xec\x9d\xa5\x62\xb0\x6a\x80\xc2\x9e\xad\x26\xa9\x1b\x20\x90\xda\xcd\x03\xad\xd9\x97\x6f\x80\xfa\xca\x60\xd8\x71\xd1\x75\x4a\xdb\x13\x54\xc7\x32\x51\x03\xca\x21\x7b\x52\x3e\x69\x26\x29\xea\xf8\x99\xf1\x0f\xe7\x2f\x56\xe0\x27\x74\x1d\x9b\xa2\x92\x8b\x2c\xa3\xa9\x3b\x75\x1c\x55\xdd\xec\xb8\x8e\x0b\x34\xb0\xc1\xe1\xf0\xff\x76\x88\x9b\x54\xf4\xbe\x82\xe3\xf1\x9c\x45\x86\x62\xf0\x82\x76\x94\xb4\xff\xd0\x76\xdd\x9a\xec\x96\x63\xdf\xe5\x24\x5a\xc9\xe5\xea\xea\xa6\xc5\xeb\x78\x27\x5c\xd2\x4e\x2c\x4f\x6a\x55\xf8\x5e\x2d\x33\x06\xd8\xbc\x33\x58\x2e\x16\x61\x46\x03\x87\x24\xfb\xaf\xc5\xa3\x1b\x37\xf5\xdd\xe4\xbc\x3b\xb7\x7e\x4a\xa2\x06\xd7\x8b\xe6\x33\x00\x00\xff\xff\xbd\x10\x5c\xb3\x09\x02\x00\x00") + +func testE2eTestingManifestsGuestbookFrontendDeploymentYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookFrontendDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/frontend-deployment.yaml.in", + ) +} + +func testE2eTestingManifestsGuestbookFrontendDeploymentYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookFrontendDeploymentYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/frontend-deployment.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookFrontendServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x8f\x3f\x4b\x04\x31\x10\xc5\xfb\x7c\x8a\x07\xb6\x9e\x68\x27\x29\xed\x04\x0b\x41\xb0\x9f\x4d\x66\xcf\x70\xd9\x99\x30\x99\x9c\xee\xb7\x97\xdd\xb5\xb0\xbc\x6e\x98\xf7\x87\xdf\xa3\x56\x3e\xd9\x7a\x51\x89\xb8\x3e\x85\x4b\x91\x1c\xf1\xc1\x76\x2d\x89\xc3\xc2\x4e\x99\x9c\x62\x00\x84\x16\x8e\x98\x4d\xc5\x59\x72\x00\x2a\x4d\x5c\xfb\x26\x01\xd4\x5a\xc4\x79\x70\xf7\x49\xf5\xb2\xbf\xbc\xb0\xfd\xf3\xf7\xc6\x69\xf3\xde\xa1\xcc\x58\x75\x18\x52\x1d\xdd\xd9\xd0\x47\x6b\x6a\xde\x51\xfc\x1e\x43\x92\x2e\x0b\x8b\xc3\xbf\x18\xb3\xd6\xaa\xdf\x45\xce\x70\x05\x0d\xd7\x85\xbc\x24\xaa\x75\x45\x32\x26\xe7\xbd\x90\x04\xfc\xe3\x6c\x42\x15\x55\x29\x9f\x26\xaa\x24\x89\x33\x5e\xdf\x31\xab\x1d\x55\x7f\x20\xe8\xc7\xb6\x87\x3d\xea\x6b\xe3\x88\x37\xa5\xfc\x72\x64\x2c\x00\x3b\xcd\xc6\x7a\xda\xcf\x88\xe7\xc7\x00\x74\xae\x9c\x5c\xed\xd6\xc1\xbf\x01\x00\x00\xff\xff\xc5\xce\xd2\xc0\x59\x01\x00\x00") + +func testE2eTestingManifestsGuestbookFrontendServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookFrontendServiceYaml, + "test/e2e/testing-manifests/guestbook/frontend-service.yaml", + ) +} + +func testE2eTestingManifestsGuestbookFrontendServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookFrontendServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/frontend-service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookLegacyFrontendControllerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x92\x3f\x6f\xdb\x30\x10\xc5\x77\x7d\x8a\x07\x74\xc8\x62\x37\x0e\xda\xa1\xe0\x5a\xf4\xdf\x10\xa4\x48\x82\xae\xc6\x89\x3a\xcb\x44\xa8\x3b\x96\x3c\xa9\xc8\xb7\x2f\xe8\x46\xb2\x54\x6e\xfa\x1d\xdf\xef\x1e\x24\x51\x0a\xbf\x38\x97\xa0\xe2\x30\xdd\x35\x2f\x41\x3a\x87\x47\x4e\x31\x78\xb2\xa0\xf2\x59\xc5\xb2\xc6\xc8\xb9\x19\xd8\xa8\x23\x23\xd7\x00\x42\x03\x3b\x9c\xb2\x8a\xb1\x74\x4d\x49\xec\x2b\xce\xff\x82\xc5\xe1\x43\x03\x18\x0f\x29\x92\x71\x9d\x00\xeb\x78\x3d\x91\x5a\x8e\x65\x7e\x02\x28\x25\x87\x7e\xe4\x62\xad\xea\xcb\x82\x2d\x70\x5e\x6d\xaa\x68\xde\x56\x8f\x57\x31\x0a\xc2\x79\x31\xed\xdf\xca\xa5\x73\xda\x67\xee\x42\x59\x54\x61\xa0\x9e\x1d\x7a\x9f\xdf\x07\xbd\xed\x55\xfb\xc8\xc7\x42\x43\x8a\x5c\x6e\xfb\x76\x3f\x2f\x71\xd3\xc7\x25\x93\xb9\xe8\x98\x3d\xaf\x8a\x56\xf8\xbb\xf6\xdc\x30\xc0\xa7\xd1\xe1\xee\x70\x18\x36\x74\xe0\x41\xf3\xeb\x65\x70\x1f\x96\x09\xcb\x74\x0d\xcf\x8d\xbf\x7d\x79\x3e\x7e\x7f\x78\x7a\x7e\x3a\x7e\x7d\x7c\xb8\x5f\x59\x26\x8a\x23\x3b\x74\x52\x56\xf0\x1d\x7e\x9c\xf0\xaa\x63\x86\x8f\x63\x31\xce\xf5\x5d\x9c\x42\x8f\x4e\xb9\x40\xd4\x10\xc4\xc7\xb1\x63\x50\x4d\xa2\x70\x9e\x82\xe7\x1d\xec\xcc\x02\xd3\x8d\x2a\x48\x31\xa6\x0e\xe4\x3d\x97\x52\xeb\x85\xac\x32\xb0\x18\x26\xca\x81\xda\xc8\x05\xa6\x38\x05\xe9\x66\x13\xce\x5a\xec\x3f\xcb\x49\x77\xf0\x3a\x5c\x82\x3a\x5a\xdd\x85\x9b\x6b\xfd\x1b\xc4\x20\x0c\x6a\x75\xe2\x1d\x48\x3a\x8c\x32\x5f\xb7\x33\x6f\x64\x97\x9b\x2d\x47\xfd\xe3\x36\xfc\xcd\xc6\x32\x2d\x38\x69\x5e\x7f\x8c\xfd\xf5\xaf\xf8\xa9\xd9\x1c\x3e\x1d\x9a\xbf\x01\x00\x00\xff\xff\x1c\xa9\xd8\xd7\xe8\x02\x00\x00") + +func testE2eTestingManifestsGuestbookLegacyFrontendControllerYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookLegacyFrontendControllerYaml, + "test/e2e/testing-manifests/guestbook/legacy/frontend-controller.yaml", + ) +} + +func testE2eTestingManifestsGuestbookLegacyFrontendControllerYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookLegacyFrontendControllerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/legacy/frontend-controller.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookLegacyRedisMasterControllerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x8f\x41\x4f\xc3\x30\x0c\x85\xef\xf9\x15\xfe\x03\xdd\x56\xa1\x81\xc8\x95\x33\x12\xe2\xc0\xdd\x4d\x2d\x64\x35\x89\x83\xe3\x22\xed\xdf\xa3\x74\xa3\xeb\x60\xbe\xe5\xbd\xf8\x7d\xcf\x58\xf8\x83\xb4\xb2\x64\x0f\xdf\xbd\x9b\x38\x8f\x1e\xde\xa9\x44\x0e\x68\x2c\xf9\x45\xb2\xa9\xc4\x48\xea\x12\x19\x8e\x68\xe8\x1d\x40\xc6\x44\x1e\x94\x46\xae\x5d\xc2\x6a\xa4\x0e\x20\xe2\x40\xb1\x36\x1b\x00\x4b\xb9\xf8\xcb\x53\x25\x92\x87\xf5\x27\x80\x31\xa9\x87\x01\xc3\x44\x79\x74\xb5\x50\x68\x7b\x7a\x06\x57\x0f\xbd\x03\x30\x4a\x25\xa2\xd1\x39\x71\x8b\x6f\xb3\xa5\xdd\x21\xde\xa5\xfe\x27\x37\xe5\x97\xde\x26\x48\x36\xe4\x4c\xba\x26\x77\x97\x63\xff\xc4\x70\xc2\x4f\xf2\x30\x4a\x98\x48\x77\x2c\xfb\xc8\x83\xa2\x9e\xf6\x4b\x05\x7f\xdc\x1d\x76\xc7\x0e\x63\xe1\x4c\xd7\x3e\x54\x65\xd6\x40\x9b\xd6\x4d\xfc\x9a\xa9\xda\x8d\x06\x10\xca\xec\xa1\x3f\x1c\xd2\x8d\x9a\x28\x89\x9e\x16\xe3\x95\x57\xa7\x88\x6e\xd7\xbb\xeb\x11\x6f\xa2\xe6\xe1\xf1\xe1\xe9\xd9\xfd\x04\x00\x00\xff\xff\xab\x8c\xb0\x65\xe9\x01\x00\x00") + +func testE2eTestingManifestsGuestbookLegacyRedisMasterControllerYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookLegacyRedisMasterControllerYaml, + "test/e2e/testing-manifests/guestbook/legacy/redis-master-controller.yaml", + ) +} + +func testE2eTestingManifestsGuestbookLegacyRedisMasterControllerYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookLegacyRedisMasterControllerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/legacy/redis-master-controller.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookLegacyRedisSlaveControllerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x53\xcd\x6e\xdb\x3c\x10\xbc\xeb\x29\x16\xce\x21\x17\xdb\x72\x9c\xc8\xfe\xcc\xeb\x87\xfe\x1d\x82\x14\x49\xd0\x1e\x8a\x22\x58\x52\x6b\x9b\x30\xb9\xab\x92\x94\x5a\xbf\x7d\x41\xf9\x4f\x46\xa3\x1b\x77\x76\x66\x96\x9c\x15\x36\xf6\x1b\x85\x68\x85\x15\x74\x77\xc5\xce\x72\xad\xe0\x99\x1a\x67\x0d\x26\x2b\xfc\xbf\x70\x0a\xe2\x1c\x85\xc2\x53\xc2\x1a\x13\xaa\x02\x80\xd1\x93\x82\x40\xb5\x8d\x93\xe8\xb0\xa3\x02\xc0\xa1\x26\x17\x33\x0a\x80\x4d\x73\x84\xfb\x63\x10\x47\x0a\x4e\x8d\x00\xc9\x52\x50\xa0\xd1\xec\x88\xeb\x22\x36\x64\x32\x2d\x1c\x6c\xa3\x82\x79\x01\x90\xc8\x37\x0e\x13\x1d\x04\x87\xe6\xf9\x1b\x9a\xbd\x63\xf8\x9e\xe9\xbf\xc6\xb9\x72\x32\xcf\x9f\x11\x4e\x68\x99\xc2\x59\x78\x72\xbc\xe9\xb5\x8a\xf5\xb8\x21\x05\xb5\x98\x1d\x85\xa9\x95\xd2\x59\x1d\x30\xec\xcb\x7e\x00\x55\x4d\x67\xd3\x6a\x82\xae\xb1\x7c\xe1\xdc\xc0\x77\x02\x0c\x04\xc2\x6e\x0f\xd6\x37\x8e\x3c\x71\xb2\xbc\x81\xb4\x25\xa8\x39\x82\x34\xf9\xc5\x41\xd6\x6a\xc0\xda\xa6\xd4\x44\x55\x96\x1b\x9b\xb6\xad\x9e\x1a\xf1\xe5\xae\xd5\x14\x98\x12\xc5\x92\xfe\x60\x56\x8a\xa5\x76\xa2\xcb\xd5\xd2\x2c\xa9\x9e\x91\x5e\x54\x55\x85\x0f\x7a\xb1\x58\xd6\xf3\xff\x96\xcb\xf5\x6a\x51\xd5\xf7\xab\x39\xcd\x66\xa8\xcd\x43\x55\x6e\x5a\x8a\x49\x8b\xec\xca\x41\x84\x65\x68\x79\x1a\xb7\x67\x6f\x23\xde\x63\x5e\x87\x1f\x30\x3a\xb6\x51\xe8\x28\x8c\xc6\x30\x9a\x1c\x28\xb2\xce\x87\x03\xe8\x31\xa6\x03\xb8\xb8\x5f\xae\x46\xf0\xf3\x12\x04\x45\x69\x83\xa1\x41\x5c\xb9\xf8\x2b\x0f\x71\x55\x03\x30\x4d\xab\xe0\x6e\x36\xf3\x57\x55\x4f\x5e\xc2\xbe\x07\x1e\xed\x19\x21\xee\x2e\xe4\x53\x50\x9f\x3e\xbc\xbe\x7d\x7e\x7a\x79\x7d\x79\xfb\xf8\xfc\xf4\x38\x50\xe9\xd0\xb5\x39\x33\x8e\x83\xe2\x0d\x7c\x59\xc3\x5e\xda\x00\xc6\xb5\x79\xfc\xbc\x02\x6b\xbb\x81\x5a\x28\x02\x4b\x02\xcb\xc6\xb5\x35\x01\xf6\x09\xe5\x07\xb0\x86\xc6\x39\x32\x86\x24\x57\x52\x96\x63\x22\xac\x01\x8d\xa1\x18\x01\x39\x4f\x68\x83\x70\xce\x19\x3a\x0c\x16\xb5\x23\x48\x02\x6b\xcb\x75\x9f\xfa\xe1\xcd\xae\x54\x8e\x16\xb7\x11\xb6\x12\xd3\xb8\x4f\x21\xf3\xa5\x4d\x3d\xe5\xf6\x72\x91\x5b\x70\x96\x09\x50\x4b\x47\x63\xc0\xe3\x42\x9f\x84\x5a\x3e\x51\x33\xad\xef\xd4\xe4\xe4\xb7\xba\xea\x3a\xaa\x11\x77\xe7\x72\x23\x61\x18\xcb\xe4\xf2\x5b\x7c\x95\x90\x14\xe4\x78\x8b\xbf\x01\x00\x00\xff\xff\xb9\x3d\x32\x31\x38\x04\x00\x00") + +func testE2eTestingManifestsGuestbookLegacyRedisSlaveControllerYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookLegacyRedisSlaveControllerYaml, + "test/e2e/testing-manifests/guestbook/legacy/redis-slave-controller.yaml", + ) +} + +func testE2eTestingManifestsGuestbookLegacyRedisSlaveControllerYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookLegacyRedisSlaveControllerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/legacy/redis-slave-controller.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookRedisMasterDeploymentYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x90\xcd\x4a\x43\x31\x10\x85\xf7\x79\x8a\x79\x81\x6a\x2f\x82\x62\xd6\x6e\x04\x05\x71\xe1\x7e\x9a\x7b\xd0\xd0\xfc\x39\x99\x2b\x94\xd2\x77\x97\xd8\xd8\xde\xab\x9d\x5d\xce\x21\xdf\x37\x09\x17\xff\x06\xa9\x3e\x27\x4b\x5c\x4a\xbd\xfe\x1a\xcc\xd6\xa7\xd1\xd2\x03\x4a\xc8\xbb\x88\xa4\x26\x42\x79\x64\x65\x6b\x88\x12\x47\x58\x12\x8c\xbe\xae\x22\x57\x85\x98\x5a\xe0\x5a\x25\x28\xc1\x3b\xae\x96\x06\x43\x54\x11\xe0\x34\x4b\x6b\x88\x22\xab\xfb\x78\xe2\x0d\x42\x3d\x06\xd4\x74\x1d\xd4\x03\xc9\x01\x96\x3a\xf4\x18\xa9\x87\x58\xda\xb0\xdb\x22\x8d\x86\x48\x11\x4b\x60\x45\x87\xce\xf6\x6a\x13\x16\xfc\x0b\x86\x8b\x8e\xff\x16\xa2\xdf\x27\xb5\x71\x39\x29\xfb\x04\x39\x91\x57\xfd\x17\xfe\x60\x7c\xe4\x77\x58\xda\xef\xaf\x5e\x9b\xf3\xb1\x1d\x0f\x87\xb3\x1a\x35\x4f\xe2\x30\x5b\xb0\x85\x9f\x13\xaa\x2e\x32\x22\x57\x26\x4b\xc3\x7a\x1d\x17\x69\x44\xcc\xb2\xfb\x29\x9e\xfd\xa9\x29\x59\xe6\xd7\x57\xe7\x7d\x5f\xb2\xa8\xa5\xdb\x9b\xbb\x7b\xf3\x1d\x00\x00\xff\xff\x2d\xdf\x6e\xe2\xe7\x01\x00\x00") + +func testE2eTestingManifestsGuestbookRedisMasterDeploymentYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookRedisMasterDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/redis-master-deployment.yaml.in", + ) +} + +func testE2eTestingManifestsGuestbookRedisMasterDeploymentYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookRedisMasterDeploymentYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/redis-master-deployment.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookRedisMasterServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x8d\x41\xaa\xc3\x30\x0c\x44\xf7\x3e\xc5\x5c\x20\x8b\xcf\x87\x96\xea\x14\x85\x42\xf7\x8a\x3d\x14\x13\xc7\x36\xb2\xc8\xf9\x4b\xd2\x52\xba\xee\x4e\xd2\x7b\x9a\xd1\x9e\xef\xb4\x91\x5b\x15\x6c\x7f\x61\xc9\x35\x09\x6e\xb4\x2d\x47\x86\x95\xae\x49\x5d\x25\x00\x55\x57\x0a\x8c\x29\x8f\x69\xd5\xe1\xb4\x00\x14\x9d\x59\xc6\x8e\x01\xed\xfd\xcd\x8f\xd5\x5a\xa1\xe0\x63\x02\x9e\x69\x82\x59\xe3\xc2\x9a\xc2\xe8\x8c\xfb\x5f\x6f\xe6\x47\xc0\x74\x8c\x82\xd3\xff\xf9\xf2\xf2\xd5\x1e\xf4\xeb\xf7\x71\xb0\x30\x7a\xb3\x5f\x0a\x9f\x01\x00\x00\xff\xff\x35\x30\xd5\x6a\xe9\x00\x00\x00") + +func testE2eTestingManifestsGuestbookRedisMasterServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookRedisMasterServiceYaml, + "test/e2e/testing-manifests/guestbook/redis-master-service.yaml", + ) +} + +func testE2eTestingManifestsGuestbookRedisMasterServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookRedisMasterServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/redis-master-service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookRedisSlaveDeploymentYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x53\xcd\x6e\xdb\x3c\x10\xbc\xeb\x29\x16\xce\x21\x17\x3b\x72\x9c\xd8\xfe\xcc\xf3\xd7\x9f\x00\x0d\x52\x24\x41\x7b\x28\x8a\x60\x49\xad\x6d\xc2\x24\x57\xe5\x8f\x5a\x23\xc8\xbb\x17\xb4\x64\x5b\x42\xa3\x9b\x66\x38\x33\xab\x1d\x0a\x6b\xfd\x8d\x7c\xd0\xec\x04\x60\x5d\x87\xb2\xb9\x2e\x76\xda\x55\x02\xfe\xa7\xda\xf0\xde\x92\x8b\x85\xa5\x88\x15\x46\x14\x05\x80\x43\x4b\x02\x3c\x55\x3a\x4c\x82\xc1\x86\x8a\x50\x93\xca\x8c\xa7\xda\x68\x85\x41\xc0\xac\x00\x08\x64\x48\x45\xf6\x99\x01\xb0\x18\xd5\xf6\x0b\x4a\x32\xa1\x05\x20\xa7\x75\x3e\x1d\xe0\xd9\x90\x80\xd6\xb3\x45\xa2\x26\x2f\x40\xa2\xda\x91\xab\x0a\x80\x48\xb6\x36\x18\xa9\xf3\xec\x4d\x95\x1f\x33\xb0\x7f\x27\xe0\xbd\x88\x7f\x43\x00\x8e\x1f\x94\x1f\xc5\x2e\xa2\x76\xe4\x4f\xc6\x93\x6e\x05\x43\x17\x6d\x71\x43\x02\x5e\x5f\xaf\x1e\x73\xe2\x5d\x7e\x7d\x7b\x3b\xd1\x17\xf0\x9d\x00\x3d\x01\x3b\xb3\x07\x6d\x6b\x43\x79\xb3\xda\x6d\x20\x6e\x09\x2a\x17\x80\xeb\xa8\xd9\x01\xaf\x45\x4f\xb5\x8d\xb1\x0e\xa2\x2c\x37\x3a\x6e\x93\xbc\x52\x6c\xcb\x5d\x92\xe4\x1d\x45\x0a\x25\xfd\xc1\xec\x14\x4a\x69\x58\x96\xab\xa5\x5a\x52\x35\x25\xb9\x98\xcf\xe7\x78\x2b\x17\x8b\x65\x35\xfb\x6f\xb9\x5c\xaf\x16\xf3\xea\x66\x35\xa3\xe9\x14\xa5\xba\x9d\x97\x9b\x44\x21\x4a\xe6\x5d\xd9\xab\xb1\xf4\xc9\x5d\x85\xed\x29\x5b\xb1\xb5\x98\xef\xc1\x0f\x18\x75\xc7\xc8\x37\xe4\x47\x63\x18\x4d\x5a\x09\xaf\xf3\x4b\x4b\x5a\x0c\xb1\x25\x17\x37\xcb\xd5\x08\x7e\x9e\x77\x4e\x81\x93\x57\xd4\x6b\x26\x83\xbf\xf2\x10\x03\x0c\x40\xd5\x49\xc0\xf5\x74\x6a\x07\xa8\x25\xcb\x7e\x7f\x20\xee\xf5\x89\x21\xd7\x9c\xc5\xc7\x4e\x3e\x7d\x78\x7e\xf9\xfc\xf0\xf4\xfc\xf4\xf2\xf1\xf1\xe1\xbe\xe7\xd2\xa0\x49\x24\xf2\x9e\x7b\xe0\x05\xdc\xad\x61\xcf\xc9\x83\x32\x29\x8f\x9f\xdb\x5e\xeb\x0d\x54\x4c\x01\x1c\x47\xd0\x4e\x99\x54\x11\xe0\xa1\xa1\xbc\x00\xad\x68\x9c\x2b\x73\x10\x79\x60\xa5\x5d\x88\x84\x15\xa0\x52\x14\x02\xa0\xcb\x13\x6a\xcf\x2e\xf7\x0c\x0d\x7a\x8d\xd2\x10\x44\x86\xb5\x76\xd5\xa1\xf5\x76\x67\x03\x97\x2e\xe2\x32\xc0\x96\x43\x1c\x1f\x5a\xc8\x7a\x4e\xf1\x20\xb9\x3c\x7f\xc8\x25\x18\xed\x08\x50\x72\x43\x63\xc0\xee\xee\x1e\x8d\x92\x3b\x4a\xb3\xec\x70\x52\x92\xe1\xdf\x62\x70\xaa\x73\x23\xd7\x9c\xe0\x9a\x7d\xbf\x96\xc9\xf9\x0f\xf8\xca\x3e\x0a\xc8\xf5\x16\x7f\x03\x00\x00\xff\xff\x36\xf6\xf3\x52\x36\x04\x00\x00") + +func testE2eTestingManifestsGuestbookRedisSlaveDeploymentYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookRedisSlaveDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/redis-slave-deployment.yaml.in", + ) +} + +func testE2eTestingManifestsGuestbookRedisSlaveDeploymentYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookRedisSlaveDeploymentYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/redis-slave-deployment.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsGuestbookRedisSlaveServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x8c\x41\xaa\xc3\x30\x10\x43\xf7\x3e\x85\x2e\x90\xc5\xe7\x43\x4b\xe7\x1a\x85\xee\x27\xb6\x16\x43\x1c\xdb\xcc\x98\x9c\xbf\x24\xb4\x17\xe8\x4e\xe2\xe9\x49\x87\xbd\xe8\x61\xbd\x09\x8e\xbf\xb4\x59\x2b\x82\x27\xfd\xb0\xcc\xb4\x73\x6a\xd1\xa9\x92\x80\xa6\x3b\x05\xce\x62\xb1\x44\xd5\x83\x09\xa8\xba\xb2\xc6\x49\x01\x1d\xe3\x83\xaf\xea\xbd\x52\xf0\x1d\x02\xd3\xe8\x82\x55\xf3\xc6\x56\x52\x0c\xe6\x53\x1b\xdd\xe7\xe5\x2f\x57\x14\xdc\xfe\xef\x8f\x04\x04\x2b\xf3\xec\xfe\xc3\xf5\x3b\x00\x00\xff\xff\x51\x66\x08\x5a\xd1\x00\x00\x00") + +func testE2eTestingManifestsGuestbookRedisSlaveServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsGuestbookRedisSlaveServiceYaml, + "test/e2e/testing-manifests/guestbook/redis-slave-service.yaml", + ) +} + +func testE2eTestingManifestsGuestbookRedisSlaveServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsGuestbookRedisSlaveServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/guestbook/redis-slave-service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressGceStaticIp2IngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x8e\xb1\x6e\xeb\x30\x0c\x45\x77\x7d\xc5\x45\xde\x6c\xe7\x65\x0b\xf4\x07\x5d\x8a\x0e\x45\x77\x5a\x62\x2d\xc1\x8e\x28\x88\x4c\x8a\xfe\x7d\x61\x25\x4e\x87\x6e\xba\x07\xe2\xc1\xa1\x9a\x3f\xb8\x69\x96\xe2\x51\xd8\xbe\xa4\x2d\xb9\xcc\xe3\x72\xd6\x31\xcb\xf1\x76\x9a\xd8\xe8\xe4\x96\x5c\xa2\xc7\x4b\x99\x1b\xab\xba\x0b\x1b\x45\x32\xf2\x0e\x28\x74\x61\x0f\x35\xb2\x1c\x86\x5c\x1d\xf0\x0f\xef\x29\x2b\xa8\x14\xd9\xa8\x14\x6c\x2b\x46\x8e\x98\xbe\x61\x89\x61\xac\x86\x6b\x95\x02\x5a\x57\x09\x64\xb9\xcc\xa0\x87\x24\xd7\xb1\x4b\x7e\xef\xd5\x77\x80\xe5\x3a\x71\x2b\x6c\xdc\xd3\xf2\x3d\x66\x9c\x57\x99\x68\x1d\x9e\x05\xc3\xbd\xe8\xb0\xdb\x0e\x4e\x2b\x87\x4d\xd1\xae\x2b\x77\xd7\x80\x24\x6a\x1e\xbb\x62\xeb\x19\x83\x5c\x1c\x00\x24\xb3\xea\xfb\x0b\xa8\x64\x49\xf7\x31\xf4\xe9\x71\xfc\x14\x79\x20\x60\xa2\xb0\x70\x89\xfe\x09\x00\xe5\x76\xcb\x81\x5f\x7b\x06\x87\x24\x89\x29\x72\xd3\x61\x33\xeb\xdf\x8f\x6f\xd2\xcc\xe3\xfc\xdf\xfd\x04\x00\x00\xff\xff\xcf\xe6\xa4\x9a\x8b\x01\x00\x00") + +func testE2eTestingManifestsIngressGceStaticIp2IngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressGceStaticIp2IngYaml, + "test/e2e/testing-manifests/ingress/gce/static-ip-2/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressGceStaticIp2IngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressGceStaticIp2IngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/gce/static-ip-2/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressGceStaticIp2RcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8e\x31\x6e\x03\x31\x0c\x04\x7b\xbd\x82\x1f\x90\xed\x5c\x65\xa8\xcd\x07\x82\x14\xe9\x69\xdd\xc2\x27\x58\x12\x05\x92\xf1\xfb\x03\x25\x38\xc7\x45\xb2\x1d\xb1\xdc\xc1\xf0\x28\x1f\x50\x2b\xd2\x13\xdd\x5f\xc2\xad\xf4\x35\xd1\x3b\x46\x2d\x99\xbd\x48\x7f\x95\xee\x2a\xb5\x42\x43\x83\xf3\xca\xce\x29\x10\x75\x6e\x48\x84\xbc\xc9\x06\x5e\xa1\x16\x37\xf7\x61\xc1\x06\xf2\xec\xf5\x87\x60\x89\x96\x40\xe4\x68\xa3\xb2\x63\x36\x44\xcf\x9c\x99\xca\x17\x54\xdb\x2f\x22\x1e\xe3\x2f\xf4\xac\x76\xfc\x4c\x96\xee\x5c\x3a\xf4\x31\x8d\xff\x6a\xed\xe8\xd2\xf8\x8a\x44\xd7\xac\x87\x22\xc7\xdb\xe7\x05\xda\xe1\xb0\x88\x05\xd1\x61\x1e\xbf\x3f\xec\x38\x11\x06\xbd\x43\xd3\x72\x58\x1e\xfb\x21\xea\x4f\xa6\xf1\x57\xe2\x4d\xd4\x13\x9d\x4f\xe7\x53\xf8\x0a\x00\x00\xff\xff\xa9\x29\xab\x0c\x53\x01\x00\x00") + +func testE2eTestingManifestsIngressGceStaticIp2RcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressGceStaticIp2RcYaml, + "test/e2e/testing-manifests/ingress/gce/static-ip-2/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressGceStaticIp2RcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressGceStaticIp2RcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/gce/static-ip-2/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressGceStaticIp2SvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x7c\x8e\xc1\x0a\xc2\x30\x0c\x86\xef\x7d\x8a\xff\x05\x06\x7a\x93\x5e\xbd\xcb\x40\xf1\x1e\xdb\xe0\x8a\xdd\x12\xd2\x30\xf0\xed\x65\x75\x47\xf1\x16\x3e\xbe\x24\x1f\x69\xb9\xb3\xb5\x22\x4b\xc4\x7a\x0c\xaf\xb2\xe4\x88\x2b\xdb\x5a\x12\x87\x99\x9d\x32\x39\xc5\x00\x2c\x34\x73\x04\xa7\x49\x26\xa6\xcc\xd6\x86\xc9\x5d\x5b\x00\x2a\x3d\xb8\xb6\xcd\x01\x48\xf5\x97\xd4\x94\xd3\x26\xf8\x5b\x39\xe2\x22\x99\x47\x31\x0f\x80\x8a\x79\x5f\x1d\xfa\x18\x71\x3a\xf4\x3b\x4e\xf6\x64\x1f\x77\xb4\x43\x35\x71\x49\x52\x23\x6e\xe7\xb1\x93\x6f\xd4\xf6\x23\x00\x8d\x2b\x27\x17\xfb\x5b\xf2\x09\x00\x00\xff\xff\x0d\x93\xec\x7c\xf0\x00\x00\x00") + +func testE2eTestingManifestsIngressGceStaticIp2SvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressGceStaticIp2SvcYaml, + "test/e2e/testing-manifests/ingress/gce/static-ip-2/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressGceStaticIp2SvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressGceStaticIp2SvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/gce/static-ip-2/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressHttpIngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\xcf\xbd\x6e\xeb\x30\x0c\x05\xe0\x5d\x4f\x71\x80\x3b\xc7\xb9\xd9\x02\xbd\x41\x97\xa2\x53\x77\x4a\xa6\x63\xc1\xb1\xe8\x92\x74\xfa\xf3\xf4\x85\x93\xba\x48\x3b\x04\x68\x81\x6a\x12\x29\x1d\xe2\x23\x4d\xe5\x91\xd5\x8a\xd4\x88\xca\xfe\x2c\x3a\x94\x7a\x68\x86\xbd\x35\x45\xb6\xa7\x5d\x62\xa7\x5d\x18\x4a\x6d\x23\xee\xea\x41\xd9\x2c\x8c\xec\xd4\x92\x53\x0c\x40\xa5\x91\x23\x38\xf7\x32\xd2\x14\x6c\xe2\xbc\x74\xff\x61\x98\x13\x8f\xb9\x40\xf9\x69\x2e\xca\x06\x42\xcb\x1d\xcd\x47\x47\xa2\x3c\x70\x6d\x9b\x80\xf5\xba\x44\x00\x63\x3d\x95\xcc\xf7\x9f\x13\x7b\xa6\x96\xd5\x5e\xae\x5f\x1f\x44\x3d\x62\xff\x3f\x00\x3a\x1f\xd9\x96\xe8\x06\xbd\x98\x47\x74\x22\x4d\x22\x6d\xb2\x8c\xe7\x48\xef\x3e\x5d\x46\x03\x13\x79\x6f\x6b\xb1\x39\x97\x11\xdb\x4e\xe4\xa3\xf5\xcd\x72\x39\xb7\x45\x5f\xfe\x5c\xb9\x56\xce\x42\x49\xf4\xf6\x03\x4e\x22\xfd\x0d\xe7\xf5\x26\xe7\xaf\x17\x7e\x0f\x00\x00\xff\xff\xab\x26\x24\xc4\x42\x02\x00\x00") + +func testE2eTestingManifestsIngressHttpIngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressHttpIngYaml, + "test/e2e/testing-manifests/ingress/http/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressHttpIngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressHttpIngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/http/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressHttpRcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x90\x3d\x8e\xe3\x30\x0c\x85\x7b\x9f\x82\x17\x70\xfe\xaa\x40\xed\x16\xdb\x06\xbb\x8b\xed\x19\xf9\x4d\x24\x44\x16\x05\x92\x4e\x31\xa7\x1f\x78\x66\x9c\x38\x98\xbc\x4e\xfc\xf4\x3e\x11\xe2\x96\xff\x43\x2d\x4b\x0d\x74\xdb\x77\xd7\x5c\x87\x40\x7f\xd0\x4a\x8e\xec\x59\xea\x2f\xa9\xae\x52\x0a\xb4\x1b\xe1\x3c\xb0\x73\xe8\x88\x2a\x8f\x08\x84\x98\x24\x81\x07\xa8\x75\xd6\x10\x67\xa2\x5f\x5d\x0b\xb4\xef\x88\x1c\x63\x2b\xec\x98\x09\xd1\xda\x30\xa7\xf0\x19\xc5\x96\x13\x11\xb7\xf6\x2c\x9d\x87\x8b\x78\x4e\x94\xea\x9c\x2b\xf4\x5e\xea\x5f\xac\xb2\xe8\xf2\xc8\x17\x04\xba\x44\xdd\x64\xd9\x5e\xa7\x33\xb4\xc2\x61\x3d\x0e\xe8\x1d\xe6\xfd\xe7\x0d\xdb\xce\x65\x83\xde\xa0\xe1\xb0\x39\xdc\xfb\x4d\xd4\x57\xdb\xf5\x8f\xe7\x4f\xa2\x1e\xe8\xb8\x3b\xee\xee\x54\xc1\x43\xae\x30\x3b\xa9\x9c\xf1\x68\x11\x25\xf7\xf6\x1b\xbe\x1e\x11\x35\xf6\x14\x68\x9b\xc0\xc5\xd3\xfb\x33\xfa\x29\x27\x6a\xd0\x2c\xc3\x5f\x44\xa9\xc3\xf7\xdf\x2e\xf1\x3c\x42\x26\x7f\xc9\x6c\x8a\x11\x66\xff\x92\xc2\x92\x94\xe1\x99\xbe\x71\x2e\x93\x62\x4d\x77\xdd\x47\x00\x00\x00\xff\xff\xb8\x09\xcb\x33\x12\x02\x00\x00") + +func testE2eTestingManifestsIngressHttpRcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressHttpRcYaml, + "test/e2e/testing-manifests/ingress/http/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressHttpRcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressHttpRcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/http/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressHttpSvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xd4\x8f\xb1\x4a\x06\x41\x0c\x84\xfb\x3c\xc5\xbc\xc0\x82\x76\xb2\xad\xbd\x1c\x28\xf6\x71\x37\x78\x8b\xfb\x5f\x42\x36\x1c\xde\xdb\xcb\xad\xd7\x58\xd8\xd8\xd9\x85\xef\x23\xc3\x0c\x5b\x7b\x15\x1f\x4d\xb7\x8c\xfd\x9e\x3e\xda\x56\x33\x9e\xc5\xf7\x56\x84\x6e\x12\x5c\x39\x38\x13\xb0\xf1\x4d\x32\xa4\xac\xba\x0a\x57\xf1\xf1\x49\x40\xe7\x37\xe9\xe3\xd4\x00\x9b\xfd\xf0\x34\x4c\xca\xa9\xe2\x30\xc9\x78\xd2\x2a\x8b\x7a\x10\x60\xea\x31\x9f\xd2\x3c\x33\x1e\xee\x66\x42\xb0\xbf\x4b\x2c\x17\xba\xa0\xb9\x86\x16\xed\x19\x2f\x8f\xcb\x24\xdf\x4d\xd6\x08\x23\x60\x48\x97\x12\xea\xbf\x74\x48\x29\xd1\xdf\x27\x1e\xff\x61\x22\x7d\x05\x00\x00\xff\xff\xb7\x97\x1c\xfe\xc3\x01\x00\x00") + +func testE2eTestingManifestsIngressHttpSvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressHttpSvcYaml, + "test/e2e/testing-manifests/ingress/http/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressHttpSvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressHttpSvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/http/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressHttp2IngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4c\x8c\x31\x0e\xc2\x30\x10\x04\x7b\xbf\xe2\x24\xfa\xa0\x88\x14\xc8\x3f\xa0\x41\x54\xf4\x17\x7b\x49\x4e\xc6\x76\xb8\x73\xc2\xf7\x51\x0a\x10\xdd\x6a\x47\x33\xbc\xc8\x1d\x6a\x52\x8b\xa7\x82\xf6\xae\x9a\xa4\x4c\x5d\x3a\x5b\x27\xf5\xb8\xf5\x23\x1a\xf7\x2e\x49\x89\x9e\x2e\x65\x52\x98\xb9\x8c\xc6\x91\x1b\x7b\x47\x54\x38\xc3\x13\xc2\x5c\x33\x2f\xce\x16\x84\xfd\x3d\x50\x5a\x47\xe4\x20\xa4\x78\xad\xa2\x30\x62\x8a\x78\xf0\xfa\x6c\x34\x72\x48\x28\xb1\x73\xf4\x9d\xbb\x42\x64\xd0\x4d\x02\xae\xbf\xe2\x0c\x8e\x50\xfb\x87\xb7\xaa\xcd\xd3\x30\x9c\xdc\x27\x00\x00\xff\xff\xb1\x2e\x00\xda\xb9\x00\x00\x00") + +func testE2eTestingManifestsIngressHttp2IngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressHttp2IngYaml, + "test/e2e/testing-manifests/ingress/http2/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressHttp2IngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressHttp2IngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/http2/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressHttp2RcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x8e\xbd\x6e\x03\x31\x0c\x83\x77\x3f\x85\x5e\xc0\x39\xe4\x9a\xa1\xf0\xdc\xb1\x43\xa7\xee\x8a\x8f\xc8\x19\xf1\x1f\x24\x35\x40\xdf\xbe\x70\xdb\xfc\x01\xc7\x51\xd4\x47\x92\x7b\xfa\x84\x68\x6a\x35\x10\xf7\xae\xd3\x65\xef\xce\xa9\x2e\x81\xde\xd0\x73\xfb\x2e\xa8\xe6\x0a\x8c\x17\x36\x0e\x8e\xa8\x72\x41\x20\xc4\xb5\xad\xe0\x05\xa2\x4e\x3b\xe2\x70\x04\x3d\xa7\xc8\x1a\x68\xef\x88\x14\x19\xd1\x9a\x0c\x87\xa8\xb0\xc5\xf5\x9d\x8f\xc8\xfa\x77\xa0\xd1\xf6\x9c\x43\x64\x28\x3d\xb3\xe1\x9f\x79\x68\x1d\xca\x4f\xf8\x66\x00\xd1\x75\xcc\x50\x6c\xd5\x38\x55\xc8\x0d\xf2\x1b\xf3\xaf\x71\xa9\xf0\x09\x81\x4e\x51\x76\xa9\x4d\xe7\xaf\x23\xa4\xc2\xa0\x1e\x33\xbc\x41\xcd\xff\x7e\xe8\x34\x60\x85\x5c\x20\x61\xde\xcd\x37\xbe\x37\xb1\x87\x75\xfe\x5e\xff\xd1\xc4\x02\xbd\x1e\x0e\x2f\xee\x27\x00\x00\xff\xff\x5a\xc7\xda\xaa\x6f\x01\x00\x00") + +func testE2eTestingManifestsIngressHttp2RcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressHttp2RcYaml, + "test/e2e/testing-manifests/ingress/http2/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressHttp2RcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressHttp2RcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/http2/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressHttp2SvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8f\xbf\x4e\x03\x31\x0c\xc6\xf7\x3c\x85\x75\x4b\xa7\x1e\xa2\x74\x40\x5e\x59\x98\xd0\x49\x9c\xd8\xdd\x9c\xc5\x45\x4d\x63\xcb\x31\x95\x10\xe2\xdd\x51\x52\x6e\x60\xc0\x93\xfd\x7d\xfe\xf3\x33\x69\x7a\x63\xab\x49\x0a\xc2\xf5\x3e\x9c\x53\x59\x10\x5e\xd9\xae\x29\x72\xb8\xb0\xd3\x42\x4e\x18\x00\xa8\x14\x71\xf2\x24\xa5\xb6\xb2\x45\xbd\xb5\x8d\x94\x75\xa5\xf1\xfc\x71\x62\x2b\xec\x5c\xc7\x24\x77\xa4\xba\x57\x13\x97\x28\xb9\x22\xec\xbe\x86\xd5\x5d\x0f\x03\x0e\xcf\xf3\x3c\x1d\x86\xef\x5d\x00\x28\x74\x61\x04\x8e\xab\xac\x4c\x0b\x5b\x0d\x00\x99\x4e\x9c\x7f\x4f\x90\xea\x5f\xbb\x2a\xc7\x66\xf9\xa7\x32\xc2\x8b\x2c\x3c\x89\x79\x00\x50\x31\xef\x43\xfb\x9e\x22\x1c\x8f\x0f\x7d\x85\x93\xbd\xb3\x4f\x5d\x7b\xdc\xc4\x0d\x0c\x61\x7e\x9a\xba\x72\x23\xe9\x88\xa1\x3d\x96\x39\xba\xd8\x3f\x14\x3f\x01\x00\x00\xff\xff\x9d\xf4\x34\x9b\x34\x01\x00\x00") + +func testE2eTestingManifestsIngressHttp2SvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressHttp2SvcYaml, + "test/e2e/testing-manifests/ingress/http2/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressHttp2SvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressHttp2SvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/http2/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressMultipleCertsIngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x8e\x3b\x6e\xc4\x30\x10\x43\x7b\x9f\x82\x17\xb0\x37\x4e\x52\x2c\xe6\x06\x69\x82\x54\xe9\x67\x65\x62\x25\xd8\x96\x04\xcd\xec\xe6\xfa\x81\x9d\x4f\x91\x5c\xc0\x1d\xc9\x19\x12\x4f\x6b\x7a\x67\xb3\x54\xb2\x20\xd3\x3f\x4a\x9b\x53\xbe\x0e\xf3\xd9\x86\x54\x4e\xf7\xf1\x42\xd7\xb1\x9b\x53\x9e\x04\x2f\xf9\xda\x68\xd6\xad\x74\x9d\xd4\x55\x3a\x20\xeb\x4a\xc1\x7a\x5b\x3c\xd5\x85\x7d\x60\x73\xeb\xac\x32\x6c\xc7\x76\x5b\x68\x9b\xe8\x11\x8b\xb9\xc0\x69\x3e\x0e\xe9\x6b\x67\x08\x65\xed\x00\x20\xba\x57\xd9\x15\x50\xd5\xa3\xfd\x98\x7e\xb7\x82\xd3\xd6\xfb\xce\x80\x8b\x86\x99\x79\x92\xdf\x00\x30\xb6\x7b\x0a\x7c\xdd\x61\x18\x62\x89\xd4\x89\xcd\xfa\x6d\xda\xfe\x3f\xbe\x95\xe6\x82\xf3\xc3\x1f\xb4\xc7\xe3\xa2\x3d\x1d\x17\xed\xf9\x48\x68\x9f\x01\x00\x00\xff\xff\x1f\x41\x6c\x08\xd0\x02\x00\x00") + +func testE2eTestingManifestsIngressMultipleCertsIngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressMultipleCertsIngYaml, + "test/e2e/testing-manifests/ingress/multiple-certs/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressMultipleCertsIngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressMultipleCertsIngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/multiple-certs/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressMultipleCertsRcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8e\x31\x6e\x03\x31\x0c\x04\x7b\xbd\x82\x1f\x90\xed\x5c\x65\xa8\xcd\x07\x82\x14\xe9\x69\xdd\xc2\x27\x58\x12\x05\x92\xf1\xfb\x03\x25\x38\xc7\x45\xb2\x1d\xb1\xdc\xc1\xf0\x28\x1f\x50\x2b\xd2\x13\xdd\x5f\xc2\xad\xf4\x35\xd1\x3b\x46\x2d\x99\xbd\x48\x7f\x95\xee\x2a\xb5\x42\x43\x83\xf3\xca\xce\x29\x10\x75\x6e\x48\x84\xbc\xc9\x06\x5e\xa1\x16\x37\xf7\x61\xc1\x06\xf2\xec\xf5\x87\x60\x89\x96\x40\xe4\x68\xa3\xb2\x63\x36\x44\xcf\x9c\x99\xca\x17\x54\xdb\x2f\x22\x1e\xe3\x2f\xf4\xac\x76\xfc\x4c\x96\xee\x5c\x3a\xf4\x31\x8d\xff\x6a\xed\xe8\xd2\xf8\x8a\x44\xd7\xac\x87\x22\xc7\xdb\xe7\x05\xda\xe1\xb0\x88\x05\xd1\x61\x1e\xbf\x3f\xec\x38\x11\x06\xbd\x43\xd3\x72\x58\x1e\xfb\x21\xea\x4f\xa6\xf1\x57\xe2\x4d\xd4\x13\x9d\x4f\xe7\x53\xf8\x0a\x00\x00\xff\xff\xa9\x29\xab\x0c\x53\x01\x00\x00") + +func testE2eTestingManifestsIngressMultipleCertsRcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressMultipleCertsRcYaml, + "test/e2e/testing-manifests/ingress/multiple-certs/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressMultipleCertsRcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressMultipleCertsRcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/multiple-certs/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressMultipleCertsSvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x7c\x8e\xc1\x0a\xc2\x30\x0c\x86\xef\x7d\x8a\xff\x05\x06\x7a\x93\x5e\xbd\xcb\x40\xf1\x1e\xdb\xe0\x8a\xdd\x12\xd2\x30\xf0\xed\x65\x75\x47\xf1\x16\x3e\xbe\x24\x1f\x69\xb9\xb3\xb5\x22\x4b\xc4\x7a\x0c\xaf\xb2\xe4\x88\x2b\xdb\x5a\x12\x87\x99\x9d\x32\x39\xc5\x00\x2c\x34\x73\x04\xa7\x49\x26\xa6\xcc\xd6\x86\xc9\x5d\x5b\x00\x2a\x3d\xb8\xb6\xcd\x01\x48\xf5\x97\xd4\x94\xd3\x26\xf8\x5b\x39\xe2\x22\x99\x47\x31\x0f\x80\x8a\x79\x5f\x1d\xfa\x18\x71\x3a\xf4\x3b\x4e\xf6\x64\x1f\x77\xb4\x43\x35\x71\x49\x52\x23\x6e\xe7\xb1\x93\x6f\xd4\xf6\x23\x00\x8d\x2b\x27\x17\xfb\x5b\xf2\x09\x00\x00\xff\xff\x0d\x93\xec\x7c\xf0\x00\x00\x00") + +func testE2eTestingManifestsIngressMultipleCertsSvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressMultipleCertsSvcYaml, + "test/e2e/testing-manifests/ingress/multiple-certs/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressMultipleCertsSvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressMultipleCertsSvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/multiple-certs/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegIngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\xca\x31\x0e\xc2\x30\x0c\x85\xe1\x3d\xa7\xf0\x09\x0a\xdd\xaa\xdc\x80\x05\x31\xb1\xbb\xc9\x53\xb1\xa2\x3a\x95\x6d\x95\xeb\xa3\x6c\x74\xfb\xf4\xde\xcf\x87\xbc\x61\x2e\x5d\x33\x29\xe2\xdb\xad\x89\x6e\x53\x5b\x7c\x92\x7e\x3b\xe7\x15\xc1\x73\x6a\xa2\x35\xd3\x43\x37\x83\x7b\xda\x11\x5c\x39\x38\x27\x22\xe5\x1d\x99\x3e\xdd\x63\x28\xf9\x81\x32\xe6\x95\x4b\x83\xd6\x41\x22\x87\x9d\x52\xf0\xbc\xa6\x7f\xcf\xab\x5b\x64\x5a\xee\xe9\x17\x00\x00\xff\xff\xf6\xf7\x9b\x37\x8e\x00\x00\x00") + +func testE2eTestingManifestsIngressNegIngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegIngYaml, + "test/e2e/testing-manifests/ingress/neg/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressNegIngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegIngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegRcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x90\x41\x6b\x42\x31\x10\x84\xef\xf9\x15\xfb\x07\x9e\xfa\x3c\xf4\x90\x73\xa1\x14\x4a\x79\xb4\xd0\xfb\x9a\x37\xd5\x60\xb2\x09\xd9\x55\xf0\xdf\x97\x68\x15\x5b\xf7\x92\xb0\xcc\x7c\x3b\x0c\xd7\xf8\x85\xa6\xb1\x88\x27\xae\x55\x97\xc7\xd1\xed\xa3\xcc\x9e\x9e\x51\x53\x39\x65\x88\xb9\x0c\xe3\x99\x8d\xbd\x23\x4a\xbc\x41\xd2\xfe\x23\x6a\x07\xf1\xb4\x2b\x6a\xc2\x19\x8e\xa8\x3f\x77\x0b\xad\x08\x5d\x98\xa3\x7c\x80\xe7\xd3\x27\x42\x91\x59\x3d\x3d\xad\x1c\x91\x22\x21\x58\x69\x17\x54\x66\x0b\xbb\xb7\x3b\xf6\x23\xdd\x90\x6b\x62\xc3\xaf\xe1\x2e\x53\x9f\xf4\xc7\xfb\xe8\x26\xba\xc6\xe9\x13\x8a\x18\x47\x41\xbb\x39\x06\x8a\x99\xb7\xf0\xb4\x0d\x6d\x11\xcb\x72\x7f\xd8\xa0\x09\x0c\x3a\x60\x8d\xc1\xa0\x36\x9c\x15\xba\x54\xb4\x23\x86\x2b\xdb\x8f\x8b\xf1\x76\xf5\xac\x98\x0e\x29\x4d\x25\xc5\x70\xf2\xf4\xfa\xfd\x5e\x6c\x6a\xd0\xde\xe3\x55\xf5\xaf\xa7\xcb\xd2\xd0\x72\x14\xb6\x58\xe4\xa5\x71\xc0\x84\x16\xcb\x7c\xeb\x6c\x5c\xaf\xdc\x4f\x00\x00\x00\xff\xff\xed\xb6\x7e\xf0\xad\x01\x00\x00") + +func testE2eTestingManifestsIngressNegRcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegRcYaml, + "test/e2e/testing-manifests/ingress/neg/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressNegRcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegRcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegSvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\x8f\xbd\x4a\x44\x41\x0c\x85\xfb\x79\x8a\xb0\xcd\x56\xae\x8a\xe0\x4f\x3a\xb1\x97\x05\xc5\x7e\x98\x9b\x1d\x83\x73\x93\x21\xc9\x5d\x58\xc4\x77\x97\x19\x2b\xbb\x93\x93\x9c\x2f\x49\xee\xfc\x41\xe6\xac\x82\x70\xbe\x4d\x5f\x2c\x0b\xc2\x1b\xd9\x99\x0b\xa5\x95\x22\x2f\x39\x32\x26\x00\xc9\x2b\x21\x7c\xaa\xc7\x50\x09\x20\x8b\x68\xe4\x60\x15\x1f\x7d\x80\xd2\x74\x5b\x0e\x55\xb5\x36\x3a\x14\x5d\xaf\x85\x2a\xc2\xfe\x7b\xc7\x52\x8d\xdc\x77\x18\xb6\xd1\xcf\x3e\x79\xa7\x32\x22\x5d\x2d\x66\xf6\x6a\x4a\x84\xc7\x9b\x09\xea\xa6\xa1\x45\x1b\xc2\xfb\xcb\x71\x3a\x91\xad\x52\x1c\xe7\xd0\xd3\xdd\xc3\x7d\x02\x70\x6a\x54\x42\xed\x6f\xb7\x6d\xf2\xef\x38\x27\x1f\x3f\x3d\x9f\x4e\x2c\x1c\x17\x84\x57\x95\xe1\xc7\xa5\xd3\x28\x16\x1a\xb0\xf4\x1b\x00\x00\xff\xff\xf5\x31\x62\x40\xfe\x00\x00\x00") + +func testE2eTestingManifestsIngressNegSvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegSvcYaml, + "test/e2e/testing-manifests/ingress/neg/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressNegSvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegSvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegClusteripIngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\xca\x31\x0e\xc2\x30\x0c\x85\xe1\x3d\xa7\xf0\x09\x0a\xdd\xaa\xdc\x80\x05\x31\xb1\xbb\xc9\x53\xb1\xa2\x3a\x95\x6d\x95\xeb\xa3\x6c\x74\xfb\xf4\xde\xcf\x87\xbc\x61\x2e\x5d\x33\x29\xe2\xdb\xad\x89\x6e\x53\x5b\x7c\x92\x7e\x3b\xe7\x15\xc1\x73\x6a\xa2\x35\xd3\x43\x37\x83\x7b\xda\x11\x5c\x39\x38\x27\x22\xe5\x1d\x99\x3e\xdd\x63\x28\xf9\x81\x32\xe6\x95\x4b\x83\xd6\x41\x22\x87\x9d\x52\xf0\xbc\xa6\x7f\xcf\xab\x5b\x64\x5a\xee\xe9\x17\x00\x00\xff\xff\xf6\xf7\x9b\x37\x8e\x00\x00\x00") + +func testE2eTestingManifestsIngressNegClusteripIngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegClusteripIngYaml, + "test/e2e/testing-manifests/ingress/neg-clusterip/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressNegClusteripIngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegClusteripIngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg-clusterip/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegClusteripRcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x90\x41\x6b\x42\x31\x10\x84\xef\xf9\x15\xfb\x07\x9e\xfa\x3c\xf4\x90\x73\xa1\x14\x4a\x79\xb4\xd0\xfb\x9a\x37\xd5\x60\xb2\x09\xd9\x55\xf0\xdf\x97\x68\x15\x5b\xf7\x92\xb0\xcc\x7c\x3b\x0c\xd7\xf8\x85\xa6\xb1\x88\x27\xae\x55\x97\xc7\xd1\xed\xa3\xcc\x9e\x9e\x51\x53\x39\x65\x88\xb9\x0c\xe3\x99\x8d\xbd\x23\x4a\xbc\x41\xd2\xfe\x23\x6a\x07\xf1\xb4\x2b\x6a\xc2\x19\x8e\xa8\x3f\x77\x0b\xad\x08\x5d\x98\xa3\x7c\x80\xe7\xd3\x27\x42\x91\x59\x3d\x3d\xad\x1c\x91\x22\x21\x58\x69\x17\x54\x66\x0b\xbb\xb7\x3b\xf6\x23\xdd\x90\x6b\x62\xc3\xaf\xe1\x2e\x53\x9f\xf4\xc7\xfb\xe8\x26\xba\xc6\xe9\x13\x8a\x18\x47\x41\xbb\x39\x06\x8a\x99\xb7\xf0\xb4\x0d\x6d\x11\xcb\x72\x7f\xd8\xa0\x09\x0c\x3a\x60\x8d\xc1\xa0\x36\x9c\x15\xba\x54\xb4\x23\x86\x2b\xdb\x8f\x8b\xf1\x76\xf5\xac\x98\x0e\x29\x4d\x25\xc5\x70\xf2\xf4\xfa\xfd\x5e\x6c\x6a\xd0\xde\xe3\x55\xf5\xaf\xa7\xcb\xd2\xd0\x72\x14\xb6\x58\xe4\xa5\x71\xc0\x84\x16\xcb\x7c\xeb\x6c\x5c\xaf\xdc\x4f\x00\x00\x00\xff\xff\xed\xb6\x7e\xf0\xad\x01\x00\x00") + +func testE2eTestingManifestsIngressNegClusteripRcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegClusteripRcYaml, + "test/e2e/testing-manifests/ingress/neg-clusterip/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressNegClusteripRcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegClusteripRcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg-clusterip/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegClusteripSvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\x8f\xcb\x4a\x44\x31\x0c\x86\xf7\x7d\x8a\x30\x9b\x59\x39\x2a\x82\x97\xec\x64\x56\x6e\xe4\x80\xe2\xbe\xf4\x64\x6a\xb1\x27\x29\x49\x3a\x30\x88\xef\x2e\xad\x2b\x77\x3f\x5f\xf2\xe5\x12\x5b\xf9\x20\xb5\x22\x8c\x70\xbe\x0d\x5f\x85\x57\x84\x37\xd2\x73\x49\x14\x36\xf2\xb8\x46\x8f\x18\x00\x38\x6e\x84\xf0\x29\xe6\x23\x05\x80\xc8\x2c\x1e\xbd\x08\xdb\xa8\x03\xa4\x2a\x7d\x3d\x64\x91\x5c\xe9\x90\x64\xbb\x66\xca\x08\xfb\xef\x5d\xe1\xac\x64\xb6\x43\xd7\x4e\x3f\xfb\x60\x8d\xd2\x50\x9a\xa8\x4f\xf7\x6a\x46\x84\xc7\x9b\x39\xa8\xa9\xb8\x24\xa9\x08\xef\xc7\x65\x12\x8f\x9a\xc9\x97\xd9\xf4\x74\xf7\x70\x1f\x00\x8c\x2a\x25\x17\xfd\xdb\xad\x9d\xff\x1d\x67\x64\xe3\xa7\xe7\xd3\xa9\x70\xf1\x0b\xc2\xab\xf0\xe0\x7e\x69\x84\x70\xac\xdd\x9c\xf4\x65\x09\xbf\x01\x00\x00\xff\xff\x99\xd1\x46\x3d\xff\x00\x00\x00") + +func testE2eTestingManifestsIngressNegClusteripSvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegClusteripSvcYaml, + "test/e2e/testing-manifests/ingress/neg-clusterip/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressNegClusteripSvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegClusteripSvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg-clusterip/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegExposedIngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\xca\x31\x0e\xc2\x30\x0c\x85\xe1\x3d\xa7\xf0\x09\x0a\xdd\xaa\xdc\x80\x05\x31\xb1\xbb\xc9\x53\xb1\xa2\x3a\x95\x6d\x95\xeb\xa3\x6c\x74\xfb\xf4\xde\xcf\x87\xbc\x61\x2e\x5d\x33\x29\xe2\xdb\xad\x89\x6e\x53\x5b\x7c\x92\x7e\x3b\xe7\x15\xc1\x73\x6a\xa2\x35\xd3\x43\x37\x83\x7b\xda\x11\x5c\x39\x38\x27\x22\xe5\x1d\x99\x3e\xdd\x63\x28\xf9\x81\x32\xe6\x95\x4b\x83\xd6\x41\x22\x87\x9d\x52\xf0\xbc\xa6\x7f\xcf\xab\x5b\x64\x5a\xee\xe9\x17\x00\x00\xff\xff\xf6\xf7\x9b\x37\x8e\x00\x00\x00") + +func testE2eTestingManifestsIngressNegExposedIngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegExposedIngYaml, + "test/e2e/testing-manifests/ingress/neg-exposed/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressNegExposedIngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegExposedIngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg-exposed/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegExposedRcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xbc\x90\x31\x6e\xf3\x30\x0c\x85\x77\x9f\x82\x17\x50\xec\x64\x0a\x04\x64\xfa\xff\xb1\x43\x86\xa2\x6b\xc1\xc8\x6c\x2c\x44\x12\x05\x91\x0e\xd0\xdb\x17\x4a\x1b\x5b\x45\xd6\xa0\x5c\x24\x3c\xf1\xbd\x4f\x24\x66\xff\x46\x45\x3c\x27\x0b\x98\xb3\xf4\xd7\x6d\x77\xf1\x69\xb4\xf0\x9f\x72\xe0\xcf\x48\x49\xbb\x48\x8a\x23\x2a\xda\x0e\x20\xe0\x89\x82\xd4\x1b\x40\x99\x93\x85\x89\x45\x13\x46\xea\x00\xea\xd1\x08\x92\xc9\xd5\x46\xa1\x40\x4e\xb9\x7c\x9b\x22\xaa\x9b\x5e\x9a\x94\xc7\x1c\xa5\x98\x03\x2a\xfd\x18\x1a\x7a\xad\xf0\xcb\xfb\xe8\x06\xb8\x83\x6b\x39\x4e\x8a\x3e\x51\x59\x1c\x06\x7c\xc4\x33\x59\x38\xbb\xb2\xf1\xdc\x5f\xe6\x13\x95\x44\x4a\x62\x68\x47\x46\x49\xd4\xdc\x3a\xa4\x17\x2a\x57\x32\xf7\x6c\xbb\xdd\x6c\x17\xea\x3a\xeb\xaa\x39\x8e\x11\xd3\xb8\x7e\xcd\x40\x7f\xf2\xa9\x97\xa9\x51\x8c\x6b\x9f\x6f\x84\xf7\x3b\x01\xcc\xa4\x9a\x0f\x5a\x66\x02\x33\x8f\xf9\xf0\x81\x41\x08\x4c\xe6\xa2\x87\xfd\x30\x0c\x8b\xb5\x2a\xd2\x82\x72\x61\x65\xc7\xc1\xc2\xeb\xbf\xe3\xa2\x37\xf3\x1f\xb9\xa8\x85\x26\xe4\xd9\x7b\xd8\xfd\xd9\x1e\xf6\xcf\xd8\xc3\x7e\xe8\xbe\x02\x00\x00\xff\xff\x7c\x23\xde\xdf\xfd\x02\x00\x00") + +func testE2eTestingManifestsIngressNegExposedRcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegExposedRcYaml, + "test/e2e/testing-manifests/ingress/neg-exposed/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressNegExposedRcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegExposedRcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg-exposed/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNegExposedSvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x90\x3f\x6b\xf3\x30\x10\xc6\x77\x7d\x8a\x43\x4b\x96\xbc\x79\x9d\xc6\x43\xb8\xad\x64\xea\x52\x0c\x2d\x5d\x8b\x90\x2f\xae\xa8\xad\x13\xba\x73\x68\x30\xfe\xee\x45\x6a\xa1\x7f\xa6\x6e\x3f\x9d\xa4\xdf\x23\x3d\x2e\x85\x27\xca\x12\x38\x22\x5c\xf6\xe6\x35\xc4\x1e\xe1\x81\xf2\x25\x78\x32\x13\xa9\xeb\x9d\x3a\x34\x00\xd1\x4d\x84\xf0\xc2\xa2\x85\x0c\x80\x8b\x91\xd5\x69\xe0\x28\x65\x1f\xc0\x8f\x3c\xf7\xbb\x81\x79\x18\x69\xe7\x79\xfa\x1f\x69\x40\xd8\x2c\x36\xc4\x21\x93\x88\x45\xcd\x33\x6d\x2d\xbd\x25\x16\xea\x9f\x13\x67\x15\x8b\x8b\x3d\x36\x16\x97\x75\x6b\xdb\xf6\x50\x60\x5d\x37\x46\x12\xf9\x62\xad\x67\x0a\xfc\xab\x88\x70\x6c\x6a\xd6\xd7\x6b\xf6\x75\x9d\x32\x2b\x7b\x1e\x11\x1e\x4f\x5d\x9d\xa8\xcb\x03\x69\xf7\x79\xa9\x69\xbe\x39\xda\xf6\xf0\x4b\x72\xf3\x27\x49\xcd\x16\x1a\xc9\x2b\xe7\x8f\x3f\xe7\x39\xfe\x28\x45\x48\x4a\x97\xb7\xe7\x73\x88\x41\xaf\x08\xf7\x1c\xcb\x5c\xaf\x89\x10\x4e\xe3\x2c\x4a\xf9\xae\x33\xef\x01\x00\x00\xff\xff\xab\x60\x86\x5b\x77\x01\x00\x00") + +func testE2eTestingManifestsIngressNegExposedSvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNegExposedSvcYaml, + "test/e2e/testing-manifests/ingress/neg-exposed/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressNegExposedSvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNegExposedSvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/neg-exposed/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressNginxRcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x54\x4d\x6f\xdb\x30\x0c\xbd\xfb\x57\x10\xe8\x0e\xdb\x41\x89\xb3\xb6\x40\x66\x60\x87\xa2\xdd\xba\x1d\xb6\x19\x6d\xb1\xeb\x40\xcb\x6c\x2c\x44\x96\x04\x91\x4e\xdb\xfd\xfa\x41\x89\xe3\xd8\xfd\x58\x77\x19\x8f\xe4\xe3\xe3\xe3\x33\xe5\x23\x70\x2b\xe3\xee\xc1\xb8\x55\x24\x66\xd0\xde\x49\xf4\xd6\x52\x84\xab\xf3\x0c\x83\xf9\x49\x91\x8d\x77\x05\x6c\x16\xd9\xda\xb8\xba\x80\x2b\x0a\xd6\x68\x14\xe3\xdd\xf9\x80\xce\x5a\x12\xac\x51\xb0\xc8\x00\x1c\xb6\x54\xec\x88\x55\x4f\xac\x0e\xc4\x19\x80\xc5\x8a\x2c\x27\x28\xc0\x7a\xc9\x0a\x43\x78\x8c\xb7\x55\xc6\x81\x74\xc2\xc4\xdd\x40\x2e\x60\x91\x01\x30\x59\xd2\xe2\xe3\x6b\xdd\x00\x42\x6d\xb0\x28\xb4\x43\x8e\x05\xa6\x18\x6b\x78\x8d\x69\x17\xcf\xad\xd5\x97\xf7\x52\x53\x08\xc5\xd6\xb8\xad\x3f\x97\x11\x35\x95\x14\x8d\xaf\xaf\x49\x7b\x57\x73\x01\x79\x0f\x4b\x86\xa0\x71\x14\x07\x0d\x0a\x4c\x8b\x2b\x2a\x92\x94\xd9\x4a\xc7\x99\xf1\xf3\x97\x4c\x2c\xf2\xd9\x87\x59\xae\x2a\x12\x9c\x2d\x06\x85\xd6\x6c\xc8\x11\x73\x19\x7d\x45\x87\xd5\x00\x1a\x91\x70\x49\x32\x4e\x01\x04\x94\xa6\x80\x79\x43\x68\xa5\xf9\x3d\x2d\xf9\x28\x05\x2c\xf2\xf7\xa7\x27\x93\x3c\xeb\x86\x92\x09\x5f\x6e\x6e\xca\x51\xc1\x38\x23\x06\xed\x05\x59\x7c\x18\x16\x3d\xce\x47\x08\x31\x2d\xf9\x4e\x86\xe2\xe9\xbf\xb8\x9a\xe2\x08\x3a\x26\xa8\xfd\x9d\xbb\xc3\x58\xc3\x59\xf9\x75\x28\x91\xdb\x8c\x17\x52\x3d\x55\xf9\xe3\xe2\xd7\xf7\xb3\x6f\x9f\x26\xc2\x37\x68\x3b\xfa\x1c\x7d\x3b\xb5\x00\xe0\xd6\x90\xad\xaf\xe8\xf6\x71\xbe\xaf\x94\x5b\x8f\xf6\xb7\x33\x4b\x13\xfe\x32\xf2\xba\x3c\x3b\xff\x6f\x73\x39\xa0\x3e\x0c\x4f\x5f\x68\x74\xbd\xea\x70\x4f\xe5\xf6\xdb\x2d\xc7\xee\x37\x9e\xe5\x49\xfa\x49\xcb\xc9\xc9\xf1\xb3\x3d\xe3\xfc\x11\xdc\x11\xd0\x7d\xf0\x4c\xb0\x58\xe6\xcb\x1c\xc4\x03\x6a\x9d\xfe\x1d\xbb\x3f\x09\x0b\x0a\x83\x71\xd0\x45\x0b\xfd\xfd\xa6\x5c\xc7\x23\x12\x69\x0c\x83\x61\xf0\x21\x3d\x13\xb4\x2f\x8b\xda\x0e\x79\x56\xd6\xb4\x82\x71\x35\xb1\xe3\xc5\x97\x33\xc2\x28\x55\xd3\x2d\x76\x56\x54\x85\x7a\x4d\xae\x56\x4c\x71\x63\x34\x7d\x5c\x77\x15\x29\x7e\x60\xa1\x76\xbe\xc7\xa4\x37\xb4\x07\x4e\x48\x42\x57\x59\xc3\xcd\xd0\xfc\xe6\xed\xe4\x1e\xde\xcd\x9f\x1c\xf7\x9f\x00\x00\x00\xff\xff\x25\x26\x79\xe6\x76\x05\x00\x00") + +func testE2eTestingManifestsIngressNginxRcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressNginxRcYaml, + "test/e2e/testing-manifests/ingress/nginx/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressNginxRcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressNginxRcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/nginx/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressPreSharedCertIngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x8f\xbd\x72\xe3\x30\x0c\x84\x7b\x3d\xc5\x8e\xaf\x96\x7c\xee\x3c\x2c\xaf\xbb\x26\x93\x2a\x3d\x44\x6e\x2c\x8e\x24\x52\x21\x20\xfb\xf5\x33\xa2\xe2\xfc\xb8\x0a\x2b\x02\xb3\x8b\xfd\x56\x96\xf8\xc2\xa2\x31\x27\x87\x44\xbb\xe5\x32\xc6\x74\xe9\xc6\xb3\x76\x31\x1f\xaf\xa7\x9e\x26\xa7\x66\x8c\x29\x38\xfc\x4f\x97\x42\xd5\x66\xa6\x49\x10\x13\xd7\x00\x49\x66\x3a\x2c\x85\xad\x0e\x52\x18\x5a\xcf\x62\x0d\xf0\x07\xff\x38\xe5\x1b\x24\xa5\x6c\x62\x31\x27\xdc\xe2\x34\xa1\x27\x24\x04\x06\xac\x4b\x4e\x30\xaa\xb9\xaa\xfe\xd2\xe9\xbe\x40\xdc\xd3\xba\x8b\x5f\xba\x71\xed\x59\x12\x8d\x95\xea\x21\xcd\xe1\xb0\xdd\x69\x1f\xd6\x87\x46\x17\xfa\xfd\xd8\xe6\x9f\x7d\x44\xe1\xdb\x1a\x0b\x15\x82\xc0\x57\x59\x27\x43\x2f\x7e\x64\x0a\x5d\x83\xfb\x77\xb3\x00\xca\x72\x8d\x9e\x4f\xb5\x1f\xfd\x90\x07\x4a\x60\xd1\x76\x30\x5b\xf4\xbb\xe4\x39\x6f\x0c\xe7\xbf\x0d\x50\xd6\x89\x95\xbf\xc5\x90\xd5\x5c\x2d\xd8\xdd\x9b\xf8\x3c\x57\xdf\x76\x61\x0f\x01\x16\xb1\x41\xef\x43\x5b\x47\x87\xe3\x66\xfb\xd8\x3d\x60\xed\xef\x17\x70\x3f\x84\x9f\x88\xef\x01\x00\x00\xff\xff\x7d\xdc\xd4\xbb\xef\x01\x00\x00") + +func testE2eTestingManifestsIngressPreSharedCertIngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressPreSharedCertIngYaml, + "test/e2e/testing-manifests/ingress/pre-shared-cert/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressPreSharedCertIngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressPreSharedCertIngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/pre-shared-cert/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressPreSharedCertRcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8e\x31\x6e\x03\x31\x0c\x04\x7b\xbd\x82\x1f\x90\xed\x5c\x65\xa8\xcd\x07\x82\x14\xe9\x69\xdd\xc2\x27\x58\x12\x05\x92\xf1\xfb\x03\x25\x38\xc7\x45\xb2\x1d\xb1\xdc\xc1\xf0\x28\x1f\x50\x2b\xd2\x13\xdd\x5f\xc2\xad\xf4\x35\xd1\x3b\x46\x2d\x99\xbd\x48\x7f\x95\xee\x2a\xb5\x42\x43\x83\xf3\xca\xce\x29\x10\x75\x6e\x48\x84\xbc\xc9\x06\x5e\xa1\x16\x37\xf7\x61\xc1\x06\xf2\xec\xf5\x87\x60\x89\x96\x40\xe4\x68\xa3\xb2\x63\x36\x44\xcf\x9c\x99\xca\x17\x54\xdb\x2f\x22\x1e\xe3\x2f\xf4\xac\x76\xfc\x4c\x96\xee\x5c\x3a\xf4\x31\x8d\xff\x6a\xed\xe8\xd2\xf8\x8a\x44\xd7\xac\x87\x22\xc7\xdb\xe7\x05\xda\xe1\xb0\x88\x05\xd1\x61\x1e\xbf\x3f\xec\x38\x11\x06\xbd\x43\xd3\x72\x58\x1e\xfb\x21\xea\x4f\xa6\xf1\x57\xe2\x4d\xd4\x13\x9d\x4f\xe7\x53\xf8\x0a\x00\x00\xff\xff\xa9\x29\xab\x0c\x53\x01\x00\x00") + +func testE2eTestingManifestsIngressPreSharedCertRcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressPreSharedCertRcYaml, + "test/e2e/testing-manifests/ingress/pre-shared-cert/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressPreSharedCertRcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressPreSharedCertRcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/pre-shared-cert/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressPreSharedCertSvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x7c\x8e\xc1\x0a\xc2\x30\x0c\x86\xef\x7d\x8a\xff\x05\x06\x7a\x93\x5e\xbd\xcb\x40\xf1\x1e\xdb\xe0\x8a\xdd\x12\xd2\x30\xf0\xed\x65\x75\x47\xf1\x16\x3e\xbe\x24\x1f\x69\xb9\xb3\xb5\x22\x4b\xc4\x7a\x0c\xaf\xb2\xe4\x88\x2b\xdb\x5a\x12\x87\x99\x9d\x32\x39\xc5\x00\x2c\x34\x73\x04\xa7\x49\x26\xa6\xcc\xd6\x86\xc9\x5d\x5b\x00\x2a\x3d\xb8\xb6\xcd\x01\x48\xf5\x97\xd4\x94\xd3\x26\xf8\x5b\x39\xe2\x22\x99\x47\x31\x0f\x80\x8a\x79\x5f\x1d\xfa\x18\x71\x3a\xf4\x3b\x4e\xf6\x64\x1f\x77\xb4\x43\x35\x71\x49\x52\x23\x6e\xe7\xb1\x93\x6f\xd4\xf6\x23\x00\x8d\x2b\x27\x17\xfb\x5b\xf2\x09\x00\x00\xff\xff\x0d\x93\xec\x7c\xf0\x00\x00\x00") + +func testE2eTestingManifestsIngressPreSharedCertSvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressPreSharedCertSvcYaml, + "test/e2e/testing-manifests/ingress/pre-shared-cert/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressPreSharedCertSvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressPreSharedCertSvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/pre-shared-cert/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressStaticIpIngYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4c\x8e\xb1\x6e\xf3\x30\x0c\x84\x77\x3d\xc5\x21\xff\x6c\xff\xcd\x16\xf8\x0d\xba\x14\x1d\x82\xee\xb4\x44\xd8\x84\x6d\xca\x10\xe9\xb4\x79\xfb\x42\x76\xda\x74\x93\x0e\xbc\xef\x3e\x5a\xe5\x83\x8b\x49\xd6\x0e\xca\xfe\x99\xcb\x24\x3a\xb4\xd3\xc5\x5a\xc9\xff\x6f\xe7\x9e\x9d\xce\x61\x12\x4d\x1d\x5e\x75\x28\x6c\x16\x16\x76\x4a\xe4\xd4\x05\x40\x69\xe1\x0e\xe6\xe4\x12\x1b\x59\x03\xf0\x0f\xd7\x51\x0c\xa4\x9a\x6b\x9a\x15\xf5\x97\x12\x27\xf4\x77\xf8\xc8\x70\x36\xc7\xb6\x66\x05\xcd\x73\x8e\xe4\xa2\x03\xe8\x01\x91\xb5\xdd\x21\xcf\xbe\x75\x7b\x80\x69\xeb\xb9\x28\x3b\xef\x6a\x72\xc8\xb4\xc3\x9c\x7b\x9a\x9b\x5f\x83\xe6\x30\x3a\xfd\xd0\x4e\xc1\x56\x8e\x15\xe1\xf3\x83\x74\xf8\x99\x6d\x0b\x5b\x4d\x1b\xe3\x58\xd8\xc1\x5f\x62\x6e\xc7\xfc\x35\x63\x60\xe5\x42\xce\x10\x47\xd9\x74\x57\x5f\x68\x62\x48\x7d\x8b\x21\x49\xe1\xe8\xb9\xdc\x6b\xa5\xc1\x41\x79\xdb\xe7\x9f\xd4\x00\xf4\x14\x27\xd6\x54\xc7\x01\xe3\x72\x93\xc8\xc7\x19\xc7\x31\x8f\x4c\x89\x8b\x35\xa3\xfb\x6a\x7f\x4f\xde\x73\xf1\x0e\x97\x97\xf0\x1d\x00\x00\xff\xff\xa2\x3f\xa5\xf9\xa4\x01\x00\x00") + +func testE2eTestingManifestsIngressStaticIpIngYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressStaticIpIngYaml, + "test/e2e/testing-manifests/ingress/static-ip/ing.yaml", + ) +} + +func testE2eTestingManifestsIngressStaticIpIngYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressStaticIpIngYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/static-ip/ing.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressStaticIpRcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8e\x31\x6e\x03\x31\x0c\x04\x7b\xbd\x82\x1f\x90\xed\x5c\x65\xa8\xcd\x07\x82\x14\xe9\x69\xdd\xc2\x27\x58\x12\x05\x92\xf1\xfb\x03\x25\x38\xc7\x45\xb2\x1d\xb1\xdc\xc1\xf0\x28\x1f\x50\x2b\xd2\x13\xdd\x5f\xc2\xad\xf4\x35\xd1\x3b\x46\x2d\x99\xbd\x48\x7f\x95\xee\x2a\xb5\x42\x43\x83\xf3\xca\xce\x29\x10\x75\x6e\x48\x84\xbc\xc9\x06\x5e\xa1\x16\x37\xf7\x61\xc1\x06\xf2\xec\xf5\x87\x60\x89\x96\x40\xe4\x68\xa3\xb2\x63\x36\x44\xcf\x9c\x99\xca\x17\x54\xdb\x2f\x22\x1e\xe3\x2f\xf4\xac\x76\xfc\x4c\x96\xee\x5c\x3a\xf4\x31\x8d\xff\x6a\xed\xe8\xd2\xf8\x8a\x44\xd7\xac\x87\x22\xc7\xdb\xe7\x05\xda\xe1\xb0\x88\x05\xd1\x61\x1e\xbf\x3f\xec\x38\x11\x06\xbd\x43\xd3\x72\x58\x1e\xfb\x21\xea\x4f\xa6\xf1\x57\xe2\x4d\xd4\x13\x9d\x4f\xe7\x53\xf8\x0a\x00\x00\xff\xff\xa9\x29\xab\x0c\x53\x01\x00\x00") + +func testE2eTestingManifestsIngressStaticIpRcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressStaticIpRcYaml, + "test/e2e/testing-manifests/ingress/static-ip/rc.yaml", + ) +} + +func testE2eTestingManifestsIngressStaticIpRcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressStaticIpRcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/static-ip/rc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressStaticIpSecretYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x97\xdd\x8e\xa3\xbc\x9a\x85\xcf\xfb\x2a\xfa\x06\x66\x64\x43\x28\x75\x5a\xda\x07\x05\xb1\x21\x24\x76\x82\xf1\x6b\x83\xcf\x08\x46\x45\xc5\x86\xd0\x29\x2a\x3f\x5c\xfd\x28\xdf\xb7\xf7\x48\xf3\xa7\x39\x5e\x7a\x25\x84\xd6\xb3\xd6\x72\x33\x7d\xaa\xee\xfa\xf5\x79\x19\x7f\xff\xbc\xe1\x1f\xb6\x99\x9b\xdf\x3f\x7e\xfe\x9c\xfd\xd7\xbf\xb7\xd7\xf9\xf7\xcf\x7d\x89\xe6\x7d\x89\x13\x01\x36\x97\x9f\xf1\x46\xa8\x1c\x4a\x30\x79\x81\x28\x88\xbf\x34\x34\x27\x0e\xe7\x25\x88\x7d\xe7\xf8\xa6\xd0\xfd\xd1\x20\x1a\x96\x90\xc7\x06\xf9\x5d\x01\xeb\x88\x3b\x1c\x9b\x30\xae\xb5\xe3\xb5\x04\x72\x17\x88\xcb\x16\xac\x2c\xf5\x76\x11\x94\xd2\xc2\xf1\x50\x01\xe5\x45\x68\x57\xc2\x89\x18\x50\x3e\x4a\x5f\xef\x0a\x47\xb9\x04\xf6\x54\x67\x61\xd4\x42\xc3\xda\x59\x65\x95\x7b\x1e\x2a\xc1\xc1\xd3\x50\x68\x6b\x04\x35\x02\x60\x26\x45\x25\xbe\x0c\xd8\xd4\xa6\x3c\xeb\xd2\x07\x3b\x41\x14\xd4\x5e\xc4\x06\x4c\xc8\xb2\xfe\xd0\x38\xf2\x90\x4a\x9c\xbb\xf7\xe9\x28\x08\x0d\x25\x08\x5d\xff\x53\xeb\xfe\xa5\x91\x35\x29\x2a\xcb\x05\x35\xbd\x04\x1e\x76\xc4\x90\x42\xf1\xc4\xa0\x48\xff\x7f\xdf\x92\x38\x35\x6a\x10\x1a\x14\xdd\x0b\x42\xd1\x29\x55\x99\x18\xc5\x59\x84\xfd\x97\x4c\xf1\xc1\x0e\x39\x14\x88\xc7\x80\x7c\x28\x28\x35\xa5\x9b\x6f\xda\xf9\x8b\x1d\xf8\xa1\x50\xaf\x7f\x90\x8b\x02\xc4\x68\x90\x2a\x0a\x10\x9b\x02\x51\x71\x42\x6c\x67\x02\x4b\x0b\x47\xf7\xcc\x3d\x52\xb3\xd0\x51\x60\xcb\x58\xc0\x9e\x06\x6c\x0f\x1b\xb1\xed\xdc\x7a\x6c\x25\xd7\xa5\xc6\xf7\x96\xb6\x48\x29\x43\x0e\x80\x07\xd0\x8f\x27\x04\x62\xd0\x1b\xbb\x11\xe7\x1c\x33\x14\xcd\x4d\x25\x32\x3e\x52\xd7\xdc\xa7\xcf\xc6\x15\x91\xa8\x68\x29\xdd\xf4\x79\x22\xbe\x34\x32\x66\x2d\xc1\xcd\x3e\x20\x2b\x73\xf6\xb7\x6e\xf8\x0a\x59\xa0\xbe\x25\xea\xbf\x19\xca\x17\x8b\xdf\x23\x21\x73\x5f\x9e\xfb\xe1\xb0\xe9\x93\xee\xec\x30\x4b\xcd\x91\x85\xb6\x6a\x75\xf4\xa7\x19\xd9\x92\x38\x84\xb9\x7e\x54\xcc\x51\x6d\xd0\x74\x53\x5a\x49\x19\xe6\x65\xe3\xcd\xa6\x71\x13\x96\x4b\x9f\xeb\x8c\xc6\xa7\x8d\x2d\x98\x37\x73\x33\xf8\x1b\xa4\x96\x36\x99\x42\x1c\xd6\xb3\x92\x7d\x53\x06\x38\x16\x92\xf7\x6d\xea\x73\x11\xda\xdc\x0c\xbf\x76\xdd\x68\x6a\x7e\x7e\xbf\x2b\x64\x66\x9b\xf6\xae\x08\xb7\x57\x46\x63\x06\xa1\x29\x44\xb0\x3e\x37\xcf\xf5\xb3\xdc\xb4\xb7\x93\xce\x6f\xa7\x94\xef\x55\x26\x9c\x1d\x56\xf8\x94\x92\xa0\x81\x1a\x77\xa3\x9a\x4c\x25\xf4\x49\xbd\x07\x0c\xdd\x97\xce\x29\x03\xef\x13\x02\xc5\x2f\x6c\xe4\xa2\x4c\x1f\xea\xe4\x3d\x31\xa3\x5f\x35\x78\x9a\x20\x80\x6b\x31\x90\xc8\xe8\x5f\x77\x71\x8e\x3d\x5f\x5a\xc4\xbc\xe9\x0b\x70\x0b\x10\xb1\x91\x9b\x9e\x1b\x6c\x22\xa5\xdc\xf3\x44\x6c\x65\xaa\x7e\x7f\xa2\x3c\x92\xf4\x63\x49\xdc\x94\xea\x0d\x8b\xf8\xd9\x57\x65\x6a\xc2\xee\xcc\xcf\x75\xd5\x3f\x4f\xe9\xea\x0e\x84\x4e\x7c\xa0\x7f\x14\xf0\xd8\x22\x15\x17\x9a\x1e\x00\x30\xe5\x99\xdd\x82\xf2\x44\xf9\xed\x5d\xa2\x3c\xd1\xa0\x52\x81\x66\x72\x82\x48\x31\x9d\xe7\x4d\x4a\x76\x4c\xd3\x46\x6e\xd4\x5c\x3b\x91\xa8\x60\xba\x69\x29\x0e\x0c\x70\x72\x20\x36\x66\x4a\xb9\xb2\xb2\x42\x03\x4e\x6a\xa0\xff\xfd\xf6\x51\xab\x89\x71\x8d\x3f\x05\xc9\xab\x66\x58\x1b\x4e\x56\x0f\x09\x34\x14\xf7\xe9\xaf\x5b\x51\x59\x21\x1c\x8e\xe5\x8b\xd9\x73\xff\xbf\xfa\x53\x92\xff\xf4\x67\x52\xc0\x25\xd4\x1b\x86\xa1\x9a\x70\x33\x5a\x52\x54\x79\x26\xe1\x72\x3d\x54\xf4\x5b\x2c\x86\x24\xae\x77\x35\xf0\xb8\x90\x4a\x9d\x02\x6b\xac\x9e\x64\x3d\x58\xde\x84\x9c\x02\x56\x8b\x59\xf2\x91\x6d\xec\x4d\xa4\x2b\x2c\x03\xfe\x56\x52\xba\x2a\x87\x22\xea\xf4\x5c\xab\x45\x39\x31\x14\xb7\xce\x4f\x8d\x5c\x4c\x26\xc0\x1f\xcd\x48\xa1\x40\xed\xee\x00\x13\x14\xc1\xba\x6f\x49\xfe\x30\x63\x1f\x76\x99\xe8\x1b\xe9\x91\x05\x7b\x68\x86\xfa\x5e\x56\x93\xda\x07\xfc\x22\xc3\xbc\x6e\x86\xcb\xbd\xc4\x35\xae\x83\xa9\x51\x83\x30\x36\xa4\x61\xa1\x14\x34\x48\x91\x46\x91\x95\xf5\x34\xac\xcf\x8a\x9a\x62\xba\xca\x4c\x55\xbc\xfa\xb8\x17\x9e\x56\x12\xd7\x77\x0b\xf8\xde\x8d\x1f\xf7\x1a\xf0\xb1\x74\x1f\x0f\x3b\xd8\xf4\xa0\xf3\xa3\x49\xa7\xe3\xe9\x39\x63\x70\x53\xcc\xc8\x3a\x2a\xf5\xd7\x52\x0f\x82\xb6\xc3\x1c\x31\xfd\x11\x14\x03\x77\x2d\x4c\x47\x90\xef\x38\x71\x82\xef\x97\x8f\x67\x49\xec\x1f\x96\xcc\x13\x4f\xc5\x78\x48\xa7\xb9\x18\xfd\x28\x86\x69\xa8\xa5\x0b\x6b\xd7\x2e\xdd\xa8\x0e\x72\xc0\xa0\x5c\x7f\xdc\x85\xfd\xe3\x94\xe5\x2f\xb6\x8f\x45\xa8\x06\xf1\xb9\x4e\x34\x50\xda\x62\xf3\x3c\x6c\xac\xd7\x23\xdb\xd9\x80\x61\xa0\x53\xde\x0c\xe2\xd6\x39\x5e\x0a\xcf\x93\x6e\x58\xd7\xfb\xc5\x97\x2c\x9d\x8b\x42\x6f\x43\x35\x7c\xad\x4e\xe9\x94\x03\x59\x3f\x3b\xa8\x97\xae\x12\x21\x23\xe2\xb3\x18\xa7\x9d\xd1\x82\x95\x9a\x3e\x35\x89\x8a\x5a\xab\xb0\x80\x89\x1f\x8b\xcb\x5f\x39\xbe\x07\x75\x10\xc9\xff\x91\xf1\x1f\xff\xf8\xc7\x3f\x7b\xc1\x75\xcf\xff\xd1\x0b\x05\x38\xaf\x0b\x25\xe8\x96\xcc\x54\xff\x97\x5e\x50\x41\x01\x3e\x29\x40\xc4\xd2\xe5\x63\x13\xd2\x4b\x13\xf8\xec\x50\xb5\xf7\xc2\x51\x21\xc0\xc4\x85\xe2\x9b\xc2\xcd\xc6\x06\x76\x84\xc0\xc7\xe6\x2f\x36\xd6\xf9\x4b\x2f\x42\x31\x75\xd4\x1f\x34\xe4\x5f\x8d\x74\x8b\x1c\x56\xbb\x26\xc5\x7f\x76\x68\xbb\xea\x86\xf5\xde\x6e\xa8\x2c\x47\xda\xab\x51\xa5\xc2\x93\x9b\x22\x1f\xf7\x72\x20\xf7\x93\xff\x78\xec\x42\x7b\x31\x59\x8e\x3a\x3f\xdd\x5a\x9f\xe3\x56\x47\x8d\x58\x44\xb8\xc7\xf9\xbe\xc1\x42\xaa\x45\x49\xa1\x7a\x54\x2c\x06\xc4\x7d\x1a\xd8\x68\xb6\xfb\x80\x72\x0e\xbf\x22\x16\xc6\x6f\xcd\x06\x22\x1b\xe4\x5c\x24\xeb\x52\x0e\xd1\x64\xdc\xc7\x0d\x08\x3d\xef\x03\xe5\xca\x6c\x42\x07\x62\x1e\xed\xa6\x40\x1c\x45\x6f\x32\x50\x8d\x1a\xc5\x28\xbc\xdf\xd4\x60\xb6\x4d\x30\x3d\x18\x75\x8f\xc4\xd3\x5b\xa7\xf3\x3f\xd6\xf1\x94\x0f\x76\x67\xaa\x4b\x74\xa2\xd3\x8d\x67\x94\x70\x92\xe7\xf5\x98\x7b\x95\xc5\x5f\x40\xac\x6c\x53\x9b\xc8\x73\xfe\xd0\xda\x27\x2d\xe2\x5b\xee\x50\xc8\xca\x19\x49\x67\x2e\x7a\xcc\x8d\xa6\xf4\xb1\x0f\x05\xe9\xe4\xfb\xae\x1d\xa7\x55\x0b\xfd\x0e\x36\x66\xb5\x7b\xfe\xc2\x27\x69\x76\x9a\xf0\x2b\xc7\xfd\x27\x2f\xe7\x46\x85\xea\xd6\xa4\xea\xcc\x83\xf5\x77\xeb\x4d\xd3\x7c\xce\xa8\x93\x6e\xd5\x11\x4b\x38\x56\xf4\x14\x88\xa7\x80\x2d\x56\xee\xf2\x2c\x24\x5b\xb5\x78\xca\x74\x31\x5d\x4f\xa3\x19\x55\x68\xea\x16\xa2\xc4\x90\x1e\xef\x9e\xf3\xe1\x44\xed\x58\xa0\xe8\xcd\x86\x76\xda\x23\x91\x8b\x81\x7f\x09\x14\xdd\x61\x78\x7c\xb7\x98\xdf\x55\xc5\x27\x26\x7d\x04\xbe\x8e\xf6\x81\x0a\xd4\xf0\xb1\x1c\x08\x8a\x18\xb2\x4b\x2d\x55\x93\x9c\x3d\xb1\xc8\xe3\x93\xfe\xf5\x28\xb4\xe5\x85\xa3\xb1\x00\xfe\xca\x92\xb8\xa4\x6d\xc4\x64\x7f\xa9\xbd\x45\x6c\x31\x0d\xbc\xfa\x66\xe1\x05\x1f\x04\xb2\x24\xc2\xf5\x98\x47\x2c\x98\x98\xc2\x1c\x29\xff\xb1\x62\x61\x7f\x61\x1b\xf1\x07\x9e\xbf\x76\x22\x98\x6b\xfd\x39\x6f\x21\x9d\xd8\xa9\xaa\x57\xdc\x6f\xaf\x2a\xb3\x52\x8e\x79\x68\x42\x4a\x98\x14\x9a\x8d\x02\x9d\x9e\x73\x50\x8e\xfd\x0d\x36\xc6\xf3\xaa\x0d\x0f\x95\x89\x4a\xba\xc5\xa7\xb3\x60\x0c\xe7\x7f\x4e\x23\x7d\x2b\x83\xf9\x20\x33\x35\xab\xf7\xe9\x06\x98\x9f\xcd\x73\x36\xad\xeb\x53\x83\x5e\x5c\xda\xb4\xc0\xe6\x0d\x32\x83\x8b\x01\x47\x3c\x54\x5f\x00\xfd\x11\x34\x16\x05\xe0\x45\xe1\x7e\xa5\x52\xab\xf7\xc8\x56\x0c\xc7\xe1\x1e\xf1\x54\xe9\x9e\x74\x83\xd5\x7a\xe8\xbd\x0a\xa7\x63\x32\xa8\x50\x4b\xff\x14\xd4\xe2\xa2\x9a\xde\x4a\xcc\x9d\xd4\x04\x09\x17\x0d\x8d\x9e\xb4\xf0\x5e\xb7\x1b\x12\x8a\x05\xee\xc6\xcd\x47\xb5\xf0\x46\x3a\xfc\x3c\x68\x73\x2e\x11\x4e\x4a\x67\x27\x0b\xbf\x56\x80\x7b\x90\xc8\xa7\x80\xa6\x09\xe8\xfb\xae\xc6\xb0\x28\x35\xbd\xb2\x7d\xdf\x9d\xcd\x81\x55\xdb\xc8\x2e\x14\x2b\x45\xae\x8d\x57\xea\xb4\x89\x63\x13\xf0\xf2\x90\x89\x15\x0c\x8f\x55\x2d\x63\x80\x85\x6f\x21\xe5\x48\x8e\xdb\xdb\x0e\xc7\x4b\x0d\x1f\xc8\x50\x1b\xc9\x85\xe3\x3a\x14\x09\xbc\x5f\xa2\x5d\xe0\x1f\x4a\xf7\x91\xf5\x71\xd6\xf9\x18\xea\x85\x7e\xcb\x8a\xaf\xb4\x5b\x2b\x41\xee\xd7\xae\xca\x3f\xb9\xe7\xdf\x2a\x7b\x0f\xf7\x61\xfc\x59\x2f\xe2\x60\x30\xdd\x17\x83\x15\x82\x9a\xf8\x90\x59\xb4\x0b\xcc\x56\x9e\xcd\xb5\xc4\xea\x53\xa1\x7a\x49\x06\xee\x0f\xc9\x3a\x61\x67\x7e\x6b\xdc\x76\xd9\x3f\x67\x5f\x6e\xf2\xab\x24\x8f\x03\x77\xaf\x0e\xcb\x03\x49\xf9\x51\xfa\x8f\x45\x50\x76\xfb\x2b\x0f\x1d\xf5\x07\x4a\x96\x66\x63\x1a\x3b\x4c\x65\x99\xda\x74\xf7\x9c\x33\xe3\x58\x08\xc1\x3d\x3a\x95\xbf\x76\x2c\x35\x52\xea\xcb\x0d\x90\xda\xd5\x61\xac\xed\x12\x13\x7b\x8e\xa3\xd6\x01\x36\x0b\x8d\x55\x10\xc5\x2f\xe6\x24\x22\xc8\xe8\x17\xaf\x7e\x3c\x85\xe6\x6b\xff\xfc\x0a\xcd\xd9\xa6\x36\xf4\x82\x0d\x6b\xcf\x9c\xc9\xcb\x61\x5e\x14\xe1\x71\xf9\x3e\x31\x81\xbd\x02\x78\x6d\x4c\x58\x95\xae\x97\x45\xc5\xee\x9d\xbe\x5f\x9b\xe1\x12\x70\xaa\x8e\x00\x73\x62\x30\x25\xa0\x67\x62\xc8\x7a\x3a\x6d\x18\x2a\xb1\x2f\x2c\x88\xb8\xa9\x62\x2d\xb3\xfe\xed\x04\xfe\x2a\xa8\xa8\x4b\x14\x2d\x9d\xcf\xcf\x89\x7b\x34\x05\xe6\x47\x80\x69\xc7\xa4\xda\xb4\x67\x51\x36\xe0\x9f\xbb\xc0\x3c\x6d\xe5\xee\x0d\xc9\x8b\xf6\x1c\x1b\x3b\xd8\x40\x6c\x2c\x98\x2c\xfe\x6e\xc0\x7f\x36\xd4\x1f\xf8\x98\x8b\x76\xec\x2b\xa1\xed\x1e\x1c\xff\x34\xa3\x7f\xed\xe8\x41\x04\xf5\x8e\xa3\xed\xbd\xc4\x31\x97\x9a\xbf\x09\x07\x81\xad\x44\xcc\xa5\x08\x9a\xd1\x7e\x75\xf4\x7d\xa5\x94\x59\x01\xf6\x84\xfb\xf8\xdb\x02\x97\xc5\x30\xcd\x87\x64\xee\x4f\xca\xde\x85\xeb\x27\xe6\x26\xc4\x16\xb5\xe3\xe7\x36\xaa\x91\x7b\xb6\x68\xce\xe0\x7e\x79\xb2\xa5\x8f\x34\xb5\x91\xd9\x70\x51\xa2\x7c\x2c\xc0\x32\x20\x7e\x53\x87\xd3\x54\x0f\x24\x68\x17\xe3\x4f\x60\x74\xa1\x78\x54\x6b\xf5\x56\x04\xeb\x49\x69\xf1\xa5\xa1\xbd\xf3\x2c\xe6\xc2\xcd\x60\x65\x3e\x95\x5a\x24\xa0\x3e\xae\x4c\xc6\x59\xe2\xf8\xb6\x04\x23\xcb\x41\x05\xcd\x60\x2a\xe1\x54\xd4\x49\xff\x66\xd0\x74\xee\xb4\x8d\x9a\x00\x56\x7a\xf8\xba\xaa\xf1\xd5\xeb\x6b\xde\x29\x76\x6d\xd2\x87\xac\x87\xf9\x4f\x0d\xdc\x28\x49\x9f\x16\xd4\xcc\xd4\x47\x28\xb4\xe0\x22\x9d\xff\x94\x63\xb1\x3b\x90\xc7\x43\x56\x71\x0a\xc9\xba\x54\xd9\x64\xba\x6c\x1b\x76\x80\xa7\x32\x59\x17\x2f\xde\x9b\xd1\xee\x4f\xf0\xb8\x37\xcf\x19\x35\x30\xaf\x6a\x84\x03\x4d\xfd\xae\x54\xd3\x52\x3a\xdc\x6b\xb0\x4a\x81\xb9\x41\x16\xc7\x27\x64\x63\x08\x72\xd2\x7e\x4c\x59\x8d\xd4\x65\x17\xe6\x14\xb4\xcd\x8c\xf2\xe9\xa1\xea\x97\x4e\x4d\x0b\x0b\xf3\xb1\x46\x0f\xdd\x4a\xee\x79\x30\xb3\xda\x45\xe3\x81\xda\xeb\x8b\x9d\x13\x36\x49\xe3\xc5\xd2\x6c\x84\xd3\x1b\x71\x97\xc9\x5c\x89\xe0\x71\x69\xc7\x8f\x9b\x59\x6c\x9f\x8c\xb1\xd0\x9e\x46\x02\x7e\x45\x3a\xf3\xba\xd3\x0e\x43\xa8\xe2\x17\xeb\xdd\xe8\x22\xed\x55\x29\xd2\xfe\x66\x69\x5c\xe9\x4c\xe1\x86\x44\x47\x53\xf1\xe3\x21\xb5\x47\x51\xd1\xba\x1b\x8b\x27\xaf\x28\x51\xc3\x74\xd9\x05\xea\x6a\x47\xde\xd7\x8b\xdb\x41\x20\x16\xf0\x04\x99\x60\x7a\xf9\xa5\x38\x11\x8a\xea\xd0\xbe\xd9\xd1\xee\x1b\x62\xbe\x9b\x40\x1c\x80\x10\xd4\x54\xfe\x5e\x62\x95\xb2\xc5\xd2\x22\xb0\xa6\x00\xf1\xad\x86\xf9\x8d\x8d\xf4\xc9\x36\xe2\xc1\xf5\xbc\x34\xa9\xe0\xed\xb0\x5d\x89\x8f\x29\x06\x95\xf7\xa5\xef\x59\x5b\xc5\x57\x23\xfb\x5b\x01\xf6\xab\x40\x13\x67\x83\x7a\x31\x60\xec\xd9\x13\xa6\xe1\xd1\x54\xb6\x34\xd4\x5f\x4b\xa4\x40\x0f\xf3\xb6\xad\x54\x23\x36\x5c\x75\xaa\xdf\xef\x70\x7e\x14\x10\x7d\xeb\x73\x9e\x59\xd7\xde\x93\x81\xe6\xb5\xef\xb3\x83\xac\x57\x86\xf6\x93\xf9\x9c\xdf\xca\x85\x86\x7c\x78\x38\xa3\x45\x62\x53\xb3\x6d\x70\x2c\x6b\x69\x93\x02\x99\x44\x83\x78\x36\xd0\x62\x9e\xac\xbf\xe5\xd9\x7c\x6a\xa0\x53\x37\x60\x5e\x07\xc6\x6b\xf2\xf0\x25\x9a\x8e\x22\xfd\xb5\x93\x59\x2f\x4f\x78\x7b\xef\x5c\xc4\xbb\xc1\x70\x95\xd1\x7b\x3d\xf6\x67\x9b\x99\x1c\x24\x5a\x27\x9f\x7f\xef\x13\x01\x11\xd9\xd2\xb8\x2c\x95\x89\x15\x81\x8f\x12\x29\xf3\xf7\xae\x41\xbb\x1f\xee\x73\xb4\xbf\x7f\x96\x5d\x7b\xed\xe6\x1f\x43\x37\x37\xff\x7a\x1a\x8f\xcd\xd0\xfd\x7e\x0d\xa1\x7f\xfb\xfa\x5b\x9c\x9f\x53\xf7\xfb\xe7\x61\x6a\xfe\x7c\x77\x3f\x7e\xfc\x47\x00\x00\x00\xff\xff\x16\x44\xcf\x58\x51\x0f\x00\x00") + +func testE2eTestingManifestsIngressStaticIpSecretYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressStaticIpSecretYaml, + "test/e2e/testing-manifests/ingress/static-ip/secret.yaml", + ) +} + +func testE2eTestingManifestsIngressStaticIpSecretYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressStaticIpSecretYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/static-ip/secret.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsIngressStaticIpSvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x7c\x8e\xc1\x0a\xc2\x30\x0c\x86\xef\x7d\x8a\xff\x05\x06\x7a\x93\x5e\xbd\xcb\x40\xf1\x1e\xdb\xe0\x8a\xdd\x12\xd2\x30\xf0\xed\x65\x75\x47\xf1\x16\x3e\xbe\x24\x1f\x69\xb9\xb3\xb5\x22\x4b\xc4\x7a\x0c\xaf\xb2\xe4\x88\x2b\xdb\x5a\x12\x87\x99\x9d\x32\x39\xc5\x00\x2c\x34\x73\x04\xa7\x49\x26\xa6\xcc\xd6\x86\xc9\x5d\x5b\x00\x2a\x3d\xb8\xb6\xcd\x01\x48\xf5\x97\xd4\x94\xd3\x26\xf8\x5b\x39\xe2\x22\x99\x47\x31\x0f\x80\x8a\x79\x5f\x1d\xfa\x18\x71\x3a\xf4\x3b\x4e\xf6\x64\x1f\x77\xb4\x43\x35\x71\x49\x52\x23\x6e\xe7\xb1\x93\x6f\xd4\xf6\x23\x00\x8d\x2b\x27\x17\xfb\x5b\xf2\x09\x00\x00\xff\xff\x0d\x93\xec\x7c\xf0\x00\x00\x00") + +func testE2eTestingManifestsIngressStaticIpSvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsIngressStaticIpSvcYaml, + "test/e2e/testing-manifests/ingress/static-ip/svc.yaml", + ) +} + +func testE2eTestingManifestsIngressStaticIpSvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsIngressStaticIpSvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/ingress/static-ip/svc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlAgnhostPrimaryControllerJsonIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x92\x4f\x4b\xc4\x40\x0c\xc5\xef\xfd\x14\x25\x67\x15\x16\x41\x71\x6e\xe2\xc9\x9b\x78\xf0\x22\x1e\x62\x37\xac\x83\xd3\xc9\x90\x09\x0b\x52\xe6\xbb\xcb\x6c\xbb\xdd\xfe\x99\x55\xc1\x53\xe1\xe5\xe5\xe5\x97\x74\xba\xaa\xae\x6b\xf8\xb4\x7e\x0b\x06\x9e\x29\x38\xdb\xa0\x5a\xf6\x0f\xec\x55\xd8\x39\x12\xb8\x38\x58\x30\xd8\x17\x92\x68\xd9\x83\x81\xfd\x66\x50\x5b\x52\xdc\xa2\x22\x98\x43\x50\x96\x3c\xb6\x04\x06\x70\xe7\x3f\x38\xea\x65\x10\xdb\xa2\x7c\xf5\xfe\x5c\x77\xf8\x4e\x2e\x9e\x1a\xfa\xf0\x70\x6a\x19\xad\xb9\x22\xec\x72\xda\x31\x65\xa8\xa4\xfc\x4d\x3d\x42\x0c\xd4\x4c\xc6\x4b\xbf\x43\x04\xb3\x19\x47\x46\x72\xd4\x28\xcb\x3f\x87\x8e\x79\x4a\x6d\x70\xa8\x34\xcf\x5b\xdf\xe2\xfc\xc6\xbf\x21\xfc\x08\x32\xb9\xc1\x82\x6c\x7d\x8f\x41\x6c\xd8\x2b\x5a\x4f\x12\xc1\xbc\x2e\xc7\xac\xb8\xfe\xf0\x1b\x67\x5e\xdb\xe2\x8e\xc0\xd4\xd0\x75\x57\xf7\x7d\xc3\x63\x96\x52\x2a\xfb\x03\x8b\x96\x40\xce\xe3\x94\xa1\x22\xc9\xfe\xf8\x40\xcb\x0d\xe3\xde\x4f\x2c\x0a\xe6\xe6\xfa\xf6\xae\x6c\x4e\x05\xf9\x6d\xa9\xcd\x4d\x93\x72\x9a\xbd\xcb\x2a\x55\xdf\x01\x00\x00\xff\xff\x96\x5f\x1a\xbe\x57\x03\x00\x00") + +func testE2eTestingManifestsKubectlAgnhostPrimaryControllerJsonInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlAgnhostPrimaryControllerJsonIn, + "test/e2e/testing-manifests/kubectl/agnhost-primary-controller.json.in", + ) +} + +func testE2eTestingManifestsKubectlAgnhostPrimaryControllerJsonIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlAgnhostPrimaryControllerJsonInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/agnhost-primary-controller.json.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlAgnhostPrimaryPodYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x52\xcd\x6a\xf3\x30\x10\xbc\xfb\x29\x96\xdc\x9d\xbf\x0f\xbe\xd2\xbd\x15\x9a\x43\xa0\x09\x26\x2d\x85\x1e\x37\xce\x92\x88\xe8\xc7\xac\x56\x86\x50\xfa\xee\xc5\x89\x92\xb8\xbe\x96\xfa\xb4\x8c\x67\x66\x35\x23\x51\x63\xde\x59\xa2\x09\x1e\xa1\x9d\x15\x47\xe3\x77\x08\x55\xd8\x15\x8e\x95\x76\xa4\x84\x05\x80\xa5\x2d\xdb\xd8\x4d\x00\x9e\x1c\x23\xd0\xde\x1f\x42\xd4\x33\x22\xc1\x32\x42\x23\xc6\x91\x9c\x8a\x01\xa3\xbc\xe2\xb1\xe1\xba\x73\xa8\x83\x57\x32\x9e\x25\xfb\x95\x99\x7f\xd7\x77\x9f\x71\xb4\x67\x84\x7d\x2d\x63\x13\x26\xc7\xb4\x65\xf1\xac\x1c\x4b\x9e\x73\xa9\x1c\xb5\x3c\x33\xe2\x24\xaf\xc1\xd9\x78\x9a\xa5\xec\x5b\xcc\xe3\xdd\xbd\xda\x2c\x57\x4f\x9b\x8f\x1b\x0e\xd0\x92\x4d\x8c\x30\x52\x49\x3c\xca\x78\x13\x44\x63\x5f\x7c\x3b\x6c\x15\x44\x11\xfe\xff\x7b\x78\xcc\x7f\x85\x63\x48\x52\x73\x8f\x6e\x8d\x33\x7d\x39\x40\xdd\x24\x84\xd1\x74\x3c\xbb\x2e\x68\x83\x4d\x8e\x57\x21\xf9\x9f\x7b\x5c\x87\x54\xa4\x07\x84\xc9\xa0\xb8\xb2\xbb\x84\x9e\xe7\x25\xcf\x0d\xbc\x06\x8c\xec\xd5\x78\xb6\x7f\xd4\xdf\xeb\x62\xfd\xb6\x5c\x2f\x5e\x7e\x59\xe0\x3c\x37\x78\xe9\x61\xf0\x02\x7a\x41\xd9\x35\x7a\x7a\x36\x82\xf0\xf9\x55\x7c\x07\x00\x00\xff\xff\xc6\x0a\xed\xba\xa3\x02\x00\x00") + +func testE2eTestingManifestsKubectlAgnhostPrimaryPodYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlAgnhostPrimaryPodYaml, + "test/e2e/testing-manifests/kubectl/agnhost-primary-pod.yaml", + ) +} + +func testE2eTestingManifestsKubectlAgnhostPrimaryPodYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlAgnhostPrimaryPodYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/agnhost-primary-pod.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlAgnhostPrimaryServiceJson = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x4f\xcb\xaa\xc2\x30\x10\xdd\xf7\x2b\x42\xd6\xbd\x8b\x8b\xa0\xd8\xaf\x10\x04\x37\xe2\x62\x6c\x87\x1a\x4c\x93\x30\x19\x0a\x22\xf9\x77\x99\xa6\x8f\xb8\x77\x95\x70\x9e\x73\xde\x95\x52\x4a\x3f\x8d\xeb\x74\xa3\xf4\x19\x69\x34\x2d\xea\x7a\x42\x21\x98\x0b\x52\x34\xde\x09\x37\xfe\xcf\xf0\x80\x0c\x1d\x30\xe8\x46\x4d\x6e\xc1\x1c\x0c\x28\x22\xe8\xdd\xc3\x47\xfe\x0b\x64\x06\xa0\x57\x76\x88\xc0\xc2\x1d\x6d\x2c\x2c\xb9\x20\x14\xa6\x55\x2c\x14\x79\x3b\x05\x2e\x41\x33\x95\xe4\x4d\xf9\x8e\x18\xb0\x2d\x6f\x08\x9e\x58\x1a\xae\x5b\x4c\x51\xb6\x28\x74\xa3\xf6\xbb\xc3\xb1\xfe\x66\x18\xa8\x47\x3e\x65\x7e\x5d\x11\x91\x46\x24\xbd\x49\xd3\xfc\xbd\xad\xbb\x22\x5a\x6c\xd9\xd3\x8f\x96\x55\xe9\x13\x00\x00\xff\xff\xd0\xfb\x54\xf4\x91\x01\x00\x00") + +func testE2eTestingManifestsKubectlAgnhostPrimaryServiceJsonBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlAgnhostPrimaryServiceJson, + "test/e2e/testing-manifests/kubectl/agnhost-primary-service.json", + ) +} + +func testE2eTestingManifestsKubectlAgnhostPrimaryServiceJson() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlAgnhostPrimaryServiceJsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/agnhost-primary-service.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlBusyboxCronjobYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x90\x41\x4b\x3b\x41\x0c\xc5\xef\xf3\x29\xc2\x1e\x0b\xfd\xef\x7f\xe9\x6d\x6e\x56\x11\x2d\x82\x82\xe2\x3d\x3b\x9b\xb6\xa9\xb3\xc9\x32\x93\x55\x97\xd2\xef\x2e\x53\x2d\xb4\xfa\xe6\xf6\x7e\x99\xe4\xf1\x70\xe0\x57\x4a\x99\x55\x3c\xb4\x68\x61\x5b\xbf\x37\x2d\x19\x36\xee\x8d\xa5\xf3\x70\x9d\x54\x56\xda\xba\x9e\x0c\x3b\x34\xf4\x0e\x40\xb0\x27\x0f\x21\xa9\xec\xb4\x9d\x1b\x65\x73\x79\xa0\x50\x50\x0e\x5b\xea\xc6\x48\x1e\xaa\x59\xdd\xc0\xec\xfb\x55\x0e\x20\xa8\x84\x31\x25\x92\x30\x3d\x69\xe4\x30\x79\xb8\x8a\x51\x3f\xca\xa7\x31\x0f\x54\x8e\xad\x31\x66\x2a\x86\x61\x32\x96\xcd\x0d\x61\x17\x59\xe8\x99\x82\x4a\x97\x3d\x2c\xfe\x1f\xc7\x43\xa0\x9c\xd7\x63\x5c\x69\x9b\xef\x38\x9b\xa6\xe9\x81\x7b\x36\x0f\x0b\x07\xb0\x46\x8e\xd4\xfd\x65\x8d\x03\xd8\x69\xfb\x42\xfd\x10\xd1\xa8\xc4\x05\x38\x05\x2f\xb2\x0b\xf2\x9b\x16\x05\x15\x43\x16\x4a\xf9\xdc\x9d\xff\x34\x72\x6c\x02\xce\xc4\x3d\x6e\xc8\xc3\x7e\xff\x6f\x39\xe6\x69\xa9\x9f\xf7\xc5\x38\x1c\x2e\x86\x30\x6d\x2e\xb6\x95\x7d\x55\xdd\xb2\xd4\x96\x46\xaa\xce\x48\xa2\x63\x31\xa7\xfa\x1e\xe5\x16\x39\x8e\x89\xdc\x57\x00\x00\x00\xff\xff\x6c\xa9\x5f\x25\xc5\x01\x00\x00") + +func testE2eTestingManifestsKubectlBusyboxCronjobYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlBusyboxCronjobYamlIn, + "test/e2e/testing-manifests/kubectl/busybox-cronjob.yaml.in", + ) +} + +func testE2eTestingManifestsKubectlBusyboxCronjobYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlBusyboxCronjobYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/busybox-cronjob.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlBusyboxPodYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\x8f\xb1\x6a\x03\x31\x10\x44\x7b\x7d\xc5\x70\x85\xdd\xc4\x3e\x9b\x40\x0a\x15\x81\xb8\x73\x13\xae\x4a\x13\x52\xac\x74\xeb\x58\x58\xd2\x0a\x49\x4e\x7c\x18\xff\x7b\xd0\x91\x40\xdc\xec\xc2\xcc\x63\x67\x87\x92\x7b\xe3\x5c\x9c\x44\x8d\xaf\xad\x3a\xb9\x38\x6a\x0c\x32\xaa\xc0\x95\x46\xaa\xa4\x15\x10\x29\xb0\x86\x39\x97\xc9\xc8\x65\xab\x00\x4f\x86\x7d\x69\x16\x40\x29\xfd\xf3\x4a\x62\xdb\x74\x2b\xb1\x92\x8b\x9c\x67\x6a\x05\x17\xe8\x93\x35\xae\xd7\xf5\xee\x5c\xa6\x9d\x5c\xf6\x4d\xb8\xdd\xe6\x13\x56\x42\xa0\x16\xfc\xde\xf5\xc6\xc5\xbe\x1c\xbb\x07\x74\x2b\xdb\x66\x38\x8d\x2e\x63\x95\xd0\x67\x91\xda\x1f\x44\x7a\x43\x19\x8b\x05\xd8\x1e\x05\xcb\x83\x88\xa1\xbc\xc4\xf3\x3d\xd0\xf6\xfa\x17\x2c\x9e\x39\xe1\xf1\x69\xb3\xe9\x3e\xe6\xbc\xf9\x99\xe1\xec\xfd\x20\xde\xd9\x49\x63\x7f\x78\x95\x3a\x64\x2e\x1c\xeb\x4c\xdc\x35\x56\x40\xe6\x52\x29\xd7\x3f\xfe\xc5\x7f\xd3\x54\xd4\x4f\x00\x00\x00\xff\xff\x19\x5a\x86\x86\x3d\x01\x00\x00") + +func testE2eTestingManifestsKubectlBusyboxPodYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlBusyboxPodYamlIn, + "test/e2e/testing-manifests/kubectl/busybox-pod.yaml.in", + ) +} + +func testE2eTestingManifestsKubectlBusyboxPodYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlBusyboxPodYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/busybox-pod.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlHttpdDeployment1YamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x8e\xcb\x6a\xc3\x30\x10\x45\xf7\xfa\x8a\xfb\x03\xee\x6b\x55\xb4\xee\xa2\x85\x52\xba\xea\x7e\x2a\x0d\xb5\xa8\x1e\x83\x34\x24\x04\xe3\x7f\x0f\x22\x8e\xed\x64\x96\x77\xce\x7d\x90\x84\x1f\xae\x2d\x94\x6c\x41\x22\xed\xf1\xf0\x6c\xfe\x43\xf6\x16\x6f\x2c\xb1\x9c\x12\x67\x35\x89\x95\x3c\x29\x59\x03\x64\x4a\x6c\x31\xaa\x8a\x1f\xfc\x86\x34\x61\xd7\xdf\x95\x25\x06\x47\xcd\xe2\xc5\x00\x8d\x23\x3b\x2d\xb5\x7f\x80\x44\xea\xc6\x4f\xfa\xe5\xd8\x2e\x02\x7a\xe5\x12\x66\x00\xe5\x24\x91\x94\x17\x7a\x57\xda\x2f\xde\x18\xef\xac\xc0\x75\x40\x3f\x57\xb2\x52\xc8\x5c\x57\x7c\xd8\xef\x5e\x23\x42\xa2\x3f\xb6\x98\xa6\x87\xf7\xae\x7f\xf1\xf1\xa3\x2b\xf3\xbc\x12\x52\xaa\xee\x3a\x87\x2d\xfa\xbb\x54\xb5\x78\x7d\x32\xe7\x00\x00\x00\xff\xff\xda\xd6\x43\x63\x42\x01\x00\x00") + +func testE2eTestingManifestsKubectlHttpdDeployment1YamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlHttpdDeployment1YamlIn, + "test/e2e/testing-manifests/kubectl/httpd-deployment1.yaml.in", + ) +} + +func testE2eTestingManifestsKubectlHttpdDeployment1YamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlHttpdDeployment1YamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/httpd-deployment1.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlHttpdDeployment2YamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x8e\xcb\xaa\x02\x31\x0c\x86\xf7\x7d\x8a\xbc\xc0\x9c\xcb\xee\xd0\xf5\x59\x28\x88\xb8\x72\x1f\xdb\xe0\x14\x7b\x09\x6d\x50\x64\x98\x77\x97\xe0\x38\x33\x9a\x55\xf9\xfb\xfd\xf9\x82\x1c\x8e\x54\x5b\x28\xd9\x02\x32\xb7\xef\xeb\xaf\xb9\x84\xec\x2d\xfc\x13\xc7\x72\x4f\x94\xc5\x24\x12\xf4\x28\x68\x0d\x40\xc6\x44\x16\x7a\x11\xf6\x9d\x5f\x90\xc6\xe4\xf4\xbb\x51\x24\x27\xa5\xea\x1b\x20\xa1\xb8\x7e\x87\x27\x8a\xed\x19\x80\x4a\xa6\xba\x01\x10\x4a\x1c\x51\x68\xa2\x57\x1a\x9d\xf8\x56\xfc\xa8\x02\xbc\x94\x3a\xae\x64\xc1\x90\xa9\xce\x78\xb7\xbe\x74\x5e\x11\x12\x9e\xc9\xc2\x30\x7c\x6d\x34\xdf\xd3\x6d\xab\xc9\x38\xce\x04\x97\x2a\x2b\x67\xb7\xac\x3e\x94\x2a\x16\xfe\x7e\xcc\x23\x00\x00\xff\xff\xbb\xc5\xc3\x6b\x34\x01\x00\x00") + +func testE2eTestingManifestsKubectlHttpdDeployment2YamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlHttpdDeployment2YamlIn, + "test/e2e/testing-manifests/kubectl/httpd-deployment2.yaml.in", + ) +} + +func testE2eTestingManifestsKubectlHttpdDeployment2YamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlHttpdDeployment2YamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/httpd-deployment2.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlHttpdDeployment3YamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x8e\xbb\xae\xc2\x30\x0c\x86\xf7\x3c\x85\x5f\xa0\xe7\xc0\x86\x32\x33\x80\xc4\xc0\xc4\x6e\x12\x8b\x46\xe4\x62\x25\x16\x12\xaa\xfa\xee\xc8\xa2\xb4\x05\x4f\x89\xff\xcb\x67\xe4\x70\xa1\xda\x42\xc9\x16\x90\xb9\xfd\x3f\xb6\xe6\x1e\xb2\xb7\xb0\x27\x8e\xe5\x99\x28\x8b\x49\x24\xe8\x51\xd0\x1a\x80\x8c\x89\x2c\xf4\x22\xec\x3b\xbf\x58\x1a\x93\x53\xb9\x51\x24\x27\xa5\xea\x1b\x20\xa1\xb8\xfe\x84\x57\x8a\xed\xbd\x00\x85\x4c\x71\x03\x20\x94\x38\xa2\xd0\xe4\x5e\x61\x74\xe2\x57\xf0\x27\x0a\xf0\x41\xea\xb8\x92\x05\x43\xa6\x3a\xdb\xbb\xf5\xa5\x73\x45\x48\x78\x23\x0b\xc3\xf0\x77\xd0\xfd\x51\xbf\xe3\x38\xcb\x5c\xaa\xac\x80\xdd\xd2\x7b\x2e\x55\x2c\xec\x36\xe6\x15\x00\x00\xff\xff\x2d\xb9\xc2\x0f\x31\x01\x00\x00") + +func testE2eTestingManifestsKubectlHttpdDeployment3YamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlHttpdDeployment3YamlIn, + "test/e2e/testing-manifests/kubectl/httpd-deployment3.yaml.in", + ) +} + +func testE2eTestingManifestsKubectlHttpdDeployment3YamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlHttpdDeployment3YamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/httpd-deployment3.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlHttpdRcYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x8f\xb1\x8a\xc3\x30\x10\x44\x7b\x7d\xc5\xfc\x80\x0f\xdc\xaa\xbd\xe6\xae\xb9\xe2\x8a\xf4\x1b\x79\x49\x44\xa4\x95\x58\x6d\x92\xc2\xf8\xdf\x83\x30\x36\x26\x99\x6e\x67\x78\xb3\x0c\xd5\x78\x62\x6d\xb1\x88\xc7\x63\x74\xb7\x28\x93\xc7\x3f\xd7\x14\x03\x59\x2c\xf2\x5d\xc4\xb4\xa4\xc4\xea\x32\x1b\x4d\x64\xe4\x1d\x20\x94\xd9\xe3\x6a\x56\xa7\x41\x83\x6b\x95\x43\xb7\x75\x05\x9b\xc7\xe8\x80\xc6\x89\x83\x15\xed\x09\xa0\x77\x39\x10\x80\x71\xae\x89\x8c\xd7\xf4\x58\xde\x95\xe8\xcc\xa9\x6d\xd7\x27\x0d\x6c\x3f\xbb\x42\x11\xa3\x28\xac\x3b\x31\x20\x66\xba\xb0\xc7\x3c\x7f\xfd\x74\xec\x8f\x9f\xbf\xdd\x59\x96\xbd\xf3\x6d\xc4\x2b\x00\x00\xff\xff\x5c\xf5\x77\xda\x0b\x01\x00\x00") + +func testE2eTestingManifestsKubectlHttpdRcYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlHttpdRcYamlIn, + "test/e2e/testing-manifests/kubectl/httpd-rc.yaml.in", + ) +} + +func testE2eTestingManifestsKubectlHttpdRcYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlHttpdRcYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/httpd-rc.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlPausePodYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x8c\x31\x0e\xc2\x30\x0c\x45\xf7\x9c\xe2\x5f\xa0\x08\x36\xe4\x1b\xb0\x65\x62\x37\x8d\x85\x22\x1a\x3b\x4a\x0c\x4b\xd5\xbb\xa3\x54\x48\x08\x46\xbf\xe7\xff\xb8\xe6\xab\xb4\x9e\x4d\x09\xaf\x53\x78\x64\x4d\x84\x68\x29\x14\x71\x4e\xec\x4c\x01\x50\x2e\x42\xa8\xfc\xec\x12\x80\x85\x6f\xb2\xf4\xc1\x7f\x4d\xaf\x32\x0f\x3a\x9b\x3a\x67\x95\xb6\xff\x4c\x7f\x6b\x20\x17\xbe\x0b\x61\x5d\x0f\x71\xb0\xcb\x38\xb7\x6d\x57\xd5\x9a\x7f\xca\xd3\xb7\x13\xad\x39\xe1\x7c\x0c\xef\x00\x00\x00\xff\xff\x04\xec\xd3\x24\xad\x00\x00\x00") + +func testE2eTestingManifestsKubectlPausePodYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlPausePodYamlIn, + "test/e2e/testing-manifests/kubectl/pause-pod.yaml.in", + ) +} + +func testE2eTestingManifestsKubectlPausePodYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlPausePodYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/pause-pod.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsKubectlPodWithReadinessProbeYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x8c\x4d\x4a\x04\x41\x0c\x46\xf7\x7d\x8a\xef\x02\xe3\xcf\x42\x90\xac\x05\x75\xd7\x20\xb8\xcf\x74\x05\x27\xd8\x95\x14\x55\x51\x90\x61\xee\x2e\x55\x8e\x4c\xeb\xf2\x7b\x2f\x79\x5c\xf4\x55\x6a\x53\x37\xc2\xe7\xed\xf4\xae\x96\x08\xb3\xa7\x29\x4b\x70\xe2\x60\x9a\x00\xe3\x2c\x84\x43\x44\x49\x13\xb0\xf2\x5e\xd6\xd6\xf9\x5f\xd3\x8a\x2c\x9d\x2e\x6e\xc1\x6a\x52\xc7\xcd\xee\xdf\x37\xa0\x99\xdf\x84\x70\x3c\x5e\x3d\x75\xf6\xdc\xe7\xe9\x34\x54\xf1\x1a\xe7\xf2\xee\xd2\x99\xbd\x06\xe1\xfe\x66\xf0\x2a\x9c\xd4\xa4\xb5\xb9\xfa\x5e\x7e\x6e\x31\xea\x8f\x12\xbf\x13\x28\x1c\x07\xc2\xf5\x65\x6f\x1b\x80\x9a\x86\xf2\xfa\x20\x2b\x7f\xbd\xc8\xe2\x96\x1a\xe1\xee\x2c\x43\xb3\xf8\x47\x6c\xf8\x77\x00\x00\x00\xff\xff\xe7\xf2\x7c\x22\x26\x01\x00\x00") + +func testE2eTestingManifestsKubectlPodWithReadinessProbeYamlInBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsKubectlPodWithReadinessProbeYamlIn, + "test/e2e/testing-manifests/kubectl/pod-with-readiness-probe.yaml.in", + ) +} + +func testE2eTestingManifestsKubectlPodWithReadinessProbeYamlIn() (*asset, error) { + bytes, err := testE2eTestingManifestsKubectlPodWithReadinessProbeYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/kubectl/pod-with-readiness-probe.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsPod = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\xcc\x31\x6e\xc3\x30\x0c\x85\xe1\x5d\xa7\x78\x40\x67\x17\xed\x56\x68\xed\x05\x3c\x75\x67\x2d\xda\x21\x22\x91\x82\xc4\x24\xf6\xed\x03\x07\x01\x02\x67\xfd\xc8\xff\x7d\xe0\xd7\xea\x06\x9b\x51\x2d\x7d\x6e\x54\x32\x6e\xe2\x27\xbb\x38\x66\xc9\x0c\x5e\x9d\xb5\x8b\x29\x66\x6b\x70\xee\x1e\xa8\xca\x1f\xb7\xdd\x22\xae\xdf\xe1\x2c\x9a\x22\x46\x4b\xa1\xb0\x53\x22\xa7\x18\x00\xa5\xc2\x11\xba\x88\xae\x01\xc8\xf4\xcf\xb9\xef\x7e\xbc\xf4\xca\xd3\xae\x93\xa9\x93\x28\xb7\xc7\xcf\xf0\x56\x03\x52\x68\x39\x40\xb5\xe6\xcf\xbd\xe1\x55\x8f\xd6\x3c\xe2\xe7\x2b\xdc\x03\x00\x00\xff\xff\xaf\xc0\x71\x4d\xd6\x00\x00\x00") + +func testE2eTestingManifestsPodBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsPod, + "test/e2e/testing-manifests/pod", + ) +} + +func testE2eTestingManifestsPod() (*asset, error) { + bytes, err := testE2eTestingManifestsPodBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/pod", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsRbdStorageClassYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8e\xb1\x6e\xc3\x30\x0c\x44\x77\x7d\x05\x91\xdd\x6a\xdc\xa1\x49\xb9\x76\xea\xd2\x25\x40\x77\xc6\x22\x5a\xc1\x96\x28\x90\x4c\x8a\xfe\x7d\x61\x79\x28\x32\x78\x93\xde\x1d\xef\x8e\x5a\xfe\x64\xb5\x2c\x15\xc1\x5c\x94\xbe\x38\xce\x67\x8b\x59\x9e\xee\x63\x98\x73\x4d\x08\x97\x8d\xbf\x2d\x64\x16\x0a\x3b\x25\x72\xc2\x00\x00\x95\x0a\x23\xd8\x22\x3f\xa1\xa9\xdc\xf3\x9a\xc3\x8a\x30\xdf\xae\xac\x95\x9d\x7b\x90\x5e\x53\x68\xa4\x54\xd8\x59\xad\x1f\x42\x91\x9a\x5d\xd4\x10\xc6\xe7\x53\x3c\xc6\x63\x1c\xf1\xe5\x74\x7e\xed\x22\xa5\x92\xeb\x7b\xc2\xed\xf1\x8f\x2e\x3c\x29\xfb\x47\x2f\x9d\xb8\x7d\x0f\xd6\xc1\xb0\x6b\xb3\x46\x13\x23\x1c\xd6\x3d\x83\xfd\x9a\x73\x39\x74\x5f\x13\x59\xb6\x99\xfd\x7b\x33\xd6\xb5\xef\x01\xec\xb5\xad\x5a\x08\x7f\x01\x00\x00\xff\xff\x71\x84\xc8\x20\x39\x01\x00\x00") + +func testE2eTestingManifestsRbdStorageClassYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsRbdStorageClassYaml, + "test/e2e/testing-manifests/rbd-storage-class.yaml", + ) +} + +func testE2eTestingManifestsRbdStorageClassYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsRbdStorageClassYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/rbd-storage-class.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsSampleDevicePluginYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x93\x41\x6f\xdb\x30\x0c\x85\xef\xfe\x15\x44\xee\xaa\xd7\x9d\x06\x5d\xdb\x62\x28\xd6\x75\x45\x83\xee\x5a\x30\xf2\xab\x23\x54\x96\x04\x89\x36\x92\x7f\x3f\x38\x76\x62\xb7\x4d\x97\x65\xba\x45\x79\xfa\xc8\x47\x3e\x73\xb4\xbf\x91\xb2\x0d\x5e\x13\xc7\x98\xcb\xee\xb2\x78\xb5\xbe\xd2\x74\xcd\x68\x82\x5f\x42\x8a\x06\xc2\x15\x0b\xeb\x82\xc8\x73\x03\x4d\x99\x9b\xe8\xa0\x2a\x74\xd6\x40\x45\xd7\xd6\xd6\xab\x15\x84\x47\x45\x8e\x6c\xa0\xe9\xb5\x5d\x41\xe5\x6d\x16\x34\x05\x91\xe3\x15\x5c\xee\x21\x44\xaf\xdf\xb2\xe2\x18\x8f\x93\x8a\x1c\x61\x7a\x5d\x86\x83\x91\x90\x86\x37\x0d\x8b\x59\xdf\xcd\x20\xa7\x30\x44\x82\x26\x3a\x16\x8c\x80\x99\x8f\xfe\xb8\x37\xac\xd3\xb4\xfe\xb0\xf7\x41\x58\x6c\xf0\xe3\xc3\x7d\xaf\xfd\x89\xc9\x86\x64\x65\x7b\xe5\x38\xe7\xfb\x61\x52\x3b\xf7\xca\x87\x0a\xca\x24\x2b\xd6\xb0\x1b\xd5\x12\x1c\xd2\x1c\x45\xa4\x28\xc4\xfe\x2e\x24\x4d\x8b\x9b\x8d\xcd\x92\x17\x87\xf6\xf0\xf2\x02\x23\x9a\x16\xf7\xe1\x66\x03\xd3\x0a\x16\x67\x3e\x5b\x9a\x35\xaa\xd6\x1d\xde\x75\xc1\xb5\x0d\x66\xd5\x87\xed\x1e\xf3\x4d\xb4\x0e\x59\x1e\x58\xd6\xd3\xbc\x88\x62\xff\x9b\xca\x8e\x53\xe9\xec\xaa\xec\xf7\xed\x20\xe5\x1b\x40\x7e\x47\x1f\x6f\x55\x42\x6d\xb3\xa4\xad\x8a\x29\xac\xa0\x9a\x50\xe1\x7f\x6a\x8d\xb8\xe7\x3d\x8e\x3e\x9a\xf9\x17\xec\x24\x33\xc1\x0b\x5b\x8f\x34\x9b\x8b\x6d\xb8\x86\xa6\xda\xa4\x0b\x1b\x76\xa5\x93\x87\x20\x2b\x7c\x85\x12\x64\x51\x3b\x45\x2e\x8f\x25\x47\x5f\x5e\x7c\xa1\x43\xc5\xcf\x3f\xa0\x69\x63\xbe\x9b\x3a\xdc\xfb\x78\xb8\x7b\xfa\x7e\x7b\xff\xbc\xfc\x75\xf5\xe3\xf9\xfa\xf6\x71\xe6\xa0\x63\xd7\x42\xd3\xe2\xc4\x1a\xa6\x44\x64\x98\x76\x17\xd3\xe0\x05\x1b\x99\x4f\xa3\x8f\x70\x67\x1d\x6a\x54\x9a\x24\xb5\xd3\x4a\x86\xac\xfc\x0c\xad\x97\xfc\xb1\xbb\xe3\x46\x88\x9a\x5e\xff\x70\x46\x4a\xce\xcb\xc9\xdf\x0b\xbc\x8f\xc6\xb1\xae\x3f\x41\x0d\xff\xb4\xb1\x62\xc1\x52\x12\x0b\xea\xed\xe0\x5a\xb6\x11\x9a\x1e\x83\x73\xd6\xd7\x4f\x3b\x41\xf1\x27\x00\x00\xff\xff\x4f\x53\x11\xfc\x45\x05\x00\x00") + +func testE2eTestingManifestsSampleDevicePluginYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsSampleDevicePluginYaml, + "test/e2e/testing-manifests/sample-device-plugin.yaml", + ) +} + +func testE2eTestingManifestsSampleDevicePluginYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsSampleDevicePluginYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/sample-device-plugin.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsSchedulingNvidiaDriverInstallerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x55\x4d\x73\xe2\x38\x10\xbd\xf3\x2b\xba\x32\x97\xdd\xda\x32\x06\x9c\x64\x12\x9f\x36\x15\x52\xb3\xd4\x26\x90\x0a\x64\xae\x94\x2c\xb5\x6d\x15\xb2\xe4\x95\xda\x9e\xb0\xbf\x7e\x4b\xb6\x43\x0c\xf9\x62\x76\xb8\xa1\xee\x7e\xfd\xe1\xd7\xaf\xbf\xc0\x2a\x97\x0e\xa6\x0c\x0b\xa3\x97\x48\xf0\x83\x39\x30\x56\x66\x52\x33\xa5\xb6\x60\x31\x45\x8b\x9a\xa3\x80\xd4\x9a\x62\xf0\x05\x72\xa2\xd2\xc5\x61\x98\x49\xca\xab\x64\xc8\x4d\x11\x7e\x33\x26\x53\x78\xad\x4c\x25\xee\x15\xa3\xd4\xd8\x22\xe4\x46\x13\x93\x1a\x6d\x80\x3a\x93\x1a\x03\xc6\x39\x2a\xb4\x8c\x8c\x75\x61\xa2\x4c\x12\x16\xcc\x11\xda\x50\x34\xb9\x1d\xd2\x70\xcb\x0a\x35\x18\xf8\x92\x10\xa6\x86\x6f\xd0\xa6\x52\x21\x30\x2d\xc0\x50\x8e\x16\x9c\xa9\x2c\x47\x48\x8d\x05\xf2\x65\xef\x42\x81\x59\x04\xa9\x7f\xa6\x3c\x17\x64\x65\x15\x48\xed\x88\x29\x85\x76\x30\x60\xa5\xfc\x8e\xd6\x49\xa3\x63\x60\x65\xe9\xc2\x7a\x3c\xd8\x48\x2d\xe2\x97\xe9\x0c\x0a\x24\x26\x18\xb1\x78\x00\xa0\x59\x81\x31\xe8\x5a\x0a\xc9\x02\x61\x65\x8d\xb6\x07\xd7\xda\x5d\xc9\x38\xc6\xb0\xa9\x12\x0c\xdc\xd6\x11\x16\x03\x00\xc5\x12\x54\xce\x43\x00\x6c\x2e\x5c\xc0\xca\xf2\x7d\x1c\x57\x22\xf7\xae\x0e\x15\x72\x32\xb6\x0d\x2b\x18\xf1\xfc\xb6\x87\x73\x04\x12\x40\x55\x0a\x46\xb8\x24\xcb\x08\xb3\x6d\x1b\x48\xdb\x12\x63\x78\x30\x4a\x49\x9d\x3d\x36\x0e\x03\x00\xc2\xa2\x54\x8c\xb0\xcb\xd6\xeb\xda\xff\xd4\x5e\xe2\xcf\x27\x71\x74\x81\x00\xcf\xed\xfa\x1f\x4b\x53\xa9\x25\x6d\x7b\x89\x8c\xc0\xab\x57\xaf\x00\x16\xff\xa9\xa4\x45\x31\xad\xac\xd4\xd9\x92\xe7\x28\x2a\xdf\xcf\x2c\xd3\x66\xf7\x7c\xf3\x84\xbc\x22\xff\x79\x7b\x91\x2d\xe6\xb2\x1b\xee\x0a\x6d\xe1\xf6\xcd\x41\x3b\xeb\x9b\xa7\xd2\xa2\xf3\xe4\x38\xb0\x7b\x8f\x0d\x6e\x63\xe0\x9e\x5f\xc3\xac\xe1\x5a\x43\xbb\x6c\xb3\x47\xfa\x83\x28\x00\x53\xb6\x86\x18\x6e\x9e\xa4\x23\xd7\x39\x90\x69\x02\xfa\x99\x82\x9e\xef\x49\xeb\x7c\xd2\x99\x72\xe3\x68\x8e\xf4\xc3\xd8\x4d\x0c\x64\x2b\xec\xbd\xdf\xcf\xa6\x7b\x6f\xb5\x51\x55\x81\x3d\xd4\xf6\xbb\x09\xac\x77\xb5\x35\x61\x8c\xf2\x7e\x8f\xa5\xff\x0f\xe1\x8b\xdb\x73\x60\x5d\xa9\x0d\xd3\x81\xe4\x22\x28\x4c\xa5\xe9\x18\x94\xdc\x14\x18\xfa\x75\xb0\x1a\x09\x5d\x98\x48\x1d\xb6\x7c\x08\x5b\xb8\x50\x72\x31\x14\x07\x99\x3a\xc6\x74\x54\x09\x84\xb4\x81\xcf\xf1\x6b\x09\x0f\x72\x58\x63\xe8\xf8\x3e\xba\x17\xcf\xc4\xeb\x67\xa5\xeb\x31\xa3\xd5\xb0\xeb\xc5\x12\xbe\xdd\x3f\xc2\x8e\xe2\x20\x0b\x96\x21\xd4\xad\xcc\x40\xc1\xb6\x90\x20\x08\x2c\x51\x0b\xd4\x04\x46\x03\xe5\x2f\x76\x93\x36\x10\x09\x4a\x9d\x41\xe5\x50\x0c\x7b\x09\x1e\xbc\x32\x03\x19\x10\x48\x4c\x2a\x07\x2c\x31\x15\x35\xf1\xbd\x7c\x7a\x27\x88\xdc\xb8\x8e\x9d\xad\x8a\x36\x1c\xe5\xc6\x85\x64\x8c\x72\xe1\x1f\xa1\xc5\xd4\x85\x39\x32\xe1\x9e\x95\xd9\x59\x1e\xf2\x42\x78\xaf\x75\x56\x56\xeb\x1d\x6e\xd8\xab\xc3\xab\x33\x75\xcd\x5a\x54\xc8\x1c\x82\x36\x84\x0e\x7e\xdb\xa5\x3e\x5c\x8d\x97\xe3\x60\x4a\x92\x85\xfc\x17\x45\x60\x5c\x28\x0c\x77\x61\x87\x11\x34\x18\xbf\x77\x0d\xa2\x2d\xa4\x7e\x19\xcc\xeb\xc1\xfa\x93\xc0\x20\x93\x35\xea\x83\xf1\x0d\x07\xbd\x62\xef\x58\xe9\x3c\x64\xc6\xed\x50\x9a\xe6\x0a\x34\xc5\xbd\xbe\x07\x71\x3d\x19\x8e\x86\x11\x04\xe0\x2a\x49\x2c\x51\xed\xd9\xf1\x99\xef\x2e\xce\x80\x39\x28\xd1\xc2\xaf\x77\xf8\xc5\x67\xbe\x38\x0b\xc6\x51\x34\x1e\x05\xe3\xc9\xe8\x32\x88\x76\xcc\x6c\xe8\x12\x1f\x51\xed\x9f\x2e\x67\x93\xb3\xf3\x78\xcc\xd3\xc9\xd7\xd1\x58\xf0\x09\x8f\x2e\x4f\x4f\xd9\x65\x94\x8a\xd1\x39\x4f\xce\xf9\x25\xa2\x48\x59\x92\x46\x93\xe8\x74\x72\x76\x7a\x11\x25\x2c\x62\xe9\xe4\xf2\xf4\x6c\x3c\x3a\x9f\x8c\x93\x24\xfa\x2a\x46\xf8\x93\x92\x6e\x3b\x2e\xb9\x43\x31\x46\x47\x07\x3a\xc9\xcb\x2a\x86\xd1\x70\x7c\xb6\x7b\x75\xc8\x2b\x2b\x69\xeb\xf7\x07\x9f\x68\x6f\xc9\xac\xac\xa5\xc2\x0c\xc5\x9e\x80\x01\xa0\xae\xfb\x7e\xcf\xbb\x3b\xff\x3e\x9b\xce\xae\xd6\xb3\xf9\x72\x75\x75\x7b\xbb\x9e\xce\x1e\xd6\x7f\x2d\x96\xab\xbd\x02\x6a\xa6\x2a\x3c\x46\x10\x3e\x01\xbe\x5e\xcc\x57\x57\xb3\xf9\xcd\xc3\x9b\xe8\x95\xb3\xa1\x32\x9c\xa9\xf7\x31\xbf\x3f\xde\xfe\x7d\x35\x5f\xcf\xae\xa7\xff\xb7\xd0\xb7\xa4\xf2\x83\x0c\x1f\x57\x8c\xc4\x3f\xc3\x7b\x58\x2c\x56\xeb\xbb\xc5\xe3\x7c\xe5\xf1\xde\x44\xf1\xea\xb9\x33\xb4\x87\xe6\xce\x6b\x69\x8f\x05\xc7\x8a\x39\x40\xa3\xc2\xf7\xad\xd0\xbe\x3b\xd0\x4f\xaf\xd0\x3e\xce\xbb\x6d\xbe\x75\x06\xf7\x43\xfb\x96\x0f\xae\xc5\x7e\x50\x6f\x20\xfc\xd5\x81\xd8\x6d\xf6\xc9\xe6\xc2\x0d\xbb\xf5\x2e\x59\xe5\x30\x8e\x86\x93\x93\x83\x2d\x6c\x0c\xff\x05\x00\x00\xff\xff\x0e\xf2\x7c\x51\xa9\x0b\x00\x00") + +func testE2eTestingManifestsSchedulingNvidiaDriverInstallerYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsSchedulingNvidiaDriverInstallerYaml, + "test/e2e/testing-manifests/scheduling/nvidia-driver-installer.yaml", + ) +} + +func testE2eTestingManifestsSchedulingNvidiaDriverInstallerYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsSchedulingNvidiaDriverInstallerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/scheduling/nvidia-driver-installer.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsServiceloadbalancerHaproxyrcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x53\xcd\x8e\xd3\x30\x10\xbe\xe7\x29\x46\xe2\x4a\xba\x8d\xb2\xa0\x62\x89\xc3\x6a\x91\xe0\x18\x41\xc5\x7d\xea\x8e\x1a\x6b\x27\x1e\x63\x4f\xc3\x06\xc4\xbb\xa3\xa4\x6d\xea\x5d\xda\x05\x7c\xf4\x37\xfe\xfe\x26\x79\x70\x7e\x6b\xe0\x33\x05\x76\x16\xd5\x89\xbf\x17\xaf\x51\x98\x29\x16\x18\xdc\x57\x8a\xc9\x89\x37\xd0\x57\x45\x47\x8a\x5b\x54\x34\x05\x80\xc7\x8e\x0c\x24\x8a\xbd\xb3\x54\xb2\xe0\x76\x83\x8c\xde\x52\x2c\x00\x18\x37\xc4\x69\x1c\x03\xc0\x10\xae\xce\x01\xf4\x19\x7d\x0a\x64\xc7\x37\xf1\xe0\x25\x19\xa8\x0a\x80\x44\x4c\x56\x25\xfe\x2f\x1b\x80\x52\x17\x18\x95\x0e\x2f\x73\xf3\xe3\xc9\x3d\xfe\x9d\xf9\x4f\x76\x80\x93\xdf\xf1\x58\xf1\x8a\xce\x53\x9c\x19\x4b\x70\x1d\xee\xc8\xc0\xc3\x2a\x2d\x76\x36\x2e\x9c\xdc\x1c\xe9\x79\x63\x96\x8b\x6a\xe6\x9d\xe6\x9a\x3d\x73\x23\xec\xec\x60\xe0\x8e\xbf\xe3\x90\x66\x9c\x5d\x4f\x9e\x52\x6a\xa2\x6c\xe8\x6c\x18\xa0\x55\x0d\x1f\x49\xf3\x2b\x80\x80\xda\x1a\xb8\x69\x09\x59\xdb\x1f\x4f\x21\x89\x6a\x60\xb5\x5c\x55\x4f\xae\x93\x6d\x69\x5c\xe6\xa7\xf5\xba\xc9\x00\xe7\x9d\x3a\xe4\x0f\xc4\x38\x7c\x21\x2b\x7e\x9b\x0c\xd4\xcb\x6c\x42\x5d\x47\xb2\xd7\x19\x7c\x33\x63\x87\xaf\xa3\xc5\x10\xe5\x71\x28\x72\xfd\xac\xf1\x57\x70\xc7\x3c\x85\x38\xf5\x7e\xce\x5c\x9e\x1b\x6d\x8e\xae\xf3\xe0\x92\xf4\xc2\x75\x88\xa2\x62\x85\x0d\xac\xef\x9b\x4c\xc6\xef\x9c\x7f\x9c\x84\x5e\x10\xb8\xbd\xad\xaf\x28\xfc\x93\x46\x37\xa4\x6f\x7c\x9d\xbd\xae\x97\x6f\x2f\xd2\x3f\x03\xae\xd1\x1f\xab\x84\xa4\xa8\x2f\x84\xa8\xde\xd5\x97\x65\x9e\x01\x97\x65\x22\x25\xd9\x47\x4b\xc9\xc0\xcf\x5f\xe7\x1f\x23\xee\xb2\xa5\x95\x50\x96\x6a\x43\x79\xda\xd8\xfb\x29\xb8\x19\x63\xbc\x9e\x7a\x4e\xbd\x35\x63\x97\xbf\x03\x00\x00\xff\xff\x95\xb6\xdf\x12\x58\x04\x00\x00") + +func testE2eTestingManifestsServiceloadbalancerHaproxyrcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsServiceloadbalancerHaproxyrcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml", + ) +} + +func testE2eTestingManifestsServiceloadbalancerHaproxyrcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsServiceloadbalancerHaproxyrcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsServiceloadbalancerNetexecrcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x90\xcd\xee\xd3\x30\x10\xc4\xef\x79\x8a\x91\x38\x27\x6d\xe9\xa5\xf2\x0d\xc1\xbd\x08\x21\xee\xdb\x78\xdb\x58\x75\x76\x2d\xef\xa6\x85\xb7\x47\x2e\xfd\xe2\xbf\xb7\x8c\xe6\x37\x33\x31\x95\xf4\x8b\xab\x25\x95\x80\xcb\xa6\x3b\x27\x89\x01\x3f\xb8\xe4\x34\x92\x27\x95\xaf\x2a\x5e\x35\x67\xae\xdd\xcc\x4e\x91\x9c\x42\x07\x08\xcd\x1c\x20\xec\xfc\x9b\xc7\xce\x0a\x8f\x4d\xfd\x84\x2f\x66\xcb\xcc\x86\x3f\xba\x60\xa2\x0b\x63\x0b\xd1\xc8\x86\x24\x4d\xab\x18\xf3\x62\xce\x75\xe8\x80\xfa\xaf\xc5\x02\xb6\x1d\xe0\x3c\x97\x4c\xce\x2d\x07\x78\xef\x6a\x97\xe9\xc0\xd9\x1e\x5f\x00\x95\xf2\xaa\x6f\xc2\x63\x42\xbb\x51\xc5\x29\x09\xd7\x27\xd0\x7f\x18\xfc\x88\x49\x33\x9d\x38\xe0\x34\xd6\x21\xe9\xea\xbc\x1c\xb8\x36\x8b\xf5\xfc\x99\x7b\x67\xf3\xfe\xe6\xb0\xd5\x1d\x0c\x9b\x61\xfd\x84\x8b\x56\x7f\x9b\xd4\xbf\x7a\xbf\x6b\xf5\x80\xdd\x7a\xf7\x32\xb7\xc7\xf9\x39\x25\x43\x32\xb8\xe2\xa8\x75\x64\xf8\xc4\xc6\x28\x1a\x6f\x5a\x26\x89\x50\x41\x4c\xc7\x23\x57\x16\xc7\xa4\xe6\x36\xfc\x9f\xb1\xff\xb6\x0f\x58\xec\x06\x23\xea\x55\xae\x54\x23\xa8\x24\x34\xfc\xc4\xde\xf2\xda\xdf\x22\x89\x39\x53\x7c\xe7\x5b\xe0\x7d\xdc\xa6\xfb\x1b\x00\x00\xff\xff\x4a\x68\xfa\x6c\xfb\x01\x00\x00") + +func testE2eTestingManifestsServiceloadbalancerNetexecrcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsServiceloadbalancerNetexecrcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml", + ) +} + +func testE2eTestingManifestsServiceloadbalancerNetexecrcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsServiceloadbalancerNetexecrcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsServiceloadbalancerNetexecsvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\xce\xb1\x6a\x03\x31\x10\x04\xd0\x5e\x5f\x31\x3f\x10\x48\xba\xa0\x36\x7d\x38\xc8\x91\x7e\xad\x1b\x6c\x61\x9d\x76\x91\x96\xc3\xfe\x7b\x73\xf2\x81\x1b\x77\xcb\x1b\x86\x1d\xb1\xfc\xcf\xd6\xb3\xd6\x88\xed\x2b\x5c\x73\x5d\x22\xfe\xd8\xb6\x9c\x18\x56\xba\x2c\xe2\x12\x03\x50\x65\x65\x44\xa5\xf3\xc6\x14\x80\x22\x27\x96\xbe\x27\x80\x98\xbd\xa2\x6e\x4c\x3b\xcf\x77\x63\xc4\xaf\x2e\x9c\xb4\x79\x00\x4c\x9b\x8f\xc2\xc7\x38\x23\xbe\x3f\x47\xdb\xa5\x9d\xe9\xd3\x41\x07\x5a\x53\xd7\xa4\x25\x62\xfe\x99\x86\x3c\x07\x5c\xdc\x2d\x00\x9d\x85\xc9\xb5\xbd\xf9\xff\x08\x00\x00\xff\xff\x99\xb6\xda\xa2\xd2\x00\x00\x00") + +func testE2eTestingManifestsServiceloadbalancerNetexecsvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsServiceloadbalancerNetexecsvcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/netexecsvc.yaml", + ) +} + +func testE2eTestingManifestsServiceloadbalancerNetexecsvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsServiceloadbalancerNetexecsvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/serviceloadbalancer/netexecsvc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsServiceloadbalancerNginxrcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4c\x8e\x4b\x4e\xc6\x30\x0c\x84\xf7\x39\x85\x2f\x50\xf8\xbb\x43\xde\x72\x01\xc4\x82\xbd\xdb\x5a\xad\x45\xe2\x58\x8e\x85\xe0\xf6\x28\x94\x3e\x66\x37\xc9\x37\x33\x26\x93\x0f\xf6\x26\x55\x11\xbe\xc6\xf4\x29\xba\x20\xbc\xb3\x65\x99\x29\xa4\xea\x6b\xd5\xf0\x9a\x33\x7b\x2a\x1c\xb4\x50\x10\x26\x00\xa5\xc2\x08\xe5\x67\xd0\x55\xf4\x3b\x35\xe3\xb9\x3f\xfb\x1e\x6c\x08\x63\x02\x08\x2e\x96\x29\xb8\xff\x00\xdc\xe3\x5d\x99\x26\xce\xed\x70\x00\x64\x86\xb0\xd7\x75\x7b\x54\x76\xcd\x55\x83\x44\xd9\x4f\x7c\xf8\xbf\xe0\x8f\xdf\x22\xac\x9d\x3d\x52\x68\x65\x84\xc9\x9c\xda\x46\x1a\xdb\xf3\x05\xe1\xf8\xf4\x38\x41\xab\x1e\xb7\xfd\xe1\x9a\x79\xab\x1e\x08\x2f\x8f\xf4\x1b\x00\x00\xff\xff\xdc\xf9\xe9\xab\x1e\x01\x00\x00") + +func testE2eTestingManifestsServiceloadbalancerNginxrcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsServiceloadbalancerNginxrcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/nginxrc.yaml", + ) +} + +func testE2eTestingManifestsServiceloadbalancerNginxrcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsServiceloadbalancerNginxrcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/serviceloadbalancer/nginxrc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsServiceloadbalancerNginxsvcYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x8c\x41\x0a\x02\x31\x0c\x45\xf7\x39\xc5\xbf\x80\xa0\x3b\xc9\xd6\x0b\x08\x8a\xfb\xd8\x09\x5a\xec\x34\xa1\x0d\xc5\xe3\xcb\x54\x77\xee\x3e\xef\x7d\x9e\x78\xbe\x69\xeb\xd9\x2a\x63\x1c\xe8\x95\xeb\xc2\xb8\x68\x1b\x39\x29\xad\x1a\xb2\x48\x08\x13\x50\x65\x55\x46\x7d\xe4\xfa\xee\x23\x11\x50\xe4\xae\xa5\x6f\x0a\x10\xf7\x9f\xa3\xee\x9a\x36\xe8\xd6\x62\xda\xdd\x9c\x8c\xe3\x7e\x5e\xbd\x59\x58\xb2\xc2\xb8\x9e\xce\x93\x7c\xcb\xcf\x08\x27\xa0\x6b\xd1\x14\xd6\xfe\xba\xf4\x09\x00\x00\xff\xff\x55\x0d\xe9\x5c\xaa\x00\x00\x00") + +func testE2eTestingManifestsServiceloadbalancerNginxsvcYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsServiceloadbalancerNginxsvcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/nginxsvc.yaml", + ) +} + +func testE2eTestingManifestsServiceloadbalancerNginxsvcYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsServiceloadbalancerNginxsvcYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/serviceloadbalancer/nginxsvc.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetCassandraControllerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x54\x41\x6f\xd3\x4c\x10\xbd\xe7\x57\x8c\xfa\x5d\xbf\xb8\x4e\xa1\x82\xee\xcd\x6a\x8c\xa8\x50\x5a\x2b\x41\x05\x71\x89\xa6\xeb\x49\xba\x74\x77\x67\xd9\x5d\x1b\x2a\xc4\x7f\x47\x8e\x69\xe2\xd8\x2e\xe2\xd0\xb9\xf9\xcd\xbc\x37\xcf\xcf\x23\xa3\x53\xb7\xe4\x83\x62\x2b\xa0\x9e\x4d\x1e\x94\x2d\x05\x2c\xc9\x69\x25\x31\x2a\xb6\x97\x6c\xa3\x67\xad\xc9\x4f\x0c\x45\x2c\x31\xa2\x98\x00\x58\x34\x24\x40\x62\x08\x68\x4b\x8f\x13\x80\xff\xe0\xe3\x3d\x81\xc6\x3b\xd2\x01\xbe\x2b\xad\xe1\x8e\x00\x9d\xd3\x8a\x4a\xc0\x2a\xb2\xc1\xa8\x24\x6a\xfd\xb8\x1b\xde\x78\x36\x10\x0f\x0c\x65\x77\x4f\x8e\x4b\x88\x64\x9c\xc6\x48\xff\x83\xda\x80\xe5\x08\x81\xe2\x8e\xd3\x8e\x36\xeb\x9b\x27\x74\xae\xeb\x20\x38\x92\x4d\xcb\xb7\xde\x83\x80\xb3\xbd\xab\x40\x9a\x64\x64\xff\xf2\xbe\x92\x1d\xe9\x49\xbf\xb5\x36\x62\x0e\xf6\xe4\x76\xa4\x1b\x65\x53\xdd\x37\x6b\x6a\x40\x07\x78\x7a\xbf\xa6\x24\xdb\x88\xca\x92\xef\x50\xa6\x20\xd9\x18\xb4\xe5\x01\x6a\xe1\x53\x5f\xd9\x24\xdc\x77\x50\x4f\x81\x2b\x2f\x29\x1c\x8f\x6a\x65\x54\xec\x61\x00\xd2\x55\x02\xd2\xe4\xbc\x03\x93\xad\xfb\x4b\xda\x7b\x58\x64\x9f\xd7\xef\xf3\xac\x58\xaf\xae\xbe\xe4\x3d\x9d\x1a\x75\x45\x02\xce\x67\x67\x8b\x51\xee\x8e\x77\x9d\x7f\x7a\x9e\x3a\x4b\xd3\x71\xea\x65\xb6\x5a\x65\xd7\xf3\x65\xb6\x5e\xe5\xf9\x7c\x5d\x2c\x6f\x6e\xaf\xe6\xf9\x72\x5c\xe5\x44\x71\xf2\xf0\x36\x24\xfb\x74\x93\x0f\xd5\x1d\x79\x4b\x91\xc2\x8a\xa8\x2c\x3c\xd7\xaa\x24\x7f\x32\xba\xaa\xb8\x99\xaf\xaf\xb3\x45\xbe\x2a\xb2\xcb\x51\x9b\xef\x3c\x9b\x7e\x84\x00\x1b\x45\xba\x5c\xd2\x66\xd8\xf9\xd3\x2b\x30\xde\x8b\xfd\x59\x24\xcd\xb2\xe0\x50\xd2\xb3\x26\xae\x8a\x17\xdf\x1e\x22\xc6\x2a\x24\x8e\xcb\x23\x71\x65\x70\x4b\x02\xb6\xd2\x27\x8a\x4f\xb7\xcc\x5b\x4d\xd3\x80\xc6\x69\x0a\xa7\xfb\x14\x45\x3d\x7b\xd5\x21\x0d\xff\x0f\x4f\xe5\xd8\xf7\x8f\x6c\x7a\x38\xe8\x82\x7d\x14\xf0\x26\x4d\xd3\x9e\xd7\x56\x50\xd9\xe8\x71\x6a\xb9\xec\x07\x33\x14\x98\x8d\x0a\x44\x1d\xa6\xff\x2c\x32\xbb\xb8\x18\x15\xf9\x6a\x7e\xfc\x9d\x79\x91\xbe\x3e\x1b\x65\xca\x6f\xba\x83\xd7\xac\x2b\x43\x0b\xae\xec\x30\x11\xd3\xa0\xed\x77\x39\x84\xbc\x6e\x8e\x63\x54\xb8\xd3\x68\x55\x8f\xfe\x0c\x83\x99\xa6\xc8\xb8\xf8\x38\x57\x5e\xc0\xcf\x5f\x93\xc9\xef\x00\x00\x00\xff\xff\xa4\xa9\x50\x3c\x08\x06\x00\x00") + +func testE2eTestingManifestsStatefulsetCassandraControllerYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetCassandraControllerYaml, + "test/e2e/testing-manifests/statefulset/cassandra/controller.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetCassandraControllerYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetCassandraControllerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/cassandra/controller.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetCassandraPdbYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4c\xcc\x3d\xae\xc2\x30\x10\xc4\xf1\xde\xa7\x98\x0b\x3c\x3d\x85\xd2\x1d\x88\x92\x82\x8a\x7e\x6c\xaf\x60\x85\x3f\x56\xb6\x13\x89\xdb\xa3\x88\x26\xf5\x7f\xe6\x47\xd3\x87\xf4\xa1\xad\x7a\x58\xcb\x1a\x3f\xff\xdb\x12\x64\x72\x71\x6f\xad\xc9\xe3\xde\xd2\x55\x47\x5f\x6d\x6a\xab\x97\x35\x3d\x65\xba\x22\x93\x89\x93\xde\x01\x95\x45\x3c\x22\xc7\x60\x4d\x9d\x7f\x96\x82\x03\x32\x83\xe4\xb1\x77\xc0\x52\x38\x0c\xdc\x30\x89\x7b\x28\x5a\xcf\x1b\x35\x33\x64\xf1\x38\x39\x60\x48\x96\x38\x5b\xff\xdd\x0a\x67\x7c\xdd\x0e\x0e\x40\xb3\xa3\xf4\x0d\x00\x00\xff\xff\x20\x15\x65\x49\xbc\x00\x00\x00") + +func testE2eTestingManifestsStatefulsetCassandraPdbYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetCassandraPdbYaml, + "test/e2e/testing-manifests/statefulset/cassandra/pdb.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetCassandraPdbYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetCassandraPdbYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/cassandra/pdb.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetCassandraServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x8d\x31\xca\x42\x31\x10\x84\xfb\x3d\xc5\x5c\xe0\x87\x5f\xb1\x71\x6f\x60\x23\x82\x60\xbf\x26\x53\x04\xf3\x92\xb0\x1b\xdf\xf9\xe5\x89\x85\x85\xdd\xcc\x30\x7c\x9f\x8d\x72\xa3\x47\xe9\x4d\xb1\xee\xe4\x51\x5a\x56\x5c\xe9\x6b\x49\x94\x85\xd3\xb2\x4d\x53\x01\xaa\xdd\x59\x63\x4b\x80\x8d\xa1\x48\x16\x61\x2d\xbb\x09\xd0\x6c\xe1\xf7\x12\x83\x69\xbb\xa6\xfa\x8c\x49\x3f\x5d\x14\xe7\xde\x28\xc0\xe8\x3e\x3f\x94\xbf\x77\x51\x1c\xff\x0f\x7b\x01\x82\x95\x69\x76\xff\xa9\x78\x05\x00\x00\xff\xff\x9d\xcf\x54\x9b\xa7\x00\x00\x00") + +func testE2eTestingManifestsStatefulsetCassandraServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetCassandraServiceYaml, + "test/e2e/testing-manifests/statefulset/cassandra/service.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetCassandraServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetCassandraServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/cassandra/service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetCassandraStatefulsetYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x56\xdf\x6f\xe3\x36\x0c\x7e\xcf\x5f\x41\x64\x7b\xd8\x80\xd9\x49\xee\x76\xd8\xea\xb7\x20\xc9\x6e\xc5\xf5\x47\x10\x77\xbb\x61\xc3\x10\x30\x12\xdb\x68\x95\x25\x9f\x48\x67\xcd\x7f\x3f\xc8\x49\x5c\xbb\x71\x8b\x7b\x98\x9f\x8c\x8f\xfc\xc8\x8f\x94\x08\x0a\x4b\xf3\x3b\x05\x36\xde\x65\x80\x65\xc9\xa3\xdd\x64\xf0\x68\x9c\xce\x20\x17\x14\xba\xaf\x6c\x4e\x32\x28\x48\x50\xa3\x60\x36\x00\x70\x58\x50\x06\x0a\x99\xd1\xe9\x80\x03\x2e\x49\x45\x9c\x29\xec\x8c\xa2\x9b\x17\x66\x80\x40\xa5\x35\x0a\x39\x83\xf7\xb5\x9b\x25\x25\x3e\x44\x0a\x40\x81\xa2\xb6\x57\xb8\x21\xcb\x07\x00\xa2\x8a\x2e\x5f\xa8\x28\x2d\x0a\x1d\x19\x2d\x29\xf1\xb3\x1d\x72\x0f\x1d\xe0\xa4\x30\x7e\xca\x3b\x41\xe3\x28\x34\x94\xe4\xac\xa2\x53\x28\x53\xe0\x03\x65\xf0\xa0\x42\x6a\xfc\xe8\xc1\xfb\x07\x4b\x09\x63\x51\x5a\xe2\x51\xe3\x9e\xed\x26\xef\xbb\x94\x65\x65\xed\xd2\x5b\xa3\xf6\x19\x4c\xed\xbf\xb8\xe7\xc6\x5e\xfa\x20\x2d\xb1\xc9\xb3\x9e\xa5\x0f\x92\xc1\x4f\xe3\xf1\xb8\xb1\x9e\x7a\x6d\x9c\x04\x4c\x9c\xd7\xf4\x26\x71\x72\x46\x14\xcb\xc9\x57\x91\x27\x17\x17\x67\xe4\x7f\x8a\xa7\xd7\x19\x17\xe3\x1f\xdf\x9d\x31\xd4\x17\xdb\x60\x81\xd8\x57\x41\x51\xab\xd8\x08\x7e\xa9\x88\xa5\x83\x81\x2a\xab\x0c\x86\xef\xc7\xe3\x62\xd8\x86\x0b\x2a\x7c\xd8\x67\x30\xf9\x68\x1a\x98\x49\x55\xc1\xc8\x7e\xe6\x9d\xd0\x93\xb4\xc3\x28\x2c\x71\x63\xac\x11\xd3\x4d\x09\x80\x5a\x77\x81\x58\xce\xe5\x72\xb6\xbe\xba\x9d\x7d\x6a\x0c\xd6\xdc\x93\xda\x2b\x4b\x6d\xdf\x32\x50\x2e\xbe\xec\xd2\xe9\xe9\xf9\x36\x35\xd9\x7d\x51\xa0\xeb\xc9\x33\xda\x18\x37\xe2\xed\x19\x9e\xa8\x33\x28\x1e\x91\x78\x6f\x41\x07\x34\xae\x31\x93\xdb\xb5\xc3\x9e\x6e\xeb\xf5\xf4\x8f\xf5\xaf\x8b\xe9\x72\x9d\x5f\xfe\xb9\xe8\xc4\xda\xa1\xad\x28\x83\x0f\x93\x77\xd7\x3d\xbc\x9a\x73\xb3\xf8\xfc\x1a\x6d\x32\x1e\xf7\xd1\x96\xb7\xf3\xf5\xcd\xf4\x7a\x91\x2f\xa7\xb3\x1e\xde\x2f\xc1\x17\x2f\x8b\xbf\x37\x64\xf5\x8a\xee\x5f\xe2\x47\xcb\x12\x65\x9b\x35\xd3\x9c\xc6\x34\x5c\xa2\xa2\x9e\xe4\xb3\x69\x9e\x4f\x6f\xe6\xab\xe9\x3a\x5f\x2c\xe6\x79\x9f\xec\x61\x33\x8e\xc9\x38\x6d\xfe\xd3\x6f\xbf\xeb\x08\xff\x3e\xe5\x9d\x4a\x95\xad\x58\x28\xa4\xd6\x2b\xb4\xc3\x37\xf3\xcd\xae\x7e\xcb\xef\x16\xab\x3a\x42\x6f\xda\x4f\x3f\xcf\xa9\xf0\x6f\x07\x99\xcf\x7a\xa9\xf3\xd9\x24\xf9\x1a\xfa\x6a\xda\xba\xa6\xed\x00\x2b\x54\x8f\x6f\x85\x88\xa5\x5f\x2e\xff\xc7\xc3\x62\x41\xa9\x38\x2d\xbd\x6e\x85\x0d\x84\xda\x38\x62\x5e\x06\xbf\xe9\x4c\xcf\xf9\xa0\xf4\x8e\xc9\x71\x48\x36\xf8\x62\x4c\xce\x86\x24\x81\x51\x4c\xb6\x4f\xca\x98\x29\xed\xb8\x1b\x67\xc4\xa0\x9d\x93\xc5\x7d\x4e\xca\x3b\xcd\x19\x4c\x3e\xb4\x3c\xc4\x14\xe4\x2b\x69\x8c\xcf\xb6\x6f\xe0\x6e\x4b\x4c\xb0\xf3\xb6\x2a\x08\x0a\x5f\x39\x61\xc0\x40\x50\xc6\xcd\xc8\x42\x4e\xd2\xe8\xb3\xaf\x41\x6b\x1e\x09\x8c\xb3\xc6\x11\x28\x8b\xa6\xe0\x1f\x5a\xa1\x36\x95\x80\xf3\x02\xf4\x84\x4a\xec\x1e\x36\xa4\xb0\x62\x02\xd9\x52\x7d\x2c\x0c\x8e\x48\x83\xf8\xc3\xea\x6b\xfc\xbc\x23\xf0\xf7\xad\x40\x91\xc0\xc7\x15\x0c\xa5\xd7\x47\x79\x9c\x36\x3e\x07\xe0\xba\x96\xdb\x5e\x29\x2f\xd6\x59\x12\xe7\xab\xd5\x88\xba\xbe\xc3\x81\x3e\x2f\xb1\xf5\xd1\xe9\xd4\x8b\x58\xa8\xf2\x6e\x47\x41\x0e\x6a\x8f\xcd\x39\x14\x0c\x9b\x7d\xad\x2f\x2e\x85\xe0\xad\xa5\x50\x53\xd1\xe9\x43\x74\xd2\x80\x52\x7b\x94\x28\x5b\x86\x82\x9c\x18\xef\x22\xbc\xf1\x3b\x4a\x6b\x6f\xed\xeb\x46\x1d\x9b\xc3\xb1\xa7\x50\x06\xaf\x2b\x15\x7d\xa1\x72\x62\x2c\x30\x6b\xf8\x38\x5b\x2c\x9b\x83\x98\x1b\x7e\x04\x1f\xc0\xcb\x96\x42\x6d\x2e\xf5\xe0\xd4\x8b\x59\x54\x77\x77\x7c\x2e\xd4\x3d\x49\xce\xde\x0b\xaf\x76\xa7\xfd\x4a\x40\xa5\x88\xf9\xda\x6b\xe2\x0c\xfe\x82\xe1\x8a\x50\x7f\x0e\x46\xe8\xd6\x29\x1a\xc2\xdf\x83\xd3\xdd\x3f\x5b\x72\x7d\x2b\x8e\xc5\x87\xfa\x25\x11\x77\xd9\xe0\xbf\x00\x00\x00\xff\xff\xe4\xd5\x43\x1f\x72\x09\x00\x00") + +func testE2eTestingManifestsStatefulsetCassandraStatefulsetYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetCassandraStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/cassandra/statefulset.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetCassandraStatefulsetYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetCassandraStatefulsetYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/cassandra/statefulset.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetCassandraTesterYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x52\xbb\x6e\x1b\x31\x10\xec\xef\x2b\xf6\x07\xa8\x87\xd3\x08\xec\x6c\x08\x48\xe3\x42\x80\x81\xf4\x7b\xe4\x40\xb7\x30\x8f\x24\xc8\xd5\x05\x97\xaf\x0f\xce\xb1\x24\x9e\xad\x2a\x5b\x72\x38\xcb\x19\xce\x70\x96\x5f\x28\x55\x52\xb4\xc4\x39\xd7\xed\xb4\xef\xde\x25\x7a\x4b\x47\xe4\x90\xe6\x11\x51\xbb\x11\xca\x9e\x95\x6d\x47\x14\x79\x84\x25\xc7\xb5\x72\xf4\x85\x8d\xa2\xaa\xa9\x28\x13\x4a\x57\x33\xdc\x72\xa7\x20\x07\x71\x5c\x2d\xfd\xe8\x88\x2a\x02\x9c\xa6\xb2\x20\x44\x23\xab\x1b\x5e\xb9\x47\xa8\xff\x0e\x68\x79\xd7\x52\xbb\x87\x48\x31\xe6\xc0\x8a\x4f\x4e\xf3\xfe\x32\x61\x45\x7f\xb8\x80\xe8\x2a\x66\x19\x97\xa2\xb2\x44\x94\x1b\xc9\x7c\x1a\xf9\xca\x5a\x46\x46\x3e\xc3\xd2\xfb\xa1\x6e\xce\xae\x6c\x24\x6d\xef\x76\xf1\x84\x0f\xcb\x76\xb7\xd9\xaf\x09\xa7\x4b\x08\xa7\x14\xc4\xcd\x96\x9e\xc3\x6f\x9e\xeb\x0d\xcf\xa9\x68\x23\xd7\xdc\xf5\x9c\x52\x51\x4b\x87\xdd\x61\x77\x43\x0b\xd8\x4b\x44\xad\xa7\x92\x7a\xdc\x59\x44\x83\x6a\xfe\x09\x6d\x8f\x88\x32\xeb\x60\x69\x3b\x80\x83\x0e\x7f\xd6\xd0\xf7\xe5\x44\x12\x45\x85\xc3\x11\x81\xe7\x37\xb8\x14\x7d\xb5\xf4\xd4\x5c\xc8\x28\x92\x7c\x03\x19\x63\xba\xb6\x26\xf9\xc3\xe4\x76\xda\xf7\x50\xbe\xb6\xe5\x94\xfc\x51\x6a\xb9\x64\x95\x14\x5f\x2e\xfe\x8c\x47\xb5\x59\x7e\x0e\xc5\x64\xdf\x77\xeb\x14\xb3\xef\xd7\x59\x5c\xd3\x1b\x25\x3e\x4f\x2c\x81\xfb\x00\x4b\xfb\xff\xaa\xd3\x57\x03\xb7\x8a\xbf\xa1\x4c\xe2\xb0\x12\xda\xaa\x7a\xd0\xab\xef\xad\xb9\x2a\x6d\x42\x36\xeb\xaf\x5f\x2b\x7e\xd4\xf6\x39\xc3\xd2\x6b\x62\xff\xc2\x81\xa3\x43\xe9\xfe\x06\x00\x00\xff\xff\x6a\x4a\xab\x39\x98\x03\x00\x00") + +func testE2eTestingManifestsStatefulsetCassandraTesterYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetCassandraTesterYaml, + "test/e2e/testing-manifests/statefulset/cassandra/tester.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetCassandraTesterYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetCassandraTesterYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/cassandra/tester.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetCockroachdbServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x94\x41\x6f\x24\x45\x0c\x85\xef\xfd\x2b\x9e\x66\x0f\x7b\xd9\xcc\x86\x95\x80\x55\xdf\x10\x70\xc8\x25\x8a\x08\xe2\x8a\xdc\x55\x9e\xa9\x22\xd5\x76\xab\xec\x9e\x61\xfe\x3d\xaa\xea\x99\x80\x42\xf6\xda\xf6\xfb\x5c\xb6\x9f\x9b\x96\xfc\x07\x57\xcb\x2a\x23\x4e\xdf\x0d\x2f\x59\xe2\x88\x67\xae\xa7\x1c\x78\x98\xd9\x29\x92\xd3\x38\x00\x1f\xf0\x7b\xca\x06\xdb\x42\x50\x29\x17\xf0\xdf\xd9\xdc\xe0\x8a\x50\x99\x9c\xf1\xcb\xe3\x33\x58\xbc\x66\x36\x1c\xb4\x82\x29\x24\x2c\x1a\x91\x05\x9e\x18\xe6\xe4\x7c\x58\x4b\xe7\x19\x3b\x6c\x0d\x09\x9e\xc8\x5b\xf8\x82\x40\x82\xca\xa6\xe5\xc4\x9b\x56\x3d\x71\xfd\x68\x78\x78\x02\xc5\x58\xd9\x8c\x6d\x8f\x07\x47\x54\x36\x88\x7a\x27\x5d\xab\x13\x8a\x52\xbc\x9b\xa8\x90\x04\x8e\xf8\xb9\xac\xe6\x5c\x9b\x56\x22\x2c\xe9\x5a\x62\xd3\x60\x62\xac\xc6\x11\x31\x57\x0e\x5e\x2e\x98\x2e\x08\x25\xb3\xb8\x75\x5e\x16\xcc\x6a\x8e\x90\x6b\x58\x67\xf3\x86\xb3\xfd\x00\x08\xcd\x3c\x22\x68\x78\xa9\x4a\x21\xc5\x69\x00\x0a\x4d\x5c\xac\x8d\x08\xa0\x65\x79\x1b\x26\x11\x75\xf2\xac\x72\xcd\xf9\x80\x5f\x85\xa6\xc2\xa0\xd5\x75\x26\xcf\x01\xb3\x4a\x76\xad\x59\x8e\xd0\x03\xa8\x14\x64\xb9\x56\xc5\x39\xb1\xe0\xa9\xea\xcc\x9e\x78\x35\x64\x43\x5d\x45\x5a\xee\x75\xa8\x61\x6b\x73\xdf\xe9\xcb\x6b\xe6\x3e\xeb\x67\x0b\x95\x16\x1e\xb1\xf3\xba\xf2\xee\x9d\x84\x85\x3c\x8d\xd8\xfd\xd9\x16\xb3\xda\xe7\x13\x55\x7b\x37\x4d\xab\x8f\xd8\x7d\xbd\xff\x7a\xbf\x1b\x6c\xe1\xd0\x5a\x69\x1f\x7b\x4f\x77\xd8\xe2\x5f\x7e\xf8\xf2\xfd\x8f\x5d\xed\x54\x8f\xec\x4f\x6f\xbe\x6e\xd3\x3b\xd6\x25\xfc\x47\xd4\x98\xff\xd3\xbc\x7e\xdc\x24\xc9\x7d\x19\x70\x6b\xf4\xe1\x69\xc4\xa3\x0a\x0f\x80\x71\xe1\xe0\x5a\xbf\x39\xfd\xab\x6b\xb3\x41\x98\x23\xc7\xe6\xd5\x99\x5e\xb8\x0f\x6e\x61\xae\x77\x87\x2c\x91\x2b\xce\x5a\x5f\x5a\xd3\x0b\xd7\x72\xe9\x7e\x71\x45\xe2\xb2\x80\x4e\x9a\x63\x47\x71\x3c\x32\x02\xd9\xb6\x95\xca\xaf\x5b\xc2\x3d\x82\xce\x6c\x58\x17\xd0\xc1\xb9\xa2\xa8\xf5\x0d\xb9\xa1\x1d\x50\x07\xb6\x17\xb4\x63\xe9\xac\xc8\x21\x47\x6e\x9c\xe6\x70\x64\xbf\xf9\xf3\xd5\xcb\xc2\xe7\x5b\xc7\xd0\x0a\xaf\x97\xf6\xa4\xbf\x34\x0b\x48\xb6\xd3\xcb\x72\xec\x30\x15\xde\xe3\xe1\xd0\x28\x9b\xdc\xde\xe8\xbb\x89\xfe\xad\x91\xe8\xc4\x9d\xc4\xf1\x3d\xd6\x27\x9c\xf9\x63\x04\x4b\x6c\x0d\x9d\xb3\x27\xf8\x59\x61\xbc\x50\x6d\x6f\xbb\x52\x0d\x25\x9b\x73\xb7\xe2\x76\xc0\x30\x9a\xf9\xf6\x8b\xd8\x46\x26\x71\xd1\x2c\xfe\x09\xe7\x94\x43\xc2\xb9\xd7\x9f\x18\x27\xae\x17\x4c\x14\x9b\x6b\x97\x75\x2a\xd9\xd2\xa3\xfa\x6f\x4c\xf1\xf2\xd3\xed\xd0\x47\x34\xdb\x0e\xff\x04\x00\x00\xff\xff\x6a\xf0\xa9\x28\xa3\x04\x00\x00") + +func testE2eTestingManifestsStatefulsetCockroachdbServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetCockroachdbServiceYaml, + "test/e2e/testing-manifests/statefulset/cockroachdb/service.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetCockroachdbServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetCockroachdbServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/cockroachdb/service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetCockroachdbStatefulsetYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x57\xdf\x6f\xdb\xc8\xf1\x7f\xf7\x5f\x31\x5f\x7d\x0f\xb0\xdd\x9a\x92\x9c\xe2\xd2\x54\x80\x1f\x5c\xc7\x0d\x8c\x36\x8e\x61\x05\x77\x0f\x69\x90\x5b\xed\x0e\xc5\xad\x96\x3b\xbc\xdd\xa1\x14\xb5\xe9\xff\x5e\xcc\x92\xa2\x48\xca\x39\xa0\x40\xe5\x17\x93\x3b\xf3\xd9\x99\xcf\xfc\xa4\xaa\xec\x4f\x18\xa2\x25\xbf\x00\x55\x55\x71\xb6\xbd\x3e\xdb\x58\x6f\x16\xb0\x64\xc5\x98\xd7\x6e\x89\x7c\x56\x22\x2b\xa3\x58\x2d\xce\x00\xbc\x2a\x71\x01\x9a\xf4\x26\x90\xd2\x85\x59\x9d\xc5\x0a\xb5\x9c\x44\x0c\x5b\xab\xf1\x31\x09\x4c\x7a\x12\x93\x33\x80\x80\x95\xb3\x5a\xc5\x05\xfc\x21\x89\x3a\xd4\x4c\x41\xd4\x00\x4a\xc5\xba\xf8\x9b\x5a\xa1\x8b\xcd\x0b\x10\x5b\x86\x97\x00\x30\x96\x95\x53\x8c\xad\x4e\xcf\x24\xf9\xb9\x81\xfa\x8b\x00\x00\x07\x4b\xe5\xf7\xff\xf0\xe0\x2d\x83\x26\xcf\xca\x7a\x0c\x11\x54\x40\x08\xb5\x07\xf2\x6e\x0f\xe4\x35\x82\xf5\xc0\x05\x82\xb3\x39\xb2\x2d\x11\x28\x07\x05\x15\x99\x2b\x58\x61\x4e\x01\x3b\x28\xcb\xe7\x11\x22\xab\xc0\x68\xa0\xae\x20\xa7\x90\x34\x73\x1b\x22\x83\xe8\x4e\xe1\x81\xa1\x50\x11\x98\x00\xbf\x5a\x86\x58\x6b\x8d\x31\xe6\xb5\x73\xfb\x0e\xa7\x81\x4d\xaa\x15\x99\xf3\x08\xa5\xb2\x7e\x6c\xa3\x72\x8e\x76\x68\x04\x29\x5d\x39\xed\xd4\x3f\x16\x36\x42\xa5\x02\x5b\x5d\x3b\x15\xc0\x0e\x3c\x04\x43\x18\x41\xc1\xdb\xc7\x25\x38\xa2\x4d\x6b\x27\x71\x81\x41\xae\x8b\x60\x7d\x07\x25\x26\x44\x64\xb9\xa4\x40\x57\x81\x41\xc6\x50\x5a\x8f\xb0\x2b\x30\x69\x50\x00\x4f\x0c\x0a\xb4\xab\x23\x63\x00\xe5\x02\x2a\xb3\x17\xf7\x22\xc7\xa3\x55\x0f\x39\x28\xbf\xef\xdf\x93\x24\xae\x40\x8c\x0b\xa8\x38\x59\x95\x5b\xd7\x11\xde\xc5\x2d\x93\x10\x77\x40\xc6\x86\x94\x35\x7b\xb1\xaa\x52\x31\x02\x17\x8a\xc1\xfa\x9c\x42\xa9\xd8\x92\x07\xe5\xc8\xaf\xe5\x38\x51\x18\x6c\xa9\xc2\xbe\xc7\x80\xc8\x77\x70\x6d\x34\x0c\x6a\x6b\xc4\x2d\x25\x5c\x95\xa5\xf2\x26\x73\xe2\x68\xee\xd4\x3a\x49\xd4\x31\x79\xed\x1b\xba\xad\x5f\xc3\xdd\xc1\xc0\xb7\x7f\x1e\xb1\x9f\x92\xa7\x54\xcc\x12\xad\xa4\xa4\xda\x50\x56\x52\x67\x91\xd1\x33\x6c\xc9\xd5\x25\x82\x8d\x80\x65\xc5\x7b\xc8\xc0\xe6\xc2\x46\xa1\xe2\xd1\x59\xc5\x0a\xf2\x40\xa5\x00\x04\xdc\x5a\xaa\x85\x38\xd4\xb5\x38\x7a\xd5\xb8\x9e\x84\x76\xd6\x39\x50\x6e\xa7\xf6\x11\x56\x28\xd6\x9a\x83\x51\x92\x00\x77\x5d\xf6\x1c\x52\x3f\x6b\x8b\x78\x45\xc4\x91\x83\xaa\xba\xaa\xb1\xa5\x5a\x0f\xab\x7b\x76\x8c\xc5\xe6\x4d\xcc\x04\x70\x31\x9f\x5e\x0f\x35\x9e\x6a\xe7\x9e\xc8\x59\xbd\x5f\xc0\x43\xfe\x48\xfc\x14\x30\xa2\xe7\x63\x35\x86\x75\xaf\x36\x33\x98\x64\xe4\xb3\xc4\xe6\xcd\xec\xf0\xdf\x34\x16\x93\x81\x48\xdb\x4f\x6e\x46\x9d\xa4\xf9\xa1\xdf\xf6\x01\x1b\x87\x9e\x3e\xbc\xfd\xf2\x78\xfb\xfe\x7e\xf9\x74\x7b\x77\xdf\x9d\x02\x6c\x95\xab\xf1\x2f\x81\xca\x45\xef\x25\x40\x6e\xd1\x99\x67\xcc\x87\x6f\xdb\xf7\x4f\x8a\x8b\x45\xd7\x66\xa6\x72\x41\xac\x94\xc6\x4e\xb6\x09\xe2\x7b\xaa\x3d\xc7\x53\x53\x44\xc9\xd8\xd0\x43\x2e\x45\xb2\x41\x9d\x1c\x59\x9d\x0d\x73\xfd\xe0\xa0\xca\x73\xa1\x7a\x7f\x04\xae\xc8\xdc\x7a\xb6\xb7\x27\x07\x20\xe9\x91\x63\x08\x68\xde\xd6\xc1\xfa\xf5\x52\x17\x68\x6a\x67\xfd\xfa\x61\xed\xa9\x7b\x7d\x7f\xc8\x9d\xbe\x6a\x06\x3b\xb4\xeb\x82\x17\x70\x3d\x9f\x0f\x68\x90\xfb\xda\xbb\x3e\x62\x28\xc7\x1c\xa5\x7e\xbb\x1c\xb4\xf1\xfe\x2f\xb5\xf4\xfb\xaf\x55\xc0\x28\xc3\x25\x9e\x4a\x64\xb0\xc1\x7d\x1a\x3a\x27\x47\x00\x54\x61\x50\x02\x0c\x0f\xfe\x85\xe3\x14\xcf\x17\x30\x05\x75\xdc\xf3\x8f\x3f\xa6\x8a\x1c\xad\xf7\x7f\x95\x7b\x37\xf5\x0a\x83\x47\xc6\x38\xb5\x34\x2b\x28\xb2\xc4\xad\xd5\xd0\xdf\x2d\x99\x97\xd0\x7f\xab\x68\x16\xdb\xeb\xe9\xfc\xbf\x2c\x96\x8a\xc2\x30\xa3\x3a\x73\x9e\x28\xf0\x02\x5e\xbd\x7e\xf5\xe3\x1f\x7b\xbe\x35\x96\xad\x43\xa5\xbf\xaf\xf3\x66\xfe\x66\x7e\xa2\x52\x30\x57\xff\x8b\x74\xfe\x6e\x36\x77\xe2\x6d\x5f\x1d\x66\xde\x64\xb6\xb2\x7e\xb6\x52\xfd\xba\x6f\x2a\x1f\xf5\xd7\xe1\xab\x6f\x83\x50\x4a\xab\x4d\x7d\x4e\x06\xf2\xaf\xb5\x72\x36\xb7\x68\xe0\x97\x43\x14\x21\xcb\x7f\x91\xe6\xaa\x43\xad\xad\x72\x8b\x91\xf2\x87\x34\x88\x3c\x19\x4c\xf3\xd4\x9f\x33\xa8\x95\x43\xe9\xf4\x32\x16\x65\x7e\xcb\xf4\xa8\xfd\x11\xfa\x80\x3c\x1d\x40\xdd\x3d\xdf\x3e\xbf\x5b\xde\x5c\x4c\x52\xff\x9a\xc0\x24\xcb\x1c\xad\x99\x22\x1b\x0c\x21\x3d\x5b\x1f\x51\xd7\x01\xd3\x83\xa0\x4c\x60\xf2\xc3\x45\xcf\xd0\xcb\xe6\x84\xb9\x3a\x1c\xcf\xa7\xe9\x6f\x72\x39\x32\xfb\x67\x6c\x86\xcb\x4e\xf9\x34\x96\xa5\x34\xad\x72\xf6\x9f\x08\x0a\x3c\xee\xba\x39\x7c\xb1\xda\x03\x95\x96\xd3\xa4\x12\x4f\xfe\x41\xd6\xa7\x69\x36\x86\xb4\x39\xec\xf0\x3c\x20\xc4\x3a\x6d\x1d\x8a\xdb\xe7\xe3\xee\x22\x34\xc1\x85\x9d\xe2\x14\xac\x37\xf8\x15\xe6\x97\xa0\xbc\xe9\x4f\xd2\x03\x9a\xd0\x8a\x1d\xa3\xdd\xc4\x6f\x88\x0e\xb5\xf7\x62\x8f\x6a\x16\x14\x89\x5c\x9a\xf4\xad\xcd\x2f\xc2\xd9\x28\x51\x8c\x75\x55\x51\x6c\xf6\x9d\x95\xf8\x7a\xd0\xbf\xd8\x15\x56\x17\x62\x96\xd5\x69\x89\x48\x0e\x74\xfb\xc8\x08\x6e\xb8\x9d\x24\x1f\x76\x08\xb1\xa0\xda\x19\x28\xd5\xa6\x25\x41\x56\x1a\xa6\x76\x2f\x69\x89\x25\x8f\x97\xd3\x11\xdc\x83\x6c\x7c\xb9\xac\x09\x4c\x69\x6b\xdc\x59\x2e\xa8\x66\xc8\xb2\x44\xb7\xec\x22\x10\x30\x65\x86\xf0\x3c\x26\x67\x04\xd7\xa3\x6a\x78\x93\xcd\xe1\x13\xfc\x5f\x3f\x69\x2e\x27\x70\x73\x33\xd8\xaf\xb3\xf9\x04\x3e\xc3\xb7\x6f\xf0\xf7\x71\x47\xfc\x04\x19\xfe\xc6\xb4\x99\xb5\x54\x7d\x69\x48\xf9\x52\xaa\xb0\xc1\x30\x81\xcf\x03\x1c\x2e\x70\xdc\x84\x53\x36\x1a\x12\x5f\x92\xb7\x3d\x63\x64\x87\xa3\x60\x24\xa6\x04\x6a\x4b\xd6\x08\x8b\x92\x45\xb2\x14\x95\x95\x64\xe5\x09\x1a\x53\x83\x63\x39\xa2\xcb\xaf\xa0\x89\xac\xae\x43\x40\xcf\x6e\x9f\x36\x57\xb9\x6c\x47\x61\x73\xa2\x7c\x21\xd5\x13\x17\xb3\xd9\xda\x72\x51\xaf\xa6\x9a\xca\xd9\x8b\xcd\x78\x66\x63\xac\x31\xce\xfe\xf4\xfa\xd5\x8f\xa3\x80\x1e\x8a\xf9\xf7\x37\x17\x93\x26\x82\x93\x11\xc5\xd3\xde\xd3\x55\xff\xe4\xfa\xbb\x27\xaf\xfa\x27\xa3\x7a\xce\xed\xe0\x51\x16\xbb\x17\xfb\x28\xfc\xf0\xaf\xc6\xb2\x4f\xbf\xfb\xfc\xef\x6e\x39\x7c\x24\x19\xfa\x59\x64\xaa\xa0\x90\x9e\x65\x23\x04\xfc\xb5\xb6\x01\xcd\x15\x28\x58\x3e\xbc\xfb\x78\xff\xfc\x1e\x2a\x57\x47\x88\x54\x62\xfa\x06\x11\x29\xe5\x5c\xaa\x93\xf3\xe3\xa6\xe9\x11\x0d\x9a\xf4\x2d\xb0\x0e\x4a\xcb\x47\x1f\xc4\xa2\x66\x43\x3b\xdf\x7c\xf2\x48\xf8\x0e\x7c\x35\x9f\x01\x69\xdb\x7e\x27\xd2\x4f\x18\x2c\x99\x25\x6a\xf2\x26\x2e\xe0\xf5\x61\xcc\x34\xf3\xe4\x64\x80\x8e\x07\xc9\x71\x2b\xfe\x29\x29\xdc\x39\x65\x07\xcb\x86\x96\x17\x8f\x23\xdd\xed\x51\xf6\x63\xfb\x59\x98\x6e\xca\x4e\xbe\x0b\x4f\x6f\xed\x7f\x04\xaa\xf4\x0d\xf6\x5e\xca\x6e\xb0\x9e\x3e\xa3\x32\x3f\x07\xcb\xf8\xc1\x6b\x3c\x8c\xa2\x80\x91\xea\xa0\xfb\xa2\xc2\x39\x46\x1e\xac\x22\x91\x29\xa4\x85\xe0\xfa\x9d\x3d\xfb\x4f\x00\x00\x00\xff\xff\x35\xe0\x44\xba\x60\x0f\x00\x00") + +func testE2eTestingManifestsStatefulsetCockroachdbStatefulsetYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetCockroachdbStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/cockroachdb/statefulset.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetCockroachdbStatefulsetYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetCockroachdbStatefulsetYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/cockroachdb/statefulset.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetEtcdPdbYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4c\xcc\x3d\x0e\xc2\x30\x0c\xc5\xf1\x3d\xa7\x78\x17\x40\xa8\x8c\xd9\x40\x8c\x0c\x4c\xec\x4e\x6c\x81\x45\x3e\xac\xc6\xad\xc4\xed\x51\x55\x06\xd6\xf7\xd7\xfb\x91\xe9\x43\xe6\xa1\xbd\x45\x58\x2f\x9a\x3f\xc7\x75\x4a\xe2\x34\x85\xb7\x36\x8e\xb8\x77\xbe\xea\x98\x17\x73\xed\xed\xb2\xf0\x53\x3c\x54\x71\x62\x72\x8a\x01\x68\x54\x25\x42\x3c\xf3\xc1\x38\x05\xa0\x50\x92\x32\xb6\x04\x18\xa7\xbd\x85\x61\x92\xb7\xad\x6a\x3b\xaf\xa4\x85\x52\x91\x88\x53\x00\x86\x14\xc9\xde\xe7\xfd\x51\xc9\xf3\xeb\xf6\x47\x00\x64\xf6\x43\xbe\x01\x00\x00\xff\xff\x37\xe7\x80\xf7\xad\x00\x00\x00") + +func testE2eTestingManifestsStatefulsetEtcdPdbYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetEtcdPdbYaml, + "test/e2e/testing-manifests/statefulset/etcd/pdb.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetEtcdPdbYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetEtcdPdbYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/etcd/pdb.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetEtcdServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x8e\xcd\x4a\xc0\x30\x10\x84\xef\x79\x8a\x79\x81\x82\x3f\x07\x35\x37\x8f\x5e\x8a\x28\x78\xdf\x26\x03\x06\xd3\x24\xec\x6e\x0b\xbe\xbd\xb4\x08\x62\x6f\xc3\x37\x1f\xc3\xc8\x28\x1f\x54\x2b\xbd\x45\xec\xb7\xe1\xab\xb4\x1c\xf1\x4e\xdd\x4b\x62\x58\xe9\x92\xc5\x25\x06\xa0\xc9\xca\x08\x7a\xca\x01\xa8\xb2\xb0\xda\x81\x01\x19\xe3\x97\xdb\x60\x3a\xd8\xe8\xea\x67\x39\x9d\x31\xe2\xee\xfe\xf1\xe6\x74\xff\x46\x26\xa3\xee\xd4\x7f\xd2\xc3\xd3\x55\x4a\xb5\xb0\x79\x00\x52\xdd\xcc\xa9\x2f\xaf\x11\x73\x6f\x0c\x80\xb1\x32\x79\xd7\xeb\x09\x60\x6c\x4b\x2d\xf6\x39\x77\x7f\xa3\xe4\xef\xe7\x9c\x95\x66\xb4\x08\xd7\x8d\xe1\x27\x00\x00\xff\xff\x50\x82\x1d\x25\xf2\x00\x00\x00") + +func testE2eTestingManifestsStatefulsetEtcdServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetEtcdServiceYaml, + "test/e2e/testing-manifests/statefulset/etcd/service.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetEtcdServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetEtcdServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/etcd/service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetEtcdStatefulsetYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x58\x6d\x6f\xdb\xb6\x13\x7f\x9f\x4f\x71\x7f\xc7\x48\xed\xff\x2a\x3f\x24\x2b\x92\xaa\x48\x8b\x2c\x31\xd6\x00\x49\x6a\xc4\x5e\x0b\xac\xdb\x0c\x46\x3a\xc7\x5c\x28\x52\x25\x29\x27\x81\xeb\xef\x3e\x50\x92\x65\x3d\x50\x8e\x0b\x24\x7b\x35\xbf\xd8\x1a\xea\xf8\xbb\xe3\x3d\xfc\xee\x48\x12\xd2\xcf\x28\x15\x15\xdc\x05\x12\x86\xaa\x3b\xef\xef\xdc\x51\xee\xbb\x30\xd2\x44\xe3\x34\x62\x23\xd4\x3b\x01\x6a\xe2\x13\x4d\xdc\x1d\x00\x4e\x02\x74\x01\xb5\xe7\xef\x00\x30\x72\x83\x4c\x99\x65\x30\xdb\xd3\x75\x15\xa2\x67\xd6\x14\xca\x39\xf5\xf0\x2a\xbf\x43\x62\xc8\xa8\x47\x94\x0b\x07\xb1\x04\x43\x4f\x0b\x99\x20\x04\x44\x7b\xb3\x8b\x1c\x64\x1e\x14\x40\x63\x10\x32\xa2\x31\x15\xce\xd9\x64\x7e\x05\xbb\xcc\x8f\x15\x80\x8a\x50\x00\x2b\x1b\xcd\xcf\x13\x5c\x13\xca\x51\x66\xd2\x4e\x15\x0e\x80\x06\xe4\x16\x5d\xb8\x3b\x52\x9d\x5b\x4f\x76\xa8\xe8\x9a\xcf\xee\x41\x67\xbf\xb3\xff\x73\x51\x6a\x18\x31\x36\x14\x8c\x7a\x8f\x2e\x9c\xb0\x7b\xf2\xa8\xb2\xef\xa1\x90\x3a\x67\x95\xb3\xd6\x3e\x14\x52\xbb\xb0\x7f\x70\xd4\xcb\xbe\xae\x8e\x15\x22\xca\x4d\x5b\x0e\xdf\x56\xb6\x78\x8c\x22\xd7\xd9\xb2\x44\x25\x22\xe9\x61\x4e\xb5\x59\xfc\x16\xa1\xd2\x85\x35\x00\x2f\x8c\x5c\xe8\xf7\x7a\x41\x61\x35\xc0\x40\xc8\x47\x17\xde\xf4\xf7\x2f\x69\xf6\x05\xf9\x3c\x7f\x96\x44\xf5\xf9\xd5\xf9\xf8\xfc\xe4\x62\x72\x7a\xf1\xdb\x68\x3c\xb8\x9e\x8c\xce\x7f\x1f\xe4\xb0\xe6\x84\x45\xe8\x42\xe3\xa0\x51\xd9\x39\x1a\x8c\x27\x57\x27\x97\x16\xe9\x42\x24\xe6\x82\x45\x01\x5e\x8a\x88\x17\x5d\x99\x80\x98\xac\xf0\xa9\xcc\x61\x04\x46\x72\x48\xf4\xcc\x85\xee\x9c\xc8\xae\x8c\x78\xb7\x00\xc8\xe8\x14\xbd\x47\x8f\x61\xde\x13\xa1\xc4\x91\x16\x61\xd1\x39\xf8\xb0\xce\x9b\xcc\x61\x22\x08\x08\xf7\xcb\xcb\xc6\xa2\x46\xf7\x86\xf2\xae\x9a\x35\x6c\xdf\x1c\xf4\x6c\xeb\xdf\x2b\x6b\x00\x83\xe1\xe8\xb8\x51\x15\x06\x98\x0a\x09\x14\x28\x87\x66\x4b\xe1\x37\xe8\x41\xb3\xd5\x6a\x2e\x6c\x11\x58\x82\x03\xfd\x76\xbb\xfd\x0e\x7c\x61\x01\xca\xb4\x34\x17\x83\xe1\x68\x19\xff\xd7\xfd\xe9\xf5\x72\xa6\x75\xe8\x76\xbb\xcd\xc5\x2a\x36\x4b\xa7\xb9\xa0\xcb\x4e\x6e\xc1\x35\x09\x68\x33\xce\x17\x1c\x77\x2c\xeb\x1f\x3f\x8d\xc6\x66\xe7\x71\xb3\x35\x13\x4a\x9b\xb0\xb5\x6d\x72\x01\x06\x37\x28\x27\x33\xa2\x66\xad\x36\x2c\x6a\xac\x36\x91\xf4\x34\x4b\xa5\x81\x51\xa5\xe1\x3b\xdc\x4a\x0c\x21\x33\x7e\xa5\xb1\x6c\xf7\x51\x0f\xbe\x83\x17\x69\x70\xfc\x57\xee\x2b\x70\xa6\xfd\xf5\xdf\x5f\xe3\xbf\x2d\x4a\x97\x36\x5b\xd1\x9b\x09\x68\x5c\x63\x20\xe6\x94\xdf\x42\x4e\x25\x4c\xa5\x08\x62\x2b\xc1\x63\x91\xd2\x28\x1b\x36\x80\xc1\xf8\xf4\xec\x74\x7c\x31\x19\x5c\x9d\x0d\x3f\x9d\x5f\x8d\x8f\x93\x40\x94\x8f\x27\x8d\x06\x84\x66\x2b\xe7\x9c\xb6\x05\x8e\x4e\xe1\x2b\x34\x3f\x80\x13\x67\xc5\x9f\xef\x40\xcf\x90\xd7\x78\x70\x17\xae\x13\x54\x9c\xa3\x7c\xd4\x33\x73\x00\xa1\x67\x28\xef\xa9\x42\xb3\x71\x65\x38\xdc\x53\xc6\x80\x0b\x60\x82\xdf\xa2\x04\xe5\x11\x86\x4e\x14\xd6\xe0\xca\x00\x1c\x39\x2d\xd6\x5c\xf7\xff\xb6\x2c\x5e\x33\x8a\xa5\x98\xec\x65\x54\x2d\xa0\x72\xe9\x3c\x9d\x66\xbb\xa0\xb4\x90\xb8\xf2\x2d\xf5\x81\x72\x2d\x60\xf8\xf9\x34\x2e\x2c\xd3\x6d\xe4\xda\xf1\x21\x23\x1e\x06\x79\x56\x4d\x0c\x66\xa6\x89\x4d\x12\x31\x6b\x9e\xde\xcf\x28\x43\xf8\x9f\x35\x53\xf7\xde\x77\x7d\x9c\x77\x79\xc4\x98\xa9\x4c\x50\x0c\x31\x84\xfe\xbb\xa4\x78\xca\x48\x2f\x9b\xeb\xf0\xbe\x14\xab\x34\xc7\xa8\x5f\x35\xe4\x81\x6a\xe8\x15\x96\x4b\x65\x81\xa1\xb2\x3a\xa3\x86\xca\x9e\x91\xc8\x9e\x97\xc6\xec\x71\x30\xd5\x9e\xa8\xd8\xe4\x83\xa7\x08\xec\x5f\xa4\xae\x65\x39\xf3\x25\x3a\x7f\x0b\xca\x4d\xad\x93\xa9\xc9\xf3\x29\xa1\x2c\x92\xf8\xa1\x20\x17\xd3\x88\x83\xa5\xbc\xf0\x71\x4a\x22\xa6\x3b\x31\xa9\xd5\x71\xcb\x8a\x11\x33\x35\xb1\x74\x72\xd4\xaa\x9b\xb3\x54\x3b\x6e\xb6\x3c\xa2\xeb\x12\xd1\xd2\x27\xb2\xa3\xa4\x18\xd5\x8c\xab\x30\x6b\x0b\x43\xd5\x2e\x7b\x3f\x0a\x7d\xa2\x11\x9a\x8b\x4c\xd9\x72\x9b\x28\x58\x4a\x03\xbd\xe4\xac\x8e\x63\x38\xa7\xd0\x0b\xfe\xb0\x66\xac\xe3\x98\xd0\x23\x77\xcc\xa0\xe7\x44\x92\xa9\xad\xe2\xff\x04\x58\x32\x02\x6e\x09\x77\xf8\xf6\x75\x2a\xd3\xdf\x3f\xec\xf4\x3a\xbd\x4e\x3f\x5e\xad\x55\x42\xfc\x39\x4a\x4d\x15\xfe\xa8\x9e\x5a\x44\x33\xb8\x39\x3e\x95\x1b\x92\xad\xb0\x73\x4a\xcb\x39\x6d\x44\x1c\xa3\xed\xfc\xac\xf0\x25\x59\x3a\x5e\x5b\xe5\xbe\x71\x9b\x8b\xdd\xcc\xc6\x4a\x71\x10\xdf\x8f\x0b\x03\x38\xde\xaf\xf2\x43\x0b\xc3\x7a\x4a\x9b\x0f\xab\x7e\xd8\x22\x4a\x45\x41\x2c\xca\x18\x50\x4e\x35\x25\x0c\x42\xe1\x2b\x20\x12\x81\xcc\x09\x65\xe4\x86\x61\xbb\x5a\x54\x8d\xc4\x2f\xe7\x67\xcb\x06\x38\xb7\x26\x4b\xec\x64\x57\x5b\x5e\x0f\xe6\x2a\x51\x97\xdc\xb6\x32\x49\xcf\x41\x98\x44\xe2\x3f\x9a\x33\xa2\xff\xa1\x22\x77\x39\xb8\xfc\x65\x70\x3d\xf9\x78\x32\xfa\x78\xfc\xc4\x94\x91\x90\x03\x37\x47\xc9\xed\x5a\x36\x36\x8e\x1b\xbb\xf1\x40\x91\xda\x62\x70\x13\xaf\x2a\xb8\x89\x74\xdc\x05\x94\x08\x10\x24\x12\x25\x78\x52\x46\x86\x98\xb0\xda\x82\xd2\x48\xa9\x18\x2f\x1d\xfa\x0d\x20\x70\xa1\xe1\x06\xc1\x93\x48\x34\xfa\xaf\xe1\x1e\xc1\x23\x7c\x35\x39\xad\xb5\xd7\x21\x72\x1f\x24\x6a\x49\x71\x8e\x71\xfc\x8d\x91\x56\xd9\x9a\xd1\xac\xe0\x8c\x6a\xa3\xa3\xd5\xd8\x24\x54\x79\x92\x24\xdd\x3a\xe5\xaa\x2c\x59\xd2\x48\x7c\xbf\xc0\x2e\xdb\x35\x8d\xb8\xbf\x34\xfe\x32\x99\x33\x69\x54\x7a\x3e\xc7\xfb\x74\x96\x99\x20\x9f\xab\xaa\xb1\xd9\x64\xc9\xf1\x89\xc9\x32\x39\xd6\xe0\x81\x9a\x9a\xb1\x5d\x10\x92\x11\xb1\x3c\x21\x96\x2d\xb0\x42\x9b\xf9\xa3\x3a\x9c\xdb\x9c\x5b\xed\x26\x4f\x29\x48\xae\xca\x3f\xea\x97\xe2\x20\x08\x7b\x96\x30\xff\xd7\x19\x5e\xac\x33\xd4\xee\x4d\x49\x39\x67\xd5\xf3\xb8\x72\x85\xbb\x6a\x05\xcd\x45\x5c\x50\x25\x12\xaf\x8f\x6b\x69\xbf\xa3\x74\x32\x7d\xd8\x50\x26\xa3\xf1\xc9\x78\xb0\xdc\xd8\xfd\x9e\x69\x80\x4e\xee\x2a\x5a\x46\x58\x3b\x5f\x27\x65\xfd\x85\xc4\x65\x1d\xeb\xdd\x34\x56\x9b\xbe\xe9\x19\x4a\x8f\x42\x3b\x05\x84\x06\xc5\xf9\x02\x7d\x70\x3c\xe8\x6f\xc6\x7a\x0f\xd9\x6d\x09\xf6\xf6\xe0\x46\x22\xb9\xb3\x82\xa6\xd7\xa8\x6a\x6d\x57\xc6\xf9\xea\x23\xc5\x70\x30\xb8\xae\xdc\x51\x9e\xc9\xbd\x29\x76\x73\x11\xff\x63\x99\xfe\xdf\xdc\x50\xca\xe7\x3e\xde\xee\xca\x72\xd4\x6b\x3c\x71\x9c\xcd\xbc\xb4\x0b\x75\xa3\xf3\x0f\xb2\xd5\x4b\x54\xda\xb3\xb1\xdf\x8b\x33\xdf\xf3\xb2\x5e\x95\x1d\xb4\xb8\xc3\x64\x1c\xca\x96\xfa\xdb\x6c\x84\x55\xa6\x6d\xa5\x25\xe1\x20\x33\x80\xd8\xa4\xb7\x9b\xcf\x93\xc7\xd9\x53\x46\x68\x30\x4e\x5f\xec\xe3\x47\x5a\xa7\xe6\xc9\x3e\xff\x5c\x9b\x7f\x95\x27\x9e\x87\x4a\x5d\x0a\x1f\x0b\x6f\xbc\x8d\x6b\x24\xfe\x17\x49\x35\x7e\xe2\x1e\xae\x72\xdf\xf2\xbc\x6d\x7b\xdc\xde\x85\x28\x54\x5a\x22\x09\x40\xa2\x27\x82\x00\xb9\x8f\x3e\x04\xe4\x01\xa8\x82\xc3\x5e\xef\x32\x27\xac\xb4\x90\xf1\x8b\x7f\xff\x57\xba\xf3\x4f\x00\x00\x00\xff\xff\x47\x5f\x27\x5d\x29\x19\x00\x00") + +func testE2eTestingManifestsStatefulsetEtcdStatefulsetYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetEtcdStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetEtcdStatefulsetYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetEtcdStatefulsetYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetEtcdTesterYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x8f\xc1\x4e\xc3\x30\x10\x44\xef\xf9\x8a\xfd\x81\xb4\xa5\x5c\x2a\xdf\x90\x2a\x71\xe1\x10\x09\x89\xfb\xd6\x19\x1a\xab\x1b\xdb\xf2\x6e\x8b\xc2\xd7\xa3\x94\xd2\xba\xc0\x1c\x3d\x7e\xb3\x33\x9c\xc3\x1b\x8a\x86\x14\x1d\x71\xce\xba\x3c\x3d\x34\x87\x10\x7b\x47\x5b\x64\x49\xd3\x88\x68\xcd\x08\xe3\x9e\x8d\x5d\x43\x14\x79\x84\x23\x98\xef\x5b\x83\x5a\xab\x28\x27\x94\x46\x33\xfc\x6c\x17\x64\x09\x9e\xd5\xd1\x63\x43\xa4\x10\x78\x4b\x65\x76\x88\x46\x36\x3f\xbc\xf0\x0e\xa2\xdf\x0f\x34\x9f\x74\x54\xe7\x10\x19\xc6\x2c\x6c\xb8\x30\xd5\xe9\x59\x72\x87\xff\x1b\x40\xf4\x53\x66\x96\x4f\xd1\x38\x44\x94\x2b\xd4\x5e\x36\xfc\xa6\x66\x85\x91\xf7\x70\x74\xd8\xe8\x62\xef\xcb\x22\xa4\xe5\x79\xa9\x1a\x1b\xde\x8f\xa2\xb0\x16\x6b\x9c\x97\xbb\xd5\x62\x75\xcf\x75\x47\x91\x2e\x49\xf0\x93\xa3\x27\xf9\xe0\x49\xaf\x7e\x4e\xc5\xaa\xd6\xed\xad\x56\x97\x8a\x39\xda\xac\x36\xb7\xb0\x02\xee\x43\x84\x6a\x57\xd2\x0e\x37\x8a\x68\x30\xcb\xcf\xb0\xfa\x89\x28\xb3\x0d\x8e\x96\x03\x58\x6c\xf8\xbc\xb7\xfe\x86\x13\x85\x18\x2c\xb0\x6c\x21\x3c\xbd\xc2\xa7\xd8\xab\xa3\x75\xf5\x21\xa3\x84\xd4\x57\x56\xf3\x15\x00\x00\xff\xff\x5f\xc9\x70\x5d\x26\x02\x00\x00") + +func testE2eTestingManifestsStatefulsetEtcdTesterYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetEtcdTesterYaml, + "test/e2e/testing-manifests/statefulset/etcd/tester.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetEtcdTesterYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetEtcdTesterYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/etcd/tester.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetMysqlGaleraServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x8e\x31\x4b\xc4\x40\x10\x85\xfb\xfd\x15\x0f\xae\x13\x0c\xca\x81\xc5\x76\x07\x36\x36\x41\x3c\xb0\x9f\xdb\x7d\x7a\xc1\x4d\x76\x9d\x99\x04\xee\xdf\x4b\x12\xbb\xeb\x66\xe6\x7d\xf3\xf1\x0e\x38\xe1\x4a\xc9\x85\x66\x30\xea\x32\x24\xc2\x2b\x92\x52\x9c\x78\xed\xcf\x50\xa6\xaa\xd9\x82\xb4\xe1\x93\x6a\x43\x9d\x22\x96\xe7\xf0\x33\x4c\x39\xe2\xbc\xbf\x84\x91\x2e\x59\x5c\x62\x00\x26\x19\x19\xf1\x2d\x85\x2a\x01\x28\x72\x61\xb1\x35\x00\xa4\xb5\x88\xf1\x66\xbf\x25\x58\x63\x5a\x8f\xad\xaa\x6f\xe9\xe3\x36\x46\x1c\x8f\x4f\x2f\x1b\xbc\x7b\x76\x1a\x38\xe0\xa1\x5b\x9d\xa2\x5d\xe6\x97\xcc\xc5\x3b\x5b\x52\x97\xca\x6c\x4e\xed\x4a\x4d\xb2\x62\xff\xfb\xdb\x7b\x44\x5f\x27\x06\xc0\x58\x98\xbc\xea\x5d\x03\xa0\xcd\x97\x32\xd8\xb5\xaf\xfe\x41\xc9\xb7\x53\xce\x4a\x33\x5a\x84\xeb\xcc\xf0\x17\x00\x00\xff\xff\xf3\xa7\x43\xb4\x1d\x01\x00\x00") + +func testE2eTestingManifestsStatefulsetMysqlGaleraServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetMysqlGaleraServiceYaml, + "test/e2e/testing-manifests/statefulset/mysql-galera/service.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetMysqlGaleraServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetMysqlGaleraServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/mysql-galera/service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetMysqlGaleraStatefulsetYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x55\x51\x6f\xe3\x36\x0c\x7e\xcf\xaf\x20\xbc\x87\x7b\x52\xdc\x5c\x7b\xb7\x83\x86\x3c\x14\xed\x6d\x18\xb0\x5e\x83\x6b\xb1\x3d\x0c\xc3\xc0\xc8\x74\xac\x8b\x2c\xf9\x44\x39\x5d\x36\xec\xbf\x0f\x76\x1c\x5b\xb6\xdb\x62\x7b\x9b\x9f\x0c\x92\x1f\xf9\xf1\x13\x29\x61\xa5\x7f\x26\xcf\xda\x59\x09\x58\x55\x9c\x1e\x56\x8b\xbd\xb6\x99\x84\x87\x80\x81\xf2\xda\x3c\x50\x58\x94\x14\x30\xc3\x80\x72\x01\x60\xb1\x24\x09\xe5\x91\xbf\x9a\x05\x57\xa4\x1a\x1b\x93\x3f\x68\x45\x9f\x5a\x57\xb2\x43\x43\x1e\x93\x05\x80\xa7\xca\x68\x85\x2c\xe1\xb2\x8d\x32\xa4\x82\xf3\x0d\x02\xa0\xc4\xa0\x8a\x9f\x70\x4b\x86\x4f\x06\x68\x08\x9c\x33\x03\x04\x2a\x2b\x83\x81\xba\xe8\x88\x41\xf3\x99\x11\x70\x02\x05\x38\x13\x6b\x3e\x6d\x75\xb8\x71\x36\xa0\xb6\xe4\x7b\x88\xe8\x1a\xd1\x96\x03\x1a\xd3\x27\xd2\x25\xee\x48\xc2\xfe\x03\x2f\x77\xca\x2f\xb5\x4b\x4f\xed\x88\x2e\x50\x5e\x2c\x57\xe3\xe0\x4d\x6d\xcc\xc6\x19\xad\x8e\x12\xae\xcd\x13\x1e\x79\x60\xe5\x77\x11\x47\x01\x89\x10\x4f\xce\xef\x45\xa6\xfd\x3a\x3d\xff\x25\x7d\xc0\xc1\x99\xba\xa4\x3b\x57\xdb\x30\x82\x9d\x98\x36\xf1\x99\xf6\xbd\x1d\xa0\x6c\x22\x37\x18\x0a\x09\xc9\x33\xe9\xce\x40\xe5\x6c\xae\x77\x2f\xe1\x28\xa8\xb4\x15\x2e\x99\x28\xb3\x75\x2e\x70\xf0\x58\x4d\xb5\xc9\x68\xab\xd1\xca\x2f\xc4\xac\xa9\x77\x2a\x57\x96\x68\xb3\x51\xbb\x3d\xa9\xb4\x22\xf2\x22\xd7\x36\xa3\x88\xe0\x54\x1e\xe1\xac\xe0\x80\x3e\xac\x23\xe4\xd9\xb6\xe4\x22\x19\x49\xd9\x0d\xdd\x7a\x18\xb7\xd3\x47\xf6\x30\x17\x6f\x73\x7f\xfb\xfb\xa7\xeb\xbb\x8f\x0f\x9b\xeb\x9b\x8f\x91\x14\x07\x34\x35\x7d\xef\x5d\x29\x23\x23\x40\xae\xc9\x64\x9f\x29\x1f\x5b\x9b\x31\x1b\xd6\xe5\xb0\x9a\x38\x5b\xd0\x49\xd6\xf3\xb8\x2e\x9b\xea\x5c\xa1\xa2\xff\xd9\x21\xab\x17\x17\x62\x58\x22\x78\x76\x1d\x5a\xbf\x38\x89\x2e\xe9\xed\xd0\x58\xe5\xfc\xb8\xa3\xbe\xc6\xc6\xf9\x20\xe1\xf2\xf2\xe2\x7d\xc4\xef\xb9\x6a\x33\xcc\xd5\xd5\xd5\xd5\x0c\xc3\x1c\x5e\x41\xbc\x7b\xff\xed\x0c\xd1\xdd\x43\x41\x3b\xfb\x2a\xf2\xc3\x0c\xa9\xa3\x5a\xb3\x71\x15\x19\xe5\x58\x9b\xc0\x22\xd7\x86\xd6\x83\xca\x69\x79\xec\x14\x5a\x2a\x9b\x8f\x20\x35\x93\x5f\x7b\xe7\x86\xb4\x9e\x30\xd3\x96\x98\x37\xde\x6d\x29\x9e\xb8\x6f\xe0\xf1\xfe\xf6\x5e\xc2\x8f\x39\x64\x4e\xed\xc9\x03\xfd\x41\x0a\x34\xc3\xb6\xde\xed\x8e\xf0\xa5\xe6\x00\x35\xd3\xfc\x78\x0a\x42\x13\x8a\x3f\xe5\x6a\x79\x11\xe5\x6b\xd0\xe3\x89\x9e\x2d\xed\x89\x26\x17\x13\x83\x50\x13\x43\xd2\xd6\x01\x51\x43\xd3\x0b\x08\x82\x37\x5c\xb8\x27\x68\x86\x7e\x8b\x4c\xfc\xdd\x9b\x24\x82\x34\x77\xb0\x46\x73\x4b\x06\x8f\x0f\xa4\x9c\xcd\x58\xc2\xea\x5d\x14\x11\x74\x49\xae\x0e\xbd\x33\xf6\x71\xad\x14\x31\x3f\x16\x9e\xb8\x70\x26\x93\xf0\xf6\x5f\xae\x53\x43\xe7\xc5\x75\x4a\x0f\xe8\x53\xa3\xb7\xe9\x7f\x5a\xa6\xe1\x94\x17\x31\x83\xd9\x1e\x4d\x72\x50\x59\x85\xe3\xad\xf6\x12\xfe\xfa\x7b\x12\x39\xdd\xf9\x49\xe8\x29\xff\x8d\x41\x5d\x3e\x76\x6f\x62\x5b\x4c\xcc\x1e\xc5\x79\xcf\xf1\x3b\x88\xad\x88\x77\x2e\x23\x96\xf0\x2b\x24\x9f\x09\xb3\x5f\xbc\x0e\x74\x6f\x15\x25\xf0\x5b\x17\xe6\x89\x5d\xed\x15\x45\x6a\x7a\xfa\x5a\x13\xc7\xfa\x02\x70\x70\xbe\xbd\x1a\x56\x3f\xe8\xc5\x3f\x01\x00\x00\xff\xff\x3c\xf4\xc8\x50\x46\x08\x00\x00") + +func testE2eTestingManifestsStatefulsetMysqlGaleraStatefulsetYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetMysqlGaleraStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetMysqlGaleraStatefulsetYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetMysqlGaleraStatefulsetYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetMysqlUpgradeConfigmapYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\xca\xb1\xae\xc2\x30\x0c\x85\xe1\xdd\x4f\x71\x5e\xa0\x57\xba\x6b\x56\x66\x56\x16\xc4\xe0\x12\xb7\x8a\x70\x9c\x10\x87\x4a\x95\x78\x78\x44\xa4\x8e\x8c\xe7\xfc\x1f\xd7\x74\x91\xe6\xa9\x58\xc0\xf6\x4f\x8f\x64\x31\xe0\x54\x6c\x49\xeb\x99\x2b\x65\xe9\x1c\xb9\x73\x20\xc0\x38\x4b\x40\xde\xfd\xa9\x04\x28\xcf\xa2\xfe\xfd\x01\xae\xf5\x08\x07\xce\xec\x5d\xda\xdf\xdd\x96\x80\xf7\x40\xd7\x01\xe2\x6d\x0c\x2d\xeb\x34\x27\x23\xc0\x95\x37\xf9\xe9\xfc\x55\xa5\x4d\x4d\x38\x4e\xc5\x74\xa7\x4f\x00\x00\x00\xff\xff\xd1\x8c\x7f\x5b\xaf\x00\x00\x00") + +func testE2eTestingManifestsStatefulsetMysqlUpgradeConfigmapYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetMysqlUpgradeConfigmapYaml, + "test/e2e/testing-manifests/statefulset/mysql-upgrade/configmap.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetMysqlUpgradeConfigmapYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetMysqlUpgradeConfigmapYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/mysql-upgrade/configmap.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetMysqlUpgradeServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x8e\xb1\x8a\x02\x31\x14\x45\xfb\xf7\x15\xf7\x07\x02\xbb\x0c\x6c\x91\x72\x3b\x41\x44\x10\xec\x9f\xc9\x2d\x82\x99\x24\x26\x71\x60\xfe\x5e\x46\xb1\x18\xed\xc4\xf6\x1e\xee\xe1\x68\x09\x47\xd6\x16\x72\xb2\x98\x7e\xe5\x1c\x92\xb7\x38\xb0\x4e\xc1\x51\x46\x76\xf5\xda\xd5\x0a\x90\x74\xa4\xc5\x38\xb7\x4b\x14\x20\xea\x89\xb1\x2d\x3b\xa0\xa5\x3c\x41\x2b\x74\xcb\x58\x72\xed\x77\x6a\x5e\x7e\x0f\x64\x31\x0c\x3f\x7f\x02\xb8\x78\x6d\x9d\x75\xb3\xb7\xd8\xe5\x44\x01\x1a\x23\x5d\xcf\xf5\x4d\x6d\x8c\x91\x4f\x62\x4d\xa5\xfa\xef\x15\xaf\xfb\x56\x2a\xa0\xcf\x85\x16\xdb\xac\xfe\x5f\xa3\x26\xc7\x2a\xb7\x00\x00\x00\xff\xff\x8b\xeb\xb7\xc6\x60\x01\x00\x00") + +func testE2eTestingManifestsStatefulsetMysqlUpgradeServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetMysqlUpgradeServiceYaml, + "test/e2e/testing-manifests/statefulset/mysql-upgrade/service.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetMysqlUpgradeServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetMysqlUpgradeServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/mysql-upgrade/service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetMysqlUpgradeStatefulsetYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xdc\x58\xef\x6e\xdb\x36\x10\xff\xee\xa7\x38\x18\x41\x63\xaf\xa5\x6d\xb5\xc8\x8a\xa9\x75\x07\xd7\x71\x93\x02\x76\x9c\xd9\x5e\x83\xc2\xf3\x5c\x5a\x3a\xdb\x44\x29\x52\x21\x29\x23\x59\xd3\x3d\xfb\x40\xc9\x7f\x28\x47\x4e\x8a\x0d\x1d\xb0\xe9\x83\x20\x1d\xef\x8e\xbf\x3b\x1e\xef\x8e\xa4\x31\xfb\x80\x4a\x33\x29\x7c\xa0\x71\xac\xeb\x2b\xaf\xf4\x99\x89\xd0\x87\xa1\xa1\x06\xe7\x09\x1f\xa2\x29\x45\x68\x68\x48\x0d\xf5\x4b\x00\x82\x46\xe8\x43\x74\xab\xaf\x79\x49\xc7\x18\x58\x9a\x46\xb5\x62\x01\x5e\x38\x43\x00\x0a\x63\xce\x02\xaa\x7d\x78\x91\xb2\x70\x0c\x8c\x54\x96\x1d\x20\xa2\x26\x58\x76\xe9\x0c\xb9\xce\x08\x60\x67\xdf\xc9\x1a\x8c\x62\x4e\x0d\xae\xb9\x9d\xe9\xed\xc3\x73\x82\x7b\xa2\x00\x1b\x54\xf6\x61\x82\x99\xb6\x14\x86\x32\x81\x6a\x2b\x42\xd6\x56\xd8\x51\xb2\x13\x4c\x05\x22\xba\xd8\x18\xe1\x9f\xd4\x5e\x6e\x07\x02\x19\x45\x54\x84\xbb\x59\x09\xcc\xa8\x5e\x3a\xbf\x65\x12\x94\x9d\xdf\xbb\xed\xb7\xb5\xde\x00\xc1\x1b\x87\x32\x1e\xc3\xa7\xa5\xd4\xc6\x02\xf9\x04\xcd\x3f\x81\x54\xc6\x0d\xf2\xd3\xe4\x69\xf5\x08\x26\x13\xb8\xbb\x03\xbc\x61\x06\x3c\x47\x44\xaa\x90\x09\xca\x9b\x47\x5f\xde\xb6\x86\xe7\xd3\x41\xa7\xd7\x1a\xb5\xcf\xc7\xde\xe4\xab\xc3\x84\xc1\x52\xc2\x38\x85\x1f\x4e\xe0\x0d\xd4\x23\x61\xea\x81\x14\xf3\x5a\x58\xb7\xcb\x84\x8a\xb0\xb0\x16\x88\xf9\xbe\xcc\x76\xb0\x79\x54\xa9\x78\x8d\x06\x3c\x85\xa3\xf5\x8c\xd5\x2a\xbc\xf9\x36\x4d\x6c\x6e\x0d\xdb\xc8\x01\xc1\x6b\x68\xc0\x64\xf2\x0a\xcc\x12\x85\xc3\x07\x10\xc4\x3b\x85\x6c\x41\x22\x1a\xd7\x23\xaa\x0d\x2a\xab\x31\x37\x97\x0b\x94\x6b\x7c\x4c\x8b\xe6\x74\x85\x0f\x29\x99\xb3\xed\xcf\x4a\xf2\x24\xc2\x9e\x4c\x84\xd1\xee\xc2\x66\xd1\x61\x45\x1d\xb9\xc8\xb2\x5d\x52\xb3\xf4\x5d\xcd\x85\x52\x19\x94\x47\x64\x73\x4c\x5b\x69\x2e\x05\x16\x87\xe4\x22\x50\x35\x26\xeb\x0b\x29\x17\x1c\x89\xa6\x51\xcc\x51\xd7\x6f\x8c\xa2\x33\x1a\x7c\x4e\x62\xdf\xab\x35\xbe\x63\xb4\x92\x10\xea\x2b\xaa\xea\x9c\xcd\xea\x29\xbe\xec\x6d\x83\xf5\xc9\x93\x2c\x58\x1b\xff\x42\x7c\x17\x85\x57\x21\x00\x11\x50\x03\x84\x28\x0c\x56\x44\x0a\x7e\x9b\x6d\x69\x72\x54\xa9\x6c\xe4\x89\x57\xad\xd6\x32\x23\x5e\xbc\x68\xbc\x84\x3b\xb8\x99\x69\xa3\x90\x46\x40\x6e\x80\xb4\xf7\xec\x75\x74\xef\x9c\x0e\x84\xc4\x0a\x63\xaa\x10\x08\x31\x54\x2d\xd0\x90\x90\xa9\xe6\x01\xd1\x87\x03\xce\xe6\xb8\x03\x41\x73\x08\x89\x4e\x66\x19\x47\x7e\xe0\x1b\x42\x18\x4d\xb0\x5e\xc7\x5c\x20\x07\x07\x93\xe5\xc3\x79\xb2\xe6\x9d\x6c\xc7\x50\xac\xee\x1b\xd7\xfb\x38\xfc\xa5\x3b\x6d\x75\xbb\xfd\xab\x69\xa7\x77\x39\xfa\x38\xbd\x6c\x0d\x87\x57\xfd\xc1\xa9\x03\x70\x45\x79\x82\x3e\x94\xbd\x5d\x68\xc6\x52\x15\xf9\x6a\xdf\x11\x5b\xdc\x97\x52\x19\xdf\x2e\xe8\x8f\xff\x21\xaf\xdb\x6a\xa9\x65\xa2\x02\x74\x00\x5a\xe2\x75\x82\xda\xe4\x68\x36\xe9\x25\x7e\x6e\xe3\xd8\x0a\x19\x49\x75\xeb\x83\x77\xb6\x4b\x6e\x9c\xad\x50\xa0\xd6\x97\x4a\xce\xd0\xd5\x80\x37\xbb\xfa\xb8\x71\x5e\x96\x2d\x60\x5c\x4e\xc1\xd1\x30\x62\xa2\xfc\x0c\xca\x31\x13\x8b\xf2\xc4\x4d\xf0\x82\x19\x46\xf9\x29\x72\x7a\x3b\xc4\x40\x8a\xd0\xd6\x77\x77\xdf\x19\x16\xa1\x4c\xcc\x76\xf0\xc4\x31\x91\x86\xec\x6f\x22\xb2\x60\xc8\xd2\xbe\xbd\xe7\x2f\x6b\x8d\x5a\xa3\xe6\xa5\x24\xb4\xef\x61\xa7\xdb\x69\x8f\xc0\x7b\x1c\xe9\xc9\x03\x40\xbd\xbd\x78\xdf\x6d\xf2\x7f\x94\x89\x0f\xc4\x6f\x81\xf6\xa2\x20\xfe\x6e\xfd\x47\xb0\x9f\xce\x4b\xf7\xca\x38\x99\x3b\x28\xa7\x69\x5d\x9d\x32\x31\x97\xc5\x05\x3d\x5a\x1d\xe0\x0e\x96\x54\x2c\x70\x9a\x55\xf7\xa9\x91\x35\x7d\xcd\x6b\x2c\x2f\xac\xa2\xbd\xd9\x66\x4c\x70\xb9\x48\x15\xe4\xea\x7f\x11\x32\x87\xb7\x18\x9a\xad\x45\xb6\x1a\x14\xcb\xa4\xd5\xe9\xf7\x4a\xed\x87\x9f\xab\xe3\xb1\xaf\x63\x1a\xa0\x3f\x99\x3c\x4d\x09\x07\x6b\x55\x0a\xf9\x51\xbc\xeb\xd6\xaa\xdc\x3e\x6f\x5d\x9c\x75\xa0\xd7\x1a\x8e\x3a\x03\x18\xf5\xd7\x5f\xd3\x6e\xff\x6c\xfa\xee\x7d\xb7\xd3\x3c\xbe\x5f\xf3\x8e\x9f\xfd\x96\xd3\x94\x3d\x8e\xe0\x65\x7f\xb8\x5f\x2a\x9f\x4f\xbe\x96\xe1\xcd\x37\x78\x7c\xce\x0a\x97\xfb\x80\x60\xb1\x57\x33\xd3\xae\x28\x33\x4c\x2c\x60\x2e\x55\x96\x0d\x43\x30\x12\x66\x98\xee\xf6\x5b\xa8\xd0\x20\xc0\x38\xe5\x08\xa4\x10\x18\x18\x26\x85\xae\x96\x73\x9a\x12\x61\x18\xcf\xa4\x81\x2c\x61\xbb\xc3\x81\xa0\xb3\xb9\x5f\x41\x28\x41\x73\xc4\x18\x3c\xfb\x2d\xb0\x54\x80\xe7\x7d\xb6\xed\xd9\x1f\x76\xca\xf5\x11\xc4\xce\x09\x73\x25\xa3\xac\xbd\x82\x58\x6a\x66\x69\xe5\xfd\x00\x3e\x64\x7f\x21\x5d\x2a\xb6\xc8\x2b\xb8\x6f\xc0\xeb\xd7\x9d\xfe\x3b\x87\xe9\xa8\xf2\xfa\xa0\xae\xea\xb3\x52\xc1\x4a\x9f\xf7\x87\xa3\xe6\x71\xd6\xbb\x34\xb2\x6e\xe5\xb8\x90\xf1\xd7\x61\x67\xd0\x3c\x56\x52\x9a\xe2\xf1\x4d\xb5\x6d\x1e\x17\x8f\xb7\xfb\x17\x17\x9d\xf6\x68\x3a\xe8\x8c\x06\x1f\x9b\x5e\xe3\x95\xc3\x34\x1c\xb5\x06\x23\x18\x76\x5b\x1f\x3a\x2e\x39\x6f\x5b\x3e\xa6\x6c\x4a\xdf\xf4\x60\x9c\x69\x83\x02\x08\xf9\x8c\x18\x13\x19\xa7\xdf\x1a\x45\x98\x35\x66\x84\x44\xf4\x86\xd8\xf0\xd0\x4d\x2f\x6b\xc5\x48\x00\xf9\xe8\x2f\xe7\x5a\xae\xed\x47\x9a\x66\x48\xba\xf3\x09\xc9\x7a\xb7\xe6\xae\x89\x23\xb6\x01\x6d\x3a\xe1\x44\x12\x8d\xaa\x69\x7d\x54\xfe\x7f\x37\x07\x8d\x46\x54\xdc\x1f\x34\x1a\xbd\x4d\x87\x90\x19\x7e\xaf\xcd\xcb\xe1\xc3\x28\x36\xb7\xa7\x4c\xf9\xf0\xe5\x6b\x01\xdf\xde\x39\x27\x23\xf5\x68\xec\x42\xca\xb7\x6b\xd9\xa4\x6d\x4e\x59\x34\x5a\x9f\xf1\x53\x04\xe4\xde\x21\x7f\xcf\xff\xee\xa1\xde\xe6\x14\xad\x7b\x32\x44\x6d\x1b\x84\x01\xd2\xf0\x4a\x31\x83\x7d\x11\xe0\xb6\x07\xd0\x46\x2a\xba\xb0\x53\x69\x9d\x5d\x4c\x84\x38\xa7\x09\x37\xa5\x83\x3e\x2d\xf2\xe8\x5a\x8d\x75\xdd\x19\x2b\x11\x42\x4a\xee\x95\x49\x2c\x39\x0b\x6e\xeb\x2b\x6f\x86\x86\x6e\x6e\x4e\x2e\x65\x78\xca\xb4\x4a\x62\x9b\x63\xde\x26\xe1\x22\x7f\x83\xe2\x38\x84\xc4\xe1\xac\xe4\x5e\x67\xc4\xe1\x6c\xef\x6e\x25\x62\xa2\xb5\xa2\x8c\xd3\x19\x47\x1f\x9e\x97\xf2\x17\x29\xf7\xef\x51\x9c\xbb\x90\xbf\x02\x00\x00\xff\xff\x48\xaa\x29\x27\xdc\x11\x00\x00") + +func testE2eTestingManifestsStatefulsetMysqlUpgradeStatefulsetYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetMysqlUpgradeStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/mysql-upgrade/statefulset.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetMysqlUpgradeStatefulsetYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetMysqlUpgradeStatefulsetYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/mysql-upgrade/statefulset.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetMysqlUpgradeTesterYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x52\xbb\x6e\x1b\x31\x10\xec\xef\x2b\xf6\x07\xa8\x87\xd3\x08\xec\x6c\x08\x48\xe3\x42\x80\x81\xf4\x7b\xe4\x40\xb7\x30\x8f\x64\xc8\xd5\x05\x97\xaf\x0f\xce\xb6\x64\x9e\xad\x2a\x5b\x72\x38\xcb\x19\xce\x70\x96\x5f\x28\x55\x52\xb4\xc4\x39\xd7\xed\xb4\xef\x5e\x25\x7a\x4b\x47\xe4\x90\xe6\x11\x51\xbb\x11\xca\x9e\x95\x6d\x47\x14\x79\x84\xa5\x71\xae\xbf\x83\x51\x54\x35\x15\x65\x42\xe9\x6a\x86\x5b\xf0\x82\x1c\xc4\x71\xb5\xf4\xa3\x23\xaa\x08\x70\x9a\xca\x82\x10\x8d\xac\x6e\x78\xe6\x1e\xa1\xbe\x1f\xd0\xf2\xa6\xa5\x76\x0f\x91\x62\xcc\x81\x15\x1f\x9c\xe6\xed\x65\xc2\x8a\x7e\x77\x01\xd1\x55\xcc\x32\x2e\x45\x65\x89\x28\x37\x92\xf9\x30\xf1\x95\xb5\x8c\x8c\x7c\x86\xa5\xd7\x43\xdd\x9c\x5d\xd9\x48\xda\xbe\x5b\xc5\x03\xde\xec\xda\xdd\x66\xbf\xbe\x7c\xba\x84\x70\x4a\x41\xdc\x6c\xe9\x31\xfc\xe1\xb9\xde\xf0\x9c\x8a\x36\x52\xcd\xa7\x96\x53\x2a\x6a\xe9\xb0\x3b\xec\x6e\x68\x01\x7b\x89\xa8\xf5\x54\x52\x8f\x4f\x16\xd1\xa0\x9a\x7f\x42\xdb\x23\xa2\xcc\x3a\x58\xda\x0e\xe0\xa0\xc3\xdf\x35\xf4\x7d\x39\x91\x44\x51\xe1\x70\x44\xe0\xf9\x05\x2e\x45\x5f\x2d\x3d\x34\x17\x32\x8a\x24\xdf\x40\xc6\x98\xae\xad\x47\x7e\x33\xb9\x9d\xf6\x3d\x94\xaf\x2d\x39\x25\x7f\x94\x5a\x2e\x59\x25\xc5\xa7\x8b\x3f\xe3\x5e\x5d\x96\x9f\x43\x31\xd9\xf7\xdd\x3a\xc1\xec\xfb\x75\x0e\xd7\xe4\x46\x89\x8f\x13\x4b\xe0\x3e\xc0\xd2\xfe\xbf\xaa\xf4\xd5\xc0\xad\xda\x2f\x28\x93\x38\xac\x84\xb6\xaa\xee\x74\xea\x7b\x63\xae\x4a\x9b\x90\xcd\xfa\xeb\xd7\x8a\xef\x35\x7d\xce\xb0\xf4\x9c\xd8\x3f\x71\xe0\xe8\x50\xba\x7f\x01\x00\x00\xff\xff\xb1\x05\xcf\x25\x90\x03\x00\x00") + +func testE2eTestingManifestsStatefulsetMysqlUpgradeTesterYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetMysqlUpgradeTesterYaml, + "test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetMysqlUpgradeTesterYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetMysqlUpgradeTesterYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetNginxServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x8c\x41\x0a\x02\x31\x10\x04\xef\xf3\x8a\xfe\x80\xa0\x37\x99\x1f\x78\x11\x41\xf0\x3e\x9b\x6d\x24\x98\x9d\x84\x24\xae\x3e\x5f\x36\xe2\xc5\x5b\x53\xd5\x94\x95\x78\x63\x6d\x31\xbb\x62\x3d\xc8\x23\xfa\xac\xb8\xb2\xae\x31\x50\x16\x76\x9b\xad\x9b\x0a\xe0\xb6\x50\xe1\xf7\xe8\x6f\x01\x92\x4d\x4c\x6d\xe3\x80\x95\xf2\x13\xad\x30\x6c\xb0\xe4\xda\x87\xdd\x8d\xa9\x38\xee\xc7\xf5\x1b\x79\x71\x12\x20\xa4\x67\xeb\xac\xa7\x8b\xe2\x9c\x9d\x02\x34\x26\x86\x9e\xeb\x7f\xf6\x13\x00\x00\xff\xff\x5f\xaa\x8f\x5a\xa4\x00\x00\x00") + +func testE2eTestingManifestsStatefulsetNginxServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetNginxServiceYaml, + "test/e2e/testing-manifests/statefulset/nginx/service.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetNginxServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetNginxServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/nginx/service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetNginxStatefulsetYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x90\xcd\x6e\xd4\x40\x10\x84\xef\xf3\x14\xad\xbd\x7b\x8d\x85\x90\xd0\x5c\x39\x70\x21\x10\x11\x04\x07\xc4\xa1\x3d\x2e\xd6\xa3\xcc\x1f\xd3\xed\x5d\x1e\x3f\xb2\x63\x6f\x9c\x6c\x1f\x7b\xbe\xaa\xea\x29\x2e\xfe\x27\xaa\xf8\x9c\x2c\x71\x29\xd2\x9e\x3b\xf3\xe8\xd3\x60\xe9\x41\x59\xf1\x77\x0a\x0f\x50\x13\xa1\x3c\xb0\xb2\x35\x44\x89\x23\x2c\x5d\xd0\x1b\x29\x70\xf3\x46\x50\xcf\xde\xe1\xeb\xf2\x70\x48\x27\x9f\xfe\x1f\x0c\x51\x45\x09\xde\xb1\x58\x7a\xbf\x40\x01\x4e\x73\x9d\x05\x44\x91\xd5\x8d\x5f\xb8\x47\x90\xe7\x05\xcd\xe9\x96\x16\xb1\x21\x52\xc4\x12\x58\xb1\xd2\xbb\xf8\x79\xc2\x2b\xe1\x1b\x29\xd1\x76\xd7\x3c\x2e\x27\x65\x9f\x50\xaf\x78\xb3\xfe\xe0\x85\x9f\xc7\x47\x3e\x6d\x4b\xdb\x1d\xbb\x0f\x0d\x87\xe2\x13\xae\x40\xc9\x55\x77\x91\xcd\x8b\xf3\x7d\xae\x6a\xe9\xe3\xbb\xeb\xdb\xbe\xa3\x6d\x73\xce\x61\x8a\xb8\xcb\x53\x7a\xed\xb2\x92\x97\xcb\x4e\x1d\x67\xea\x9e\x75\xb4\xd4\x4e\x52\x5b\x19\xb9\xa2\x5d\x4e\x6b\x47\x8d\xc1\x6c\x76\x9f\x02\xfb\xf8\x63\xad\x6a\xb1\x6d\x6e\xba\x7a\x1b\xc0\x29\x65\x65\xf5\x39\xed\xee\x78\xb6\x3b\xf6\x50\x3e\x3e\x4e\x3d\x6a\x82\x42\x8e\x3e\xb7\xa2\xb9\xf2\x09\x8d\x0b\x2c\xb2\xf6\xd3\x88\xbb\xe9\x99\x9d\x83\xc8\x5d\x1e\x20\x96\x7e\xd3\xe1\x3b\x78\xf8\x55\xbd\xe2\x5b\x72\x38\xd0\x9f\x15\xab\x90\x3c\x55\x87\x5d\x76\xc5\xbf\x09\xb2\x6f\x85\x68\x4d\xb5\xd4\x7d\xf6\xe6\x29\x00\x00\xff\xff\x14\x0f\x01\xd0\xa3\x02\x00\x00") + +func testE2eTestingManifestsStatefulsetNginxStatefulsetYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetNginxStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetNginxStatefulsetYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetNginxStatefulsetYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetRedisServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x8d\x41\x4b\x03\x31\x10\x85\xef\xf9\x15\x0f\x7a\x13\x0c\x88\xa0\x98\x5b\xc1\x8b\x97\x45\x2c\x78\x9f\x26\x4f\x1a\x4c\x37\x61\x66\x76\xc1\x7f\x2f\xdd\xea\xa9\xb7\x99\xf7\xcd\x37\x6f\x87\x3d\x4e\x94\xd2\x68\x06\xa3\xae\x35\x13\xde\x91\x95\xe2\xc4\xeb\x74\x80\x32\x77\x2d\x16\x64\xd4\x4f\xaa\xd5\x3e\x27\xac\x0f\xe1\xbb\xce\x25\xe1\x70\x55\xc2\x99\x2e\x45\x5c\x52\x00\x66\x39\x33\x41\x59\xaa\x05\xa0\xc9\x91\xcd\x2e\x39\x20\x63\xfc\x03\x1b\xcc\x97\x70\x74\xf5\x8d\xde\x6f\x63\xc2\xd3\xe3\xf3\xcb\x76\x7c\x7d\x33\x48\x0d\xc0\x0e\x77\x71\x13\x63\xe1\x97\x2c\xcd\xa3\xad\x39\xe6\xb6\x98\x53\x63\xeb\x59\x5a\x00\xfe\xf6\xb7\xf7\x84\xa9\xcf\x0c\x80\xb1\x31\x7b\xd7\x9b\x7e\x60\x2c\xc7\x56\xed\x34\x75\xff\xa0\x94\x9f\x7d\x29\x4a\x33\x5a\x82\xeb\xc2\xf0\x1b\x00\x00\xff\xff\x74\x30\x5a\xc0\x1a\x01\x00\x00") + +func testE2eTestingManifestsStatefulsetRedisServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetRedisServiceYaml, + "test/e2e/testing-manifests/statefulset/redis/service.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetRedisServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetRedisServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/redis/service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetRedisStatefulsetYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x55\x4d\x6f\xdb\x38\x10\xbd\xeb\x57\x0c\x84\x3d\xec\x1e\x64\xc1\x09\xb2\x8b\x25\xe0\x43\x90\x64\xf7\xd2\x24\x46\x5c\xb4\x87\xa2\x28\x68\x6a\x6c\xb3\xa1\x48\x96\x33\x72\x6a\x14\xfd\xef\x05\x25\x5b\xa6\x64\xb8\xcd\xb1\x3c\x09\x33\xf3\xde\x7c\xf0\x8d\x28\xbd\x7e\x87\x81\xb4\xb3\x02\xa4\xf7\x54\x6e\xa7\xd9\xb3\xb6\x95\x80\x05\x4b\xc6\x55\x63\x16\xc8\x59\x8d\x2c\x2b\xc9\x52\x64\x00\x56\xd6\x28\x20\x54\x19\x79\x54\xd1\x40\x18\xb6\x5a\xe1\x43\x6b\xcf\x03\x56\x9a\xf2\x0c\x20\xa0\x37\x5a\x49\x12\x70\xd9\x06\x19\x54\xec\x42\x04\x00\xd4\x92\xd5\xe6\x8d\x5c\xa2\xa1\xce\x00\x31\xb9\x80\x16\x9c\x01\x30\xd6\xde\x48\xc6\x7d\x74\x92\x3d\x1e\x33\x00\x8e\xa0\x00\x87\xba\xe2\xd1\x56\xf3\x8d\xb3\x2c\xb5\xc5\xd0\x43\x8a\x7d\x13\xda\x12\x4b\x63\x7a\x22\x5d\xcb\x35\x0a\x58\xab\x30\xd1\xae\x7c\x6e\x96\x18\x2c\x32\x52\x81\x17\x58\x30\x12\x17\x6d\x04\x95\x1e\x99\xca\x36\x63\xb1\xe7\xc0\x20\xa6\x93\x8b\x21\xd3\xbc\x31\x66\xee\x8c\x56\x3b\x01\xd7\xe6\x45\xee\xe8\x58\x72\x58\x27\x0d\x14\x90\x17\x07\xa2\x42\x5b\x76\xb3\xd2\x79\xce\x87\xfe\x17\x17\x9e\x8b\x4a\x87\x59\x79\xf8\x3a\x06\x6c\x9d\x69\x6a\xbc\x77\x8d\xe5\x01\x6d\xd7\xa6\xf3\xdc\xdb\x00\xea\x18\x35\x97\xbc\x11\x90\x8f\xd3\x74\xf1\x91\xbf\xd2\xe1\x1c\x66\x9c\xfe\x00\x5b\x3a\xc7\xc4\x41\xfa\xf1\x3c\x2b\x5c\x6a\x69\xc5\x67\x24\xd2\xd8\x3b\x95\xab\x6b\x69\xab\xc1\x14\x7a\xee\xd2\x23\x86\x62\xa5\x6d\x85\x49\x9b\xe3\xa9\x15\xce\x16\xc4\x32\xf0\x2c\x41\x1e\x6c\x13\xda\x0c\x27\xb8\xd7\xe9\xac\x57\x68\x77\xd0\x6e\x4f\x47\x36\x7f\xbc\xfd\xf4\x70\x7d\x7f\xb7\x98\x5f\xdf\xdc\x25\x83\xd8\x4a\xd3\xe0\x7f\xc1\xd5\x22\x31\x02\xac\x34\x9a\xea\x09\x57\x43\x6b\x54\xe6\x71\xbb\xb6\xd3\x91\xb3\x05\x75\x43\x3d\x28\x7c\x12\xb3\x93\x97\x0a\x7f\x8f\xab\x55\x67\x57\xe7\xb8\x6e\xbf\xbc\x68\xef\xc2\xb0\xf4\x9e\x75\xee\x02\x0b\xf8\xfb\xf2\x9f\x7f\x93\x82\x3a\xfe\x78\xff\x3f\x93\x4a\x6c\xaf\xdb\xc0\xfd\x1e\xc6\xdb\x4d\x20\x63\xa9\x8c\xe3\x27\xca\xd9\x55\xef\x0f\x28\x2b\x6d\x91\x68\x1e\xdc\x12\xd3\x5b\xc4\xaf\xc7\x9f\xc9\x99\x62\xba\x04\xb4\x19\x19\x0a\x35\x32\xe4\x27\x35\x2b\xa3\xa1\xd8\xc0\x1f\x7f\x6e\x1c\x71\xec\xfb\x2f\xf0\xda\xae\xf3\x04\x18\x7f\x60\x5a\x9a\x5b\x34\x72\xb7\x40\xe5\x6c\x45\x02\xa6\x57\x49\x04\xeb\x1a\x5d\xc3\xbd\xf3\xea\x95\xd2\x89\x7a\x3b\x2b\x85\x32\x7a\x5f\xaf\xb6\xf2\xe8\xe9\x92\x9e\xe8\x25\x85\x62\xed\x79\x77\xab\x83\x80\x6f\xdf\x47\x61\x63\x7d\x8e\x42\x3b\xf2\x1b\x23\x75\xfd\x76\xff\x44\xb4\x99\x8a\x93\x37\xe2\xb4\xc7\xf4\x59\x90\x4a\x21\xd1\xbd\xab\x90\x04\x7c\x80\xfc\x09\x65\xf5\x3e\x68\xc6\x47\xab\x30\x87\x8f\xd9\x41\x16\xe4\x9a\xa0\x30\x99\x5e\xc0\x2f\x0d\x52\x3a\x4f\x00\x62\x17\x5a\xfd\x4f\xff\xd7\xd9\x8f\x00\x00\x00\xff\xff\x4e\x22\x9b\xab\x51\x07\x00\x00") + +func testE2eTestingManifestsStatefulsetRedisStatefulsetYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetRedisStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/redis/statefulset.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetRedisStatefulsetYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetRedisStatefulsetYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/redis/statefulset.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetZookeeperServiceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\x8e\xb1\x6a\x03\x31\x10\x44\x7b\x7d\xc5\x80\xbb\x80\x0f\x92\x34\x87\x3a\x43\x9a\x34\x47\x88\x21\xfd\x5a\x9a\x60\x71\xf2\x49\xec\xea\x0e\xe2\xaf\x0f\x96\x53\xc4\xdd\xee\x7b\xbb\xc3\xec\x70\xc0\x99\x12\x33\xcd\x60\xd4\x2d\x05\xa2\x15\x04\xa5\x34\xe2\x6d\x3a\x42\x19\x8a\x46\x73\x52\xd3\x17\xd5\x52\x59\x3c\xb6\x67\x37\xa7\x25\x7a\x1c\xef\x2f\xee\xc2\x26\x51\x9a\x78\x07\x2c\x72\xa1\xc7\x75\x76\x40\x96\x13\xb3\xdd\x20\x20\xb5\x76\x6a\x95\xe1\x46\x6a\xd1\xd6\xd5\xbe\x8f\x1e\x2f\xe3\x38\xf6\xcb\x7b\x40\x25\xf5\x9f\x7d\x7d\xb4\x99\x12\xa9\x7b\x66\x86\x96\xca\xe2\x80\x1d\x9e\x86\xeb\x3c\x44\x7e\xcb\x9a\xdb\x60\x5b\x18\x42\x5e\xad\x51\x87\x5c\x82\x64\x07\xfc\xed\xef\x1f\x1e\x53\x59\xe8\x00\xeb\x01\x45\x1f\x2b\x02\x75\x3d\xe5\x64\xe7\xa9\xb4\x4f\x4a\xfc\x39\xc4\xa8\x34\xa3\x79\x34\x5d\xe9\x7e\x03\x00\x00\xff\xff\xf5\xf5\x6e\xd6\x37\x01\x00\x00") + +func testE2eTestingManifestsStatefulsetZookeeperServiceYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetZookeeperServiceYaml, + "test/e2e/testing-manifests/statefulset/zookeeper/service.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetZookeeperServiceYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetZookeeperServiceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/zookeeper/service.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStatefulsetZookeeperStatefulsetYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x55\x4d\x8f\xdb\x36\x10\xbd\xeb\x57\x0c\xd4\x33\x2d\x38\x8b\x00\x0b\x02\x7b\x58\xec\xa6\xbd\x74\x13\x23\x2e\xda\x43\x51\x14\xb4\x34\xb6\xb9\xa6\x38\xec\x70\xe4\x74\x5d\xf4\xbf\x17\x92\x25\x99\xb2\x63\x23\x45\xab\x93\x30\xf3\xde\x7c\xf1\x0d\x69\x82\xfd\x19\x39\x5a\xf2\x1a\x4c\x08\xb1\xd8\xcf\xb3\x9d\xf5\x95\x86\xa5\x18\xc1\x75\xe3\x96\x28\x59\x8d\x62\x2a\x23\x46\x67\x00\xde\xd4\xa8\xe1\x40\x94\xc5\x80\x65\x6b\x89\xc8\x7b\x5b\xe2\xc7\xce\x91\x1f\x76\x79\x06\xc0\x18\x9c\x2d\x4d\xd4\x70\xd7\x21\x1c\x96\x42\xdc\xa2\x01\x6a\x23\xe5\xf6\x47\xb3\x42\x17\x8f\x06\x68\x53\x6b\x38\xec\x32\x00\xc1\x3a\x38\x23\xd8\x43\x93\xc4\xed\xe7\x26\xac\x94\x07\x30\x94\xd3\x7e\xd6\x5b\x79\x22\x2f\xc6\x7a\xe4\x11\xaf\xfa\xe2\xad\x8f\x62\x9c\x1b\xa3\xd8\xda\x6c\x50\xc3\xa6\xe4\x99\xa5\x62\xd7\xac\x90\x3d\x0a\x46\x85\xef\x50\x09\x46\x51\x1d\x22\x16\x01\x25\x16\x07\xa2\x1d\x62\x40\x56\x7d\x1c\x64\x3d\x9f\xdd\x4d\xa3\x2d\x1a\xe7\x16\xe4\x6c\xf9\xa6\xe1\xd1\x7d\x31\x6f\xf1\x54\x33\x6f\x92\x0e\x14\xe4\x6a\x08\xa4\xac\x17\x7a\x28\x28\x48\x3e\xf5\x7f\x21\xde\xa9\xca\xf2\x43\x31\xfc\x9d\x00\x7b\x72\x4d\x8d\x2f\xd4\x78\x99\x84\x3d\xb6\x4a\x41\x46\x1b\x40\xdd\xa2\x16\x46\xb6\x1a\xf2\x36\x4d\x91\x5f\x10\xda\x04\x95\xe5\x6b\xa4\xf3\xfc\x03\x6d\x45\x24\x51\xd8\x84\xf3\xa1\xbe\x9a\xbd\xd1\x14\xd0\xbf\x56\x3b\x75\xaf\x5e\x19\x47\x44\x49\x75\x6d\x7c\x35\x99\xc5\x98\xa0\x08\x88\xac\xd6\xd6\x57\x98\x34\x7b\x3e\x3b\x45\x5e\x45\x31\x2c\x0f\x09\x73\xb0\xcd\xe2\x76\x3a\xc7\x5e\xa8\x0f\x47\x89\x1e\x3f\xf4\xfb\xcb\xa9\x2d\x3e\x3d\xff\xfe\xf1\xf1\xe5\xc3\x72\xf1\xf8\xf4\x21\x19\xc5\xde\xb8\x06\xbf\x67\xaa\x75\x62\x04\x58\x5b\x74\xd5\x67\x5c\x4f\xad\xad\x3a\x4f\xcb\xb5\x9f\x9f\x39\x3b\xd2\x71\xac\x83\xca\x67\x6d\xf6\x18\x4c\x89\xff\xcb\xe9\xfe\xe7\xc3\x3d\x11\xdb\xea\x6e\x10\xa5\x0e\xa7\xb5\x18\xd8\xe5\xd5\xfd\xeb\x17\x36\x51\x49\x2f\x10\x3d\x15\x48\x20\x9e\x76\x3d\x86\x5c\x10\x8b\x86\x77\xf7\xf7\xf7\x49\x49\xc7\xe0\xad\x6e\xae\x53\xee\xbe\x46\x71\x68\x2a\x64\xd5\x5d\x52\x96\xfc\x2d\x81\x76\x5b\x33\xb6\x5a\xac\xac\x2f\x0e\xbb\x25\xf2\x1e\x79\x16\xb7\x57\x75\xda\xe9\x51\xad\x89\x71\xc3\xd4\xf8\x6a\x74\x31\x9a\xca\x7a\x8c\x71\xc1\xb4\xc2\x54\x40\xf8\xe7\xe9\x3a\xbb\x52\x4e\x1f\x7b\x7b\x66\x50\xe5\x99\x21\xff\x6a\xd5\x4f\xce\xce\xe2\x16\x5c\x84\xe4\x1a\x38\x5e\x9d\xd6\xb8\x67\x74\xe6\x6d\x89\x25\xf9\x2a\x6a\x98\xbf\x4f\x10\x62\x6b\xa4\x46\x46\xe7\xfb\x6f\x54\xeb\x4d\x11\x4d\x35\xf4\xed\x4a\x2f\x52\xcf\x77\xd0\xe5\x06\xd9\x22\x0c\x62\x86\xd7\x26\x0a\xac\x89\xa1\xc2\x55\xb3\xd9\x58\xbf\xf9\x77\x7b\x31\xae\x45\x96\x36\x79\x21\xea\xb4\x0e\xac\x83\xbc\x3d\x5b\xd6\xf0\xd7\xdf\xd9\xed\x54\x67\xd0\x63\xf0\x27\x67\x6c\xfd\x53\xff\x12\x76\x99\xd4\xc5\x53\x78\x39\xd3\xf4\x01\x34\x65\x89\x31\xbe\x50\x85\x51\xc3\xaf\x90\x7f\x46\x53\xfd\xc2\x56\xf0\x93\x2f\x31\x87\xdf\x7a\x18\x63\xa4\x86\x4b\x4c\x4e\x8b\xf1\x8f\x06\x63\x7a\x7e\x00\x51\x88\xbb\x3d\x9d\xff\x60\xb3\x7f\x02\x00\x00\xff\xff\x73\x38\x7a\x58\x33\x08\x00\x00") + +func testE2eTestingManifestsStatefulsetZookeeperStatefulsetYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStatefulsetZookeeperStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml", + ) +} + +func testE2eTestingManifestsStatefulsetZookeeperStatefulsetYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStatefulsetZookeeperStatefulsetYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x8d\x3d\x4e\x04\x31\x0c\x46\x7b\x9f\xc2\x12\xb5\x77\xa4\x15\xe2\x67\x7b\x5a\x90\xd8\x82\xda\x9a\x38\xd9\x0c\x83\x1d\xc5\x49\x66\xe0\xf4\x68\x0e\x40\x47\xf7\xe9\x7b\xd2\x7b\x77\x78\x15\xc1\x76\x13\x7c\xfb\x78\x7d\x79\xbf\x62\xb0\xd9\x91\x1b\xde\x5a\x2b\x7e\x99\xa6\x64\xa7\xcf\x27\x3f\x65\x9b\x6c\x53\xa9\x0e\xc0\xa5\x54\x1b\x52\xfd\x02\x84\xce\x1c\x88\xd7\x0c\x84\xd5\xac\x45\x07\xc2\xa4\x3d\x66\x09\x40\xb8\x64\x4d\x7b\x7f\x7e\x3c\xa6\x73\xac\xac\x02\x84\x5f\xce\xfd\xfe\x0c\x84\x81\x47\x0e\x3f\x0f\xe7\x83\xef\x59\x13\x7d\xb3\x26\xa8\x32\xb2\x6c\xff\xe1\x5f\x24\xc6\xc1\x3a\x1f\xe7\x6c\x45\x16\x53\x20\x1c\x52\xfb\xda\xfe\xcc\xff\x06\x00\x00\xff\xff\x17\x10\x88\x37\x12\x01\x00\x00") + +func testE2eTestingManifestsStorageCsiOwnersBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiOwners, + "test/e2e/testing-manifests/storage-csi/OWNERS", + ) +} + +func testE2eTestingManifestsStorageCsiOwners() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiControllerRoleYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x8f\xb1\x0e\xc2\x30\x0c\x44\x77\xbe\xc2\x52\x57\x5a\xef\xfd\x0c\xfe\xc0\x49\x0c\x89\x48\xe3\xc8\x76\x2b\xfa\xf7\x8c\xad\xc4\x02\x03\xeb\x9d\xee\xde\xdd\x00\x37\xee\x95\x22\x27\x08\x3b\x94\x96\xca\x56\xd2\x4a\x15\x54\x2a\x1b\xdc\x45\x81\x5f\xce\xda\xa8\x8e\xe4\x4e\x31\xb3\x5e\x0f\xa9\xab\x6c\xc5\x8a\x34\x56\xa0\x96\x0e\xc3\x1a\x75\xcb\xe2\xce\x3a\x5f\x06\x18\x21\xbb\x77\x9b\x11\x1f\xc5\xf3\x1a\xa6\x28\x0b\x3e\xd7\xc0\xda\xd8\xd9\xc6\x68\x05\x3f\x38\x18\xaa\x04\x5c\xc8\x9c\x15\x13\xf7\x2a\xfb\x29\x83\x1a\x28\x4e\x3b\x2d\xf5\xd7\xfe\xd3\xe8\x7f\x21\x4e\xf7\xbf\x45\xbc\x03\x00\x00\xff\xff\x7b\xf7\xef\xf6\x8a\x01\x00\x00") + +func testE2eTestingManifestsStorageCsiControllerRoleYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiControllerRoleYaml, + "test/e2e/testing-manifests/storage-csi/controller-role.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiControllerRoleYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiControllerRoleYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/controller-role.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiExternalAttacherRbacYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x55\xdf\x8b\x1b\x47\x0c\x7e\xdf\xbf\x42\xdc\xbe\xb4\xe0\xb5\xc9\x5b\x71\x9f\x2e\x47\x5b\x02\x2d\x94\x5c\x09\x94\x12\x88\x3c\xa3\xf5\xaa\x9e\x9d\x59\x24\x8d\x9d\xcb\x5f\x5f\x66\xd6\xbe\x1f\x39\xa7\xb9\xe4\x1a\xe8\x93\x07\x59\xab\x4f\xfa\x24\x7d\x6a\xe1\x8f\x81\x15\xfe\xbc\xfc\xed\x57\xe8\x39\x10\xb8\x14\x0d\x39\x2a\x60\x08\xf0\xfa\xe5\xe5\x15\xa4\xcd\xdf\xe4\x4c\xc1\x06\x34\x40\x21\x88\xe4\x48\x15\xe5\x06\x2c\x81\xe4\x08\xf4\xde\x48\x22\x86\xa6\x85\xab\xeb\x57\x80\x66\xe8\x06\x92\x65\xd3\x36\x2d\xbc\x8a\x30\x49\xf2\xd9\x19\xa7\xb8\x00\x42\x37\x54\x2f\x2f\xbc\x27\x01\x4f\x53\x48\x37\x23\x45\x83\x01\xb5\x44\xdc\x10\xb8\xac\x96\x46\xfe\x40\x7e\xdd\xb4\xd0\x15\x2b\xee\x13\xfb\x92\x5d\x1f\xd8\x99\x2e\x20\x2b\x41\x4c\xb1\xf3\xd4\x63\x0e\x06\x11\x47\xd2\x09\x1d\x01\x46\x0f\x9e\xfb\x9e\xa4\x44\xad\xf6\xa6\x05\x80\x3e\x49\xfd\xe2\xd6\xd3\x03\x45\x63\x63\x52\x08\xbc\x23\xb0\x81\xe0\x2a\x64\x35\x92\xd7\x29\x50\x85\xf6\xe4\xd8\x13\x1c\x06\xb2\x81\xa4\xba\xdc\x4b\x59\x68\x0a\xec\xd0\x48\xeb\x3f\x27\x22\x4a\x81\x15\xf2\x44\xc5\x02\x38\xc2\x61\x60\x37\x80\x43\x25\x08\x84\x9e\x44\x07\x9e\x80\x02\x55\x6a\x60\xcc\x6a\xa5\x78\x8a\xb8\x09\xe4\x7f\xac\x01\xac\x74\x87\x63\x1f\x32\x45\x77\x44\xa9\x5d\x51\xb2\x3c\x2d\x40\x89\x60\x43\x21\x1d\x9a\x06\x27\x7e\x43\xa2\x9c\xe2\x1a\xf6\x2f\x9a\x1d\x47\xbf\x86\x6b\x92\x3d\x3b\xba\x74\x2e\xe5\x68\xcd\x48\x86\x1e\x0d\xd7\x0d\x54\x62\xd6\xe0\x94\xbb\x53\x96\x0d\x40\x5b\x4b\x2a\x2c\x1e\xd8\x86\x4f\x10\x5c\x5e\xc7\x00\xd5\xb0\x86\xa3\x4f\xd3\x74\x5d\xd7\xb4\x70\x79\x0c\x78\x5b\x53\xa9\xa8\x74\xf1\x90\x64\x37\x47\xfe\xfd\x8d\x2e\x20\x26\x4f\x5a\xfb\xf5\x26\x85\x3c\xd2\xfc\x5d\x61\x56\x8f\xf9\xdf\x6f\xc7\xfd\x02\x65\x83\x6e\x89\xd9\x86\x24\xfc\x01\x0b\x7f\xcb\xdd\x0f\xba\xe4\xb4\xda\xbf\x38\x53\xe5\xa9\x31\xb7\xa5\x76\x92\x63\x24\x69\x24\x07\xd2\xe2\xd7\x01\x4e\xfc\x8b\xa4\x3c\xe9\x1a\xfe\xba\xb8\x78\xdb\x00\x00\x08\x69\xca\xe2\xa8\xda\xa6\x02\xae\x46\xd1\xf6\x35\x5b\x3d\x3a\xed\x49\x36\xd5\x61\x4b\x76\xb1\x80\x8b\xc0\x5a\x7f\x0f\x68\x6e\x28\x8f\x3c\x79\x34\x2a\xaf\xa9\x9a\xde\x3e\x0d\xaf\xb2\xf3\x24\x8c\x33\x01\xd5\x92\xe0\x96\x8e\xac\x9c\x0b\xef\x94\xbf\x31\xc2\x4c\x13\xde\x35\xf5\x3f\x24\xec\x2b\xd0\x57\x6a\x68\xf9\x51\x12\x27\x88\xf6\x9a\x9c\x90\xc1\x44\x32\xb2\x96\x31\x03\x56\x48\x53\x19\x2e\x0c\xcb\xa6\xfd\xa9\x2e\x26\xb0\x01\xf7\x70\x93\x32\x44\x22\x0f\x7b\x0c\x99\xa0\x97\x34\x82\xd6\x00\xcb\xa6\xfd\x39\x09\xd0\x7b\x1c\xa7\x40\x8b\xea\x39\xe0\x9e\x60\x47\x37\xf0\xce\x29\x2f\x1f\xe6\xbe\x2a\x92\x2b\x29\x04\x92\x6e\xca\x9b\xc0\x3a\x74\x73\xa4\xaa\x54\xef\x8a\x74\x5c\xcf\x5f\x5c\x05\x54\x5d\x4e\x28\x38\x92\x91\x68\xd3\x96\xfd\x1f\xcc\x26\x5d\xaf\x56\xbb\xbc\x21\x89\x64\xa4\x5d\x41\xd9\xb2\x0d\x79\x53\x00\x7c\x72\xba\x9a\x43\x6a\x87\xd1\x77\x4e\xc8\x17\xe9\xc3\xa0\xcb\xc1\xc6\x22\xdc\x67\x06\xb2\x7d\x44\xe9\x31\xc6\xe9\xbf\xb3\x7d\x7c\x3b\x8b\xc0\xa3\xf5\x7d\xc9\xd1\x73\xdc\x3e\x67\x8b\xef\x6b\x55\x27\x45\x12\x34\xcf\xc7\x69\xde\xe0\xb3\x92\x57\x12\x3d\x2b\x75\x5f\x26\x76\x67\xe5\xae\xe4\xf0\x9a\xfa\x82\xfe\x58\xae\x3e\xab\x3d\x70\xcb\xf8\xbf\x30\xf1\x05\x92\x5a\x8e\x23\x6f\x47\x9c\x14\x92\x94\x13\xa3\x54\x6e\x47\xbd\x19\x2e\xcb\xdd\x35\x2c\x45\x34\x6d\x99\xe2\xef\x8a\xf6\xa6\x18\x6e\x80\xfb\xef\xcf\x5e\x25\xd6\xd3\x41\x3a\xb6\xf4\xeb\xa5\xf8\x99\xb7\xe5\xd3\x7c\xba\x7e\x7b\x12\xf2\x8f\xa6\xd8\xa5\x24\x9e\xe3\xfd\xac\xea\xfa\x3f\x98\xea\x99\xa9\x6a\xff\x78\xa2\x6f\x15\xe9\x24\x51\x9e\x02\xcd\xca\x74\xa7\x51\x4e\xa8\xbc\x1e\x0c\xfe\xb7\x9a\xf8\x5a\xeb\xb3\xa9\xfc\xbf\xad\xcd\x67\xf6\x65\xae\xf9\x29\xcb\xf2\x4f\x00\x00\x00\xff\xff\x80\xf5\x0a\x99\xcf\x0a\x00\x00") + +func testE2eTestingManifestsStorageCsiExternalAttacherRbacYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiExternalAttacherRbacYaml, + "test/e2e/testing-manifests/storage-csi/external-attacher/rbac.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiExternalAttacherRbacYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiExternalAttacherRbacYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/external-attacher/rbac.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiExternalProvisionerRbacYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x56\x41\x6f\xe3\x36\x13\xbd\xeb\x57\x0c\xac\xcb\xf7\x01\x96\x8b\xbd\x15\xea\x29\x1b\x14\xc5\x02\x5b\xb4\xc8\x2e\x0a\x14\xc5\x02\x4b\x93\x23\x6b\x1a\x9a\x54\x39\x43\xb9\xd9\x5f\x5f\x0c\x2d\x3b\x4e\xa2\x24\xde\x4d\x0a\xf4\x26\x90\xd4\xbc\x79\x6f\xa8\xf7\x54\xc3\xc7\x9e\x18\x7e\xbf\xf8\xf9\x3d\x74\xe4\x11\x6c\x0c\x62\x28\x30\x18\xef\xe1\xea\xed\xc5\x25\xc4\xf5\x9f\x68\x85\x41\x7a\x23\x60\x12\x42\x40\x8b\xcc\x26\xdd\x80\x44\x48\x39\x00\xfe\x2d\x98\x82\xf1\x55\x0d\x97\x1f\xde\xc1\x90\xe2\x48\x4c\x31\x60\x5a\x55\x75\x55\xc3\xbb\xa0\x6b\x2e\x5b\xa1\x18\x96\x80\xc6\xf6\xe5\xa0\x4b\x34\x62\x02\x87\x83\x8f\x37\x5b\x0c\x02\xbd\x61\x2d\xba\x46\xb0\x99\x25\x6e\xe9\x0b\xba\xb6\xaa\xa1\xd1\x55\x33\x46\x72\xda\x60\xe7\xc9\x0a\x2f\x21\x33\x42\x88\xa1\x71\xd8\x99\xec\x05\x82\xd9\x22\x0f\xc6\x22\x98\xe0\xc0\x51\xd7\x61\xd2\xaa\x65\xbd\xaa\x01\xa0\x8b\xa9\xbc\x71\x3c\xe9\x00\x83\x90\x10\x32\x78\xba\x46\x90\x1e\xe1\xd2\x67\x16\x4c\x57\xd1\x63\x81\x76\x68\xc9\x21\xec\x7a\x94\x1e\x53\x39\x72\xd2\x72\xc2\xc1\x93\x35\x82\x5c\x76\x0e\x5a\x28\xc1\x02\x79\xa2\xc6\x12\x28\xc0\xae\x27\xdb\x83\x35\x8c\xe0\xd1\x38\x4c\xdc\xd3\x00\xe8\xb1\xa8\x03\xdb\xcc\xa2\xfc\x31\x98\xb5\x47\xf7\x43\xa9\x21\x3a\x23\x0a\x9d\xcf\x18\xec\x04\x54\x66\xc3\x28\x79\x58\x02\x23\xc2\x1a\x7d\xdc\x55\x95\x19\xe8\x37\x4c\x8a\xd7\xc2\xf8\xa6\xba\xa6\xe0\x5a\xf8\x80\x69\x24\x8b\x17\xd6\xc6\x1c\xa4\xda\xa2\x18\x67\xc4\xb4\x15\x14\x6d\x5a\xb0\x4c\xcd\x49\xa3\x15\x40\x5d\x88\xa9\x96\x3b\x92\xfe\x11\x99\xf5\x69\xaa\x51\x16\x5a\x98\xce\x54\x55\xd3\x34\x13\xf8\xa9\x9c\xa7\xdd\xa5\xb5\xb1\x2b\x93\xa5\x8f\x89\xbe\x18\x25\xbf\xba\xfe\x9e\x57\x14\xbf\x1b\xdf\xcc\xb4\x78\x10\xf6\xb4\xcf\x26\xe5\xa0\xed\xa6\xec\x91\xdb\xd2\xf5\xc7\x1e\xa1\x8b\xde\xc7\x1d\x85\x0d\xe8\x06\x70\x1f\xb3\x77\x2a\x6a\x0e\x36\x6e\x75\x6a\xe8\xca\x55\x18\x7c\xde\xe8\x5d\x2f\x57\x3b\xe1\x5f\x99\x12\x02\xa3\x4d\x28\x5c\xaa\x95\x43\x07\x3c\x0a\x9b\x55\x59\x6d\xc0\x0c\xf4\x53\x8a\x79\xe0\x16\xfe\x58\x2c\x3e\x95\x55\x80\x84\x1c\x73\xb2\x58\x56\xa7\x32\xc7\xcd\x11\xd3\xba\x6c\x6c\x50\x16\x4b\x58\x78\x62\x29\x9b\x73\xd5\xee\xd5\x1a\x54\x33\x16\x0c\x32\x46\x9f\xb7\xc8\xd3\xa1\xd9\x9a\x4b\x58\xec\x8c\xd8\x5e\x1f\x6c\x42\x23\xa8\x4f\x0e\x3d\x0a\x7e\x2b\xa0\xf5\x86\xb6\x67\xa3\xe6\xc1\x99\x79\x2c\x96\x98\xcc\x06\xa7\x41\xcf\x21\x4f\x27\xac\x37\xcc\x67\xf2\x3c\x93\x13\x8e\x18\xe4\x41\xc5\x27\x24\x9b\x68\x2c\x61\x31\x3c\x86\xc3\xc1\x0c\xdc\x47\x59\x3d\x4f\x6c\x9a\xdc\xf4\xc2\x93\xcc\x5e\x13\x48\xfd\x7c\x8e\xf7\x73\x78\xcf\xc2\x58\xa6\x10\xdd\xeb\x8e\xe8\x6b\x0a\xce\x3b\xcc\x5b\x0a\x8e\xc2\xe6\x25\x46\x73\xcf\x0b\x9b\xa4\xc6\xc5\x79\x9f\x82\x6d\x21\x32\xeb\xaa\xda\xf4\x63\x6e\xfa\x75\x7e\x3a\xeb\xa8\xda\xc6\x15\x76\xda\xc0\x43\x5f\x3d\xc7\x24\xe1\xa8\xff\x13\x92\xec\x65\xad\xe1\xd7\xdb\xf7\x8f\x91\xa4\x81\xa4\x39\xbc\x8b\xe9\x7a\xcf\x02\x83\x1b\x22\x05\xd1\x70\x02\x9b\xd3\x6d\xda\x6a\xef\x55\x0d\xd4\xc1\xff\x34\x8b\x63\xf0\x37\x40\xdd\xff\x67\x23\x8f\xf8\x90\x76\xd3\x3c\xbf\x3d\x2a\x5e\x98\x5a\x4f\xca\x68\xbb\xcd\x21\x68\x6a\xf8\x45\x09\xc5\x80\x10\xbb\x92\xc6\x77\x23\x87\x4b\x70\xdc\xaa\x13\x93\x12\x67\x64\xe5\x3a\xe5\x8c\x83\xb5\x61\x54\x69\xaa\x1a\x76\x1a\x40\xc4\x9a\xe7\xe5\xd5\xcf\x4d\xb3\x57\xaa\x39\xa8\xd4\xc8\xcd\x80\x9f\x57\xf0\xe3\xb1\xa8\xfe\x8a\x39\x1c\x12\xea\xcf\x87\xd3\x09\x74\x66\x8c\x49\x3b\x7a\x5f\xc0\x56\xd5\xdc\x27\x77\xd7\x13\x0f\xd5\xca\xd6\xfd\x4f\xee\xe8\x89\x87\x6f\x6f\x0a\x91\x3b\xde\x38\xf9\xe5\xa7\xfb\x60\x36\xc6\xe4\x28\x9c\x4e\xeb\x21\xfe\x5e\x95\x57\x00\x3f\x71\x83\x7f\xd1\x06\xca\x1d\x78\xf1\x2d\xfb\x0f\x7a\xc9\xf3\x26\xb2\x67\x7e\x8e\x83\xfc\x13\x00\x00\xff\xff\xd9\x60\x5c\x55\x53\x0c\x00\x00") + +func testE2eTestingManifestsStorageCsiExternalProvisionerRbacYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiExternalProvisionerRbacYaml, + "test/e2e/testing-manifests/storage-csi/external-provisioner/rbac.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiExternalProvisionerRbacYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiExternalProvisionerRbacYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/external-provisioner/rbac.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiExternalResizerRbacYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x55\x41\x8b\x23\x37\x13\xbd\xf7\xaf\x28\xec\xcb\xf7\x81\xed\x65\x6f\xa1\x73\x9a\xf5\x21\x2c\x24\xb0\xcc\x2c\x03\x21\xe4\x20\x4b\xaf\xdd\x95\x91\xa5\x8e\xaa\xd4\xce\xcc\xaf\x0f\xd2\xb4\x1d\xef\xd8\x3b\x99\xac\x09\xe4\xe4\x46\x2a\x55\xd5\x7b\xf5\x5e\x79\x4e\x9f\x7b\x16\xfa\xf9\xe6\xa7\x1f\xa9\x63\x0f\xb2\x31\xa8\xe1\x20\x64\xbc\xa7\xdb\x0f\x37\x6b\x8a\x9b\xdf\x60\x55\x48\x7b\xa3\x64\x12\x28\xc0\x42\xc4\xa4\x47\xd2\x48\x29\x07\xc2\x1f\x8a\x14\x8c\x6f\xe6\xb4\xbe\xfb\x48\x09\xc2\x4f\x48\xab\x66\xde\xcc\xe9\x63\xa0\x21\x45\x97\xad\x72\x0c\x0b\x82\xb1\x7d\x0d\x72\x89\x47\x24\x72\x18\x7c\x7c\xdc\x21\x28\xf5\x46\x4a\xc2\x0d\xc8\x66\xd1\xb8\xe3\x27\xb8\xb6\x99\xd3\xb2\x9c\x9a\x31\xb2\x2b\xcd\x75\x9e\xad\xca\x82\xb2\x80\x42\x0c\x4b\x87\xce\x64\xaf\x14\xcc\x0e\x32\x18\x0b\x32\xc1\x91\xe3\xae\x43\x2a\x59\xeb\x79\x33\x27\xa2\x2e\xa6\xfa\xe2\x18\xe9\x08\x41\x59\x19\x42\x9e\x1f\x40\xda\x83\xd6\x3e\x8b\x22\xdd\x46\x8f\x5a\xda\xc1\xb2\x03\xed\x7b\x68\x8f\x54\x43\x4e\x5a\x4e\x18\x3c\x5b\xa3\x90\x7a\x73\xe0\xa1\x00\xac\x25\x27\x26\x16\xc4\x81\xf6\x3d\xdb\x9e\xac\x11\x90\x87\x71\x48\xd2\xf3\x40\xf0\xa8\xcc\xd0\x2e\x8b\x16\xec\x08\x66\xe3\xe1\xbe\xaf\xef\xb5\xcc\x86\x43\xe7\x33\x82\x9d\x8a\xd4\x99\x08\x34\x0f\x0b\x12\x80\x36\xf0\x71\xdf\x34\x66\xe0\x7b\x24\xe1\x18\x5a\x1a\xdf\x37\x0f\x1c\x5c\x4b\x77\x48\x23\x5b\xdc\x58\x1b\x73\xd0\x66\x07\x35\xce\xa8\x69\x1b\xaa\xbc\xb4\x64\x85\x97\x53\x93\x0d\xd1\xbc\x02\x2a\x1c\xee\x59\xfb\xaf\xd0\x5b\xbe\xa6\xf7\xf5\xa0\xa5\x29\xa6\x69\x96\xcb\x65\x33\xa7\xdb\xe7\x7c\x47\x44\x05\x4f\x19\xe1\x3e\xa6\x87\xe7\xc4\x9f\xee\xd7\xb2\xa0\x4f\xf7\xb2\xa0\xbb\xb5\xac\xa6\x66\x4f\xa9\x3f\x45\x93\x36\xc6\xae\x4c\xd6\x3e\x26\x7e\x32\x85\xac\xd5\xc3\x77\xb2\xe2\xf8\x6e\x7c\x7f\x01\xd2\x61\x08\x07\x5c\xcb\x94\x43\x40\x6a\x52\xf6\x90\xb6\xa2\xfc\xdc\x83\xba\xe8\x7d\xdc\x73\xd8\x52\xb9\x20\xe9\x63\xf6\xae\xb4\x9b\x83\x8d\xbb\x32\x5d\xb8\x2a\x99\xc1\xe7\x6d\xf1\x43\x95\x7f\xc2\xef\x99\x13\x48\x60\x13\x54\x6a\xb6\x1a\x94\xe2\xc8\xa5\x5d\x0e\xdb\x55\x3d\x5d\x92\x19\xf8\x87\x14\xf3\x20\x2d\xfd\x32\x9b\xfd\x5a\x4f\xab\x24\x62\x4e\x16\xf5\x74\x4a\x73\xbc\x1c\x91\x36\xf5\x62\x0b\x9d\x2d\x68\xe6\x59\xea\xef\xde\xa8\xed\x6b\xd4\xa5\xb4\x2f\x92\x0e\x85\x38\x51\x04\x1d\xa3\xcf\x3b\xc8\x14\xf4\x7a\xf2\x05\xcd\xf2\xe0\x8c\xa2\x7c\x0d\xd7\xd4\xb3\xde\xf0\xee\x6d\x45\xaf\xaa\xf0\x4e\xd4\x68\x3e\x2b\xf4\x8d\x28\x30\x22\xe8\x59\xb2\x33\x8e\x6c\xc2\x94\xfd\xbc\x4e\xd5\xff\x99\x96\x3f\x70\x70\x1c\xb6\xd7\x48\xfa\xc4\xa5\xcb\x54\xec\x21\xf9\x79\x27\xb7\x15\xdb\x45\xaf\x17\x18\x97\x3c\xfe\xcf\x5c\x7e\xd1\xe7\xa5\x85\x5b\x74\xa5\xf8\xb9\x73\xff\xce\x86\x74\x1c\xc5\x2b\x34\xbc\x7d\x95\x20\x38\x1a\x22\x07\x2d\x2b\xd6\xe6\xf4\xd7\xce\x2f\x3d\x37\x73\xe2\x8e\xfe\x57\xfe\x11\x62\xf0\x8f\xc4\xdd\xff\x2f\x2e\x5f\x96\xc3\xde\x9d\xe6\xf7\xed\x4b\xe8\xca\x1d\xfa\x55\xfa\x6c\xb7\x3d\xac\xb0\x17\x6a\xb6\x31\x26\xc7\xe1\xb4\xa9\x2a\xe3\x2f\xe4\xed\x61\x64\xda\x04\x2f\x2d\x79\xd4\xf6\x41\xec\x0e\x1e\x2f\x35\x3e\xe9\xfe\x0b\x91\xff\x4b\xea\xae\x50\xaf\x26\xf2\x3f\x66\x91\xd7\xbd\xf1\x8c\xf8\x2d\xc6\xf8\x33\x00\x00\xff\xff\x47\xf8\xe7\x76\xb0\x09\x00\x00") + +func testE2eTestingManifestsStorageCsiExternalResizerRbacYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiExternalResizerRbacYaml, + "test/e2e/testing-manifests/storage-csi/external-resizer/rbac.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiExternalResizerRbacYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiExternalResizerRbacYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/external-resizer/rbac.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiExternalSnapshotterRbacYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x55\x4d\x8f\xdb\x36\x10\xbd\xf3\x57\x0c\x56\x57\xcb\x41\x6e\x85\x6e\x9b\x2d\x50\x04\x68\x11\x60\x13\x14\x28\x0a\x1f\xc6\xe4\xc8\x62\x97\x26\x85\xe1\x50\x5b\xe7\xd7\x17\xa4\x25\xc5\x1f\xea\xc2\x4d\x9d\x1b\x41\x0d\x67\xde\x7b\x33\x6f\x54\xc1\x97\xb0\x23\xe9\x88\xe1\xd5\x4a\x07\xd2\x11\x3c\x7f\x78\x7c\x82\xd6\x3a\x82\x36\x30\xd0\xdf\x42\xec\xd1\xd5\x3d\x87\xc1\x46\x1b\x3c\xf1\x0a\xa4\xb3\x11\xfe\x78\xfc\xed\xd7\x12\xa8\x2a\xd0\xc1\x0b\x5a\x1f\x01\x9d\x3b\x66\x08\xdb\xbf\x48\x4b\x04\xe9\x50\x00\x99\xc0\x93\xa6\x18\x91\x0f\x20\x01\x38\xf9\x39\x35\x3c\x7d\xfe\xa8\x2a\x88\x1e\xfb\xd8\x05\x11\xe2\xb5\xaa\x54\x05\x1f\x3d\xf4\x1c\x4c\xd2\x62\x83\x5f\x01\xa1\xee\x72\x28\x18\xb6\x03\x31\x18\xea\x5d\x38\xec\xc9\x0b\x74\x18\x73\xd2\x2d\x81\x4e\x51\xc2\xde\x7e\x25\xd3\xa8\x0a\xea\x7c\x8b\x43\xb0\x26\x03\x6c\x9d\xd5\x12\x57\x90\x22\x81\x0f\xbe\x36\xd4\x62\x72\x02\x1e\xf7\x14\x7b\xd4\x04\xe8\x0d\x18\xdb\xb6\xc4\x39\x6b\xb9\x57\x15\x40\x11\x22\xbf\x98\x23\x0d\x90\x17\x2b\x96\x22\x38\xfb\x42\x45\xb7\x27\x97\xa2\x10\x3f\x87\x22\x48\x0d\xa1\xcf\xb8\xd1\xb9\x03\x30\xe5\x97\x25\xea\x22\xcd\xc9\x23\xb0\x6d\x8e\x60\x2a\x25\xb3\x62\x33\xe6\x63\x73\x42\xe9\xd3\x37\xda\x51\x29\xec\xed\xef\xc4\xb9\x2b\x0d\x0c\xef\xd5\x8b\xf5\xa6\x81\xcf\xc4\x83\xd5\xf4\xa8\x75\x48\x5e\xd4\x9e\x04\x0d\x0a\x36\x0a\x0a\xa5\x06\x74\xb4\xf5\x89\xda\x4a\xd5\x75\x3d\xbe\x3d\x25\x71\x9a\x9c\xb7\xa8\xd7\x98\xa4\x0b\x6c\xbf\x62\x26\xb6\x7e\xf9\x29\xae\x6d\x78\x37\xbc\x3f\xab\x50\x4d\x64\x27\x36\xe7\x4c\x66\x0c\xf3\x5c\x9d\x00\xa9\x39\x79\x4f\xac\x38\x39\x8a\x39\x59\x0d\xd8\xdb\x5f\x38\xa4\x3e\x36\xf0\xe7\xc3\xc3\x46\x01\x00\x30\xc5\x90\x58\x53\xb9\xa3\x21\x2b\x31\x7e\x19\x88\xb7\xe5\xd6\xd9\x28\x0f\x2b\x78\x78\x45\xd1\x5d\x3e\x68\x26\x14\xca\xa7\xd4\x9b\xf1\xd4\x97\x8f\x9b\xdb\xea\x44\xd2\x4c\xd7\x85\x76\x54\xea\x94\x7a\x0b\x99\x26\x72\xeb\x28\x81\x71\x47\xa3\x68\x4b\x05\x86\xe0\xd2\x9e\xa6\x07\xda\x61\x8c\xf4\x66\xb9\x99\xde\x5d\xeb\x06\x2f\x4b\x82\x7e\xd3\x6f\x11\xc2\x99\xae\x86\x1c\x09\xfd\x10\x58\xef\xa2\xa0\xa4\x2b\x74\x63\xed\xcd\xbf\x4c\xf2\x07\xeb\x8d\xf5\xbb\xef\x1b\xe8\x45\xcb\xd4\x9c\x0d\x12\xd3\x71\xc7\x1d\x47\x75\xd1\x7c\x19\xe6\xb2\xe9\xf2\x97\x6c\x96\xde\xe5\xcd\x53\x0c\xbe\xbc\x94\xf2\x69\xce\x53\xae\x1a\x18\xa3\x54\x86\xf1\x4c\x6d\x06\x70\xed\xdf\x9c\x5f\x77\xe8\x77\xe3\xe6\xc9\xae\x44\x17\x03\x14\x5b\x1e\xfd\x79\xb6\x80\x76\x24\x71\xb4\xaf\xb9\xc9\xa8\x30\xb7\xf7\x0d\x41\x4f\x9b\xf2\xfd\x7b\xe5\x9a\x3c\x54\xf0\xe5\xd3\xcf\x9f\x9a\x73\x0d\x27\xa6\x47\xed\x0e\x21\xc1\x2b\x7a\x29\x1b\xfc\x10\x12\x43\xb4\x86\x34\xf2\xdb\xf4\x1c\xa1\x21\x26\x47\xe5\xd7\x33\xed\xa3\x8b\x61\xd6\x21\xb0\xb1\xfe\x14\x74\x99\xcb\xb3\x31\x76\x84\x93\x8d\x2f\x4d\x3c\x3b\x67\xb2\xd2\xe8\x9b\x33\x2f\x8d\xbe\xdb\x5c\x8a\x78\x87\x91\xbe\x85\xf9\xfd\x75\xff\xdf\x9e\xb9\x37\xa0\x2b\x0b\x8d\xde\xf9\x2f\x22\xdd\xe4\x82\x7f\x02\x00\x00\xff\xff\x99\x98\x92\xb6\x6c\x09\x00\x00") + +func testE2eTestingManifestsStorageCsiExternalSnapshotterRbacYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiExternalSnapshotterRbacYaml, + "test/e2e/testing-manifests/storage-csi/external-snapshotter/rbac.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiExternalSnapshotterRbacYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiExternalSnapshotterRbacYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/external-snapshotter/rbac.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiGcePdController_ssYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xd4\x95\x51\x6b\x23\x37\x10\xc7\xdf\xfd\x29\x06\xf7\x79\xd7\x4e\xca\x95\xb2\xe0\x07\x93\x33\x6e\xb8\x9c\x63\x2e\xa1\x7d\x3c\x26\xda\xf1\x5a\xb5\x56\x52\x67\x66\x37\xe7\x96\x7e\xf7\xa2\xec\x3a\x5d\x27\x0e\x6d\x28\x09\x54\x60\x30\xd2\xfc\xff\x33\xf3\x93\xb4\xda\x59\x5f\x16\x70\xa3\xa8\xb4\x69\xdc\x0d\xe9\x08\xa3\xfd\x99\x58\x6c\xf0\x05\x60\x8c\x32\x69\xcf\x46\x35\x29\x96\xa8\x58\x8c\x00\x3c\xd6\x54\x80\x11\x9b\x55\x86\xb2\x58\x66\x26\x78\xe5\xe0\x1c\xf1\x48\x22\x99\x14\x23\xc4\xad\x35\xb4\x7a\x08\x1d\xff\x1d\x3b\x1e\x01\x30\x45\x67\x0d\x4a\x01\x67\x0f\x91\x8e\x8c\x06\x4e\x2a\x80\x1a\xd5\x6c\xaf\xf0\x8e\x9c\x74\x13\x90\x4a\x28\xa0\x32\x31\x33\xa1\x8e\x8d\x52\x16\x53\x71\xa2\xe4\x35\x2b\xad\xec\xb2\xe4\x5e\xb2\x6d\x89\x47\x00\x4a\x75\x74\xa8\xd4\xdb\x0d\xca\x4e\xc3\x1d\x39\xbf\xd6\x1b\xe0\xd0\x5e\x1a\xdf\xc1\x4f\x41\x14\x3c\xe9\x7d\xe0\x1d\xd4\x8d\x28\xdc\x11\x34\x42\x25\x6c\x02\x83\xf5\x4a\x8c\x46\x6d\xf0\x70\x6f\x75\x0b\xbf\x04\xde\xb9\x80\x25\x5c\x96\xe4\xd5\xea\x1e\xac\x87\xe5\xa7\xc5\xa3\x9f\x58\x6f\x08\xac\x3e\x10\x42\x43\x02\xcb\x8b\x05\x7c\xee\x7b\x80\x1b\xe2\x96\xb8\xf3\x5a\x7e\x7a\xb6\x90\xc3\x17\xaa\x43\x4b\x8f\x76\xba\xb5\x02\x4c\xbf\x35\x96\xa9\x26\xaf\x70\xbf\x25\x0f\x56\xa4\x21\x78\x58\x91\xe0\x5a\x2a\x01\x7d\x09\x77\xb4\x09\x4c\x80\x7e\x0f\xf4\x2d\x06\x69\x98\x20\x6c\x1e\xad\x6a\x52\xb6\x46\x20\x06\x56\xe9\x67\xb7\x41\x74\xd5\x35\x5f\x80\x72\x73\x48\xdc\x6f\xfd\xdc\x98\xd0\x78\x5d\xbd\x7c\x58\x32\xc1\x5e\x92\xe6\xd0\x7a\xe2\xc1\xd6\x64\x83\x73\x26\x1e\xa3\x6c\x83\x6a\xbf\x0d\xdd\xb0\x35\x56\x54\xc0\xee\x47\xc9\x2b\xc3\xb9\x0d\x13\xb1\x55\x26\x1a\x18\x2b\x9a\x3c\xd1\x15\xed\xf7\xf9\x34\x3f\x1f\xc8\x91\xab\x41\xba\x2e\xe5\x38\xcb\xda\xd9\x87\xf1\xf3\xd9\xe4\x86\x65\xc9\x24\x32\x4b\xd6\xe9\x97\x4b\x30\xbb\xf1\xd3\x82\xd6\x8d\x73\xeb\xe0\xac\xd9\x17\x30\x77\xf7\xb8\x97\x41\x44\x1b\x5c\x53\xd3\xe7\x04\xe6\x59\xee\xae\xdd\xe4\x49\xe9\xf0\xf1\xd1\x32\x40\x9d\x44\x6b\xd4\x6d\x01\x29\xf9\x49\x4e\x91\x43\x6b\xd3\xc5\x3d\xc5\xa9\x67\x54\xed\x28\x63\x72\x84\xd2\x31\x1a\x68\x8a\xf6\x2c\xff\x21\x9f\x66\xd5\x8e\xf2\xe9\x9b\x92\xea\x63\x37\x84\xda\x30\x65\x15\x2a\xc9\xec\x36\xc4\xe0\x42\xb5\x9f\xa5\xc3\x34\x7e\x3f\x6a\xa8\x8a\x66\xfb\x0a\x64\x07\x41\xd1\x9e\xe7\xe7\xef\xc2\xeb\x8d\x09\x30\x89\xfd\xfd\x15\x00\xfa\xf8\xa2\x9d\xe6\x1f\xfe\xef\xfd\xf7\x9f\xa5\xc1\x47\xfe\x9f\x08\xfc\xbb\xf7\x22\x5d\xa6\x69\x7e\xf6\xdf\xe0\x90\x2f\x63\xb0\x5e\x67\x8d\xb7\xdf\x8a\x17\xf1\x90\x6f\x4f\x53\x59\x5e\x5f\x2f\xaf\x16\x5f\xe7\xeb\xf5\xd5\xe5\xc5\xfc\xf6\xf2\x7a\xf5\xf5\xe2\xcb\xe2\xe3\x62\x75\x7b\x39\xbf\xba\x79\x42\xaa\x45\xd7\xa4\xd7\x7a\x42\x6a\x26\xc6\x85\xa6\xcc\x04\x1f\xff\xe4\xbf\x4a\xf0\x6f\xbc\x27\x43\xf1\x21\x6f\xd6\xe5\x79\xe2\xc0\x84\xe5\xb5\x77\xfb\xa3\x97\xe7\x84\xfd\x71\x33\x87\xf2\x3b\xcb\x13\x8f\xcd\xc9\x8a\xa9\x8e\xba\xff\x68\xb9\x80\x3f\xfe\x7c\x7e\x7d\x5e\x2c\x53\xc8\x30\xe9\x31\x99\x6e\x6e\x75\xa4\x1c\xfd\x15\x00\x00\xff\xff\x21\xae\x34\xd9\x82\x09\x00\x00") + +func testE2eTestingManifestsStorageCsiGcePdController_ssYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiGcePdController_ssYaml, + "test/e2e/testing-manifests/storage-csi/gce-pd/controller_ss.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiGcePdController_ssYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiGcePdController_ssYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/gce-pd/controller_ss.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiGcePdCsiControllerRbacYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x57\xc1\x8e\xe2\x38\x10\xbd\xe7\x2b\x4a\xf4\x65\x57\x22\x44\xbd\xa7\x15\xb7\x5d\x0e\x7b\x45\xcd\xaa\x2f\xa3\x39\x38\x4e\x75\xf0\xe0\xd8\x96\xab\x9c\x6e\xfa\xeb\x47\x0e\x01\x85\x81\x81\x34\x10\xba\xb9\x10\x45\x65\xbf\x7a\xe5\x7a\xcf\x95\x87\xf8\x83\x99\x35\xec\xad\xd6\xe8\x61\x81\xbe\x56\x12\xe1\x1f\x29\x6d\x30\x3c\x86\x27\xab\x91\x36\x7f\xb9\x32\x85\x32\x25\x25\xc2\xa9\x67\xf4\xa4\xac\x99\x42\xfd\x98\xac\x94\x29\xa6\xdb\x95\xed\xc2\xa4\x42\x16\x85\x60\x31\x4d\x00\x8c\xa8\x70\x0a\x92\x54\x5a\x4a\x4c\x5d\x91\xca\x1d\x60\x4a\x22\x49\xd2\x34\x4d\x1e\xe0\xcd\xe3\xcb\x14\x96\xcc\x8e\xa6\x59\x56\x2a\x5e\x86\x7c\x22\x6d\x95\xad\x42\x8e\xde\x20\x23\xa5\x92\x54\x86\x6f\x8c\xde\x08\x9d\x3a\x6f\x6b\x15\xb3\x40\x9f\xe5\xda\xe6\x59\x25\x88\xd1\x67\x05\x3a\x6d\xd7\x9d\x65\x99\xcf\x85\x9c\xac\x45\xa5\xdb\x5c\x67\x3a\xc4\xc8\x48\x6a\x8f\x4c\x13\x27\x02\x2f\xad\x57\xef\x82\x95\x35\x93\xd5\xdf\x34\x51\x36\xab\x1f\x4f\x33\xea\xe4\x92\xfa\xb8\xad\x0f\x1a\x29\x86\xa6\x20\x9c\xfa\xcf\xdb\xe0\x68\x0a\xdf\x46\xa3\xef\x09\x00\x80\x47\xb2\xc1\x4b\x6c\xde\xb9\x88\x4f\x8c\x86\x6b\xab\x43\x85\xd4\x06\xd5\xe8\xf3\x26\xa0\x44\x1e\x8d\x61\xa4\x15\x35\xff\xaf\x82\xe5\x32\x3e\x48\x8f\x82\x31\x3e\x15\xa8\x91\xb1\x59\x77\x01\xa0\xd4\x42\x55\xbd\x51\x83\x2b\xc4\x71\x2c\x62\xeb\x45\x89\x6d\xd1\x8e\x21\xb7\x11\x52\x0b\xa2\x9e\x3c\x7b\x72\xc2\x1a\x0d\x1f\xec\x78\xa2\x64\x2d\x8d\x31\x8c\xdc\xef\x70\xce\xf3\x91\xa4\x8c\x2d\x6e\xcb\xe4\xaa\x0d\xc9\x08\x47\x4b\xcb\x93\xf3\xb9\xb7\xcd\xd6\x2e\x38\x89\x78\x4b\xa0\x28\xfe\x63\x47\xb5\x8f\xd7\x98\xc2\xa1\x5c\xff\xdd\x78\xd0\x8d\x54\xdb\xf1\xa1\xae\x80\x5b\xa3\x4b\x28\xe4\x3f\x50\x72\x2b\xe3\xa3\x36\x17\x19\x9c\xb1\xb7\x68\x07\x4f\xf8\x12\x37\x39\x74\x9f\x3e\x56\x02\xbb\xc2\x9f\xe0\x9a\x00\x5c\xea\xa3\x82\x59\xc8\xe5\x17\x30\xd1\x6d\x22\x77\x74\xd0\x1e\x26\x70\x7b\x89\x0e\xee\x2a\x7d\x25\xb9\x29\x78\x75\x4e\x8d\xa7\x0b\x76\x6f\xa5\xee\xba\xe4\x73\x65\xba\xdf\xac\xfd\x34\xba\x29\xd5\x03\x3c\x21\xa9\x77\xf4\x50\x05\x62\xc8\x11\x44\xae\x11\xd8\xc2\xab\xf5\x2b\x78\x55\xbc\x84\xf9\xf3\x8c\xc6\x30\x7f\xa6\x31\x2c\x66\x34\x19\x4c\x72\x7e\x93\xc9\xd7\x57\xdc\x15\x23\xcb\x55\x08\x19\xb1\xe0\x70\x00\x74\x21\x8b\x1b\x0c\x29\x4d\x0f\x0d\xac\xb6\x6d\x57\x7c\xae\xc2\xf6\x7a\xf3\x03\x02\xbb\xe0\x0a\xdc\xce\x26\x7c\xf6\x16\x8c\xf9\x75\xa3\x63\x2e\xe9\x2f\x2f\x87\xbd\x25\x3b\x40\x1f\x97\xed\x20\x53\xf2\xc5\x93\xe0\x75\x5f\x01\x83\x4e\xa0\xc7\x2d\xab\xfd\xcc\x1a\xa6\x1a\x6d\x56\xbd\x1d\xe7\x1e\x4e\xd0\x55\x70\xa7\xef\x3e\xd7\x18\x0e\x14\xf0\x21\x73\x70\x5e\xd5\x4a\x63\x51\x62\x01\x73\x5b\xc0\x02\x65\xf0\x8a\xd7\x30\xb7\x5a\xc9\xf5\x18\x9c\xc7\x5a\xd9\x40\x7a\x0d\x05\xbe\x28\x83\x05\xd4\x4a\xc0\x7c\xb3\xae\xc4\xe2\x7f\x24\x9e\x2f\xe6\x87\x45\xff\xe3\xcf\x41\xce\xc3\x91\x6b\x2c\xa6\x53\xb5\xc2\xab\x3a\xb2\xc7\x52\x11\x7b\xd1\xd6\xe1\x8e\xc7\x81\x7f\x61\xca\x48\x9c\xba\x5d\x59\x52\x47\xae\xe7\x51\xfc\x0c\x00\x00\xff\xff\x9f\xb0\xc3\xe5\x78\x12\x00\x00") + +func testE2eTestingManifestsStorageCsiGcePdCsiControllerRbacYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiGcePdCsiControllerRbacYaml, + "test/e2e/testing-manifests/storage-csi/gce-pd/csi-controller-rbac.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiGcePdCsiControllerRbacYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiGcePdCsiControllerRbacYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/gce-pd/csi-controller-rbac.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiGcePdNode_dsYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x57\x5f\x6f\xe3\xb6\x13\x7c\xf7\xa7\x58\xf8\x5e\x7f\x92\xee\xf0\x43\x51\x40\x40\x1e\x7a\x17\x37\x2d\xd2\xe4\x8a\xcb\xb5\x7d\x28\x8a\x80\x26\xc7\x12\x61\x8a\x64\xc9\x95\x62\x7f\xfb\x82\x96\xed\xf8\x8f\xac\x24\xed\x11\x48\x60\x90\xdc\xd9\x21\x77\x66\x4d\x2f\xb5\x55\x25\x5d\x0b\x34\xce\x3e\x80\x27\xc2\xeb\xdf\x11\xa2\x76\xb6\x24\xe1\x7d\x2c\xba\x0f\x93\x06\x2c\x94\x60\x51\x4e\x88\xac\x68\x50\x92\x8c\x3a\xab\x24\x32\xaf\x32\xeb\x14\x26\xd1\x43\xa6\xd5\x08\x03\xc9\x2e\xa4\xcf\x44\x8d\x60\x59\xff\x22\xe6\x30\xb1\x9f\xa0\x04\x59\x52\x25\x7d\x26\x5d\xe3\x5b\x46\xe6\x53\xb2\xc8\xb0\x9c\x29\x1d\x97\x59\x42\x56\x41\x77\x08\x13\x22\x46\xe3\x8d\x60\x6c\xe1\x0e\x68\xa4\x61\x8e\x90\xdf\x8a\x4d\xb4\x23\x9d\xc6\x3b\xfa\xc9\x45\x26\x0b\x7e\x72\x61\x49\x4d\x1b\x99\xe6\xa0\x36\x42\xd1\xc2\x05\xd2\x96\x11\x84\x64\xed\x2c\x3d\x69\xae\xe9\x0f\x17\x96\xc6\x09\x45\x3f\x2b\x58\xd6\xbc\x26\x6d\xe9\xe6\x76\xb6\xc7\x8b\xda\x4a\x90\x66\x0a\xf0\x46\x48\x44\xba\xf9\x34\xa3\xbb\xed\x19\xe8\x01\xa1\x43\xe8\xb1\x6e\x6e\xcf\x16\x72\xfa\x82\xc6\x75\xd8\xc3\x71\xad\x23\x05\xfc\xdd\xea\x80\x06\x96\xe9\xa9\x86\x25\x1d\x63\x0b\xda\xac\x44\x67\x3a\x28\x12\x56\xd1\x1c\x0b\x17\x40\xc2\xae\x09\x2b\xef\x62\x1b\x40\x6e\xb1\x87\x6a\xc0\x41\xcb\x48\xde\x05\x8e\xf9\x76\xba\x76\x91\xef\xfb\xd3\x97\xc4\xa1\xdd\x65\x96\xce\xb2\xd0\x16\xe1\xe0\xa2\xb3\x03\x15\xf4\xf7\x99\x05\x54\x3a\x72\x10\x61\xbf\x89\x48\x37\xa2\x42\xaa\x48\xc8\xb5\x2b\xaa\x25\xb2\x00\x03\x11\x51\xa4\xc0\xa4\x9b\xb3\xe8\xb2\xfb\x90\xff\x3f\x7f\x9f\x55\x4b\xe4\xef\x0f\xa0\x44\xa8\x0e\xf2\xf7\x1c\xa6\x59\xd6\x5d\x7d\x37\x3d\x9f\x4d\xe8\x42\xa9\x80\x18\xaf\x52\xaa\xf4\x97\x47\x27\x97\x03\x7b\x97\xed\x1c\x06\xbc\x67\x90\x0a\x9c\x79\xc1\xf5\x55\xd1\x89\x50\x18\x3d\x2f\xb6\x5b\x0a\x6f\xda\x4a\xdb\x58\x78\x95\x6f\x00\xd9\x05\x51\x21\x4f\x54\xb5\x1b\xcc\x61\xf4\x02\x72\x2d\x0d\x8e\xa9\xfb\x80\x07\x76\xfe\x78\x92\x08\xab\x67\x39\x3e\x0f\xe9\x9a\x46\x24\x8b\xfe\x39\x2d\xe6\xda\x16\xb1\x9e\xfe\x8f\xa6\x99\x4c\xff\x43\x43\x59\x58\x50\x71\x48\x7e\x98\xde\x6b\xf6\xa4\x3b\xe8\x8f\xf0\xd7\x01\x0b\xd8\xee\xf4\xe2\xfb\xe2\xdf\xfe\xf6\x71\xf6\x78\xff\xf9\x7a\xf6\x78\xff\xc3\xdd\xec\x84\x77\x27\x4c\x8b\x1f\x83\x6b\xce\x0f\xb4\xd0\x30\xea\x0b\x16\xe7\x2b\xdb\xb5\x5f\x05\xd7\xe5\xc6\x9c\x79\xd2\xc8\xbd\x68\x70\xb0\xb5\x73\xa6\x6d\x70\xe7\x5a\xcb\x67\x8a\xe8\x89\xf5\x75\xca\x94\x0e\x27\x19\x9a\x14\xd4\xa3\xa7\x72\x0d\x06\x1f\xe9\x60\x1c\xe2\x70\xeb\x99\x35\xb6\xcd\xf1\xa0\xdb\xf4\x23\x42\xb6\x41\xf3\xfa\x93\xb3\x8c\x15\x9f\x0a\x43\x77\xda\xa0\x82\x3a\xb2\x20\x8d\x7a\xe9\x75\x0d\xaf\xec\xde\xe7\xdf\xff\x57\x63\xc1\x2a\xef\xb4\xe5\xab\xd6\xea\x55\x79\xd1\x5a\x2f\x97\x68\xe7\xba\xf1\x0b\x3e\x31\xe0\xe0\xce\xe0\xbc\xa8\x36\x25\x28\x69\xfa\x51\x2b\x1d\xb0\x69\xd2\xc2\x9c\xf2\xff\x06\xe2\x50\xe8\xb4\xc4\x0b\xc1\x0a\xdd\xd1\xea\x3b\xfa\x5a\x83\x16\xce\x18\xf7\xa4\x6d\xd5\xef\x8d\x24\x02\x76\xed\x5c\x11\x3b\xe2\xa0\xab\x0a\x61\xd3\x87\xa9\x55\xe8\x84\x6a\x68\x11\x5c\x73\x02\xb6\xef\xc7\x83\x0c\x53\x60\x16\x5a\x83\x98\x81\xe5\x08\x4b\xb0\x2c\xda\x53\xaa\x03\x28\x46\xcf\x47\x50\x52\x75\xc6\x51\x92\x36\x2e\x94\x6e\xeb\xa2\xd6\x5e\x86\x88\xeb\x38\x12\xfa\xbc\xda\x2b\x6e\xe0\x1b\x6a\xc4\xce\xe9\xa2\x37\x40\xc7\x16\x1c\x94\xde\xae\xf7\x3f\x6e\xf1\xd6\xc5\x51\x10\xaf\x3d\x4a\xba\xde\x68\xcf\x85\xf5\x19\x8b\x61\xb9\xbf\x85\xc0\x9b\xd2\x0d\x6a\xfc\xdf\x1c\xf7\xc2\x57\xdd\x18\x99\xcf\xe1\x53\x80\x60\x9c\x91\x1a\xf4\xce\x28\xa9\x53\x51\x5c\x3a\xf6\x37\x33\xd8\x90\xb9\x5e\x34\xd6\xe8\x11\x06\x5d\xf6\x52\xf9\x2e\xba\x6f\x34\xd5\xa0\x15\x5f\x95\xea\xcc\xa2\xa3\x79\x06\xfd\xfa\x52\x9e\x63\x1f\x8f\xe2\x9f\x5a\x7e\x18\xfa\x1d\xd5\xcc\x3e\x96\xc5\x46\xb2\xc1\x82\x11\x93\x34\x95\x93\xb1\x90\xce\x4a\x78\xde\x7c\x58\xe8\xaa\xdd\x3e\x7a\x52\x65\x39\x13\x56\x65\xec\x0c\xb6\x93\x7b\xbc\x07\x80\xa6\xe9\xd1\xa1\x85\x21\x29\x22\xa6\x39\x7d\x4d\x6f\xee\x27\x6d\x0c\x6d\x23\x40\xe8\x10\xd6\x5c\x6b\x5b\xe5\x74\xef\x14\xd2\xfb\xcc\x3b\x9b\x1e\xe4\xb1\x76\xad\x51\x7b\xc0\x39\x28\xca\x1a\xaa\x35\x50\xe4\x2c\x09\x63\x28\xbd\x67\xf6\x2f\xee\x67\x16\xfb\xc6\x95\x91\xf3\x69\xce\x85\x92\x66\x2b\x1d\x79\x77\x17\x29\xf0\xe1\xe8\xb7\x55\x1a\xc7\x67\x77\xb1\x24\xa3\x6d\xbb\x9a\xfc\x13\x00\x00\xff\xff\xd3\x16\xd5\xf9\xd4\x0d\x00\x00") + +func testE2eTestingManifestsStorageCsiGcePdNode_dsYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiGcePdNode_dsYaml, + "test/e2e/testing-manifests/storage-csi/gce-pd/node_ds.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiGcePdNode_dsYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiGcePdNode_dsYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/gce-pd/node_ds.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathAttacherYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x53\xc1\x6e\xdb\x3a\x10\xbc\xeb\x2b\x16\x79\xd7\x47\xbb\x49\x1b\xa0\x10\x90\x43\x90\xe4\x10\x34\x4d\x0b\xb8\xe8\x7d\x4d\xad\xa5\x85\x29\x92\x25\x97\x8a\xf5\xf7\x05\x65\x37\xa6\xec\xb6\x41\x05\xf8\xb2\x9c\x19\xce\x0e\xc7\x5b\xb6\x4d\x0d\x2b\x0a\x03\x6b\xaa\xd0\xf3\x77\x0a\x91\x9d\xad\x61\xb8\xac\x7a\x12\x6c\x50\xb0\xae\x00\x2c\xf6\x54\x83\x8e\xac\x3a\x17\xc5\xa3\x74\x0a\x45\x50\x77\x14\x2a\x00\x83\x6b\x32\x31\xe3\x00\xd0\xfb\x3f\x01\xa3\x27\x9d\x41\x91\x0c\x69\x71\xe1\x4d\x02\x80\x77\x41\x0e\xc2\xea\x60\xa2\x49\x7d\x3f\x4e\x93\xfd\x71\x0d\x97\x57\xef\x3f\x5c\x57\x95\x52\xaa\x3a\x2c\x24\x28\xb4\x49\x66\x45\x32\x5b\x0a\xbd\x8f\xcb\x7f\xd8\xec\x68\x78\x0a\xe8\x79\x82\x5e\xfc\x16\x7b\x51\x01\x04\xf2\x86\x35\xc6\x1a\x2e\xcf\xb6\xec\x51\x74\xf7\x54\xe4\xf4\xc6\xe2\x42\xbd\x37\x28\x74\x60\x17\x86\xf3\x67\x66\x42\x6f\x48\x01\xfc\xda\x63\x82\x6e\x36\x6c\x59\xc6\x23\xd9\xbb\xe6\xf6\x6c\x98\xb7\xf9\x91\x38\x50\x73\x9f\x02\xdb\x76\xa5\x3b\x6a\x92\x61\xdb\x3e\xb6\xd6\xbd\x8e\x1f\x76\xa4\x93\xe4\x70\x0b\xa6\xda\xfb\x5b\xcd\x02\x38\x7e\x53\x14\x0f\x3b\x1f\x28\xe6\x67\x89\xa7\xe7\x0a\xb6\x34\x4e\x8f\x75\x72\x00\xe0\x3c\x05\xcc\x92\xf0\x68\xcf\x0e\x07\x34\x89\xce\xd4\xb2\x5e\x99\x8c\x37\xa9\xe5\x39\x59\x9c\x77\xc6\xb5\xe3\xa7\x7c\xed\x36\xad\x29\x58\x12\x8a\x0b\x76\xcb\xcc\xca\x0d\x39\xe0\x0f\x45\xb8\xd5\xda\x25\x2b\xcf\xaf\xd5\x99\xa5\x0d\xa0\x9d\x15\x64\x4b\xa1\x70\xa3\x8a\xa6\x9d\xc0\xf3\xc7\x3d\xb6\x54\xc3\xf6\x63\x5c\xb4\x3a\xe4\xab\x23\xb7\x2a\x8a\x0b\xd8\xd2\xb2\x24\xd5\xc3\xd5\xe2\x6a\xf1\xae\xe0\x62\x68\x4f\xd6\x56\xa0\xd4\x70\x73\x7d\x36\x9b\x74\x9a\x26\x27\x7f\x93\x45\xf3\x6f\x11\x9d\xde\x16\xc8\x48\x3a\x05\x96\xf1\xce\x59\xa1\x9d\xcc\x85\xff\x83\x6f\x1d\x47\xe0\x08\x96\x34\xc5\x88\x61\x04\x67\xcd\x08\x1b\x17\x20\x8e\x51\xa8\x8f\xf0\xc2\xd2\xc1\xea\xe1\x89\x6d\xda\xfd\x0f\x2f\x1d\x05\x3a\x11\xb1\xce\x2a\x1f\x78\x60\x43\x2d\x35\x10\xb9\x21\x8d\xa1\xc8\x0d\x34\x5a\xeb\x04\x50\xe7\x5b\x20\x59\xde\x41\xe3\x7a\x64\x0b\xd9\x2e\xc9\x89\xa0\x0e\x84\x42\x0d\xac\x47\x28\x74\xef\x56\x8f\xd0\x04\x1e\xa8\x90\x5e\xcc\x98\x47\x70\x0d\x12\x52\xe9\x73\x70\x26\xf5\xf4\x39\x3f\x74\x9c\xb7\xbb\xcf\xb3\xaf\x28\x5d\x0d\x39\xc0\x99\xe0\xfe\x91\xf7\x1e\x55\xc3\xa1\xaa\x4a\xb5\x59\x1f\x72\xb7\x26\x95\xb9\xa3\xbd\xee\x80\x61\x69\x78\xbd\xcc\x75\x34\x24\xcb\x7d\x6d\xe3\xb2\xac\xf2\xbc\xc4\xa3\xa7\x1a\xee\x39\x4c\xff\xb9\xf1\x4b\xb8\x9b\x22\xa9\xfe\x62\xed\x67\x00\x00\x00\xff\xff\x6b\x30\xa8\x26\xfe\x05\x00\x00") + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathAttacherYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathAttacherYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-attacher.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathAttacherYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathAttacherYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-attacher.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathDriverinfoYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x90\x41\x6b\xe3\x40\x0c\x85\xef\xfe\x15\x8f\xec\x75\xd7\xcb\xde\x16\x5f\xdb\x1e\x02\x0d\x2d\xa4\xf4\x3e\x78\x5e\x6a\x11\x8f\x34\x8c\xe4\x94\xfc\xfb\x62\x93\xe6\xd0\x9b\x04\xd2\xf7\x3e\x29\x55\x79\x67\x73\x31\x1d\xe0\x61\x2d\x7d\xb0\x3f\xff\xf7\x5e\xec\xef\xe5\x5f\x77\x16\xcd\x03\x1e\x8e\xfb\xc7\x26\x17\xb6\xae\x30\x52\x4e\x91\x86\x0e\xd0\x54\x38\x60\x32\x8f\x9a\x62\xea\x47\x97\xdb\x62\xe7\x95\xe3\x3a\xf1\x0b\xc7\xa5\x56\x6b\xe1\xa8\x6b\x86\x07\x35\x90\x34\x83\x75\x62\x61\x4b\x33\x44\x67\x51\xe2\x62\xf3\x52\xe8\x7d\x87\x5b\xf9\x2c\x27\x8e\xd7\x71\xe6\xc1\x32\x7d\xa5\xfd\xc1\xeb\x1d\xb2\xb5\x4f\xdf\x90\x2d\xea\xcd\x90\x19\x6c\x65\xc5\xa5\x40\x5b\x34\xa4\x10\x9f\x93\x8c\x13\x8a\x65\x22\xdd\xd8\x58\x9c\xfe\x1b\xd5\x32\x44\x4f\xb6\x19\x49\xf8\x86\xd9\xad\x77\xfc\x78\xc4\xdd\x76\x07\x6a\xb4\x2b\x52\x23\x94\xcc\xcc\xab\x70\xb5\xbc\xd7\x93\xbd\xe8\xc1\x16\x8d\x01\xd1\x16\x76\x5f\x01\x00\x00\xff\xff\x6e\x73\xb4\xce\x58\x01\x00\x00") + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathDriverinfoYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathDriverinfoYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-driverinfo.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathDriverinfoYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathDriverinfoYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-driverinfo.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathPluginYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x58\x6d\x6f\xdb\x36\x10\xfe\xee\x5f\x71\x48\x0a\xb4\x03\x2a\x2b\xe9\x1b\x52\x01\xfe\xb0\x26\xd9\x56\xac\x4d\x82\x25\xeb\x3e\x06\xb4\x78\xb6\x0e\xa1\x48\x81\x3c\x29\xf1\x7e\xfd\x70\x94\xed\x48\xb6\xe2\xb8\xc5\x06\xcc\x40\x81\x96\xbc\x37\xde\xdd\xf3\xdc\xa9\x87\x70\x8d\xbe\xa1\x1c\x41\xe3\x8c\x2c\x6a\x28\xd0\xe3\x6b\xa8\x4c\x1d\x20\xb4\x57\x17\xaa\x44\x98\xa2\x71\xf7\x40\x16\xae\x59\x31\xce\x6a\x73\x8d\xfc\x7a\x74\x08\xca\x23\x58\x44\x8d\x1a\x9c\x35\x0b\x98\x62\xae\xea\x80\xe0\x66\x90\x3b\xab\x89\xc9\x59\xc0\x87\xca\xa8\x68\x9d\xec\xe8\x10\x0a\xe6\x2a\x64\x69\x3a\x27\x2e\xea\xe9\x38\x77\x65\x7a\x57\x4f\xd1\x5b\x64\x0c\xdd\xbf\x52\x08\x35\x86\xf4\xc3\xc7\x0f\x47\x27\xa3\xd1\x1d\x59\x9d\xad\xe2\x1d\xa9\x8a\xbe\xa1\x0f\xe4\x6c\x06\xcd\xf1\xa8\x44\x56\x5a\xb1\xca\x46\x00\x56\x95\x98\x41\x1e\x28\x29\x5c\xe0\x4a\x71\x51\x99\x7a\x4e\x76\x04\x60\xd4\x14\x4d\x10\x21\x00\x55\x55\x83\x52\xa1\xc2\x5c\x24\x02\x1a\xcc\xd9\xf9\xdd\xd2\x00\x95\xf3\xbc\x34\x99\x2c\x7d\xeb\xba\x2c\x17\xf1\xa4\xbd\xce\xe0\xf8\xcd\xdb\x77\xef\x47\x49\x92\xac\x9e\xf1\x98\xc6\xde\x53\x54\x55\x85\x74\xdf\xf7\x3c\x46\xba\x2e\x54\x06\x07\xdb\x82\x07\x23\x80\x43\xb8\xb4\x08\x1e\x2b\x43\xb9\x8a\xb5\xca\xe2\xe9\x6f\x2e\x30\x88\x28\x68\x4f\x0d\xfa\xb6\x8c\xf7\xce\xdf\x05\xb8\x2f\xd0\x02\x36\xe8\x17\x5c\x90\x9d\x83\xaf\x6d\x88\x4a\xce\x82\x82\x40\x76\x6e\x10\xac\xd3\x38\x86\xbf\x10\x54\x5e\x10\x36\x08\x5c\x28\x86\xe9\x02\x02\x2b\xcf\xa2\x46\x0c\xce\xe6\x08\xca\x6a\xe0\x02\x6d\x34\x91\xbb\xc4\xb8\x5c\x31\x82\x32\x06\x1c\x17\xe8\xa1\x72\x3a\x40\x43\x0a\xc8\x32\xfa\xa4\x72\x1a\xd4\x6c\x46\x96\x58\x92\xb9\x8c\x3d\x64\x70\xbc\x55\x9d\x52\x71\x5e\x7c\xe9\x14\x77\x57\xc1\x18\xcb\xca\x28\xc6\xa5\x6a\x27\xd3\xf2\x33\x3d\x2b\xbb\xec\x00\xac\x0a\x20\xbf\xdc\x59\x96\x26\xf7\x1d\xdd\x55\x3f\x48\x8e\x92\x36\xbf\x89\xc7\x39\x05\xf6\xca\xaf\xa5\x00\xa8\x54\x73\xcc\xe0\xee\x24\x8c\xe7\xb9\x1f\x93\x4b\x03\xcd\x93\xc0\xce\xab\x39\xa6\xe2\x7c\xd0\x42\xd6\x1c\x8f\xdf\x8e\x8f\x3a\x86\x94\x9f\x77\xdc\xb7\x21\x24\x49\x33\x79\xbf\x75\x26\x46\x95\xd6\x1e\x43\x98\x88\x07\xf9\x33\x0e\x2e\xbf\xdb\x92\x14\x40\x1a\xe4\xb5\x5b\x81\x74\x22\x89\x98\xa4\x8d\xf2\xa9\xa1\x69\xba\x14\x49\xdb\xd4\x84\xb4\x9b\xae\x21\xc3\x01\xf3\xda\x13\x2f\x4e\x9d\x65\x7c\xe0\x7e\xc4\x87\x70\x53\x50\x00\x0a\x60\x31\xc7\x10\x94\x5f\xb4\x4d\x39\x73\x1e\xc2\x22\x30\x96\x01\xee\x89\x0b\xb8\x3e\xff\x42\xb6\x7e\x78\x2d\x8d\xea\x71\xc3\x88\x95\x28\x3d\x35\x64\x70\x8e\x1a\x02\x69\xcc\x95\xef\x94\x09\x72\x65\xad\x63\x50\xb9\x78\x81\xda\xd2\x03\x68\x57\x2a\xb2\x20\xe1\x22\x6f\x18\xcc\x3d\x2a\x46\x2d\xad\xdd\xb1\x7b\x7a\xfd\x79\x85\x9c\xb5\xe9\x71\x4f\xf3\x51\x38\x03\xf6\x75\x37\x4e\xb4\xcd\x66\xb5\xda\x86\xf9\xfd\xcf\x4f\xe7\xb7\x17\x97\x67\xe7\xb7\x17\x3f\x7f\x3d\xef\x89\x00\x34\xca\xd4\xf8\x8b\x77\x65\xb6\x71\x01\x30\x23\x34\xfa\x0f\x9c\x6d\xdf\x48\x23\xf7\x18\x73\x5b\x20\x2a\x5f\x29\x2e\xb2\xd8\xd8\x63\xe9\x39\xe1\x94\x8e\x68\xe3\x4c\x5d\xe2\x57\x57\x5b\xee\xf5\x59\x02\xa5\x9c\xb5\xca\x52\xf1\x9e\xf9\xf6\x4d\x6d\x52\x13\x4d\xfe\x49\xc5\x6e\x8b\x0d\x58\xe8\x75\xe0\x2e\x3b\xd2\x7f\x82\xe9\x0d\xa1\x2e\x95\xae\xaf\xb7\xc0\xba\x6a\xdc\xbd\xf1\xd9\x27\x06\x01\xe5\xbb\x67\x41\x79\x90\x2c\xd1\x2c\x3e\x27\x2b\x0b\x63\xc1\x8a\x78\x21\x77\xb0\xad\xd0\x4c\xde\x0f\x9c\xa2\xd5\x95\x23\xcb\x93\x17\xaf\x4e\xaf\x3f\xdf\x9e\x5f\x9c\x5d\x5d\x7e\xbe\xb8\xf9\x69\x40\x54\x0a\x4a\x7a\xf2\xe2\x55\xbf\xbd\x36\x44\x05\x7f\xd8\x22\x4e\xd3\x6c\x86\x1e\x85\xbc\xd9\xc1\xe0\xbc\x4e\x96\xdc\xb1\x22\x27\x79\x4a\x64\x87\x54\x63\x65\xdc\x62\xc3\x74\x02\xf7\x08\x85\x6a\x10\x14\x30\x06\x0e\xed\xb8\xc8\x0b\xcc\xef\x42\xe4\x49\x30\x54\x12\x87\xf1\x76\xf8\xa5\x7a\x68\xfb\x2f\x54\xe8\x45\x74\x72\x7c\x74\xb0\x0f\x9a\xba\x79\x19\xc2\x52\x16\xc1\x9f\xa5\xe9\x2e\x22\xfc\x7f\x03\x73\x27\xa3\xee\x60\xa0\xce\xf2\xb2\x7a\xe8\x9a\xc6\xae\xe2\xe6\xf2\xf1\xe4\xe3\xc9\x00\x86\x0a\x54\x86\x8b\xbf\x37\xfc\x38\x76\xb9\x33\x19\xdc\x9c\x5e\x75\x6e\x0c\x35\x68\x31\x84\x2b\xef\xa6\xd8\x0f\x6d\xa6\xc8\xd4\x1e\x6f\x0a\x8f\xa1\x70\x46\x67\xd0\x1f\x55\xb2\x2b\xfe\x8a\xbc\x99\xb6\xaa\xc5\xf9\x50\x10\xab\x8d\x6b\xe8\x4e\x56\x09\x52\xe6\x0c\x8d\x5a\x5c\xa3\x2c\xa8\xb2\x4d\x1c\xf5\x64\x98\x4a\x74\x35\xaf\xaf\xdf\xf6\x9f\x88\x9e\x9c\x5e\x5f\xbe\xd9\x83\x1b\x9f\x63\xc7\x9d\xfc\xb8\xa9\xbc\x35\x71\x9d\x0e\x1b\xd6\x5a\x71\xef\x2a\x35\x8f\x4c\x99\xc1\x27\xd2\xe4\x31\x97\x7f\x28\x33\xe8\x3b\xea\x44\x1a\xf9\x5e\xff\xed\xc4\xff\x17\x42\x58\x5a\x7a\xc6\xff\x93\xcc\x3e\xc8\xed\x4f\xdb\xd1\xd8\x0c\xaa\x6b\x6c\x7a\x9a\x2b\xdc\xaf\x5a\x38\xa9\xa4\x87\xff\xcb\x89\xb8\x7b\xd6\xac\xe2\x88\x61\xc8\xa8\x39\xde\x39\x6a\xf6\xdd\xf4\x44\xae\x05\x4c\x22\xe8\x99\x44\xd0\x8f\xba\x2f\xec\x6d\xb5\x42\xf2\xf1\x65\x7d\x6c\xec\x6c\x91\xde\x52\xd8\x47\xdc\xa2\xc2\x0c\xce\x62\x7f\x38\xbf\xb8\xf4\xa7\x71\xd3\x1a\xed\x91\xae\xef\x0d\x65\x13\x2d\xfb\xba\x7e\x02\x1f\x3f\x96\x89\xdb\xe5\x1e\xb3\xd8\x15\xca\x56\x08\x4f\x2e\x3f\x3f\x16\xc4\x77\xf9\x1e\xc2\xe6\x53\x6e\x0f\xe1\xa5\x78\x7e\x29\x0b\x7c\xdc\xcb\xe1\xea\x1b\x08\x22\xe5\xa0\x92\x39\x17\x38\xfe\x6f\x41\xd4\x1f\x6f\xe8\xd6\xf2\x55\x09\x29\x97\x95\x88\x2b\x13\x1c\x54\x2e\x04\x9a\x1a\x84\xfb\x82\x8c\x7c\x5e\x8a\x45\xf9\x02\x30\x06\xe2\xfe\xde\x28\x32\x4a\x04\xd4\x8c\xe5\x2b\x32\x06\xfb\x38\xc6\xc0\x63\x5c\xdd\xc9\x59\x70\x3e\x7a\x05\x8f\x53\xe7\x78\x57\xba\xba\xdd\x1a\x09\x25\xfd\xa1\xc6\x19\xa4\xa3\x67\x2a\xb6\xc9\x4d\xcf\x55\x67\xc5\x59\xff\x04\x00\x00\xff\xff\xb0\xb8\x68\x07\xcd\x11\x00\x00") + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathPluginYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathPluginYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-plugin.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathPluginYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathPluginYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-plugin.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathProvisionerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x53\xc1\x6e\xdb\x3a\x10\xbc\xeb\x2b\x16\x79\xd7\x47\xfb\xf9\xb5\x29\x0a\x01\x3e\x04\x49\x0e\x41\xd3\xb4\x80\x83\xde\xd7\xd4\x5a\x5a\x98\x22\x59\x72\xa9\x58\x7f\x5f\x50\x76\x12\x49\x46\x93\x96\x80\x2e\xe4\xcc\x70\x76\x38\xda\xb3\xad\x4a\xd8\x50\xe8\x58\x53\x81\x9e\x7f\x50\x88\xec\x6c\x09\xdd\xaa\x68\x49\xb0\x42\xc1\xb2\x00\xb0\xd8\x52\x09\x3a\xb2\x6a\x5c\x14\x8f\xd2\x28\x1f\x5c\xc7\x19\x4c\x01\x0a\x00\x83\x5b\x32\x31\x63\x01\xd0\xfb\xb7\xc0\xd1\x93\xce\xc0\x48\x86\xb4\xb8\xf0\x47\x24\x00\xef\x82\x9c\x2e\x50\x27\x43\x55\x6a\xdb\x7e\xd8\x39\x1e\x97\xb0\xfa\xff\xc3\xc7\xcb\xa2\x50\x4a\x15\xa7\xe1\x04\x85\x76\xc9\x6c\x48\x26\x03\xa2\xf7\x71\xf9\x57\x53\x8e\x7c\x0f\x79\x3d\x0c\xe8\x8b\xdf\xc1\x2f\x0a\x80\x40\xde\xb0\xc6\x58\xc2\xea\x6c\xde\x16\x45\x37\xf7\xa3\xd4\xde\x89\xa0\x00\x10\x6a\xbd\x41\xa1\x93\xc0\xc8\x79\x5e\x66\xa2\xf5\xbe\x1a\xc0\xf3\x40\x03\x7a\xb7\x63\xcb\xd2\xbf\xf2\xbd\xab\xae\xce\x36\xf3\x4c\x3f\x13\x07\xaa\x6e\x52\x60\x5b\x6f\x74\x43\x55\x32\x6c\xeb\xbb\xda\xba\x97\xed\xdb\x03\xe9\x24\x39\xe8\x11\x53\x1d\x2d\x6e\x26\x31\xbc\xae\x21\x90\xdb\x83\x0f\x14\xb3\xc7\x38\x3f\x57\xb0\xa7\x7e\x78\xb8\xd9\x01\x80\xf3\x14\x30\x4b\xc2\x9d\x3d\x3b\xec\xd0\x24\x3a\x53\xcb\x7a\xe3\x70\xbc\x49\x35\x4f\xc9\xe2\xbc\x33\xae\xee\xbf\xe4\x6b\xf7\x69\x4b\xc1\x92\x50\x5c\xb0\x5b\x66\x56\x6e\xcb\x09\x7f\x6a\xc4\x95\xd6\x2e\x59\x79\x78\xa9\xd1\x3c\x70\x00\xed\xac\x20\x5b\x0a\x23\x43\x6a\x54\xbc\x73\x46\x5e\xdc\x62\x4d\x25\xec\x3f\xc7\x45\xad\x43\x36\x10\xb9\x56\x51\x5c\xc0\x9a\x96\x33\x5e\xd9\xad\x16\x9f\x16\xff\x8d\xe8\x18\xea\xd9\xfc\x0a\x54\xb7\xbe\x9c\x6f\xa9\xac\x84\x55\x95\x5f\x60\x9d\x65\xf3\xb7\x88\x4e\xef\xcf\x90\x3b\x42\x49\x81\x54\x8d\x42\x71\xfd\x78\x4a\x6a\x2d\x21\xd1\x08\x1b\x49\xa7\xc0\xd2\x5f\x3b\x2b\x74\x90\xa9\x87\x7f\xe0\xb1\xe1\x08\x1c\xc1\x92\xa6\x18\x31\xf4\xe0\xac\xe9\x61\xe7\x02\xc4\x3e\x0a\xb5\x11\x9e\x58\x1a\xd8\xdc\xde\xb3\x4d\x87\x7f\xe1\xa9\xa1\x40\x33\x11\xeb\xac\xf2\x81\x3b\x36\x54\x53\x05\x91\x2b\xd2\x18\x46\x41\x83\x46\x6b\x9d\x00\xea\x7c\x0b\x24\xcb\x07\xa8\x5c\x8b\x6c\x21\x8f\x46\x32\x13\xd4\x81\x50\xa8\x82\x6d\x0f\x23\xdd\xeb\xcd\x1d\x54\x81\x3b\x1a\x49\x2f\x26\xcc\x57\x70\x09\xb3\x1c\x3a\x67\x52\x4b\x5f\x73\x39\xce\x1e\xa2\xcd\xbb\xdf\x51\x9a\x12\x72\xdc\xb3\x9a\x1e\x9b\x71\xf4\xa9\x2a\x7e\x2e\xc5\x51\x70\xd2\xa1\x5c\xc9\x41\x66\x6a\xea\x28\xdc\x61\x58\x1a\xde\x2e\x73\x8b\x0d\xc9\xf2\xd8\xf6\xb8\x1c\xff\x01\xd3\xee\xf7\x9e\x4a\xb8\xe1\x30\xfc\xaa\xfd\xb7\x70\x3d\xa4\x52\xbc\xe1\xec\x57\x00\x00\x00\xff\xff\x01\x46\xee\x3e\x4d\x06\x00\x00") + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathProvisionerYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathProvisionerYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-provisioner.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathProvisionerYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathProvisionerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-provisioner.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathResizerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x53\xc1\x6e\xdb\x38\x10\xbd\xeb\x2b\x06\xd9\xeb\xca\x4e\x76\x37\xc0\x42\x40\x0e\x41\x92\x43\xd0\x34\x2d\xe0\xa2\x77\x9a\x1c\x4b\x03\x53\x24\x3b\x1c\x2a\x56\xbf\xbe\xa0\xec\xc4\x94\xdd\xa6\x25\xa0\xcb\xf0\xcd\xe3\x9b\x37\x4f\x5b\x72\xa6\x81\x15\xf2\x40\x1a\x2b\x15\xe8\x2b\x72\x24\xef\x1a\x18\xae\xaa\x1e\x45\x19\x25\xaa\xa9\x00\x9c\xea\xb1\x01\x1d\xa9\xee\x7c\x94\xa0\xa4\xab\x19\x23\x7d\x47\xae\x00\xac\x5a\xa3\x8d\x19\x06\xa0\x42\xf8\x05\x2e\x06\xd4\x19\x13\xd1\xa2\x16\xcf\xbf\xc3\x03\x04\xcf\x72\xa0\xad\x0f\x0a\x4c\xea\xfb\x71\xaa\xec\xaf\x1b\xb8\xfa\xe7\xdf\xff\xae\xab\xaa\xae\xeb\xea\x30\x8d\x28\xc1\x4d\xb2\x2b\x94\xd9\x44\x2a\x84\xb8\xfc\xf3\xb1\x8e\x72\x27\x73\x9e\x27\xe4\xc5\xcf\xa0\x17\x15\x00\x63\xb0\xa4\x55\x6c\xe0\xea\x6c\xc4\x5e\x89\xee\x9e\x0a\x8f\xde\x9f\x5a\xb0\x0f\x56\x09\x1e\x9a\x0b\xb5\xf9\xd8\x19\xcf\xfb\x4c\x00\xaf\x43\x4c\xc8\xcd\x86\x1c\xc9\x78\xec\x0d\xde\xdc\x9e\x15\xf3\x2c\xdf\x12\x31\x9a\xfb\xc4\xe4\xda\x95\xee\xd0\x24\x4b\xae\x7d\x6c\x9d\x7f\x2b\x3f\xec\x50\x27\xc9\xc6\x16\x9d\xf5\x5e\xde\x6a\x36\xfe\xf1\x4c\x46\x3c\xec\x02\x63\xcc\x2b\x89\xa7\xf7\x35\x6c\x71\x9c\x16\x75\x72\x01\xe0\x03\xb2\xca\x94\xf0\xe8\xce\x2e\x07\x65\x13\x9e\xb1\x65\xbe\xd2\x98\x60\x53\x4b\xf3\x66\xf1\xc1\x5b\xdf\x8e\x1f\xf2\xb3\xdb\xb4\x46\x76\x28\x18\x17\xe4\x97\xb9\x2b\xa7\xe3\x80\x3f\xa4\xe0\x56\x6b\x9f\x9c\x3c\xbf\xc5\xa6\x34\x1b\x40\x7b\x27\x8a\x1c\x72\x21\xa6\x2e\x42\x36\x47\xe7\x43\xbd\x6a\xb1\x81\xed\xff\x71\xd1\x6a\xce\x0f\x47\x6a\xeb\x28\x9e\x55\x8b\xcb\xa2\xa7\x19\x2e\x17\xd7\x8b\xcb\xa2\x55\x71\x7b\x32\x73\x0d\xf5\x70\x73\x7d\x5a\xca\x24\xca\x98\x6c\xfa\x4d\x66\xcc\xdf\x22\x7a\xbd\x2d\x80\x11\x75\x62\x92\xf1\xce\x3b\xc1\x9d\xcc\x69\xff\x82\x2f\x1d\x45\xa0\x08\x0e\x35\xc6\xa8\x78\x04\xef\xec\x08\x1b\xcf\x10\xc7\x28\xd8\x47\x78\x21\xe9\x60\xf5\xf0\x44\x2e\xed\xfe\x86\x97\x0e\x19\x4f\x48\x9c\x77\x75\x60\x1a\xc8\x62\x8b\x06\x22\x19\xd4\x8a\x0b\xcf\x40\x2b\xe7\xbc\x80\xd2\xf9\x15\x48\x8e\x76\x60\x7c\xaf\xc8\x41\x96\x8b\x72\x42\xa8\x19\x95\xa0\x81\xf5\x08\x05\xef\xdd\xea\x11\x0c\xd3\x80\x05\xf5\x62\xd6\x79\x04\x37\x20\x9c\x4a\x9d\x83\xb7\xa9\xc7\x8f\x79\xc7\x67\xde\xf6\xb9\xfa\x59\x49\xd7\x40\xb6\xf0\x24\x6d\xfb\x25\xef\x75\xd6\x86\x5e\x77\xbc\x27\x9c\xc5\x21\x27\x6b\xa2\x99\x8b\xda\x13\x0f\x8a\x97\x96\xd6\xcb\x1c\x46\x8b\xb2\xdc\x87\x36\x2e\xcb\x20\xcf\x23\x3c\x06\x6c\xe0\x9e\x78\xfa\xe3\xc6\x4f\x7c\x37\xb9\x52\xbd\xa3\xec\x47\x00\x00\x00\xff\xff\xb7\x8c\xb0\xd9\xf5\x05\x00\x00") + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathResizerYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathResizerYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-resizer.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathResizerYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathResizerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-resizer.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathSnapshotterYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x53\x4d\x6f\xdb\x3a\x10\xbc\xeb\x57\x2c\xf2\xae\x8f\xf6\x4b\xf2\x02\x14\x02\x72\x08\x92\x1c\x82\xa6\x1f\x80\x8b\xde\xd7\xd4\x5a\x5a\x98\x22\x59\x72\xa9\x58\xff\xbe\xa0\xe4\xd4\x92\x8c\x26\x2d\x01\x5d\x96\x3b\xc3\xd9\xd9\xd1\x9e\x6d\x55\xc2\x86\x42\xc7\x9a\x0a\xf4\xfc\x9d\x42\x64\x67\x4b\xe8\x2e\x8b\x96\x04\x2b\x14\x2c\x0b\x00\x8b\x2d\x95\xa0\x23\xab\xc6\x45\xf1\x28\x8d\x8a\x16\x7d\x6c\x9c\x08\x85\x02\xc0\xe0\x96\x4c\xcc\xad\x00\xe8\xfd\x1b\xbd\xd1\x93\xce\x7d\x91\x0c\x69\x71\xe1\x4f\x30\x00\xde\x05\x39\xd2\xab\xa3\x9a\x2a\xb5\x6d\x3f\x54\xc6\xeb\x12\x2e\xaf\xae\xff\xbf\x29\x0a\xa5\x54\x71\x9c\x4c\x50\x68\x97\xcc\x86\x64\x36\x1d\x7a\x1f\xd7\x7f\x37\xe2\x49\xf6\x60\xd6\xe7\xa1\xfb\xe2\x77\xed\x17\x05\x40\x20\x6f\x58\x63\x2c\xe1\xf2\x6c\xdc\x16\x45\x37\xcf\x13\xcf\xde\x77\x40\xa8\xf5\x06\x85\x8e\x04\x13\xe5\xf9\x98\x19\xd7\xfb\x6c\x00\xaf\x03\x0d\xdd\xbb\x1d\x5b\x96\xfe\x84\xf7\xae\xba\x3b\x2b\xe6\x99\x7e\x24\x0e\x54\x3d\xa4\xc0\xb6\xde\xe8\x86\xaa\x64\xd8\xd6\x4f\xb5\x75\xbf\xca\x8f\x07\xd2\x49\xb2\xd1\x13\xa4\x1a\x25\x6e\x66\x36\x9c\xce\x60\xc8\xe3\xc1\x07\x8a\x79\x45\x71\x79\xaf\x60\x4f\xfd\xb0\xb8\xc5\x05\x80\xf3\x14\x30\x53\xc2\x93\x3d\xbb\xec\xd0\x24\x3a\x63\xcb\x7c\x53\x73\xbc\x49\x35\xcf\xc1\xe2\xbc\x33\xae\xee\x3f\xe6\x67\xf7\x69\x4b\xc1\x92\x50\x5c\xb1\x5b\x67\x54\x4e\xcb\xb1\xff\x98\x88\x3b\xad\x5d\xb2\x32\xba\xbe\x34\x1b\x40\x3b\x2b\xc8\x96\xc2\x44\x8c\x9a\x84\xee\x1c\x91\x0f\xb7\x58\x53\x09\xfb\x0f\x71\x55\xeb\x90\x1f\x8f\x5c\xab\x28\x2e\x60\x4d\xeb\x05\xae\xec\xae\x57\xff\xad\xae\x26\x70\x0c\xf5\x62\x76\x05\xaa\xbb\xbd\x59\x96\x54\x66\xc2\xaa\xca\xee\xdf\x66\xda\xfc\xad\xa2\xd3\xfb\x49\x67\x24\x9d\x02\x4b\x7f\xef\xac\xd0\x41\xe6\xbc\xff\xc0\xb7\x86\x23\x70\x04\x4b\x9a\x62\xc4\xd0\x83\xb3\xa6\x87\x9d\x0b\x10\xfb\x28\xd4\x46\x78\x61\x69\x60\xf3\xf8\xcc\x36\x1d\xfe\x85\x97\x86\x02\x2d\x48\xac\xb3\xca\x07\xee\xd8\x50\x4d\x15\x44\xae\x48\x63\x98\x98\x07\x1a\xad\x75\x02\xa8\xf3\x2b\x90\x2c\x1f\xa0\x72\x2d\xb2\x85\x2c\x97\x64\x41\xa8\x03\xa1\x50\x05\xdb\x1e\x26\xbc\xf7\x9b\x27\xa8\x02\x77\x34\xa1\x5e\xcd\x90\xa7\xe6\x12\x24\xa4\xa9\xce\xce\x99\xd4\xd2\xa7\xbc\xec\x33\x73\xdb\x5c\xfd\x8a\xd2\x94\x90\x2d\x5c\xc4\x6e\xdc\xf6\xa8\x53\x55\xfc\xba\xe8\x91\x70\x96\x8b\x1c\xb1\x81\x66\x2e\x6a\x24\xee\x30\xac\x0d\x6f\xd7\x39\x95\x86\x64\x3d\xa6\x37\xae\xa7\x89\x9e\x67\xb9\xf7\x54\xc2\x03\x87\xe1\xd7\xeb\xbf\x84\xfb\xc1\x95\xe2\x0d\x65\x3f\x03\x00\x00\xff\xff\x5f\x82\xa8\x3a\x1a\x06\x00\x00") + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathSnapshotterYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathSnapshotterYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-snapshotter.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathSnapshotterYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathSnapshotterYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-snapshotter.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiHostpathHostpathE2eTestRbacYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x91\x4d\x4b\x03\x41\x0c\x86\xef\xf3\x2b\x02\x5e\x14\xdc\x8a\x9e\x64\x6f\x7e\x80\xd7\xa5\x15\xef\xe9\x4c\xba\x9b\x76\x3b\x19\x92\xcc\x42\xfb\xeb\x65\x29\xf6\x52\x14\xa1\xd7\x99\xe4\x09\xef\xfb\xdc\x40\x51\x9e\x78\xa4\xd4\x53\x82\x4e\x12\xac\x28\x56\x65\x3f\x40\x27\x23\xc7\xc3\x3d\x14\xa5\x89\xa5\xda\x78\x80\x44\x1b\xce\x94\x60\x5b\xcd\x61\x23\x0a\x7d\xa4\xee\x1d\x26\x46\xe8\x4e\x98\x9e\xd2\x27\x99\x77\xab\xee\x6d\xac\xe6\xa4\x4b\x19\xe9\x95\x73\xe2\xdc\xdf\xde\x85\x1d\xe7\xd4\xc2\xe5\x57\xc0\xc2\x5f\xa4\xc6\x92\x5b\xd0\x35\xc6\x05\x56\x1f\x44\xf9\x88\xce\x92\x17\xbb\x67\x5b\xb0\x3c\x4c\x8f\x61\x4f\x8e\x09\x1d\xdb\x00\x90\x71\x4f\x2d\x14\x2b\x4d\x34\x6e\x06\x31\x2f\xe8\x43\xa3\x32\x52\xb0\xba\xde\x52\x74\x9b\xe7\x1a\x38\xdd\x5d\x91\x4e\x1c\xe9\x25\x46\xa9\xd9\x03\xc0\x0f\x62\x5e\x47\x77\x8c\x03\xe9\xf9\xd9\x0a\x46\x6a\xe7\xcc\x58\x47\xff\x2f\xa6\xa8\x4c\x3c\xe7\xb8\x9a\x64\x19\x8b\x0d\xe2\x7e\x35\x49\xc9\xf8\xf8\x3b\x65\xee\x6b\x49\x9b\xb9\xa9\x0b\x3f\xe7\x96\xe9\x89\x1a\x27\xf3\xa6\x9c\x45\x37\xc5\x4a\x00\xc0\xc2\x1f\x2a\xb5\xfc\x21\x2e\x7c\x07\x00\x00\xff\xff\x37\xc6\x5c\x16\x67\x02\x00\x00") + +func testE2eTestingManifestsStorageCsiHostpathHostpathE2eTestRbacYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiHostpathHostpathE2eTestRbacYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/e2e-test-rbac.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiHostpathHostpathE2eTestRbacYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiHostpathHostpathE2eTestRbacYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/e2e-test-rbac.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiHostpathUsageCsiStorageclassYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\xcc\xb1\x8a\xc3\x30\x0c\x87\xf1\x5d\x4f\xa1\x17\x48\x8e\xdb\x0e\x8f\x77\xb7\x74\x28\x14\x0a\xdd\x85\xfd\x27\x11\xb1\xad\x60\xa9\x81\xbe\x7d\x29\x9d\xba\x7e\x1f\xfc\x64\xd7\x1b\x86\xab\xf5\xc4\x1e\x36\x64\xc1\xbc\xfd\xf8\xac\xf6\x75\x7c\xd3\xa6\xbd\x24\xbe\xbe\xfb\x5f\x15\x77\x6a\x08\x29\x12\x92\x88\xb9\x4b\x43\xe2\xec\x3a\xad\xe6\xb1\x4b\xac\x93\x67\xda\x87\x1d\xfa\x12\x31\x3e\x27\x0d\xe4\x2a\xda\x2e\x56\x35\x3f\x12\xff\xa3\x22\x40\x87\xd5\x7b\xc3\xaf\xf6\xa2\x7d\x39\x5b\x41\xe2\x53\x6b\x28\x2a\x01\x7a\x06\x00\x00\xff\xff\x20\x58\xb7\x12\xa0\x00\x00\x00") + +func testE2eTestingManifestsStorageCsiHostpathUsageCsiStorageclassYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiHostpathUsageCsiStorageclassYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/usage/csi-storageclass.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiHostpathUsageCsiStorageclassYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiHostpathUsageCsiStorageclassYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/hostpath/usage/csi-storageclass.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiMockCsiMockDriverAttacherYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x92\xcf\x8a\x1b\x31\x0c\xc6\xef\xf3\x14\x3a\xf4\xd0\x1e\x26\xd3\x5d\x28\x14\xc3\x1e\x96\x4d\x6f\xfd\x47\x03\xbd\x2b\x1e\x75\x22\xe2\xb1\x8d\xac\x31\xcd\xdb\x17\xc7\x59\x6a\xef\x52\x2a\x30\x18\x59\xfe\xe9\xd3\x67\x9f\xd9\xcf\x06\x0e\x8a\x4a\xbf\x36\x77\x20\x1d\x30\xf2\x4f\x92\xc4\xc1\x1b\xc0\x18\xd3\x94\xef\x86\x95\x14\x67\x54\x34\x03\x80\xc7\x95\x0c\xd8\xc4\xe3\x1a\xec\x39\xba\x6d\x61\x3f\xa2\x2a\xda\x13\xc9\x90\x22\xd9\x52\x95\xc8\x91\xd5\x20\x65\x0f\xb0\xa2\xda\xd3\x67\x3c\x92\x4b\x35\x01\x05\xfd\x6f\x0a\x80\x50\x74\x6c\x31\x19\xb8\x1b\x00\x94\xd6\xe8\x50\xe9\x46\x6b\xd4\x94\x70\x1d\xf8\xbf\x68\x80\x67\x91\xd7\x3d\x49\x66\x4b\x8f\xd6\x86\xcd\xeb\xd7\x6e\xb8\x5b\x89\x0d\x5e\x91\x3d\x49\xd3\x63\x6c\x7c\xe8\xd8\x35\x78\xc5\x85\x0c\x9c\x3f\xa6\xdd\x62\x65\xc7\x61\x4a\xbc\x8c\x49\x83\xe0\x42\x53\x7b\xc9\xe4\xfb\xdd\xfd\xee\x7d\x73\x17\x65\x69\x1a\xd5\x66\xe3\x98\x1f\x3e\xbc\xca\x5d\x39\xf3\x2c\x94\xd2\xc3\x9b\xb7\x8f\xfb\xfd\x8f\x4f\x87\xc3\xbb\xa6\x8c\x7c\x7e\x49\xaa\xb2\x6f\xb5\xdd\x19\x40\x46\xb7\x91\x81\xa2\xaf\xac\x5d\xfa\xeb\x41\xb5\xca\x6e\xc2\x7a\x79\x0a\x5e\xe9\xb7\xf6\xe4\x28\x9c\xd9\xd1\x42\xb3\x01\x95\x8d\x9a\xc3\x1c\xdc\xb6\xd2\x97\xe2\x6f\x37\xd8\x08\x6b\xc9\x7d\x47\x3d\xd5\xa6\x1d\xb0\x0a\x2d\x12\x48\xc7\x99\x9f\xdd\xad\xb0\xee\x25\x4e\x21\x55\x48\x2f\xa8\x62\x33\xca\xe4\xf8\x38\x9d\xb7\x23\x39\xd2\xa9\xfe\x87\x34\xbd\x78\xe3\x1a\x7a\x89\x64\x60\xcf\x72\xfd\xbb\x97\x6f\xf2\x24\x84\xda\xce\xf2\x4a\xd5\xf0\x27\x00\x00\xff\xff\x92\x6d\x20\x00\x42\x03\x00\x00") + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverAttacherYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiMockCsiMockDriverAttacherYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-attacher.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverAttacherYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiMockCsiMockDriverAttacherYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-attacher.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiMockCsiMockDriverResizerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x92\xcf\x6a\x1c\x31\x0c\xc6\xef\xf3\x14\x22\xf4\xd0\x1e\x66\x26\x39\x04\x8a\x21\x87\x90\xed\xad\xff\xe8\x42\xef\x5a\x8f\x3a\x2b\xd6\x63\x1b\x59\x63\xba\x7d\xfa\xe2\x78\x43\x3d\x59\x4a\x04\x06\x23\xcb\x3f\x7d\xfa\xec\x13\xfb\xc9\xc0\x5e\x51\xe9\xd7\xea\xf6\xa4\x1d\x46\xfe\x49\x92\x38\x78\x03\x18\x63\x1a\xf3\x5d\xb7\x90\xe2\x84\x8a\xa6\x03\xf0\xb8\x90\x01\x9b\xb8\x5f\x82\x3d\x45\xb7\xce\xec\x7b\xa1\xc4\x7f\x48\xba\x14\xc9\x96\xa2\x44\x8e\xac\x06\x29\x7b\x80\x05\xd5\x1e\x3f\xe3\x81\x5c\xaa\x09\x28\xe4\xff\x42\x00\x84\xa2\x63\x8b\xc9\xc0\x5d\x07\xa0\xb4\x44\x87\x4a\x17\x58\xa3\xa5\x84\xdb\x70\xdf\x22\x03\xbc\x48\x7c\xde\x93\x64\xb6\xf4\x68\x6d\x58\xbd\x7e\xdd\x4c\x76\x29\xb1\xc1\x2b\xb2\x27\x69\x5a\xf4\x8d\x09\x2d\xba\x06\x2f\x38\x93\x81\xd3\xc7\x34\xcc\x56\x06\x0e\x63\xe2\xb9\x4f\x1a\x04\x67\x1a\x9b\x3b\x26\xdf\x0e\xf7\xc3\x6d\x73\x15\x65\x6e\xda\xd4\x56\x37\x7d\x9f\x1f\xee\x6f\xae\xb3\x85\x84\xd3\x24\x94\xd2\xc3\xbb\xf7\x8f\xbb\xdd\x8f\x4f\xfb\xfd\x87\xb6\x90\x7c\x7e\x4d\xab\xc2\x2f\xc5\x9b\x33\x80\x8c\x6e\x25\x03\x45\x62\x59\x43\xfa\xe7\x42\x35\xcb\xae\xc2\x7a\x7e\x0a\x5e\xe9\xb7\x6e\xc9\x51\x38\xb3\xa3\x99\x26\x03\x2a\x2b\x35\x87\x39\xb8\x75\xa1\x2f\xc5\xe1\xcd\x70\x3d\x2c\x25\xf7\x1d\xf5\x58\x9b\x6e\x80\x55\x68\x91\x40\xda\x4f\xfc\x62\x70\x85\x6d\xde\xe2\x18\x52\x85\x6c\x05\x55\x6c\x46\x19\x1d\x1f\xc6\xd3\x7a\x20\x47\x3a\xd6\x0f\x91\xc6\x57\xaf\x5c\x43\xcf\x91\x0c\xec\x58\x9e\xff\xee\xf9\x9b\x3c\x09\xa1\xb6\xb3\x5c\xa9\xfa\x1b\x00\x00\xff\xff\xf1\x9d\x6f\x4c\x40\x03\x00\x00") + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverResizerYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiMockCsiMockDriverResizerYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-resizer.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverResizerYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiMockCsiMockDriverResizerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-resizer.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiMockCsiMockDriverSnapshotterYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x93\xcf\xab\xdb\x30\x0c\xc7\xef\xf9\x2b\xc4\x63\x87\xed\x90\x66\x6f\x63\x30\x0c\x3d\x94\xd7\xdd\xf6\xa3\xac\xb0\xbb\xea\xe8\xa5\xa6\x8e\x6d\x24\x25\x5b\xfe\xfb\xe1\xba\x63\x49\x5e\x19\x13\x14\x8a\x2d\x7d\xf4\xd5\x57\xce\xc5\x85\xd6\xc0\x51\x51\xe9\x79\xf0\x47\xd2\x0a\x93\xfb\x41\x2c\x2e\x06\x03\x98\x92\x34\xe3\x63\xd5\x93\x62\x8b\x8a\xa6\x02\x08\xd8\x93\x01\x2b\xae\xee\xa3\xbd\x24\x3f\x74\x2e\xd4\x12\x30\xc9\x39\xaa\x12\x57\x92\xc8\xe6\x44\xa6\xe4\x9d\x45\x31\xf0\x58\x01\x08\x79\xb2\x1a\x39\xdf\x00\xf4\xa8\xf6\xfc\x19\x4f\xe4\xa5\x1c\x40\xee\xf5\x4f\x2c\x80\x52\x9f\x3c\x2a\xdd\x10\x33\x4d\x39\xfc\x82\xf6\x3f\x3c\x80\x3f\x52\xaf\xff\x89\x47\x67\x69\x67\x6d\x1c\x82\x7e\x5d\x4c\x79\x4b\xb1\x31\x28\xba\x40\x3c\x6b\x53\xcf\x0c\x59\xe3\x4b\xb8\x1e\x3b\x32\x70\xf9\x28\x9b\xce\xf2\xc6\xc5\x46\x5c\x57\x8b\x46\xc6\x8e\x9a\x55\x9d\x19\xdf\x6f\xde\x6e\xde\xcd\xca\x91\xbb\x59\xbb\xd2\xf2\xa1\xae\xc7\xed\x87\x87\x97\xa7\x99\x86\x6d\xcb\x24\xb2\x7d\xf5\x7a\xb7\xdf\x7f\xff\x74\x3c\xbe\xb9\x93\xe8\x09\x5b\xe2\xfa\xba\x14\x17\xc3\xf6\x19\xbd\xd0\x3c\x8f\xc2\xb8\xee\x5a\x06\xbd\x41\x17\x77\x00\x23\xfa\x81\x0c\xe4\x71\xf2\x6f\x23\x7f\x5d\x2b\xe6\xda\x81\x9d\x4e\x4f\x31\x28\xfd\xd2\x25\x39\xb1\x1b\x9d\xa7\x8e\x5a\x03\xca\x03\xad\xbd\x3b\x0c\xde\x1f\xa2\x77\x76\x32\xb0\xf3\x3f\x71\x92\x59\xc6\x18\xfd\xd0\xd3\x97\xbc\xb3\x17\x36\x15\xc1\x59\x0a\x69\xdd\x3a\x5e\x69\xee\x73\xd1\x01\xf5\x5c\x74\x57\x73\xe0\x9d\x0d\xdf\xe5\x9c\xa3\x14\xc4\x72\xa2\x02\x1d\x91\x1b\xef\x4e\xcd\x65\x38\x91\x27\x6d\xca\x2b\x94\x66\xf5\xac\x4a\xe8\x94\xc8\xc0\xde\xf1\xf5\x33\x99\xbe\xf1\x13\x13\x2a\xfd\x0e\x00\x00\xff\xff\x55\x43\x1c\x82\xa1\x03\x00\x00") + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverSnapshotterYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiMockCsiMockDriverSnapshotterYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-snapshotter.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverSnapshotterYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiMockCsiMockDriverSnapshotterYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-snapshotter.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiMockCsiMockDriverYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xe4\x55\x4d\x8f\xe3\x36\x0c\xbd\xe7\x57\x10\xd9\x1e\x76\x0f\xb6\x37\xdd\xb6\x28\x0c\xe4\x30\x9b\xa4\xc0\xa2\x9d\xcc\x60\xb2\xed\x35\x50\x24\x46\x11\x22\x4b\x82\x44\x1b\xcd\xbf\x2f\x64\x7b\x76\xfd\x95\xcc\x4c\x7b\x6c\x80\x00\xb6\x44\x3e\x92\x8f\x8f\xf4\x59\x19\x91\xc3\x8e\x18\xe1\xb1\xd4\x3b\xa4\x19\x73\xea\x2f\xf4\x41\x59\x93\x03\x73\x2e\x64\xd5\x62\x56\x20\x31\xc1\x88\xe5\x33\x00\xc3\x0a\xcc\x81\x07\x95\x14\x96\x9f\x9d\x2e\xa5\x32\xb3\xe0\x90\xc7\xcb\x80\x1a\x39\x59\x1f\x9f\x01\x0a\x46\xfc\xf4\x07\x3b\xa0\x0e\xcd\x01\x44\xc4\x91\x33\x80\x47\xa7\x15\x67\x21\x87\xc5\x0c\x80\xb0\x70\x9a\x11\xb6\x20\x9d\xd8\xf1\xa7\x7b\x78\xd7\x10\x01\x9e\x53\xaa\x9f\xd1\x57\x8a\xe3\x1d\xe7\xb6\x34\xb4\xed\x55\xd0\x9a\x70\x6b\x88\x29\x83\xbe\x03\x9d\x74\x8a\x75\xde\x56\x2a\xb2\x82\xfe\xdb\x3d\x80\x2a\x98\xc4\x1c\xce\xbf\x86\x54\x72\x9f\x2a\x9b\x05\x25\x93\x40\xd6\x33\x89\xd9\xc0\x2f\xaf\x16\xe9\x2f\xe9\xc7\x8e\x3b\xf3\xb2\x13\xae\x09\x39\x4f\x92\xe8\xc7\x84\xf0\x18\xc2\xf2\x87\xf7\x77\xeb\xf5\xd3\x66\xb7\xfb\x30\xef\x19\xbe\x83\xaf\xd6\x59\x6d\xe5\x05\x42\xe9\x9c\xf5\x04\x2a\x80\x41\x14\x28\xe0\x68\x3d\xd0\x09\xc1\x59\x01\x1e\x03\x3f\xa1\x28\xb5\x32\x12\x08\x03\x0d\x60\xde\xcf\xdb\x74\x81\x33\xc7\xb8\xa2\xcb\x1c\x94\x89\x35\xef\x23\x3d\xfb\xca\xea\xb2\xc0\x54\xda\x0f\xe9\x38\xd3\x23\x32\x2a\x3d\x26\x92\x11\x86\xe5\x73\x46\x4b\xf2\x25\xce\x47\xd6\xd5\xf2\xe7\xee\x21\x9a\x6a\x58\x7b\x43\x77\x5b\x70\xef\x0e\xa0\x62\xba\xc4\x1c\x22\xa9\xf1\x9f\x86\xef\xbd\xab\xaf\xeb\x34\xef\x63\x7f\x47\x94\x16\xf1\xf4\x91\xd1\xa9\x71\x1f\x00\x37\x41\x23\x1c\x52\x22\x94\x1f\xb5\x5f\x78\x55\xa1\x4f\x3c\x4a\x15\xc8\xb3\xb7\xf5\xdf\x58\x81\xc9\x10\x21\x2a\xe1\xd3\x8b\x4a\x48\x22\x63\xa3\xb3\xae\x38\xae\x91\xd1\x58\x9e\xcb\x03\x6a\xa4\x6f\x61\x49\x59\x93\x38\x46\xa7\x65\x56\x31\x9f\x69\x75\xc8\x5a\x93\xac\x99\x9b\x90\x3d\x0f\xc5\x14\xe8\xd5\x7e\xfd\xfe\xe7\xe7\xcd\x7e\xfb\xb0\xde\xec\xb7\x77\xf7\x9b\xa9\xb6\xfd\xe6\x6d\x91\x0f\x2e\x00\x8e\x0a\xb5\x78\xc2\xe3\xf8\x26\x4e\xf5\xf7\x2d\x54\x2d\x26\x0c\x6a\xe7\xa6\xa7\x71\xd2\xd3\xc8\x73\x1c\xec\x8e\x69\x40\x5e\x7a\x45\x97\x95\x35\x84\x7f\x53\x3f\x8c\xf3\xaa\x52\x1a\x25\x8a\x1c\xa2\x5c\x5f\x21\xa5\xdb\x42\xba\x2a\xa3\xa1\x63\xb7\x1d\x13\x08\xbd\x6e\x4d\xc9\xb1\xe8\xb7\xe5\xb6\x04\xa3\x71\x2b\xbf\xbc\xfa\x29\xfd\x98\xfe\xf8\xf2\xfa\x89\x61\x96\xd1\x31\x6d\x51\xd2\x08\xae\xec\xd4\x44\x7f\x9a\xc3\x3b\x40\xc3\x0e\x1a\x45\xbd\x72\xe4\xd3\xe3\x0a\x38\xd3\x1a\xb4\x95\x52\x19\xf9\x1a\x05\xad\x76\x5f\xf6\x9b\xed\xfa\xf1\xe1\xcb\xf6\xeb\xdb\xc6\xfe\xff\xa7\xc2\xff\xb0\xd0\xc6\xce\xa3\x3d\x60\x45\x18\xa0\x35\xe6\xde\x3a\x26\x6b\x4d\xe6\xf0\x59\x09\xe5\x91\xc7\x17\xa6\x27\x63\xd7\x3e\xce\x2a\x33\x15\xbf\x31\x39\x59\x7b\x9e\x0e\xd5\x64\x86\xc4\xb3\xae\x4d\x43\x47\xef\xe3\x7c\xb2\xa1\xb1\xee\x53\x7a\xa5\xb2\xc1\x86\xeb\xf9\xd0\xc5\x61\x0e\xeb\xba\x2a\xeb\x2f\x0f\x7e\xe5\x91\x51\xb7\x1b\x37\x3e\x12\x6f\x4b\x63\x48\xf0\x6b\x43\x5f\xa1\xf4\xdf\xb1\xb0\x6f\x97\xcc\xe5\x56\x2a\xa3\x14\x5e\xdc\x4c\xc3\x9e\x72\x6b\x8e\x4a\xde\x33\x97\x4f\xec\xb9\xce\x66\x4a\x1a\xc7\x7f\x02\x00\x00\xff\xff\x9d\xb0\x16\xbb\x8c\x0a\x00\x00") + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiMockCsiMockDriverYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiMockCsiMockDriverYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiMockCsiMockDriverinfoYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\x8e\x31\x4b\x04\x31\x10\x85\xfb\xfc\x8a\x81\x6d\xb4\x49\xd0\x4a\xb6\x13\x6d\xae\x13\x04\xfb\xb9\xcd\xe3\x6e\xd8\xc9\x64\x49\xe6\x56\xf2\xef\xc5\x45\x84\xab\xdf\xfb\x3e\x3e\xde\xe4\x0b\xad\x4b\xb5\x99\xba\xd7\xc6\x17\xc4\xf5\xa5\x47\xa9\x69\x7f\x0a\xab\x58\x9e\xe9\xed\xf3\xf4\xde\x64\x47\x0b\x05\xce\x99\x9d\xe7\x40\x64\x5c\x30\x53\xa9\xcb\x1a\xef\xc1\x30\xd1\xc9\x1c\xe6\x52\x8d\x55\x07\x59\xa5\xbe\x61\x89\xf4\xaa\x4a\x3b\xeb\x0d\x9d\xc4\xc8\xaf\x08\xd3\xb1\xd0\xb7\xa8\xd2\x19\x24\xd6\xd1\x1c\x99\xf2\x30\x2e\xb2\x1c\xf8\x79\xd0\x07\xfb\x72\xfd\xcd\xc0\xa6\x75\x14\x98\x3f\x3c\x86\xe9\x90\xa0\x7b\xc2\x33\xd2\x5f\x43\xba\xb9\x68\x4f\xf9\xff\x18\x2f\x35\x86\x9f\x00\x00\x00\xff\xff\xa1\x6b\xcd\x59\xe6\x00\x00\x00") + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverinfoYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiMockCsiMockDriverinfoYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driverinfo.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiMockCsiMockDriverinfoYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiMockCsiMockDriverinfoYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driverinfo.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiMockCsiMockRbacYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x93\xb1\x8e\x13\x41\x0c\x86\xfb\x79\x0a\x4b\x34\x20\x31\x41\x47\x85\xb6\x03\x0a\xda\xd5\x05\xd1\xfb\x66\x7c\x89\xc9\x64\x3c\xb2\x3d\x2b\x72\x4f\x8f\x56\x07\xd1\x1d\x21\x88\x14\x84\x6d\x57\xeb\x7f\x3f\x7f\xbf\x17\x1b\x7f\x21\x35\x96\x3a\xc0\x74\x13\x76\x5c\xf3\x00\x6b\xd2\x89\x13\xbd\x4f\x49\x7a\xf5\xb0\x27\xc7\x8c\x8e\x43\x00\xa8\xb8\xa7\x01\x92\x71\xdc\x4b\xda\x85\x10\x63\xfc\x31\xf4\xb1\x74\x73\xd2\x5b\x29\xf4\x81\x6b\xe6\xba\x09\x4f\xc3\xf5\x0e\xd3\x0a\xbb\x6f\x45\xf9\x01\x9d\xa5\xae\x76\xef\x6c\xc5\xf2\x66\xba\x39\xf3\x85\x24\xd5\x55\x4a\x21\x8d\xe8\x8e\x69\x4b\x1a\x55\x0a\x05\xeb\x77\x5f\x29\xb9\xcd\xaf\x47\xf8\x2d\x33\xc0\x09\xeb\xcf\x47\xd6\x30\xd1\x00\x99\xee\xb1\x17\x0f\x73\xe2\x2d\xdd\xcf\x59\x27\x8b\x1c\x71\xe8\x9b\x93\x56\x2c\x4f\x40\x7a\xad\xa4\x01\x00\x1b\x7f\x52\xe9\xed\x0f\x2b\x5e\x4d\x53\x53\x99\x78\x0e\x5a\x80\xa9\x67\x2c\x4b\x94\x95\x1e\xc3\x63\x56\x9e\x66\x46\xda\xb0\xb9\xe2\x7f\x33\x77\x9e\xe7\x62\x7b\x2f\xa0\x29\x4f\x5c\x28\x6f\x28\xc3\x28\x19\xd6\x94\xba\xb2\x1f\x60\x94\xc2\xe9\xf0\x1a\x9a\xd2\xc4\xd2\xad\x1c\x66\x4a\xae\x94\x61\x62\x84\xf1\x71\x6e\x43\xf9\x33\x99\x8f\xeb\xf1\xb4\x82\x97\xaf\xfe\x49\x3b\xcd\x5a\xfc\xa5\xa1\xa5\x34\x43\x6f\x29\x3a\x99\xc7\x76\xb4\x13\x9b\xb5\xbf\x6c\xe4\x4a\xe7\xac\x64\xfc\xb0\x80\xff\xfe\xc8\x71\xc9\xd5\x5e\xc9\x91\x55\x6c\xb6\x15\xf7\x05\x78\x7a\xc6\x72\x81\xab\xef\x01\x00\x00\xff\xff\xde\x73\x1e\x42\xb2\x07\x00\x00") + +func testE2eTestingManifestsStorageCsiMockCsiMockRbacYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiMockCsiMockRbacYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-rbac.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiMockCsiMockRbacYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiMockCsiMockRbacYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/mock/csi-mock-rbac.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2eTestingManifestsStorageCsiMockCsiStorageclassYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x44\xcc\xb1\xaa\x02\x31\x10\x46\xe1\x7e\x9e\x62\x5e\x60\xf7\x72\x3b\x49\xa9\x36\x16\x82\x20\xd8\x0f\xc9\xcf\x32\x6c\x26\xb3\x64\xe2\x82\x6f\x2f\x62\x61\x7b\x0e\x7c\xb2\xe9\x03\x3d\xd4\x5b\xe2\x18\xde\x65\xc1\xbc\x1e\x62\x56\xff\xdb\xff\x69\xd5\x56\x12\xdf\xbf\xfd\x54\x25\x82\x0c\x43\x8a\x0c\x49\xc4\xdc\xc4\x90\x38\x87\x4e\xe6\x79\x9d\x22\xd3\xd6\x7d\xd7\x8f\x86\xfe\x1b\xd4\x91\xab\xa8\xdd\xbc\x6a\x7e\x25\x3e\xa3\x62\x80\x76\xaf\x4f\xc3\x51\x5b\xd1\xb6\x5c\xbd\x20\xf1\xc5\x0c\x45\x65\x80\xde\x01\x00\x00\xff\xff\x5a\x2e\xc6\x9d\x98\x00\x00\x00") + +func testE2eTestingManifestsStorageCsiMockCsiStorageclassYamlBytes() ([]byte, error) { + return bindataRead( + _testE2eTestingManifestsStorageCsiMockCsiStorageclassYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-storageclass.yaml", + ) +} + +func testE2eTestingManifestsStorageCsiMockCsiStorageclassYaml() (*asset, error) { + bytes, err := testE2eTestingManifestsStorageCsiMockCsiStorageclassYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e/testing-manifests/storage-csi/mock/csi-storageclass.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2e_nodeTestingManifestsSriovdpCmYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x90\xc1\x4b\xfb\x30\x14\xc7\xef\xfd\x2b\x1e\x39\x6f\x3f\xd2\xfd\x36\x19\xb9\x7a\x55\x0f\x1e\xbc\x8c\x31\xd2\xe4\x75\x3c\xd7\xa4\x21\xc9\xc2\x44\xf7\xbf\x4b\xda\xaa\x8c\x3a\x9c\x88\x60\x0f\x25\x4d\x3e\xdf\xef\x6b\x3e\xd2\xd1\x03\xfa\x40\xad\x15\x90\xca\x62\x47\x56\x0b\xb8\x6e\x6d\x4d\xdb\x5b\xe9\x0a\x83\x51\x6a\x19\xa5\x28\x00\xac\x34\x28\x20\x78\x6a\x93\x76\x53\xd5\x31\xc3\x76\x70\x52\xa1\x80\xdd\xbe\xc2\x69\x78\x0a\x11\x4d\xf1\x96\xea\xb9\x7f\x8f\x21\x4f\x78\x29\x00\x00\x9e\xbb\x77\x7e\x98\xc7\xd0\xee\xbd\xc2\x1b\x0a\x91\x09\x58\x7d\x1c\x8d\x90\x3b\x69\x90\x09\x60\x64\x23\x36\x9b\xee\x37\x36\x16\xa3\xc6\x44\x0a\xd9\x64\x1c\x0c\xd8\xa0\x8a\xad\x0f\x4c\xc0\xb8\xb7\x43\x12\x5a\xdd\x03\x2b\xb6\xe4\xcb\x2b\xb6\x1e\xf7\x74\x60\x3f\xa5\x07\xcb\xc5\x5c\xb1\x09\xb0\x92\xa3\x3e\x1f\xf0\x94\x70\x68\xa6\x39\xc7\x54\xe7\x08\x1d\xb6\x55\x5e\xae\x47\xa1\xe3\xc9\xce\xf1\xb4\xf5\x9b\x56\xb4\xd3\xbb\x3f\x2d\x24\xd5\xd4\x4e\x9d\xa2\xb3\xb0\xab\xf3\xbd\x7a\x18\xad\xe3\x81\xd7\x9c\x4d\xf2\x72\x16\x66\x75\xf9\x0b\xfe\x4c\x63\x0f\x83\x3e\xaf\x8d\xfc\x4c\x1f\x85\xfb\x7c\x22\x20\xfa\x3d\xfe\x5c\x6f\xb9\xa8\xfe\x5f\xa6\x97\x97\xcb\x8b\xb4\x9a\xe6\xb0\xd8\x50\xf5\xb5\x9d\xf7\xaf\x9e\x3c\x16\xaf\x01\x00\x00\xff\xff\x2a\x5e\x3a\xd9\x06\x04\x00\x00") + +func testE2e_nodeTestingManifestsSriovdpCmYamlBytes() ([]byte, error) { + return bindataRead( + _testE2e_nodeTestingManifestsSriovdpCmYaml, + "test/e2e_node/testing-manifests/sriovdp-cm.yaml", + ) +} + +func testE2e_nodeTestingManifestsSriovdpCmYaml() (*asset, error) { + bytes, err := testE2e_nodeTestingManifestsSriovdpCmYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e_node/testing-manifests/sriovdp-cm.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2e_nodeTestingManifestsSriovdpDsYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x54\xc1\x6e\x13\x31\x10\xbd\xe7\x2b\xe6\x07\x9c\xa5\x02\x71\xb0\xd4\x03\xa2\x1c\x90\x68\x88\x54\x89\xfb\xd4\x9e\x6c\x4c\x6c\x8f\x65\xcf\x2e\xcd\xdf\x23\x67\xb3\xc1\xdb\x96\x06\xe6\x96\x99\x37\xcf\xef\x3d\x3b\x8b\xc9\xfd\xa0\x5c\x1c\x47\x0d\x98\x52\xe9\xc6\x9b\xd5\xc1\x45\xab\xe1\x0e\x29\x70\x7c\x20\x59\x05\x12\xb4\x28\xa8\x57\x00\x11\x03\x69\x38\x0c\x8f\xa4\x4a\x76\x3c\x2a\x4b\xa3\x33\xa4\x92\x1f\x7a\x17\x15\x06\xfb\xf1\xc3\x19\x56\x12\x9a\x0b\xf6\x58\x84\xc2\x0a\xc0\xe3\x23\xf9\x52\x99\x00\xc4\x51\xd6\x10\xd9\xd2\xe9\x27\xa6\xa4\xe1\x44\x6a\xd3\xaa\x24\x32\x15\x55\xc8\x93\x11\xce\xd3\x46\x40\x31\xfb\x6f\x0d\xc5\x2c\xe8\x15\x2d\x2b\x00\xa1\x90\x3c\x0a\x9d\x97\x1b\x1b\xb5\xfc\x82\xe7\x6d\xa6\xa9\x9e\x09\x7e\x21\xba\x36\x66\xe1\xb5\xf6\x5c\x64\x43\xf2\x8b\xf3\x41\x83\xe4\x81\x9a\xfe\xf6\xeb\xdd\xa2\x57\x59\x1f\x16\x66\x6b\xd5\xf0\x72\x24\xa1\xb2\x76\xdc\x61\x36\x7b\x0d\x73\xc6\x27\x45\xec\x29\xa3\x38\x8e\x17\x23\x0a\x0e\x74\x9c\x54\xaa\xcc\x9e\xd6\x4b\x8e\x80\x45\x28\x5f\x0e\xe0\x54\xf7\x39\x6b\xf8\xf2\xe4\x8a\x94\xcb\x80\x76\x3b\x32\xa2\x61\xc3\x0f\x66\x4f\x76\xf0\xb3\xd0\x42\xb9\x66\xf3\xc9\x18\x1e\xa2\x6c\xae\x84\x66\x38\x0a\xba\x48\xb9\xd1\xf7\xfc\x0d\x9d\x93\xab\xe5\x02\xf6\xa4\xc1\xb2\x39\x50\xae\x72\xe3\x6e\x4c\xd4\xbd\xc2\xaf\xc7\xf7\xeb\x9b\xe5\xde\x76\xf0\x7e\xcb\xde\x99\xa3\x86\x0d\x8d\x8d\x4b\xcc\x7d\x73\xd1\x0a\x94\xf2\xdc\x2b\xeb\xf2\xed\x73\x01\xf3\xcc\xd3\x48\xfe\xf6\xe6\xdd\x65\x50\xc8\x0c\xd9\xc9\xf1\x33\x47\xa1\x27\xf9\xc3\x06\x90\xb2\x1b\x9d\xa7\x9e\xec\xe2\x46\x01\x46\xf6\x43\xa0\xfb\x9a\xd3\xe2\xf8\x29\x80\xc9\x4e\x61\x73\x68\xb8\x42\x05\x6f\x51\xf6\x1a\xba\x11\x73\xe7\xdd\x63\x57\x93\xf2\x24\x5d\x03\xcb\x84\xf6\x7b\xf4\x47\x0d\x3b\xf4\x85\x5e\x70\x7b\xee\xdf\x22\x6d\xa6\xf3\x86\xe1\xb8\x73\xbd\x9a\x24\xff\x65\x97\xc4\x74\xc9\xb8\x4b\x5c\x13\xf8\x5f\xad\x9d\x5e\x7d\x25\x6a\x7a\x00\xe9\x8a\xd7\xd7\x1d\x5d\xe7\xfa\x0f\x8b\x53\xff\x1e\xd3\x92\xad\xf9\x1e\xd8\xa4\x26\xd0\x02\xe0\x84\x42\x59\xee\x9c\xff\x7c\x13\x78\xfd\xb3\x70\x5c\x8c\x67\x89\xed\xfc\x77\x00\x00\x00\xff\xff\x3b\xbd\xca\x89\x82\x05\x00\x00") + +func testE2e_nodeTestingManifestsSriovdpDsYamlBytes() ([]byte, error) { + return bindataRead( + _testE2e_nodeTestingManifestsSriovdpDsYaml, + "test/e2e_node/testing-manifests/sriovdp-ds.yaml", + ) +} + +func testE2e_nodeTestingManifestsSriovdpDsYaml() (*asset, error) { + bytes, err := testE2e_nodeTestingManifestsSriovdpDsYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e_node/testing-manifests/sriovdp-ds.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testE2e_nodeTestingManifestsSriovdpSaYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x2c\xca\x31\x0a\x83\x21\x0c\x06\xd0\xdd\x53\xe4\x02\x0e\x5d\xb3\xf5\x0c\x85\xee\xa9\x7e\x94\x60\x8d\x62\xa2\xd0\xdb\x97\xc2\x3f\xbf\x27\x53\x9f\x58\xae\xc3\x98\xce\x2d\x35\xb5\xca\xf4\xc0\x3a\x5a\x70\x2f\x65\x6c\x8b\xd4\x11\x52\x25\x84\x13\x91\x49\x07\x93\x2f\x1d\x27\x57\xfc\x57\x9e\x9f\xfd\x56\xbb\xcc\xa7\x14\x30\xb5\xfd\x42\xf6\xaf\x07\x7a\xfa\x05\x00\x00\xff\xff\x29\x9c\xaa\x31\x63\x00\x00\x00") + +func testE2e_nodeTestingManifestsSriovdpSaYamlBytes() ([]byte, error) { + return bindataRead( + _testE2e_nodeTestingManifestsSriovdpSaYaml, + "test/e2e_node/testing-manifests/sriovdp-sa.yaml", + ) +} + +func testE2e_nodeTestingManifestsSriovdpSaYaml() (*asset, error) { + bytes, err := testE2e_nodeTestingManifestsSriovdpSaYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/e2e_node/testing-manifests/sriovdp-sa.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x53\x6f\x6f\xa3\x36\x1c\x7e\x7d\xfe\x14\x8f\xc2\xbd\xb8\x4a\x81\x34\x91\xaa\x93\x32\x55\x27\x9a\xb2\x16\xb5\x07\x37\xa0\x57\xf5\x55\xe4\xc0\x2f\x60\x95\xd8\xcc\x36\x4d\xa2\x69\xdf\x7d\x32\x34\xdb\xb2\xdb\x34\xde\xd9\x7e\xfe\xf9\xf1\x0f\x0f\x2b\xd5\x1d\xb5\xa8\x1b\x8b\xc5\xe5\xfc\x33\x8a\x86\xf0\xd0\x6f\x48\x4b\xb2\x64\x10\xf6\xb6\x51\xda\x04\xcc\x63\x1e\x1e\x45\x49\xd2\x50\x85\x5e\x56\xa4\x61\x1b\x42\xd8\xf1\xb2\xa1\xd3\xc9\x14\xdf\x49\x1b\xa1\x24\x16\xc1\x25\x3e\x39\xc0\xe4\xfd\x68\x72\xf1\x13\xf3\x70\x54\x3d\x76\xfc\x08\xa9\x2c\x7a\x43\xb0\x8d\x30\xd8\x8a\x96\x40\x87\x92\x3a\x0b\x21\x51\xaa\x5d\xd7\x0a\x2e\x4b\xc2\x5e\xd8\x66\xb0\x79\x17\x09\x98\x87\x97\x77\x09\xb5\xb1\x5c\x48\x70\x94\xaa\x3b\x42\x6d\xff\x8e\x03\xb7\x43\x60\xf7\x35\xd6\x76\xcb\xd9\x6c\xbf\xdf\x07\x7c\x08\x1b\x28\x5d\xcf\xda\x11\x68\x66\x8f\xf1\x2a\x4a\xf2\xc8\x5f\x04\x97\x03\xe5\x49\xb6\x64\x0c\x34\xfd\xda\x0b\x4d\x15\x36\x47\xf0\xae\x6b\x45\xc9\x37\x2d\xa1\xe5\x7b\x28\x0d\x5e\x6b\xa2\x0a\x56\xb9\xbc\x7b\x2d\xac\x90\xf5\x14\x46\x6d\xed\x9e\x6b\x62\x1e\x2a\x61\xac\x16\x9b\xde\x9e\x95\x75\x4a\x27\xcc\x19\x40\x49\x70\x89\x49\x98\x23\xce\x27\xb8\x09\xf3\x38\x9f\x32\x0f\xcf\x71\x71\x9f\x3e\x15\x78\x0e\xb3\x2c\x4c\x8a\x38\xca\x91\x66\x58\xa5\xc9\x6d\x5c\xc4\x69\x92\x23\xfd\x19\x61\xf2\x82\x87\x38\xb9\x9d\x82\x84\x6d\x48\x83\x0e\x9d\x76\xf9\x95\x86\x70\x35\x52\xe5\x3a\xcb\x89\xce\x02\x6c\xd5\x18\xc8\x74\x54\x8a\xad\x28\xd1\x72\x59\xf7\xbc\x26\xd4\xea\x8d\xb4\x14\xb2\x46\x47\x7a\x27\x8c\x7b\x4c\x03\x2e\x2b\xe6\xa1\x15\x3b\x61\xb9\x1d\x76\x7e\xb8\x54\xc0\x58\x16\xdd\xc5\x79\x91\xbd\xe0\xcb\x35\xea\x52\x07\x42\xcd\x5e\xff\x9c\x24\x9f\x16\xe4\x5b\x32\xd6\x17\x3b\x5e\x93\x61\x77\x69\x98\x7d\x75\xd0\xcf\xec\x36\x5d\x3d\x44\xd9\x7a\x15\x65\xc5\xfa\x26\xcc\xa3\xf5\xb7\xb0\xb8\xc7\x97\x6b\xf6\x4b\xf4\xf5\xe9\x7b\x94\xe5\x71\x9a\x5c\xbf\x5d\x05\xf3\xe0\xd2\x5f\xb0\xbb\xf4\x31\x4c\xee\xd6\xa7\xfd\x79\x30\xbf\x0a\xe6\x57\x8c\x0e\x9d\xd2\x96\x31\xb1\x95\x15\x6d\xf1\x7c\x1f\x16\xec\xe3\x27\xd2\x5a\xe9\x61\xe1\x5a\xe7\x7f\xbd\xeb\x1b\xd7\xc2\x3d\xe9\x14\x74\x58\x62\xc7\x5f\x09\xbc\x6d\x07\xe4\xb5\x24\x7b\xc1\x48\x56\x62\xcb\x98\x87\x9b\x5e\xb4\x15\x4a\x55\xd1\xf8\x17\x84\xba\x36\xcb\x61\xb8\x1c\x78\x89\x5b\xa1\xa9\xb4\x4a\x1f\x21\xf9\x8e\x8c\x9b\x8a\x8d\xa3\x8c\xe8\xe8\xc0\x77\x5d\x4b\x23\xe1\xdc\xa6\x6c\x7b\x63\x49\xf3\x4e\x0c\xc5\x90\x66\xbc\x6d\x97\xee\xdc\x2f\x95\x74\xd3\x4d\x9a\xb1\xb3\xe5\x92\x7d\x08\x66\x43\x81\x7e\x6f\x45\x1b\x98\x66\xf4\xc2\xc7\x4f\x4e\xf2\x02\x93\x4a\x95\xaf\xa4\x27\x23\xaf\xeb\x4d\xb3\x64\x1f\x36\xdc\x34\xf0\x0f\xf8\x1f\xaa\xa6\xda\x4d\xe5\x71\xf2\xdf\x0c\x27\x78\x22\x8c\x16\x83\x86\xcf\x65\x75\x32\xfb\x57\x93\x35\x97\xd5\x7a\x24\xff\xe6\xc8\xbf\x33\x16\x7c\xbb\x4f\x93\x97\xe1\xba\xf8\x51\x08\xa7\xf8\xff\xa8\xe3\x8f\x00\x00\x00\xff\xff\xde\xbd\x08\xa9\xb0\x04\x00\x00") + +func testImagesMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesMakefile, + "test/images/Makefile", + ) +} + +func testImagesMakefile() (*asset, error) { + bytes, err := testImagesMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\xcb\xb1\xae\xc2\x30\x0c\x85\xe1\x3d\x4f\x61\xe9\xce\xb7\x59\x51\x77\x56\x90\xe8\xc0\x88\x2c\x6a\xa5\xa1\x84\x44\x39\x76\x1b\xde\x1e\xa9\xdd\x10\xe3\x39\xfa\xfe\x3f\x1a\x44\x48\x27\xa1\xf3\xf5\x74\xbc\x0c\x34\xe6\x3b\x88\x95\x26\xd5\x82\xde\xfb\x90\xbb\xf9\x80\x2e\x66\x9f\xd7\x97\x54\x38\x57\x65\x89\xb2\x4a\x45\xef\x88\xfe\x29\xcd\x96\x58\x39\x6c\xe3\x61\x50\xb6\x60\x50\xc3\x76\x3c\x23\xb4\x39\x2e\xa5\xe6\xe5\x77\xb2\x0b\x49\x52\xa3\x1a\x6e\x5f\x34\xb6\xf1\xbd\x33\x6b\x0c\xf7\x09\x00\x00\xff\xff\x43\x1a\x75\x2a\xaf\x00\x00\x00") + +func testImagesOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesOwners, + "test/images/OWNERS", + ) +} + +func testImagesOwners() (*asset, error) { + bytes, err := testImagesOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostGitignore = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x4c\xcf\xcb\xc8\x2f\x2e\xe1\x02\x04\x00\x00\xff\xff\x31\x3b\xba\x32\x08\x00\x00\x00") + +func testImagesAgnhostGitignoreBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostGitignore, + "test/images/agnhost/.gitignore", + ) +} + +func testImagesAgnhostGitignore() (*asset, error) { + bytes, err := testImagesAgnhostGitignoreBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/.gitignore", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\xcc\x29\xc8\xcc\x4b\xb5\x32\xd6\x33\xe3\x82\x0a\x17\xe5\xda\x26\x16\xe5\x1a\x1b\x95\x99\xe9\x63\x93\x04\xe9\x01\x91\x65\x16\x98\xd2\x05\x05\xc9\x66\x26\x39\xa9\xb6\x50\x1a\x53\x41\xb1\xb1\xa5\x41\x85\x2d\x98\x44\x96\x2c\xcf\xcc\x4b\xc9\x2f\x2f\x86\x38\x49\xdf\xd0\xc2\xc0\xd2\x36\xc8\xd5\xdd\x33\x38\x24\x28\x52\x3f\xa9\xb4\xb8\x32\x29\xbf\xc2\xca\x50\xcf\xc8\x52\x17\xaa\x50\x17\xac\x50\x17\xa4\x10\x5d\xaf\xa5\x81\x31\x71\x7a\x2d\x0d\x8c\x31\xf5\x12\x69\xaf\xa5\x81\x25\x17\x20\x00\x00\xff\xff\xa0\x4d\x41\x80\x45\x01\x00\x00") + +func testImagesAgnhostBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostBaseimage, + "test/images/agnhost/BASEIMAGE", + ) +} + +func testImagesAgnhostBaseimage() (*asset, error) { + bytes, err := testImagesAgnhostBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x55\x6f\x6f\xdb\xb6\x13\x7e\xcf\x4f\xf1\xc0\xfe\xa1\xbf\x6d\xb0\xac\xd4\x03\xba\xd5\x7b\xe5\xda\x6e\x6b\xb4\xb1\x33\xcb\x59\x17\x74\x45\x40\x53\x67\x89\x08\x45\xaa\x47\x2a\x8e\xfb\xe9\x07\xca\x7f\x12\x6f\x01\x56\xbd\x11\x8f\xf7\xdc\xf1\xe1\xfd\x63\x17\x63\x57\xef\x58\x17\x65\xc0\xe0\xe2\xe5\x6b\xac\x4a\xc2\x87\x66\x4d\x6c\x29\x90\xc7\xa8\x09\xa5\x63\xdf\x17\x5d\xd1\xc5\x47\xad\xc8\x7a\xca\xd1\xd8\x9c\x18\xa1\x24\x8c\x6a\xa9\x4a\x3a\x6a\x7a\xf8\x83\xd8\x6b\x67\x31\xe8\x5f\xe0\x87\x08\xe8\x1c\x54\x9d\x1f\x7f\x13\x5d\xec\x5c\x83\x4a\xee\x60\x5d\x40\xe3\x09\xa1\xd4\x1e\x1b\x6d\x08\xf4\xa0\xa8\x0e\xd0\x16\xca\x55\xb5\xd1\xd2\x2a\xc2\x56\x87\xb2\x3d\xe6\xe0\xa4\x2f\xba\xb8\x39\xb8\x70\xeb\x20\xb5\x85\x84\x72\xf5\x0e\x6e\xf3\x14\x07\x19\x5a\xc2\xf1\x2b\x43\xa8\x87\x69\xba\xdd\x6e\xfb\xb2\x25\xdb\x77\x5c\xa4\x66\x0f\xf4\xe9\xc7\xd9\x78\x3a\xcf\xa6\xc9\xa0\x7f\xd1\x9a\x5c\x5b\x43\xde\x83\xe9\x6b\xa3\x99\x72\xac\x77\x90\x75\x6d\xb4\x92\x6b\x43\x30\x72\x0b\xc7\x90\x05\x13\xe5\x08\x2e\xf2\xdd\xb2\x0e\xda\x16\x3d\x78\xb7\x09\x5b\xc9\x24\xba\xc8\xb5\x0f\xac\xd7\x4d\x38\x0b\xd6\x91\x9d\xf6\x67\x00\x67\x21\x2d\x3a\xa3\x0c\xb3\xac\x83\x37\xa3\x6c\x96\xf5\x44\x17\x9f\x66\xab\xf7\x8b\xeb\x15\x3e\x8d\x96\xcb\xd1\x7c\x35\x9b\x66\x58\x2c\x31\x5e\xcc\x27\xb3\xd5\x6c\x31\xcf\xb0\x78\x8b\xd1\xfc\x06\x1f\x66\xf3\x49\x0f\xa4\x43\x49\x0c\x7a\xa8\x39\xf2\x77\x0c\x1d\xc3\x48\x79\x8c\x59\x46\x74\x46\x60\xe3\xf6\x84\x7c\x4d\x4a\x6f\xb4\x82\x91\xb6\x68\x64\x41\x28\xdc\x3d\xb1\xd5\xb6\x40\x4d\x5c\x69\x1f\x93\xe9\x21\x6d\x2e\xba\x30\xba\xd2\x41\x86\x76\xe7\x5f\x97\xea\x0b\x31\x5a\xbe\x8b\xec\xa7\xb3\xcb\xd1\xbb\xa9\x78\xbb\x5c\x5c\xe2\x7f\x8f\xb2\x18\x2f\x17\x59\x76\xfb\xe6\x7a\xf6\x71\x72\x3b\x5e\x5c\xdd\xe0\x2b\x55\x4d\xf2\xfb\xf4\xf2\x7a\xb4\x1c\xbf\x4f\x7c\x74\xad\x90\x36\x9e\xd3\xb5\xb6\xa9\x10\x5d\x6c\xd8\x55\xc8\xad\x6f\x82\x36\x1e\xba\x92\x45\x0c\xae\xb6\x3e\x48\x63\x60\x49\x91\xf7\x92\x77\xa8\xa5\xba\x93\x05\xf9\xa1\xe8\x22\xc1\x5a\xdb\x3c\x09\xce\x19\x3f\x84\x72\x36\x96\x49\x0c\x78\xd1\xc3\xb6\xd4\xaa\x84\x92\x36\x16\x5f\x1e\x93\x37\x99\x67\x08\xe4\x43\xac\x70\x24\x18\x3b\xa6\xc9\x3c\x1b\x9e\xf4\xde\x55\x74\x0e\x6a\x39\x95\xce\x07\x7a\x20\xf5\xdd\x9c\x54\xc3\xa6\x07\xab\x0e\x9e\x63\x55\xc1\xb8\x10\xeb\x96\x06\xb4\xf7\xde\x02\x75\xcd\xae\x09\x34\x18\x42\x5b\x65\x9a\x9c\x3c\xbc\x3f\xd1\x99\xbb\x9c\xae\x1c\x87\x93\x41\xcb\x46\xd7\xc4\x9b\xef\xa1\xb2\x47\xf6\xb0\x96\xbe\x14\xcb\xeb\x39\x64\x7d\x87\x24\x69\xea\x5c\x06\x82\xcc\xf3\x27\xb1\x6b\x29\xc3\x52\x50\x32\x24\xae\x26\xbb\xf6\xf9\x89\xdd\xe1\xc8\xe8\x07\x2f\x5e\x80\x2b\x24\xbc\x41\x7a\x2f\x39\x55\xb1\xc7\x52\x59\xdf\xa5\x3f\xe1\x2f\x81\xa8\x36\x16\x89\x7f\xcc\xec\xde\xb6\x15\x8d\x53\xd2\x3c\xd9\x3c\x1a\x78\x24\xd2\x04\x2e\x9f\x45\x09\x31\x9a\x4c\xda\xbe\xf6\xc3\x34\x2d\x74\x28\x9b\x75\x5f\xb9\x2a\x55\x8e\x29\xb7\xfe\xf4\x67\x32\x24\x63\x93\xe7\x6e\x6b\x8d\x93\x79\x7a\xff\xb2\xff\xaa\x3f\x38\x02\x6e\x5b\xe9\xd6\x68\xdb\x3c\xdc\xc6\x4a\x8d\x85\xd8\x0f\xc5\x37\x1c\x11\x51\x68\x03\x15\x24\x23\x79\xf8\x76\xbf\x39\x53\x1d\xef\x7e\xbe\x1b\x2b\xf7\x6a\xb1\x5c\xe1\xd7\x0b\x58\xa2\xbc\xcd\xf7\xb0\x4d\x59\xb2\xa5\xb5\x27\xbe\x27\x7e\xc4\x9c\xa3\xe2\xd8\x7d\x20\xd5\x8b\x8b\x68\xd1\x03\x93\x77\x0d\x2b\x4a\x94\xb3\xbe\xa9\x88\x9f\xd9\x8a\x8b\xc0\xce\x98\x33\xc7\x2f\x9f\x71\x7c\x54\xbf\xfe\xf9\x97\x57\x4f\xd5\x2d\xab\x24\xd6\xb5\x95\x15\x89\xe9\x9f\x57\x8b\x6c\x1a\x6f\xd0\x12\x6c\x9d\x45\x93\x53\x57\x1e\xdd\xc5\xe0\x54\x77\xb9\x66\xa4\x4d\x1d\x63\xec\x4f\x90\xda\x71\x20\x6e\x93\xb5\x5f\xee\x13\x19\xcf\xe8\x2b\x0e\x38\x93\x9e\x87\xdd\xd1\x0e\x67\xd2\x3e\xf7\xb2\xb0\x71\xe3\xf8\x8f\x27\x1e\xae\x72\x9c\x6c\x64\x03\xef\x6a\xa7\x6d\x48\x62\x14\x89\xc1\x64\x64\x9c\xb6\xfb\x46\x46\x16\x1b\xfb\xf0\x6a\xfc\x07\x58\x74\x11\xa7\x22\xeb\xd8\x8c\xed\x8b\xd5\xb6\xda\xff\xfd\x13\xc3\xfd\x53\x75\xe0\x93\x0c\x62\x1f\x49\xde\xf5\xe2\xe4\xc4\x56\x1b\x83\x7b\x62\xbd\xd9\x21\x94\x32\xb4\x67\x2a\xc7\x4c\x2a\x88\xee\x53\x27\xda\x9f\xc6\xc3\x1e\xd3\x0e\x2f\x8a\xef\x6f\x8c\xf3\xbe\x8f\xfe\x71\xf9\x64\x20\xc4\x74\xbe\x5a\xde\x5c\x2d\x66\xf3\x15\x3e\x77\xd2\x83\xa2\xf3\x45\x8c\x2f\x27\xf8\xdc\xa9\x65\xe3\xa9\xf3\x45\xfc\x1d\x00\x00\xff\xff\xf1\xb8\x4b\xc7\xec\x07\x00\x00") + +func testImagesAgnhostDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostDockerfile, + "test/images/agnhost/Dockerfile", + ) +} + +func testImagesAgnhostDockerfile() (*asset, error) { + bytes, err := testImagesAgnhostDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostDockerfile_windows = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x56\x5b\x8f\xda\xba\x16\x7e\xcf\xaf\x58\x82\xaa\x17\x89\x24\x0c\xd3\x33\xe7\x94\xaa\x0f\x1c\x86\xb6\xa8\x2d\x20\x42\xdb\x3d\xea\x54\x23\xe3\x2c\x12\x6b\x1c\x3b\xdb\x76\x08\xcc\xaf\xdf\x5a\x0e\xd7\xce\xec\xdd\xcd\x03\xf1\xe5\x5b\xf7\xe5\xcf\x6e\xc3\x50\x97\x5b\x23\xb2\xdc\x41\xaf\xdb\xeb\xc2\x22\x47\xf8\x54\x2d\xd1\x28\x74\x68\x61\x50\xb9\x5c\x1b\x1b\x05\xed\xa0\x0d\x9f\x05\x47\x65\x31\x85\x4a\xa5\x68\xc0\xe5\x08\x83\x92\xf1\x1c\xf7\x3b\x1d\xf8\x86\xc6\x0a\xad\xa0\x17\x75\xe1\x25\x01\x5a\xbb\xad\xd6\xab\xb7\x41\x1b\xb6\xba\x82\x82\x6d\x41\x69\x07\x95\x45\x70\xb9\xb0\xb0\x12\x12\x01\x37\x1c\x4b\x07\x42\x01\xd7\x45\x29\x05\x53\x1c\xa1\x16\x2e\xf7\x66\x76\x4a\xa2\xa0\x0d\x37\x3b\x15\x7a\xe9\x98\x50\xc0\x80\xeb\x72\x0b\x7a\x75\x8a\x03\xe6\xbc\xc3\xf4\xcb\x9d\x2b\xfb\x71\x5c\xd7\x75\xc4\xbc\xb3\x91\x36\x59\x2c\x1b\xa0\x8d\x3f\x8f\x87\xa3\x49\x32\x0a\x7b\x51\xd7\x8b\x7c\x55\x12\xad\x05\x83\x7f\x56\xc2\x60\x0a\xcb\x2d\xb0\xb2\x94\x82\xb3\xa5\x44\x90\xac\x06\x6d\x80\x65\x06\x31\x05\xa7\xc9\xdf\xda\x08\x27\x54\xd6\x01\xab\x57\xae\x66\x06\x83\x36\xa4\xc2\x3a\x23\x96\x95\x3b\x4b\xd6\xde\x3b\x61\xcf\x00\x5a\x01\x53\xd0\x1a\x24\x30\x4e\x5a\xf0\xff\x41\x32\x4e\x3a\x41\x1b\xbe\x8f\x17\x1f\xa7\x5f\x17\xf0\x7d\x30\x9f\x0f\x26\x8b\xf1\x28\x81\xe9\x1c\x86\xd3\xc9\xf5\x78\x31\x9e\x4e\x12\x98\xbe\x87\xc1\xe4\x06\x3e\x8d\x27\xd7\x1d\x40\xe1\x72\x34\x80\x9b\xd2\x90\xff\xda\x80\xa0\x34\x62\x4a\x39\x4b\x10\xcf\x1c\x58\xe9\xc6\x21\x5b\x22\x17\x2b\xc1\x41\x32\x95\x55\x2c\x43\xc8\xf4\x1a\x8d\x12\x2a\x83\x12\x4d\x21\x2c\x15\xd3\x02\x53\x69\xd0\x06\x29\x0a\xe1\x98\xf3\x2b\x8f\x82\x8a\x82\x60\x30\xff\x40\xde\x8f\xc6\x5f\x06\x1f\x46\x7e\x36\x1f\x7d\x18\x27\x8b\xf9\x8d\x9f\x4c\x93\xbb\x6f\xa3\x79\x32\x9e\x4e\x02\x8a\x0e\x5f\x18\x84\xca\x92\x29\x06\x9f\x85\xaa\x36\x20\x0a\x72\xc1\x69\xa8\x54\xc9\xf8\xbd\x57\xcf\x0c\xcf\xc5\x1a\x6d\x87\x66\x0a\x6a\x2f\x46\x25\x27\x41\x97\x63\x01\xe4\x31\x09\x7d\x17\x2a\xd5\xb5\x8d\x82\xf7\xf3\xe9\x17\x08\xc3\x52\x32\xb7\xd2\xa6\x78\x27\x49\x79\xcc\x8a\xf4\xea\x35\x30\x59\x0a\x85\xfd\xcb\xe8\x0a\x98\x85\xd2\x60\x19\x04\x83\xeb\x6b\xdf\x25\xb6\x1f\xc7\x99\x70\x79\xb5\x8c\xb8\x2e\x62\xae\x0d\xa6\xca\x1e\xbe\x06\x25\x32\x6a\x99\x54\xd7\x4a\x6a\x96\xc6\xeb\x8b\xe8\x3f\x51\x77\x0f\xb8\xf3\xb3\xbb\xba\x71\xe3\xce\xdb\x8b\x5c\xf6\x00\x7b\x00\x4d\xce\x8c\x89\x12\xcd\x2a\x5a\x99\xa3\xc6\x9d\x70\xb3\x43\x3d\x19\xbd\x09\x6b\xa1\xae\x5e\x47\x0f\xa2\x84\x9d\xc0\x83\x28\x29\x83\x4d\x2a\x98\xb4\x1a\xb8\x41\xe6\x7c\x26\x15\x60\x51\xba\x2d\xc4\x55\x49\x0a\x2d\xac\xb4\x4c\xd1\x74\xa0\xce\x05\xcf\x7f\x49\xdf\x2f\x99\x03\x58\x22\x67\x95\x45\xaf\x1c\x38\x53\x2f\x1c\xcc\xbf\x4e\xe8\x44\x16\x4c\xa5\xd6\x77\xea\x01\xed\xab\x15\x05\x04\x70\xcc\x40\xb8\x79\x58\xaf\xce\x62\x85\xe7\xcf\x6f\x03\x3a\x82\x95\x22\xef\x0f\xce\x1f\xd6\x8b\x35\x3c\x0a\xb4\x59\x39\x42\xee\x53\x61\x0e\xd1\x04\x4d\x6d\xb1\x87\x0e\x59\x11\x2f\x2b\xbb\x5d\xea\x4d\x98\xa3\x2c\xd1\xf4\x2f\xa2\xde\x9b\xa8\x4b\x75\x3d\xdf\xf8\xc7\x86\x78\xb6\xef\xd1\x7d\xee\x43\x8b\x66\x8d\x86\xe2\x08\x39\xf1\x45\xff\x22\xea\x86\x5e\x24\xf4\x22\xe1\xb3\x63\x27\x93\xb1\x13\xfc\xa9\xbd\x67\xc7\xa3\x10\xb4\x61\x65\x74\x01\xa9\xb2\x95\x13\x72\x97\xba\xa0\x0d\x42\x59\xc7\xa4\x04\x85\x1c\xad\x65\x66\x0b\xd4\xf7\x2c\x43\xdb\x0f\xda\x10\xc2\x52\xa8\x34\x74\x5a\x4b\xdb\x07\xae\x15\x11\x1e\x51\x47\xb6\x2f\x27\x67\x8a\x68\x34\x25\x1a\xba\x9e\x24\xe0\xd0\x3a\xe2\x6a\x08\x61\xa8\x0d\x5e\x4f\x92\xfe\x61\xdf\xea\x02\xcf\x41\xde\xa7\x5c\x5b\x87\x1b\xe4\xbf\xfa\x84\xe9\xdf\x7a\xc5\x2b\x23\x3b\xa0\xf8\x4e\x37\x31\x24\x48\xed\x88\x83\xb1\x87\x8d\x7e\x78\x29\x54\x8e\x46\x10\xbf\x79\x3b\x87\x6c\xbc\xda\x5b\x6e\x0a\xfd\x2f\x52\xd1\x20\x83\xe1\x74\x76\x03\x61\x48\xb2\xef\xce\x0b\x0c\x71\x2a\x32\xff\x77\x06\x7a\x54\x18\x88\x77\xbd\x1b\x27\x5b\xeb\xb0\xb8\xec\xc5\x0a\x1d\x2b\xc5\x65\x2f\x4a\xa5\xfc\xcd\xf6\x99\x6e\x62\x8e\x63\xb3\xe3\x06\xcf\x26\x4f\x40\x9b\x68\x9b\x0f\x35\xc4\x64\xba\x18\xbd\xe4\x92\x55\xa9\xa8\x96\xaf\xfa\x90\x6a\x7e\x8f\x06\x96\x95\x90\xe9\x06\x2c\x3a\xeb\xe9\x6f\x36\x58\x7c\x04\x54\x6b\x58\x33\x23\xfc\x15\xe4\xf4\x9e\x2f\x43\x29\xee\x1b\xc4\xbe\x1f\x84\xf5\x37\x6b\x8a\x56\x18\x02\x47\xc1\x68\xf2\xcd\x23\xde\xb5\x86\xfd\xdb\x54\x64\xb7\x6f\x87\xfd\xdb\xa5\x50\xfe\x4b\x85\xf4\x83\x5d\xdc\xb7\x76\x17\xf7\xc9\x1a\x0d\x67\x46\x67\x86\x15\xf0\x5e\x48\xb4\xb7\x33\x5d\xa3\x49\x72\x94\xf2\x6d\x8b\x22\x99\x4d\xe7\x0b\xf8\x5f\x17\x14\x62\xea\xdb\xa1\xef\x5b\x20\xac\x71\xd9\x54\xe0\x88\x39\x47\xd1\x0b\x63\x83\xbc\x43\x03\x92\x38\xc1\x5d\x3c\x81\xdb\x6f\xbf\xb9\xfc\xef\xd5\xe9\xb6\x37\x12\x52\x1f\x2b\x56\x60\x30\xfa\x63\x36\x4d\x46\xe4\x90\xb7\xe7\x95\x91\xc8\xe1\x14\xee\xd5\x3d\xae\xd1\x9e\x33\x8f\x74\xb3\x13\x29\xb5\x71\x68\x3c\x77\x37\xc3\x58\x6a\xce\x24\xd9\x8c\xb8\x71\x70\x36\x7b\x1a\x76\x8f\x5b\x38\x9b\x1d\x94\x17\xba\x52\x4d\xfc\x24\x78\x98\xc5\xf4\x2c\x9a\x1d\x2f\xe1\xa8\xb4\x17\xf0\xc4\x5a\x73\x7f\xb1\x4c\x91\x62\x88\x77\x03\xd2\xbe\xcb\xd1\xfe\xb2\x47\xe5\xcc\xb6\xd4\x42\xb9\x90\xf4\xa3\x01\x83\x92\xd1\x01\x6d\x18\x01\x12\x62\x88\xdd\x43\xea\x37\xe0\xa0\xed\x2f\x0f\x23\x52\xb4\xcd\x23\xce\x9f\xe3\x17\xf6\x44\xb0\x79\xbd\xed\xfc\x09\x7b\x44\x66\xcc\x6c\x3b\xf4\x98\x80\x5a\x48\x09\x6b\x34\x62\xb5\x05\x97\x33\xe7\x6d\x72\x6d\x0c\x72\x6a\x83\x13\x25\xc2\x1e\x58\xa6\xc1\x78\x16\x44\x7a\x92\x3e\x15\x77\xd8\x0b\x82\xd1\x64\x31\xbf\x99\x4d\xc7\x93\x05\xfc\x68\xed\x37\x5a\x3f\x83\xe1\x97\x6b\xf8\xd1\x2a\xe9\x86\x6b\xfd\x0c\xfe\x0a\x00\x00\xff\xff\x19\x27\x58\xec\xfa\x0a\x00\x00") + +func testImagesAgnhostDockerfile_windowsBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostDockerfile_windows, + "test/images/agnhost/Dockerfile_windows", + ) +} + +func testImagesAgnhostDockerfile_windows() (*asset, error) { + bytes, err := testImagesAgnhostDockerfile_windowsBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/Dockerfile_windows", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x6b\xdb\x3e\x14\xc5\x9f\xff\xfa\x14\x87\xb8\x0f\x09\xa4\x4e\xff\x65\x6c\xac\xa3\x0c\x2f\xc9\x52\xd3\xce\x1e\x76\xda\xd2\xa7\x22\xdb\x37\xf6\x05\x47\xd2\x24\x79\x4e\xbe\xfd\x50\xda\xc2\xca\xf4\x76\xef\x3d\xf7\xe8\xa7\xa3\x08\x4b\x6d\x8e\x96\xdb\xce\xe3\xf2\xe2\xff\xcf\xd8\x76\x84\xdb\xa1\x22\xab\xc8\x93\x43\x32\xf8\x4e\x5b\x17\x8b\x48\x44\xb8\xe3\x9a\x94\xa3\x06\x83\x6a\xc8\xc2\x77\x84\xc4\xc8\xba\xa3\xb7\xc9\x1c\x0f\x64\x1d\x6b\x85\xcb\xf8\x02\xd3\x20\x98\xbc\x8e\x26\xb3\x2f\x22\xc2\x51\x0f\xd8\xcb\x23\x94\xf6\x18\x1c\xc1\x77\xec\xb0\xe3\x9e\x40\x87\x9a\x8c\x07\x2b\xd4\x7a\x6f\x7a\x96\xaa\x26\x8c\xec\xbb\xd3\x35\xaf\x26\xb1\x88\xf0\xf4\x6a\xa1\x2b\x2f\x59\x41\xa2\xd6\xe6\x08\xbd\xfb\x5b\x07\xe9\x4f\xc0\xe1\x74\xde\x9b\xab\xc5\x62\x1c\xc7\x58\x9e\x60\x63\x6d\xdb\x45\xff\x22\x74\x8b\xbb\x74\xb9\xce\xca\xf5\xf9\x65\x7c\x71\x5a\xb9\x57\x3d\x39\x07\x4b\xbf\x06\xb6\xd4\xa0\x3a\x42\x1a\xd3\x73\x2d\xab\x9e\xd0\xcb\x11\xda\x42\xb6\x96\xa8\x81\xd7\x81\x77\xb4\xec\x59\xb5\x73\x38\xbd\xf3\xa3\xb4\x24\x22\x34\xec\xbc\xe5\x6a\xf0\xef\xc2\x7a\xa3\x63\xf7\x4e\xa0\x15\xa4\xc2\x24\x29\x91\x96\x13\x7c\x4b\xca\xb4\x9c\x8b\x08\x8f\xe9\xf6\x26\xbf\xdf\xe2\x31\x29\x8a\x24\xdb\xa6\xeb\x12\x79\x81\x65\x9e\xad\xd2\x6d\x9a\x67\x25\xf2\xef\x48\xb2\x27\xdc\xa6\xd9\x6a\x0e\x62\xdf\x91\x05\x1d\x8c\x0d\xfc\xda\x82\x43\x8c\xd4\x84\xcc\x4a\xa2\x77\x00\x3b\xfd\x02\xe4\x0c\xd5\xbc\xe3\x1a\xbd\x54\xed\x20\x5b\x42\xab\x7f\x93\x55\xac\x5a\x18\xb2\x7b\x76\xe1\x33\x1d\xa4\x6a\x44\x84\x9e\xf7\xec\xa5\x3f\x75\xfe\x79\x54\x2c\x44\x59\x2c\xcb\x6b\xd9\xaa\x4e\x3b\x2f\xf2\x12\x5f\xaf\xd1\xb3\x1a\x0e\x22\x29\x96\x37\xa1\x92\xfb\xe6\xe3\x07\xb1\x4d\x8a\xcd\x7a\x1b\xea\xb3\xe9\xf2\xbe\x58\xa5\xc5\x4c\x6c\xf2\xa4\xf8\x11\x5a\x9f\xc4\x26\xbf\x4b\xb2\xcd\xf3\xc3\xba\x28\xd3\x3c\x3b\x99\x48\x4f\xce\x07\xfb\xe7\x55\x5a\x20\xec\x29\xed\x1b\xb6\x38\x9b\xba\x8e\xfa\x1e\x66\x6c\x66\x33\x41\x07\xa3\xad\x17\xa2\x62\x75\x25\xfe\x8b\xe3\x05\xef\x65\x4b\xe7\x83\xe7\x3e\x76\x1d\x2a\x56\x38\x9b\x06\xc8\x99\x10\xf1\xcf\x9b\x3c\x7b\xba\x0a\x4d\xf1\x27\x00\x00\xff\xff\x95\x12\x72\xa6\x04\x03\x00\x00") + +func testImagesAgnhostMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostMakefile, + "test/images/agnhost/Makefile", + ) +} + +func testImagesAgnhostMakefile() (*asset, error) { + bytes, err := testImagesAgnhostMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xce\x49\x2c\x4d\xc9\x2c\x4d\x4a\xcd\x29\xe5\x02\x04\x00\x00\xff\xff\x9b\x12\xb6\xf7\x1b\x00\x00\x00") + +func testImagesAgnhostOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostOwners, + "test/images/agnhost/OWNERS", + ) +} + +func testImagesAgnhostOwners() (*asset, error) { + bytes, err := testImagesAgnhostOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd2\x33\x32\xe5\x02\x04\x00\x00\xff\xff\xa0\xde\x25\x38\x05\x00\x00\x00") + +func testImagesAgnhostVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostVersion, + "test/images/agnhost/VERSION", + ) +} + +func testImagesAgnhostVersion() (*asset, error) { + bytes, err := testImagesAgnhostVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostAgnhostGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x97\xdf\x6f\xdb\x36\x10\xc7\x9f\xc5\xbf\xe2\xa0\x87\xc1\x2e\x62\xa9\xcd\x30\x60\xcb\xb0\x07\xcf\xf9\x51\xa3\x99\x53\x44\xee\x82\x3e\xd2\xd4\x59\x22\x42\x91\x1a\x49\xc5\x31\x8a\xfe\xef\xc3\xd1\xb2\x63\x77\xb2\x27\x3f\x59\x24\x3f\xdf\xbb\x33\x45\x7e\x45\xa6\xef\xd8\xc4\xd4\x6b\x2b\x8b\xd2\xc3\xe5\xfb\x0f\xbf\xc1\xbc\x44\xf8\xd4\x2c\xd0\x6a\xf4\xe8\x60\xdc\xf8\xd2\x58\x97\x30\x76\x2f\x05\x6a\x87\x39\x34\x3a\x47\x0b\xbe\x44\x18\xd7\x5c\x94\x08\xed\xc8\x05\xfc\x8d\xd6\x49\xa3\xe1\x32\x79\x0f\x03\x02\xe2\x76\x28\x1e\xfe\xce\xd6\xa6\x81\x8a\xaf\x41\x1b\x0f\x8d\x43\xf0\xa5\x74\xb0\x94\x0a\x01\x5f\x05\xd6\x1e\xa4\x06\x61\xaa\x5a\x49\xae\x05\xc2\x4a\xfa\x32\x24\x69\x43\x24\xec\x6b\x1b\xc0\x2c\x3c\x97\x1a\x38\x08\x53\xaf\xc1\x2c\xf7\x29\xe0\x9e\x31\x00\x80\xd2\xfb\xfa\x2a\x4d\x57\xab\x55\xc2\x43\x95\x89\xb1\x45\xaa\x36\x94\x4b\xef\xa7\x93\x9b\x59\x76\x33\xba\x4c\xde\x33\xf6\x45\x2b\x74\x0e\x2c\xfe\xd3\x48\x8b\x39\x2c\xd6\xc0\xeb\x5a\x49\xc1\x17\x0a\x41\xf1\x15\x18\x0b\xbc\xb0\x88\x39\x78\x43\x75\xae\xac\xf4\x52\x17\x17\xe0\xcc\xd2\xaf\xb8\x45\x96\x4b\xe7\xad\x5c\x34\xfe\x60\x82\xb6\x55\x49\x07\xfb\x80\xd1\xc0\x35\xc4\xe3\x0c\xa6\x59\x0c\x7f\x8e\xb3\x69\x76\xc1\x9e\xa6\xf3\x8f\x0f\x5f\xe6\xf0\x34\x7e\x7c\x1c\xcf\xe6\xd3\x9b\x0c\x1e\x1e\x61\xf2\x30\xbb\x9e\xce\xa7\x0f\xb3\x0c\x1e\x6e\x61\x3c\xfb\x0a\x9f\xa6\xb3\xeb\x0b\x40\xe9\x4b\xb4\x80\xaf\xb5\xa5\xda\x8d\x05\x49\x53\x87\x79\xc2\x32\xc4\x83\xe4\x4b\xb3\x29\xc6\xd5\x28\xe4\x52\x0a\x50\x5c\x17\x0d\x2f\x10\x0a\xf3\x82\x56\x4b\x5d\x40\x8d\xb6\x92\x8e\x5e\x9e\x03\xae\x73\xa6\x64\x25\x3d\xf7\xa1\xfd\x9f\xbf\x93\xb0\x77\x29\x63\x35\x17\xcf\x14\xa4\xe2\x52\x33\x26\xab\xda\x58\x0f\x03\x16\xc5\x4b\xc5\x8b\x98\xb1\x28\x2e\xa4\x2f\x9b\x45\x22\x4c\x95\xba\x7a\xf9\xe1\xe7\x54\x98\x85\xe5\x61\xe8\xf9\x57\x97\x48\x93\x3e\x2b\x53\xa4\x2f\x97\x31\x8b\x78\x93\x4b\x5f\x5b\xf3\xba\x86\xdd\xe0\x6e\x15\xa6\x1e\x9d\x4f\x65\xc5\x0b\x74\x29\x2f\x74\x69\x9c\x4f\x83\x62\x14\x24\xf1\x5e\xc4\xd3\x22\x61\xb4\x46\xe1\x63\x16\x09\x9b\x0b\xa3\x5f\x56\xb8\x28\x8d\x79\xee\x9b\x54\xd8\x7c\x44\xb2\xcd\x42\x1f\xb5\xea\xfe\xf9\x73\xed\xfa\xc3\xa8\xbd\x5d\xd7\x46\x6a\x3f\xa2\x61\xb4\xfd\xa5\x4b\xfe\x8c\x85\xf4\x0e\xed\xcb\x39\xb2\xa2\x41\xe7\x17\x67\xfd\x23\xa9\x85\x6a\xa8\x38\xa1\x24\x6a\xdf\x5f\xa8\xe4\x0b\x6a\x74\x34\x1f\xca\x14\xae\x40\xdd\xf7\x25\x10\x3e\x2a\x50\xa3\xe5\xde\x9c\xf1\xef\x2a\xd3\x68\x4f\x03\xfd\x25\x1a\xcf\x83\xf1\x15\xc5\x59\x82\xb6\x1c\x6d\x9c\xe6\xbe\xef\x04\x68\x33\x22\x7c\x74\x20\x3e\x6b\xf3\xec\x47\x38\x77\x0f\x99\x1a\xb5\xcc\x2b\xf4\x3c\xe7\x9e\xf7\xd7\xd5\xbc\x71\x18\xb3\x88\x8c\x62\x69\xec\x8a\xdb\x7c\xb3\xac\xfb\x16\x4d\xc2\x51\xab\x3c\x7b\x47\x90\x38\xf0\x16\x9d\x30\xda\x35\x15\x5a\xe1\xad\xea\x9b\xdc\xa2\x33\x8d\x15\x38\xda\x8a\xe9\xc1\x5b\xa3\x54\x88\x1a\x76\x1a\x81\x9a\x57\xd8\x37\x66\x10\x8d\xb6\xaa\x98\x45\x04\xad\x70\xb1\xd9\xb6\x7d\xa3\x84\x77\xb8\x53\xf5\x9f\x91\x9d\x79\x0d\x19\x5b\x36\x5a\x04\x27\x1f\x0c\xe1\x1b\x8b\xac\x31\x7e\x52\xe5\x70\xf5\x07\xfc\x14\x4c\x3b\x99\x98\xaa\xe2\x3a\xff\xc6\xa2\xe8\x8b\xc3\x2b\xfa\xc4\x42\xcc\xeb\x3a\xbe\x60\x51\xd4\x7e\xf7\xaf\x20\xbe\x4c\x2e\x7f\xa1\xae\xef\x6c\x17\x24\x19\xe7\x79\xab\x1e\xbc\xb9\x7c\x32\xa9\xf2\x31\xb5\x3e\x53\x6b\xd8\x49\xb7\x66\x4d\xe8\x64\xf3\x78\x84\x3b\xb0\xf2\x80\x5b\x52\xb4\x2e\xfd\xb4\xe9\xef\xd6\xe6\xda\x91\xe0\x7a\x96\x65\xcd\x72\x29\x5f\xff\x97\x0a\x93\x7c\x2f\xdd\x91\x5a\x5a\xf2\xc6\x8b\x8f\xc6\x79\xd7\x0d\xbd\x19\x7b\x60\x77\xad\x79\x58\xd3\xdd\x9a\x03\x47\x27\xd9\x2d\x7f\xc6\x3b\xe9\x37\x05\x75\x6b\x76\x76\x4e\xfc\xdd\xb6\xd1\xcd\xfe\xe0\xe3\xa4\x98\xea\xc9\xa6\x6b\x12\xba\xba\x75\x5b\x1b\x27\xc1\x7d\xfb\x7c\x84\xdc\xb8\x7c\x00\x4d\xe1\xee\xb6\x06\xde\x4d\xef\xcc\x9a\xf8\xbf\xb6\x8d\x6e\x56\x63\xa0\x66\x78\x7c\x9c\x8c\xb9\x65\xe8\xf1\x28\xb7\xcd\x38\xc3\x53\xf9\x82\xe1\x06\xcc\x64\x9a\x87\xf7\x76\x8a\xdc\xad\xf8\x37\xfc\xc4\xb2\x0f\x3e\x49\xf4\x67\x7a\x38\xc2\x04\x37\x0b\x50\x78\x3a\x4e\x1d\x38\xed\x56\x70\xbb\xe9\x3c\xb5\xde\x7e\xb0\x49\x52\x3e\xb6\x16\x38\x69\xfb\x27\x3b\x03\xec\x0e\x71\xe0\x89\x14\x20\xac\xd5\x8f\x6d\x47\xb7\xe6\xc0\x01\x49\x43\x35\x3e\x6d\x3b\xba\x35\x7b\x1b\xff\xe4\x5e\x3f\xfc\x70\x6d\x83\x53\x51\x52\xe0\x58\x08\x5a\x64\x53\xe7\x1a\xb4\xd7\xd2\x09\x3a\x1b\xaf\x87\x8c\x45\x69\x0a\xb3\x87\xf9\xcd\x40\x28\xb2\xaf\x66\x31\xbc\x82\xcc\x54\x08\x54\xaa\x03\x6e\x11\x6a\xee\x1c\x9d\xa2\x95\x29\x0a\xfa\xb5\xa8\x38\x9d\xf3\xe9\x24\xec\xe8\x92\x00\x2b\x04\xdd\x5e\x1f\x16\x08\xe1\x5e\xe1\x4d\x08\xcd\x45\xb8\xfc\xf8\x12\xab\x04\xe6\x74\x27\x5a\x49\xa5\x80\x2b\x47\x37\x0d\xa1\x9a\x3c\x9c\xe6\x2b\xba\x76\xd0\x19\xbc\xb6\x52\x53\xec\x12\x55\x9d\x84\xa3\x13\xa5\xbc\xa5\x4c\xc1\xae\x29\x67\x42\xcd\x0c\xfd\xb7\xef\x2c\xa2\x23\x76\x32\xd5\xd2\x07\x64\xb0\xcf\xef\xcd\xd2\x67\xb2\x4a\xe7\x51\xb7\xd8\x90\xe6\xed\xce\xb4\x71\x8e\xa9\x6e\x5e\x51\x34\x1e\x07\x43\xf6\x9d\xfd\x1b\x00\x00\xff\xff\x4a\xd8\x8c\x1b\x4a\x0e\x00\x00") + +func testImagesAgnhostAgnhostGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostAgnhostGo, + "test/images/agnhost/agnhost.go", + ) +} + +func testImagesAgnhostAgnhostGo() (*asset, error) { + bytes, err := testImagesAgnhostAgnhostGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/agnhost.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostAuditProxyMainGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x55\x5d\x6f\xdb\xb8\x12\x7d\x16\x7f\xc5\x5c\x01\x2d\xe4\x40\xa5\x92\xde\x97\x5e\x17\x79\x70\x9d\xe4\xd6\x68\xeb\x14\x71\xb2\x45\xb1\x58\x2c\x68\x69\x24\x71\x4b\x91\x2a\x3f\xec\x78\x8b\xfc\xf7\xc5\x50\x72\x12\xb7\x68\x8b\x62\x9f\x64\x92\x33\xc3\x33\xe7\x9c\xa1\x8b\x23\x36\x37\xfd\xce\xca\xa6\xf5\xf0\xfc\xf8\xe4\x7f\x70\xdd\x22\xbc\x09\x6b\xb4\x1a\x3d\x3a\x98\x05\xdf\x1a\xeb\x38\x63\x6f\x65\x89\xda\x61\x05\x41\x57\x68\xc1\xb7\x08\xb3\x5e\x94\x2d\xc2\x78\x92\xc3\x6f\x68\x9d\x34\x1a\x9e\xf3\x63\xc8\x28\x20\x1d\x8f\xd2\xc9\x4b\xb6\x33\x01\x3a\xb1\x03\x6d\x3c\x04\x87\xe0\x5b\xe9\xa0\x96\x0a\x01\x6f\x4b\xec\x3d\x48\x0d\xa5\xe9\x7a\x25\x85\x2e\x11\xb6\xd2\xb7\xf1\x92\xb1\x04\x67\x1f\xc7\x02\x66\xed\x85\xd4\x20\xa0\x34\xfd\x0e\x4c\xfd\x38\x0a\x84\x67\x0c\x00\xa0\xf5\xbe\x9f\x16\xc5\x76\xbb\xe5\x22\xa2\xe4\xc6\x36\x85\x1a\xa2\x5c\xf1\x76\x31\x3f\x5f\xae\xce\x9f\x3d\xe7\xc7\x8c\xdd\x68\x85\xce\x81\xc5\xcf\x41\x5a\xac\x60\xbd\x03\xd1\xf7\x4a\x96\x62\xad\x10\x94\xd8\x82\xb1\x20\x1a\x8b\x58\x81\x37\x84\x73\x6b\xa5\x97\xba\xc9\xc1\x99\xda\x6f\x85\x45\x56\x49\xe7\xad\x5c\x07\x7f\x40\xd0\x1e\x95\x74\xf0\x38\xc0\x68\x10\x1a\xd2\xd9\x0a\x16\xab\x14\x5e\xcd\x56\x8b\x55\xce\x3e\x2c\xae\x5f\x5f\xde\x5c\xc3\x87\xd9\xd5\xd5\x6c\x79\xbd\x38\x5f\xc1\xe5\x15\xcc\x2f\x97\x67\x8b\xeb\xc5\xe5\x72\x05\x97\x17\x30\x5b\x7e\x84\x37\x8b\xe5\x59\x0e\x28\x7d\x8b\x16\xf0\xb6\xb7\x84\xdd\x58\x90\x44\x1d\x56\x9c\xad\x10\x0f\x2e\xaf\xcd\x00\xc6\xf5\x58\xca\x5a\x96\xa0\x84\x6e\x82\x68\x10\x1a\xb3\x41\xab\xa5\x6e\xa0\x47\xdb\x49\x47\xe2\x39\x10\xba\x62\x4a\x76\xd2\x0b\x1f\xd7\xdf\xb4\xc3\xd9\x51\xc1\x58\x2f\xca\x4f\x54\x44\x84\x4a\xfa\xde\x9a\xdb\x1d\x63\xb2\xeb\x8d\xf5\x90\xb1\x24\x95\xa6\x90\x26\x78\xa9\x52\x96\xa4\xca\x34\xf4\xd1\xe8\x0b\x12\x86\x7e\x1b\x97\x32\x96\xa4\x8d\xf4\x6d\x58\xf3\xd2\x74\x85\xeb\xeb\x93\xff\x16\xa5\x59\x5b\x11\x8f\x3e\xbd\x70\x5c\x9a\x42\xf4\xb2\x13\x65\x2b\x35\xda\x5d\xd1\x7f\x6a\x0a\x1b\xb4\x97\x1d\xa6\x3f\x0f\x29\x1c\x5a\x29\x94\xfc\x1b\x6d\xf1\x97\x33\x3a\x65\x49\x44\x2b\xb5\xf3\x42\x29\x78\x94\xef\xd0\x6e\xd0\xc6\x64\x5a\x15\x31\xae\x18\x03\xf7\x79\x9b\x93\x9f\xa7\x6c\x4e\x0e\x81\x3d\x8e\xa2\x80\x94\x4d\x18\x2b\x0a\x98\x77\xd5\x8c\xd6\xef\x89\x39\x32\x48\x70\xa3\xf5\x1a\xdd\x1a\xe7\x61\x4e\x44\x70\xb6\x11\xf6\xab\xd8\x53\x78\x1a\x49\xe2\x73\xd3\x75\x42\x57\x5f\x58\x72\xe3\x70\x0a\x00\x69\xbc\xe1\x59\x14\x23\xcd\x59\xb2\x6a\x8d\xf5\x53\x9a\x42\xe7\x51\x3b\xf2\x5d\xd4\xe7\xc5\xf1\x8b\xe3\x68\x0b\xa9\x4b\xd3\x91\xfe\x31\x11\x70\x83\xda\x3b\xca\x7c\x6b\x74\x33\x05\x48\x6f\xdc\xe0\x79\x8f\xce\x43\xb5\xd3\xa2\x93\x25\x8c\x1c\x36\x1c\x16\x1e\xd4\x2f\xd5\x26\x73\xc5\xe9\x41\x47\x8e\xea\x20\x0e\x72\xd0\xb2\x36\xb6\x83\x4e\x68\x4d\x56\x33\xe0\x7c\x65\x82\xe7\x04\x65\x66\x1b\x37\x05\x18\x5a\x7e\x27\x6e\x65\x17\xba\x25\x6d\x66\xc7\x93\x9c\x25\x57\x41\x53\xeb\x9d\x90\x3a\x67\x77\x2c\xf2\x95\xb1\x04\x75\x69\xc8\xb6\xa3\x13\xf8\xf9\xb0\x66\x49\x85\x87\x07\x67\xc3\x9a\x54\xa9\x83\x2e\x63\xa1\xac\xec\x2a\x38\x3a\x20\x39\x07\x61\x1b\x07\xbf\xff\x41\x53\xac\x9b\x09\x7c\x61\x89\x2b\x5b\xec\x10\xa6\xa7\xf7\xc5\x96\xb8\x5d\xc5\xcd\x6c\x72\x68\x35\xbe\x18\xbe\xd9\x90\x33\x61\xc9\x83\x35\xa9\x00\xb9\x33\x66\xdf\xef\x66\x71\xeb\x0c\x6b\x11\x94\x7f\x87\x5e\x5c\x88\xd2\x1b\xbb\xcb\x61\x28\xf1\xf0\xad\x85\x72\x54\x71\xdf\xf2\xe9\xc0\x38\x9f\x9b\x0a\x4b\xb7\xef\xfc\xc2\xd8\xf1\x79\xce\x1e\xae\xce\x61\xf4\x35\x1f\x60\xff\xdf\x9a\xd0\x8f\x61\x93\x07\xae\xbe\xaa\x78\xa3\xe5\x06\xad\x13\x6a\xe4\x2e\xfb\x51\x11\x96\xd0\xc4\xf3\xd7\x42\x57\x0a\x2f\x82\x2e\xb3\xb4\x48\x73\x68\xe3\xda\x4e\x58\xa2\x4c\xc3\x2f\x84\x17\x2a\x8b\x81\x83\x57\x67\xba\x5a\xd1\xe0\x64\xe9\x94\x0c\x95\xe6\xa0\xa5\x9a\x4c\x48\xe0\xa8\xd2\x98\x9e\x6d\xe3\x43\xcf\xaf\xd0\xf5\x46\x3b\xfc\x40\xce\xb2\x39\x3d\xe5\x70\x34\x9e\x7c\x0e\xe8\x7c\xd4\x6b\x6d\xaa\x5d\x0e\x68\x23\xe3\xc3\xe3\xc4\xaf\x50\x54\x33\xa5\x32\x8b\x9f\xf9\x2b\x53\xed\x26\x2c\x91\x75\x8c\xf9\xcf\x29\xdd\x49\x79\x11\xe2\x7b\x2b\xb5\xaf\xb3\xb4\x34\x41\x55\xf1\x4f\xcc\xa2\xa8\xe2\x9f\x06\xcd\x06\xd5\x9e\xc2\x93\x4d\x1a\x2f\x98\xb0\x24\xd9\xf2\x88\xe6\x35\x0a\xa2\x28\x82\x59\x79\xe1\x83\x5b\x68\x8f\x56\x0b\x15\x1b\xb4\xe7\xd6\x9a\x18\x6f\xd1\x07\xab\x59\x72\xc7\x12\x54\x84\xf0\xe9\x9e\xd6\x73\x1a\x1d\xe2\xe5\xcb\x1d\xbb\x87\xf7\xc8\x75\x83\x0c\x0b\xed\x4d\x36\x2a\x96\xc3\xd8\xab\x9a\xbc\xfc\x51\x33\xb5\x90\x0a\x2b\x88\x59\x34\xaa\xeb\x50\x4f\xe1\xc9\x3a\x07\xd1\xcb\x51\xc1\x29\x3c\x71\xe9\xbe\xde\x0f\xdd\xf2\x6f\x3a\xae\xb0\xa6\x99\x1c\x45\xe0\x73\x65\x1c\xcd\x10\x4b\x8a\x62\x78\x2e\xf6\xef\xc7\xfd\xdb\xc0\x12\x7a\x64\xfe\xcc\x87\x83\x48\x87\xd0\x0d\x02\x2a\xbe\xf0\xd8\xb9\xd8\xeb\x48\xd4\x38\x19\xe3\x28\x64\x4f\x63\x4a\x0e\xc6\xf1\x55\xac\x45\x60\xbe\x55\xfd\x3b\xb2\x0f\xc5\x1e\xbf\x6a\x87\xba\xff\x32\x0d\xf7\x3c\x10\x11\x77\xec\xfb\xf9\x97\x6f\x68\x00\xfe\x09\x00\x00\xff\xff\x2b\xc6\xc5\xa5\xb3\x09\x00\x00") + +func testImagesAgnhostAuditProxyMainGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostAuditProxyMainGo, + "test/images/agnhost/audit-proxy/main.go", + ) +} + +func testImagesAgnhostAuditProxyMainGo() (*asset, error) { + bytes, err := testImagesAgnhostAuditProxyMainGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/audit-proxy/main.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostConnectConnectGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x56\xef\x6f\xdb\xc8\x11\xfd\xcc\xfd\x2b\xa6\x04\x7a\x25\x05\x8a\xb2\xd3\x4f\x55\xe2\x0f\xaa\x2c\x37\x42\x72\x92\x21\xca\x17\x1c\x72\x41\x6f\x45\x0e\xc9\x85\xc9\x5d\x76\x77\x69\xd9\x08\xfc\xbf\x17\xb3\x24\xf5\xc3\x89\x83\x06\x28\x90\x58\x12\x77\x76\xde\x9b\x37\x6f\x46\x9a\x8c\xd8\x5c\x35\x4f\x5a\x14\xa5\x85\x37\x17\x97\xff\x80\x6d\x89\xf0\xa1\xdd\xa1\x96\x68\xd1\xc0\xac\xb5\xa5\xd2\x26\x66\xec\xa3\x48\x51\x1a\xcc\xa0\x95\x19\x6a\xb0\x25\xc2\xac\xe1\x69\x89\xd0\x9f\x44\xf0\x1b\x6a\x23\x94\x84\x37\xf1\x05\x04\x14\xe0\xf7\x47\x7e\xf8\x96\x3d\xa9\x16\x6a\xfe\x04\x52\x59\x68\x0d\x82\x2d\x85\x81\x5c\x54\x08\xf8\x98\x62\x63\x41\x48\x48\x55\xdd\x54\x82\xcb\x14\x61\x2f\x6c\xe9\x40\xfa\x14\x31\xfb\xbd\x4f\xa0\x76\x96\x0b\x09\x1c\x52\xd5\x3c\x81\xca\x4f\xa3\x80\x5b\xc6\x00\x00\x4a\x6b\x9b\xe9\x64\xb2\xdf\xef\x63\xee\x58\xc6\x4a\x17\x93\xaa\x8b\x32\x93\x8f\xcb\xf9\x62\x95\x2c\xc6\x6f\xe2\x0b\xc6\xee\x64\x85\xc6\x80\xc6\xff\xb4\x42\x63\x06\xbb\x27\xe0\x4d\x53\x89\x94\xef\x2a\x84\x8a\xef\x41\x69\xe0\x85\x46\xcc\xc0\x2a\xe2\xb9\xd7\xc2\x0a\x59\x44\x60\x54\x6e\xf7\x5c\x23\xcb\x84\xb1\x5a\xec\x5a\x7b\x26\xd0\xc0\x4a\x18\x38\x0d\x50\x12\xb8\x04\x7f\x96\xc0\x32\xf1\xe1\x9f\xb3\x64\x99\x44\xec\xd3\x72\xfb\x7e\x7d\xb7\x85\x4f\xb3\xcd\x66\xb6\xda\x2e\x17\x09\xac\x37\x30\x5f\xaf\xae\x97\xdb\xe5\x7a\x95\xc0\xfa\x06\x66\xab\xdf\xe1\xc3\x72\x75\x1d\x01\x0a\x5b\xa2\x06\x7c\x6c\x34\x71\x57\x1a\x04\x49\x87\x59\xcc\x12\xc4\x33\xf0\x5c\x75\x64\x4c\x83\xa9\xc8\x45\x0a\x15\x97\x45\xcb\x0b\x84\x42\x3d\xa0\x96\x42\x16\xd0\xa0\xae\x85\xa1\xe6\x19\xe0\x32\x63\x95\xa8\x85\xe5\xd6\x7d\xfe\xa6\x9c\x98\x8d\x26\x8c\x35\x3c\xbd\xa7\x24\xa9\x92\x12\x53\xcb\x98\xa8\x1b\xa5\x2d\x04\xcc\xf3\xf3\xda\xfa\xcc\xf3\x25\xba\x17\x65\xe8\xaf\x79\x32\x29\xaf\x2a\x7a\x6b\x45\x8d\x3e\x63\x9e\x5f\x08\x5b\xb6\xbb\x38\x55\xf5\x44\x98\x52\x64\x7c\xcf\x2d\xd7\xed\xc4\xa4\xb6\xf1\xcf\xcf\x4d\x93\x5f\xfe\x7d\x92\xaa\x9d\xe6\x3e\x0b\x19\x9b\x4c\x60\x5e\x67\xf3\x0e\x9c\x04\x6e\x4d\xdf\xba\x42\x96\xca\x58\x98\x53\x68\xcc\x1e\xb8\x3e\x0d\xbc\x82\x5f\x5c\x8e\x78\xae\xea\x9a\xcb\xec\x2b\xf3\xee\x0c\x4e\x01\xc0\xef\x0b\x81\xcf\x74\x7d\x4a\xb5\x7c\xf1\x23\xe6\x25\xa5\xd2\x76\x0a\xfe\xcc\x5a\xac\x1b\x6b\x80\xc3\x76\x7e\x4b\x8a\x27\xf3\xed\xed\x50\xbe\x70\x3d\xcd\x40\xa3\x6d\xb5\x74\x6c\xf2\xb6\x02\xd4\x5a\x69\x43\x69\x3e\x2a\x59\x4c\xe1\xcf\xad\x16\x68\xc8\x45\xaa\x41\xf9\x7a\x2a\xab\x9c\xe0\x85\x78\x40\x09\xae\x1c\x4a\x4e\x9c\x62\x58\xcb\x2e\x2d\x08\x0b\x8d\x16\x92\x28\x0d\x8f\x6a\x34\x86\x9a\xd2\x68\xcc\xc5\x23\x66\xdd\x18\xf1\x63\xef\xbb\xa7\x64\x45\x59\x80\x2d\xb9\x05\x8b\xc6\x42\xca\x0d\x1a\x48\xb9\x84\xb4\xc4\xf4\x9e\x3c\x33\x65\x6c\x04\x77\xab\x0f\xab\xf5\xa7\x15\x8c\xe1\x5f\x28\x51\x8b\x74\xd2\xca\x7b\xa9\xf6\x12\x02\xa9\xe4\x58\xa2\xdd\x2b\x7d\x1f\xf6\xe8\x01\x16\x11\xec\x78\x06\x5c\x17\x6d\x8d\xd2\x9a\x90\x8d\x60\xbb\xfc\x75\x41\xc6\x1e\xbb\xdd\x72\xaa\x57\xa7\x28\x90\x1d\x32\x50\xad\x65\x23\xb8\x5e\x25\x30\x86\xd9\xa1\x44\xe9\x9e\x68\x34\xaa\x6a\xe9\x12\x1b\xc1\x66\x71\x73\x97\x2c\xae\x61\x0c\xf3\x63\x2e\x8d\x39\x19\x80\x8d\x60\xbd\x7d\xbf\xd8\xc0\x18\xd6\x6e\x40\x7a\x86\x54\xed\x09\x47\x5f\x2a\xd0\xaa\xb5\x48\x42\x93\xbc\x7e\xf8\x67\xc4\xbc\x99\x2e\xcc\x14\x3a\x7f\x2c\x1e\x79\x6a\xe9\x41\x70\x19\x46\xcc\xdb\xb4\x72\x0a\x50\x73\x21\x23\xf6\xcc\x9c\xab\x88\xb6\x6a\x3b\xfa\xf1\x75\xab\xdd\xb8\xb8\x93\x46\x2b\xab\x52\x55\xf5\x3a\x33\x96\xb7\x32\x05\x21\x85\x0d\x42\xf8\xca\xbc\xa3\x1f\xe3\x9b\x8a\x17\x26\x08\x0f\xf7\x7f\xe3\x3a\xf8\xa5\xcf\x1c\x81\xdf\xbf\xf3\xa3\x73\x94\xe0\x22\x8c\xc0\xff\x95\x3f\x8a\xba\xad\xdd\x11\xec\x30\x57\x1a\x7b\xff\x51\xb9\x83\x27\xfc\xf0\xbb\x80\x89\xa3\xe6\xe0\x06\xba\x11\xf8\xc3\x5b\x9f\xb0\xd3\x86\x5e\xa8\x69\x87\x82\xac\xea\x76\xb7\xa2\x8d\x91\x2b\x5d\x3b\x9b\x1e\x7b\x1a\x39\x0f\xed\x10\x6c\xda\x90\xaf\xdd\x20\x87\xa4\x98\x93\x80\xf4\x0b\xd2\x3a\x83\xd1\xd9\x10\x46\x64\x18\x03\x9f\xbf\x74\x7a\x39\x8d\x32\xb2\xe5\xf4\xca\x9d\x7c\xbe\xf8\xc2\x3c\xb3\x17\x36\x2d\x8f\x54\xbe\x32\x8f\x5c\x0b\xfe\xc0\x75\xca\x3c\xaf\x67\xb2\x9d\xdf\x06\x94\x20\x1a\x9a\x14\x0e\xc1\x8e\xd0\x49\x24\x0d\xde\x37\xa1\x19\xe6\xbc\xad\x2c\x85\xe5\xb5\x8d\x6f\xdc\x94\x05\xca\xc4\x89\xcd\x50\xeb\x08\xfc\x3b\x69\xda\x86\xc6\x11\xb3\x03\xa3\x3f\xa4\x1f\x1d\x3e\x84\xcc\xf3\x94\x89\x17\x8f\xc2\x06\x97\x21\xf3\x9e\x0f\x1a\xbc\xa0\xd8\x7b\x24\xfa\xbe\x9d\x9c\x14\x93\x09\x6c\x30\x6b\x65\xc6\xa5\xad\x9e\xa0\xe1\x9a\xbe\xe8\xdc\xb2\x31\xaa\x7a\xe8\xb6\x3d\xe5\x12\xd2\x5d\x02\xa3\x60\x8f\xae\x13\x9d\x1d\xfa\x26\x69\x4d\x7b\x9a\xd2\x75\x6b\x09\x84\xfb\xee\xd4\xf8\x37\x5a\x6a\x8d\x56\xbb\x0a\xeb\x98\x79\x22\x87\x7f\x47\xf4\x0f\xb5\xa6\x16\x48\xb4\x71\xd2\x54\xc2\xbe\x57\xc6\xde\x2a\x6d\x1d\xf1\xf0\xad\x3b\xff\xcb\x15\x48\xe1\xba\x71\xa2\x55\x7e\x2e\x56\xb7\x44\xa6\xf0\xd7\x07\xa7\x11\x6a\xfd\xad\x3c\x3d\xea\x09\xe4\xa6\xab\x6e\x3b\xbf\x9d\x65\x99\x0e\x7a\x3f\xfe\x1c\xf4\xf5\x2a\xf9\x31\x2c\x73\x46\x38\xc3\xbd\x16\xbc\xda\x76\xcd\x38\x05\x3d\x35\x88\xc8\xdd\x85\xab\x23\x01\xca\x12\xcf\x2b\x65\x30\x38\x05\xb9\x38\xd4\xa6\x9a\x05\x31\x52\xf7\x04\x83\x5a\xc7\xc1\x88\xc0\xd6\xf4\x58\xe9\xf0\x2d\x9d\x50\xa2\x21\x34\x1e\x28\x38\x0b\xbc\x5e\x61\xbf\x5d\xff\x90\x34\xe7\xe7\xd5\x79\xcf\x80\x15\xfd\xfa\xc8\xa1\xff\xf2\x3d\xa1\xd0\x81\x2c\x1c\x11\xca\x77\x08\x38\x25\xe3\x9d\x5d\xa5\x68\xaa\xb9\x7f\x12\x2f\xe6\xeb\xd5\x6a\xd8\xc6\x2e\xfc\x55\x96\x7d\xd4\xc0\xf2\x9c\x26\x29\x44\xff\xa9\x1b\xaf\x25\x70\x5b\xfd\x45\x2b\x4f\x92\xbc\x18\xae\xc3\x54\xff\x0f\xd3\xc5\xb3\x4c\x1f\xfa\x4f\xeb\x61\x30\x1e\x25\xe9\x9c\xe7\x96\x46\x6f\xbd\x43\xf3\xff\x3f\xee\xeb\x79\xcd\x4b\x42\x77\xe4\x66\xb9\x45\x1d\x1c\xbd\x86\x5a\x77\xa7\x35\xbf\xc7\x20\x2d\xb9\x84\xc0\xcd\x6f\x18\x32\xe6\x15\x0a\xa8\xf0\xde\x25\x67\x5e\x76\xb5\x90\x99\x9d\x1a\x43\x11\x52\x54\x11\x50\xcd\x61\x67\xb6\x17\x3e\x7e\x69\x64\x6a\x4d\xc7\xe0\xdd\x98\x62\x99\xf7\x1c\x10\xae\xc1\x8a\x7e\x2b\x0d\x4b\xb8\x87\x7c\x37\x76\xb1\xd3\x63\xea\x13\x95\x7e\xaa\xb7\x2f\x9d\xdc\xe3\xbc\x1b\x1f\x04\xfb\xc1\x76\x3e\x9f\x89\x97\x6b\xf8\xbf\x01\x00\x00\xff\xff\x54\x07\xa6\x63\xf4\x0c\x00\x00") + +func testImagesAgnhostConnectConnectGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostConnectConnectGo, + "test/images/agnhost/connect/connect.go", + ) +} + +func testImagesAgnhostConnectConnectGo() (*asset, error) { + bytes, err := testImagesAgnhostConnectConnectGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/connect/connect.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostCrdConversionWebhookConfigGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x54\x5d\x6f\xdb\x36\x14\x7d\x36\x7f\xc5\x99\x1f\x06\x3b\x70\xa5\x2c\xc0\x80\xce\x43\x1f\x3c\x27\xd9\x84\x04\xf6\x10\xb9\xed\x8a\x61\x0f\x34\x75\x25\x11\xa6\x49\x8d\xbc\x8a\x2a\x14\xf9\xef\x03\x25\x27\x4e\xb1\x3e\x6c\x8f\xf2\x39\x3c\x1f\xd7\x97\x4c\x2f\xc4\xda\x35\xbd\xd7\x55\xcd\xb8\xba\xfc\xe1\x2d\x76\x35\xe1\xae\xdd\x93\xb7\xc4\x14\xb0\x6a\xb9\x76\x3e\x24\x42\xdc\x6b\x45\x36\x50\x81\xd6\x16\xe4\xc1\x35\x61\xd5\x48\x55\x13\x4e\xc8\x02\x1f\xc8\x07\xed\x2c\xae\x92\x4b\xcc\x22\x61\x7a\x82\xa6\xf3\x9f\x45\xef\x5a\x1c\x65\x0f\xeb\x18\x6d\x20\x70\xad\x03\x4a\x6d\x08\xf4\x59\x51\xc3\xd0\x16\xca\x1d\x1b\xa3\xa5\x55\x84\x4e\x73\x3d\x98\x9c\x24\x12\xf1\xe9\x24\xe0\xf6\x2c\xb5\x85\x84\x72\x4d\x0f\x57\xbe\x66\x41\xb2\x10\x00\x50\x33\x37\xcb\x34\xed\xba\x2e\x91\x43\xca\xc4\xf9\x2a\x35\x23\x2b\xa4\xf7\xd9\xfa\x66\x93\xdf\xbc\xb9\x4a\x2e\x85\x78\x6f\x0d\x85\x00\x4f\x7f\xb7\xda\x53\x81\x7d\x0f\xd9\x34\x46\x2b\xb9\x37\x04\x23\x3b\x38\x0f\x59\x79\xa2\x02\xec\x62\xce\xce\x6b\xd6\xb6\x5a\x20\xb8\x92\x3b\xe9\x49\x14\x3a\xb0\xd7\xfb\x96\xbf\x1a\xd0\x73\x2a\x1d\xf0\x9a\xe0\x2c\xa4\xc5\x74\x95\x23\xcb\xa7\xf8\x65\x95\x67\xf9\x42\x7c\xcc\x76\xbf\x6d\xdf\xef\xf0\x71\xf5\xf0\xb0\xda\xec\xb2\x9b\x1c\xdb\x07\xac\xb7\x9b\xeb\x6c\x97\x6d\x37\x39\xb6\xb7\x58\x6d\x3e\xe1\x2e\xdb\x5c\x2f\x40\x9a\x6b\xf2\xa0\xcf\x8d\x8f\xd9\x9d\x87\x8e\xa3\xa3\x22\x11\x39\xd1\x57\xe6\xa5\x1b\xc3\x84\x86\x94\x2e\xb5\x82\x91\xb6\x6a\x65\x45\xa8\xdc\x23\x79\xab\x6d\x85\x86\xfc\x51\x87\xf8\xe7\x05\x48\x5b\x08\xa3\x8f\x9a\x25\x0f\xdf\xff\xaa\x93\x88\x8b\x54\x88\x46\xaa\x43\x14\x51\xbe\x50\xce\x3e\x76\xb4\xaf\x9d\x3b\x08\xa1\x8f\x8d\xf3\x8c\x99\x98\x4c\x95\xef\x1b\x76\x29\x9b\x30\x15\x62\x32\x3d\xbc\x0d\x89\x76\xa9\x32\x9a\x2c\xbf\xa9\x5c\x7a\x78\xd9\xb3\xe9\xb7\x60\x4f\x81\x5f\x01\x07\xe3\xaa\xf4\xf1\x6a\x2a\xe6\x42\xa4\x29\x7e\x25\x8e\x3b\x30\xb0\x03\xf1\xb8\x30\xda\xbe\x51\xa6\x0d\x4c\x1e\xca\xd9\x52\x57\x89\x28\x5b\xab\x50\x11\xaf\x07\xe6\x6c\x8e\x8b\xb3\x6d\xb2\x7e\x39\xfe\x45\x4c\xc6\x13\x0b\x90\xf7\x58\xbe\x43\xb4\x4f\x32\xbb\x1e\xf5\xd6\x03\x38\x9b\x8b\x89\x2e\x07\xc6\x77\xef\x60\xb5\x89\xe7\x26\x31\x59\x72\x2b\x59\x9a\x19\x79\x3f\x17\x93\x27\x31\x79\x09\xf6\xa2\xf7\xca\x76\x43\xdd\xad\x7b\x96\x1c\x6d\xff\xb3\xb0\x27\x6e\xbd\x3d\x17\x17\x4f\x62\xec\x38\xea\xec\xee\xf3\x93\x22\xd6\xa7\x3e\xe7\x19\x7d\xb3\xfa\x1c\x17\x6c\x42\x32\xb2\xa3\x6d\x58\x93\x3f\xc7\x8e\xd8\xbd\x93\xc5\x1f\x3f\x5e\xfe\x74\x47\xfd\xef\x52\xfb\x93\x41\x12\x79\xb7\xda\xd0\xe2\x79\xd8\x77\xd4\xc7\xef\xff\xdb\xe5\xfb\xb3\x7f\x64\x46\xd9\xb8\xa8\x92\x29\x2c\xf1\xe7\x5f\x03\x7a\xfe\xed\xcb\x90\xef\x69\x21\x26\x93\x34\xc5\x6e\x7b\xbd\x5d\xc6\x07\x25\xe0\xd8\x72\x2b\x4d\x0c\x0c\x59\xc6\x15\xe8\x68\xbc\xb6\xf1\xc2\x75\xb5\x64\x28\xf2\x3c\x6c\xb2\x6c\x74\x20\xff\x48\x1e\xa1\x76\xad\x29\xa2\x40\x32\x0a\x8e\x73\x89\xef\xde\x12\x18\xda\x3f\x8c\x0f\xc3\xca\x16\x1f\xc8\xeb\xb2\x1f\x19\xc3\x90\x62\x8b\x27\xf1\x4f\x00\x00\x00\xff\xff\xbd\x43\x72\xb5\x46\x05\x00\x00") + +func testImagesAgnhostCrdConversionWebhookConfigGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostCrdConversionWebhookConfigGo, + "test/images/agnhost/crd-conversion-webhook/config.go", + ) +} + +func testImagesAgnhostCrdConversionWebhookConfigGo() (*asset, error) { + bytes, err := testImagesAgnhostCrdConversionWebhookConfigGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/crd-conversion-webhook/config.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostCrdConversionWebhookConverterConverter_testGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xc4\x56\x6d\x6f\xdb\x46\x12\xfe\xac\xfd\x15\x53\x02\xbe\x52\x29\x4d\xca\xc1\x1d\x5a\xb0\xf0\x01\x8a\xe3\x5c\x85\xa6\x76\x20\x2a\x57\x04\x69\xd0\xae\x96\x23\x69\x13\x72\x97\xb7\x3b\x94\xac\x0b\xfc\xdf\x0f\xb3\xa4\xde\x1c\x27\x68\x80\x02\xe7\x17\x4a\x9c\x9d\x7d\x66\xe6\x99\xd9\x99\xcd\x9e\x88\x2b\xdb\x6c\x9d\x5e\xae\x08\x9e\x8e\x2e\x7e\x80\xd9\x0a\xe1\xe7\x76\x8e\xce\x20\xa1\x87\x71\x4b\x2b\xeb\x7c\x2a\xc4\x4b\xad\xd0\x78\x2c\xa1\x35\x25\x3a\xa0\x15\xc2\xb8\x91\x6a\x85\xd0\xaf\x24\xf0\x6f\x74\x5e\x5b\x03\x4f\xd3\x11\xc4\xac\x10\xf5\x4b\xd1\xf0\x47\xb1\xb5\x2d\xd4\x72\x0b\xc6\x12\xb4\x1e\x81\x56\xda\xc3\x42\x57\x08\x78\xa7\xb0\x21\xd0\x06\x94\xad\x9b\x4a\x4b\xa3\x10\x36\x9a\x56\xc1\x48\x0f\x91\x8a\x37\x3d\x80\x9d\x93\xd4\x06\x24\x28\xdb\x6c\xc1\x2e\x8e\xb5\x40\x92\x10\x00\x00\x2b\xa2\x26\xcf\xb2\xcd\x66\x93\xca\xe0\x65\x6a\xdd\x32\xab\x3a\x2d\x9f\xbd\x9c\x5c\x5d\xdf\x14\xd7\xe7\x4f\xd3\x91\x10\xaf\x4d\x85\xde\x83\xc3\xff\xb4\xda\x61\x09\xf3\x2d\xc8\xa6\xa9\xb4\x92\xf3\x0a\xa1\x92\x1b\xb0\x0e\xe4\xd2\x21\x96\x40\x96\xfd\xdc\x38\x4d\xda\x2c\x13\xf0\x76\x41\x1b\xe9\x50\x94\xda\x93\xd3\xf3\x96\x4e\x08\xda\x79\xa5\x3d\x1c\x2b\x58\x03\xd2\x40\x34\x2e\x60\x52\x44\xf0\x6c\x5c\x4c\x8a\x44\xfc\x3a\x99\xfd\x74\xfb\x7a\x06\xbf\x8e\xa7\xd3\xf1\xcd\x6c\x72\x5d\xc0\xed\x14\xae\x6e\x6f\x9e\x4f\x66\x93\xdb\x9b\x02\x6e\x5f\xc0\xf8\xe6\x0d\xfc\x3c\xb9\x79\x9e\x00\x6a\x5a\xa1\x03\xbc\x6b\x1c\xfb\x6e\x1d\x68\xa6\x0e\xcb\x54\x14\x88\x27\xc6\x17\xb6\x73\xc6\x37\xa8\xf4\x42\x2b\xa8\xa4\x59\xb6\x72\x89\xb0\xb4\x6b\x74\x46\x9b\x25\x34\xe8\x6a\xed\x39\x79\x1e\xa4\x29\x45\xa5\x6b\x4d\x92\xc2\xfb\x27\xe1\xa4\xe2\x49\x26\x44\x23\xd5\x07\x06\x51\xd6\xac\xd1\x11\x3a\x21\x74\xdd\x58\x47\x10\x8b\x41\x34\xdf\x12\xfa\x48\x0c\xa2\x45\x4d\xfc\x61\x90\x32\xce\xc9\xf1\xf7\xf0\x20\xf4\x41\x81\xd9\x31\xcb\xb0\x85\x45\xda\x2c\x23\x21\x06\xb2\xd1\x78\x47\x68\x82\x67\xeb\x0b\x88\x3e\xfc\xe0\x53\x6d\xb3\x13\xf9\xb9\x6c\xb4\x47\xb7\x46\x97\x35\x1f\x96\xbc\xe6\x4f\x15\xb2\xf5\x05\xe3\x1e\xf6\xd6\x52\xad\xb4\x41\xb7\x3d\x6c\xa8\x91\xe4\x57\xe8\x65\xad\xf1\xe4\x5a\x45\xad\xc3\xf2\x4b\x9b\x5c\x6b\x48\xd7\xf8\x27\x54\x32\x8f\x4e\xcb\x4a\xff\x17\x5d\xf6\xde\x5b\x13\x89\xa1\x10\x8b\xd6\x28\x98\xa1\xa7\xab\x1d\xcd\x6f\xc6\xbf\xbc\x8c\x09\x9e\xf4\x2c\xa5\xb3\x21\x7c\x14\x03\x25\x3d\x7a\xc8\x2f\xe1\xed\xbb\xce\x2f\x16\x32\x7d\xbb\x33\xc9\x3f\x1d\xc7\x62\x30\x50\xd6\x10\x1a\x9a\x6d\x1b\x3c\x91\xe3\x5d\x83\x8a\xb0\xfc\xfb\x68\x74\xed\xdc\x5e\x7e\xcf\x58\xfc\x7f\x04\x98\x07\xc4\xe8\x84\xe7\xb4\x8f\x70\x7d\x31\x47\x92\x17\x51\xc2\x5b\x8e\x6c\xe5\xfd\x96\x70\xb6\xb8\xb8\xba\x38\x83\xda\xa9\xe9\x1c\x22\x5e\x82\x46\x3a\x8f\x80\xce\x59\x17\xd4\xee\x93\x47\x3d\xf9\x5a\x37\x4e\x7c\xd8\xca\xba\xfa\x12\xf8\x17\xc2\xfc\xff\x47\xf8\x55\xc1\xdd\x8b\x81\x97\x75\x53\xe1\xed\xfc\xfd\x0c\xeb\xa6\x92\x84\x5c\x33\x7f\x7c\xd0\xa6\xcc\xa1\x2b\x31\x36\x30\xc5\xb5\xc6\x8d\x38\xf6\xe0\xcc\x0b\x6e\x90\xe8\x29\x17\x00\xad\x2e\x73\x18\x8d\x46\xa3\xf3\xd3\x87\x00\x28\xd1\x73\x17\x1d\xbf\x9a\xec\xf7\x7a\xe2\x4e\x9a\xe2\x5d\x30\x9e\x2a\x5b\x67\xeb\xa7\x02\xc0\xce\xdf\xa3\x22\x9f\x87\x8e\x7d\x0e\xc7\xe6\x1e\xdb\x72\x11\xf4\x00\x7a\x6f\x9d\x35\x33\x39\xef\x65\x7c\x2c\x4b\x49\x32\xef\xdf\x01\x8c\xac\x31\x87\x7a\x7b\x6e\x70\x73\xae\x9c\x35\xe7\x9d\xb9\x5e\x81\xbb\xe1\x41\x99\xd7\x0b\x96\x40\xf4\x04\xfa\xdf\xec\x1f\xd1\x7e\x5d\xd7\x72\xd9\xa1\xc9\x0d\x7a\x5b\x63\x87\x18\xc4\xbd\xd2\xca\x7a\x7a\x65\x1d\xe5\x10\x55\x56\xc9\x8a\xdf\xf3\xef\x47\xdf\x8f\x22\xf1\x87\x18\x70\x13\xfe\x3d\x01\x52\xcc\xb7\x93\x86\x1b\x67\x38\xb2\x9c\x6a\x4a\xa7\xad\x89\x49\xa5\x07\x06\xbe\x8b\x20\xfa\x8e\x54\x7a\x94\xd9\x04\xb8\x19\x7c\x7a\xf4\x07\x87\xa4\x32\xf8\xa2\xa6\xb4\x68\x9c\x36\xb4\x88\x3f\xc9\x36\x7b\x70\x64\x65\xc8\xbb\xb3\x0c\x5e\x68\xe7\x09\xc8\x6d\x81\x6b\x32\x01\x4d\xe0\x57\xb6\xad\x4a\x58\x48\x5d\x81\xf4\xa1\xfd\x33\xbf\x3c\xca\x48\xd6\x15\x6f\x74\xe8\x1b\xcb\x13\x26\xbf\x84\x5d\x2b\x4f\x6f\x70\x33\x45\x65\x5d\x89\x2e\x1e\x76\x5a\xa1\x6a\x12\xae\xf1\x9d\x66\xa7\x15\xe4\x71\xf4\xea\xb6\x98\x45\x09\x44\x59\x3f\x49\xa2\xa4\x6f\x3c\xbe\x53\x93\x0c\xb5\x8f\x64\x18\x40\xf5\x22\xc0\x7d\x73\x09\x46\x57\x1d\x09\x03\x4a\x5f\x48\x92\x55\x8c\xce\x05\x9d\xfb\x23\xeb\xe9\x4f\x01\x26\x1d\x97\x65\x1c\x5d\x75\x9c\x9e\x33\xa9\x51\x60\xe4\x88\xe5\xb0\xb5\xe0\x69\x72\xdd\xd5\x5e\xdf\x78\xe3\x5d\xb4\x09\xf4\x98\xc3\xfe\xe4\xf1\x6a\x77\x60\x38\xbc\x07\x13\x2b\x7d\x78\xa8\x3e\x06\xb7\xbc\x5a\x61\x1d\x88\xeb\x9b\x3f\x87\x5a\x04\x61\xbc\x0b\xb0\xc2\x50\x13\xa7\x6d\x63\x08\xff\x84\x51\x1f\xf0\xdc\x96\xdb\x00\xd1\x7b\x96\x3e\xb3\xe5\x36\x7d\xc6\x93\xb7\x03\x61\x94\x6f\xc2\x24\x66\x37\xf8\xd6\xe4\x63\xde\x94\xc0\xdb\x77\x2c\x7e\x04\xbe\xaf\xa8\x3d\x9b\x8b\x38\xda\x69\xf0\xdd\x27\x94\x83\x35\xf0\xed\x99\xff\x36\x81\x79\x4b\x5c\x2a\x2c\xc4\x32\xdc\xd8\xb8\x4f\x74\x94\x9e\xe2\xee\x52\x1a\xcc\x77\x29\xec\xf2\x33\x70\x48\xad\x33\x5d\xbe\xf8\xc9\x0d\xab\xd8\x0f\x42\x0e\x8f\x4b\x92\xe9\xe1\xc1\x77\x58\x89\x83\xf8\x39\x2e\x64\x5b\xd1\x2f\x48\xf2\x85\x54\x64\xdd\x36\x81\x8e\xdb\xdd\xe7\x8e\xcd\xdf\x13\xfe\xeb\x6b\xf0\xd4\x48\xfa\x1c\x95\x2d\x31\x7e\x94\xc7\x84\x2b\x2c\x81\xbf\x9d\x24\x7a\xf8\xe3\x67\xcb\x6f\x11\x47\x4a\x1a\xbe\xe4\x96\x01\x35\x9c\x9a\x1c\x7e\x33\x70\xb6\xfe\xcd\xc0\x35\x37\xfa\x1c\xce\xd6\x51\x72\x9a\xb7\xe0\xdb\xa1\x6e\xf5\x02\x4e\x2c\xa6\xd3\x9d\xf2\x14\x7d\x5b\x51\x5a\x90\xa4\xd6\xb3\x0b\xeb\x8b\xfe\xa5\x68\x95\xe2\xcb\xe0\x27\xfe\xb8\x1e\x2b\x5c\x04\xba\x6c\xf5\x2e\x3c\x6e\xe3\xe0\xc6\xee\x72\x57\xf6\xcd\xe5\xf8\xd6\x93\xbe\x3e\x7a\xf9\x78\xff\xe7\x79\xfe\x4c\x60\x57\x47\xb6\x78\x2c\xbc\x1d\xbd\x4b\xa7\x72\xf3\x20\x01\x61\xf9\x0b\xfc\xc7\x0f\x69\xc4\x04\x24\xfb\x12\x3d\x3a\x85\x0e\x1c\x04\xe0\xf4\x5f\x48\x87\xc9\x15\xb3\x1d\xb6\x22\xf7\x36\x42\xfe\x8e\x0e\xc5\x25\x9c\xad\x13\x90\x8a\x5a\x59\x5d\x76\x9c\xb2\xc1\xc7\x3d\xd8\xcf\x85\x87\x56\xbb\x88\xdf\x46\x61\xed\xdd\x5f\x6b\x34\x8c\xa0\xcf\xd8\xe3\xeb\xfa\x5f\x60\xef\x7e\xc8\x77\x8b\x7b\xf1\xbf\x00\x00\x00\xff\xff\xc6\xc7\x36\xae\x4e\x0e\x00\x00") + +func testImagesAgnhostCrdConversionWebhookConverterConverter_testGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostCrdConversionWebhookConverterConverter_testGo, + "test/images/agnhost/crd-conversion-webhook/converter/converter_test.go", + ) +} + +func testImagesAgnhostCrdConversionWebhookConverterConverter_testGo() (*asset, error) { + bytes, err := testImagesAgnhostCrdConversionWebhookConverterConverter_testGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/crd-conversion-webhook/converter/converter_test.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostCrdConversionWebhookConverterExample_converterGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xbc\x54\x51\x6f\xdb\x36\x17\x7d\x16\x7f\xc5\x2d\x81\x00\x72\xe1\x4f\x4a\xfc\x54\xf8\x83\x1f\xbc\x24\x5b\x8d\x76\x76\x11\xa5\x0d\x8a\x22\x40\x69\xe9\x4a\xe2\x2c\x91\x2c\x79\x65\xc7\x48\xf3\xdf\x07\xca\x52\xa2\x66\x6b\x92\x01\xc3\x5e\x2c\x8b\x3c\xe7\x9e\x73\x2f\x0f\x15\xbf\x66\xa7\xda\xec\xad\x2c\x4a\x82\xc9\xf1\xc9\x1b\xb8\x2c\x11\xde\x35\x6b\xb4\x0a\x09\x1d\xcc\x1b\x2a\xb5\x75\x11\x63\xef\x65\x8a\xca\x61\x06\x8d\xca\xd0\x02\x95\x08\x73\x23\xd2\x12\xa1\xdb\x19\xc3\x27\xb4\x4e\x6a\x05\x93\xe8\x18\x42\x0f\xe0\xdd\x16\x1f\xfd\x9f\xed\x75\x03\xb5\xd8\x83\xd2\x04\x8d\x43\xa0\x52\x3a\xc8\x65\x85\x80\x37\x29\x1a\x02\xa9\x20\xd5\xb5\xa9\xa4\x50\x29\xc2\x4e\x52\xd9\x8a\x74\x25\x22\xf6\xb9\x2b\xa0\xd7\x24\xa4\x02\x01\xa9\x36\x7b\xd0\xf9\x10\x05\x82\x18\x03\x00\x28\x89\xcc\x34\x8e\x77\xbb\x5d\x24\x5a\x97\x91\xb6\x45\x5c\x1d\x50\x2e\x7e\xbf\x38\x3d\x5f\x26\xe7\xff\x9b\x44\xc7\x8c\x7d\x54\x15\x3a\x07\x16\xbf\x35\xd2\x62\x06\xeb\x3d\x08\x63\x2a\x99\x8a\x75\x85\x50\x89\x1d\x68\x0b\xa2\xb0\x88\x19\x90\xf6\x3e\x77\x56\x92\x54\xc5\x18\x9c\xce\x69\x27\x2c\xb2\x4c\x3a\xb2\x72\xdd\xd0\x0f\x03\xea\x5d\x49\x07\x43\x80\x56\x20\x14\xf0\x79\x02\x8b\x84\xc3\x2f\xf3\x64\x91\x8c\xd9\xd5\xe2\xf2\xed\xea\xe3\x25\x5c\xcd\x2f\x2e\xe6\xcb\xcb\xc5\x79\x02\xab\x0b\x38\x5d\x2d\xcf\x16\x97\x8b\xd5\x32\x81\xd5\xaf\x30\x5f\x7e\x86\x77\x8b\xe5\xd9\x18\x50\x52\x89\x16\xf0\xc6\x58\xef\x5d\x5b\x90\x7e\x74\x98\x45\x2c\x41\xfc\x41\x3c\xd7\x07\x33\xce\x60\x2a\x73\x99\x42\x25\x54\xd1\x88\x02\xa1\xd0\x5b\xb4\x4a\xaa\x02\x0c\xda\x5a\x3a\x7f\x78\x0e\x84\xca\x58\x25\x6b\x49\x82\xda\xf7\xbf\xb4\x13\xb1\xd7\x31\x63\x46\xa4\x1b\x5f\x24\xd5\x6a\x8b\x96\xd0\x32\x26\x6b\xa3\x2d\x41\xc8\x02\x9e\xd7\xc4\x59\xc0\x7d\xcf\xaa\x70\x9c\xb1\x80\x6f\xde\xb8\x48\xea\x78\x53\xe9\x22\xde\x4e\xfc\x52\x8d\x24\xb6\x27\xd0\xef\x08\x23\x6b\x91\x96\x52\xa1\xdd\xc7\x66\x53\xf8\x05\x17\x7b\x50\xbc\x3d\xe1\x0f\x15\x9e\xc4\xc5\x8d\x72\x64\x9b\x94\x1a\x8b\x19\x67\x23\xc6\xf2\x46\xa5\xbd\xcb\xf3\x1b\x51\x9b\x0a\x4f\x2f\xce\xc2\xd5\xfa\x0f\x4c\x09\x5e\x0f\xf1\xd1\xc7\xc1\xcb\x18\x48\xf7\x89\x3e\xf4\x31\x82\xf0\x29\xf8\xa1\x9d\x28\x21\x41\x8d\x1b\xc1\x2d\x0b\x7c\xaf\xd1\xa7\x70\x32\x8a\x16\x2a\xd7\x21\xef\x5c\xf8\x89\xa7\x36\xe3\x23\xc6\x82\x7e\x7c\x59\xe7\x67\x3a\x83\xc3\xbf\xe8\x0c\xd1\xf8\xcb\x19\x8e\x58\x90\x5b\x5d\xf7\x5e\x1e\x10\xbf\x21\xcd\x3f\x2c\xba\xf5\xd0\x57\x93\xf9\xc0\xf4\x6c\x06\x43\xde\x2d\x0b\x02\x8b\xd4\x58\x05\x4a\x56\x63\x70\xad\xcf\x73\x6b\xb5\xbd\x92\x54\xfe\x8e\xce\x89\x02\x7b\x93\x2d\xc5\xd3\x41\x40\xff\xea\xc3\x4f\x0e\xab\x1c\x5c\xa9\x9b\x2a\x6b\xef\x72\x2a\xaa\xaa\x4d\xc7\x0e\xd7\xa5\xd6\x9b\x29\x1c\x39\x3e\x98\xdd\x88\x05\x77\x8c\x05\x6e\x27\x29\x2d\x7f\xe2\xdc\x7b\x4b\x85\x43\xe0\x8e\xfc\xa5\x8b\xf0\x70\x4e\x51\xaa\x6b\x7f\xf6\x53\x16\xf4\x05\x1e\xda\xf3\xfd\xfc\x9c\x34\x69\x49\x41\xa9\x1d\x7d\xd0\x96\xc6\xa0\x37\x7e\x72\x8f\xc6\x1d\x1d\x1e\x5f\x78\x8f\xe3\xd7\x9e\x25\x73\x0f\xf7\x02\x41\x90\x61\x85\x84\xe1\xdf\x13\xc7\xf0\xc0\x1c\xb5\x70\x23\x2c\x39\xaf\xd4\x45\x3f\x4a\x4c\x25\x29\xec\x51\x51\xd8\x45\x69\x0c\x7c\xda\x51\x64\x0e\x15\xaa\xb0\x65\x8e\xe0\xd5\x0c\x26\x9d\xf4\x8b\x8e\x4b\xaa\xad\xa8\x64\x06\xbd\x02\x6c\x45\xd5\x20\x7c\x3d\xda\x7e\xe5\xe3\xfb\xd5\x83\xd2\x5d\xfb\xfb\xd4\x0c\xf8\x35\xcc\xa0\x75\xf2\xe5\xf8\xfa\x49\xb4\x69\xa7\x75\x8f\x3e\x69\xd1\x5e\x20\xc3\x5c\x34\x15\xb5\xe3\x7f\x49\x03\x8d\xc2\x1b\x83\xa9\xff\x30\x0e\xa2\xd7\x3f\x8f\xbe\x3d\x0a\x93\xd7\x78\xee\xd8\xff\x61\x56\x4e\x1e\xb2\x32\x86\x52\xb8\xb7\xda\xd1\x73\x61\x39\x04\xc5\xb4\xd1\x2a\x85\x6b\x27\xff\x04\xc5\x0c\xb3\xd5\x4b\x7c\xff\x7e\x4f\xbd\xed\x93\xf0\xaa\xdf\xec\x22\xe0\xb5\x60\x06\x9c\x0f\x0e\xb0\x83\x0d\x88\xad\x91\xc7\xb0\xe7\xb3\x0e\x33\xc8\x6b\x8a\x12\x63\xa5\xa2\x3c\xe4\x47\x6e\xda\x5e\xde\xc3\x24\xcc\x7d\x6e\x5e\x72\x07\xf8\xcb\xa0\xe6\xfe\xaa\xfc\x47\x59\x19\x48\xfc\x4b\x0a\x83\x8f\x6a\xfb\x71\xeb\xeb\x3e\xea\xb9\xd7\x48\x9a\x34\x45\xcc\xc2\x11\xbb\x63\x7f\x06\x00\x00\xff\xff\xe4\x22\x8f\xbf\x70\x09\x00\x00") + +func testImagesAgnhostCrdConversionWebhookConverterExample_converterGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostCrdConversionWebhookConverterExample_converterGo, + "test/images/agnhost/crd-conversion-webhook/converter/example_converter.go", + ) +} + +func testImagesAgnhostCrdConversionWebhookConverterExample_converterGo() (*asset, error) { + bytes, err := testImagesAgnhostCrdConversionWebhookConverterExample_converterGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/crd-conversion-webhook/converter/example_converter.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostCrdConversionWebhookConverterFrameworkGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x59\x5f\x6f\xdb\x46\x12\x7f\x26\x3f\xc5\x94\x40\x03\xd2\x60\xc9\xc4\x4f\x85\x0a\x3d\xa8\xb6\xd3\xea\xda\xd8\x85\x65\x27\x08\x02\xe3\xba\x22\x47\xd4\x46\xd4\x92\xb7\xbb\x94\xa2\x1a\xfe\xee\x87\xd9\x5d\x52\x94\x25\x25\x4e\x1a\x14\x77\xd7\x0b\x10\x8b\xdc\x9d\x99\x9d\xbf\xbf\x9d\x5d\xa6\x27\xfe\x59\x55\x6f\x24\x2f\xe6\x1a\x4e\x9f\xbf\xf8\x1e\x6e\xe6\x08\xbf\x34\x53\x94\x02\x35\x2a\x18\x35\x7a\x5e\x49\x95\xf8\xfe\xaf\x3c\x43\xa1\x30\x87\x46\xe4\x28\x41\xcf\x11\x46\x35\xcb\xe6\x08\x6e\x26\x86\xd7\x28\x15\xaf\x04\x9c\x26\xcf\x21\x24\x82\xc0\x4d\x05\xd1\x0f\xfe\xa6\x6a\x60\xc9\x36\x20\x2a\x0d\x8d\x42\xd0\x73\xae\x60\xc6\x4b\x04\xfc\x90\x61\xad\x81\x0b\xc8\xaa\x65\x5d\x72\x26\x32\x84\x35\xd7\x73\xb3\x88\x13\x91\xf8\x6f\x9d\x80\x6a\xaa\x19\x17\xc0\x20\xab\xea\x0d\x54\xb3\x3e\x15\x30\xed\xfb\x00\x00\x73\xad\xeb\x41\x9a\xae\xd7\xeb\x84\x19\x2d\x93\x4a\x16\x69\x69\xa9\x54\xfa\xeb\xf8\xec\xe2\x72\x72\xf1\xdd\x69\xf2\xdc\xf7\x6f\x45\x89\x4a\x81\xc4\x7f\x35\x5c\x62\x0e\xd3\x0d\xb0\xba\x2e\x79\xc6\xa6\x25\x42\xc9\xd6\x50\x49\x60\x85\x44\xcc\x41\x57\xa4\xe7\x5a\x72\xcd\x45\x11\x83\xaa\x66\x7a\xcd\x24\xfa\x39\x57\x5a\xf2\x69\xa3\x77\x1c\xd4\x6a\xc5\x15\xf4\x09\x2a\x01\x4c\x40\x30\x9a\xc0\x78\x12\xc0\x8f\xa3\xc9\x78\x12\xfb\x6f\xc6\x37\x3f\x5f\xdd\xde\xc0\x9b\xd1\xf5\xf5\xe8\xf2\x66\x7c\x31\x81\xab\x6b\x38\xbb\xba\x3c\x1f\xdf\x8c\xaf\x2e\x27\x70\xf5\x12\x46\x97\x6f\xe1\x97\xf1\xe5\x79\x0c\xc8\xf5\x1c\x25\xe0\x87\x5a\x92\xee\x95\x04\x4e\xae\xc3\x3c\xf1\x27\x88\x3b\x8b\xcf\x2a\xab\x8c\xaa\x31\xe3\x33\x9e\x41\xc9\x44\xd1\xb0\x02\xa1\xa8\x56\x28\x05\x17\x05\xd4\x28\x97\x5c\x51\xf0\x14\x30\x91\xfb\x25\x5f\x72\xcd\xb4\x79\xdf\x33\x27\xf1\x4f\x52\xdf\xaf\x59\xb6\x20\x21\x59\x25\x56\x28\x35\x4a\xdf\xe7\xcb\xba\x92\x1a\x42\xdf\x0b\x66\x4b\x1d\xf8\x5e\xc0\xab\x94\x57\x8d\xe6\x25\xbd\x08\xd4\x29\xc5\x85\x9e\xc9\x19\xa2\x50\x81\xef\x7b\x41\xc1\xf5\xbc\x99\x26\x59\xb5\x4c\x97\x8d\x10\x28\xff\x48\x8b\x8a\x35\xba\x12\x58\x18\x82\xc5\xf7\x2a\xe1\x55\xba\x28\xab\x22\x5d\x9d\xf6\x87\x58\xcd\xf1\x83\x46\x61\x34\xff\x8e\xd5\x5c\xa1\x5c\xa1\x4c\xeb\x45\x41\x73\x6a\x97\x20\x5d\xbd\x08\xfe\x04\xef\x14\x35\x23\x01\x4b\xd4\x6c\xf5\x02\x7a\x72\x96\x2c\x9b\x73\x81\x72\xb3\x65\x26\xa2\xbd\xf5\x8e\xd3\xa5\x8d\x50\x5a\x36\x99\x6e\x24\xe6\x1f\x63\x92\x8d\xd0\x7c\x89\x4f\x20\x49\x15\x4a\xce\x4a\xfe\x07\xca\xf4\xbd\xaa\x44\xe0\x7b\x14\x09\x37\x7b\x5c\x7d\x22\xda\x2e\x13\xf9\x7e\x9a\xb6\x41\x7e\xd9\x88\x8c\x92\x99\x92\xa1\x51\x28\x21\xc7\x19\x17\x98\xc3\xac\x11\x19\x65\x8b\x49\x36\x26\x36\x8e\x81\x3c\x97\x18\x48\xc9\xaa\x1c\xa9\x72\xb6\x55\xcf\x15\x30\x12\xad\x71\x59\x97\x4c\x53\xce\x32\x0d\x19\x13\x30\x35\xc2\x3b\x51\x67\xd7\x3d\x69\x50\xf0\x15\xb6\x62\xdc\xa2\x89\xaf\x37\x35\xee\xe8\x48\x53\xe1\xd5\xf4\x3d\x66\x1a\x4e\xfa\xae\x4d\x6e\x7b\x2f\x31\xb4\x52\x6d\x3a\x46\x10\x7e\x8c\xd8\xc6\x3d\x99\x68\xa6\x1b\x15\xf9\x3e\x2d\x02\xca\xbc\x5d\x48\x59\xc9\x37\x5c\xcf\x5f\xa1\x52\xac\xc0\x70\xa9\x0a\x27\x34\x86\x9a\x49\xb6\x54\x90\x24\x09\x17\x1a\xe5\x8c\x65\x78\xff\x10\xed\x8a\x83\x7b\xdf\x93\xa8\x1b\x29\x76\xc7\xef\x7d\xcf\x73\x32\x07\x30\x5b\xea\x64\x52\x4b\x2e\xf4\x8c\x16\x68\x25\x27\x49\x12\xc5\xbe\xe7\x59\x8e\x01\xec\x4a\x78\xc9\x78\xd9\x48\x8c\x7d\xef\xc1\x7f\xd8\x51\x7a\xd2\x64\x19\x62\x1e\x7e\x86\x2a\xed\x12\x3b\x13\x46\x8e\x52\xed\x0a\x69\x0a\x79\x75\xd6\x45\xec\xb5\xad\x9b\x36\x3c\x36\x79\x08\x6b\x51\x19\x2c\x34\x41\x52\x36\x37\x10\x5c\x95\xc1\x96\xff\xda\x92\x42\xa3\x08\xa8\x88\xc6\xa6\x40\x2f\x27\xba\xec\x23\xe8\x4a\x53\xb0\xda\x2b\xb3\x45\x74\x44\x12\x55\x5d\x11\x7a\x81\xf3\x88\x02\x26\x49\x13\xc2\x2c\xcc\xb7\x1b\xce\x35\x32\x55\x89\x56\xa1\x43\x12\xac\x13\x0f\x18\x19\x3a\x23\x5b\x9d\x4f\x9c\x39\xc9\x9e\x39\x71\xeb\x8f\x7e\xda\x46\x87\x19\xec\xaa\x14\x96\x15\x93\x1d\xde\xe6\x57\xce\x73\xef\xee\x5c\xb1\x26\xd7\x6c\x7d\xd1\x02\x96\xef\x51\xfd\xfc\x33\x26\x07\xc3\x60\x08\x92\x89\x2d\x58\x3b\x25\x92\x56\x04\x85\x36\x93\x44\x76\x34\xfd\xef\x1f\x7c\xcf\xe3\x33\x40\x69\xe8\x32\x99\xdc\x8a\x25\x93\x6a\xce\xca\x7f\x4c\xae\x2e\xc3\x6a\xfa\x9e\xd6\x8f\x7e\x30\x14\xdf\x0c\x41\xf0\xd2\xc8\xf5\x08\xb6\x13\x53\x20\x21\x4a\x19\xd1\x90\x4b\xaf\x67\xc7\xad\x35\x9c\xde\x35\xaa\xa6\xd4\x83\xfd\x3c\xf4\x8e\x54\x45\x30\x63\xbc\xb4\xdb\x74\xd3\xaa\x57\xba\x1c\x83\xf0\xdb\x55\x64\xc3\x8c\xa4\xcd\x00\xbe\x5d\x05\xb1\xab\xd2\x4e\xff\x98\x26\x4d\x39\x79\x9f\xae\x28\xcf\xf3\x1e\xcc\x0f\x39\x87\xfe\x77\xc1\x39\xbb\x8e\x5d\x95\x19\x6f\xd9\xe1\xf0\x59\x26\xe3\xc7\x31\x38\x47\x45\x5d\xc7\xe8\xb7\xb1\x6b\x9f\x22\xeb\x68\xcb\xdd\xd6\xe4\x37\xc3\x83\x35\xb7\xe7\xe1\x8e\xcb\x18\x15\x7d\x91\xb7\xad\x8c\x63\x76\x25\x13\xd4\x5b\x65\xc3\xa7\x58\xb3\x97\xb2\x43\x6a\xb0\x50\xe4\xe1\xe3\x99\x18\x0e\xe5\xf2\xbd\x9d\x1d\x40\x4f\x8d\x87\x88\xe0\xe6\x89\xb6\x9d\x3d\x5a\x66\xb0\x57\x45\x64\x6d\x6b\xff\xf6\xdf\x23\x9c\x3c\x8a\x70\x4f\x06\xb7\xff\x3e\x5c\x3b\x00\x69\x9f\x83\x66\x7f\x1b\x20\xfb\x3f\x86\xfd\x45\x18\xf6\x3f\x0a\x5f\x7f\x0d\x72\xd9\xee\x8f\xce\x39\xe1\xda\x9c\x91\x93\x76\xb1\x37\x92\x6b\x94\x31\x48\x38\x71\xe3\x1f\xab\x6c\x57\xc2\xd3\x2a\xdf\xc0\xbb\xbb\xe9\x46\xa3\x4f\xf1\x96\xc9\x8f\x34\xd2\x2b\x1a\x3e\x83\x9c\x69\x16\xb7\xe5\x66\x4f\x83\xc9\x35\xb2\x7c\x54\x96\xa1\x65\x70\xb5\x36\xec\xd5\x9a\x91\x3c\x34\xbc\x36\x86\x0f\xbe\x4f\x81\xd0\x28\xf4\x0d\x75\xfb\x84\x04\xc9\xcf\xc8\x72\x94\xc9\x4f\xa8\xc3\xe0\xcc\x4e\x7e\x47\xb3\x41\xe4\x7b\xdb\xd3\x0f\xd1\x16\xa8\xc7\xa2\x6e\xf4\xa4\x1b\x0d\x7b\xd2\x22\xa3\x7d\x8f\xa3\xa7\x0a\x75\xf2\x83\xe1\x6e\x85\x72\xb1\x62\x25\xcf\xa1\xbf\x26\xcc\x8d\x32\xf0\xfb\xb7\xea\xf7\xc0\xb8\xad\x27\xbd\x97\xde\xa6\x75\xa7\x21\xe3\x66\x9b\xf1\xeb\x18\x4c\x3f\x6f\x86\x6c\x71\xfc\xc8\x72\x17\x02\xa2\xb5\x79\x62\xbd\x60\x44\xbd\x0e\x4f\xa3\x64\x2c\x66\xd5\x2c\x0c\xe6\x4c\xe4\x25\x6d\x22\x6e\xe3\x71\xa0\x40\x2e\x8c\x7c\xaf\x9a\xbe\x8f\xa1\x58\x2d\xba\x10\x6c\xcd\x4c\xce\x91\xce\x65\x21\x51\xc6\x64\xb0\xf9\x63\x9d\xf1\x08\xfc\x0e\x79\x61\x8b\x53\x39\x76\x42\x6d\x4e\x3c\x82\xa9\x1d\x94\x32\x7a\x59\x88\xf2\x0f\x81\xea\x97\xfa\x85\x12\xb2\xdd\xca\xae\xa6\xef\xbb\x52\xb4\x75\xe2\x7b\x6a\xcd\x75\x36\x87\x93\x62\xb5\x20\x93\x32\xa6\xba\xe3\x46\x32\xc9\xe6\xb8\xc4\x9f\x64\xd5\xd4\xae\xf0\x13\x3a\xcd\xfd\xc2\x45\x6e\x32\xab\xab\xcc\x15\xc7\x75\x10\x0d\xb6\xa8\x60\x87\x62\xa8\x16\xe4\x1f\x42\xe0\xf0\x60\x13\x4f\x54\x0e\x15\xbf\xa9\x16\x36\xc9\x0f\x39\xf5\xe2\x43\x8d\x19\xed\xdb\xc7\x84\xc0\xb4\xd1\x50\x54\x14\xe5\x9b\xc0\xec\x8a\xd1\x2e\x7e\x76\x09\xf6\x59\x9e\xec\x5c\xd9\x07\x4c\xbb\x62\x87\x11\x54\x90\x1f\x3b\xf4\x38\xe2\x5d\xe0\x88\x8e\x8a\x4b\x6e\xc7\xe7\x30\x84\x83\xec\x34\xd7\x66\x47\x97\xeb\xe1\x8e\xa7\x14\x8a\xdc\x66\xbd\x15\xe7\xd2\xfe\xf0\x5a\x51\xe4\xfb\x9e\x67\x7a\x28\x85\xba\xdf\xa6\xc5\xc0\x35\x70\x65\xee\x25\x05\x62\x8e\x39\x98\xdb\xc5\x6d\x57\xb4\xaf\xbf\x6d\x85\x86\x87\xdb\x4e\x33\x69\xba\x8c\x7e\x36\x3e\xb2\xb3\xcb\xbf\xaf\x9e\x7a\x7f\x36\xeb\xfe\xa3\x13\xee\xef\x9d\x6b\x5f\x92\x66\x39\xce\x18\xf5\x06\x47\x30\xfc\x56\xa8\xa6\x76\x27\x85\x82\x72\xb0\xbb\x12\x5b\x70\x91\x3b\x33\x8b\xd5\xe2\xeb\x42\x35\xcb\xcc\x8d\xff\xde\x1e\x3e\x32\xe3\xb4\x7b\x57\xfd\xad\xda\x6d\xe0\x57\x8d\xde\xdd\xc1\xad\x18\xbb\x5f\xed\x32\x3c\x71\xff\x76\x7a\xec\xee\xdc\x9d\xd4\xaf\xb7\x69\x7b\xa6\xbd\xd9\xd5\x31\xb9\x10\x66\xf3\xed\x45\x2f\x86\xf5\xc1\xcd\xf7\x53\x8e\x47\x29\xdd\x4b\xb4\xa3\xce\x58\x68\x94\x82\x95\x13\x73\xb1\x6d\x28\x76\xf5\xb2\x67\x59\x33\x7d\xf1\x81\x2d\xeb\x12\x5d\xbf\x69\x7b\x44\xa9\x00\x45\x5e\x57\x5c\xe8\xee\x2b\x02\x5a\xba\xed\xb5\x7f\x77\x07\xcc\x54\x3b\xd8\xca\xba\x3e\xef\xdd\xd1\x9a\xd6\xf3\xc0\x52\x4f\x6c\x44\x4d\xcf\xe9\x3a\xd7\x18\xb6\x47\x90\xed\x5a\x11\x99\x63\x6e\x82\x97\x98\x73\x66\x7a\x32\x7b\xec\x23\x56\x7a\x8d\x61\xd2\x4c\xdb\x71\x2e\x0a\x62\xa0\xae\x41\x19\x08\x86\x61\xd7\x32\x5c\xe2\xda\xc2\x72\xd8\x5e\xf3\x72\xc1\x75\x68\x74\x60\x79\x7e\x53\xb9\x59\xcb\x18\x75\x9d\xf5\xfe\x1c\x9c\xb4\x32\xed\xb0\x11\xd1\xbb\x86\x4f\x5e\x35\x4a\x87\xab\x17\xc9\x68\x5f\x6c\x74\x90\xd2\x6e\x38\x07\xc9\x5b\x73\xba\x1c\xa3\xa3\xca\x92\xd5\xef\x3a\x87\x74\x27\xec\x6d\x1e\xde\xfb\xde\x7d\xe0\xbe\x77\x51\xa4\x82\x18\x02\xf3\xb9\xe0\x61\x00\xf4\x6b\x9c\xb1\xad\x39\x33\x74\x6e\x41\xe5\x15\x6a\xf6\x92\x65\xba\x92\x9b\xd8\x39\x71\xfb\x3b\x63\xa5\x42\x3a\x78\xec\x49\xdf\xb0\x65\xd9\x97\xfe\x76\xf4\xea\xd7\xcf\x5f\x21\x8a\x3b\xb7\x7f\xbc\xb9\xef\x2e\xf7\xf7\x6d\xa7\x60\xd4\x4c\x6a\x73\xc0\x75\x9f\xa4\x92\x49\x5d\x72\x7d\xd9\x97\x10\x43\x90\x06\x31\x9c\xda\xe2\x2c\x51\x84\x86\x29\xa2\x1a\x3d\x35\x15\xea\xce\x71\x82\x97\xfd\x63\x5d\x2f\x10\xdb\x10\xdc\x1b\xde\x77\xcf\xef\xcc\xf5\xbd\x56\xef\x5e\xdc\x3d\xdc\xf5\x4d\x39\x02\x73\x9f\x30\xc3\x29\xe6\xc0\x8b\x00\xf0\x79\x5f\xb3\xc3\xaa\x1c\x8e\xfb\x9d\x3b\x6d\x95\xac\x51\x68\x5c\xd3\x7d\x8e\x4b\x7e\x63\x52\xa1\x85\xe9\x2d\xfc\xba\x0b\x1a\xcb\xd0\xbb\xa3\x71\x02\x48\x0d\x22\x59\xc4\xb0\xda\xce\xf6\xb3\xd4\xf4\x25\xae\x3f\x37\xcf\xa6\x39\xb2\xfc\x89\x89\xe1\x70\x08\x0b\xfb\xf4\xec\x59\x3b\xd1\x16\xb3\x99\x73\x2f\xf6\x42\xe3\x33\x38\x83\x93\xe0\x20\x4f\x70\x12\x1c\x65\x18\x18\x06\xe7\xd9\x55\xef\xa2\x81\xdc\xd6\x4b\x85\x07\xff\xdf\x01\x00\x00\xff\xff\x95\xe8\xaf\x08\x60\x1f\x00\x00") + +func testImagesAgnhostCrdConversionWebhookConverterFrameworkGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostCrdConversionWebhookConverterFrameworkGo, + "test/images/agnhost/crd-conversion-webhook/converter/framework.go", + ) +} + +func testImagesAgnhostCrdConversionWebhookConverterFrameworkGo() (*asset, error) { + bytes, err := testImagesAgnhostCrdConversionWebhookConverterFrameworkGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/crd-conversion-webhook/converter/framework.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostCrdConversionWebhookMainGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x55\x5d\x6f\xdb\x3a\x12\x7d\x16\x7f\xc5\x2c\x81\x2d\xa4\xac\x2c\xa5\x1f\x0b\x74\xbd\xc8\x83\xd7\x4d\x50\xa3\xd9\x64\x11\xb9\x0d\x8a\xa2\x40\x69\x69\x2c\x13\x96\x48\x95\x1c\xc5\xf1\x06\xf9\xef\x17\x43\xc9\x69\xd2\x0f\xdc\xdb\xbc\x28\x12\x87\x73\xce\xcc\x9c\x39\xce\x8f\xc4\xdc\x76\x7b\xa7\xeb\x0d\xc1\x8b\xe3\xe7\xaf\x61\xb9\x41\x78\xd7\xaf\xd0\x19\x24\xf4\x30\xeb\x69\x63\x9d\xcf\x84\x38\xd7\x25\x1a\x8f\x15\xf4\xa6\x42\x07\xb4\x41\x98\x75\xaa\xdc\x20\x8c\x27\x29\x7c\x40\xe7\xb5\x35\xf0\x22\x3b\x86\x98\x03\xe4\x78\x24\x93\x7f\x8b\xbd\xed\xa1\x55\x7b\x30\x96\xa0\xf7\x08\xb4\xd1\x1e\xd6\xba\x41\xc0\xdb\x12\x3b\x02\x6d\xa0\xb4\x6d\xd7\x68\x65\x4a\x84\x9d\xa6\x4d\x00\x19\x53\x64\xe2\xe3\x98\xc0\xae\x48\x69\x03\x0a\x4a\xdb\xed\xc1\xae\x1f\x47\x81\x22\x21\x00\x00\x36\x44\xdd\x34\xcf\x77\xbb\x5d\xa6\x02\xcb\xcc\xba\x3a\x6f\x86\x28\x9f\x9f\x2f\xe6\xa7\x17\xc5\xe9\xe4\x45\x76\x2c\xc4\x7b\xd3\xa0\xf7\xe0\xf0\x6b\xaf\x1d\x56\xb0\xda\x83\xea\xba\x46\x97\x6a\xd5\x20\x34\x6a\x07\xd6\x81\xaa\x1d\x62\x05\x64\x99\xe7\xce\x69\xd2\xa6\x4e\xc1\xdb\x35\xed\x94\x43\x51\x69\x4f\x4e\xaf\x7a\x7a\xd2\xa0\x03\x2b\xed\xe1\x71\x80\x35\xa0\x0c\xc8\x59\x01\x8b\x42\xc2\x7f\x66\xc5\xa2\x48\xc5\xf5\x62\xf9\xf6\xf2\xfd\x12\xae\x67\x57\x57\xb3\x8b\xe5\xe2\xb4\x80\xcb\x2b\x98\x5f\x5e\xbc\x59\x2c\x17\x97\x17\x05\x5c\x9e\xc1\xec\xe2\x23\xbc\x5b\x5c\xbc\x49\x01\x35\x6d\xd0\x01\xde\x76\x8e\xb9\x5b\x07\x9a\x5b\x87\x55\x26\x0a\xc4\x27\xe0\x6b\x3b\x90\xf1\x1d\x96\x7a\xad\x4b\x68\x94\xa9\x7b\x55\x23\xd4\xf6\x06\x9d\xd1\xa6\x86\x0e\x5d\xab\x3d\x0f\xcf\x83\x32\x95\x68\x74\xab\x49\x51\x78\xff\xa1\x9c\x4c\x1c\xe5\x42\x74\xaa\xdc\x72\x92\xd2\x55\xa5\x35\x37\x3b\x5c\x6d\xac\xdd\x0a\xa1\xdb\xce\x3a\x82\x58\x44\x72\xdd\x92\x14\x91\x34\x48\x39\xcf\x43\x0a\x11\xc9\x5a\xd3\xa6\x5f\x65\xa5\x6d\x73\xdf\xad\x9f\xbf\xcc\x4b\xbb\x72\x2a\x1c\x6d\x5f\xfb\x4c\xdb\x7c\xfb\xa0\xbe\x9c\xd0\x53\xae\x5b\x55\xa3\xcf\x55\x6d\x36\xd6\x53\x5e\xba\x6a\xc2\x80\x83\xd6\x26\x23\x6e\x3e\x7c\x22\x74\x52\x24\x42\xdc\x28\xc7\x0c\x4a\x74\x74\xc6\x12\xe3\xde\x9b\x5a\x44\x5b\xdc\x87\xf7\x87\x0f\x81\x2b\xff\x69\x43\x7c\x31\xcf\x61\xde\x56\x73\x57\xcd\x1f\x20\xae\x07\x04\x1e\x62\xef\x47\x79\x0c\x5c\x60\xce\xdc\xb3\x80\xf6\xab\x5b\x27\xf0\x2c\x54\x98\xcd\x6d\xdb\x2a\x53\xdd\x89\xe8\xbd\xc7\x29\x00\xc8\x9f\x57\x22\x53\x11\x15\x1b\xeb\x68\x0a\xb2\x20\xe5\xc8\xc3\xdb\xe5\xf2\x7f\xe0\xd1\xdd\xa0\x63\xed\x04\xce\xaf\x5e\xbd\x1c\x26\x8b\x9e\xa5\x08\xf3\xde\x93\x6d\xaf\xd0\xdb\xde\x95\xf8\x03\x0f\xce\x7a\x6e\x4d\x3d\x85\x2f\xbc\xe1\xbe\x5f\x95\x03\x9f\x90\xc0\x83\xfc\xb3\xfb\x99\x10\xb3\x35\xa1\x83\x0a\xbb\xc6\xee\x19\x52\x13\xaf\xc3\x23\xb3\x28\x9b\xde\x13\xba\x34\x88\x45\x55\xad\x36\x2c\x7a\x45\xd6\x81\x41\xac\x3c\x87\x97\x0e\x15\x21\xa8\x5f\x23\x66\x07\x48\xde\xb4\x1f\xb3\x73\x12\xf6\x0f\x87\xad\x25\x84\xb1\x6b\xa1\x17\xdf\x9a\xc9\x86\xf5\x5d\x9d\x7e\xe8\xa5\x7a\xdc\xcd\x14\x1a\xed\x09\xc3\x0a\x3c\x6a\x6c\xca\x3b\x30\x30\xe5\x93\xe0\x64\xf9\xa8\x73\x74\x24\x01\x4d\xd5\x59\x6d\x28\xfb\x92\x8a\x68\xe6\x6a\x3f\x85\x61\xc8\xff\x55\xb7\xba\xed\xdb\x0b\xfe\x16\x1f\x27\xa9\x88\xae\x7a\x33\x05\x68\x95\x36\xa9\xb8\x17\x62\xdd\x9b\x12\xb4\xd1\x14\x27\x70\x27\xa2\x5f\xa8\x26\x3b\x6b\x54\xed\xe3\x24\x2b\x82\x4c\x3f\x28\x17\x3f\x3b\x68\x39\x05\x49\x8d\x9f\xf0\xeb\x84\xed\x53\xa6\x20\x79\xba\x91\x0c\xca\x2e\xad\x61\x7b\x3c\xf0\xae\x70\xad\xfa\x86\xe0\xf6\x9f\xc7\xff\x82\x39\x3a\x62\x07\xe0\x01\x70\xbf\xb8\x13\x45\x06\xf1\x7c\x06\x9c\x2e\x05\xbd\x06\x65\xf6\x29\x27\xe1\x20\xa3\xd8\xad\xe4\x3f\x44\x14\x45\x52\x85\xe9\x8f\x2a\xe4\xf0\x4c\x26\xbf\x55\xc0\xb8\x7b\x23\xff\xce\xe9\x1b\x45\x38\xd9\xe2\xfe\x77\xcb\x18\xaf\xc2\x16\xf7\xd0\x2a\x2a\x37\x1c\x35\x99\x3c\xe9\xca\x5f\x22\xb7\x30\x14\x98\xf1\xdc\x53\x90\xfc\x90\x69\x10\x00\xf3\x28\xb0\xec\x1d\x0e\xa2\xa0\x8d\xa2\x40\xe4\x20\xb7\x41\x37\x1e\xac\x91\x09\xcf\x95\x7d\xc3\x9a\xb5\xae\x0f\xcc\xfd\xe0\xb9\x43\xbb\xe2\x47\x57\x93\xd0\xbc\xa0\xb0\x2d\xee\x33\x41\xfb\x0e\x0f\x77\x3d\xb9\xbe\xa4\x20\x8c\xef\x9d\xeb\xdd\x77\xce\x75\xd0\x12\x2b\x2b\x2e\xdb\x0a\x8e\x9e\xd8\x4c\x0a\xca\xd5\x1e\x3e\x7d\x1e\xc2\x83\xd8\xca\x01\x64\x7a\x32\xc2\xdd\x1d\x40\xa6\xf0\x4d\x5c\x23\xce\x14\xc6\x71\xdd\x0b\x11\xb1\x79\x67\x6f\x95\xa9\x1a\x3c\xeb\x4d\x19\x3f\x59\x86\x14\x1e\xac\x37\x2b\xb8\xdc\xd3\x5b\xd5\x76\xcd\xb8\xd0\x94\xfc\xec\xba\x43\x55\xed\xff\x2f\x53\xe0\x12\xe2\x5d\xf8\xb5\xce\xae\xd0\x77\xd6\x78\xbc\x76\x3a\x98\x88\xc3\xaf\x70\x34\x9e\x7c\xed\xd1\x53\x02\x77\xb0\xcb\xc2\x71\xfc\xe9\xf3\x6a\x4f\x18\x4b\xbb\x95\x49\x02\xf7\x89\x88\xca\x46\xa3\x21\x8f\xc4\x05\xd6\x48\xf3\xf0\x1e\x27\x22\x1a\x87\x30\x3d\x81\x67\x21\x5d\x60\xe9\xee\x44\x14\xcd\xaa\xca\x4d\x83\xfd\xc3\xba\xa5\xac\xe8\x9c\x36\xb4\x8e\xe5\xf4\xef\x95\x4c\xc3\xe4\x79\x85\xa3\xe5\x79\x31\x74\x8c\xd7\x9c\x9f\xcb\xf3\x22\x1e\xfe\x4b\xe1\x01\x97\x43\xef\x45\x84\x2e\x40\x0d\xa0\xd9\x79\xd0\xc9\xcc\x54\x01\x94\xef\xc9\xa0\xf4\x44\x44\x7a\x0d\x1c\xfb\xb7\x13\x30\xba\xe1\xf9\x44\x9d\x32\xba\x8c\xd1\xb9\x84\x33\xdd\x8b\x3f\x02\x00\x00\xff\xff\xd8\x5a\xb9\x49\x9e\x09\x00\x00") + +func testImagesAgnhostCrdConversionWebhookMainGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostCrdConversionWebhookMainGo, + "test/images/agnhost/crd-conversion-webhook/main.go", + ) +} + +func testImagesAgnhostCrdConversionWebhookMainGo() (*asset, error) { + bytes, err := testImagesAgnhostCrdConversionWebhookMainGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/crd-conversion-webhook/main.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostDnsCommonGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x54\x4f\x6f\xdc\xb6\x17\x3c\x8b\x9f\x62\x7e\x3a\xfc\xba\x6b\xc8\x92\xe3\x9e\xba\x85\x0f\xdb\xb5\xd3\x6c\xe3\xca\x85\x65\x37\x08\x8a\x02\xe1\x4a\x4f\xd2\x43\x25\x52\x25\x29\xaf\x8d\x20\xdf\xbd\xa0\xb4\xde\x3f\x4e\x6a\x27\xe8\x49\xa0\x38\x6f\x38\x33\xef\x91\xc9\x91\x58\xe8\xee\xc1\x70\x55\x3b\x9c\x9e\xbc\xfa\x01\x37\x35\xe1\x6d\xbf\x22\xa3\xc8\x91\xc5\xbc\x77\xb5\x36\x36\x16\xe2\x92\x73\x52\x96\x0a\xf4\xaa\x20\x03\x57\x13\xe6\x9d\xcc\x6b\xc2\x66\x27\xc2\xef\x64\x2c\x6b\x85\xd3\xf8\x04\x13\x0f\x08\x37\x5b\xe1\xf4\x47\xf1\xa0\x7b\xb4\xf2\x01\x4a\x3b\xf4\x96\xe0\x6a\xb6\x28\xb9\x21\xd0\x7d\x4e\x9d\x03\x2b\xe4\xba\xed\x1a\x96\x2a\x27\xac\xd9\xd5\xc3\x21\x1b\x8a\x58\xbc\xdf\x10\xe8\x95\x93\xac\x20\x91\xeb\xee\x01\xba\xdc\x47\x41\x3a\x21\x00\xa0\x76\xae\x9b\x25\xc9\x7a\xbd\x8e\xe5\xa0\x32\xd6\xa6\x4a\x9a\x11\x65\x93\xcb\xe5\xe2\x22\xcd\x2e\x8e\x4f\xe3\x13\x21\x6e\x55\x43\xd6\xc2\xd0\xdf\x3d\x1b\x2a\xb0\x7a\x80\xec\xba\x86\x73\xb9\x6a\x08\x8d\x5c\x43\x1b\xc8\xca\x10\x15\x70\xda\xeb\x5c\x1b\x76\xac\xaa\x08\x56\x97\x6e\x2d\x0d\x89\x82\xad\x33\xbc\xea\xdd\x41\x40\x8f\xaa\xd8\x62\x1f\xa0\x15\xa4\x42\x38\xcf\xb0\xcc\x42\xfc\x34\xcf\x96\x59\x24\xde\x2d\x6f\xde\x5c\xdd\xde\xe0\xdd\xfc\xfa\x7a\x9e\xde\x2c\x2f\x32\x5c\x5d\x63\x71\x95\x9e\x2f\x6f\x96\x57\x69\x86\xab\xd7\x98\xa7\xef\xf1\x76\x99\x9e\x47\x20\x76\x35\x19\xd0\x7d\x67\xbc\x76\x6d\xc0\x3e\x3a\x2a\x62\x91\x11\x1d\x1c\x5e\xea\x51\x8c\xed\x28\xe7\x92\x73\x34\x52\x55\xbd\xac\x08\x95\xbe\x23\xa3\x58\x55\xe8\xc8\xb4\x6c\x7d\xf3\x2c\xa4\x2a\x44\xc3\x2d\x3b\xe9\x86\xf5\x67\x76\x62\x71\x94\x08\xd1\xc9\xfc\x2f\x4f\x52\x28\x2b\x04\xb7\x9d\x36\x0e\x13\x11\x84\x65\xeb\x42\x11\x84\xac\x13\xd6\xbd\xe3\xc6\x2f\xbc\x75\x55\xd9\x50\x88\x20\xac\xd8\xd5\xfd\x2a\xce\x75\x9b\xd8\xae\x7c\xf5\x7d\x92\xeb\x95\x91\xa1\x98\x0a\x91\x24\x58\xb4\xc5\x79\x9a\x65\x7d\x59\xf2\xbd\x8f\xad\xb7\x9b\x86\x54\xaa\xd6\xd6\x61\xe1\xc1\xb1\xb8\x93\xe6\x10\x7a\x86\xff\x0f\x3c\xf1\x42\xb7\xad\x54\xc5\x47\x11\xdc\x5a\x9a\x01\x08\x0b\x65\x8f\xed\x80\x0a\x23\x11\x64\xb5\x36\x6e\x86\xf0\x37\xc3\xca\xd9\xc1\x96\x27\xfe\xce\xe2\x3c\xcd\x30\xe2\xd0\xb0\x75\x1e\x7c\xa9\x55\x35\x03\x3e\xec\x81\x77\x28\xb2\xe3\xf0\xb1\x1d\x18\xe2\x0f\x91\x08\xe6\xa6\xb2\x33\x60\x94\xf2\xab\xbc\xe7\xb6\x6f\x53\xff\x73\x72\x32\x8d\x44\x70\xdd\x2b\x2f\xa9\xf3\x74\x5b\xed\x97\x6c\x5d\x24\x3e\xed\xdb\x27\x73\x47\xc6\xff\xff\xba\x08\x76\xf0\x97\x62\x18\x90\xc7\x8f\xf6\x9e\xcf\x62\xa4\x7d\x29\x8b\x3d\xd4\x7f\x8e\x63\xeb\x63\x2f\x8e\x0b\x97\xbf\xd1\xd6\xd9\x97\x93\xd8\x22\x9f\x09\x81\x5c\x7e\xec\x4b\xed\xf3\xf6\x13\x72\x79\x32\xe0\x86\x17\xea\x5f\xec\x87\x23\xd3\xf8\x88\x1d\x78\x0f\xbf\xd1\xfc\xa0\xfb\x35\x37\x34\x18\x2f\x7b\x95\x7f\x61\x46\x26\x79\x5b\xe0\xe8\xc0\x59\x04\x69\x2a\x8b\x3f\xfe\x1c\x2f\xd8\x14\x1f\x45\x50\x28\xbb\xab\xc1\xec\x0c\x3f\xd3\x13\x9e\xa9\x08\xca\xd6\xc5\x83\x93\x46\x4d\x36\x97\x33\xfe\x45\xb3\x9a\x1c\x54\x47\x08\xa3\x70\x3a\xfd\x5c\xd3\xb6\x51\xdf\xa0\x69\x37\xa4\xb3\x33\x54\xf4\x84\xe7\x25\x4d\xbb\xd1\xf8\x92\xa6\x6d\x7e\x5f\xa9\x67\xff\x28\x43\xb2\x18\x4a\x69\x33\x3f\x7e\xb1\x77\xc0\x76\xdf\xb7\x39\x95\x2d\xe1\x91\x68\xfc\x0e\x7c\xdc\xd0\xb9\x74\x32\x02\x19\xe3\xfd\x8d\x4f\x5f\x7c\xfd\xb4\x76\x2a\x02\x2e\x07\xd0\xff\xce\xa0\xb8\xf1\xc5\x41\x27\x15\xe7\x13\x32\x66\x2a\x82\x4f\x42\x04\x86\x5c\x6f\xd4\x86\x7e\xf2\xc8\xed\x15\xfd\x13\x00\x00\xff\xff\x89\x1d\xb9\xb0\xaf\x07\x00\x00") + +func testImagesAgnhostDnsCommonGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostDnsCommonGo, + "test/images/agnhost/dns/common.go", + ) +} + +func testImagesAgnhostDnsCommonGo() (*asset, error) { + bytes, err := testImagesAgnhostDnsCommonGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/dns/common.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostDnsDnsGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x54\xc1\x6e\xdb\x46\x10\x3d\x73\xbf\x62\xc2\x93\x94\x2a\x64\xe2\xc0\x87\xba\xc8\x41\xb5\x9c\x5a\x88\x21\x05\xa6\xdc\x20\x48\x03\x63\xb4\x1c\x92\x03\xad\x76\xe9\xdd\xa1\x25\x21\xf0\xbf\x17\x4b\x2a\xa9\x1d\x03\xbd\x15\xe8\x71\x77\xde\xbe\x99\x79\xef\x91\x79\x0e\xbf\xac\x3b\x36\x25\xbc\xd8\xb1\x2d\xdd\x2e\x28\x95\xbf\x54\xe7\xae\x3d\x78\xae\x1b\x81\x93\xd7\x6f\x7e\x85\x55\x43\xf0\xa1\x5b\x93\xb7\x24\x14\x60\xda\x49\xe3\x7c\xc8\x94\xba\x62\x4d\x36\x50\x09\x9d\x2d\xc9\x83\x34\x04\xd3\x16\x75\x43\x70\xac\x4c\xe0\x4f\xf2\x81\x9d\x85\x93\xec\x35\x8c\x22\x20\x3d\x96\xd2\xf1\x6f\xea\xe0\x3a\xd8\xe2\x01\xac\x13\xe8\x02\x81\x34\x1c\xa0\x62\x43\x40\x7b\x4d\xad\x00\x5b\xd0\x6e\xdb\x1a\x46\xab\x09\x76\x2c\x4d\xdf\xe4\x48\x91\xa9\xcf\x47\x02\xb7\x16\x64\x0b\x08\xda\xb5\x07\x70\xd5\x63\x14\xa0\x28\x05\x00\xd0\x88\xb4\x67\x79\xbe\xdb\xed\x32\xec\xa7\xcc\x9c\xaf\x73\x33\xa0\x42\x7e\x35\x3f\xbf\x58\x14\x17\xaf\x4e\xb2\xd7\x4a\xdd\x58\x43\x21\x80\xa7\xbb\x8e\x3d\x95\xb0\x3e\x00\xb6\xad\x61\x8d\x6b\x43\x60\x70\x07\xce\x03\xd6\x9e\xa8\x04\x71\x71\xce\x9d\x67\x61\x5b\x4f\x20\xb8\x4a\x76\xe8\x49\x95\x1c\xc4\xf3\xba\x93\x27\x02\x7d\x9f\x8a\x03\x3c\x06\x38\x0b\x68\x21\x9d\x16\x30\x2f\x52\xf8\x7d\x5a\xcc\x8b\x89\xfa\x34\x5f\x5d\x2e\x6f\x56\xf0\x69\x7a\x7d\x3d\x5d\xac\xe6\x17\x05\x2c\xaf\xe1\x7c\xb9\x98\xcd\x57\xf3\xe5\xa2\x80\xe5\x7b\x98\x2e\x3e\xc3\x87\xf9\x62\x36\x01\x62\x69\xc8\x03\xed\x5b\x1f\x67\x77\x1e\x38\x4a\x47\x65\xa6\x0a\xa2\x27\xcd\x2b\x37\x0c\x13\x5a\xd2\x5c\xb1\x06\x83\xb6\xee\xb0\x26\xa8\xdd\x3d\x79\xcb\xb6\x86\x96\xfc\x96\x43\x34\x2f\x00\xda\x52\x19\xde\xb2\xa0\xf4\xe7\x67\xeb\x64\xea\x65\xae\x54\x8b\x7a\x13\x49\x4a\x1b\x94\xe2\x6d\xeb\xbc\xc0\x48\x25\x69\x5c\xd3\xd6\x21\x55\x63\xa5\xb4\xb3\x41\x80\x44\x5f\xba\x20\xe1\x7d\x34\xfb\x1d\xa4\x39\x89\xce\x9b\x78\x93\x2a\x95\xe7\x30\x85\xfe\xc6\x53\x70\xe6\x3e\xd3\xce\x56\x43\x2e\xb6\x68\xb1\x1e\xfc\xd8\x74\x6b\x32\x24\x60\x9c\xdb\x04\x30\xbc\x19\xf2\x73\x16\x9f\x5b\xdc\x52\x20\x7f\x4f\x1e\x66\x8b\xe2\xf6\xfc\xea\xa6\x58\x5d\x5c\xdf\xce\x3f\xc6\x62\x20\xf4\xba\x01\xa1\x20\xaf\x4a\x1b\xb2\x70\xaf\x33\x6d\xba\x20\xe4\x33\xe3\x34\x1a\x78\x7e\xf3\xf4\x74\x77\xfa\x16\xb1\x41\xde\xdc\x21\x35\x1a\xf9\xed\xc1\x54\x77\xa5\xe8\xd3\x75\xb6\xde\x67\x6c\x85\xbc\x45\x93\x69\xe3\xba\x12\xdb\x36\xb3\x24\xb1\xb1\x6b\x07\xf5\x6c\xe9\x24\x9c\x9d\xf6\x8b\xfe\x41\x32\x5b\x14\x45\x57\x55\xbc\xbf\xe2\x20\xe0\x09\xcb\x10\xa7\x86\xb8\x35\xd7\xc3\xde\x68\x4b\xf0\x24\x9d\xb7\xa1\x97\xdd\x44\xa8\xab\x8e\x98\x2e\x46\x34\x3e\x09\x3d\x0f\x05\x55\x75\x56\x3f\xe3\x1e\x8d\xe1\xcb\xd7\xc1\x0b\xf8\xa6\x92\x48\x3c\x43\x41\x38\x7b\xd7\x77\x8d\x5e\x8c\xd2\x9f\x75\x4f\xc7\x2a\x31\x6c\x29\x44\xd8\xd1\xc8\xac\x68\x0d\xcb\xe8\x3b\xc1\x04\xd2\xbf\x6c\xc4\xc5\x58\xdd\x4e\x20\xc2\x7b\x52\xb4\x35\xc1\xf0\xf8\x9b\x4a\x12\xae\x7e\x10\x5c\x62\xf8\xe8\xa9\xe2\xfd\x28\x96\x27\x90\x0e\xa6\xa4\xe3\x1e\x98\x44\xb1\xb6\x2c\x43\x46\x05\x7d\xfc\xb2\x7e\x60\xb2\x88\x18\xc4\xf8\x69\xa0\x23\x17\xa4\xe3\x2f\x6f\xce\xbe\xaa\x24\x79\x50\xc9\x83\x52\x49\x8b\x96\xf5\x28\x3d\x77\x9d\x29\xfb\x9f\x4d\xc5\xf6\x28\xd8\x90\x85\x28\xe7\x8b\x74\xac\x1e\xd4\xa0\x5c\x3d\x28\xd7\x27\xe8\xff\xae\xdc\x3f\x59\xff\x77\xf5\x1e\xe1\xfe\x53\x05\xff\x0e\x00\x00\xff\xff\x74\xa5\xf6\x85\x54\x06\x00\x00") + +func testImagesAgnhostDnsDnsGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostDnsDnsGo, + "test/images/agnhost/dns/dns.go", + ) +} + +func testImagesAgnhostDnsDnsGo() (*asset, error) { + bytes, err := testImagesAgnhostDnsDnsGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/dns/dns.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostDnsDns_windowsGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xbc\x57\xff\x6f\xdb\xba\x11\xff\x59\xfc\x2b\xee\x09\x78\x6f\x72\x9f\x23\xa5\xe9\x36\x6c\x19\x8c\xc1\xcf\x71\x5f\x8d\xb8\x4e\x16\x39\x2d\x8a\xa6\x48\x69\xe9\x64\x13\xa1\x49\x8d\xa4\xea\x68\x45\xfe\xf7\xe1\x28\xd9\x96\xdd\x2e\x78\xe8\x0f\x13\x02\x44\x22\xef\x3e\xf7\xb9\x6f\x3c\x3a\x49\xe0\xd7\x45\x25\x64\x0e\x1b\xa1\x72\xbd\xb1\x8c\x25\x2f\xd8\x48\x97\xb5\x11\xcb\x95\x83\xb3\xd3\x97\x7f\x87\xf9\x0a\xe1\xb2\x5a\xa0\x51\xe8\xd0\xc2\xb0\x72\x2b\x6d\x6c\xcc\xd8\x54\x64\xa8\x2c\xe6\x50\xa9\x1c\x0d\xb8\x15\xc2\xb0\xe4\xd9\x0a\xa1\xdd\xe9\xc3\x3b\x34\x56\x68\x05\x67\xf1\x29\x44\x24\x10\xb6\x5b\x61\xef\x1f\xac\xd6\x15\xac\x79\x0d\x4a\x3b\xa8\x2c\x82\x5b\x09\x0b\x85\x90\x08\xf8\x98\x61\xe9\x40\x28\xc8\xf4\xba\x94\x82\xab\x0c\x61\x23\xdc\xca\x1b\x69\x21\x62\xf6\xa1\x05\xd0\x0b\xc7\x85\x02\x0e\x99\x2e\x6b\xd0\x45\x57\x0a\xb8\x63\x0c\x00\x60\xe5\x5c\x79\x9e\x24\x9b\xcd\x26\xe6\x9e\x65\xac\xcd\x32\x91\x8d\x94\x4d\xa6\x93\xd1\x78\x96\x8e\x4f\xce\xe2\x53\xc6\x6e\x95\x44\x6b\xc1\xe0\xbf\x2b\x61\x30\x87\x45\x0d\xbc\x2c\xa5\xc8\xf8\x42\x22\x48\xbe\x01\x6d\x80\x2f\x0d\x62\x0e\x4e\x13\xcf\x8d\x11\x4e\xa8\x65\x1f\xac\x2e\xdc\x86\x1b\x64\xb9\xb0\xce\x88\x45\xe5\x0e\x02\xb4\x65\x25\x2c\x74\x05\xb4\x02\xae\x20\x1c\xa6\x30\x49\x43\xf8\x6d\x98\x4e\xd2\x3e\x7b\x3f\x99\xbf\xb9\xba\x9d\xc3\xfb\xe1\xcd\xcd\x70\x36\x9f\x8c\x53\xb8\xba\x81\xd1\xd5\xec\x62\x32\x9f\x5c\xcd\x52\xb8\x7a\x0d\xc3\xd9\x07\xb8\x9c\xcc\x2e\xfa\x80\xc2\xad\xd0\x00\x3e\x96\x86\xb8\x6b\x03\x82\x42\x87\x79\xcc\x52\xc4\x03\xe3\x85\x6e\xc8\xd8\x12\x33\x51\x88\x0c\x24\x57\xcb\x8a\x2f\x11\x96\xfa\x0b\x1a\x25\xd4\x12\x4a\x34\x6b\x61\x29\x79\x16\xb8\xca\x99\x14\x6b\xe1\xb8\xf3\xdf\xdf\xb8\x13\xb3\x17\x09\x63\x25\xcf\x1e\x08\x24\x57\x96\x31\xb1\x2e\xb5\x71\x10\xb1\x20\x2c\xd6\x2e\x64\x41\x48\xde\xaa\xa5\xf5\xaf\xb5\xcd\xb8\x94\xf4\x5a\x29\xcb\x0b\x0c\x19\x0b\xc2\xa5\x26\x1e\x3e\x2d\x8f\x89\xad\x6d\xd2\x16\x65\xf8\xcc\x5e\x62\x70\x49\x71\xac\x43\xd6\x63\x2c\xd3\xca\x7a\x9b\xe8\xb2\x37\xda\x3a\xfb\x9a\xaa\xc9\x3f\x03\x08\x47\xe7\xc9\xfb\x56\x2b\xad\xad\xc3\xf5\xab\xb3\x24\x37\xe2\x0b\x1a\x9b\xa0\xcb\x92\x15\x69\x84\x2c\x50\xe8\x6e\x5a\x54\xd8\x2a\x7f\x6e\x34\xee\x46\x95\x31\xa8\xdc\x48\x2b\x67\xb4\x4c\xd1\xdd\xa5\x68\xbe\x88\x0c\xed\xdd\x7c\x74\x3d\xb9\xbe\xbb\xe6\x86\xaf\xd1\xa1\xb1\x9f\x3d\xd2\xa4\xe0\x19\xda\x1d\xde\x0f\x21\xdd\x4d\x94\x43\xe3\x81\x3e\xb3\x60\xcd\x1f\xc9\x37\xc5\xd7\x38\x45\xd5\xd0\x7b\x79\xf6\x37\xbf\x71\xa1\xd7\x5c\xa8\xd9\x76\x6b\xbf\x91\x66\xba\xc4\xc9\x45\xab\x00\x03\x38\xfb\xcb\x5f\x29\x62\x49\x02\xaf\xc5\x23\xe6\x13\x55\x50\x1d\x17\xda\xac\x7d\x92\xcf\x7d\xbf\xd8\xf3\x24\xc9\x75\x66\xe3\xb5\xc8\x8c\xa6\xd2\x8e\x33\xbd\x4e\x50\x9d\x54\xfb\x0c\x6c\x84\x7a\x75\x96\xf0\x52\x24\xa2\x74\x75\x89\x36\x51\xf6\xa4\x7d\x3d\x29\x08\xfc\x9e\x80\xef\x37\x67\x0f\xb6\x7c\xc9\x68\xbd\x63\xd3\x3a\x53\x65\x0e\xbe\xb2\x80\x9c\x22\xe6\xb0\x7d\x3e\x1e\x79\xfa\x2b\xfc\xf9\xd3\xa2\x76\xc8\x82\xbd\x9b\x1d\xd1\x43\xdf\xf7\xc2\x6d\xa0\x2f\x66\x29\x05\x18\x0d\xbc\x68\xcb\x2f\x9e\x94\xc3\x3c\x37\xa9\xaf\x4b\x16\xec\x04\xa6\xc2\x3a\x02\xfd\xbe\xd8\x4c\xe7\x38\x27\x1f\xb6\x4f\x25\x94\x7b\x75\xc6\x82\x36\xc4\x70\xc0\xbf\x13\xf7\x3d\xa3\xb1\xa2\x73\xe4\x46\x57\x74\x64\x74\x21\x9a\x8d\x6b\xa3\x1f\xeb\x43\xec\x66\xe3\x62\x96\x1e\x19\x7d\x62\xec\x0b\x37\x54\xf1\x49\x02\xbf\xa3\x9b\xa1\xdb\x68\xf3\xe0\x4b\xc7\x42\xc6\x15\x2c\xa8\xdd\x2b\x95\xd3\x21\x25\xca\x95\x2c\x79\x29\xe2\x5c\x4a\xaf\x61\x11\x7f\x30\xd1\x0d\x50\xa2\x8a\x93\xed\xfb\xc9\x12\x9d\x6a\xcc\x97\xde\xfc\x3f\x0d\xe6\xc2\x60\xe6\x30\x2f\x8c\x5e\x0f\xde\xa6\x17\x33\x16\x6c\xc5\x73\x29\xf7\x91\x1a\x6c\xe7\x4f\xfc\xb6\xb2\x6e\xaa\x79\x7e\x31\x9d\x46\x61\x97\x6f\xd8\x63\x41\x69\x74\xf6\x8d\x93\x03\xe8\x40\x7a\xfd\xd7\x42\xe5\xd7\x46\x67\x51\x78\x2c\x1c\xf6\xa8\xe6\x8b\x4a\x65\x80\x12\xd7\x13\x45\xa9\x8e\xe8\x15\x9a\xd3\xa9\x0f\x92\x92\xff\xf1\x53\xf3\xd9\x83\x85\xd6\x92\x8a\x93\x8e\xcc\xfb\x3e\x20\x9c\x0f\xc0\x70\xb5\xc4\x46\xf0\x2b\x0b\x02\x51\x00\xc2\x60\xe0\x11\xfd\x42\x60\xd0\x55\x46\x81\x33\x15\xb2\x20\x78\x62\xf4\xd7\xae\x15\x5c\x5a\xa4\xb4\x79\x12\xcb\xfd\x49\xf3\x8e\xcb\x0a\x23\x83\xcb\x3e\x3c\x60\x0d\x5b\xfb\xcd\x7f\x82\x35\xb8\xbc\xc4\xba\x0f\x68\x8c\x27\xd1\xea\xc5\x57\x25\xaa\x4b\xac\xa3\xdd\xc2\xf4\x6a\x34\x9c\xde\xbf\x1d\x8e\xde\x4c\x66\xe3\x3e\x78\xc8\xdd\xe6\xbf\x6e\xc7\x37\x1f\xee\xdf\x0d\xa7\xb7\xe3\x1e\xf3\xd4\x8d\x81\x9f\x06\xa0\x84\x77\x73\x4b\x33\x0c\x3d\xe9\x1c\x0b\x34\xd0\x58\x8e\x47\x52\x5b\x8c\x7a\xcc\x53\xf1\x74\xfb\x3e\x24\x3b\x3e\x24\xf4\x3b\xba\xa6\x51\x1a\x7f\x1e\xb0\xfe\x03\x66\xda\xaf\x2d\x2c\x85\xa7\x29\x67\x6a\xc9\xaa\x28\xc4\xa3\x6f\x49\x83\x3c\xb7\x40\x4d\x90\x69\x55\x88\x65\x73\x57\xe0\x2a\x87\x06\xc0\xfa\x91\xe4\xf3\xa2\x8b\x56\xa6\xa2\xf1\x4d\x2a\xd6\xe3\xa0\x6d\x02\x7f\x8c\x1d\xf5\x76\x39\x27\x7e\x49\x02\xef\x11\xac\xe3\xc6\xed\xaf\x1d\x4b\x54\x68\xb8\x6c\x91\x1a\x3b\x6e\xc5\x9d\xbf\x1a\xd4\x74\x0f\xe0\x52\x42\xdb\x02\x64\x5e\x61\xe6\xe7\x65\xcc\x02\x2e\x65\xda\x12\xa0\x60\x6d\x6d\x7d\x7d\x62\x81\xed\xac\x7f\x53\x0f\x9d\x51\xd4\x87\x30\x45\x6e\xb2\x15\xf1\x0d\x9b\xa8\xee\x74\x7f\x1a\x40\x18\xfa\xc8\x76\x2d\x0d\xda\xf2\xb1\x71\x5a\x4a\xe1\xa2\xad\x78\x1f\xc2\x3e\x21\x3c\x31\xef\xea\x7c\x85\x0a\x36\x48\x7e\xa0\xca\xbd\xaf\xad\x17\x27\xbb\x1b\xc2\x3e\x84\xde\x71\xf2\xe9\x47\x0b\xf2\x9b\xa1\xd8\x29\xcf\xf1\xec\xf6\xed\xf8\x66\x38\x1f\xdf\xa7\xb7\xbf\xdd\x5f\x8e\x3f\xa4\xdf\x2d\x9f\x92\x2b\x91\x45\x68\x4c\xef\xb9\x32\x15\xde\xca\x71\x85\xde\x20\xcf\xd3\x6a\x71\x89\x35\x8d\x0a\x1b\x9d\xfe\x11\x0b\x6d\xfb\x7b\xc4\xfd\x11\xd0\x18\xf0\xf2\xcf\x66\xb1\x58\xbb\x38\x2d\x8d\x50\xae\x88\xc2\x9f\xed\xdd\xdd\xcf\x36\xfc\x6e\x1c\x3c\x60\xef\x9b\x4c\x1f\xa4\x7a\xb0\x4b\x75\x90\x69\xe5\x84\xda\x1e\x32\x5b\x92\x6d\x9a\x76\x2c\x9f\xab\x81\x06\x47\x14\xf0\x53\xe7\x3c\x6c\x44\xfa\xd0\x29\xa5\x56\xf0\xa8\xba\x9a\x82\x89\x3a\x8b\x5b\xeb\x44\xda\x73\x7a\x6a\xaa\xac\xed\xf0\x8e\x64\xf7\x0c\x3c\x38\xa3\xa3\x1e\xbc\xd8\x5f\x0f\x76\xcd\x98\x6b\xf5\x27\x07\x0f\x4a\x6f\x60\xa5\x37\xb0\x10\x4b\x2a\x59\xbb\xd2\x95\xcc\x61\xcd\x1f\x9a\x1b\x2e\xcd\x57\x58\x54\x45\x81\xa6\x0f\x8b\xca\xf9\x45\x1a\xe2\xb0\x11\x52\x82\x43\x29\xa1\xb2\xb0\xa8\xdb\xf1\xe7\xfc\x04\xf6\x77\x61\xf1\x1f\x04\x5e\x38\x34\x1b\x6e\x72\xaa\x6f\x1a\xac\x7e\x55\x28\xc7\x82\x06\x94\xa2\x4a\xc6\xa2\x8f\x7e\x94\xf7\xe1\xe5\xff\x18\x4b\xf1\x88\x4b\x19\xb1\x20\xa0\x41\x5d\x3a\x13\x35\xf7\xdc\xf8\x5a\x0b\xba\xcb\x45\xbf\x34\x78\x1f\x4f\x3f\xf5\x7a\xfd\x67\xc4\x88\x80\x97\xa0\x82\x6e\x39\x1c\x51\xf0\x22\xff\x47\x16\x74\x99\xa3\x38\x44\xfb\x34\xf5\x9e\x03\xde\x65\x9f\x14\xbb\x69\x3f\xb8\x70\x1d\x9d\xc0\xb9\xb2\x9d\xcb\xd8\xd1\x91\x59\xec\xca\xa3\xe9\xb6\xa3\xfa\x61\x81\x6c\x95\x7e\x89\x76\xa2\xf1\x81\x35\xf2\x83\xda\xc5\x0b\x76\xda\x7e\x67\x96\xb4\xb7\x8d\x33\x37\x62\x7d\x43\xbf\x87\xa3\x66\x25\x22\xad\xf6\x56\x88\xd6\xc6\xcd\xc0\xfb\x78\xfe\x89\x3a\xf7\xee\xf1\xf4\xd4\xf7\xec\xa1\x07\xbb\x66\x39\x58\xee\xc3\xee\x93\x54\x64\x23\xe9\xe1\x67\xf8\xe8\xba\xc3\xf1\x40\x8f\x3d\xb1\xff\x06\x00\x00\xff\xff\x3c\x90\xc9\x1c\xbb\x0f\x00\x00") + +func testImagesAgnhostDnsDns_windowsGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostDnsDns_windowsGo, + "test/images/agnhost/dns/dns_windows.go", + ) +} + +func testImagesAgnhostDnsDns_windowsGo() (*asset, error) { + bytes, err := testImagesAgnhostDnsDns_windowsGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/dns/dns_windows.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostEntrypointTesterEpGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x53\xc1\x6e\xe3\x36\x10\x3d\x9b\x5f\xf1\x20\xa0\x8d\x1d\x68\xa5\x6c\x8a\x5e\x52\xf4\xe0\x7a\x5d\xd4\xd8\xc0\x2e\x22\xa7\x8b\x45\xdb\x03\x25\x8d\x24\xa2\x14\xa9\x92\xc3\xc8\xc6\x62\xff\xbd\xa0\x6c\xa7\x09\xd2\x43\x8f\x04\xdf\xbc\x79\xf3\xe6\x4d\x7e\x2d\x56\x76\x38\x3a\xd5\x76\x8c\xdb\x9b\xf7\xdf\x63\xdf\x11\x3e\x86\x92\x9c\x21\x26\x8f\x65\xe0\xce\x3a\x9f\x09\x71\xaf\x2a\x32\x9e\x6a\x04\x53\x93\x03\x77\x84\xe5\x20\xab\x8e\x70\xfe\x49\xf1\x1b\x39\xaf\xac\xc1\x6d\x76\x83\x79\x04\x24\xe7\xaf\x64\xf1\x83\x38\xda\x80\x5e\x1e\x61\x2c\x23\x78\x02\x77\xca\xa3\x51\x9a\x40\x87\x8a\x06\x86\x32\xa8\x6c\x3f\x68\x25\x4d\x45\x18\x15\x77\x53\x93\x33\x45\x26\x3e\x9f\x09\x6c\xc9\x52\x19\x48\x54\x76\x38\xc2\x36\x2f\x51\x90\x2c\x04\x00\x74\xcc\xc3\x5d\x9e\x8f\xe3\x98\xc9\x49\x65\x66\x5d\x9b\xeb\x13\xca\xe7\xf7\x9b\xd5\x7a\x5b\xac\xdf\xdd\x66\x37\x42\x3c\x1a\x4d\xde\xc3\xd1\xdf\x41\x39\xaa\x51\x1e\x21\x87\x41\xab\x4a\x96\x9a\xa0\xe5\x08\xeb\x20\x5b\x47\x54\x83\x6d\xd4\x39\x3a\xc5\xca\xb4\x29\xbc\x6d\x78\x94\x8e\x44\xad\x3c\x3b\x55\x06\x7e\x65\xd0\x45\x95\xf2\x78\x09\xb0\x06\xd2\x20\x59\x16\xd8\x14\x09\x7e\x5a\x16\x9b\x22\x15\x9f\x36\xfb\x5f\x76\x8f\x7b\x7c\x5a\x3e\x3c\x2c\xb7\xfb\xcd\xba\xc0\xee\x01\xab\xdd\xf6\xc3\x66\xbf\xd9\x6d\x0b\xec\x7e\xc6\x72\xfb\x19\x1f\x37\xdb\x0f\x29\x48\x71\x47\x0e\x74\x18\x5c\xd4\x6e\x1d\x54\xb4\x8e\xea\x4c\x14\x44\xaf\x9a\x37\xf6\x24\xc6\x0f\x54\xa9\x46\x55\xd0\xd2\xb4\x41\xb6\x84\xd6\x3e\x91\x33\xca\xb4\x18\xc8\xf5\xca\xc7\xe5\x79\x48\x53\x0b\xad\x7a\xc5\x92\xa7\xf7\x9b\x71\x32\x71\x9d\x0b\x31\xc8\xea\xaf\x48\x42\x86\xdd\x71\xb0\xca\xb0\x10\xaa\x1f\xac\x63\xcc\xc5\x2c\x69\x7a\x4e\xc4\x2c\xb1\x3e\x11\x62\x96\xb4\x8a\xbb\x50\x66\x95\xed\x73\x3f\x34\xef\xbf\xcb\x2b\x5b\x3a\x99\x88\x85\x10\x79\x8e\x55\x5f\xaf\x9f\x59\xf6\xe4\x99\x5c\xb4\x2c\xf8\xf3\x32\x5a\xd3\x59\xcf\x58\xc5\x9a\x4c\x3c\x49\xf7\x9f\x15\x3f\xe2\xdb\x89\x35\x5b\xd9\xbe\x97\xa6\xfe\x22\x66\x8f\x9e\xee\x00\x24\xff\x6a\x7c\xc7\x13\x38\x49\xc5\xac\xe8\xac\xe3\x3b\x24\xbf\x3a\x65\xd8\x4f\x03\x4a\xd7\x7a\x28\xbe\xf2\x18\xa4\x8f\xdd\xa5\xa9\x41\x07\xc5\x3e\x16\xdc\x5b\xd3\xde\xe1\x7f\x16\x64\xb1\xe2\x21\x98\xd8\xbf\x97\xca\xa4\xe2\xeb\x34\xeb\x3e\xc6\x7e\x70\xb6\x75\xb2\xc7\x70\x62\x92\x5a\x4f\x6c\x74\xa0\x2a\x70\x4c\xdd\x95\x8f\xd4\xa1\xa7\xe9\xfb\x99\x53\x34\xc1\x54\x13\xdd\xbc\xea\x6b\x5c\xbf\x9a\x37\x3d\xa9\xf9\xfd\xcf\x18\x34\xd3\x2e\xf0\x45\xcc\xf2\x1c\x85\xed\xe9\x72\x25\x6f\x7c\x80\x23\x2d\x63\x24\xe3\xd3\x23\xe6\xc1\xa9\x9a\xfc\xc5\xf3\x2b\x8f\x9a\x1a\x19\x34\xbf\xdc\x73\xa4\x9d\xee\xf3\x8c\x7a\x77\x9b\x4e\x22\x4f\x27\x1d\x4c\x15\x83\x73\x1a\xc1\x63\x54\x5a\xc3\x1a\x7d\x44\x65\xcd\x74\xb9\x53\x18\x43\x59\x9d\x64\x5f\xf9\x89\x6f\xc2\xce\xb3\xfc\xb2\xec\xb7\x52\xb9\x23\x7f\x72\x7c\x91\xa2\x0c\x8c\x91\x60\xce\x37\x39\x19\x89\x6b\xa9\xf5\x75\xc4\x3d\x33\xa6\x18\x3b\x55\x75\x31\x4d\x63\x77\x84\xf5\xd9\x32\xf6\xf1\x9d\x0d\xba\x46\x49\xa7\x42\xaa\xa1\x8c\x67\x92\x75\x26\x66\x4d\xcf\xd9\xb4\xe1\x66\x9e\x7c\xf3\xf4\x87\x49\xd2\x4b\xd9\x42\xcc\xac\xcf\xd6\x07\xc5\xf3\x9b\x85\xf8\x2a\xfe\x09\x00\x00\xff\xff\x08\xed\x42\xe3\x3d\x05\x00\x00") + +func testImagesAgnhostEntrypointTesterEpGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostEntrypointTesterEpGo, + "test/images/agnhost/entrypoint-tester/ep.go", + ) +} + +func testImagesAgnhostEntrypointTesterEpGo() (*asset, error) { + bytes, err := testImagesAgnhostEntrypointTesterEpGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/entrypoint-tester/ep.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostFakegitserverGitserverGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x93\x51\x6b\xe3\xc6\x17\xc5\x9f\x3d\x9f\xe2\x30\x0f\x7f\xec\xa0\x48\xde\xfc\xa1\x14\x97\x3e\xb8\xde\xa4\x6b\x36\x75\x20\x72\x1a\x96\x52\xf0\x58\xba\x96\x2e\x19\xcd\x68\x67\x46\x51\xcc\xb2\xdf\xbd\x8c\xec\xec\xda\xa4\xa5\x7d\xb3\x74\xaf\xce\x3d\xf7\x77\x8f\xb3\x0b\xb1\xb0\xed\xde\x71\x55\x07\x5c\x4d\xdf\xfd\x80\x75\x4d\xf8\xd8\x6d\xc9\x19\x0a\xe4\x31\xef\x42\x6d\x9d\x4f\x85\xb8\xe5\x82\x8c\xa7\x12\x9d\x29\xc9\x21\xd4\x84\x79\xab\x8a\x9a\x70\xac\x24\xf8\x9d\x9c\x67\x6b\x70\x95\x4e\x31\x8e\x0d\xf2\x58\x92\x93\x9f\xc4\xde\x76\x68\xd4\x1e\xc6\x06\x74\x9e\x10\x6a\xf6\xd8\xb1\x26\xd0\x4b\x41\x6d\x00\x1b\x14\xb6\x69\x35\x2b\x53\x10\x7a\x0e\xf5\x30\xe4\x28\x91\x8a\x4f\x47\x01\xbb\x0d\x8a\x0d\x14\x0a\xdb\xee\x61\x77\xa7\x5d\x50\x41\x08\x00\xa8\x43\x68\x67\x59\xd6\xf7\x7d\xaa\x06\x97\xa9\x75\x55\xa6\x0f\x5d\x3e\xbb\x5d\x2e\xae\x57\xf9\xf5\xe5\x55\x3a\x15\xe2\xc1\x68\xf2\x1e\x8e\x3e\x77\xec\xa8\xc4\x76\x0f\xd5\xb6\x9a\x0b\xb5\xd5\x04\xad\x7a\x58\x07\x55\x39\xa2\x12\xc1\x46\x9f\xbd\xe3\xc0\xa6\x4a\xe0\xed\x2e\xf4\xca\x91\x28\xd9\x07\xc7\xdb\x2e\x9c\x01\x7a\x75\xc5\x1e\xa7\x0d\xd6\x40\x19\xc8\x79\x8e\x65\x2e\xf1\xcb\x3c\x5f\xe6\x89\x78\x5c\xae\x3f\xdc\x3d\xac\xf1\x38\xbf\xbf\x9f\xaf\xd6\xcb\xeb\x1c\x77\xf7\x58\xdc\xad\xde\x2f\xd7\xcb\xbb\x55\x8e\xbb\x1b\xcc\x57\x9f\xf0\x71\xb9\x7a\x9f\x80\x38\xd4\xe4\x40\x2f\xad\x8b\xde\xad\x03\x47\x74\x54\xa6\x22\x27\x3a\x1b\xbe\xb3\x07\x33\xbe\xa5\x82\x77\x5c\x40\x2b\x53\x75\xaa\x22\x54\xf6\x99\x9c\x61\x53\xa1\x25\xd7\xb0\x8f\xc7\xf3\x50\xa6\x14\x9a\x1b\x0e\x2a\x0c\xcf\x6f\xd6\x49\xc5\x45\x26\x44\xab\x8a\xa7\x28\xb2\x53\x4f\x54\x71\xf0\xe4\x9e\xc9\x09\xc1\x4d\x6b\x5d\xc0\x58\x8c\x24\x5b\x29\x46\xd2\x50\xc8\xe2\x35\xa4\x10\x23\x59\x71\xa8\xbb\x6d\x5a\xd8\x26\xf3\xed\xee\xdd\xff\xb3\xc2\x6e\x9d\x92\x62\x22\x44\x96\x61\xd1\x94\x37\xea\x89\x7e\xe5\x90\x0f\x6a\x91\x5b\xe7\x8f\x17\xa9\x4c\x6d\x7d\xc0\x22\x7e\x90\x8a\x67\xe5\xde\xb6\xff\x8c\xff\x0d\x7a\xe9\xc2\x36\x8d\x32\xe5\x17\x31\x7a\xf0\x34\x03\x20\xa3\xcb\xcb\x6f\x36\x65\x22\x46\x79\x6d\x5d\x98\x41\x46\x09\x0f\x85\x8a\x03\xbe\x57\x6f\xad\xa9\x66\xd8\x3c\xd6\x64\x50\xda\x88\x28\x7a\x47\xa1\xad\xa1\xd7\x70\x69\x5b\x28\x1d\x4d\xcd\x7e\x9c\x4e\xa7\x32\x41\x8c\x78\xcf\x5a\x1f\xdb\x94\x01\x35\x6d\xd8\x0f\xd2\x8e\x5a\x0b\xa3\x1a\x2a\x21\xbf\x7d\x28\x63\x14\x86\xa7\x43\xbc\x0b\x65\xa0\xb4\xb7\xc3\x1f\xe4\xdf\x06\xa2\xd9\x5f\x46\xd5\xcb\xa8\x2a\x63\x32\x1d\xc5\x9f\x08\xb5\x3a\xcc\x4b\x37\x89\x18\xcd\x5d\xe5\x67\x38\x70\xf9\x4d\xbd\x70\xd3\x35\xab\xf8\x6e\x3c\x9d\x24\x62\x74\xdf\x99\x19\xd0\x28\x36\x89\xf8\x2a\xc4\xae\x33\x05\x6a\xd2\xda\x8e\xfb\x61\x6a\x7a\x4f\xbe\xb5\xc6\xd3\xa3\xe3\x40\x2e\x81\xc3\xc5\xf1\xfd\xe7\x8e\x7c\x98\xe0\x8b\x18\xb1\x4d\x87\x72\x1e\x1c\x9b\x6a\xdc\x27\x90\x4b\xa8\x06\x6a\x08\xc7\x29\xd9\x89\x88\x53\xb2\x0c\x27\x60\x37\xdf\xf7\x3c\x5f\x70\xf3\xdf\x89\x0e\x07\x38\x81\x99\x65\x78\xc3\xf3\x1f\xe7\x9c\x81\xdc\xfc\x2d\xc8\x03\x98\x88\x69\x5c\x34\x25\x2e\xce\x62\x96\x40\xb9\xca\xe3\x8f\x3f\xfd\xb0\xff\x80\x64\x60\xf4\x41\x99\x52\xd3\x4d\x67\x8a\xb1\xcc\x64\x72\x00\x3b\x39\x16\x6f\xd9\x07\x32\x73\x53\x0e\xe1\x1d\xcb\xd7\x10\x19\xd6\x13\xf1\x55\xfc\x15\x00\x00\xff\xff\x26\x09\x87\x2c\x9a\x05\x00\x00") + +func testImagesAgnhostFakegitserverGitserverGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostFakegitserverGitserverGo, + "test/images/agnhost/fakegitserver/gitserver.go", + ) +} + +func testImagesAgnhostFakegitserverGitserverGo() (*asset, error) { + bytes, err := testImagesAgnhostFakegitserverGitserverGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/fakegitserver/gitserver.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostGuestbookGuestbookGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xdc\x5a\x7b\x6f\xdb\x46\x12\xff\x9b\xfc\x14\x53\x02\xb6\xa9\x80\xa6\xd2\x16\xbd\x6b\x75\x27\x14\x8e\x93\x34\x6e\x5d\xdb\x67\xc9\x0d\x8a\x20\x68\x57\xe4\x88\xda\x13\xb9\xcb\xdb\x5d\x5a\xd1\x19\xfe\xee\x87\xd9\xe5\x4b\xb2\xfc\x6a\xd1\x03\xda\x00\x89\xa4\xe5\xec\xbc\xe7\x37\x3b\xcb\x0c\x5f\xf8\xc7\xb2\x5c\x2b\x9e\x2d\x0c\x7c\xf1\xf2\xf3\x6f\x60\xba\x40\xf8\xa1\x9a\xa1\x12\x68\x50\xc3\x51\x65\x16\x52\xe9\xd8\xf7\x4f\x79\x82\x42\x63\x0a\x95\x48\x51\x81\x59\x20\x1c\x95\x2c\x59\x20\xd4\x4f\x22\xf8\x09\x95\xe6\x52\xc0\x17\xf1\x4b\x08\x89\x20\xa8\x1f\x05\x83\x7f\xf8\x6b\x59\x41\xc1\xd6\x20\xa4\x81\x4a\x23\x98\x05\xd7\x30\xe7\x39\x02\x7e\x4a\xb0\x34\xc0\x05\x24\xb2\x28\x73\xce\x44\x82\xb0\xe2\x66\x61\x85\xd4\x2c\x62\xff\xe7\x9a\x81\x9c\x19\xc6\x05\x30\x48\x64\xb9\x06\x39\xef\x53\x01\x33\xbe\x0f\x00\xb0\x30\xa6\x1c\x0d\x87\xab\xd5\x2a\x66\x56\xcb\x58\xaa\x6c\x98\x3b\x2a\x3d\x3c\x3d\x39\x7e\x73\x36\x79\x73\xf8\x45\xfc\xd2\xf7\xaf\x44\x8e\x5a\x83\xc2\xff\x54\x5c\x61\x0a\xb3\x35\xb0\xb2\xcc\x79\xc2\x66\x39\x42\xce\x56\x20\x15\xb0\x4c\x21\xa6\x60\x24\xe9\xb9\x52\xdc\x70\x91\x45\xa0\xe5\xdc\xac\x98\x42\x3f\xe5\xda\x28\x3e\xab\xcc\x86\x83\x1a\xad\xb8\x86\x3e\x81\x14\xc0\x04\x04\x47\x13\x38\x99\x04\xf0\xea\x68\x72\x32\x89\xfc\xf7\x27\xd3\x77\xe7\x57\x53\x78\x7f\x74\x79\x79\x74\x36\x3d\x79\x33\x81\xf3\x4b\x38\x3e\x3f\x7b\x7d\x32\x3d\x39\x3f\x9b\xc0\xf9\x5b\x38\x3a\xfb\x19\x7e\x38\x39\x7b\x1d\x01\x72\xb3\x40\x05\xf8\xa9\x54\xa4\xbb\x54\xc0\xc9\x75\x98\xc6\xfe\x04\x71\x43\xf8\x5c\x3a\x65\x74\x89\x09\x9f\xf3\x04\x72\x26\xb2\x8a\x65\x08\x99\xbc\x46\x25\xb8\xc8\xa0\x44\x55\x70\x4d\xc1\xd3\xc0\x44\xea\xe7\xbc\xe0\x86\x19\xfb\xfb\x8e\x39\xb1\xff\x62\xe8\xfb\x25\x4b\x96\x96\x49\x85\xda\xcc\xa4\x5c\xfa\x3e\x2f\x4a\xa9\x0c\x84\xbe\x17\xa0\x48\x64\xca\x45\x36\xfc\xb7\x96\x22\xf0\xbd\x60\x5e\x18\xfa\xe0\x72\xc8\x65\x65\x78\x4e\x3f\x72\x99\xd1\x87\x40\x53\x7f\x0c\x29\x6c\xcd\xf7\x4a\x59\x22\x72\x9b\xc8\x34\x7d\x35\xbc\xc0\xc0\xf7\xbd\x20\xe3\x66\x51\xcd\xe2\x44\x16\x43\x5d\xce\x3f\xff\x72\x98\xc8\x99\x62\xf4\x88\x58\x0b\x34\x10\x2c\xbf\xd6\x31\x97\x43\x56\xf2\x82\x25\x0b\x2e\x50\xad\x87\xe5\x32\x1b\x12\xc1\xd0\x4a\x1c\xf8\xfe\x70\x08\xc7\x45\xfa\x5d\x63\x01\xc5\xa9\xd2\x75\x06\x64\x62\x21\xb5\x81\x63\xe2\x1c\xfb\xd7\x4c\x6d\x92\x8e\x61\xdf\x0a\x8d\x8f\x65\x51\x30\x91\xde\xf8\xde\x95\xc6\x11\x00\x04\xad\x47\x82\xc8\xf7\x26\x0b\xa9\xcc\x08\x82\x63\x85\x8c\x0a\x8a\xc1\xbb\xe9\xf4\x02\x34\xaa\x6b\x54\x2e\xcb\xaf\x99\xe2\xb2\xd2\x80\x22\x2d\x25\x17\x86\x52\x91\xc2\x8a\x82\x92\x0c\x58\xe7\x62\xca\x4b\x62\x7a\x2a\x45\x36\x82\x5f\x27\x86\x29\xb3\xcd\x52\x0a\x1b\xab\x8c\x5f\xa3\x80\xc3\x43\xf2\xe8\xa1\x0b\x4b\x8a\x73\x56\xe5\x66\x04\x5f\xbf\x1c\x44\x96\x9c\xd8\x3f\x4f\x7a\x6c\x01\xa2\xa3\x65\x22\x25\x71\x5c\x41\x59\xa9\x52\x52\x05\x2a\x1c\xf9\xfe\x21\x0c\x15\x66\x5c\x1b\x54\x23\x38\xea\xf1\x50\x68\x2b\x0b\x56\x3c\xcf\x41\x57\x33\x9d\x28\x3e\x43\xaa\x2b\x06\xa5\xe2\x05\x53\xeb\xc8\x56\x99\xd1\xad\x0d\xf5\x1e\x39\x6f\x05\x3b\x35\x6a\x7a\xc7\xcb\x2c\x50\x40\x59\xe9\x05\x30\xb1\x86\xaa\x4c\xad\xbb\xb9\x01\x85\x09\xf2\x6b\xd4\x0d\xd7\x46\x2f\x4c\x1b\x65\x34\x98\x85\x92\x55\xe6\x00\xe7\xf0\x70\xc6\x92\x25\x8a\xd4\xba\x2d\x26\x53\x32\x34\x23\xb8\x44\x53\x29\xa1\xe1\xe0\x26\x48\x99\x61\xc1\x08\xae\x59\x5e\xe1\xed\x41\x04\xab\x05\x2a\x57\x74\x76\x89\xf2\xc8\x56\x9c\x91\x24\xc5\xad\x35\x65\xe8\x8c\x5a\xe2\x1a\xf8\x1c\x84\x14\x87\x58\x94\x66\x1d\x41\xfd\x98\xdc\xae\xea\xad\x56\xb6\x26\xd9\xef\xad\xb7\xd0\x6c\x72\x38\x74\x9c\x4b\xc6\x15\xa1\x12\x19\x27\x57\xc2\xed\xb5\x91\x29\x95\x2c\x59\xc6\x0c\x92\x1f\x5a\xf3\x9d\xcd\x11\xc9\x67\x62\x1d\x3b\xe6\xca\x5a\xd7\x33\x2e\xb8\xb2\x2e\x4c\x83\xdb\x03\xda\x4a\x82\x13\x96\xe7\x2e\xc3\x74\x95\x24\xa8\xb5\x73\x4e\x13\xdb\x5a\xcd\x52\xc9\x4f\x6b\x4b\x4f\x88\x8a\xda\x4a\xae\xcb\xe9\xb0\x09\x19\x9f\xf7\x4c\x49\x8a\x94\x5c\x76\xa0\xd1\x1c\x44\x0e\x6c\x1d\x75\x93\x2c\x3b\xa9\x33\x34\x07\xf1\xaf\x91\xef\x1d\xa9\x4c\x8f\xc0\x55\xe3\x8f\xec\x13\x2f\xaa\xe2\x8c\xd6\xc2\x97\x83\xc8\xf7\x2e\x2b\x31\x02\x28\x18\x17\x91\x7f\xeb\xdb\x42\x0e\x7d\x8f\xca\xe2\x82\xaa\x02\x00\x1c\xc2\xf8\x5e\x1d\x76\xbb\xdc\xac\xd5\x1a\x9c\xcf\x7b\x74\x6d\xd6\x00\xc0\x87\x8f\xcd\xaa\xf3\xba\xfb\x53\xb0\xf2\x83\x5b\xff\xc8\x85\x41\x35\x67\x09\xde\xdc\x12\xe2\x24\x52\x68\x8b\x90\x84\x65\xb2\x32\x30\x06\xfa\x16\xbf\xae\x94\x85\xdb\xf0\xf3\xaf\x06\xf0\xc2\xad\x4d\x30\x91\x22\xf5\x3d\x9d\x23\x96\x00\x77\x49\xb7\x29\x07\xbe\x3f\xaf\x44\x02\x5c\x70\x13\x0e\xe0\xc6\xf7\xfa\x90\x15\xbf\xcd\x59\xa6\xc3\x41\x3c\xb1\x9a\xfd\xc4\x54\xb8\xdf\xb8\x21\x82\xa0\x05\x8a\x20\x82\xe0\xeb\x97\xf4\xaf\x85\x95\x53\x2a\x16\x01\x44\x15\x0c\x1e\xe7\xd8\x73\x62\x04\x41\xbf\x92\x88\xe3\xdf\xbe\xfc\xfb\x37\xf4\xf9\xca\xad\x1f\x68\xf8\x2d\x32\xda\xa0\x44\x10\xb4\xd8\x40\x6c\xe9\x2f\x01\x03\x25\xcf\x81\x06\xc1\x0a\x8b\x2c\x4d\xc5\x83\x91\xc4\xde\x45\x6a\x0c\x05\x5b\x62\xb8\x3b\x54\x03\x4a\x15\xeb\x4b\x4a\x9c\x90\x52\xee\xc5\x06\xdc\x47\xc0\x54\xa6\xdb\xf0\x5b\x67\x67\x9d\xa4\x33\x99\x62\xd8\x53\xb3\xe7\x15\xab\x00\x53\x86\x0c\x9f\x58\xc8\x0e\x9b\x28\x74\x52\xb7\xf8\xb8\x1f\x53\x19\x41\xd9\x25\xa7\x95\xc9\xe7\xd0\x3d\x86\xf1\x18\x82\x80\x96\x3d\x57\xce\xbe\x77\xeb\xfb\x1e\x79\xc3\x26\xf5\x68\x0c\x02\x4d\xfc\xbd\xe4\xe2\x5d\xbd\xb6\xc1\x7c\x43\xcb\x5a\x4d\xda\x64\x73\xec\x4c\xae\xc2\x81\xef\x59\x18\xb3\x39\xc7\x45\x82\xa1\xa5\x19\xc0\x3f\xa1\xc9\x67\x12\x4e\x02\x23\x40\xa5\x68\x73\x86\xe6\xe4\x22\x6c\x74\x18\xf8\x1e\xe9\x4c\xcf\x3e\x1b\x83\xe0\xb9\xdd\xe0\xe5\x32\x8b\x2f\x14\x17\x66\x1e\x06\x95\xb0\xe7\x2e\x23\x69\x2b\x9c\x5c\xc0\x9e\x1e\xc1\xde\x75\x4c\x00\xac\xd6\xd4\x93\xb8\x80\x3d\x1d\x07\x11\x34\x5c\xad\xb0\x08\x6c\xa1\x90\x04\xcf\x69\x48\x3f\xc3\x6e\x31\x91\xd4\xd2\x2a\xf4\x3d\xeb\x16\xaf\x81\xa7\xd1\x18\xe6\x85\x89\x27\x65\xad\x40\xe3\x92\x6f\x89\xfd\x78\x4f\xd7\x82\xea\x0c\x0c\x07\xc4\xac\xaf\xf0\x65\x4d\x4f\xaa\x19\xd9\x74\xa5\x11\xec\xe9\x61\xbb\xd9\x69\x59\x4b\x24\x06\xbf\x38\x07\xb9\x88\x5c\xa2\x96\xf9\x35\x4e\x8f\x2f\x8e\xd2\x54\x85\x81\x49\xca\xde\xbe\x67\xf9\x4c\x39\x56\xb0\xa7\xa3\x8d\xce\x59\x32\xc5\x0a\x6a\x0a\x43\xa9\xb6\x5a\x5c\xf3\x4c\x21\x70\x71\xcd\x72\x9e\xfe\x51\xfe\xd6\xa5\xb4\x83\x42\x9d\x1a\x29\x67\x39\x95\x41\x58\xfb\xe5\x59\x26\xd3\x09\xb3\x12\xae\x8f\xa3\x52\x52\xc1\x6a\x41\xd3\x84\xba\x2f\x1a\x3b\x2d\xfa\x3d\x76\x7c\x3f\x39\x3f\x23\x33\x1e\xc4\x11\xcf\x73\x61\xa6\x73\x70\x7c\x25\x0a\xa6\xf4\x82\xe5\xe1\x87\x8f\xb3\xb5\xa1\xd2\x76\xac\x06\x11\xec\xf7\xd9\x3e\x60\xff\x5b\x66\x58\x3e\x0f\x83\x37\x3d\x9b\xab\x86\xaf\x3d\xcb\x3b\x8b\x0f\xa8\xd5\x3b\x8e\x64\xbc\xb3\x75\xd0\xd8\x40\x6d\x50\x2e\x61\x26\x65\xee\x7b\x0e\x11\x23\xb0\xc7\xda\xbe\x1a\x1f\xdc\x61\xe0\x63\xfc\x80\x79\x7c\x0e\x9f\xc9\xe5\x5d\xfd\x8e\x65\x95\xa7\x76\xda\x4b\x98\x36\x1b\x6c\xa9\x34\x82\x68\xa7\x24\xa7\xe0\xee\xfa\x72\xe3\x97\x90\x29\xb6\x0c\x1a\xec\x1a\x6c\x41\x5e\xab\x48\x18\x4c\x79\x41\x23\x57\x65\x1e\xcc\x8f\x38\xe8\xc0\x77\x1b\x9e\xb7\x31\x97\xe0\x3a\x7e\xc7\x44\x9a\xe3\xdb\x4a\x24\x61\xd0\x1e\x75\x7b\x3a\xb9\xe7\xe4\xf0\xbb\xe4\x19\x52\x33\xcc\xd0\x3c\x44\xa4\x2d\x91\x7e\x98\xa8\x37\x6a\x74\x67\xec\x6e\x43\xe7\x06\xbb\xd5\xb5\xd9\x23\x91\x5a\xc3\xc2\x0d\xd0\x1b\x59\x8f\x92\xa9\x83\x88\x12\x6e\x60\xfd\x31\x1c\x6e\x1b\xe4\x0e\xdb\x5d\x47\xed\x8e\x85\x5c\xb8\x99\xde\xcd\x21\x07\x1a\x72\xae\x0d\xcd\xe7\xcd\x79\x29\x26\x76\x64\x57\x83\x83\xda\x31\x9b\x61\x77\x50\x4d\x1d\x86\x6d\x1d\x51\x37\x9b\x62\xad\x49\xb8\xb2\x53\x3e\x81\xa7\x4d\xa3\xf7\x8a\x1b\x54\x11\x28\x78\x51\xaf\x3b\xb0\xa5\x90\xd9\x83\xb2\x6e\x81\xa7\x52\x79\x7c\xc1\x94\xc6\x50\xc5\x57\x97\xa7\x0d\xe9\xd5\xe5\x89\x45\xf7\xbb\x95\x67\x19\xda\x8a\x0b\x57\xd1\x66\xb7\x68\x4b\x2b\x72\xea\x4c\x0c\x33\x95\x7e\xc5\xd2\xcb\x0e\xec\xfb\xa9\xc9\x4b\xd2\xc0\x29\x14\xff\xab\x42\xb5\x0e\x07\xf1\x77\x68\xc2\x80\xc0\x2f\xa8\xa3\xd6\xe4\xfe\x77\x6f\xa6\xdd\x24\xd5\x6b\x48\xbc\xa4\x0e\x3d\x1c\x82\x46\x91\x02\x73\xf3\x4f\x7d\xf2\xaf\x4f\xeb\xcd\xe1\x99\x69\x58\x61\x9e\xc7\xbe\x27\x2b\x53\x56\xe6\x71\xc8\x72\x74\x4d\x49\xc2\xd8\xf1\xf5\x3d\x82\xac\xce\x89\x16\xd1\x7e\xac\xf1\xcc\x6d\x79\xae\xef\x1a\x04\x80\xa4\x05\x8b\x19\x52\x02\x71\x96\xf3\xff\x62\x1a\xc3\x6e\xef\xbe\xf9\x54\x62\xe2\xee\x27\xde\x32\x9e\x63\xba\xe9\x64\x8f\x84\xbc\xb5\x42\x48\xa4\xb3\x31\xb4\xda\x53\x78\xdb\xf3\xfb\x98\x26\x5a\x14\x69\xd8\x4b\xb8\x72\x2b\x00\x74\x02\x83\x83\x3d\x7d\xd0\x9b\x1b\xe3\x3a\x00\xae\x40\xba\x3a\x6e\x6a\x63\x6b\x92\xda\x1a\x13\x1f\x1c\x11\x89\xe1\x23\x53\xe2\xe6\x84\x68\x2b\xa3\x53\xe1\x4f\x5a\x14\x64\xe8\x3d\x55\xb1\xc4\x75\x30\xf0\x77\x54\x45\x86\xe6\xdb\x25\xae\x5d\x3d\x2c\x71\x4d\x44\x4f\xcd\x70\x3e\xb7\xbe\xed\xce\xcb\xf7\xa5\xfc\x2d\x60\xae\xd1\x92\x58\xe5\x22\x98\xcb\x4a\xa4\x24\xc1\x52\x7c\x58\xe2\xfa\x63\xdd\x05\xdd\x13\xdb\x08\x5d\x3c\x89\x7b\xdd\xcf\xee\xf0\xb7\x14\xce\xf8\x67\x94\xd5\xb8\xf3\xfe\xc3\x39\xde\xd3\xfb\xff\x54\x7f\xb7\x75\x39\xe8\xad\x72\xf8\x1d\xb7\x16\xc4\xee\x19\x17\x17\x05\x6a\xcd\x32\x7c\xf2\xdd\x85\x6b\xf6\x7f\xf9\xd2\xa9\x93\xf1\x1e\x1a\xbb\xb6\xbb\xc0\x74\x5b\x60\xfb\x96\xaa\xad\xb4\xc8\x71\xa2\x4d\x77\x0a\x69\xd3\xb2\x20\x61\x82\xb2\x8a\x92\xc0\xde\x75\x5a\x18\xa3\x2d\x76\x9c\x78\x8a\x7d\x5d\x99\x75\x55\x73\xdf\xe4\xf6\xb8\xc6\x76\x7e\xfd\x25\x6a\x9b\xe3\x68\x0c\x8a\x89\x0c\xbb\xab\xc0\x66\x80\x7d\x60\x62\xb6\x94\xdb\x43\x7d\x37\xd1\x3d\x7b\xac\x79\x20\x1b\xee\x9b\x72\x9a\x1a\xa9\x4f\xb1\x8d\x39\xd4\xa8\xea\xd3\x7e\xab\xe6\xd3\xba\x67\xeb\x73\x82\xab\xdb\x2d\x28\x6d\x51\xd4\x7d\xdc\xdc\x76\x67\x84\xa6\xe8\x28\x3a\x6d\xd9\xfd\xd5\x30\x6d\xfb\x68\xed\x90\xed\xb7\x5e\x74\x12\x47\x7b\xd7\xf9\xbc\xab\xce\xba\xd5\x6f\xa9\xf2\x27\x45\x2d\xb2\xcc\xf6\x50\xfb\x72\x27\x9e\xca\x53\xb9\x42\x15\xee\x42\xa8\xa4\x48\x03\xd2\xe7\x8f\x03\xba\xd6\xa7\xdf\x26\x45\x4a\xe0\x71\x17\x43\x92\x22\xdd\x01\x7d\x64\xc5\x67\x63\x08\x68\xa0\x83\xfd\xfd\xf6\x37\xcd\x6e\x8f\x79\xac\x12\xba\x2a\x69\xde\xc2\x94\xf6\x8d\x6c\xed\x3a\x49\x4f\x73\x62\xa3\xc0\xb8\x11\xb8\xbf\xff\x47\x63\xb1\x7d\x23\x36\x1a\x43\xb0\x95\xe5\xc1\x86\x32\x59\x6b\x3d\x91\xf7\xa8\xeb\x1c\x0f\x9e\x70\x2d\xe9\xae\x10\x37\x11\xf6\x79\x57\x66\xcf\x4a\x5f\xab\x69\x7d\x39\xb6\xfb\x4a\xec\x3e\xd8\xb8\xdf\x59\xf7\x35\xa9\x3d\xbd\xa3\x47\xdd\xc9\xaf\x67\xde\x96\x3d\x86\xa5\xed\x45\xd3\x53\x61\xf4\x4e\xe3\x19\x3d\x17\x37\x2d\x5c\xdd\xaf\x74\x7b\xa3\x12\xba\x2f\x91\x13\x63\x81\xca\x28\x26\x74\x59\xe7\x46\xfd\x4a\x37\x9e\xa0\x99\x36\xeb\xaf\xdd\xab\x4c\xed\xde\x60\xc4\xed\xba\x3d\xdc\xd3\xd2\x71\xce\x51\xd8\xed\x89\x7d\xf1\x4a\x3a\xb8\xb5\xb0\x65\x5e\x3b\xb9\x75\x70\xb7\xcf\x22\xc6\x66\x82\xb8\xff\x4f\x70\xff\x95\xee\xc0\xf7\x52\x9c\xa3\x82\x96\x7d\x7c\x9c\x4b\x8d\x27\x69\x8e\xc7\x52\x08\x4c\xec\xdb\xf4\x70\x67\xac\xdc\x4e\x52\x26\x7e\x25\xd3\xb5\xdb\x49\xa4\xde\x4c\xa6\xeb\x56\x41\xf7\xe6\x3c\xbe\x44\x96\x1e\xe5\x79\xd8\xd2\xf7\x8e\x15\x3d\xa6\x75\x32\xb6\x6d\x94\x08\xed\xd5\x4e\xd3\xe3\x1b\x82\xc0\x85\xb5\x8d\xd9\xfd\x1e\xab\x7b\x4a\xeb\xee\x41\xbd\x50\x7b\xfb\xc6\xf7\x92\xd6\xef\xfb\xbd\x27\xa4\x4e\xbb\x69\xd4\xb9\x28\xa2\x75\xf7\xe2\x60\x04\x00\x5f\x6d\xbe\xcf\x8a\xfa\x4a\x3a\xc6\xad\x8e\x9b\x6f\x15\xba\x5c\xa2\x44\x39\xb9\xe8\xe7\x52\x22\x85\x68\x3d\x48\x8f\x5f\x73\x96\x87\x41\x95\x3e\x8a\x17\xb5\x64\x77\x55\x7b\x73\xeb\x9c\x44\x2a\xb9\x70\x11\xe3\x36\x52\xd4\x55\x12\x96\x13\x16\xd9\xa4\xa3\x67\xa7\xcd\x4a\x38\x88\xc3\x17\x24\xfa\xea\xb5\x45\xab\x41\x6b\x55\xbb\xc9\x2a\x4d\xb1\xb9\xf5\xff\x17\x00\x00\xff\xff\x64\x37\x6c\x48\x94\x23\x00\x00") + +func testImagesAgnhostGuestbookGuestbookGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostGuestbookGuestbookGo, + "test/images/agnhost/guestbook/guestbook.go", + ) +} + +func testImagesAgnhostGuestbookGuestbookGo() (*asset, error) { + bytes, err := testImagesAgnhostGuestbookGuestbookGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/guestbook/guestbook.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostInclusterclientMainGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x56\x7f\x6f\xdb\x38\x12\xfd\x5b\xfc\x14\x73\x02\x5a\x48\x81\x42\xa5\xd9\x6b\x71\xe7\xdb\x1c\xe0\xcd\x8f\x5b\x63\x73\xf1\xc2\x76\xb7\x58\xb4\xc5\x95\x96\x46\x12\x11\x89\x54\xc9\x51\x5c\xb7\x97\xef\x7e\x18\xca\x71\x9c\x36\xf7\x97\xc5\x21\x67\xf8\x38\xef\x3d\xd2\xf9\x91\x38\xb7\xfd\xd6\xe9\xba\x21\x38\x3d\x79\xf5\x77\x58\x35\x08\xbf\x0d\x6b\x74\x06\x09\x3d\x4c\x07\x6a\xac\xf3\x52\x88\x6b\x5d\xa0\xf1\x58\xc2\x60\x4a\x74\x40\x0d\xc2\xb4\x57\x45\x83\xb0\x9b\xc9\xe0\x0f\x74\x5e\x5b\x03\xa7\xf2\x04\x12\x5e\x10\xef\xa6\xe2\xf4\x1f\x62\x6b\x07\xe8\xd4\x16\x8c\x25\x18\x3c\x02\x35\xda\x43\xa5\x5b\x04\xfc\x52\x60\x4f\xa0\x0d\x14\xb6\xeb\x5b\xad\x4c\x81\xb0\xd1\xd4\x84\x4d\x76\x25\xa4\xf8\x73\x57\xc0\xae\x49\x69\x03\x0a\x0a\xdb\x6f\xc1\x56\x87\xab\x40\x91\x10\x00\x00\x0d\x51\x3f\xc9\xf3\xcd\x66\x23\x55\x40\x29\xad\xab\xf3\x76\x5c\xe5\xf3\xeb\xd9\xf9\xe5\xcd\xf2\xf2\xf8\x54\x9e\x08\xf1\xd6\xb4\xe8\x3d\x38\xfc\x3c\x68\x87\x25\xac\xb7\xa0\xfa\xbe\xd5\x85\x5a\xb7\x08\xad\xda\x80\x75\xa0\x6a\x87\x58\x02\x59\xc6\xb9\x71\x9a\xb4\xa9\x33\xf0\xb6\xa2\x8d\x72\x28\x4a\xed\xc9\xe9\xf5\x40\x4f\x1a\xf4\x80\x4a\x7b\x38\x5c\x60\x0d\x28\x03\xf1\x74\x09\xb3\x65\x0c\xbf\x4c\x97\xb3\x65\x26\xde\xcd\x56\xbf\xce\xdf\xae\xe0\xdd\x74\xb1\x98\xde\xac\x66\x97\x4b\x98\x2f\xe0\x7c\x7e\x73\x31\x5b\xcd\xe6\x37\x4b\x98\x5f\xc1\xf4\xe6\x4f\xf8\x6d\x76\x73\x91\x01\x6a\x6a\xd0\x01\x7e\xe9\x1d\x63\xb7\x0e\x34\xb7\x0e\x4b\x29\x96\x88\x4f\x36\xaf\xec\x08\xc6\xf7\x58\xe8\x4a\x17\xd0\x2a\x53\x0f\xaa\x46\xa8\xed\x1d\x3a\xa3\x4d\x0d\x3d\xba\x4e\x7b\x26\xcf\x83\x32\xa5\x68\x75\xa7\x49\x51\x18\xff\x70\x1c\x29\x8e\x72\x21\x7a\x55\xdc\x72\x11\x6d\x8a\x76\xf0\x84\xae\x68\x35\x1a\x12\x42\x77\xbd\x75\x04\x89\x88\xe2\xc2\x1a\xc2\x2f\x14\xf3\xa7\xdb\xf6\x64\x73\xdf\xa8\xd3\xd7\x6f\x38\x80\xa6\xb0\xa5\x36\x75\xbe\x56\x1e\xdf\xfc\x95\x43\x55\xab\xea\xf0\xdb\x85\x94\xd6\x86\x91\x41\xca\x99\x4e\xfe\x26\xdd\x61\x2c\x44\x14\xd7\x9a\x9a\x61\x2d\x0b\xdb\xe5\xbe\xaf\x5e\xfd\x94\x17\x76\xed\x54\x98\xba\xfd\x9b\x97\xda\xe6\x23\x9c\xe3\xda\xe6\xb7\x7b\x39\xc7\xcf\x4d\x3b\xf4\x74\x38\x61\xbb\xde\x1a\x9e\x63\x60\x79\x6b\xeb\xc3\xb4\xdb\xd6\xd6\xf9\xdd\x69\x2c\x52\x21\xee\x94\x83\xde\xb6\xed\xcc\x10\xba\x3b\xd5\x82\xe6\xe3\xe7\x39\x9c\x77\xe5\xcc\x9c\x8f\x5d\x39\x0f\xfb\xb0\x02\x06\xbf\xd3\x56\x6d\x1a\xeb\x09\xce\x19\xb1\x0c\x55\x9e\x49\x38\x83\x97\xe1\x48\xf2\xdc\x76\x9d\x32\xe5\x37\x11\xbd\xf5\x38\x01\x80\xf8\xbb\x8e\xc7\x99\x88\x96\x8d\x75\x34\x81\xf8\x77\x74\xda\x96\xba\x50\x6d\xbb\x0d\xd8\x02\x6f\x07\x7e\xfe\x10\xe7\x0d\xaa\x96\x9a\xaf\x1f\x62\x40\x53\xf6\x56\x8f\x15\xae\xad\xa9\x27\xf0\xe9\x87\x02\xfe\xfb\x0a\xfb\x02\x8f\xf9\x30\x78\x16\x11\x2f\xd4\xe6\x78\x07\x0e\x0a\x6b\x2a\x5d\x4b\xf8\x05\x0b\xc5\x86\x0f\x4e\xd5\x3e\x1b\x9d\xef\x87\x75\x31\x9e\x8c\x7b\xd3\xa1\x32\xc4\xe6\x5a\x23\xb8\xc1\x80\x36\x5e\x97\x21\x45\x1d\xee\xdd\xdb\x52\x0a\xb1\xfa\x2e\xbf\x50\x06\x54\xeb\x43\x72\x68\x32\x59\xb8\x53\xad\x2e\x15\x21\x90\xbd\x45\x03\xce\x8e\x6a\x96\x9f\x32\x11\x4d\x5d\xed\x27\x30\x76\xf7\xdf\xea\x8b\xee\x86\xee\x86\x63\xc9\x49\x9a\x89\x68\x31\x98\x09\x40\xa7\xb4\xc9\xc4\xbd\x10\xd5\x60\x0a\xd0\x46\x53\x92\xc2\x37\x11\xfd\xc8\x94\xbc\x6a\x55\xed\x93\x54\xce\x0c\xfd\xa1\x5c\xf2\xf2\x50\x12\x19\xc4\x3c\x3c\xd6\xbb\x71\x9c\xc1\x4f\x27\x99\x88\xa2\x10\x86\x87\x30\x1f\x94\x5b\xce\xc8\x1f\xda\xcb\xf7\x8c\xc7\xc2\x9a\xd2\xc7\xe9\x1e\x09\xe3\x4a\x8a\xae\x84\xa3\x27\xea\xc8\x40\xb9\xda\xc3\xfb\x8f\x7c\xc9\x98\x3a\x40\x65\xe5\xca\x99\xd1\x74\x6d\x19\x9f\x88\x4a\xac\xd0\x41\x08\x5f\xb5\x83\x6f\x76\x71\x11\xb1\xef\xe4\x12\x29\x61\xcb\x91\xf5\x54\xa2\x73\x71\x06\x31\xb9\x01\x63\x5e\xc1\xb2\x97\x33\x53\xd9\x2a\x89\x3d\x29\x47\x58\x86\x78\x51\xd5\x19\xa0\x73\x30\x39\x03\xf6\x91\x7c\x6c\x4e\x60\x9f\xb7\xd5\x55\x58\xf1\x97\x33\x30\xba\x65\x60\x8c\x4c\x5e\x29\x52\x6d\x95\xc4\xe8\xdc\x04\x5e\xdc\xc5\xa1\x4c\x2a\xa2\xfb\xb1\xaa\x7c\xe7\x54\x9f\xf0\x91\x13\x47\xe1\x36\x97\x0b\x3b\x98\x72\xe5\x74\xdf\xa3\x4b\x7f\x0c\x85\xca\x0e\x69\x70\x06\x5e\x96\xb8\x1e\xea\x05\x71\x28\x62\x63\x38\xe2\xa6\xdf\x8b\xe8\x3e\xa0\x66\xb8\x8f\xb7\x82\xbc\xc1\xcd\x95\xdd\x21\x9e\xbb\x0b\x8d\x49\x51\xd5\xa9\x5c\x5c\x2e\x57\x23\xc7\xa1\x4b\x79\xde\x6a\x43\x13\x5d\x1b\xeb\x10\x96\xd3\x57\x27\xaf\x5e\x83\xb1\xda\xb3\x51\xbc\x26\x7d\x87\x19\x7c\xe2\x1b\x4a\xae\x74\x71\xfb\x69\xef\xf9\xf0\x58\x31\x71\xc0\xe7\x61\x19\xc2\xa6\xd1\x45\x03\xe1\x01\x34\x28\x22\x62\x40\xfb\xcc\x24\x7c\x5d\x0c\x2e\x48\x36\x39\xd4\x53\x0a\x47\xe3\xba\x65\x50\x46\x2a\x22\xbe\xdd\xf9\x98\x3f\x1f\x93\x88\x9e\xf0\xc4\x82\x62\x5b\xee\xfd\x9a\x8a\x28\x5a\xef\xe9\x2a\xe4\xbf\x90\x92\x54\x4e\xd7\xfe\x77\x45\x4d\xf2\xe8\xeb\x54\x5e\xd8\x64\x77\x75\xcb\xd5\xfc\x62\x9e\xa4\xa9\x5c\xa8\x0d\x93\xf9\x0c\x9b\xe3\xa6\x97\xce\x59\x37\xaa\x83\x06\x7f\x56\x29\xdd\x06\x8d\x7c\x3f\x8f\xfc\x0b\x45\x83\xc5\xed\x21\x38\xd6\xc0\x07\xf3\xc2\x7f\x30\xa3\x12\x32\x18\x95\x9c\xac\xd3\x74\xc7\x1c\x7b\x80\xb6\x3d\xc2\x8e\x5c\x5e\x31\x14\xc4\x18\x9e\x93\xc8\xde\x32\x2c\xa0\xa3\x5d\x4e\x0a\xfb\x25\x89\xc3\xcf\x70\x34\xa6\xe1\xe7\x01\x3d\xa5\x90\x3c\x8c\x7d\x6f\xc3\x3f\x9a\x80\x36\xb8\x49\x0d\xd4\xfc\x8a\x8a\x9f\xc2\xa0\xf5\xcf\x72\x1c\x85\x2e\xc6\xe3\xdf\x24\xfd\x35\x30\x16\x8f\xa2\x6f\xd1\x24\x8f\x59\x29\xb7\xec\x24\x34\x2c\x04\x95\x6f\xb8\xd0\xf8\x1e\xca\xe5\xd0\x9d\xbe\x7e\x93\xbc\xff\xb8\xde\x12\x26\x55\x47\x72\xd9\x3b\x6d\xa8\x4a\xe2\x17\xfe\xbf\x2f\x3c\x9b\xd1\xab\x96\xe2\x0c\x0e\x4a\x86\xd6\x1c\x52\xce\x73\x5f\xff\xd3\x84\xd9\xb3\x90\x35\x3e\xae\xcc\xde\xdb\xc5\xf5\xe5\xee\xc9\x95\xe1\x03\x57\x76\x39\xf6\xf8\x01\xd0\xfb\xc9\x47\x2e\x79\x0f\xd8\x7a\x0c\x50\x9f\x50\xf7\xa4\xfa\xcf\xd8\xf5\xb4\xfd\x67\x1c\x2c\xfb\xe0\x3b\x47\xd2\x91\x7c\xd2\xe2\xf4\xff\xf0\xc0\xfe\xee\xb1\x3c\x64\x2c\x79\xd6\xd5\x70\x58\x1b\xee\xc5\xff\x02\x00\x00\xff\xff\xef\x41\xba\xf3\xb3\x0a\x00\x00") + +func testImagesAgnhostInclusterclientMainGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostInclusterclientMainGo, + "test/images/agnhost/inclusterclient/main.go", + ) +} + +func testImagesAgnhostInclusterclientMainGo() (*asset, error) { + bytes, err := testImagesAgnhostInclusterclientMainGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/inclusterclient/main.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostLivenessServerGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x54\x5d\x6f\xdb\x36\x17\xbe\x16\x7f\xc5\x79\x09\xf4\x85\x14\x68\x92\x9b\x6d\x40\xe1\xa1\x03\x5c\x37\x59\x8c\x7a\x0e\x66\x25\x0b\x8a\xa2\x17\xb4\x74\x24\x11\xa5\x48\xe5\x90\xb4\xe3\x15\xf9\xef\x03\x25\x7b\x88\xbb\x14\xd8\x8a\x5d\x59\x1f\xcf\x79\xbe\x8e\xe8\xfc\x8c\xcd\x4d\xbf\x27\xd9\xb4\x0e\xce\x27\x2f\x7f\x80\x9b\x16\xe1\x9d\xdf\x20\x69\x74\x68\x61\xe6\x5d\x6b\xc8\x66\x8c\x2d\x65\x89\xda\x62\x05\x5e\x57\x48\xe0\x5a\x84\x59\x2f\xca\x16\xe1\xf0\x26\x85\xdf\x91\xac\x34\x1a\xce\xb3\x09\xc4\x01\xc0\x0f\xaf\x78\xf2\x13\xdb\x1b\x0f\x9d\xd8\x83\x36\x0e\xbc\x45\x70\xad\xb4\x50\x4b\x85\x80\x0f\x25\xf6\x0e\xa4\x86\xd2\x74\xbd\x92\x42\x97\x08\x3b\xe9\xda\x41\xe4\x40\x91\xb1\xf7\x07\x02\xb3\x71\x42\x6a\x10\x50\x9a\x7e\x0f\xa6\x7e\x8a\x02\xe1\x18\x03\x00\x68\x9d\xeb\xa7\x79\xbe\xdb\xed\x32\x31\xb8\xcc\x0c\x35\xb9\x1a\x51\x36\x5f\x2e\xe6\x17\xab\xe2\xe2\xbb\xf3\x6c\xc2\xd8\xad\x56\x68\x2d\x10\xde\x7b\x49\x58\xc1\x66\x0f\xa2\xef\x95\x2c\xc5\x46\x21\x28\xb1\x03\x43\x20\x1a\x42\xac\xc0\x99\xe0\x73\x47\xd2\x49\xdd\xa4\x60\x4d\xed\x76\x82\x90\x55\xd2\x3a\x92\x1b\xef\x4e\x0a\x3a\xba\x92\x16\x9e\x02\x8c\x06\xa1\x81\xcf\x0a\x58\x14\x1c\xde\xcc\x8a\x45\x91\xb2\xbb\xc5\xcd\xd5\xf5\xed\x0d\xdc\xcd\xd6\xeb\xd9\xea\x66\x71\x51\xc0\xf5\x1a\xe6\xd7\xab\xb7\x8b\x9b\xc5\xf5\xaa\x80\xeb\x4b\x98\xad\xde\xc3\xbb\xc5\xea\x6d\x0a\x28\x5d\x8b\x04\xf8\xd0\x53\xf0\x6e\x08\x64\xa8\x0e\xab\x8c\x15\x88\x27\xe2\xb5\x19\xcd\xd8\x1e\x4b\x59\xcb\x12\x94\xd0\x8d\x17\x0d\x42\x63\xb6\x48\x5a\xea\x06\x7a\xa4\x4e\xda\xb0\x3c\x0b\x42\x57\x4c\xc9\x4e\x3a\xe1\x86\xfb\xbf\xc5\xc9\xd8\x59\xce\x58\x9e\xc3\x0c\x6c\x50\x45\xb0\x48\xdb\x01\x23\x5c\xc8\x2a\x94\xdc\x8e\xba\x2f\x27\x60\xb1\x34\xba\xb2\x69\x60\xd0\x40\xd8\x1b\x72\x81\xb4\x45\xa1\x5c\xbb\x0f\xb0\xc0\x15\xf8\x09\xad\x0b\x0b\x95\xce\x42\xdc\x9a\x1e\x6b\xaf\xd4\x3e\x01\xdb\x1a\x72\x80\x0f\xd2\x3a\xd4\x25\x66\x8c\xf5\xa2\xfc\x14\x12\x04\x21\x8d\xd6\x32\x26\xbb\x40\x0c\x31\x8b\x78\xdd\x39\xce\x22\xae\x4c\x13\x7e\x34\xba\x3c\x7c\x0d\xc7\x6b\x4f\x2a\x5c\x3a\xd9\x21\x67\x2c\xe2\x8d\x74\xad\xdf\x64\xa5\xe9\x72\xdb\xd7\x2f\xbf\xcf\x4b\xb3\x21\xc1\x59\x32\x44\x9c\x77\xd5\xf2\xa0\x11\x92\x79\x7b\xf8\x3e\x1a\xdd\x1a\xeb\x60\x1e\xb0\x19\xdb\x0a\x3a\x41\xbe\x86\xff\x0f\x2c\xd9\xdc\x74\x9d\xd0\xd5\x67\x16\xdd\x5a\x9c\x02\x00\x3f\x3a\xe6\x29\x8b\x8a\x90\x6b\x0a\xbc\x70\x22\x74\x22\xfe\x49\x8f\x61\x6e\x69\x74\x33\x05\xe0\xff\x55\xff\xff\xa6\xfc\xa0\x3f\xa3\xc6\x4e\x01\xc6\x88\xbf\x8a\x07\xd9\xf9\x6e\x15\x1e\xc6\x93\x24\x65\xd1\xda\xeb\x10\xb5\x13\x52\xa7\xec\x91\xb1\xda\xeb\x72\xb8\x8b\xcb\xae\x82\xb3\x93\x66\x52\x10\xd4\x58\xf8\xf0\x31\x9c\x0e\xdd\x24\xf0\x99\x45\x36\xd4\x81\x15\x4c\x5f\x43\xd8\x52\xb6\x32\xbb\x38\x61\x51\x58\x62\x76\x25\x74\xa5\xf0\xd2\xeb\x32\xe6\xf9\x01\xc8\x53\x08\x12\xf1\x6e\x38\xf5\xd9\x1a\x6d\x6f\xb4\xc5\x3b\x92\x0e\x29\x05\x82\xb3\xc3\xf3\x7b\x8f\xd6\x0d\x12\xd1\x2e\x1b\x5e\x5f\xa1\xa8\x90\xe2\xf3\xc9\x24\x61\x51\x54\x09\x27\x82\x6a\x3c\xc8\x16\x52\x97\x18\x1f\x34\x92\x24\x2b\x06\x87\xc1\xc9\x71\x3a\xfe\xf0\x71\xb3\x77\x18\x87\xb9\x24\x61\xd1\xe3\xb3\x2e\xc7\xa2\xff\xf8\x16\x97\x95\xa7\xe1\x10\xfe\x55\xc5\xa9\x27\x16\x45\xb2\x86\x23\x28\x2b\xc6\x4d\xc7\x09\xfc\x1c\x16\x1f\x08\xbe\xc8\xf9\xe3\x98\xf3\x4b\xff\x75\xe7\xb2\xa2\x27\xa9\x5d\x1d\x73\x24\x32\x34\x85\x17\x5b\x9e\x3e\x43\x9d\x84\x9c\xd1\x23\xa0\xb2\xf8\x9c\xc2\xf9\xf3\x0a\xdc\x7c\xe2\xe3\xe4\xd7\x5a\x22\xac\x24\x61\xe9\xbe\xa5\x26\x65\xca\x14\x90\x28\xd4\xe4\x49\x65\xbf\x79\xa4\xfd\xad\x46\x5b\x8a\x1e\x63\xca\x6e\xd7\xcb\xf1\x59\x9c\x64\xbf\xa0\x8b\xb9\x32\xe5\x68\x47\xd6\xc3\xdc\xff\x5e\x83\x96\x6a\xcc\x33\xd0\x5f\x84\x12\xe2\x5d\x0a\x27\xd5\x48\xbd\x15\x4a\x56\x70\xf4\x3a\x85\x17\xf7\x3c\x85\xaf\x0a\xa4\x63\x86\xc2\x09\xe7\xed\x1b\x51\x1d\x4d\x07\x19\x42\xe7\x49\x8f\x8d\x44\x87\x48\x23\x6b\x90\xa5\x14\x86\x50\x4f\xe6\x2f\x8d\xd7\xd5\xe1\x23\x53\xa6\xc9\x2e\x85\x13\x2a\x1e\x00\xcb\xe1\x6c\xce\x74\x55\x84\xff\x81\x98\x4f\x5f\x4d\x5e\x4d\x78\x1a\x32\x25\x09\x7b\x64\x7f\x06\x00\x00\xff\xff\xdc\x7c\x35\xe8\xe6\x07\x00\x00") + +func testImagesAgnhostLivenessServerGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostLivenessServerGo, + "test/images/agnhost/liveness/server.go", + ) +} + +func testImagesAgnhostLivenessServerGo() (*asset, error) { + bytes, err := testImagesAgnhostLivenessServerGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/liveness/server.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostLogsGeneratorLogs_generatorGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x55\x6b\x6f\xd3\xcc\x12\xfe\xec\xfd\x15\x23\x4b\x45\x36\x38\x76\x5a\x74\xd0\x51\x68\x91\x72\x4a\xe1\x44\x94\x04\x35\x29\x08\x21\x3e\x6c\xec\xb1\xbd\x8a\xbd\xeb\x77\x2f\x09\x11\xe2\xbf\xbf\x9a\x75\xae\x54\x02\x29\x52\xf6\x32\xf3\xcc\x33\xcf\xcc\x8e\xb3\xe7\xec\x56\x75\x5b\x2d\xaa\xda\xc2\xd5\xf0\xf2\x15\x2c\x6a\x84\x0f\x6e\x89\x5a\xa2\x45\x03\x63\x67\x6b\xa5\x4d\xca\xd8\xbd\xc8\x51\x1a\x2c\xc0\xc9\x02\x35\xd8\x1a\x61\xdc\xf1\xbc\x46\xd8\xdd\x24\xf0\x19\xb5\x11\x4a\xc2\x55\x3a\x84\x88\x0c\xc2\xdd\x55\x18\xbf\x66\x5b\xe5\xa0\xe5\x5b\x90\xca\x82\x33\x08\xb6\x16\x06\x4a\xd1\x20\xe0\x8f\x1c\x3b\x0b\x42\x42\xae\xda\xae\x11\x5c\xe6\x08\x1b\x61\x6b\x1f\x64\x07\x91\xb2\xaf\x3b\x00\xb5\xb4\x5c\x48\xe0\x90\xab\x6e\x0b\xaa\x3c\xb5\x02\x6e\x19\x03\x00\xa8\xad\xed\x46\x59\xb6\xd9\x6c\x52\xee\x59\xa6\x4a\x57\x59\xd3\x5b\x99\xec\x7e\x72\x7b\x37\x9d\xdf\x0d\xae\xd2\x21\x63\x8f\xb2\x41\x63\x40\xe3\x3f\x4e\x68\x2c\x60\xb9\x05\xde\x75\x8d\xc8\xf9\xb2\x41\x68\xf8\x06\x94\x06\x5e\x69\xc4\x02\xac\x22\x9e\x1b\x2d\xac\x90\x55\x02\x46\x95\x76\xc3\x35\xb2\x42\x18\xab\xc5\xd2\xd9\x33\x81\xf6\xac\x84\x81\x53\x03\x25\x81\x4b\x08\xc7\x73\x98\xcc\x43\xf8\xdf\x78\x3e\x99\x27\xec\xcb\x64\xf1\xff\xd9\xe3\x02\xbe\x8c\x1f\x1e\xc6\xd3\xc5\xe4\x6e\x0e\xb3\x07\xb8\x9d\x4d\xdf\x4e\x16\x93\xd9\x74\x0e\xb3\x77\x30\x9e\x7e\x85\x0f\x93\xe9\xdb\x04\x50\xd8\x1a\x35\xe0\x8f\x4e\x13\x77\xa5\x41\x90\x74\x58\xa4\x6c\x8e\x78\x16\xbc\x54\x3d\x19\xd3\x61\x2e\x4a\x91\x43\xc3\x65\xe5\x78\x85\x50\xa9\x35\x6a\x29\x64\x05\x1d\xea\x56\x18\x2a\x9e\x01\x2e\x0b\xd6\x88\x56\x58\x6e\xfd\xfe\x49\x3a\x29\x7b\x9e\x31\xd6\xf1\x7c\x45\x20\x8d\xaa\x4c\x85\x92\x31\xd1\x76\x4a\x5b\x88\x58\x10\x96\xad\x0d\x59\x10\x5a\xd1\x62\xc8\x58\x10\x56\xc2\xd6\x6e\x99\xe6\xaa\xcd\x4c\x57\x5e\xbe\xcc\x72\xb5\xd4\xdc\x5f\xad\xfe\x6b\x52\xa1\x32\xde\x89\x96\xe7\xb5\x90\xa8\xb7\x59\xb7\xaa\x32\x67\x45\x93\x69\x2e\x8b\xf0\x68\xb4\x6a\x54\x95\xad\xaf\x42\x16\x33\xb6\xe6\x9a\x42\x51\x9d\x3f\xa2\xad\x55\x61\xe0\x06\xbe\x7d\x27\x91\x65\xf5\x93\x05\x41\xf8\xfe\x6e\x11\x26\xb4\xf8\x34\x9b\xef\x57\x8f\x7e\xf1\x8b\x05\x92\xb7\x68\x3a\x9e\xe3\x13\xb7\x95\x5b\xe2\xc0\x6c\x8d\xc5\xb6\x77\x2a\xb0\xe4\xae\xb1\xfd\x46\x9a\x1e\x20\x66\x2c\xcb\xe0\xb6\x2d\xee\x55\x65\xde\xa3\x44\xcd\x2d\x15\xc1\x50\x6f\xf7\x2d\x54\xc9\x5a\x19\x0b\xb7\x94\x6a\xea\xf9\x3e\x31\xbf\x81\x67\x5e\x89\xf4\x56\xb5\x2d\x97\xc5\x4f\x16\x3c\x1a\x1c\x01\x40\x48\xb2\x0e\xaa\xbd\x25\x05\x9d\xd7\x4a\xdb\x11\x84\x33\x67\x3b\x67\x0d\x34\x42\xa2\xa1\xfe\x27\x53\x6a\x4c\x63\x0b\xe5\x2c\x38\x29\x4a\xa5\xdb\x66\x4b\x4e\xf7\x4a\x56\x23\x38\x3a\x5d\x7b\xaf\x85\xb2\xbc\x79\xf3\x77\x04\xdf\x3b\xd7\x85\xd3\xbe\x15\xde\x10\xe0\x58\x57\x66\x04\xd0\xd3\xfe\xc8\x7f\x88\xd6\xb5\x53\x3a\x8c\x86\x71\xc2\x82\x07\x27\x89\xfe\x8e\x38\x52\xba\x09\xfb\x75\x28\xd7\x31\x3a\x08\x69\x59\xb0\x87\x06\x00\x6a\x96\xf4\xed\x6e\x4f\xfa\x96\x4e\xe6\x20\xa4\xb0\x51\x0c\x3f\x59\xf0\xbb\x78\xe9\xbb\x86\x57\x26\x8a\xd3\x89\xb4\x9f\xb9\xfe\x14\x3d\x3b\x82\x27\x5e\xbf\x81\x3f\x18\x58\x3a\x09\x13\x08\x6d\x98\xc0\x30\x81\xb0\x8f\xdf\x27\x6f\x6b\x6e\xc1\xd4\xca\x35\x05\x2c\xf1\xc0\xdb\x57\x90\x5a\x1e\x65\xb1\x1f\x31\xda\xc9\x30\xfe\x03\x8f\x3d\xf7\x9e\xcc\x3e\xb3\x04\x42\xed\xe4\x60\xbf\x25\x1e\xc5\x19\x8f\x83\x04\x67\x61\x7e\xf9\xfe\x3a\x2b\xf5\x29\xed\xbf\xd5\x6c\x0f\xda\x8b\x78\x5a\x8d\x28\x6f\x0b\x78\x7e\xd6\x75\x09\x70\x5d\x99\xc3\x2b\xf0\x6a\x8b\xf2\x34\xe8\xf5\x0d\x0c\xe9\x34\xa0\x17\x98\xbe\xe3\x96\x37\x65\x14\x4e\xe4\x9a\x37\x82\x66\x22\xd9\x48\xd7\x2e\x51\x7b\x66\xe4\x38\x82\x0b\xca\xf3\x08\x12\xd3\xb3\xf1\xc0\x87\x8c\xff\x0c\xbb\x37\x1b\xc1\xc5\x3a\x4c\x0e\xdb\x1d\x4e\x81\x0d\xdf\xc2\xe8\xe6\x88\x96\x9d\xb7\x50\x74\x1a\x9a\x05\x56\xe4\x2b\xd4\xe4\xe0\xad\xa6\xb8\x59\xf8\x93\xc8\x03\xc5\x04\x58\xd2\x98\xf3\x87\xe9\xdc\xaa\x2e\x8a\x59\x40\x5a\x8a\x82\xbc\x86\xaf\x69\x71\x7d\x92\x10\x1d\xbc\x78\x71\xe4\x3f\x91\xa5\x8a\x4e\xa4\xbe\x17\x12\x23\x51\xc4\x31\x0b\x82\xeb\xc1\x0e\xf8\x96\xd8\xf7\xc5\xdd\x75\x10\x1a\xe0\x9d\x30\xa8\xd7\xa8\x07\x8d\x58\xa1\x0f\xd1\x7f\xff\xf8\x1a\xb5\x9f\xb1\x28\x2b\x5b\x93\xb6\x97\xc3\x21\x98\x6d\xbb\x54\x8d\x79\x52\xdb\x5d\x40\x7a\x59\x31\xf4\xb5\x24\x76\xad\x1f\x8f\x94\xc3\xc9\xb0\xfc\x46\xa3\x95\x9e\x8e\x8c\x1a\x94\xd1\xc9\x4d\x1c\x7f\x3f\x19\x8f\xe4\x76\x9c\x95\xbf\x79\x1d\x2f\xc8\x89\x05\x9d\x2a\xa6\xbc\xf5\x3e\xde\x70\xee\x39\x44\x07\xa7\x07\x2e\x2b\x8c\x5e\x26\xf0\x1f\x12\xc5\xe9\x86\x2c\xcb\xd6\xa6\xf3\x4e\x0b\x69\xcb\x28\xa4\xef\x40\xb6\xbe\xcc\x8e\xc8\xd9\x85\xc9\x3a\x55\xd0\x7f\x98\x1c\xa9\x24\xb0\x0b\x16\xb3\xc0\x58\x6e\x9d\x39\x44\x3d\x46\xba\x1a\x0e\x13\x78\x35\x1c\x52\xfd\x35\x5a\xa7\xe5\x79\xb4\x8b\x02\x2e\x8c\xff\x51\xab\x8a\x22\x81\x5e\xab\x04\x9c\x6e\x12\xe8\x71\xe9\x2d\xfe\x1b\x00\x00\xff\xff\x27\x3f\x55\xc6\x27\x09\x00\x00") + +func testImagesAgnhostLogsGeneratorLogs_generatorGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostLogsGeneratorLogs_generatorGo, + "test/images/agnhost/logs-generator/logs_generator.go", + ) +} + +func testImagesAgnhostLogsGeneratorLogs_generatorGo() (*asset, error) { + bytes, err := testImagesAgnhostLogsGeneratorLogs_generatorGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/logs-generator/logs_generator.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostMounttestFilepermissionsPs1 = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x55\x51\x6f\xdb\x36\x10\x7e\xe7\xaf\x38\x48\x7e\xb0\x81\x58\x91\x8d\x3e\x6c\x1d\x82\x41\x4b\xdd\x4e\x68\x6a\x07\x96\xd3\xac\x28\x8a\x80\xa6\xce\x12\x51\x99\x54\x48\x2a\xb2\xb0\xf5\xbf\x0f\xa4\x64\xcb\x9e\xbd\x21\x98\x5f\x44\xdc\x9d\xef\xfb\xee\x3b\x7e\x92\x0f\xb7\xb2\x6c\x14\xcf\x72\x03\xd3\x70\xf2\x33\xac\x72\x84\x8f\xd5\x1a\x95\x40\x83\x1a\xa2\xca\xe4\x52\xe9\x80\xf8\xc4\x87\x3b\xce\x50\x68\x4c\xa1\x12\x29\x2a\x30\x39\x42\x54\x52\x96\xe3\x3e\x73\x05\x9f\x51\x69\x2e\x05\x4c\x83\x10\x86\xb6\xc0\xeb\x52\xde\xe8\x17\xe2\x43\x23\x2b\xd8\xd2\x06\x84\x34\x50\x69\x04\x93\x73\x0d\x1b\x5e\x20\xe0\x8e\x61\x69\x80\x0b\x60\x72\x5b\x16\x9c\x0a\x86\x50\x73\x93\x3b\x98\xae\x49\x40\x7c\xf8\xd2\xb5\x90\x6b\x43\xb9\x00\x0a\x4c\x96\x0d\xc8\xcd\x71\x1d\x50\xe3\x08\xdb\x5f\x6e\x4c\xf9\xf6\xfa\xba\xae\xeb\x80\x3a\xb2\x81\x54\xd9\x75\xd1\x16\xea\xeb\xbb\xf8\x76\x36\x4f\x66\xe3\x69\x10\xba\xbf\x3c\x88\x02\xb5\x06\x85\xcf\x15\x57\x98\xc2\xba\x01\x5a\x96\x05\x67\x74\x5d\x20\x14\xb4\x06\xa9\x80\x66\x0a\x31\x05\x23\x2d\xdf\x5a\x71\xc3\x45\x76\x05\x5a\x6e\x4c\x4d\x15\x12\x1f\x52\xae\x8d\xe2\xeb\xca\x9c\x88\xb5\x67\xc7\xf5\x49\x81\x14\x40\x05\x78\x51\x02\x71\xe2\xc1\x6f\x51\x12\x27\x57\xc4\x87\xc7\x78\xf5\xfb\xe2\x61\x05\x8f\xd1\x72\x19\xcd\x57\xf1\x2c\x81\xc5\x12\x6e\x17\xf3\x77\xf1\x2a\x5e\xcc\x13\x58\xbc\x87\x68\xfe\x05\x3e\xc6\xf3\x77\x57\x80\xdc\xe4\xa8\x00\x77\xa5\xb2\xfc\xa5\x02\x6e\x65\xc4\xd4\x6a\x96\x20\x9e\x10\xd8\xc8\x96\x90\x2e\x91\xf1\x0d\x67\x50\x50\x91\x55\x34\x43\xc8\xe4\x0b\x2a\xc1\x45\x06\x25\xaa\x2d\xd7\x76\x99\x1a\xa8\x48\x89\x0f\x05\xdf\x72\x43\x8d\x8b\x9c\x0d\x15\x10\x72\x4f\x15\xdd\x0e\x09\xc0\x57\x3b\x9b\xc8\xbe\x0d\xde\xf3\x02\xe7\x74\x8b\x70\x03\x83\xa1\xc9\x95\xac\xc1\x1b\x1f\x82\xbc\x97\x39\xf0\x46\x04\x46\x84\x10\x1f\x14\xd2\x14\x6e\xda\x47\x4a\x0d\x85\xbf\xda\x33\x35\x9d\x60\x9a\x0c\x96\xb3\xe8\xdd\xd3\xfd\x6c\xf9\x29\x4e\x12\x27\xc5\x0d\x84\xbb\x30\x0c\x27\x30\x5e\x4b\xe5\xce\x3f\x85\xb6\x99\xdd\x8d\x45\x6f\x9f\x5d\x3b\x5a\x96\x28\x0e\xcd\xdb\x54\xdf\xfd\x10\x9a\x45\x64\xf0\xb8\x8c\x57\xb3\x4b\x48\xd3\x1e\x29\x7c\x73\x38\x4f\xc2\xb0\x3d\xbb\xc4\xc4\x51\xc0\x1d\xb2\xca\x91\x38\x1e\xa9\xbb\xf3\x2e\x45\x06\xb3\x3f\x66\xb7\x0f\x97\x81\x8e\x46\x9a\x86\x84\x90\x4d\x25\x98\x5d\x01\x7c\x40\x63\x95\xbc\xef\xd7\x34\x1c\x94\xd4\xe4\x23\xf8\x93\xd8\x7b\x3f\xb0\x10\x11\x2b\xe0\xc6\x96\x8e\xed\x69\x7c\x4f\x4d\x0e\xae\xaa\x2f\x59\xd4\x02\x95\x5d\x50\x57\x1f\xb8\x40\x9f\xff\xa0\x64\x55\x1e\xe7\x5d\x80\xb4\x05\x95\x46\xf5\x89\xea\xef\x96\x6d\x1b\xc9\x6c\xf6\x34\x24\xed\xcd\x3c\x84\x5c\x6c\x23\x15\x52\x96\xc3\x70\xa0\xaa\x02\xad\x8b\x0e\xed\x23\xc6\x50\xeb\xfd\x14\xf6\xc7\x37\x5d\x5d\x97\xbb\x95\xc2\x28\x59\xac\x9a\x12\x61\x2c\x10\xbe\x26\xc8\x2a\xc5\x4d\x73\x9a\x3f\xaf\xfe\xf6\xf6\x6d\x54\x14\xb2\x3e\x6e\x6e\x7f\xbe\x7b\x1f\x51\x01\xd4\x66\xc1\x42\x5d\x81\xfe\xce\xcb\x92\x8b\x2c\x38\x29\x65\x52\x18\x2e\x2a\x3c\x04\x7f\x90\xc3\x71\xb0\x3d\x1e\xdb\x45\xdc\x8b\x55\x5b\xf5\x1c\x7f\xbb\xb0\xa4\xd1\x06\xb7\x4b\x97\x08\x5e\x68\x51\xe1\xd3\x13\xe9\x99\x30\x29\x5e\x50\x19\xb0\xbd\x82\x13\x09\xac\x08\x6d\xbb\xf1\x9a\x8a\x14\xce\x5c\x30\x82\x31\x3e\x9f\x87\xe1\x9f\xe3\xee\x79\xb6\x4f\x77\xbd\xde\x1c\xcd\xf3\x9f\x98\x67\x86\xe8\x40\xcf\x8d\xf2\x0a\xd4\xe9\x6b\x51\x2f\xf8\xa3\xc3\xbd\xe4\x9c\x57\x20\x4f\x2e\xed\xcf\x87\x14\x0d\xb2\x56\x7b\x30\x4d\x89\xc1\x85\x3b\x18\xa7\x28\x0c\x37\xcd\x12\x37\xa8\x50\x30\x0c\x3e\xdb\x25\x06\xb3\xe7\x8a\x16\x7a\xd8\x7b\x6a\x74\xc6\xe3\xc8\x2d\x8e\xcb\xbf\x8c\xff\x7a\x1c\x67\xc5\x73\x9c\x63\x0f\xfe\x7f\xa0\x95\xbc\x93\x35\xaa\xe1\x28\xb0\x16\xa2\x5c\xe8\xa1\x67\x27\xd0\xde\x39\xe2\xb1\xc5\x2f\x21\x76\x2a\x2b\x34\x95\x12\xe0\x1d\x94\xe8\xa9\xf6\x2d\x3c\xf2\x83\x90\xfd\xce\x2e\xbd\xe5\xf6\x1f\x90\x11\xb1\x43\x8c\xad\x77\x07\xbf\xee\x29\xe1\x8e\x1b\x98\xd8\x16\x3e\x94\x8a\x0b\xe3\x3e\x52\xfd\xc7\xac\x5d\xee\x1d\x17\xd5\x6e\xac\x4d\x53\x60\x40\x90\xe5\x12\xbc\xd0\x41\x7a\xe4\xef\x00\x00\x00\xff\xff\x72\x10\x7f\x9c\x12\x09\x00\x00") + +func testImagesAgnhostMounttestFilepermissionsPs1Bytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostMounttestFilepermissionsPs1, + "test/images/agnhost/mounttest/filePermissions.ps1", + ) +} + +func testImagesAgnhostMounttestFilepermissionsPs1() (*asset, error) { + bytes, err := testImagesAgnhostMounttestFilepermissionsPs1Bytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/mounttest/filePermissions.ps1", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostMounttestMtGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x58\x6d\x6f\xdb\x38\x12\xfe\x6c\xfe\x8a\x39\x01\xdd\x93\x0b\x55\x76\xb3\x7b\xc9\xc1\x7b\xf9\x90\x3a\xc9\x9d\xb1\xad\x53\xc4\xc9\x16\x8b\x6e\x11\xd0\xf2\x48\x22\x2a\x91\x5a\x92\x8a\x62\x14\xf9\xef\x87\xa1\x24\x47\x56\x9c\x5c\x92\x5e\x0b\xac\xb1\x14\x87\xcf\x33\x6f\x9c\x19\x66\xf4\x9a\x4d\x55\xb1\xd6\x22\x49\x2d\xec\x8d\xdf\xfe\x03\x2e\x52\x84\xdf\xca\x25\x6a\x89\x16\x0d\x1c\x95\x36\x55\xda\x84\x8c\xbd\x17\x11\x4a\x83\x2b\x28\xe5\x0a\x35\xd8\x14\xe1\xa8\xe0\x51\x8a\xd0\xec\x04\xf0\x3b\x6a\x23\x94\x84\xbd\x70\x0c\x3e\x09\x78\xcd\x96\x37\xfc\x95\xad\x55\x09\x39\x5f\x83\x54\x16\x4a\x83\x60\x53\x61\x20\x16\x19\x02\xde\x44\x58\x58\x10\x12\x22\x95\x17\x99\xe0\x32\x42\xa8\x84\x4d\x1d\x49\x03\x11\xb2\x3f\x1a\x00\xb5\xb4\x5c\x48\xe0\x10\xa9\x62\x0d\x2a\xee\x4a\x01\xb7\x8c\x01\x00\xa4\xd6\x16\x93\xd1\xa8\xaa\xaa\x90\x3b\x2d\x43\xa5\x93\x51\x56\x4b\x99\xd1\xfb\xd9\xf4\x64\xbe\x38\x79\xb3\x17\x8e\x19\xbb\x94\x19\x1a\x03\x1a\xff\x2a\x85\xc6\x15\x2c\xd7\xc0\x8b\x22\x13\x11\x5f\x66\x08\x19\xaf\x40\x69\xe0\x89\x46\x5c\x81\x55\xa4\x67\xa5\x85\x15\x32\x09\xc0\xa8\xd8\x56\x5c\x23\x5b\x09\x63\xb5\x58\x96\x76\xcb\x41\xad\x56\xc2\x40\x57\x40\x49\xe0\x12\xbc\xa3\x05\xcc\x16\x1e\xbc\x3b\x5a\xcc\x16\x01\xfb\x34\xbb\xf8\xcf\xd9\xe5\x05\x7c\x3a\x3a\x3f\x3f\x9a\x5f\xcc\x4e\x16\x70\x76\x0e\xd3\xb3\xf9\xf1\xec\x62\x76\x36\x5f\xc0\xd9\x29\x1c\xcd\xff\x80\xdf\x66\xf3\xe3\x00\x50\xd8\x14\x35\xe0\x4d\xa1\x49\x77\xa5\x41\x90\xeb\x70\x15\xb2\x05\xe2\x16\x79\xac\x6a\x65\x4c\x81\x91\x88\x45\x04\x19\x97\x49\xc9\x13\x84\x44\x5d\xa3\x96\x42\x26\x50\xa0\xce\x85\xa1\xe0\x19\xe0\x72\xc5\x32\x91\x0b\xcb\xad\x5b\xdf\x33\x27\x64\xaf\x47\x8c\x15\x3c\xfa\x4a\x20\xb9\x2a\xa5\xb5\x68\x2c\x63\x22\x2f\x94\xb6\xe0\xb3\x81\x17\xe7\xd6\x63\x03\x4f\xa8\x91\x50\xa5\x15\x19\x2d\x94\xa1\x5f\x2b\x72\xf4\x18\x1b\x78\x89\xb0\x69\xb9\x0c\x23\x95\x8f\x4c\x11\xbf\xfd\x79\x14\xa9\xa5\xe6\x1e\x1b\x32\x36\x1a\xc1\x34\x5f\x7d\x68\x91\xc9\x7f\xa5\x69\x22\x93\xc8\x54\x19\x0b\x53\x12\x0e\xd9\x35\xd7\xdb\xa2\x87\xf0\x93\xc3\x09\xa7\x2a\xcf\xb9\x5c\x7d\x63\x83\x4b\x83\x13\x00\xf0\x36\x9a\x7a\x01\x1b\x2c\x52\xa5\xed\x04\xbc\xa9\x46\x4e\x89\x4e\x99\x68\xea\xac\x4b\xc4\x35\xca\xbe\x4b\x40\x95\xb6\x28\xad\x81\xd3\x05\xd8\x75\x81\x01\xa8\x4a\xa2\x0e\x20\x57\x2b\x0c\xba\xd2\x01\x44\x4a\x5a\x94\xd6\x50\x72\x3a\x5c\x22\x7c\xaf\x64\x32\x81\x9d\x84\x9b\xc8\xb8\xeb\xb0\x05\xd5\x65\xa6\x10\xb8\x53\x6b\x63\x31\x7f\xaa\x16\xed\x0d\xa9\xad\x72\xe7\x03\x10\xee\xdb\x1a\xf0\x46\x18\x1b\x92\x7a\x47\x3a\x31\x13\x80\xda\x77\x1f\xf8\x8d\xc8\xcb\x7c\x4e\x1f\xfd\xf1\x30\x60\x83\xf3\x52\x92\x0f\x73\x2e\x64\xc0\x6e\x99\xf3\xbb\xcf\x06\xb1\xb9\x58\x17\xf8\x91\xdb\x14\x7a\xff\x0e\xc1\xf3\xd8\x80\xe8\x3e\xa8\xd5\x0e\x89\xbb\xfd\x8f\xa8\xf3\xc7\xf6\xcf\xc8\xc2\x7b\x02\xf5\xbe\xc4\xea\x94\x20\xb8\x4d\xc7\xfb\xbf\xfc\xf2\xf8\xfe\xfe\xfe\xff\xd8\x1f\x3f\xba\x7f\x70\x70\x70\x6f\x5f\x23\x5f\x91\xc0\xb4\xf6\x75\x47\xcb\x9d\xfb\x33\xf9\x5e\xa9\xc2\x49\xb5\xfb\x56\xaf\x8f\x4b\xed\xae\x5a\xcf\xbe\xb7\xff\x1c\xb3\xc1\x52\x23\xff\x7a\x26\x4f\x6e\x0a\x8c\x2c\xae\x1a\x9c\x5a\xc0\xea\x12\xe9\xb6\xc4\xa5\x8c\x40\x48\x61\xfd\x21\x7c\x63\x83\xee\x75\x08\x4f\x33\x9e\x18\x7f\x18\x2e\xac\x16\x32\xf9\x9d\x6b\xff\xa7\xbb\x98\x05\xe0\xc5\xe6\x8a\xf2\xc8\x0b\xc0\xa3\xff\x9c\x6a\x56\x41\xa1\x85\xb4\x75\xc2\x19\x97\x68\x54\x45\xbc\xe1\x13\xc0\x3b\x01\x27\x78\x91\xe1\x15\xe5\xe6\xc3\x04\xb4\x0b\x4b\xe1\x6e\xcb\x53\x19\xda\x94\x69\x19\x28\xef\x1f\x66\xa0\xdd\xe7\xa0\x6f\x12\xae\x85\x77\x77\xec\x61\x7c\x55\xb9\x1a\x7a\x39\x3b\x76\xd7\xf5\xdf\xb3\xe3\x27\x92\xf5\xb2\x37\x00\x4f\x62\x75\xe5\x28\x69\xdd\x67\xa4\xae\x83\xf4\x3f\xc4\x42\x99\x05\xb1\x56\x79\x5d\x42\xc8\x46\x70\x87\x9e\xcb\xbb\xbf\xbf\xcd\xbb\xbf\xff\x02\xde\xfd\xfd\xe7\xf3\x8e\x7b\xbc\xe3\x97\xf0\x8e\x9f\xcb\x7b\x70\x70\xb0\xc5\x7b\x70\x70\xf0\x7c\x5e\x3a\xf4\x04\xde\x1d\xd5\xa1\x4d\xa9\xa6\x38\xf7\xa9\x1d\x5b\x5b\xe7\x37\x15\x9c\xe8\x5f\xc0\x77\x57\x6d\x7a\xac\x57\x42\x5e\x65\x4a\x15\x4f\x63\x17\x12\x48\xf8\x71\x2d\x66\xd2\x36\x2a\x74\x0a\x5a\x00\x9e\x5b\x5f\xb9\x9e\x1f\x50\x45\x0b\xc0\x3b\xa7\x4f\x40\x9f\x60\x55\x92\xee\x8e\xd2\xe9\xf3\x10\xfa\x3b\xa5\x32\x07\xbf\xbb\x1c\x06\xe0\xb9\x8d\x2b\x25\xaf\xb0\xd9\xea\x78\x98\xea\x64\x00\xde\x3b\x12\xa1\x66\x4a\x1d\xd1\x59\xa4\x24\xb4\xe2\xad\xb5\x01\xf8\x34\x9c\xba\x58\xbf\x79\xb3\xcb\x69\x10\x67\x3c\x01\x25\xb3\xf5\xd0\x1b\x52\x2b\x1c\x8d\xe0\x82\x66\xd9\x42\xab\x44\xf3\x9c\x52\x24\x56\x54\x71\x8c\xca\x11\xc8\x0e\x43\x4c\xbd\xee\xcd\x69\x24\x8c\x2c\xb7\xf5\x58\x63\x53\x24\x20\xc2\x36\x50\x70\x63\x36\x9f\x69\xf2\xd1\x61\x5d\xe4\xa9\xfd\xfa\x51\xbe\x82\xd7\x5b\x33\x4e\x00\x5c\x27\x06\x3e\x7f\x31\x2e\x17\x5c\x17\x68\x1a\xf4\x00\xb5\x06\x40\xad\x95\xae\x17\x06\x0e\xe1\xf3\x17\xf7\xe1\xdb\x2d\x1b\x0c\x19\x1b\xd0\xb4\x95\x21\xaf\x67\xbc\x32\xe7\xe6\x2b\x18\x05\x15\x42\xc4\x25\x18\xb4\xc0\xe5\xba\x53\xa6\x2b\x84\x8a\x4b\x1b\xb2\x81\x93\xf5\xc7\xe3\xf1\xb8\x81\x99\x9f\x5d\x9c\x4c\xea\x9a\xa8\x57\xe8\x62\xab\x62\xc0\x1b\x8c\x4a\xd7\xe0\x9a\x51\xe4\x9a\x6b\xa1\x4a\x43\xe3\x3e\xa9\x0f\x99\x90\xe8\xce\xd7\xe6\x0b\x03\xc2\xb9\x5c\x28\xc9\x33\x77\x0b\x79\x96\xa9\xca\x00\x07\x23\x64\xe2\x72\xb3\x3e\x69\xd5\x84\x0e\xba\xc3\x6f\x43\x80\x69\x8a\xd1\xd7\xa6\x6f\xb9\xb6\xa5\x62\xe0\x50\x70\x9b\x3a\x91\xbd\x10\xe0\x93\xbb\xdd\x1c\x24\x56\x75\x9e\x53\xac\x05\xc5\x87\xdb\x3b\xc9\x9f\x3b\x60\xdc\x6e\x82\xf7\x77\xb3\xb9\x16\xe4\x9c\x25\xba\x3b\xb3\x51\x61\x9a\x72\x99\xb4\x19\xdd\x75\x81\x3b\xaf\xc8\x08\xfa\x10\x91\x2f\x2b\x91\x65\xe0\xd2\xb6\xce\x91\x90\x31\x17\xac\x43\xa8\x1b\xb4\x7f\xd7\xa7\x87\x6c\x20\x62\x0a\x22\xfc\xed\x10\xa4\xc8\x28\xbe\x6d\x2c\x79\x51\xa0\x5c\xf9\xb4\x0a\x48\x64\xc8\x06\xb7\x1b\x24\x52\xce\xd9\x3b\xaf\x2b\xa0\x7f\xaf\xe3\xd0\xef\x0f\x82\xa7\xc6\x42\xbf\x3f\x0a\x7e\xec\xe0\xc7\x3f\x06\xde\xb5\x09\xfa\x7d\x31\x7c\x3b\x09\xf9\xdd\x91\xe8\xbb\xd0\x68\xea\xf1\xbb\xe3\xcf\x77\xa1\xb9\x29\xc7\xdf\x9a\x77\xbe\xcb\x95\x9d\xc6\xe3\xef\x68\x7c\xff\x2f\xec\xba\xa9\xf5\x19\xba\xad\xae\xd7\x82\x76\xb7\x8c\x17\xa8\x23\x62\xc8\x50\xba\xcf\x43\x3a\x35\x76\x67\x94\x09\x4f\x6e\x84\xf5\xdf\x36\x52\xed\x7a\xec\x7a\x83\xab\xda\x7d\xef\x50\x91\x81\xb6\x54\xbb\x4a\x4c\x48\x22\x76\xd5\x07\x0e\xe9\x65\xe0\xa0\x35\xda\x52\x4b\xd2\xae\x86\x6e\x2a\xcf\xbb\xb5\xc5\x5a\x31\x98\x1c\x42\xfd\xbc\x0e\xcf\x1b\x0e\x07\xbe\xd3\xb8\x38\xb7\xe1\x47\x9a\x59\x63\xdf\xab\x49\x49\x2f\x2a\x47\xdb\xb3\x86\xd2\xf0\xea\xaf\x09\xbc\xba\xfe\x53\x7a\x81\x53\xa9\x75\x42\xab\x10\x6a\x5d\x2b\xd4\x85\xec\xbc\x36\x1d\xde\x3d\x8c\xda\x60\xbf\x6b\xc4\x90\xda\x46\xc7\xca\x5b\xc6\x22\x25\xe9\xbd\x2f\x85\x15\x3c\x6b\x5f\x3b\xf5\x51\x7a\x32\xb9\x27\xfc\x1b\xaa\x97\xa8\x37\x15\xfc\x4f\xe9\x75\x3c\xbd\x75\xa5\x3b\xae\xae\x5f\xc7\xa0\x4c\x78\xda\x5c\xc8\x67\x39\x7f\xdb\xdd\x8e\x64\xc3\x10\xc0\xe7\x2f\xcb\xb5\x45\x7f\x5b\xef\x61\x4d\xf9\xc4\x68\x34\x7f\x53\xba\xeb\x4b\x4f\x8d\x42\xb3\xde\x95\x65\x0f\xe6\x60\x73\x8b\xb6\xdc\xb3\xfd\x16\x15\x34\x0b\x3d\xf0\xfa\x5c\x2a\x95\x3d\xc3\x79\xed\x92\xc2\xd6\xd7\xf0\xc9\xd7\xb5\x35\xa4\x0f\x12\x37\x15\xfb\xfb\xcd\x68\x27\xa6\x6e\x86\x36\x81\x6d\xe7\xa8\xf6\x5f\x33\x4f\x35\xe9\xab\xd7\x17\x34\xcc\x4e\x0e\xdd\x50\x1b\x2e\x30\x52\x72\x05\xaf\xeb\x55\xab\x89\xbf\xa5\xd7\x90\x0d\xe8\xa2\x19\xcb\xb5\xdd\x1c\x9c\xab\xca\x1f\xfe\xda\x80\x08\x19\xa1\xef\xf6\x87\xf0\x2f\xd8\xb0\xb4\xdb\x19\x62\xe1\xef\xb5\x24\x35\xa5\x9b\xfb\x76\x54\x89\xfb\x45\xa2\x75\x1a\xa5\xd3\xfd\xdc\xdc\x4a\xce\x93\xfb\xa5\xe2\x95\xa1\xc4\x6c\x3c\x2d\x64\xe2\x52\xb4\x85\xdc\xa4\xa9\x53\x44\xc8\x92\x9c\x77\xdb\xcb\xf8\x47\x8a\xc5\x1d\xce\xee\x82\xe1\x14\x7e\x20\xa0\x4e\x79\x11\xef\x3c\x49\x06\xf6\xca\x8a\x13\xdf\xd2\xeb\x52\xf6\xdf\x03\x21\xb4\x24\x13\x78\x65\x42\x38\x6f\x6c\xf6\x82\x1e\x9a\x33\xb9\x6b\xb3\x33\xba\xfe\xfb\x4d\xed\x81\xbb\x8b\x40\x57\xf7\x96\xfd\x37\x00\x00\xff\xff\xd7\x2d\x2f\xd6\x7c\x17\x00\x00") + +func testImagesAgnhostMounttestMtGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostMounttestMtGo, + "test/images/agnhost/mounttest/mt.go", + ) +} + +func testImagesAgnhostMounttestMtGo() (*asset, error) { + bytes, err := testImagesAgnhostMounttestMtGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/mounttest/mt.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostMounttestMt_utilsGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xd4\x94\xdf\x6e\xdb\x36\x14\x87\xaf\xcd\xa7\xf8\x55\x40\x06\xab\x73\x25\x27\xd8\x4d\x52\xf8\xc2\x4b\xb2\xce\x68\x6a\x17\xb1\xbd\xa2\xc0\x80\x81\x92\x0e\x25\xa2\x12\xa9\x90\x54\x15\xa3\xf0\xbb\x0f\x94\xec\x2c\x6e\x96\x2c\x08\x76\xd3\x1b\x02\x36\xcf\x9f\xef\x7c\x07\x54\x1c\xe3\xe7\xa4\x91\x65\x86\x57\xad\x54\x99\x6e\x2d\x63\xf1\x6b\x76\xae\xeb\x8d\x91\x79\xe1\x70\x32\x3e\x3e\xc5\xaa\x20\xbc\x6f\x12\x32\x8a\x1c\x59\x4c\x1b\x57\x68\x63\x23\xc6\xae\x64\x4a\xca\x52\x86\x46\x65\x64\xe0\x0a\xc2\xb4\xe6\x69\x41\xd8\xdd\x8c\xf0\x07\x19\x2b\xb5\xc2\x49\x34\xc6\xd0\x07\x04\xbb\xab\x20\x7c\xcb\x36\xba\x41\xc5\x37\x50\xda\xa1\xb1\x04\x57\x48\x0b\x21\x4b\x02\xdd\xa6\x54\x3b\x48\x85\x54\x57\x75\x29\xb9\x4a\x09\xad\x74\x45\xd7\x64\x57\x22\x62\x9f\x77\x05\x74\xe2\xb8\x54\xe0\x48\x75\xbd\x81\x16\xf7\xa3\xc0\x1d\x63\x00\x50\x38\x57\x9f\xc5\x71\xdb\xb6\x11\xef\x28\x23\x6d\xf2\xb8\xec\xa3\x6c\x7c\x35\x3b\xbf\x9c\x2f\x2f\xdf\x9c\x44\x63\xc6\xd6\xaa\x24\x6b\x61\xe8\xa6\x91\x86\x32\x24\x1b\xf0\xba\x2e\x65\xca\x93\x92\x50\xf2\x16\xda\x80\xe7\x86\x28\x83\xd3\x9e\xb3\x35\xd2\x49\x95\x8f\x60\xb5\x70\x2d\x37\xc4\x32\x69\x9d\x91\x49\xe3\x0e\x04\xed\xa9\xa4\xc5\xfd\x00\xad\xc0\x15\x82\xe9\x12\xb3\x65\x80\x5f\xa7\xcb\xd9\x72\xc4\x3e\xcd\x56\xbf\x2f\xd6\x2b\x7c\x9a\x5e\x5f\x4f\xe7\xab\xd9\xe5\x12\x8b\x6b\x9c\x2f\xe6\x17\xb3\xd5\x6c\x31\x5f\x62\xf1\x1b\xa6\xf3\xcf\x78\x3f\x9b\x5f\x8c\x40\xd2\x15\x64\x40\xb7\xb5\xf1\xec\xda\x40\x7a\x75\x94\x45\x6c\x49\x74\xd0\x5c\xe8\x1e\xc6\xd6\x94\x4a\x21\x53\x94\x5c\xe5\x0d\xcf\x09\xb9\xfe\x4a\x46\x49\x95\xa3\x26\x53\x49\xeb\x97\x67\xc1\x55\xc6\x4a\x59\x49\xc7\x5d\xf7\xfb\xc1\x38\x11\x7b\x1d\x33\x56\xf3\xf4\x8b\x2f\x52\xe9\x46\x39\x47\xd6\x31\x26\xab\x5a\x1b\x87\x21\x1b\x04\xa2\x72\x01\x1b\x04\xda\xfa\xd3\x6e\x6c\xca\xcb\x32\x60\x21\x63\xa2\x51\x29\x9a\x8a\xdb\x2f\x43\x7f\x40\x2a\x17\xfa\x03\xdf\xd8\xc0\x90\x6b\x8c\xc2\x2e\x3c\x5a\xdf\x45\x85\x6c\xcb\x58\x1c\xe3\x82\x84\x54\xfd\x86\xae\xa4\x6a\x6e\x31\xb4\x1b\x1b\x5b\xc7\x9d\xb0\x51\x11\xe2\x4d\x87\xe9\x36\x35\x41\x35\x55\x42\xa6\x1f\xbe\xaa\x85\xed\x39\x6d\xc4\x52\xad\xac\x43\xe9\xd3\x57\xfe\xe2\x03\xcf\x65\x8a\x09\xc6\xb7\xe3\xe3\xf1\xc9\xf1\xe9\xe9\x2f\x3b\x48\x61\x57\x9b\x9a\x86\x35\x77\x05\xfc\xee\x54\x1e\x82\x8c\xd1\xc6\xa3\x4a\x81\xee\x62\x32\x41\x10\xf8\x3f\xf6\xf0\x4a\x96\x6c\xb0\x65\x6c\x90\x34\x02\x67\x93\xbb\x61\x96\x1d\xe4\x5f\xee\xdb\xb6\x4b\x26\x63\x1e\xde\x76\xbd\x46\xf8\x29\x69\x44\xf8\xb6\x0b\x79\x35\xf1\x05\xbb\xfa\xa2\x72\xd1\x47\x23\x95\x13\xc3\xa0\xc7\x10\x46\x57\xe8\x87\x1f\x1e\xdd\x84\x67\x38\xfa\xfa\xa7\x0a\x46\xe8\xab\x90\x31\xe1\x3f\x58\x64\x4c\x8f\x25\x05\x92\x46\x44\x7e\x34\x0f\xff\xbd\x87\xef\x3b\x75\xd6\x7a\xa3\x5a\xe0\xe8\xe6\xac\xb7\x79\xd7\x27\x64\x83\x2d\xa8\xb4\xf4\x8c\xcc\x03\xbc\x3d\x44\xd8\x63\xdd\xb3\xb7\xdd\xfb\x97\x25\x7d\xd0\xd9\xcb\x37\xe0\x0b\x48\x25\xf4\x68\x6f\x5b\xdb\x4e\xf4\x70\x07\xbe\x5b\xc3\x7f\x3b\xee\x92\x9e\x6d\xf8\x50\x42\xd6\x8d\xdf\x7d\xe7\x1e\x38\xd8\x03\x46\xdd\x98\x61\xf8\xa8\x86\x8f\x64\xaa\x1f\x59\x83\xff\xbc\xd8\x67\x7b\x88\xba\x71\x9f\xd0\xb1\x68\x15\x99\xff\xf3\x61\x3e\xf5\x2c\x5f\xfa\x28\x5f\x66\x4a\xfb\xd1\xb0\x9e\x5d\x3c\xfa\x68\xd6\x32\x0b\xff\x2d\xe7\xdd\x13\x39\xef\xba\x9c\x03\x9b\x7f\x07\x00\x00\xff\xff\xd4\x95\x84\xc5\x0e\x08\x00\x00") + +func testImagesAgnhostMounttestMt_utilsGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostMounttestMt_utilsGo, + "test/images/agnhost/mounttest/mt_utils.go", + ) +} + +func testImagesAgnhostMounttestMt_utilsGo() (*asset, error) { + bytes, err := testImagesAgnhostMounttestMt_utilsGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/mounttest/mt_utils.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostMounttestMt_utils_windowsGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x55\x4d\x6f\xdb\x46\x13\x3e\x73\x7f\xc5\xbc\x04\x92\x90\x79\x69\xd2\x71\x2f\xad\x0b\x1d\x14\x7f\x34\x44\x52\xc9\x30\xe5\x1a\x01\x7a\x59\x91\x43\x71\x11\x72\x97\x99\x9d\x15\x2d\x14\xf9\xef\xc5\x52\xb4\x2d\xdb\xf5\xad\x87\x5e\xd6\xf4\xce\xcc\xb3\xcf\x33\x5f\xca\x32\xf8\xff\xda\xa9\xb6\x82\x41\xe9\xca\x0c\x56\x88\xec\xbd\x38\x33\xfd\x8e\xd4\xa6\x61\x38\x39\xfe\xf0\x0b\xac\x1a\x84\xcf\x6e\x8d\xa4\x91\xd1\xc2\xdc\x71\x63\xc8\xa6\x42\x7c\x51\x25\x6a\x8b\x15\x38\x5d\x21\x01\x37\x08\xf3\x5e\x96\x0d\xc2\x64\x49\xe0\x0f\x24\xab\x8c\x86\x93\xf4\x18\x22\xef\x10\x4e\xa6\x30\xfe\x55\xec\x8c\x83\x4e\xee\x40\x1b\x06\x67\x11\xb8\x51\x16\x6a\xd5\x22\xe0\x5d\x89\x3d\x83\xd2\x50\x9a\xae\x6f\x95\xd4\x25\xc2\xa0\xb8\x19\x1f\x99\x20\x52\xf1\x75\x02\x30\x6b\x96\x4a\x83\x84\xd2\xf4\x3b\x30\xf5\xa1\x17\x48\x16\x02\x00\xa0\x61\xee\x4f\xb3\x6c\x18\x86\x54\x8e\x2c\x53\x43\x9b\xac\xdd\x7b\xd9\xec\x4b\x7e\x76\xb1\x28\x2e\x8e\x4e\xd2\x63\x21\x6e\x74\x8b\xd6\x02\xe1\x77\xa7\x08\x2b\x58\xef\x40\xf6\x7d\xab\x4a\xb9\x6e\x11\x5a\x39\x80\x21\x90\x1b\x42\xac\x80\x8d\xe7\x39\x90\x62\xa5\x37\x09\x58\x53\xf3\x20\x09\x45\xa5\x2c\x93\x5a\x3b\x7e\x92\xa0\x7b\x56\xca\xc2\xa1\x83\xd1\x20\x35\x84\xf3\x02\xf2\x22\x84\x8f\xf3\x22\x2f\x12\x71\x9b\xaf\x3e\x2d\x6f\x56\x70\x3b\xbf\xbe\x9e\x2f\x56\xf9\x45\x01\xcb\x6b\x38\x5b\x2e\xce\xf3\x55\xbe\x5c\x14\xb0\xbc\x84\xf9\xe2\x2b\x7c\xce\x17\xe7\x09\xa0\xe2\x06\x09\xf0\xae\x27\xcf\xdd\x10\x28\x9f\x3a\xac\x52\x51\x20\x3e\x79\xbc\x36\x7b\x32\xb6\xc7\x52\xd5\xaa\x84\x56\xea\x8d\x93\x1b\x84\x8d\xd9\x22\x69\xa5\x37\xd0\x23\x75\xca\xfa\xe2\x59\x90\xba\x12\xad\xea\x14\x4b\x1e\xff\x7f\x21\x27\x15\xef\x33\x21\x7a\x59\x7e\xf3\x20\x9d\x71\x9a\x19\x2d\x0b\xa1\xba\xde\x10\x43\x24\x82\x70\xbd\x63\xb4\xa1\x08\xc2\xba\x63\xff\xc7\xd8\xfd\x99\xe1\x1d\x96\xfe\xd3\x32\x95\x46\x6f\xa7\x4f\xa5\x37\x36\x14\xb1\x10\xb5\xd3\x25\xb8\x4e\xda\x6f\x91\x3f\x40\x69\x8e\xfd\x01\x7f\x89\x20\xcb\x40\x1b\xd3\x8f\x82\x6e\xf7\x1d\x9c\x8a\x80\x90\x1d\x69\x38\x16\x3f\xa6\x68\xdf\x53\xcb\x41\x23\x45\xbd\xe4\x06\xf6\xe8\x31\x20\x91\xa1\x09\x66\x8a\x86\xca\xa0\x1d\x1b\xb2\x91\x5b\x04\xe3\x83\xe0\x26\x3f\x87\x0c\x7e\xcb\xcf\x53\xf8\x64\x06\xdc\x22\x25\xa0\xbc\x87\x9d\x1c\x8a\xfc\x3c\x9d\xc8\x30\x94\x8e\x08\x35\xb7\xbb\x31\xff\xd8\xa1\xf6\x05\x56\xfa\x60\x86\x7c\x97\x8c\xc4\x1f\xc9\x6a\xd5\x3e\xa1\xfb\xbb\xa9\xf0\x15\xb6\xaa\x86\xd1\x30\x9b\x41\x18\xfa\x8b\x43\x8c\xe0\x87\x10\xc1\x41\xed\x12\x1f\x07\xa7\x33\xd8\x20\x5f\xaa\x16\xaf\x90\xba\x11\x37\x1e\x81\xbc\xf1\x7f\x33\x1f\x79\x08\x84\x44\x7b\xa0\xba\xe3\xf4\x8a\x94\xe6\x3a\x0a\x3b\x53\xa1\x9f\xad\xfb\x4c\x8d\x83\xfa\xe6\xfb\x29\xbc\xd9\xfe\xa9\xc3\x64\xe4\x94\x1c\xb6\x4d\xfc\xaa\xb8\x07\x12\xff\x19\x71\x1e\xd4\xfe\x0b\xea\x9e\x13\x79\x10\x18\x19\x9b\x5e\x4e\x75\x4d\xf6\x72\x63\xcf\x6a\x2b\xc9\x4f\x47\x60\x1c\xfb\x25\x35\x0e\x49\xfa\xd1\xd5\x35\x92\x08\x02\x24\x5a\x3a\x7e\x76\x1b\x0b\x11\x94\x5d\xe5\x75\xfb\xd1\x49\xcf\x4c\xd7\x49\x5d\x45\x61\x6f\x06\x24\xdb\x60\xdb\xa6\x78\x87\x61\x02\xe1\xd1\xc2\xe8\x5c\x33\x92\x2c\x59\x6d\xc7\xab\x34\xbb\xaf\xc0\x24\x24\xed\xed\x87\x30\x11\x41\x10\x1e\x79\x82\x0b\xd9\xe1\xa4\x37\x1e\xdf\x49\x0b\xae\x3c\xbb\x19\xbc\x35\x8e\x1f\xae\x7c\x72\x67\xf0\x76\xcf\x50\x04\x53\x21\xbc\xf1\xda\xe9\xc8\x73\x7c\x59\x81\xc3\x8c\xef\x2b\x5e\x93\xe9\xe0\xca\xf3\x2e\x3c\x6f\x28\x4a\x52\x3d\xfb\xac\x27\xf7\x99\x47\xa2\xf1\x58\x3a\x4e\x8b\x31\x9b\x51\x1c\x3f\x96\xf3\x38\x79\xac\xa8\x71\xdc\x3b\xf6\x3c\xa6\x05\x92\xae\x48\x75\x45\x2f\x4b\x8c\xcc\xd3\xf0\xad\x6c\x1f\xba\x67\x5a\x3c\xe9\x95\x24\x8b\xb9\xe6\x68\x8f\x93\xc0\xcf\x09\xfc\x74\xf2\x8f\xbd\xf4\x52\x49\x2f\xc9\xfa\xbd\xb9\x7f\x19\xde\xbd\xb1\xef\x40\x5a\xbf\xa8\x1e\x7a\xe8\x1e\x16\x89\x5e\x11\x30\x5d\x1d\xf4\x4a\xb4\x95\x6d\x9c\x3c\x9d\x20\xbb\xda\xf5\xaf\x2d\x87\x2c\x03\xa3\xdb\x1d\x2c\x56\x97\x85\xff\x91\xb1\xae\xf7\x1b\x18\x2b\x90\x3c\x6e\xec\xce\xf8\x8d\xf4\x7c\xf1\xfc\x1d\x00\x00\xff\xff\xe2\x4e\xea\x18\x09\x08\x00\x00") + +func testImagesAgnhostMounttestMt_utils_windowsGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostMounttestMt_utils_windowsGo, + "test/images/agnhost/mounttest/mt_utils_windows.go", + ) +} + +func testImagesAgnhostMounttestMt_utils_windowsGo() (*asset, error) { + bytes, err := testImagesAgnhostMounttestMt_utils_windowsGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/mounttest/mt_utils_windows.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostNetCommonCommonGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\x4f\x4f\xf4\x36\x10\xc6\xcf\xf8\x53\x3c\xda\x13\xa0\x25\xa1\xa8\xa7\xf6\xb4\x05\xaa\xa6\xa0\xac\xb4\x59\x8a\x38\x7a\x9d\xd9\xc4\x22\xb1\xdd\xf1\x98\x10\x21\xbe\xfb\xab\x84\xe5\xdf\xfb\xde\x12\xcd\xe3\xdf\xfc\x66\xec\xfc\x54\x5d\xfa\x30\xb2\x6d\x5a\xc1\xc5\xf9\x6f\xbf\x63\xdb\x12\x6e\xd2\x8e\xd8\x91\x50\xc4\x2a\x49\xeb\x39\x66\x4a\xdd\x5a\x43\x2e\x52\x8d\xe4\x6a\x62\x48\x4b\x58\x05\x6d\x5a\xc2\xa1\xb2\xc4\x7f\xc4\xd1\x7a\x87\x8b\xec\x1c\xc7\x53\x60\x71\x28\x2d\x4e\xfe\x54\xa3\x4f\xe8\xf5\x08\xe7\x05\x29\x12\xa4\xb5\x11\x7b\xdb\x11\xe8\xd9\x50\x10\x58\x07\xe3\xfb\xd0\x59\xed\x0c\x61\xb0\xd2\xce\x4d\x0e\x88\x4c\x3d\x1c\x00\x7e\x27\xda\x3a\x68\x18\x1f\x46\xf8\xfd\xd7\x14\xb4\x28\x05\x00\xad\x48\xf8\x23\xcf\x87\x61\xc8\xf4\x6c\x99\x79\x6e\xf2\xee\x2d\x15\xf3\xdb\xe2\xf2\xba\xac\xae\xcf\x2e\xb2\x73\xa5\xee\x5c\x47\x31\x82\xe9\xff\x64\x99\x6a\xec\x46\xe8\x10\x3a\x6b\xf4\xae\x23\x74\x7a\x80\x67\xe8\x86\x89\x6a\x88\x9f\x3c\x07\xb6\x62\x5d\xb3\x44\xf4\x7b\x19\x34\x93\xaa\x6d\x14\xb6\xbb\x24\xdf\x16\xf4\x6e\x65\x23\xbe\x06\xbc\x83\x76\x58\xac\x2a\x14\xd5\x02\x7f\xad\xaa\xa2\x5a\xaa\xfb\x62\xfb\xcf\xfa\x6e\x8b\xfb\xd5\x66\xb3\x2a\xb7\xc5\x75\x85\xf5\x06\x97\xeb\xf2\xaa\xd8\x16\xeb\xb2\xc2\xfa\x6f\xac\xca\x07\xdc\x14\xe5\xd5\x12\x64\xa5\x25\x06\x3d\x07\x9e\xdc\x3d\xc3\x4e\xab\xa3\x3a\x53\x15\xd1\xb7\xe6\x7b\xff\x26\x13\x03\x19\xbb\xb7\x06\x9d\x76\x4d\xd2\x0d\xa1\xf1\x4f\xc4\xce\xba\x06\x81\xb8\xb7\x71\xba\xbc\x08\xed\x6a\xd5\xd9\xde\x8a\x96\xf9\xff\x97\x71\x32\x75\x9a\x2b\x15\xb4\x79\x9c\x20\xc6\xf7\xbd\x77\x4a\xd9\x3e\x78\x16\x2c\x3a\xdf\x2c\x94\xca\x73\x6c\x92\x73\xc4\xd3\xec\x1a\xa6\xb3\xe4\x64\xd2\x8c\xc4\x4f\x13\xce\x83\x93\xcb\x94\x8c\x81\x3e\x92\x4e\x88\xf7\xda\x10\x5e\xd4\x51\x9e\xa3\xa4\x61\x1d\xde\x1c\x98\x24\xf1\xe4\x06\x47\x03\xa8\x0f\x32\xc2\x1f\x6a\x51\x38\x19\x49\x4c\x13\x74\x47\x08\x3e\xa4\x4e\x0b\xd5\x33\x64\x37\x62\xcf\xbe\x9f\xfd\xff\xad\xd6\x25\xce\xde\xcf\x69\x6e\x52\x4f\x4e\x32\x75\xf4\xd9\xe9\xf8\xe4\x53\xe3\xe5\x75\x26\x6c\x92\x9b\x4f\xff\x3c\xc3\x12\xa2\x1f\xa7\xe5\x59\xf7\xee\x92\x61\x3b\xbd\x6a\x7a\x26\x93\x64\xbe\x85\x99\x20\x14\x05\xc6\xd7\x94\xa9\xa3\x4d\x72\xc7\x9d\x6f\x1a\x62\x9c\x76\xbe\xc9\x6e\xe7\xef\xe5\xc7\x34\x5f\xba\x9f\x80\x98\x3d\xab\x57\xf5\x23\x00\x00\xff\xff\xb0\x3a\x4e\xbc\xa7\x03\x00\x00") + +func testImagesAgnhostNetCommonCommonGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostNetCommonCommonGo, + "test/images/agnhost/net/common/common.go", + ) +} + +func testImagesAgnhostNetCommonCommonGo() (*asset, error) { + bytes, err := testImagesAgnhostNetCommonCommonGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/net/common/common.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostNetMainGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x57\x6d\x6f\xdc\xb8\x11\xfe\x2c\xfe\x8a\x29\x8b\x24\x52\x2c\x4b\x4e\xee\x8a\x3a\x7b\xe7\x03\xf6\x7c\x0e\xe2\x9e\x63\x07\xbb\xce\xa5\x87\x24\xc0\x71\xa5\x59\x2d\x6b\x89\x54\x49\xca\x6b\x23\xf5\x7f\x2f\x86\x94\xd6\x52\xec\xb6\x01\xfa\x69\x57\x7c\x99\x97\x67\x9e\x79\x48\xe6\xcf\xd9\xb1\x6e\x6f\x8d\xac\x36\x0e\x5e\x1e\xbc\xf8\x1e\x2e\x37\x08\xbf\x76\x2b\x34\x0a\x1d\x5a\x98\x77\x6e\xa3\x8d\xcd\x18\x3b\x93\x05\x2a\x8b\x25\x74\xaa\x44\x03\x6e\x83\x30\x6f\x45\xb1\x41\xe8\x67\x52\xf8\x0d\x8d\x95\x5a\xc1\xcb\xec\x00\x62\x5a\xc0\xfb\x29\x9e\xfc\xc0\x6e\x75\x07\x8d\xb8\x05\xa5\x1d\x74\x16\xc1\x6d\xa4\x85\xb5\xac\x11\xf0\xa6\xc0\xd6\x81\x54\x50\xe8\xa6\xad\xa5\x50\x05\xc2\x56\xba\x8d\x77\xd2\x9b\xc8\xd8\xef\xbd\x01\xbd\x72\x42\x2a\x10\x50\xe8\xf6\x16\xf4\x7a\xbc\x0a\x84\x63\x0c\x00\x60\xe3\x5c\x3b\xcb\xf3\xed\x76\x9b\x09\x1f\x65\xa6\x4d\x95\xd7\x61\x95\xcd\xcf\x4e\x8f\x4f\xce\x97\x27\xfb\x2f\xb3\x03\xc6\xde\xab\x1a\xad\x05\x83\xff\xec\xa4\xc1\x12\x56\xb7\x20\xda\xb6\x96\x85\x58\xd5\x08\xb5\xd8\x82\x36\x20\x2a\x83\x58\x82\xd3\x14\xe7\xd6\x48\x27\x55\x95\x82\xd5\x6b\xb7\x15\x06\x59\x29\xad\x33\x72\xd5\xb9\x09\x40\x43\x54\xd2\xc2\x78\x81\x56\x20\x14\xf0\xf9\x12\x4e\x97\x1c\x7e\x9e\x2f\x4f\x97\x29\xfb\x70\x7a\xf9\xe6\xe2\xfd\x25\x7c\x98\x2f\x16\xf3\xf3\xcb\xd3\x93\x25\x5c\x2c\xe0\xf8\xe2\xfc\x97\xd3\xcb\xd3\x8b\xf3\x25\x5c\xbc\x86\xf9\xf9\xef\xf0\xeb\xe9\xf9\x2f\x29\xa0\x74\x1b\x34\x80\x37\xad\xa1\xd8\xb5\x01\x49\xd0\x61\x99\xb1\x25\xe2\xc4\xf9\x5a\x87\x60\x6c\x8b\x85\x5c\xcb\x02\x6a\xa1\xaa\x4e\x54\x08\x95\xbe\x46\xa3\xa4\xaa\xa0\x45\xd3\x48\x4b\xc5\xb3\x20\x54\xc9\x6a\xd9\x48\x27\x9c\xff\x7e\x90\x4e\xc6\x9e\xe7\x8c\xb5\xa2\xb8\x22\x23\x0a\x1d\x63\xb2\x69\xb5\x71\x10\xb3\x88\xaf\x6e\x1d\x5a\xce\x22\x8e\xaa\xd0\xa5\x54\x55\xfe\x0f\xab\x15\x0d\xac\x1b\x47\x3f\x52\xe7\x52\x77\x4e\xd6\xf4\x51\xeb\x8a\x7e\x14\xba\x9c\x4a\x46\xff\xb5\xdf\x4d\x68\xa9\xca\x72\xc6\x22\x5e\x49\xb7\xe9\x56\x59\xa1\x9b\xdc\xb6\xeb\x17\xdf\xe5\x85\x5e\x19\xe1\xa7\xae\x0e\x6d\x26\x75\x7e\xb5\x63\x6c\xee\xd0\xba\x5c\x36\xa2\x42\x9b\x8b\x4a\x6d\xb4\x75\x39\x99\x2f\x74\xd3\x84\x38\xbe\x7d\x8f\x12\x8e\xb3\x84\x31\x77\xdb\x22\x98\x4e\x29\x34\x6f\x45\x0b\x8d\x68\x3f\x86\xf8\x3e\x07\xab\xd9\xc2\xcf\x31\x76\x2d\x0c\x81\x90\xe7\xb0\xae\x45\x65\x77\xd8\xd3\x32\xa1\x4a\xa8\xa5\xc2\x0c\xa8\x42\x9d\x25\xf0\x84\xa9\x2c\xac\xb0\xd6\x5b\x5a\xea\x37\x96\x68\x0b\x23\x5b\x8f\x7d\xc6\xa2\x60\xc7\x3a\xd3\x15\x0e\xbe\xb0\x28\x5a\xa2\xb9\x46\x00\x08\x01\xb0\x28\x0a\xbe\x47\x03\x17\x61\xf3\x6e\xe0\xce\xdb\x0d\xe1\x5b\xe2\xa2\xa0\x0c\x60\x6d\x74\xd3\x8f\x82\x12\x0d\x12\xb7\xfb\x4f\xa9\xac\xa3\x2e\xcc\x58\x34\x6c\x3b\x82\x46\x5c\xe1\x62\xc0\x20\x4e\x76\xb8\xd4\xba\xba\xe8\x5c\xdb\xb9\x51\x94\x2b\xf0\x34\xc8\x7e\xee\xd6\x6b\x34\xec\x8e\xb1\x3c\x87\xe3\xa6\x3c\x47\x47\x01\x74\xb6\x6f\xb3\x80\x35\x1c\x53\x3d\x33\x8f\x5e\xbf\xe8\x08\x9e\xfa\x22\x67\xc7\x01\xb9\x2f\x2c\x7a\x6f\x71\x06\x00\xc4\x15\x9e\xb2\x68\xb9\xd1\xc6\xcd\x80\x1f\x1b\x14\xa4\x54\x5b\x5c\x59\x82\xc6\x50\x33\xf4\x79\x10\xfc\xd7\xc2\x48\xdd\x59\xe2\xe9\x56\x9b\x2b\x62\x3b\x95\xdb\x92\x8d\x33\xad\xaa\x19\xfc\x41\x9a\x67\xbb\xd5\x50\xa4\xad\xac\x6b\xb2\xe0\x2b\xd7\x6f\xf3\x7b\x3c\x32\xd0\x7b\x69\x74\x89\x20\x83\xfa\xf0\xfd\x7d\x3f\xca\x7d\xd9\x29\xc3\x4a\x5e\xa3\x4a\xa9\x97\xfc\x82\x01\x45\x61\x10\x9c\x91\x55\x85\x24\x34\x6e\x63\x74\x57\x6d\xe0\xcd\xe5\xe5\x3b\x2f\x3f\x14\x57\xc6\xd8\xbc\x76\x68\x94\x70\xf2\x1a\xeb\xdb\x74\xe4\x24\x98\x79\xe0\x45\xba\x10\x33\xde\x60\xd1\xb9\xd0\xfd\x7e\x6a\xc0\xa1\x94\x06\x0b\x57\xdf\x66\x70\xae\xfd\xbc\x70\x63\x73\x14\xe5\x34\x05\x0b\x85\x50\xa4\xd4\xab\xc1\x92\x70\x41\x44\x3c\x51\x64\x83\x19\x63\x27\x37\xa2\x69\x6b\xb4\xb3\x20\xb9\x43\x31\x15\x3a\x18\x6c\x83\x12\x6e\xbf\xa8\xb5\xc5\xad\x90\xf4\x4f\xa2\xa2\x59\xdd\x53\xf4\xd9\x17\xbe\xc0\x46\x3b\x9c\x97\xa5\xe1\x33\xfe\xe2\xe5\x5f\xb3\x83\xec\x20\x7b\x31\x7b\xf5\xea\xd5\x2b\x7e\xf7\xec\x31\xd3\x3e\x4e\x98\x1d\x1e\x1e\xbe\x82\xa7\x4f\xa1\xe8\x4c\x0d\xfb\xd7\xb0\xff\x77\x78\x77\xb1\xbc\x84\x5a\x17\xa2\xa6\xe5\x7e\x45\x6e\x3a\x95\x4f\xa3\xe8\x0b\xb8\x5f\x92\xfb\x33\x5a\xfd\x1f\xbd\xff\x91\xb2\x68\x6e\x2a\x3b\x83\xc0\xc6\xb7\xe2\x46\x36\x5d\x73\x4e\x63\xf1\x41\x92\x32\xea\xbe\x19\x40\x23\xa4\x4a\x89\xe6\xeb\x4e\x15\x20\x95\x74\x71\x42\x7d\x50\x63\x25\xea\x45\x5f\xfc\xd9\x11\x70\xce\x22\x22\xe5\x15\x7d\x18\xa1\xaa\x7b\x6a\x50\x6f\x4f\x96\xef\x1d\x01\x07\x0e\x7b\x70\xe5\x5b\x38\x34\x46\xf6\x9a\xaa\x13\x27\xd9\xd2\x37\xf7\x6f\xc2\xc4\x4f\x7d\xc1\x32\xaf\x0b\x29\xf0\x50\xc5\x14\x38\x11\x3c\xe2\x94\x1a\x9d\x10\x54\x63\xaf\xd1\x4e\xc3\x4a\x2a\x7f\x92\xc5\x98\x55\x19\xdc\x67\x7d\x78\x70\x78\x90\x90\x3c\x39\xe7\xdb\x84\x4e\x68\x4f\x2c\xbe\xc7\xa2\x28\xe2\xdf\xd6\x13\x7d\xe5\x1f\xa7\x7a\x6f\x69\xca\x78\x9e\xfc\xef\xf4\x02\x2a\x29\xf0\x9e\xb4\x3e\x41\xe0\xbd\xf8\x39\xbd\x23\x7f\x2c\xae\x85\xac\xe9\xe8\x9e\xf1\xbd\x31\xa0\x7b\x3c\xf9\x16\x47\xbd\x7a\xa6\xc0\x7b\x92\x0e\xae\xfe\xb6\xbc\x38\x87\x81\xb8\x4e\x7b\x24\x82\x69\x9e\xec\x4a\x4f\x44\x88\x8b\xa6\x84\xe7\x13\xf9\x4a\x83\xd2\x7f\xfc\x1c\x34\xd9\x73\x43\xae\x61\x9c\x1a\x1c\x11\x3d\x88\xd0\xa3\x7a\xf6\x83\x9e\x1b\xba\xca\x5e\x0b\x27\xea\x75\xcc\xdf\x76\xd6\x81\x45\x37\x5c\x03\x76\xed\xa6\xcd\xd0\x1f\x29\x58\x44\xd8\xdf\xdf\x60\xdd\x52\xda\x77\x8c\x79\x13\x4b\x74\x21\x75\x6f\x2f\x80\x00\xff\x22\x11\xcf\xce\x2c\x49\x2a\x5d\xc9\x12\x36\x0a\xef\xeb\x40\xb4\x17\xfb\x14\xd0\x18\x62\x71\x8f\x7b\x48\x22\x9e\x16\x6b\x82\x68\xc2\x22\x32\x4a\xdb\x8e\x8e\x40\xc9\xda\x5b\x8b\xd6\x8d\xcb\xde\x19\xa9\x5c\xcc\x83\xe5\xd9\x27\xf5\x49\x11\xef\xc3\x67\xb6\xea\x6b\x14\x27\x64\x21\xd2\x36\x3b\xb9\x91\x2e\x3e\xa0\xaf\x3b\xc0\xda\x62\x30\x44\x29\x78\x43\xeb\x98\x9f\x18\xa3\xcd\x0c\x9e\x5c\x73\x1f\x67\xf2\xff\x38\x7a\xe1\x1d\xb1\xb1\x2f\xba\xaa\x64\x6f\x84\x2a\x6b\x7c\xdd\xa9\x22\xe6\x5e\x65\x78\x0a\x1b\x3f\xb6\xe8\xd4\x22\x70\x3b\x61\xd3\xb8\x08\x18\x6a\xad\xe1\xa4\x52\x21\xc4\x11\xd0\xc9\xb8\xd4\xb1\x77\x74\x26\xad\x43\x35\x57\xa5\x5f\x10\x4f\xda\x5d\xc9\x3a\xf1\xd5\xbd\x27\xe0\xe4\x94\x1e\xdd\x5a\xbe\x8c\xae\x01\xe1\xc0\x97\x16\x7e\x6c\xaf\xaa\x9f\xf6\x7f\xa4\xa2\xff\xb4\xff\xe3\x70\x45\xfc\x89\x0e\x7e\x74\x9d\x51\xf7\xfb\x29\x6f\xfe\x98\x9c\xf3\x19\xa9\x7c\x76\x8e\xdb\x63\x9a\xf9\x20\xa4\x3b\xf6\x13\x71\x92\x3e\xdc\x13\x32\x7f\x64\x8f\x4f\xc8\xf8\x3d\xf7\xd9\x4c\xc9\xe5\x83\x0e\x1d\x94\x82\x11\xdb\xe9\x45\x27\x81\x78\x77\x15\xf1\x55\xd7\xc6\xf7\x99\xe9\xc9\xa8\x83\xe8\x06\x31\xf8\x48\xb6\x3e\x7b\x96\xeb\xab\x40\xeb\xde\xd8\x6e\x0d\x45\xd7\x7b\x88\x47\xdc\x9d\x1d\x01\x5d\x68\xb3\xf7\xaa\x11\xc6\x6e\x44\x1d\x7f\xfc\x4c\x97\x9d\xf8\x3e\xa0\x24\x1d\x74\x22\xf9\xc1\xef\xf9\xd3\x88\xef\x3d\xae\xbb\x50\xbf\xdc\xa5\x40\xd4\xf4\x94\x5d\xc7\xfc\x54\x5d\x8b\x5a\x96\x3b\xa5\x21\xd9\x99\x32\x99\x5a\x79\xc2\xaa\xde\xed\x0c\x9e\xec\xd1\xb2\xc1\x37\xdb\x35\x2b\x05\x3d\x72\x18\xb6\x57\x68\xfa\x71\xca\x34\x7e\x3a\x74\x41\x0a\xfc\xcf\xc0\xd3\x47\x24\x61\x88\x7d\x50\x80\x1e\xa7\x45\xa7\xe2\x60\x6f\xe4\xdb\x47\xf9\xad\xb9\x06\x43\x33\x78\xf6\xe4\xfa\xd9\x44\xb8\x06\x1f\x49\x7f\x85\xfc\xba\xbf\xfa\x01\xba\xd2\xf6\xa7\x89\xc7\x6b\x90\xe7\xe9\x41\x95\x05\x4e\x7d\x6d\x23\xde\xfa\xd7\x62\xb6\x40\xdb\x6a\x65\xf1\x83\x91\x8e\x52\x31\xf0\xbc\x1f\x0f\xad\xec\xcf\xf3\x11\xea\x0f\x62\xf1\x35\x7a\x6e\x08\xa9\xce\xd4\xef\x84\x71\x9e\x4d\xfd\x4b\x26\x5b\xb6\xb5\x74\xb1\xc9\xde\x2f\xce\xb2\x77\xc2\x6d\x52\xe0\x39\x29\xb3\x5c\x43\x8d\x2a\x1e\xb6\x24\xc4\x96\xef\xee\x65\xc6\x63\x15\x6f\x03\x70\xcb\xb6\x77\x2e\x07\xe4\x7a\xdf\xe1\xee\xde\xf3\x64\x67\x2a\x85\xef\x0f\xbc\x4e\x86\x42\xf4\x45\x09\x0a\x30\x3b\xda\xad\xfb\xf8\x32\x74\x82\xc9\x7e\xd6\xe5\xed\x58\x9d\xa7\x11\xf0\xb7\xf4\x46\x54\xd5\xce\xeb\x4a\x97\xb7\xfc\x51\x27\x34\xb3\x3b\x22\xc2\x73\x2f\x5b\xa0\x28\xe7\x75\x1d\x07\x37\x21\xf3\xaf\xba\xe3\xbf\x64\xec\x1b\x1a\x0c\x0a\x7a\x53\x7a\xcf\xa3\xae\x78\x34\x06\x7a\x4e\xf4\xfc\xdf\x31\x30\x74\xfc\xe8\x04\xfb\xfa\x00\x1b\xd4\x22\x54\x2d\x26\x3f\xc9\xc3\x2e\x2e\xb4\x72\xa8\x42\x7d\x27\x51\xfa\xd8\xc7\x4f\x2b\x0a\xf2\x93\x1a\x1d\x38\x4f\xfc\xcb\x23\x8a\xd0\x50\xbb\x3c\x76\xf2\x4c\x41\x18\x5c\xa5\xf0\x97\x87\x29\x92\xef\xd7\xbd\x6f\x2a\x90\xbe\x9a\xf8\xe2\x7b\x8f\x38\xb8\x63\xff\x0e\x00\x00\xff\xff\xbe\x8b\x61\x8e\xf6\x11\x00\x00") + +func testImagesAgnhostNetMainGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostNetMainGo, + "test/images/agnhost/net/main.go", + ) +} + +func testImagesAgnhostNetMainGo() (*asset, error) { + bytes, err := testImagesAgnhostNetMainGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/net/main.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostNetNatClosewaitGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x57\x6d\x6f\xdb\xc8\x11\xfe\xcc\xfd\x15\x73\x02\x2e\xa0\x0c\x89\x74\xf2\xa1\x28\x92\x4b\x00\x55\xb6\x7b\xea\x19\x52\x60\x29\x35\x0e\x45\x51\xac\xc8\x21\xb9\xf0\x6a\x97\xdd\x5d\x4a\xa7\x26\xfe\xef\xc5\x2c\x49\x99\x94\x64\xc7\x87\xf6\xfc\xc1\x92\xb8\xf3\xf2\xcc\xcb\xce\x33\x8c\x2f\xd8\x54\x97\x7b\x23\xf2\xc2\xc1\xbb\xcb\xb7\x7f\x82\x55\x81\xf0\x4b\xb5\x46\xa3\xd0\xa1\x85\x49\xe5\x0a\x6d\x6c\xc4\xd8\xad\x48\x50\x59\x4c\xa1\x52\x29\x1a\x70\x05\xc2\xa4\xe4\x49\x81\xd0\x9c\x8c\xe0\xef\x68\xac\xd0\x0a\xde\x45\x97\x10\x92\xc0\xa0\x39\x1a\x0c\x3f\xb0\xbd\xae\x60\xc3\xf7\xa0\xb4\x83\xca\x22\xb8\x42\x58\xc8\x84\x44\xc0\xdf\x12\x2c\x1d\x08\x05\x89\xde\x94\x52\x70\x95\x20\xec\x84\x2b\xbc\x93\xc6\x44\xc4\x7e\x6d\x0c\xe8\xb5\xe3\x42\x01\x87\x44\x97\x7b\xd0\x59\x57\x0a\xb8\x63\x0c\x00\xa0\x70\xae\x7c\x1f\xc7\xbb\xdd\x2e\xe2\x1e\x65\xa4\x4d\x1e\xcb\x5a\xca\xc6\xb7\xb3\xe9\xf5\x7c\x79\x3d\x7e\x17\x5d\x32\xf6\x45\x49\xb4\x16\x0c\xfe\xbb\x12\x06\x53\x58\xef\x81\x97\xa5\x14\x09\x5f\x4b\x04\xc9\x77\xa0\x0d\xf0\xdc\x20\xa6\xe0\x34\xe1\xdc\x19\xe1\x84\xca\x47\x60\x75\xe6\x76\xdc\x20\x4b\x85\x75\x46\xac\x2b\xd7\x4b\x50\x8b\x4a\x58\xe8\x0a\x68\x05\x5c\xc1\x60\xb2\x84\xd9\x72\x00\x7f\x99\x2c\x67\xcb\x11\xbb\x9f\xad\x7e\x5e\x7c\x59\xc1\xfd\xe4\xee\x6e\x32\x5f\xcd\xae\x97\xb0\xb8\x83\xe9\x62\x7e\x35\x5b\xcd\x16\xf3\x25\x2c\x6e\x60\x32\xff\x15\x7e\x99\xcd\xaf\x46\x80\xc2\x15\x68\x00\x7f\x2b\x0d\x61\xd7\x06\x04\xa5\x0e\xd3\x88\x2d\x11\x7b\xce\x33\x5d\x83\xb1\x25\x26\x22\x13\x09\x48\xae\xf2\x8a\xe7\x08\xb9\xde\xa2\x51\x42\xe5\x50\xa2\xd9\x08\x4b\xc5\xb3\xc0\x55\xca\xa4\xd8\x08\xc7\x9d\xff\x7d\x12\x4e\xc4\x2e\x62\xc6\x4a\x9e\x3c\x90\x11\x45\x29\x8f\x2f\x58\x22\x05\x2a\x17\x5b\x34\x5b\x34\xb5\x53\xb4\x94\x25\x98\xde\x2e\x96\xd7\xff\xba\x9f\xcc\x56\xe0\xc4\x06\x75\xe5\x20\xd1\x2a\x15\x64\x9e\xb2\x29\x4a\x47\x99\xb6\x30\x9f\xac\x22\xd6\x18\x82\xde\x5f\x6d\x95\x01\x7c\x83\xd3\xbf\x6f\xf4\xfc\xa7\xf1\xd8\x25\x25\x14\x5c\xa5\xb6\xe0\x0f\x38\x1e\x7f\x6a\x9f\xfb\xbf\x4c\xa8\xe6\xdb\xf8\x1b\x14\x5c\x66\xe3\x44\x6a\xca\x8e\xd1\x9b\xef\x98\x87\x06\x91\xb0\x84\xf6\x29\x1a\x9f\x06\xb1\x29\xb5\x71\x10\xb2\x60\x80\xc6\x68\x63\x07\x2c\x18\x08\x4d\xff\xa5\xce\xe9\x43\xa1\xa3\x0f\x0a\x7d\xc0\x58\x30\x78\xf8\xb3\x8d\x84\x8e\x1f\x0e\x97\x2c\xa6\x44\xc5\x62\xc3\x73\xb4\x31\xcf\x55\xa1\xad\x8b\x15\xba\x38\xd1\x9b\x8d\x56\x03\x36\x64\x2c\x8e\x41\x22\x7f\xc0\x74\xaa\x95\xc2\xa4\x4e\x9d\x05\x0e\xb9\xd4\x6b\x2e\x61\xcb\x8d\xf0\xed\xea\x0a\xee\xc0\x16\xba\x92\xa9\xd7\xf0\x85\xe3\x89\x13\x5b\x24\x23\xc9\x93\x3a\xb7\x56\xe4\x0a\x53\x28\xd0\x60\xc4\xe2\x58\x0a\xe5\xde\x8b\x5c\x69\x83\xf0\xe5\xed\xe5\xe5\x25\x08\xe5\x50\x91\x30\x97\x50\xa9\x8a\x6e\x7f\xeb\x88\x6d\xb9\x39\x85\x74\xa1\xd0\x45\xab\xe9\x67\x7a\xe4\x41\x4f\x29\xc9\xf7\x5c\xb8\xa5\x4f\xf1\xa2\xac\x7b\xaa\xd0\x32\xb5\x4d\xda\xe1\x6f\xcb\xc5\x1c\x74\x7d\x12\x31\xb7\x2f\xf1\x39\x35\xeb\x4c\x95\x38\xf8\xca\x82\x38\x86\x49\x9a\xfa\xde\x77\x1a\xd6\x42\xa5\x87\x3e\xa7\x6c\xb2\xe0\x56\x27\x5c\x92\x08\x29\x09\x95\x7b\x95\x55\xd3\x7e\x4e\xc3\x8e\x0b\x07\x3c\x73\x68\xc0\xa2\x4a\xa9\x4f\x49\xf9\x66\x36\x8f\x58\xf0\x59\x5b\x77\x23\x54\x23\xbe\x44\x6a\x57\x2a\xbe\x63\x8f\xac\x06\x98\xf4\x01\x76\x90\x35\x81\xc0\xc5\xf9\x18\xc8\x42\x1c\xc3\x1c\x77\x47\xe7\x60\xd0\x55\x86\xee\x1f\x28\xdc\xc1\x5d\xa5\x14\x9a\x88\x65\x95\x4a\xce\x48\x87\x43\xa8\xbb\x23\xaa\x05\xc9\x73\x6d\x00\xde\x1c\x61\xfb\xfa\xf8\xe4\xb3\x4d\x24\x97\x52\x27\x9c\x06\x3c\xf9\xd2\xbd\xf4\x56\xd4\x0d\xde\x6d\xd8\x14\xe8\xe2\xc8\xe2\xb0\x63\x2a\x1c\xfa\x2e\x31\x19\x4f\xf0\xeb\x63\x17\xc6\xf9\xf8\x0f\x68\xee\x2a\x55\x8f\x25\x7f\x3a\xb6\x22\xc5\x76\x98\x53\x05\xbf\x0b\xe1\xae\x52\xa1\xd4\x79\x4e\x87\x52\xe7\xd1\xad\xff\x3e\x02\xc3\x0f\x51\x76\x80\x0d\xc1\xdf\x4e\xc2\x27\xb2\x36\xe0\x11\xe8\x07\x78\xff\xb1\xa3\x12\x85\xcf\x94\x6d\xf8\x81\x64\xbf\xb2\x20\xa8\x01\x45\x6d\xce\x3e\xb6\xc6\x58\xf0\x08\x28\x2d\x7a\xa1\x26\x07\xf5\x44\x88\xe6\xb8\x0b\x07\x42\x6d\xb9\x14\x29\x50\xfb\x0c\x86\x2c\x78\x64\x2c\xa8\xf1\x47\x9f\x8d\x50\x2e\x0b\x07\x94\x92\x1f\xb7\x83\x11\xf4\x7d\x0c\x19\x0b\x78\x9a\x9a\x11\xd9\x23\xbc\x74\xc9\xee\xd0\x6a\xb9\xc5\xd5\xf4\x33\x35\x79\x38\x70\x49\x79\xa2\x18\x1d\x2e\xc1\xd0\x87\x4d\xea\x3f\x7c\x04\x25\xe4\x11\xc8\x06\x8d\xb0\x0e\x15\xf6\xfd\xdc\xfa\x87\xab\xe9\xe7\xd6\x05\x7f\x9d\xb9\x20\xc5\x0c\x0d\xb4\x36\x23\x9f\xd6\x70\x78\x1a\x74\xd3\xfd\xb5\x20\x5d\x43\xdd\x24\xa1\x76\xc4\x02\x1a\x59\x07\x48\x07\x7b\x93\x84\x96\x06\xc2\xf5\x7a\x30\x64\xe9\x79\x20\xd3\x7a\xca\x37\x13\x12\xd3\x01\xc9\xc4\x31\x2c\x51\xa5\x2d\x05\x74\x88\xe3\x66\x36\x07\xab\x3b\xdc\xa0\xf4\xae\xcf\x0f\x11\xdc\x23\x3c\x20\x96\xde\x0c\x35\x76\x23\x3c\xfe\xd4\x8e\xbe\x52\x94\x08\xba\x44\x45\x23\x69\x8b\x46\x64\x7b\xd8\x15\xe8\xb9\x5d\x1b\xbf\x2b\x91\xde\x7c\xb2\xf2\x36\x52\xa3\xcb\x92\x16\x88\xca\x74\x26\x79\x74\x48\xc0\xfb\x8f\x9d\x18\xef\x8d\x70\x18\x0e\x3f\x7c\xb7\xec\x67\xeb\x61\x09\xe8\xcd\x6c\x3e\xf2\x93\x92\xea\xf2\xe3\x16\x6c\x3d\x09\x07\xa3\x93\x7b\x10\x9d\x1d\x99\x94\xc1\x9f\xc6\xc4\x7c\xd1\x84\x46\x6d\xe8\xbf\x5e\x55\xc6\xaf\x16\xe1\xab\x4c\xc0\x85\xdf\x1a\xa2\xfa\xf7\x99\xba\x5d\x69\x85\xbe\x56\x4d\x60\x4a\xc8\x66\xc4\x1c\xae\x72\x5d\xda\x3e\xf9\x34\xb5\x78\x89\x7c\xfa\x6a\x3d\xf2\xb9\xc3\x8d\x76\xe8\xf9\xa5\x19\x5a\x4d\x45\x9d\x6e\x2b\x03\x4e\x47\x2c\xe8\x08\x9e\x12\x51\xcb\x2c\x5a\xc1\x2c\x5e\x3c\xed\xbc\x4d\x62\x58\x70\x86\x81\x48\xfd\xe7\xa7\x36\x6c\x37\xaa\xd0\x69\xc8\xc5\x16\x0f\x03\xd4\x9f\x78\x38\x05\x26\xf5\x1a\x60\x1d\x77\x95\x6d\x00\x7b\x43\x04\xd5\x19\x4e\xe7\x7e\x7b\x40\xe5\xcc\xfe\x45\x02\x24\xad\x5b\xda\x2b\x3a\x9b\x44\x58\xaf\x12\xe4\xec\x78\x1d\xb1\xba\x2b\x58\xd2\x0b\x82\x75\xd6\x5b\xe1\x16\xa4\x56\x39\x7d\x12\xb8\xd2\xe8\xa4\x5e\xc3\x37\x5c\x50\x2d\x02\x72\xd3\xd9\x2d\xd6\x5a\xcb\x53\xfe\x6d\x6e\xed\x4b\xfc\xdb\x2b\xe3\x19\xfe\x6d\x2f\xbe\x41\xcf\x88\x35\xff\x1a\x4f\xab\xa7\xf4\x5b\x0b\xbf\x8a\x7e\x6b\xd1\xff\x81\x7e\x9b\x16\xbd\x38\xb2\xf8\x3b\xe9\xb7\x17\xfe\x09\xfd\xd6\x3e\xa2\xcd\xf7\x5c\xfe\xe1\x74\xdb\x83\xf9\x44\xb7\x0d\xbe\x3f\x94\x6e\xfb\x3e\x7e\x07\xdd\xf6\x15\xa3\xa7\xbb\xfe\x2a\xbe\xed\x11\x1b\x39\xb9\x12\x5c\x76\x98\x56\x09\xf9\x7a\xba\x15\x19\xfc\x70\x04\xe7\xe8\xfe\x90\xd2\x19\x1e\x3c\x97\x99\x69\xcb\x81\x74\xa5\xeb\x61\xe4\x27\xac\xc8\x8e\x43\x3e\x9a\x10\x9f\xe0\xb2\xf1\x23\xf9\x9e\xc2\xea\x0f\xfc\x17\x95\x8f\x26\x3d\xd5\x9e\x70\x2e\xd1\xdd\x21\x4f\xaf\x90\xa7\x52\x28\xac\x29\x64\xae\x77\xe1\x30\x9a\xa4\x69\xe8\x3d\x0d\x9b\x30\xd6\x55\x46\x4e\x37\xfc\x01\xc3\x7f\xfc\x73\xbd\x77\x38\x82\xb7\x23\x78\x3b\x64\x81\x15\xff\xc1\x51\x8f\x24\xc9\x6a\xb8\xae\xb2\x26\xb0\x4e\x7a\xdf\xbc\x69\x7f\x09\x1d\x5d\x2f\x6e\xce\x56\x4f\x64\x40\x36\x49\xea\xf2\xb9\x26\xfc\xab\x76\x90\x72\xc7\x61\x5d\x39\x7a\x57\xaf\x73\x7a\xbd\xb8\x79\xa6\x23\x1b\xee\x2d\xb8\xed\x6c\x1a\x69\x7d\x4f\x0f\x85\x7c\x96\x91\x8f\xb2\xfb\x2c\x23\x9f\x56\xf1\x4c\xa7\x1c\x21\x23\x09\x72\x99\xf4\x96\xa4\xce\xf0\xf7\x2f\x50\x27\xf3\x7f\x48\x81\x06\x27\xaf\x89\x75\x05\xea\x14\xf4\xf6\x03\x16\x04\x2f\x76\xcc\xff\x75\x45\xf8\x6f\x00\x00\x00\xff\xff\x46\x2e\x84\x9e\xfd\x12\x00\x00") + +func testImagesAgnhostNetNatClosewaitGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostNetNatClosewaitGo, + "test/images/agnhost/net/nat/closewait.go", + ) +} + +func testImagesAgnhostNetNatClosewaitGo() (*asset, error) { + bytes, err := testImagesAgnhostNetNatClosewaitGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/net/nat/closewait.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostNetexecNetexecGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x7c\xfd\x73\xdb\xc6\xd1\xf0\xcf\xc4\x5f\xb1\xc5\x8c\x6d\xd0\x85\x40\xda\x49\x27\x79\x99\xa8\x19\x45\xb6\x62\x35\x8e\xac\x57\x94\x9a\xe9\xf8\xf5\xb4\x27\xe0\x48\x5e\x0d\xe0\x98\xbb\x83\x3e\xea\xea\x7f\x7f\x67\xf7\x3e\x00\x90\x14\x2d\xda\xee\x3c\x4f\x9f\xa7\x9d\x69\x24\x01\x7b\x7b\xfb\xbd\x7b\x7b\x0b\x8f\x9e\x46\x87\x72\x79\xab\xc4\x7c\x61\xe0\xf9\xf8\xd9\xd7\x70\xbe\xe0\xf0\x73\x73\xc9\x55\xcd\x0d\xd7\x70\xd0\x98\x85\x54\x3a\x8b\xa2\xd7\x22\xe7\xb5\xe6\x05\x34\x75\xc1\x15\x98\x05\x87\x83\x25\xcb\x17\x1c\xdc\x9b\x14\xfe\xcc\x95\x16\xb2\x86\xe7\xd9\x18\x12\x04\x88\xdd\xab\x78\xf8\x5d\x74\x2b\x1b\xa8\xd8\x2d\xd4\xd2\x40\xa3\x39\x98\x85\xd0\x30\x13\x25\x07\x7e\x93\xf3\xa5\x01\x51\x43\x2e\xab\x65\x29\x58\x9d\x73\xb8\x16\x66\x41\x9b\x38\x14\x59\xf4\x17\x87\x40\x5e\x1a\x26\x6a\x60\x90\xcb\xe5\x2d\xc8\x59\x17\x0a\x98\x89\x22\x00\x80\x85\x31\xcb\xc9\x68\x74\x7d\x7d\x9d\x31\xa2\x32\x93\x6a\x3e\x2a\x2d\x94\x1e\xbd\x3e\x3e\x7c\x79\x32\x7d\xb9\xf7\x3c\x1b\x47\xd1\x45\x5d\x72\xad\x41\xf1\xdf\x1a\xa1\x78\x01\x97\xb7\xc0\x96\xcb\x52\xe4\xec\xb2\xe4\x50\xb2\x6b\x90\x0a\xd8\x5c\x71\x5e\x80\x91\x48\xe7\xb5\x12\x46\xd4\xf3\x14\xb4\x9c\x99\x6b\xa6\x78\x54\x08\x6d\x94\xb8\x6c\x4c\x4f\x40\x9e\x2a\xa1\xa1\x0b\x20\x6b\x60\x35\xc4\x07\x53\x38\x9e\xc6\xf0\xe3\xc1\xf4\x78\x9a\x46\xbf\x1e\x9f\xbf\x7a\x73\x71\x0e\xbf\x1e\x9c\x9d\x1d\x9c\x9c\x1f\xbf\x9c\xc2\x9b\x33\x38\x7c\x73\xf2\xe2\xf8\xfc\xf8\xcd\xc9\x14\xde\x1c\xc1\xc1\xc9\x5f\xe0\xe7\xe3\x93\x17\x29\x70\x61\x16\x5c\x01\xbf\x59\x2a\xa4\x5d\x2a\x10\x28\x3a\x5e\x64\xd1\x94\xf3\xde\xe6\x33\x69\x89\xd1\x4b\x9e\x8b\x99\xc8\xa1\x64\xf5\xbc\x61\x73\x0e\x73\x79\xc5\x55\x2d\xea\x39\x2c\xb9\xaa\x84\x46\xe5\x69\x60\x75\x11\x95\xa2\x12\x86\x19\xfa\x7b\x8d\x9d\x2c\x7a\x3a\x8a\xa2\x25\xcb\xdf\x23\x12\xb4\x93\x1b\x9e\x47\x91\xa8\x96\x52\x19\x48\xa2\x41\x9c\xcb\xda\xf0\x1b\x13\x47\x83\x98\xd7\xb9\x2c\x44\x3d\x1f\xfd\x5d\xcb\x1a\x1f\xcc\x2a\x7a\x2e\xa4\xfd\xef\x48\xc8\xc6\x88\x12\xff\x28\xe5\x1c\x7f\xd4\xdc\xb8\x1f\x23\xd4\xa2\xff\xbd\x51\x04\x24\xb5\xfd\xef\x08\x37\xc5\x5f\xb5\x51\xb9\xac\xaf\xdc\xaf\xa2\x9e\x13\x80\xbe\xad\xf3\x11\x33\xb2\x12\x04\x64\x44\xc5\xe3\x28\x1a\xc4\x73\x61\x16\xcd\x65\x96\xcb\x6a\x24\xf4\x42\x14\xec\x9a\x19\xa6\x9a\x91\xce\xed\x4e\x9d\xf7\x7a\x39\x7b\xf6\xd5\x28\x97\x97\x8a\xe1\x52\xa4\xb2\xe6\x06\xe2\xf7\xdf\xea\x4c\xc8\x11\x5b\x8a\x8a\xe5\x0b\x51\x73\x75\x3b\x5a\xbe\x9f\x8f\x10\x60\x44\xc4\x0f\xa3\xe8\x8a\x29\x94\x04\x32\x70\x8a\x52\xc1\xff\xed\xc3\xb7\xe3\x6f\xc7\xd1\xa0\x29\xda\x67\xf6\xe1\xb3\x68\x80\x04\x74\x20\xf7\xf0\xd1\x82\x97\xe5\x29\x33\x0b\xfb\x28\x1e\x5d\x8a\x7a\xa4\x17\x71\x34\xd0\x5c\x5d\x71\x75\xc6\x59\x71\x8b\x6f\x1e\x5b\x46\x7f\x94\xb2\xfc\x30\xbe\x8b\x06\x39\x57\xe6\x08\x3d\xcb\x2d\x8c\xa3\xc1\x52\x89\xab\x9f\xf9\xad\x7d\x6a\x1f\x21\x6d\x6f\xae\xb8\x52\xa2\xe0\xf6\xd1\x30\x8a\x46\x23\x38\xac\x8a\x13\xab\x53\xb4\xdb\x46\x3b\x8f\x98\xd7\x0b\xa9\x0d\x1c\xa2\x3c\x32\xe2\xaf\x03\xb8\x0f\x8f\x49\x50\xd9\xa1\xac\x2a\x56\x17\x1f\xa2\xc1\x85\xe6\x13\x00\x88\x9d\x7d\xc4\x69\x34\x98\x2e\xa4\x32\x13\x88\x0f\x15\x67\x18\x5c\x5e\x9d\x9f\x9f\x26\xd3\x61\x0a\x17\x2f\x4e\x53\xb4\x3b\x48\xe4\x12\x8d\x8e\x95\xe5\xed\x10\xa6\x87\xe7\xa7\x60\x59\xd5\x36\x1e\x5c\x31\x25\x64\xa3\x81\xd7\xc5\x52\x8a\xda\x68\xc4\xfa\x5a\xd6\xf3\x09\xfc\x6d\x6a\x98\x32\x1a\x98\xc7\xea\x56\xa2\xb3\xcd\xc5\x15\xaf\x81\xac\x33\x84\x95\x99\x2c\x4b\x79\x8d\xb6\x1f\x90\x4d\xa2\x68\x0f\x46\x13\x38\xe3\xa6\x51\xb5\x26\x30\x0c\x0a\x5c\x9b\x27\x1a\xd0\x84\xb4\x61\xd5\x32\x43\xa8\xbc\x14\xbc\x36\x62\x79\x1f\xf4\xf1\x29\xb0\xa2\x40\xdf\x24\xf0\x42\xb0\x72\x02\x9e\x6f\xe6\x28\xaa\x9b\xea\x12\x29\x9c\xf9\x85\x1a\xe3\x0b\x22\xb2\xef\x49\xe0\x28\x16\x22\xbd\xd1\x48\x6d\xfb\x76\xa9\xa4\x91\xb9\x2c\xd3\x08\x08\x48\x39\x42\x18\xfc\x69\xfa\xe6\xa4\xc3\xa9\xe0\x65\xa1\x21\x56\x5c\x2f\x25\x46\xbf\x18\x12\xdd\xe4\x39\xd7\x7a\xd6\x94\x7e\x6b\x08\xaf\x87\x84\x2d\xe6\x4a\x49\x85\xb0\x11\xc0\x8c\x89\x92\x17\x1b\x40\xb3\xc0\x7e\xfc\x7c\x3c\x86\x37\x3f\xc7\xa0\x0d\x33\x8d\x86\x5c\x16\x1c\x84\x0d\xce\x25\xa3\x45\x76\x31\x6d\xcd\x0b\x5e\x20\xdd\xf1\xd7\xcf\xbe\x81\x97\x37\x4b\x9e\xdb\x68\x03\x47\xb4\x53\x8c\x2b\x85\x81\x42\x14\x98\x2f\x52\x8c\x6f\xf1\xd7\xe3\x31\xfc\xc8\x0a\x38\xb3\x88\x08\x86\xd5\x21\x03\x78\x35\x3e\xd1\xb0\x64\x8a\x55\xdc\x70\xa5\x23\x40\x1b\x16\xf5\x15\x2b\x45\x91\x51\x72\xdb\x08\x07\x4c\xf1\x49\x04\xb0\x07\x31\x0a\x3d\x9e\x10\x28\xc9\xdf\x2c\x18\x9a\x4d\x59\xc2\x25\x07\xd4\x23\xc6\x58\x82\x44\xad\x38\x48\x52\xd0\xfd\x90\x8e\x77\x07\x8c\x06\x1a\xc8\x40\xd6\x0a\x66\x18\x6a\xfe\x92\x83\xe6\x35\x22\x52\xb2\x99\x2f\xd0\x2d\x32\x38\x9e\x51\xca\x74\xd1\x9b\x17\x29\x0a\x86\x76\x51\x5c\x37\xa5\xa1\x74\x47\xf9\x70\x5d\x42\x5d\x5d\x5c\x72\x34\x1f\x6b\x24\x2d\x0b\xce\x86\x3c\x1b\xee\x4f\xb8\x5e\x88\x7c\x11\x78\xa1\x18\x70\xbd\xe0\x35\x54\xec\xbd\x37\x42\xc7\x53\x06\x2f\xf8\x8c\x35\xa5\x81\x2b\x56\x36\x7c\x02\x31\x05\xed\x8c\xc8\x3a\xc8\x31\xb3\x53\x1a\xa5\xb7\xda\xbf\x4e\x21\x6e\x0a\xfa\x41\x81\xd7\x51\x63\x94\xe0\xda\x91\xd2\xfa\x06\x39\x5e\x77\xcb\x40\xd7\x92\xab\x99\x54\x15\x2f\xd6\x89\x78\x16\xa3\xdf\xc5\x23\x9e\x2f\x64\xdc\x77\x52\xeb\x3d\x71\xa5\xe7\x31\x24\x16\xe2\x87\x4a\xcf\xf7\xf1\x17\x5e\xfc\x15\x9f\x0f\xd3\xd6\x7d\x7c\x44\xf2\xc2\x8c\x51\x9a\x1e\xfb\x8d\x40\xa5\x1e\x96\x52\x3b\x12\x5d\xd0\x09\xab\xed\x66\xa4\x00\xf4\xaa\xb9\x62\x39\x47\xaf\xd3\x8b\xc6\x14\xf2\xba\xde\x62\x93\xd1\x80\x8c\x72\xb0\xe7\xb6\xb4\x72\xc1\x2d\x2d\x3e\x9f\xd7\x97\x4a\xa2\x2f\xaf\xc9\x60\x9c\xc1\x01\xc6\x38\xcc\xe8\x20\x6a\xc3\xe7\x5c\xc1\xdb\xf1\xde\xb3\xe7\xdf\xbc\xcb\x08\x2d\x4a\x56\x36\xde\x2c\x59\x25\x1b\xb4\x47\x2b\x71\xb4\xc7\x6b\x26\x0c\x6d\x93\xcb\xba\xe6\xb9\x2d\x07\x8c\x84\x1c\xf9\x85\x4b\x3e\x93\x8a\x13\x27\x58\x0c\x01\xb1\x13\x0d\x06\x6b\x4a\x47\xe7\x82\xb9\xc4\xb2\x03\x8a\x46\xd9\xb2\x82\x0c\x7b\xdc\x65\xc0\xaa\x95\xf8\x13\x55\xc5\x0b\xc1\x0c\x2f\x6f\x49\x94\xb2\x31\xd1\x60\x10\x64\x46\xc4\x23\x71\xdb\x29\xf7\x04\x62\x62\x40\x02\x5b\x99\x6f\x24\x31\x1a\xc0\x83\xa9\x24\x9c\x01\x61\x97\x5e\x6b\x18\x0b\xce\x4a\xb3\xf8\x47\xc7\xf2\x42\x7c\x74\x31\xd1\x19\x8a\xc0\xba\x93\x15\xb7\x29\x86\xc2\xe7\x30\xb5\x36\x76\xaa\x78\x2e\xeb\x42\x74\x43\x62\x04\x20\xb1\xe6\xbb\x16\x9a\x5b\xab\x69\x51\xe4\xb2\xd6\xa2\xe0\x58\xbc\x62\xac\x20\x8c\x7e\xa3\x8b\x17\x3e\x89\xfa\x70\xea\xa8\xbf\xe5\x18\x7c\x30\x42\x1a\x92\x3a\x06\x05\xa2\x5d\x6a\x53\xb3\x8a\xaf\xb8\x8d\xc5\xf1\x44\x83\x7f\xdf\x42\x9f\x3c\x18\x5a\xf1\x42\x28\x9e\x9b\x0e\x34\x03\xff\x30\xe4\x95\x7e\x16\x8c\x4b\x99\x93\x36\xe2\x8f\x7a\x65\x04\xe8\xd1\x1e\xdf\x0f\x7e\xe1\x3e\x39\xf9\xa3\xaf\x8e\xd0\xcd\x67\x52\x5e\x32\xf5\x18\xe1\xf7\xbf\x1a\x7f\x13\x0f\x2d\x65\x54\x6c\xc5\x13\x78\x79\xc3\xf3\xc6\xf0\x5e\xa8\xa0\x77\xae\xb2\x89\x29\x17\xe5\x55\x41\xc1\x83\xde\xfc\x90\x57\xc5\xbe\x96\x15\xdf\xcb\x1d\x0c\xa5\xd0\x08\x56\x53\x32\x96\xc5\x4c\xd4\x3e\x82\xfa\xc4\x2c\x1b\xb3\x6c\x4c\x0c\x89\x5b\xfe\x44\x83\x7d\xd4\xcd\xc4\xdd\xd7\x11\x00\x3d\x83\x8a\x6b\xcd\xe6\x7c\x53\x1a\x76\xda\x77\x6b\x3a\x59\x77\x6b\xce\xad\xa5\xf1\xe2\xb0\xa6\xbd\x3d\xba\xb5\xc1\x68\x6c\x97\x35\xcb\x52\xb2\x22\x9e\x38\x0f\x43\xce\xe9\x88\x67\x93\x9b\x7d\x8b\x34\xb8\x03\x14\x9a\x9e\xa8\x09\x95\x5f\xab\x63\x2c\xcd\x0a\x5b\xb8\x19\x97\x84\x31\x3f\x9c\x7d\xa4\xbc\xe9\x48\x71\x45\xca\x25\x7f\xa2\x01\x6d\xd0\xa3\xb4\x6c\x78\x25\x79\xf9\x76\xd6\x61\x59\xb1\x94\x06\x2b\x3c\x34\x31\xcb\x35\x7a\x98\x95\x3b\x1e\x87\x8f\x67\x10\xef\xed\x99\x52\xef\x61\xb5\xbd\x87\xbb\xc4\xe8\x8a\xac\x28\x78\x01\x89\x28\x38\x16\xb1\xf6\x50\x5b\xff\xbd\xa9\x29\x7a\x5a\xaa\xdd\x3a\x2c\xc9\x99\xe1\x7b\xef\xf9\xad\x5d\x9e\x12\x71\x54\x1d\xd8\x2d\xa3\x90\x80\x97\x73\x85\x82\x43\x39\xe2\xfb\xa9\x0d\x00\xa2\xc2\x03\xd8\x82\x69\x28\x6c\xe8\x4f\xad\xb3\x94\x54\xc3\xec\x5d\x32\xcc\xdb\x48\xde\x08\xf7\x7a\xcf\x6f\x49\x18\x1a\x0f\xc9\xf1\x28\x00\x66\xb9\x32\xb1\xb5\xb4\xce\xc3\xf7\xfc\x16\xeb\x44\x8e\xc9\x14\xab\x1b\xae\x62\xd0\xcd\xa5\xb3\xa7\xa1\x17\x00\x66\xf3\x3d\xe9\x4e\x11\x24\x00\xcd\x4d\xcb\x48\xa7\x0e\x27\x5e\x58\x79\xcd\x6e\xb5\x7d\x64\xfd\xd8\x1f\x40\x96\x78\xce\x79\xec\xfc\x5a\xa7\x91\x98\xd7\x52\xad\xd4\x1a\x70\x71\xf6\x1a\x45\x6f\x3c\x32\x2d\x5d\x2c\x63\xdd\x30\xe7\xb4\x2c\xea\x42\xe4\x0c\xcf\xdb\xf8\xae\xad\xd0\x6c\x94\x29\x42\xad\xdd\x9e\x04\x1c\x73\xf6\x20\x10\x3f\x34\x0e\x22\x2c\xc6\x17\xf8\xbe\xd2\xf3\x3f\x6e\x2c\x36\xe8\x0d\xc2\xf9\x63\x43\xfc\xf1\x73\x43\x14\x1d\x14\x36\x03\xa0\x21\xa5\xe8\x9d\x09\x2a\x49\xd6\x68\x56\xb3\x21\xec\xed\x61\xed\xb4\x47\x8c\x09\x2c\x1c\xb4\xee\x56\x87\x4e\x30\x75\xf7\x18\x65\x45\xc3\x0c\x49\x23\x8d\x9c\x24\x48\xca\x56\x16\x1a\xbd\xc4\x8b\x01\x98\x5e\xc9\x20\x59\xf4\xb7\x34\x1a\x1c\xa8\xb9\x9e\x80\x3d\xef\xfd\xc2\x6e\x44\xd5\x54\x27\xf8\x2c\x19\x0f\xd3\x68\x70\xd6\xd4\x13\x80\x8a\x89\x3a\x8d\xee\xa2\x68\xd6\xd4\x39\x88\x5a\x98\x64\x08\x1f\xa2\x41\x7b\x66\xcc\x8e\x4a\x36\xd7\xc9\x30\x3b\xae\xcd\x9f\x99\x4a\x1e\xfb\xb3\x72\x6a\x6b\x44\x62\x2c\x4e\xe9\xcc\x9c\x42\x4c\x6e\xf1\x5a\x68\xc3\x6b\x40\xa8\x78\xb8\x11\xd9\x94\x5a\x00\x84\xcf\x9f\x82\x53\x88\xfb\x6e\x9a\x42\x8c\xe7\xc6\x41\x4c\xa7\xe1\x9e\xdb\xc3\xcd\x1f\xc6\xff\x87\x5c\x46\xcc\xc8\x78\xa8\xfc\x71\x2e\x97\x1c\x1e\xd0\xab\xd4\x9d\x3c\x52\x5c\x8b\x40\x35\x59\x19\x9b\x19\x8c\x12\x56\xd0\x08\x37\xfc\x38\x8d\x9d\x63\xb9\x23\x73\x43\x54\xf8\x08\xb5\x6e\x05\xa0\x7f\x57\xcc\xe4\x0b\x7c\xb9\x1a\x9a\x36\x53\xe2\x45\xef\x3a\x12\xb6\x2a\xef\x08\xfe\x59\x0a\x31\x6a\xff\xe3\x72\xf7\x98\x7c\x1b\xc3\x55\xf6\x1e\xd7\x1e\x62\x22\x43\xdc\x49\x85\xdd\x16\x85\x37\x8b\x10\x6c\x48\x30\x10\x87\x16\x46\x08\x9e\x0b\x56\x17\x25\x57\x68\xd3\x2e\xde\x38\x43\x47\x83\xb6\x07\xcb\x6b\xae\x38\x30\xf8\xe9\xe5\xb9\x4f\x24\xe4\x41\x14\x82\xa8\x02\xd7\xf1\x10\xad\x77\x34\x82\xb6\xb7\x82\xe7\x20\x0d\x98\xa4\x46\xda\x60\x65\x29\x97\xdc\xd5\x89\xae\xa5\x27\x6a\xf3\xd5\x73\xdc\x57\x8b\xaa\x29\x51\x29\xac\x76\x08\xe0\x52\xca\x92\xb3\x3a\x8b\xcc\xed\x92\x77\xb1\x6a\xa3\x9a\xdc\xa0\x73\x5c\x59\x04\x6e\x63\xcd\x0d\xfe\x5f\xbb\x60\xe6\x30\xb7\x41\x25\x20\x24\x17\x4b\x18\x3c\x6d\x91\x62\xd4\x35\x09\xd5\xb6\x04\x47\xbe\x27\x66\xb6\xda\xc5\xdf\x07\x16\x36\x9b\x22\x23\xc7\x88\x3c\x79\xcc\xb2\xab\x14\x9e\x0d\xa3\xc1\xc0\xd6\x2d\xd1\xe0\x2e\xba\x17\x6e\xec\xe5\x33\xe7\x26\xd4\x39\x46\x35\xe1\xd0\x6f\x29\xde\xdf\x87\x67\x9b\x09\x9c\x73\x0c\x09\x48\x1c\xd2\x63\x31\x38\xb1\x64\xaf\x25\x2b\xda\xcd\x86\x16\x8b\x0f\x26\x18\x5a\x92\xbc\x2a\xe0\x69\xaf\xe5\x94\x02\x53\x73\x0d\x6f\xdf\xd9\x2e\x20\x71\x8c\xf5\xc9\xe1\x02\x26\xfb\x78\x70\xe5\x49\xbe\x60\x75\x28\xda\xdd\x21\x79\x48\x72\xe9\xf5\xc2\x7e\xb7\x0f\x71\x4c\x42\xaa\x9a\x1b\x5c\x8c\x6f\xb3\x13\x7e\x3d\x45\xdf\xfe\xa5\xb9\x49\x50\x46\xac\x28\xce\x24\x56\x8a\x49\xd5\xdc\xa4\x60\xb7\x1a\x46\xd1\x80\x1a\x6b\xd9\x2b\x32\xc2\xa3\xa6\xce\x93\x78\x14\xa7\x80\xa4\x27\xd7\x16\xd5\x99\xab\x73\x7f\x55\xc2\x70\x95\x82\x82\xa7\xee\xb9\x25\x89\xf6\x1e\x78\x43\x3f\xe3\xbf\xa5\x58\x77\x74\x29\x71\x90\xbf\x0a\xb3\x38\xb4\xbd\xd6\x44\x65\xfe\xb7\x61\x0a\xf1\x4f\x2f\xcf\xe3\x14\xfa\xfe\x53\x8b\x12\x09\x47\x7e\x11\xdd\xef\xf6\xf1\x89\xdd\xcb\xd2\xfc\x12\x8b\x9b\xe4\x3a\x85\x59\x65\xb2\xe9\x52\x89\xda\xcc\x92\x38\xa4\x68\x9f\x85\x6d\x37\x68\x02\x8f\xae\x62\x22\x6c\x68\x37\xca\xec\xe1\xe5\xb8\x36\x5c\xd5\xac\x24\x61\x29\x42\x49\xbb\x06\xa3\x1a\xa0\x59\x91\x6c\x33\x82\xa1\x3a\xe1\x3a\x85\x0e\xbf\xb8\xe0\x6e\x18\x0d\xee\x80\x97\xda\xd9\x6b\x10\x37\xed\xe5\xce\xba\x5e\x23\xad\xfc\x07\x77\x51\x34\x98\xbb\xba\xe0\xe2\xc5\xa9\x25\x23\x71\x11\xce\x6a\x3b\xf4\x5a\x7f\xb7\x0f\x7b\xcf\x08\xbd\x5f\x81\x31\xca\x2d\xf1\x50\x0e\xa7\x0b\xec\x93\x7d\x78\x6c\xb9\xa5\xbf\x3f\x1c\x14\x85\x9a\xf4\x05\x36\x79\x54\x38\xd9\xd3\xf2\x3b\xda\xb3\xe4\x75\xe2\x33\xd2\x10\xfe\x08\x63\xda\xd6\xee\xe9\xf6\xa3\x1f\x9e\x13\x67\x31\x43\x57\xe9\x7f\x70\x3e\xe6\x13\xb1\x0d\xa3\x07\x75\x41\x8b\xcf\x5f\x4f\x93\x36\xdd\x75\x92\xca\x10\x56\xc4\xb8\x6d\xc3\x8d\xa8\x89\x7b\xef\x7a\x3d\x9b\x77\x46\xbb\xaa\x02\xd8\xe8\x65\xb8\x39\x6a\x7c\xd5\x2d\x94\x94\xc6\x3e\x43\x2b\x59\x83\x08\xf5\x52\x0a\xf6\xd7\xe3\xd3\x2d\xd0\x85\x60\x65\x9c\x52\xeb\x6d\x0b\x14\xb5\x84\x52\xc0\x1f\xdb\xa0\x6e\x84\xf9\x98\xdb\xf2\xdf\xd6\x1c\x97\x84\xe0\xd0\xa2\x51\x2b\x72\x5e\x6b\x9b\xa4\x8b\xb5\x8d\x7c\xab\x20\x05\xf7\xdb\x16\xa2\x42\x49\x9a\x86\xea\x73\x0b\x74\x38\x6c\xa7\xe1\x88\xbd\x05\xda\x1e\x80\x53\xa0\x9f\x5b\xe0\xdc\x11\x2f\x75\xa7\xb9\x16\x72\x34\x02\x7b\x70\x73\xf9\x57\xdf\xc3\xc0\x49\xcb\xc0\xc9\x76\x06\xc2\x21\x34\x0d\xf6\x14\xa0\xbd\x49\xae\x1b\x74\xd7\x2e\xd5\x56\xab\x4c\x61\x56\xf7\xdc\x8c\xcc\xb4\x94\xf3\xec\xd4\xb9\x32\x5d\x2a\xf0\xa2\x7b\x28\xc3\x54\x4f\x35\x77\xdf\xcb\x29\xe8\x38\x5c\x1f\x28\x85\x62\xa8\xf8\x7e\xcf\x6e\x1f\x0d\x06\xb9\xb9\x49\x21\x67\x75\xce\xcb\xa3\x1a\xdf\xb9\x4b\xb2\x0c\x83\xf8\xb9\xed\xc4\x25\xfe\xd9\x8f\x2c\x7f\x3f\x57\xb2\xa9\x0b\x8c\xe6\x8a\x67\xae\x55\x87\x81\xb1\xe0\x33\x2c\x30\x1d\x26\xca\x45\x2e\x3b\x38\x07\x9e\x3a\x2e\x93\xdc\xdc\xe0\xdb\x2e\x43\x3f\xad\x36\x20\xed\x9d\x2b\x47\x26\xb1\x12\xea\x44\xf5\x68\x30\x90\x3a\x7b\x79\x23\x4c\xa2\x78\x86\xa7\x7c\x8c\x05\x09\xa6\x38\x97\x41\x26\xfb\x30\xab\x93\xe1\x77\xab\xe9\xc4\xbd\xde\x77\xf9\xea\xa5\x52\x56\x19\xd4\x49\x28\x6c\xc6\x19\x8d\x6c\x93\xae\xa9\x8d\x28\x6d\x55\x23\x95\x6c\x8c\xa8\x39\xe4\xac\x2c\x35\xf8\xcd\x29\x7b\x68\x5e\x72\x2c\x92\x30\x75\xdc\x39\x9e\x8e\x98\x61\x65\x62\x49\x6d\x63\x54\x27\xa2\xec\x92\x6f\x7b\x42\x7a\x79\x0e\x23\xac\x4e\x31\xac\x1f\xb9\xb0\x7e\x9d\x42\x7c\xf2\xe6\x57\x27\x20\xd4\x47\x76\x22\xaf\x93\x61\x6b\x8a\x9d\x88\xb2\xcb\xce\x95\x9e\xa3\x24\x55\x76\x24\x55\xf5\x67\x2c\xd0\x12\x6a\x4e\x0f\xa3\x01\x0a\xdd\x96\xc3\x6b\x10\xd4\xef\x1a\x6e\xa0\x3b\xf4\xb3\x1f\x69\xdb\xe4\x7a\xa4\xe3\x14\x2a\x3d\x4f\xa1\x45\x67\xf3\x60\x07\x7d\x5b\xf3\xe0\xc3\x50\x6f\xb8\xcb\xd5\xec\xc0\x48\x91\xf4\x96\xaf\x54\x11\x8f\x1f\x6f\xc6\xb6\x26\x42\xa6\xe6\x4d\xc5\x6b\x03\x4f\x10\xfe\x09\x54\x8d\x36\x70\xc9\xbb\x3d\x6a\xa9\x80\x57\x4b\x73\x9b\xc2\x5c\x1a\x78\xf4\xdb\xff\xc3\x00\xd0\xdf\xbc\x2d\x26\xd0\x18\xae\x33\x92\xef\x2b\xce\x0a\xae\x12\x6f\xa9\xeb\xea\xf3\x92\x68\x55\xb6\x92\x54\x3e\xcb\x60\x42\xae\x5a\x37\x1c\x95\x9d\xf1\x4a\x1a\x8e\xc5\x02\x6d\x4e\x67\x80\x95\x68\xd4\x39\x08\x50\x4b\x8d\xae\x75\x4c\x34\x70\xae\x6f\x4d\xee\x85\xeb\x4c\xb7\x46\xd7\xcd\x37\x0f\xa2\xbe\x17\x12\xbf\xdf\xdb\x98\xaa\xd1\x35\xef\x31\x3c\xea\xbb\x0f\x03\x59\xf7\x40\xf9\xab\x85\x4f\x35\xe2\x1b\x61\x7e\x70\xd6\xfb\xd8\xe1\xc2\x5f\x71\x73\x6b\xd0\x2d\x56\xeb\x8c\x81\x94\x14\x5a\xe2\x5b\x32\x83\x45\x93\x14\x4f\x99\xd2\xdc\x8b\x32\xe9\x2d\x1f\x46\xeb\x96\xdd\x67\xb5\x35\xee\xfb\x6d\xdb\xad\xe8\x98\x37\xd0\x15\xe4\xea\x05\xc3\x66\x5b\x5f\x25\xa8\x7b\x1e\x43\xe6\xb6\x31\xd3\x63\x7e\x8d\x93\x8e\x5e\x1f\xc2\x06\x82\x7f\x22\x0f\x3d\x3a\xba\x0c\x3c\x30\xbe\x3c\x2c\xbc\x7c\x42\x74\x71\x37\x60\x0f\x89\x32\x1d\xaa\xbb\x16\xfa\xab\xed\xca\xce\x45\xdd\xb9\x01\xaa\xe1\x91\x4e\x81\xf9\x56\xe2\x23\x7d\xef\xc5\x19\x75\x47\xeb\xce\x6d\x17\x75\x20\xa8\x9a\xb0\xca\x0d\x26\xeb\x22\x19\x69\x79\x5a\x72\xbe\x24\xed\x5a\xe1\xf8\xa8\xb0\xbf\xef\x8e\x12\x3e\x5d\xb6\xe1\xcf\xb9\xf9\xba\x8b\x7f\x40\x98\x09\x58\x4d\x38\x44\x13\xff\x4b\x9b\x49\x57\x4a\xcc\xcf\x0a\x8e\xa1\x72\xed\x05\x47\xd4\xd9\x9c\x9b\x57\xae\x14\x74\xc9\x74\x34\x72\xa5\xb0\xdb\xb8\xbd\x17\x22\x49\x31\x78\x3e\x1e\x6f\xb8\xdd\xf2\x57\x69\x19\x1c\x1b\xd7\x1b\xc6\x17\x9a\x9a\x38\x1a\x98\x43\x0a\xf9\x82\xe7\xef\xfd\xd4\x40\xb7\xb0\xbb\xbc\x85\x2b\xa1\x4c\xc3\xf1\xa5\xbd\x2e\x67\xbd\x8e\x92\x6b\xb5\xf4\xeb\xf4\xcf\x13\x8b\x2b\xfe\xdd\xb9\xb4\x1d\xeb\xc9\x6c\x7b\xe4\xc3\x5a\x76\x7b\x3e\x1e\xaf\x46\x84\xde\xfb\xce\x49\xbc\x7b\x8b\x68\xef\x78\x3a\x65\x73\xbf\x9e\xfe\x2c\x26\x42\x99\x3e\x8c\x82\x15\x8e\xdb\xad\x3a\xc7\xb1\x5d\xb6\xb1\x17\xb3\x21\x52\x34\xaa\xb4\x91\x2e\x51\xd9\xc5\xd9\x6b\x0f\x7a\x71\x76\x8c\x56\xb3\xa1\xa7\xb1\xa5\xa3\xb1\xb9\x71\xf1\x23\x2b\xda\x9e\x50\x47\xc0\xd1\x80\xe6\x40\x26\xfb\xee\xae\x38\xfb\xbf\x0d\x57\xb7\xc9\x30\xfb\x89\x9b\xc4\x8e\x8b\x0c\xa3\x01\x1d\x09\xee\x81\x59\xba\x66\xa7\x6f\xa0\xdc\x03\xe6\xa7\x44\x86\x80\x1e\xe0\x7c\x22\x1a\x84\xa1\x8c\xfb\xb0\xfb\x19\x0e\x0c\x15\xea\xf6\x94\x29\x56\xdd\x07\x6b\x27\x2c\x36\x65\x5c\xd4\xd2\x0f\xb8\x29\xa6\x59\x8f\x92\x7e\x97\x8a\x9e\x39\xea\x28\x21\x23\x16\x9b\x86\x71\x45\xda\x8e\x22\xd9\x8b\x05\xdf\x29\x4a\xc1\xd3\x43\xa4\x09\xae\x91\xae\x67\xa1\x1f\x12\xde\x86\x7e\x08\x01\x59\x9d\xaf\x24\x87\x0e\xa6\xbb\x1d\xd5\x6d\x77\x0e\x83\x15\xbd\x89\xa0\xdd\x4c\xc1\x13\xae\xbc\x9d\x86\xe8\xbb\x65\x7b\xaf\xf5\x96\x80\xde\x3c\xcf\xae\x34\x58\x73\x3c\x75\xe6\x56\x73\x93\xfd\x49\x8a\xfa\x95\x7b\x96\x38\x85\xd8\x23\xe9\x15\x53\x74\x9d\x44\x60\x58\x7c\xda\x47\x34\x9b\xa4\xec\x69\x55\xbb\xa2\xc9\x43\x0c\x21\x3c\xe2\xae\x77\xa7\xaf\x85\xc9\x17\xe0\xa6\x2b\xb3\x73\xf9\x5a\x5e\x73\x95\x78\xa5\x93\xb7\xe6\x4c\x73\xdb\x8f\xa7\xf9\x9e\x49\x34\x68\xed\x76\xdf\x3d\xc4\xb3\xab\xdd\x79\xdf\x06\x85\xf3\xf3\x53\xdb\xd9\x53\x5e\xe5\x48\xc5\x19\xd7\xb2\xbc\xe2\xe7\x87\xa7\x48\x4f\x12\x9b\x7c\xe9\x0c\xcd\x1d\xb4\xed\x5e\x4d\xb1\xbe\x0d\x3e\x5b\xdd\xe5\xe2\xc5\x96\x4d\x2e\x5e\xb8\x4d\xec\x34\xd2\xda\x26\x34\x9d\xb4\xba\x8b\x9b\x15\xed\x6f\x33\x3d\x5c\x63\x06\xe1\xfc\x46\xf8\xda\xee\x44\xab\x7b\x5b\xb9\xcb\xdb\xc9\x76\x33\x6a\x6a\xdd\x2c\xe9\x26\xb6\x08\xfe\x96\x01\x39\x61\xd0\xc4\x83\x8d\xf8\xe1\xce\xe3\x67\x10\x47\x52\xd9\xb6\x07\x99\x31\x8d\xf4\x7c\xa2\x13\x45\x03\x7b\x89\x1e\xda\xf2\xbe\x65\x4f\x97\x0a\x83\x30\x5c\x78\xcf\x7b\x34\xe0\x50\x10\xd8\x17\xd1\x00\x6b\x2d\x81\x0b\xc6\xdf\x81\x80\xef\x81\x5c\xfe\x3b\x10\xbf\xff\xbd\x6b\xc6\x58\x78\xaf\x19\xab\xb9\x24\x84\x29\x46\xe7\xb2\x8d\x9d\x71\x47\xeb\x3e\xb0\xe5\x92\xd7\x45\x62\xff\xbe\x2f\xa1\x50\xe3\xba\xed\xb6\x76\x98\x09\x08\xc2\xa3\x34\xb0\x31\xb4\xe7\xd8\xbb\x68\x60\x87\x18\x2c\xe7\xcb\xb7\x96\xbb\x77\x9e\xff\x0f\xdd\x00\xe4\x56\x86\xc8\x69\x57\xbe\xed\x4c\x79\xbe\x83\xfd\x76\x52\xb3\x1b\xbd\x2c\x0b\xeb\x4b\xdd\xc4\x27\xae\xb3\xbf\xd2\xa2\xcb\x5b\xd3\x49\xc3\x7f\xd7\xb2\xce\x7e\x61\x4a\x2f\x58\x99\xb8\x29\x95\xa8\xd3\xf0\xf1\x72\xeb\xd7\x78\x96\xfe\x84\x50\x0d\xfb\x0d\xe9\xad\x81\xd3\x69\x39\x97\x4d\x69\x27\x97\x68\x42\x52\x09\x56\x8a\x7f\xdc\x1f\x39\x3b\xb3\x2d\xbe\xec\xe9\xf4\x87\x7c\xe4\x49\x54\x7b\xec\x26\xe3\xea\x05\xca\xb5\x30\x88\xc4\x1a\xc5\x6a\xed\x13\xbd\x9b\x07\xcf\xa6\xdc\x9c\xfb\xe7\xee\x56\x42\xdb\x9b\xcb\x2c\x3c\xff\x70\x37\xb4\xf3\xd6\x87\xd4\x23\xa0\xee\x1f\xcd\x02\x23\x21\xf6\x59\x12\x90\x3b\x1f\xe8\xdd\xf9\x58\x18\xca\xe1\x7d\xef\xb4\x9f\x39\x3c\xd2\x23\x0a\x04\xc8\x82\xbb\x3f\xb5\x7d\x43\xeb\x7e\x36\xc6\x70\x05\x61\x8f\x8c\x5a\x71\xc7\x45\xc9\x0f\xdb\x13\x4a\xb2\x51\x93\x76\x25\x52\x94\xfd\x28\x8b\x5b\xbb\x92\x9a\x72\x97\xb2\xb8\x0d\x54\xda\x31\xfe\x0c\x8b\xd7\x83\xb2\x4c\x02\xfc\xb0\xd7\x0f\x0c\x6e\xe5\x6f\x33\x9c\x61\x20\x20\x5d\x50\x05\x4f\x70\x00\xb1\x55\x70\xdb\xb0\xb9\x57\x6c\xae\x84\x0c\x32\x1f\xba\x07\x4e\xe4\x98\xa3\x82\xf0\x1f\x77\xde\x20\x39\x61\xd1\xa4\x15\x51\x8a\xcf\xfd\xd9\x08\xe0\x0f\xf0\xd4\x1e\xb7\xa7\x54\x54\xa7\x5d\x22\x2d\xe2\x9e\x85\x5d\xbc\xf8\x14\x03\x43\x65\x04\x89\x22\xe4\x0b\x87\xca\xe5\xa7\x5a\x94\x4e\xc9\xc9\x53\x7c\xed\xd2\xd7\xe6\x02\xb8\x23\x41\xb4\x19\xf2\xb1\x19\x61\x22\x0a\xdd\x35\x5e\x86\xcb\x26\x9d\xa6\x2f\x06\x68\xab\x73\xa4\xa6\x55\xf7\x65\x33\x43\xaa\xde\xbe\x43\x2f\x0e\x15\x50\x34\xf8\xab\x0f\xaa\x04\x4e\x15\x7d\x72\xd9\xcc\x76\x25\xa9\x3d\x29\xd3\x70\x18\xbf\x9f\xbc\x41\x53\x2c\xfd\x01\xa2\x93\x23\x90\xac\x14\x9e\x8f\xbf\xfe\x76\x68\x05\x89\x9e\x89\xe6\xf8\x82\xb3\xa2\x14\x35\x4f\xda\x9e\x2d\x6a\x20\x59\xd1\xe8\x90\x5a\x55\x4d\xdd\x76\x57\x08\x09\x62\x48\x3a\x3b\xae\xf1\xf5\xcf\x7f\x02\x2d\x6b\x6b\xc1\x7b\xb8\xc4\xc3\x29\x9e\x29\x67\x4a\x56\xb0\xc2\x72\x97\xd9\x27\x8f\xae\x9e\x74\xd9\xed\xbb\x4a\x87\x94\xb7\xe3\x09\xed\xfc\xce\xb9\x4e\xd7\xfe\xb0\xde\xf8\x5c\x03\xa4\xfa\xe5\x85\x47\xe6\x0b\x97\xae\x0d\x12\x84\x2f\x6d\x76\xb2\x42\x5c\xf9\xdf\xcd\x0c\x89\xa6\x1d\xec\x10\xe1\xef\x35\xc4\x67\xe3\xe7\x5f\x7f\x79\x43\xec\x6e\xf9\x85\x2c\x71\x95\xeb\x87\x9b\x62\x97\x98\xfb\x6c\xb1\x7b\x9b\xb8\xcb\xe9\x3f\xaf\x8a\xb5\x6e\x71\x6f\x0c\xd7\xdd\x60\x54\x05\x72\xeb\xaf\x2e\xf0\xaf\x95\x0e\x73\x45\xa0\x77\x1b\xdb\x16\x7e\x76\xd7\x36\x94\x2b\xac\x13\xf2\xaa\x78\xd3\xe9\x16\xd3\x60\x92\xdb\x32\x09\xdf\x63\xa5\x10\xef\xe5\x6e\x09\xbe\xbd\x14\x35\xc7\x65\xcb\x86\x6e\xab\x36\x16\x71\x6b\x25\x9c\xdd\x69\xbd\x0a\x73\x73\xac\xef\xec\x01\x18\xe5\xec\x20\xef\xa9\xdd\x7b\xd5\x1b\x2d\xdb\x5c\x9a\xae\x09\xc1\x12\x3c\xb1\x47\x88\x50\xca\xfd\x4f\x2b\xf7\x7a\xb7\xd4\x9f\xd5\xe6\x72\x17\xdf\xb6\x3c\x6b\xca\xfb\x15\x3c\xa3\x29\x8c\xbf\x06\x21\x5a\x83\x3c\x12\x25\x4f\x62\x3f\x8c\xb7\x29\x28\x21\xd2\xae\x1e\xe3\x8b\x9a\x3e\x51\x30\xd2\x71\x41\xe3\xbb\x19\x1e\x3d\xb7\x68\xc9\xe2\xb9\xa7\xec\xda\xae\xa7\xde\xd1\x65\x5b\xff\x4c\x67\x70\x50\x6a\x09\x4d\x20\x30\xa8\xc9\x59\x92\x53\xd6\x0a\x53\x0f\x1f\x17\xba\x5b\xb9\xb7\xde\x28\x0a\x67\xbb\xee\xb2\xba\x73\xc2\xb5\x89\x83\xa4\xe5\x13\x47\x34\x98\xad\xd6\xaa\xe7\xbc\x5a\x5a\xad\x84\xd9\xf3\x14\xe2\x56\xcd\x3b\xea\x48\x2e\x79\x6d\xa7\xdd\xf1\x34\x4a\xc9\xe3\x7f\xb9\xaa\x36\x48\xe4\x63\x2a\x6b\x13\xbd\x98\x41\xc8\xe9\x42\x66\x87\x72\x79\x9b\xcc\x52\x42\xb7\x3e\x71\xb0\x55\x31\x2e\x8f\xff\xc7\x77\x3a\x92\xb8\x4f\x0f\xd1\xe0\x82\xec\x9f\x86\x8d\x27\xfb\x30\xcb\xec\xc5\x4c\x77\xe6\x43\xea\xec\x70\x51\xc9\x22\x69\x41\x53\x18\x7f\x33\x1e\xef\xa8\x97\x1c\x91\xfc\x47\x2f\x3d\x49\xdc\xeb\x1f\xbd\x0b\x48\x25\x8d\xff\x9a\x06\x97\xd3\x92\x56\x19\x21\x43\xf5\x8a\x89\xf6\xfd\x96\x2b\x23\xfb\x85\x72\xb1\xbd\x0e\x08\xda\xd8\xed\xd2\xe5\x5f\x2f\xe0\x8e\xb8\xb6\x1a\x45\xf7\x82\xf3\xe4\x0b\x5e\x70\x9e\x3c\xf0\x82\xd3\xce\x29\xf5\x47\xf2\x76\xdb\xdc\x7e\xd7\xb6\x56\x21\x87\x2f\xe5\x76\x1f\xbb\x78\xa4\xa1\xfd\x70\x6e\x6d\x7c\x48\x65\xbf\x70\xb3\x90\x45\x0a\x7e\x8b\x95\xbb\x72\x9a\x58\xf1\x03\xca\x56\x49\x47\xb2\xa9\x8b\xfb\xe7\x8c\xae\x98\x22\xeb\x21\x2d\xf7\xe6\x8e\xfe\x4d\xc6\x8e\xee\x6c\x4b\x2f\x3b\x73\x52\xa3\x41\x9f\x55\x01\xf9\x0b\x6d\x3c\xef\xfb\xef\xc8\x6c\x1b\x5f\x87\xaf\xdb\xd0\x32\xec\x3c\x2a\x7d\x85\xe5\x67\x92\xc2\x77\x38\x59\x67\xd2\x71\x6d\xa2\x19\xc9\x27\xa3\xb0\xd8\x0f\xec\xc7\x43\xbd\x26\xd2\xe6\xbb\x8e\x0d\x23\xcb\x7e\x48\x7a\x18\x0d\x98\xd6\x5c\x99\x13\x69\x7d\x99\x2b\xb5\xb2\xc0\xfd\x8b\x00\x46\xa2\xb7\x22\x76\xba\x89\x77\x9f\x2e\x51\xba\x6f\x67\x24\xc3\x20\xf5\xd0\x53\xb9\xd6\xe7\xb2\x33\xc7\x9d\x4e\x57\x8f\x9b\x9d\xe8\xb1\x1d\x42\x28\x09\x23\x96\x14\x52\xf5\x68\xa3\x10\xd3\x47\x1f\xfa\xa3\x2d\x75\x6b\x0d\x87\x0d\x5d\xa6\xcd\xa3\xa2\xfd\x0f\xd1\x5a\x29\xb4\x13\xe8\xa3\x11\x10\x30\xf4\xbf\xbf\xb2\xa7\x72\x24\x71\xa9\xe4\x25\xd7\x59\xef\xdf\xf9\xc8\x34\x37\x89\x51\x0d\x0f\xc4\x76\x86\x4d\x7b\x59\xa5\xdd\xdf\x7e\xd5\x8b\x9e\xbe\x86\x69\xc6\x4a\xed\xe7\x39\xe9\xf6\x04\xd1\xd4\x7e\xca\x7a\xd5\x8a\x3a\x72\x41\x14\x47\x4a\x56\xa8\x2b\xdb\x5f\x79\xa8\x6e\x18\x7d\x12\x8a\xcc\x22\x89\x9d\xc9\x98\x78\x68\x83\x77\xce\xc5\x15\x2f\xce\xf9\x8d\x71\xa3\x41\xbd\xeb\xc6\xf0\xb7\x12\xd5\x74\xc9\x72\x9e\xf8\xa8\xde\xcc\xde\x8e\x27\xf5\xbb\xe1\xd0\xc5\x87\x1e\xa6\xfd\xfd\xce\x97\x7c\x36\x36\x04\x69\x95\x75\x12\x4f\xb9\x55\x00\x3a\xa8\x77\xc6\x70\x6d\x42\xa2\x6b\x5b\x4b\x1d\x31\x50\x78\x3e\x97\x28\x05\xd7\x8a\xea\x87\xf9\x15\x49\x12\x9e\x87\xdb\xb0\xad\xd3\x3c\xd9\xf8\x84\x44\x66\xfb\xd7\xb6\x5b\xd1\xc3\xde\xa9\x73\xc4\x2c\x48\xee\x15\xd3\xa7\x8a\xcf\xc4\x4d\xd2\x95\x48\xea\xbe\x56\x8c\xdd\x67\x26\x4b\xfa\x67\x53\x3a\x02\x9f\x2e\x4b\x61\x4e\x56\xd7\x40\x9c\xc2\xf3\xa1\xbf\xd3\x42\xf8\x38\x76\x1f\x93\x94\xbc\x4e\x08\x0b\xdd\x87\x3f\x77\x5f\x94\x10\xd8\x3e\xd0\x8b\xb7\xcf\xde\x85\xef\x3e\xba\xb6\xfa\x32\x5f\x48\x9a\x96\xba\x5a\xe3\x91\xa2\xaf\xbd\x07\x59\x97\xe4\xc3\x34\x82\xab\x3f\x53\x11\x24\xa9\x1d\xc5\xbf\x66\x7e\x61\x30\x74\xc5\xfc\x66\xad\xf5\x79\x10\xb8\x64\xf9\xfb\xcd\xb2\xf8\x54\x29\xf4\xd6\x85\xcb\xa1\x2f\x62\xa0\x81\xea\x1d\x25\x64\x6f\x30\x5b\x29\xb5\x4d\xb0\x95\xfa\xf8\x7d\x2d\xaf\x6b\x17\x2e\xec\x77\xec\x7e\x99\xed\x5d\x3e\xd2\x13\x78\x74\xb5\x2e\x9e\xb4\xa7\x84\x70\xbd\xea\xbe\xab\xcb\xcd\x97\xc9\xc5\x1b\xbe\x15\xfa\x48\x36\xde\x3a\x11\xb0\x21\x21\x77\x33\xe7\xee\x19\x99\xbe\xb7\xfc\x78\x4a\xf6\x99\xb2\x4f\xa5\xcd\xc8\xbd\xce\xff\x97\xcd\xc9\x3d\xea\xb6\x25\x65\xbf\x6a\x7b\x4a\xb6\xfd\xf6\xcd\x29\xb9\xf3\x05\x74\xfc\x2f\xcf\xbf\xdd\xcf\xad\x77\x4d\xc0\x79\xb7\x2e\x0a\x7c\xdb\x7f\x4b\x81\x54\xf1\x49\xe9\x96\x28\x5a\xcb\xb7\x3d\x87\x71\xdf\xa3\xd4\x9d\x39\xf5\xf0\x25\x2e\x6d\xda\x92\x95\x87\xcb\x88\xdd\xd2\xbf\x93\xb0\x75\x5c\x4b\xd2\xd6\x70\xf1\x5f\x5c\x0f\x10\x85\x1f\x2b\x08\xf2\xf6\xae\x69\x63\x15\xf0\xd9\x69\xff\x01\x72\xfa\xf7\xcf\xfb\x7d\x26\x1f\x96\xf8\xd7\x25\x4f\xd9\xfe\x13\xd3\xfb\x4e\x62\xfe\x22\xf9\x7d\x03\xcf\x3b\x71\xbb\x4e\xe0\x67\x65\xef\x9d\x04\xb0\x63\xfa\x76\xe1\xe7\xb3\xf3\x37\x45\xc7\x36\x09\xb4\x57\x3c\x3d\x9f\x73\xe6\x8c\xe4\x74\xf2\x79\x68\x5c\xbe\x72\xce\x95\x6c\xce\x5f\x1d\x21\xcd\xb9\x81\xee\xd4\xba\xbb\xfb\x0c\x73\xb9\xe1\x9b\xd8\x55\x2c\xb6\xa3\x91\x42\xc1\x0d\x13\x25\x74\x3e\x47\x5f\xef\x97\x85\xcf\xd8\xd0\x29\xe8\x43\x5f\x99\xe7\x8d\x52\xf4\x79\xb5\xb6\xf7\xcd\x16\x4f\x7b\x89\x77\x17\xfd\xff\x00\x00\x00\xff\xff\x13\x75\x61\x30\xb6\x55\x00\x00") + +func testImagesAgnhostNetexecNetexecGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostNetexecNetexecGo, + "test/images/agnhost/netexec/netexec.go", + ) +} + +func testImagesAgnhostNetexecNetexecGo() (*asset, error) { + bytes, err := testImagesAgnhostNetexecNetexecGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/netexec/netexec.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostNettestNettestGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x5a\xff\x6f\xdb\x46\xb2\xff\x59\xfc\x2b\xe6\xf1\xc1\x09\x99\xca\x94\xdd\xf7\x0a\x14\x4a\x5d\xc0\x67\x27\x8d\x5f\x1d\x3b\x88\x9c\x06\x87\x5c\x71\xb7\x22\x47\xd4\x9e\xc9\x5d\x76\x77\x29\x45\x30\xfc\xbf\x3f\xcc\xec\x92\xa2\x6c\x39\x6d\x7a\xd5\x0f\xb6\x44\xee\xce\xcc\xce\x97\xcf\x7c\x21\x27\x2f\xa2\x33\xdd\x6c\x8c\x2c\x97\x0e\xbe\x3d\x3a\xfe\x5f\xb8\x59\x22\xfc\xdc\xce\xd1\x28\x74\x68\xe1\xb4\x75\x4b\x6d\x6c\x16\x45\x97\x32\x47\x65\xb1\x80\x56\x15\x68\xc0\x2d\x11\x4e\x1b\x91\x2f\x11\xc2\x9d\x31\xfc\x82\xc6\x4a\xad\xe0\xdb\xec\x08\x12\x5a\x10\x87\x5b\x71\xfa\x32\xda\xe8\x16\x6a\xb1\x01\xa5\x1d\xb4\x16\xc1\x2d\xa5\x85\x85\xac\x10\xf0\x73\x8e\x8d\x03\xa9\x20\xd7\x75\x53\x49\xa1\x72\x84\xb5\x74\x4b\x66\x12\x48\x64\xd1\xdf\x03\x01\x3d\x77\x42\x2a\x10\x90\xeb\x66\x03\x7a\x31\x5c\x05\xc2\x45\x11\x00\xc0\xd2\xb9\x66\x3a\x99\xac\xd7\xeb\x4c\xb0\x94\x99\x36\xe5\xa4\xf2\xab\xec\xe4\xf2\xe2\xec\xd5\xd5\xec\xd5\xe1\xb7\xd9\x51\x14\x7d\x50\x15\x5a\x0b\x06\x7f\x6b\xa5\xc1\x02\xe6\x1b\x10\x4d\x53\xc9\x5c\xcc\x2b\x84\x4a\xac\x41\x1b\x10\xa5\x41\x2c\xc0\x69\x92\x73\x6d\xa4\x93\xaa\x1c\x83\xd5\x0b\xb7\x16\x06\xa3\x42\x5a\x67\xe4\xbc\x75\x3b\x0a\xea\xa4\x92\x16\x86\x0b\xb4\x02\xa1\x20\x3e\x9d\xc1\xc5\x2c\x86\xbf\x9d\xce\x2e\x66\xe3\xe8\xe3\xc5\xcd\x9b\xeb\x0f\x37\xf0\xf1\xf4\xfd\xfb\xd3\xab\x9b\x8b\x57\x33\xb8\x7e\x0f\x67\xd7\x57\xe7\x17\x37\x17\xd7\x57\x33\xb8\x7e\x0d\xa7\x57\x7f\x87\x9f\x2f\xae\xce\xc7\x80\xd2\x2d\xd1\x00\x7e\x6e\x0c\xc9\xae\x0d\x48\x52\x1d\x16\x59\x34\x43\xdc\x61\xbe\xd0\x5e\x18\xdb\x60\x2e\x17\x32\x87\x4a\xa8\xb2\x15\x25\x42\xa9\x57\x68\x94\x54\x25\x34\x68\x6a\x69\xc9\x78\x16\x84\x2a\xa2\x4a\xd6\xd2\x09\xc7\xbf\x1f\x1d\x27\x8b\x5e\x4c\xa2\x68\x32\x81\x53\x70\x52\x6d\x60\x8d\x73\xb0\x68\x56\x68\x98\x57\xbe\xc4\xfc\x96\x88\x2a\x74\x6b\x6d\xf8\x6b\xae\x95\xc2\xdc\xc9\x95\x74\x9b\x2c\x9a\x4c\x68\xf7\x47\x59\x55\x50\x48\x51\x81\x6e\x1d\x38\x3d\x26\xce\x74\x22\xcc\xe9\x27\x2c\x51\x18\x58\x18\x5d\x8f\x01\x57\x68\x36\xd0\xe8\x02\xdc\x52\x38\x52\xa7\x80\x1a\xeb\x39\x1a\xd0\x0b\xa2\xc5\xe7\x43\xb3\x92\x39\x42\x23\x2c\xb9\xa9\x54\x7c\x75\x51\x89\x12\x0e\xc3\xbd\x1d\xd6\x2c\x32\x08\x12\x3f\x48\xaf\x15\x94\x72\x85\x0a\x0e\x1b\x6d\x5c\xb7\xf8\x17\x69\xa5\x83\x89\x41\xc1\xe6\xb7\x41\xbd\x79\x6b\x0c\x2a\x07\xd6\x09\x87\x63\xb2\xc0\xe4\xb7\x56\xb2\xe4\x76\xd9\x3a\x28\xf4\x5a\x3d\x20\x41\x4b\x5b\xdb\x11\x21\x39\x27\xa6\x55\x64\x80\xc9\x42\xc8\x0a\x0a\x74\x64\x07\xc5\x8a\xcf\x20\xa9\xa4\x43\x23\xaa\x6a\x33\x06\xe9\x60\x2d\xab\x8a\x88\x19\x74\xad\x51\xa0\x15\x7a\xe7\xd7\x16\x61\xad\x4d\x61\xb3\x34\xb0\x9b\x90\x7f\xb2\xd7\xb5\xd6\xfb\xb3\x66\x6f\x09\x06\x01\x87\xd6\x91\x36\x59\x14\x83\xa5\xb4\x0e\xcd\x03\x1b\x45\x8d\xc8\x6f\xc9\x49\x14\x3a\x5a\x1f\x45\xb2\x26\xad\x40\x12\x8d\xe2\xf9\xc6\xa1\x8d\xa3\x51\x9c\x6b\xe5\xf0\xb3\xa3\xaf\xa8\x72\x5d\xd0\x51\xfe\x6d\xb5\xa2\x0b\x8b\x9a\xaf\x4b\x3d\x91\xba\x75\xb2\xa2\x1f\x95\x2e\xe9\x9f\x42\x17\xfe\x4d\x28\x50\xe9\xbb\xb6\xfe\xef\xc4\xca\x52\x09\x5e\x6c\x37\x2a\xf7\xff\x6d\x2e\x2a\xbe\xe4\x64\x8d\x71\x14\x8d\xe2\x52\xba\x65\x3b\xcf\x72\x5d\x4f\x6c\xb3\x38\xfe\x9f\x49\xae\xe7\x46\xd0\xad\xd5\x31\xc4\xb7\xdf\xdb\x4c\xea\x89\x68\x64\x2d\xf2\xa5\x54\x68\x36\x93\xe6\xb6\xa4\x0b\x76\x52\xa3\x13\x93\xd5\x31\x91\x7b\x6a\x1d\x89\x3b\xb1\xe8\xec\x97\x16\xad\x3c\xda\xc5\xd1\x28\xaf\x24\x2a\x67\xd1\xf5\x9c\xfd\x95\xc3\x52\x4f\x6e\x7b\x2c\x8d\xa3\x91\x41\xeb\xfc\xad\x3d\x2b\xe9\x66\x1c\xa5\x51\xb4\x12\x86\xb4\xcc\xda\xee\x3f\x52\xb9\x68\xd4\x20\x9a\x33\xdd\x2a\xb7\xbd\xd4\x79\xbd\xff\x10\xc6\xa8\x32\x1a\x29\x51\xa3\x6d\x44\xb8\xde\x5d\x2d\xb0\x12\x9b\xd9\xb2\x75\xe4\x9b\xbc\x3d\xe5\x38\x3e\xab\x8b\x2b\x6f\xe5\xa1\xcf\x88\x52\x2d\xb5\x75\x70\x46\x9a\xcd\x58\xaa\xc1\xc2\x13\x78\xc6\x2a\xcf\xce\x74\x5d\x0b\x55\xdc\x45\xa3\x0f\x16\xa7\x00\x10\x07\x8f\x89\xc7\xd1\x68\xb6\xd4\xc6\x4d\x21\x9e\x39\x61\x1c\x45\xed\x9f\x01\x0c\x22\x74\xa9\x55\x39\x85\x7f\xf5\x74\xbe\x92\x04\x85\x36\x05\xad\x0f\xef\xf8\x90\x03\x3c\xce\xa2\xe8\xaf\x02\xa1\x21\x02\x45\x7b\x10\x28\x3e\xec\x30\x88\xb8\x52\x92\x1d\x9c\x80\x22\x1b\x96\x62\xe5\x81\x65\xa1\xab\x4a\xaf\xe9\x04\xa8\x8a\x46\x4b\xe5\xec\x34\x8a\x0e\x21\x66\x08\x8a\xa7\x5f\x06\xa1\x98\x51\x28\x7e\x00\x43\xbc\xdd\xc3\xcf\x96\x40\xfc\x08\x81\xe2\x3f\x00\x41\x01\x7f\xa2\xbd\xf8\xc3\x7c\x18\x7d\xe2\xe9\x7f\x84\x3f\xff\x1a\x47\xa3\x53\x53\xda\x29\x78\x2f\x7b\x2b\x3e\xcb\xba\xad\xaf\xe8\x5a\x72\x94\x8e\xa3\xd1\xfb\x56\x4d\x01\x6a\x21\xd5\x38\xba\x8f\xa2\x45\xab\x72\x90\x4a\xba\x24\x85\xbb\x68\xb4\xf5\xd4\xec\x75\x25\x4a\x9b\xa4\xd9\x85\x72\xbf\x08\x93\x3c\x23\xd3\x8f\x21\x66\x0f\x18\xc3\xf7\x47\xdf\x1f\x8d\x21\x7e\x47\xc1\xa6\x5a\xb6\x26\xab\x87\x73\x83\xcb\xe2\xf4\xcb\xb4\xba\x80\x24\x82\x88\xc6\x12\xc5\x31\xc4\x6f\x5b\xeb\x60\x21\x55\x01\xc2\x41\x85\xc2\x3a\x5f\xef\xd4\x42\x6d\x80\x17\xf6\x69\x99\x95\xe1\x34\xa7\x83\xa7\xd8\xcd\x38\x80\x99\x63\xf0\xa2\x31\xc4\x9d\x3f\x8d\x07\x11\x07\xf1\x2c\xe0\x81\xd3\x9e\xff\x53\x9a\x97\xea\x0f\x30\xeb\x61\x84\x78\x74\xdf\x89\x4b\x81\x0b\xd1\x56\xcc\xf0\xaa\x87\x1a\xf6\x06\x69\x89\x7e\x06\x37\xd7\xe7\xd7\x53\xd8\xa2\x1f\xd8\xa5\x6e\xab\x02\x6a\x71\x1b\x6a\xbf\x42\xda\x9c\x0a\x10\xaa\xb2\x7e\x4f\xcf\x3b\xc8\xc5\xfc\x2b\xb1\x39\xb4\xe1\x42\x3c\x06\xb2\xe1\x55\xdb\x05\xa3\xc5\x5c\x2b\xef\x5e\xbc\x12\xba\x95\xb0\x5e\xa2\x02\x83\x39\xca\x15\x45\xd8\xec\xe2\xa7\x9b\x57\xef\xdf\x12\xfb\x7b\x86\xc2\x19\x05\x12\x38\x23\xf2\x5b\xcb\xe6\x91\xca\xa1\x51\xa2\xf2\x21\x46\xc4\x75\x6b\xa0\x92\xce\x55\xc8\x55\x66\x08\x62\x4a\xf5\x70\xe1\x9e\xdb\x10\x1f\x58\xc0\x0a\xcd\x5c\x38\x59\x03\x9d\x92\x89\xf9\x22\xa2\x0b\xeb\x2c\x72\x9b\x06\x03\x4b\xeb\x4c\x9b\x3b\x72\xdd\xc9\x04\xde\x68\xeb\x48\xdf\x14\x42\x94\x56\x34\x55\xc4\x04\x4c\x8a\x40\x08\xf2\xa5\x50\x25\x16\x87\x87\x20\x89\xa1\xa8\xd6\x62\x63\xc1\x8a\x05\xfa\x80\x12\x45\x16\x8d\x7a\x1a\x01\xfd\x99\x30\x01\xcf\x1c\x2b\xbd\x86\x85\xc4\xaa\xe8\x8b\x5e\x0f\x69\x95\xce\x6f\x89\xe5\x12\xab\x02\xe6\xb8\xd0\x06\x99\x1a\x69\x4a\x9b\xae\xea\xcd\xa2\xd1\x0c\xd5\x20\x35\x85\x4f\x2d\x9a\x4f\x9e\xd7\xaf\x9c\x99\xde\xb3\x96\xb1\xf8\xe2\xa2\x57\xc6\x68\x63\x1f\x50\xfa\xf4\x6b\x97\xb1\x2e\x75\xf9\x88\xcf\xe0\xf6\xcc\xc9\xaa\x3a\xd3\xca\x89\x9c\x24\x7b\xc7\x81\x35\xd7\xba\x8a\xa2\x11\x1f\x86\x4a\x88\xec\x6d\xeb\xf0\x73\x8f\x11\x89\x85\x17\xac\xf2\x14\x0a\xad\xf0\xc1\x6e\x8f\x1e\x36\xa3\xdd\xd9\xa5\xce\x6f\x93\x94\xf2\xe6\x02\x0d\x84\x8b\x1f\x54\x15\x2e\xdb\x6c\x2f\xff\x13\x58\x88\xca\x62\x70\x28\xf6\x8e\x99\x2f\xfc\xbc\x67\x58\x0f\xbc\x14\x3b\x01\x7b\x63\x8f\xdc\x8c\xc0\xd9\x23\x29\x07\x14\x92\x35\xbb\x5c\xf6\x1e\x6d\xa3\x95\xc5\x8f\x84\xb4\x66\x0c\x06\x5e\x84\xeb\xbf\xb5\x68\xdd\x57\x9c\x41\x2e\xa0\x42\x95\xd8\x8c\x4c\x9a\xc2\x8f\x27\xb0\xad\x31\x9e\x3d\x0b\xf7\x3a\x4b\x3e\xb8\x7f\x17\x8d\x46\x8b\xda\x65\xaf\x1b\x23\x95\x5b\x24\xeb\x71\x38\x59\x1a\x8d\x46\x21\x4b\x8c\xee\x99\xc7\x13\xaa\xda\x47\xa1\xd3\xc9\x03\x22\x93\x09\x5c\xea\x72\x01\xb9\x50\xcf\x1d\xcc\x11\xa8\x24\xc4\x02\xd6\x4b\x6a\x21\x97\xba\x62\x2f\xa5\x20\xa3\xa3\x51\x67\x06\xfe\xc8\xad\xa5\x1b\x02\x4a\x6d\xa8\x0c\x55\x18\x8d\x4a\x0d\x36\x23\x6a\x49\x7c\x8e\x79\x25\xc8\x99\x80\xb4\xdf\x1a\xdf\x2e\x1d\xd8\xc9\x81\xf5\x2d\xe8\x41\x01\x96\xbc\x9d\xa2\xef\xa0\x08\xd0\x81\x45\xf7\xbb\x03\xfd\x01\x52\xf6\x08\x3d\x50\xec\xf8\xa1\x26\xc7\x5b\x3d\xa6\xd1\x23\x1d\xb0\x27\xa4\x43\x0f\x7a\x4f\xc0\xc1\x89\xd5\x32\x00\x51\x91\x0d\x5c\x72\x63\xe1\xa1\x69\xbf\xdf\xd0\xbe\xbf\xde\x6b\xd6\x19\xd3\x78\x83\xa2\x40\x93\x30\x11\xef\xa0\xd7\x3f\xa7\xd1\x68\x3e\x06\x34\x06\xa6\x27\x2c\x65\xf6\x56\x18\xbb\x14\xd5\x85\x2a\x50\xb9\xc4\x8e\x21\x26\xd7\xff\x87\x8b\x39\x84\x44\xd3\xa0\x2a\x5e\x19\x93\xa0\x31\x69\x34\xfa\xa7\xdf\x7c\x02\x81\x47\x32\xdf\xb7\xcc\x6b\x86\x17\xbc\xd3\xbe\x6c\xf5\xa5\x93\xa9\x85\xf3\x60\x96\x0c\x55\x94\x32\xd0\xa1\x75\x9c\x13\x18\x8a\x7d\x8f\xb4\x14\xaa\xa8\xe8\x88\x3e\x3b\x39\x71\x8b\x01\x96\xb7\xc4\xb7\xd0\x3c\xd3\xad\xc9\x7b\x44\x1d\x9d\x53\x36\xed\xcb\xeb\x81\x4c\xa4\x69\x92\xa9\x4f\x05\xf3\x4d\x60\x38\xa0\xcd\x8b\xb6\xb4\x1f\xe2\xf5\xc0\xf8\xbc\x9c\x5c\x8f\xaa\x2c\x5f\xf7\xf9\x40\xa2\x12\x93\xbc\x81\x1d\xe0\x09\xe4\xf0\x5a\xfc\x0a\x17\xf0\x36\x37\xd9\xdf\x74\xb1\xc9\xce\x2a\x6d\xd1\x83\xdd\x7f\xee\x18\xd4\x42\xac\x9b\xad\x66\x77\x0d\xcb\xce\x72\x85\xeb\x73\x24\x93\x99\xc4\x4b\x90\x66\xfe\x77\xf2\x6c\xdd\xa4\x1e\xb0\xd6\x4d\x16\x0c\x71\x72\x02\x71\xcc\x28\x32\x24\x44\xd1\xc4\x79\x65\x91\xc4\x07\xab\x29\xfc\xa4\x5d\x67\x7e\x1f\xd3\x4a\x83\x65\x02\xf1\x18\x6c\xd6\x29\x9e\xa8\xdf\x03\x56\x16\x99\x22\xa3\x56\x9f\xc3\x4e\x4e\x40\xc9\x8a\x6f\x8c\x86\x97\x1f\x24\xb4\xbb\xfb\x68\x44\x68\x35\x58\xf3\xa9\x17\xf7\xd7\x6f\xbe\x61\x28\xdb\x77\xe8\x57\xca\x1f\x7a\x9d\x66\xfe\x6b\xf2\xac\x77\x92\xbb\x4e\xc2\xe9\x40\xda\xfb\xb4\x8b\x82\x9e\x18\x88\xa2\xb0\x1c\x3d\xc1\xc7\x2b\x69\xdd\x18\xe4\x82\xaf\x49\xcb\xa3\x37\x25\xab\x0c\x2c\xd4\x54\xa0\xce\x3d\x58\x62\xf1\xd8\x75\x76\xe2\x8d\xf6\x6b\xc3\xce\x11\x88\xfd\xd7\x56\x1d\x36\x0b\x39\xfc\x24\x6c\x4a\xba\x2b\x1c\xc9\xfe\x7b\xc2\xca\x0d\x02\x33\x8e\x07\x2c\xeb\x24\xd5\x25\xd4\x68\xad\x28\xbd\xd4\xbd\x88\x24\xf2\x40\x4c\x8a\x88\xe7\x96\x28\x74\xad\x17\xb7\x24\x85\xd1\x0d\x08\x05\x9a\x0a\xcc\x40\x46\x2e\xb8\x63\xe1\xb0\xe6\x22\x78\x2d\x2d\x12\x81\x39\xe6\xba\x26\x92\xaa\xe4\xb2\x4c\x28\xf8\xee\xe8\xa8\xdb\x67\x1f\xeb\x82\x33\x45\x80\x16\x6f\xea\x31\x08\x53\x5a\xc8\xb2\x8c\xcb\xc3\x85\xc8\xf1\xee\xfe\xab\x2a\x07\x3a\xc1\x40\x61\x97\xba\x1c\x03\xf9\xed\x2c\x64\x01\xcf\xce\xf3\xc9\xb2\x2c\x1d\xa6\xea\x4b\x5d\xa6\xf0\x23\x0b\xed\x0d\xe0\x89\xf1\xff\x4f\xc7\xd3\x5f\xb7\x9a\xde\xa7\xc4\x27\x4c\x3d\x6b\xf3\x1c\xad\x5d\xb4\xd5\x8c\x44\x72\xfa\x01\x1e\x7d\x5d\x4d\xe1\xd3\xde\x30\x6a\xba\x2b\x7b\x02\x86\x43\x82\xee\x7e\xda\x72\xa5\x58\xb9\xef\x47\x21\x93\x09\x5c\xb7\x86\x47\x5e\x94\x77\xb5\xaa\x36\x5d\x3d\x3e\xff\x37\xe6\x04\x24\xfc\x8b\x4f\x14\xa5\xa1\xd2\xa3\xde\x30\xc9\xeb\x02\x5e\xec\x4c\x2a\x82\xf1\xba\x2a\xb2\x73\xeb\x6e\x90\xb2\xc5\x94\x4a\x97\xd9\x6b\xe1\x44\x95\xf8\x7e\xae\x31\x7a\x25\x0b\xec\xa7\x89\xdc\xd9\x73\xe7\x72\x1f\x45\xa3\x65\x90\xbc\x4f\x7e\x7a\x1b\xac\x41\x2b\x0f\x22\xa7\xa7\xbf\x48\x62\x8e\x12\x28\xd1\x51\x71\x04\xcb\x3e\xe0\x0f\x56\x31\x13\x0c\x4c\xe4\x02\x76\x87\x38\x3f\x82\x77\x02\xea\xda\xcf\x96\xc4\x96\x1a\xac\x84\x3a\x04\x12\x60\xc6\xc3\x34\x2a\xa5\xfc\x58\x2d\xbb\xd2\x4e\x2e\x36\x89\x5f\x3e\x86\x30\x5a\xcb\x42\x1f\x44\x0b\x4b\x0d\xa4\x3d\x5f\x08\x8f\x46\x3f\x1c\xfa\xb5\xf4\x9d\x04\x7e\xe7\xfd\x33\x9e\x55\x88\x0d\xc9\xca\x05\x92\x6f\xb7\x42\xcb\x80\x9f\xa5\xa3\xd8\x88\xc7\xbb\xc2\x12\xf5\x91\x93\x35\x66\xbc\x39\xe1\xaf\xe7\xad\xe1\x59\x43\xb2\xbb\x14\x5e\x80\x5f\xc9\xa4\x79\xa7\xb6\xd9\xab\xcf\xd2\x25\x47\xf4\xeb\x3e\x09\x1a\xf1\x86\x9f\x9e\x78\xdb\x93\xc8\x5b\xb4\x1c\x7e\x7a\xf3\x44\xa3\xbd\x6d\xc3\x14\x9c\x69\xe9\x2e\x11\x2d\x75\x97\x61\xaf\x09\x39\x6c\xf2\x8c\xd9\xa4\x64\x66\xca\x69\x6f\xb8\x6a\x78\x4d\x6a\x0a\xf3\x96\xb1\x57\xda\x57\xa4\xd9\x9d\xf3\xdc\xef\x27\xcd\x03\x9f\x71\x48\xef\x7d\x3d\x97\xee\x5b\xea\x87\x2e\x3b\x6b\x99\xfb\xde\xc5\x61\x12\xb4\xb3\xda\xe7\xe9\xd4\x9f\x7e\xeb\xfa\xbc\xf9\x52\x5a\x87\xea\x54\x15\x33\x5a\x99\x0c\x81\x2a\x9e\x1e\x90\x88\x8d\x36\x54\xe5\x2a\x59\xa5\x44\xc2\x62\x85\x54\xd6\x74\x40\xf4\x9a\x47\x21\x55\x05\x56\xce\x2b\x7e\xe0\xe0\x67\x10\x3b\x83\x7b\x0a\xed\x46\xfb\x69\x88\x5b\xa2\x34\x0f\x8a\xb4\x80\xcc\xbb\x96\xf1\xf6\xef\xb0\xec\xce\x17\x19\x49\x34\x1a\x85\xf1\xec\x85\x5a\x68\x78\x11\x7e\x64\xf4\x2b\x1a\x8d\x28\x10\xbb\x0f\xe7\xb6\x68\x44\xa8\x4c\x5e\x79\x23\x6b\x76\xa7\xef\x76\x3d\x90\x31\xe8\x42\x41\x25\x4c\x89\x90\x57\x2d\x8f\xac\xba\x78\xa5\x93\xf5\xc3\x3a\xca\xb4\x8d\x41\xe7\x36\x3c\x47\x54\x56\xae\x30\x0b\xdd\x77\x6b\xc7\xb0\x46\x9f\xb4\xf8\x19\x0b\x95\x6f\x16\xab\x15\x86\xc7\x02\xca\x3f\x1d\x5a\xa1\xa1\x1c\x26\x1c\xd4\xa4\x90\xe3\x23\xb0\x6d\xbe\x64\x22\x7d\x21\xdb\x10\xf6\x06\xe1\x08\xbf\x7a\xe9\x7f\x80\xdd\xc8\xea\x3b\x8d\xc9\xf1\x51\xfa\x62\x70\x28\x0f\xcc\xfd\xbe\x93\x2f\xed\x7b\xa8\x8e\xfb\x88\x43\x59\xb7\x6e\x47\x5b\x6f\xa5\x6a\x1d\xb2\xa0\x33\x59\xcb\x4a\x98\x6a\x43\x27\x56\xe1\xe1\xd9\xbc\xad\x1b\xe8\x36\x5a\x1d\x46\xa9\xce\x17\xcb\xc2\x6a\xc5\xcf\xdc\x64\x50\x34\xd3\x09\xca\xb6\x19\x1f\xb3\xdb\xfb\xe4\x21\x1f\x9f\xb0\xdb\xf2\xe4\xf9\xf6\x1d\x2e\xe4\x36\x8e\x8f\xbd\x73\x82\x28\x1a\xe5\x5a\x2d\x64\xd9\x03\xfe\x76\xba\x9f\x5d\xa8\x33\x2f\xf5\x19\x2f\xf9\x7d\xfc\xff\xe0\x0f\xee\x34\xe4\x06\xc9\xa3\x3d\xed\x97\xde\x3d\x29\x0f\xfc\x43\x0d\x32\x41\x60\x9d\x91\x54\xa8\xdc\x0d\x35\x15\x27\x10\x87\xc7\x96\x74\xba\xc9\x4a\x15\xd9\x76\xfc\x96\x35\x46\x3b\x3d\x6f\x17\xfd\xe3\x8a\x5e\xec\xfe\xe9\x05\xd5\xa1\xaf\x75\x27\xb2\xe7\xf0\x27\x04\x67\x72\x4f\x09\xee\xe3\xc0\x6c\x68\x43\x89\xae\x8f\x7f\x34\x10\x62\x14\x5a\xe5\x64\x05\x3f\x04\xab\xfd\xf8\x92\xdc\xa7\xb5\xc8\x0f\x0f\xbc\x21\xe7\x98\x8b\xd6\x7a\xef\x20\x02\x8d\x2e\xa0\xe6\x47\xd8\x54\xe9\xf0\x20\x5d\xd6\x35\x16\x92\xe4\xe9\x46\x9f\xbb\x8f\xb7\x46\xd4\xe6\x5b\x27\x0c\xbb\x2f\x1b\xff\x4a\xaf\x93\xf4\x65\x70\x04\xa9\x72\x4c\xf8\x7e\x1a\x5c\x4d\xb7\xae\xbb\xc9\xd9\xab\x8f\x1b\x8f\xe6\x93\x09\x9c\xeb\x96\x54\xc1\xcf\x22\xbc\x63\x13\x63\xdf\xfd\x75\x48\xf1\xf8\xbc\x99\xef\x35\x06\x70\xd5\x75\xc0\xc1\x97\xce\xc3\x9c\x74\x93\xa4\x19\xe3\xaf\x09\xcf\xd9\x49\xda\x07\x96\xd9\x49\xd1\x5b\xd3\x90\xa6\x77\xb9\x92\x61\x5e\x52\x7f\x6a\x36\x52\x95\xd9\xc0\x46\xc3\x1e\x68\x37\xe3\x3f\x24\xf0\xdf\xde\xb4\x03\xc9\x39\x4f\xcf\x0d\x8a\xdb\xd0\x06\x0d\xf4\x75\xfc\x28\xa5\x87\x82\xe6\x8f\x39\x57\x68\x78\xb7\xaf\x26\xec\x71\xad\xbf\xda\xa6\xd8\x58\xa2\x54\xa2\xfb\xd8\x3d\x23\x7e\xd5\xa1\x7c\xe2\xad\x93\x7a\xeb\x61\x63\xb3\x4b\x54\xc9\x9e\x09\xd9\x8e\x3e\x3c\x9e\xf8\xd1\xd3\xc1\x6a\x72\xb0\x82\xa5\xb0\x70\xb0\x1a\x64\x8f\xe4\x60\x95\x8e\x61\xbd\x94\xf9\x92\x50\x91\x5f\x4d\xe0\x26\xe5\x60\x05\xc2\x86\x47\x53\x58\x64\xf0\x51\xf0\x38\x96\x07\x56\xbb\x09\x88\xf5\x55\x23\xb4\x4d\xf6\x85\xd1\x14\x36\x36\x1d\x7b\xc9\xa5\x75\xc9\x83\x91\x54\x08\xd5\x73\xed\x87\xf5\x06\x1b\x8a\xee\x82\x1f\x04\x29\xc8\x05\xbf\xc1\x81\x06\x9f\x5b\xb0\xc4\xab\x31\xba\x11\x25\x43\x4f\x98\xb9\x73\xab\x1d\xfc\x9e\x69\x29\x5c\xfb\xba\xdd\x38\x2c\xba\x0a\x20\x34\x80\x5b\xe1\xb9\xfd\xf3\xb6\x94\xa4\xfd\xa3\x97\x20\xe1\x07\x38\xfe\xee\x25\xc8\x6f\xbe\xf9\x1a\xbb\x10\x09\x6c\x18\x99\x85\x2a\x91\x8e\x1a\x1a\xf8\x81\x15\x4e\x9d\xc3\xba\xf1\xb1\xb9\x75\xb3\x03\x2a\x8e\xb0\x61\x7f\x0e\xd7\x66\x52\x95\x15\x26\xd8\x84\xaa\x29\x7d\xec\xe2\x5b\xf7\xe9\x5b\xb0\xbd\x32\xf6\x83\x60\xe7\x9f\x03\x86\xd0\xdc\xea\x40\x58\x10\x7e\xf0\xbf\x80\x59\xe8\x38\x51\x90\x43\xa8\xe1\x9c\xab\x92\xb7\x08\x71\x78\xd5\xe5\x4e\x36\xf7\xd3\x3b\xaa\xc3\xee\x63\x5f\x28\x7d\x49\x3f\x03\xd4\xbf\xe8\x5a\xd8\x94\x58\xda\xf0\xfc\x87\x34\xd5\x0b\xf4\x20\x57\x64\x67\xda\xe0\x2f\xc7\x49\x9a\x6d\xc9\xf6\x5e\x96\x66\x3f\xa1\x4b\xc2\x8b\x01\xd9\xcd\xf5\xf9\x35\xb9\x56\xef\x79\xab\x63\xba\x7f\xdd\xf0\xbb\x25\x77\xf7\x69\xd4\x59\x73\xc0\xfb\xee\x7e\xef\xa0\x61\x60\xb5\x2d\x30\xf8\xd7\x32\x76\x3c\x88\x27\xb8\x14\x5c\x04\x11\x4f\x45\x40\x00\xbb\xf0\x32\x05\x36\x96\xd3\x2a\x6d\xfd\xe7\x18\xac\x1d\x78\x4d\x47\x37\x9b\xb5\x73\x12\xd2\x4f\xad\xfd\x42\xb1\x5d\x67\x6d\x76\x5a\x14\x06\xad\xc5\xe0\x66\x61\x4d\xb3\xb3\xe6\x9d\x36\x81\xc4\x68\x24\x1b\x7e\xec\x38\x3d\xa1\x24\x95\xfd\x9f\x96\x8a\x7a\x17\xba\x96\x88\xec\xe2\xdd\x70\x22\x90\x34\xbc\x33\x65\x8f\x24\x95\x65\x17\xca\xa2\x71\xbb\xb5\x78\x70\x05\xf6\x5e\x4f\xdc\x6f\x08\x53\xa9\xfb\x68\x78\x5e\x5f\x99\xef\x78\x37\x3f\x09\xf7\x6e\x29\xfc\x59\xe0\x39\x3e\xe7\xc2\xdc\x19\xe9\x6b\xd4\x77\xd7\xb3\x1b\x7e\x0d\xca\xd9\xae\x3e\x0f\x6b\x77\xeb\xf3\x2e\x5e\xfa\x91\xc9\xa3\x4a\x7d\xae\x8b\xcd\xde\x51\x71\x98\x7d\xbd\xd3\xd6\x91\xa2\xce\xd1\x3a\x6a\xe6\x7c\xef\xc6\xa3\xb4\x69\xa8\xcc\xde\x6c\xbb\xba\xfb\xdf\x2d\x55\x78\x20\x5c\x7b\x16\xdb\xf2\x64\x58\x55\x19\xb4\x4d\x2f\x11\x77\x3e\x24\x43\x82\xdf\x6c\xfb\xab\x9d\x1a\x8b\x5f\x75\x19\x03\xbf\x0e\x43\xd5\xd3\x7b\x3f\xf7\xa4\x83\xa5\x7b\xc5\x19\xfa\xf0\x47\xc1\xef\x5e\x4d\xa1\x7d\x94\xe5\x86\xfe\x0c\x07\xbf\x75\x62\x3e\xf0\xda\x41\x9d\x4a\x82\xef\x0e\x6c\x87\xea\x3d\x01\xff\x06\x4e\x46\xf2\x9d\x56\x55\xd2\x2f\xff\x33\x42\x72\xc4\x99\xd0\xe1\xf2\xbb\x11\xf0\xfc\x60\xf5\x7c\xca\x7f\x9f\x12\x93\x47\xbf\x66\x3b\xf8\x8e\x46\x5e\x30\x36\xfb\x07\x15\xac\x92\x78\x99\x9f\xad\xcd\x9f\x11\xac\xed\xc8\x6c\xa5\xa3\x64\xba\x47\x44\xef\x92\xde\x4e\x4f\x08\xec\x79\xed\x9d\x8d\xad\xcd\x76\x66\x1c\xdd\x47\xff\x1f\x00\x00\xff\xff\x3a\x5e\xd9\x5a\x44\x29\x00\x00") + +func testImagesAgnhostNettestNettestGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostNettestNettestGo, + "test/images/agnhost/nettest/nettest.go", + ) +} + +func testImagesAgnhostNettestNettestGo() (*asset, error) { + bytes, err := testImagesAgnhostNettestNettestGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/nettest/nettest.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostNoSnatTestMainGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x57\x6d\x6f\xdb\xc8\x11\xfe\xcc\xfd\x15\x13\x02\xce\x91\x29\x4d\x29\x2e\x0e\x0d\x7c\x50\x0b\xc5\x71\x1a\xf5\x5c\xd9\xb5\x9c\x0b\x0e\x69\x70\xb7\x22\x87\xd2\xd4\xe4\x2e\xbd\xbb\x94\x22\xf8\xfc\xdf\x8b\x59\x92\x7a\x71\x1c\x5c\xf2\x21\x91\xb9\x9c\xd7\x67\x9e\x99\x59\x0e\x5e\x88\x33\x5d\x6f\x0c\x2d\x96\x0e\x4e\x86\x2f\xff\x06\x37\x4b\x84\x9f\x9b\x39\x1a\x85\x0e\x2d\x8c\x1b\xb7\xd4\xc6\xa6\x42\x5c\x50\x86\xca\x62\x0e\x8d\xca\xd1\x80\x5b\x22\x8c\x6b\x99\x2d\x11\xba\x37\x09\xfc\x82\xc6\x92\x56\x70\x92\x0e\x21\x62\x81\xb0\x7b\x15\xc6\x3f\x89\x8d\x6e\xa0\x92\x1b\x50\xda\x41\x63\x11\xdc\x92\x2c\x14\x54\x22\xe0\xe7\x0c\x6b\x07\xa4\x20\xd3\x55\x5d\x92\x54\x19\xc2\x9a\xdc\xd2\x3b\xe9\x4c\xa4\xe2\xd7\xce\x80\x9e\x3b\x49\x0a\x24\x64\xba\xde\x80\x2e\xf6\xa5\x40\x3a\x21\x00\x00\x96\xce\xd5\xa7\x83\xc1\x7a\xbd\x4e\xa5\x8f\x32\xd5\x66\x31\x28\x5b\x29\x3b\xb8\x98\x9c\x9d\x4f\x67\xe7\xc7\x27\xe9\x50\x88\xf7\xaa\x44\x6b\xc1\xe0\x5d\x43\x06\x73\x98\x6f\x40\xd6\x75\x49\x99\x9c\x97\x08\xa5\x5c\x83\x36\x20\x17\x06\x31\x07\xa7\x39\xce\xb5\x21\x47\x6a\x91\x80\xd5\x85\x5b\x4b\x83\x22\x27\xeb\x0c\xcd\x1b\x77\x00\x50\x1f\x15\x59\xd8\x17\xd0\x0a\xa4\x82\x70\x3c\x83\xc9\x2c\x84\xd7\xe3\xd9\x64\x96\x88\x0f\x93\x9b\x77\x97\xef\x6f\xe0\xc3\xf8\xfa\x7a\x3c\xbd\x99\x9c\xcf\xe0\xf2\x1a\xce\x2e\xa7\x6f\x26\x37\x93\xcb\xe9\x0c\x2e\xdf\xc2\x78\xfa\x2b\xfc\x3c\x99\xbe\x49\x00\xc9\x2d\xd1\x00\x7e\xae\x0d\xc7\xae\x0d\x10\x43\x87\x79\x2a\x66\x88\x07\xce\x0b\xdd\x06\x63\x6b\xcc\xa8\xa0\x0c\x4a\xa9\x16\x8d\x5c\x20\x2c\xf4\x0a\x8d\x22\xb5\x80\x1a\x4d\x45\x96\x8b\x67\x41\xaa\x5c\x94\x54\x91\x93\xce\x3f\x7f\x91\x4e\x2a\x5e\x0c\x84\xa8\x65\x76\xcb\x46\x94\xb6\x8a\x51\xa7\xaa\xd6\xc6\x41\x24\x82\xb0\xa8\x5c\x28\x82\x90\xf4\x80\x74\xe3\xa8\xe4\x07\x85\xae\xfb\x19\x70\x6d\xf8\x6f\x6d\xf9\x7f\x86\x45\x2d\x6c\x28\x44\x10\x2e\xc8\x2d\x9b\x79\x9a\xe9\x6a\x60\xeb\xe2\xe5\x5f\x07\x99\x9e\x1b\xc9\x52\xb7\xaf\x6c\x4a\x7a\xc0\x04\xd1\x0a\x95\x3b\x9e\x4b\x8b\x83\x52\xb3\x62\x2c\xc4\x60\x00\x67\x55\x3e\xd5\x33\x25\xdd\x0d\x5a\xc7\x88\x37\xb6\xab\xe5\x42\x2d\xb5\x75\x70\xc6\xb6\x52\xb1\x92\xe6\x91\xec\x08\x9e\x7b\x3f\xe9\x99\xae\x2a\xa9\xf2\x7b\x11\xbc\xb7\x78\x0a\x00\xa1\xd2\xc7\x9c\xdd\xb1\x43\xeb\xc2\x44\x04\xb3\xa5\x36\xee\x14\xc2\x33\x83\x92\xdb\x83\x51\x19\x64\x4b\xcc\x6e\x5b\x18\x18\x3c\x18\xac\x97\x5a\x56\x04\xa8\xf2\x5a\x93\x72\x96\x35\x2f\xb4\x5a\x9c\xc2\xef\x33\x34\xab\x4e\xaf\xd0\x65\xa9\xd7\x8c\xfe\x56\x90\x99\xc1\xaf\x16\xb4\x42\x05\x2d\x9e\x39\x16\xb2\x29\x9d\x65\xea\x85\xaf\x86\xaf\x86\x61\x9c\x0a\x71\xbc\xf5\x72\x0c\x06\x5d\x63\x54\x6b\x94\x49\x8c\xd6\xfd\x60\x61\x72\x05\x32\xcf\x99\x1d\x29\x4b\xef\x07\x79\x0c\x77\x0d\x1a\x42\x0b\x10\x52\xdd\x19\x0a\x3d\x51\x50\x66\x4b\xa8\x8d\x5e\x51\x8e\x39\xdb\x88\xc2\x7d\xd5\x7f\x50\x6d\x47\x54\xbf\x4c\xa8\x3e\x09\xe3\x44\x80\x4f\x98\x0a\x90\x65\xd9\xf9\xb7\xb5\x66\xd6\xcd\x75\xce\x0e\x2a\xe9\xb2\xb6\x8f\xc3\xab\xcb\x37\xbf\x4d\xae\x42\x40\xb5\x22\xa3\x55\x85\xca\xc1\x4a\x1a\xe2\x2e\x4b\x80\x1c\xac\xa9\x2c\xbb\x64\x40\xc2\xc9\x70\xb8\xb5\x96\xc0\x8f\xc3\x21\x68\xa6\xfc\x9a\x2c\xa6\xbf\x27\x22\x18\x9b\x85\x3d\x85\xb6\x70\xff\x96\x9f\xa9\x6a\xaa\x29\x9f\x45\xc3\x38\x11\xc1\x75\xa3\x4e\x01\x2a\x49\x2a\x11\x0f\xc2\x17\xdd\xc3\xd9\xb2\x4d\x88\xa2\x51\x19\x90\x22\x17\xc5\x70\x2f\x82\x03\x42\xa4\x6f\x4b\xb9\xb0\x51\x9c\xce\xbc\xf0\x2f\xd2\x44\xcf\x59\x39\x81\x90\x7f\xc2\xa4\xab\x43\x02\x21\x4f\x4b\x6f\xd7\x69\xb0\x5c\xda\x6f\x60\x03\x68\x95\x86\x31\x47\x35\x18\x00\xd5\x30\x02\x27\xcd\x02\x9d\xc7\xbf\x97\xe6\x02\x6d\x58\xc0\x78\x89\x16\x15\xcc\x81\x6a\x3e\xac\x5b\x35\x9e\xa0\xb5\xce\x7f\xb0\xdd\xb1\xda\x1d\x2b\x9d\x63\x7b\x2e\xdc\xa6\x46\xa8\xa4\xbd\xe3\xdc\xd0\x30\x04\x4d\xe6\x38\xeb\xab\x3d\x44\x1e\x3a\x4c\x18\xb2\x28\xab\x72\x78\x71\xd0\x13\x09\x48\xb3\xb0\xf0\xf1\x53\x2b\xee\x41\xab\xe0\x74\x04\xcf\x77\x96\xef\x45\xe0\x4d\x9e\x7a\x48\x12\x11\x3c\x08\x11\x70\x8b\xa6\x13\x45\xee\x42\x33\xa6\x22\xc8\xb1\x40\x03\xfe\xf8\x6d\xd9\xd8\x65\x77\x2e\x02\x2a\x00\x8d\x61\x9b\x55\x7a\xdd\xa8\x28\xfe\xc9\x3f\x3f\x1b\x81\xa2\x92\xfd\x05\x45\xe5\xd2\xb7\xb5\x21\xe5\x8a\x48\xdb\x74\xe6\x72\x34\x26\x81\xf0\x68\xf5\x5f\x15\x26\x2c\x1d\x8b\x20\xd0\x36\x3d\xff\x4c\x2e\x7a\x19\x73\x04\x7d\x5e\x51\x05\x2f\x76\xa1\xc6\xe0\x3d\xb0\x8a\x36\x6c\xbb\x03\x95\xda\x2e\xca\x1a\x63\x98\x9e\x2d\xb8\xdc\x49\x2a\xf7\xe8\x3e\x7a\xdf\xa1\x3c\xb9\x6a\x0d\x34\x5d\x13\xb0\xa5\x5e\x43\x37\xae\xdf\x51\xa8\x56\x22\xa8\xa9\x4e\x40\xdf\x72\x9a\xda\xa6\x17\x5a\xdf\x36\xf5\xb9\x5a\x45\x7d\x7b\xc4\x1e\x88\x67\xfa\xd6\x67\xdc\x75\x03\x27\x7e\xce\xa1\x16\xbd\x1c\x1b\xe3\xee\x81\xb5\xb4\x7e\xa5\xf2\x1e\xe0\x90\x48\xf5\xbe\xfa\x26\x0b\x3d\x0e\x81\xfa\x9a\xe3\xe9\xe5\x9b\xf3\x6f\xf2\xdc\x09\x7e\xb7\x6b\x0f\xce\x4a\x96\x94\x4b\xc7\xab\x49\xba\x03\x84\xa4\x41\x6e\x83\x6e\x58\xa1\x4d\x7d\x1c\x0a\x5d\x7a\x25\x8d\xc5\xc9\x55\x54\x53\x1d\xc3\x68\xc7\x83\x3f\x47\x25\xd3\x8a\x2f\x09\x98\xc3\xd1\x5d\x02\xeb\x25\x65\x4b\xa0\x36\x5a\xa9\xf6\x46\x63\x98\x70\x28\x2d\x40\x8f\x9c\xaa\x3f\x77\xfa\x18\x90\xef\xf0\xaa\x3a\xaf\x1e\x1b\x83\x0b\xf2\xad\xb9\x94\x2a\x2f\xd1\x58\x11\xf0\x8e\x4c\xdf\xf9\xc7\xb7\x8d\xca\xa2\xb0\x9f\xd2\x6c\x97\xff\x88\x9f\x92\xd9\x9b\x3d\x61\x02\xd5\xed\xd9\xee\x39\xf2\xc4\x63\xb7\x71\xeb\xd4\xd6\xa4\xa0\xa9\xdb\xab\x01\x8f\x2e\x23\xfa\x1c\xbd\xe1\x0b\x0e\x49\x8d\x55\xee\x57\x56\x14\x9e\x86\x7f\xa9\xd2\x2b\x3f\x06\x15\x95\x7e\x7e\xf9\xc9\xd2\xc5\x0c\xdc\x65\x91\xd7\xbc\xee\xa6\xf6\x07\x43\x0e\x4d\x02\x2f\xba\x53\xbf\x99\xe2\xae\x1f\xff\xa7\x49\x79\x1c\x6d\x84\xc6\xf0\x64\xf1\xbd\x98\x80\xc5\x1a\xfa\x21\xd3\xfe\x32\xfc\xd6\x19\xeb\x47\x83\xbc\xc5\xa8\x9f\x42\x09\x94\xa8\xbc\x7a\x1c\x8b\x80\xc7\x27\x25\xfd\x0c\x31\x52\x2d\x10\xbc\x69\xae\x1e\xeb\x7f\xa4\x4f\x30\xe2\xa3\xb6\x80\x51\x5b\xf6\x2e\xe7\xee\x1a\x92\xfe\x4b\x93\x8a\x58\xda\x47\xd2\x8f\xe9\xd7\x0d\x95\xb9\x85\xfd\xd9\xde\xe5\x9d\x40\x63\xfd\x0d\x4a\xe7\x2d\xa3\x75\xee\xe9\xac\x8b\xed\x94\x28\x75\xe6\xaf\x52\xdd\x80\x7d\x5c\x15\xe8\x93\x51\xb4\xcb\xbc\x47\xb5\x1d\x4d\xff\xe9\xd6\x75\xbf\x1d\xbe\xdc\xd4\x5c\x5c\xde\x96\x7e\x6d\x76\xfb\xd8\x3f\x3f\xda\xc3\x64\xe1\xaa\xdb\x18\x8f\x96\xea\x16\x09\x5f\xc8\x35\x3c\x59\x4a\x83\x77\x8f\xca\xe9\xd1\xf5\x30\x9f\x8e\xfa\x22\xde\x3f\x88\x20\xa0\xda\x1f\xf5\xb8\xce\xea\x92\x5c\x64\xf0\x2e\x7d\x7f\x7d\x91\x72\x42\x9b\x28\x4e\xff\x89\x2e\x0a\xa9\xb6\x61\x9c\x40\x98\xf0\xb8\xf0\x65\xfc\x2d\x61\x08\xb7\x55\x64\x53\xec\x66\x6f\x45\xf8\x4a\x44\x9c\xc4\x96\xd7\x5f\xac\x8b\x2e\xae\x11\xdf\xe6\x51\xe5\x9e\x28\xdb\x2d\xc1\xa5\xf7\xff\xa8\xd8\xb1\x08\xfe\x0e\xc3\x56\x75\x9d\xfa\x94\xdf\xa1\xcc\xd1\x44\x3f\x0e\x87\x5e\x67\x7f\x01\xad\x79\xf1\x70\x2b\x3f\x62\x32\x27\x02\x61\xec\xe5\x5b\x44\x3b\x47\x87\x26\x4f\xbc\xc9\x87\x8e\x5f\xfe\xcd\xf6\x06\x97\x5e\x63\xa5\x1d\x8e\xf3\xdc\x00\x29\xa7\x0f\x6e\x56\xc9\x17\x12\xad\x5e\x37\x5b\xfa\x65\x43\x2a\xd3\x15\x13\x33\xd3\x4a\x61\xb6\xe3\x5f\x4b\xa1\xef\x2b\xf0\x93\x79\x1f\x86\xd1\x77\x4a\x4f\xd5\xed\xbd\xd2\x77\x05\xdf\xdb\xa5\x41\xbb\xbb\x1f\x3a\xdd\x56\xae\xb1\x68\x3d\xf3\x9d\x86\x9c\x8a\x02\xb9\x65\x88\x17\xc5\x6c\x3a\xbe\x81\xc2\xe8\xaa\xe5\x28\xd4\xda\xf9\x57\x25\x14\x92\xca\xc6\x20\x54\x3a\x47\xdb\x66\xd5\xf3\x61\xdb\x4c\x5f\x6b\xac\xed\xc6\x6f\x4c\xc9\x44\xe2\xd4\x66\x5d\x6a\x61\xf7\xd5\x78\x64\x77\xd3\xd6\xcf\x69\x8e\x7a\x3b\x59\x3c\x3a\x4c\xdc\xc6\x94\xf1\xf6\xda\xf2\xec\x8b\x4d\x81\xc6\xf8\x01\xd3\x5e\x78\xd8\x44\xfa\x5a\xe7\x9b\xf4\xac\xd4\x16\x79\xf8\xcc\x75\xbe\xd9\x5a\x6d\xbf\x94\xd2\x6b\x94\xf9\xb8\x2c\xa3\xad\xf8\xb7\x78\x30\x4f\xf6\x5a\xfb\x14\xb1\x17\xee\xae\xd3\x6e\xc1\x7b\xe1\x6e\xaf\xfd\xf1\x87\xe7\x3e\x1f\xf9\x5d\x37\xfc\xda\xa6\x9b\x28\xbf\xbf\xf7\xef\xa1\x70\x74\xd7\x56\xe7\xe8\x2e\x4c\xe0\xd0\x59\x8b\x4c\x1b\x99\x6f\x63\xaa\xed\xc7\xe1\xa7\xde\x3f\xa7\xc2\xf5\xb9\x6f\xdb\xcf\x5f\x71\x47\xbe\x4a\xf7\xbb\xae\x39\xf0\x7f\x7d\xe8\xf7\xd9\x08\xaa\x0d\x0f\xb2\xf6\x39\x61\xf5\x6a\x03\xd3\x6e\xf6\x1e\xdd\xc1\xb1\xa7\x0f\xb3\xf4\x60\x46\x74\xad\xf8\xdd\x1e\xf8\x03\xfb\x29\x07\xcc\xda\x46\xe1\xe7\x1a\x33\xd7\xea\x46\xb5\xb6\x96\xe6\x65\xc7\x5f\xb7\x34\xba\x59\x2c\x0f\x84\x94\x43\x53\xc8\x0c\xfb\xaf\xbd\xb5\xdc\xb4\x6d\x2e\x55\xcb\x74\xde\x21\xf1\x13\xb1\xef\xb6\x95\xa2\x52\x3c\x88\xff\x07\x00\x00\xff\xff\x96\x06\x59\x4a\xbe\x11\x00\x00") + +func testImagesAgnhostNoSnatTestMainGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostNoSnatTestMainGo, + "test/images/agnhost/no-snat-test/main.go", + ) +} + +func testImagesAgnhostNoSnatTestMainGo() (*asset, error) { + bytes, err := testImagesAgnhostNoSnatTestMainGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/no-snat-test/main.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostNoSnatTestProxyMainGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x56\x71\x4f\xe3\x3e\x12\xfd\x3b\xfe\x14\x73\x91\xe0\x12\x2e\x38\x85\xd5\xea\x4e\x5d\xa1\x53\xb7\x0b\xb7\xd5\x72\x85\x6b\x60\x57\xab\xbb\xd3\xe1\x26\xd3\xc4\x22\xb1\x8d\xed\x50\x2a\xc4\x77\x3f\x8d\x53\xf8\x95\x65\xf9\x2b\xb5\x3d\x79\xf3\xe6\xcd\xf3\xa4\xf9\x01\x9b\x6a\xb3\xb1\xb2\x6e\x3c\x1c\x8f\x8e\xfe\x0a\x57\x0d\xc2\xb7\x7e\x89\x56\xa1\x47\x07\x93\xde\x37\xda\x3a\xce\xd8\xb9\x2c\x51\x39\xac\xa0\x57\x15\x5a\xf0\x0d\xc2\xc4\x88\xb2\x41\xd8\x9e\x64\xf0\x1d\xad\x93\x5a\xc1\x31\x1f\x41\x42\x01\xf1\xf6\x28\x4e\x3f\xb1\x8d\xee\xa1\x13\x1b\x50\xda\x43\xef\x10\x7c\x23\x1d\xac\x64\x8b\x80\x0f\x25\x1a\x0f\x52\x41\xa9\x3b\xd3\x4a\xa1\x4a\x84\xb5\xf4\x4d\x48\xb2\x85\xe0\xec\xe7\x16\x40\x2f\xbd\x90\x0a\x04\x94\xda\x6c\x40\xaf\x76\xa3\x40\x78\xc6\x00\x00\x1a\xef\xcd\x38\xcf\xd7\xeb\x35\x17\x81\x25\xd7\xb6\xce\xdb\x21\xca\xe5\xe7\xb3\xe9\xe9\xbc\x38\x3d\x3c\xe6\x23\xc6\xae\x55\x8b\xce\x81\xc5\xbb\x5e\x5a\xac\x60\xb9\x01\x61\x4c\x2b\x4b\xb1\x6c\x11\x5a\xb1\x06\x6d\x41\xd4\x16\xb1\x02\xaf\x89\xe7\xda\x4a\x2f\x55\x9d\x81\xd3\x2b\xbf\x16\x16\x59\x25\x9d\xb7\x72\xd9\xfb\x57\x02\x3d\xb3\x92\x0e\x76\x03\xb4\x02\xa1\x20\x9e\x14\x30\x2b\x62\xf8\x3c\x29\x66\x45\xc6\x7e\xcc\xae\xbe\x5e\x5c\x5f\xc1\x8f\xc9\x62\x31\x99\x5f\xcd\x4e\x0b\xb8\x58\xc0\xf4\x62\xfe\x65\x76\x35\xbb\x98\x17\x70\x71\x06\x93\xf9\x4f\xf8\x36\x9b\x7f\xc9\x00\xa5\x6f\xd0\x02\x3e\x18\x4b\xdc\xb5\x05\x49\xd2\x61\xc5\x59\x81\xf8\x2a\xf9\x4a\x0f\x64\x9c\xc1\x52\xae\x64\x09\xad\x50\x75\x2f\x6a\x84\x5a\xdf\xa3\x55\x52\xd5\x60\xd0\x76\xd2\x51\xf3\x1c\x08\x55\xb1\x56\x76\xd2\x0b\x1f\xd6\x6f\xca\xe1\xec\x20\x67\xcc\x88\xf2\x96\x40\x94\x76\x4a\x78\x63\xf5\xc3\x86\x31\xd9\x19\x6d\x3d\x24\x2c\x8a\x57\x9d\x8f\x59\x14\x4b\x9d\x4b\xdd\x7b\xd9\xd2\x42\xa1\xcf\xa9\x33\xf4\x5b\xbb\x98\xb1\x28\xae\xa5\x6f\xfa\x25\x2f\x75\x97\x3b\xb3\x3a\xfa\x90\x97\x7a\x69\x05\x05\xdc\xfe\xcd\x71\xa9\x73\xf2\x84\x56\xa8\xfc\xe1\x52\x38\xcc\x5b\x5d\xbb\x98\xa5\x8c\xe5\x39\x4c\xbb\x6a\xae\x0b\x25\xfc\x15\x3a\x7f\x49\x0c\x48\xe9\xde\x6d\x7b\x58\xab\x46\x3b\x0f\x53\x02\xe4\xec\x5e\xd8\xdf\xbd\x70\x02\xfb\x21\x23\x9f\xea\xae\x13\xaa\x7a\x64\xd1\xb5\xc3\x31\x00\xc4\x4a\x1f\x52\x69\x87\x1e\x9d\x3f\x0c\x05\xc6\x19\x8b\x8a\x46\x5b\x3f\x86\x78\x6a\x51\xd0\x0d\x11\x10\x8e\x5e\x64\xce\xcb\x06\xcb\xdb\x41\x15\x40\x55\x19\x2d\x95\xa7\x17\xcf\xb5\xaa\xc7\x00\x37\xcf\x2f\xbe\x1b\x0c\xeb\x46\x96\x4d\x80\x95\xdb\x38\xf2\x26\x3a\x4f\xf6\xa3\x65\x2d\xef\x51\x81\x17\xb6\x46\x0f\xc9\x2e\xc8\xdf\x87\xcd\x93\xe1\xf1\x3f\x69\xf6\xa5\x71\x27\xd2\x1c\x65\xd2\x1c\xa7\xd4\x5b\xb0\xe8\x7b\xab\x1c\x48\x4f\x9e\x77\x46\x87\xbb\x4b\x16\x87\x8f\xa3\xd1\xcb\x16\xb9\x14\xad\xd5\x96\xdf\x64\x2c\x9a\xd8\xda\x8d\x01\x06\xa9\xfe\x29\x1e\x64\xd7\x77\x73\xda\x4c\x46\x69\xc6\xa2\x45\xaf\x48\xb2\x4e\x48\x95\xb1\x27\x16\xc4\x0e\x4e\x20\xd3\xab\x9a\xb1\x55\xaf\x4a\x90\x4a\xfa\x24\x85\x47\x16\xbd\x6d\x04\x3f\x6b\x45\xed\x92\x94\x17\xe1\x8d\xef\xc2\x26\xfb\x84\x90\x41\x4c\x8f\x38\x83\xf8\xc3\xd1\xf1\x87\x8f\xf4\x83\x66\x54\x40\xf7\x1a\x1c\xda\xfb\xf7\x74\xd4\x8a\xc7\x29\xd1\xc9\x73\xb8\xa2\x71\x73\xa9\xab\x3f\xbb\xd7\xc1\x5e\xdc\xa2\x83\x9b\x41\xaf\x9b\x20\xd0\x8d\x34\xee\x06\x84\xad\xfb\x0e\x95\x77\x59\xd8\xbc\xeb\xd1\x52\x37\x1e\x87\xc8\xa7\x57\xa2\x93\xc6\x8f\xd2\xb8\x27\xc6\xfc\xc6\x20\x74\xc2\xdd\xfd\x61\x31\xe7\x6d\x5f\x7a\x2a\xfb\x72\x47\x92\xa7\xad\x28\xa4\x59\x52\x76\x15\x1c\xbc\xf2\x61\x46\x04\x1c\xfc\xfb\xbf\x43\x78\x50\xad\x83\xf1\x09\xec\xbf\x02\x7f\x64\x51\x40\x1d\x07\x41\x32\x16\x3d\x31\x16\xd1\x1d\xe1\x33\x25\xfd\xb9\x26\x49\x59\x54\xe1\x0a\x2d\x84\xed\xb3\xb6\x77\xcd\x76\x9f\x45\x72\x45\x3d\x26\xd8\x8e\x2f\x7a\x95\xa4\x9f\xc2\xfa\x4f\x27\xa0\x64\x4b\x29\xa3\x55\xe7\xf9\x99\xb1\x52\xf9\x55\xa2\x1d\x2f\x7c\x85\xd6\x66\x10\xef\xdd\xff\x47\xc5\x19\x45\xa7\x2c\x8a\xb4\xe3\xa7\x0f\xd2\x27\x47\x29\x31\x78\x2e\x2d\xe9\xe0\xe0\x15\xdb\x14\x42\x92\xc1\x57\x04\x9f\xe7\x60\xb1\x96\xce\xa3\x85\x46\xa8\xaa\x45\xcb\x22\x9a\x10\xfc\x6b\x58\x9d\xf5\xaa\x4c\xe2\x5d\xad\xe3\x0c\x76\x56\x54\x43\x9e\x83\x33\x52\x41\x6f\x86\x31\x47\x86\xb0\x2c\x1a\x6c\x1e\x3e\x04\xfc\x9c\x32\xa8\x89\xaa\x0a\x3a\x4c\xe2\x71\xfc\x97\x8e\x5f\x06\x77\x29\xd9\xa6\x2f\x84\x77\x90\xaf\x17\xe7\x89\x91\x26\x03\x69\x1c\x3c\xf7\x60\x78\x12\xf1\x2d\x3a\xa9\x53\x6c\xd5\x89\xb7\xdf\x9c\x3d\xf7\xc6\x1b\x7b\x2e\xce\xe0\x19\xed\xb7\xe9\x92\xf5\xc0\x74\xb1\xbd\x7d\x3f\xac\xf4\x68\x33\xba\xf8\x70\xb0\x3d\x09\x23\x20\x18\xa1\xb7\x2d\xf5\xec\x17\xba\x16\xef\xf8\xf5\xe2\x9c\xff\xab\x47\xbb\x49\x52\xfe\x0f\xf4\x49\x3c\xd8\x35\x4e\x03\xd4\xdb\x63\x69\x5c\x9c\xa6\x54\x8f\x33\xd9\xb3\x17\x42\x3e\x3a\xee\x6d\x9b\xbe\x98\x64\xc7\x14\x6b\x1e\xf8\x7d\x45\x51\xa1\x4d\x3e\x8e\x46\xe9\x2f\x4e\x59\x67\x10\x0f\x4d\xa6\x7b\xb3\x21\xd1\xf6\xee\x02\xfe\x18\xf6\xee\xe3\x0c\x7a\xdb\x3e\x9b\xe7\x09\xb0\x75\x18\x70\x97\xba\xda\xbc\xb0\x18\x3e\x1b\x7c\x81\xa2\x9a\xb4\x6d\x42\x0c\xf9\x67\x5d\x6d\x28\xd7\x5b\x4a\xbf\xe7\xf4\x0e\x29\x8b\xa2\x22\x4e\x94\x8f\xfe\x41\xbc\xcc\xbc\x95\xd5\xdd\xfb\x4c\x77\xa9\x92\xed\x86\x66\x55\x83\xed\x44\x87\xe0\xbc\xf0\xbd\x83\x52\x57\x18\x86\x46\xc0\x17\xbf\x4c\x1c\xad\xc2\x0b\x52\x79\xb4\x4a\xb4\x34\x94\xde\xf2\x0f\xd5\x16\x01\x6e\xaa\x2b\x4c\x77\x22\x92\xe5\x56\x84\x27\xba\x6b\xd1\x8b\x2e\x7c\xda\x6a\x87\x09\xd9\xeb\xff\x01\x00\x00\xff\xff\x3d\xc5\xcc\xbc\xd7\x09\x00\x00") + +func testImagesAgnhostNoSnatTestProxyMainGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostNoSnatTestProxyMainGo, + "test/images/agnhost/no-snat-test-proxy/main.go", + ) +} + +func testImagesAgnhostNoSnatTestProxyMainGo() (*asset, error) { + bytes, err := testImagesAgnhostNoSnatTestProxyMainGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/no-snat-test-proxy/main.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostOpenidmetadataOpenidmetadataGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x58\x6f\x6f\xdb\x38\xf2\x7e\x2d\x7e\x8a\x59\xfd\xd0\x54\xee\x4f\x96\x7a\xb9\x37\x07\x17\x7d\x91\x3a\xcd\xad\xaf\xbd\x24\xa8\x9d\x16\x8b\xbb\x03\x4a\x4b\x23\x89\xb5\x44\x6a\x49\x2a\x8e\x51\xf4\xbb\x1f\x86\x94\x64\x3b\xf1\x2e\xd2\x2b\x50\x38\x96\x38\x0f\xe7\xcf\xc3\x67\x86\x4e\x5f\xb1\xb9\x6a\x77\x5a\x94\x95\x85\xf3\xd7\xe7\xaf\x61\x55\x21\x7c\xe8\xd6\xa8\x25\x5a\x34\x70\xd1\xd9\x4a\x69\x93\x30\xf6\x51\x64\x28\x0d\xe6\xd0\xc9\x1c\x35\xd8\x0a\xe1\xa2\xe5\x59\x85\xd0\xbf\x89\xe1\x33\x6a\x23\x94\x84\xf3\xe4\x35\x44\xb4\x20\xec\x5f\x85\x93\x37\x6c\xa7\x3a\x68\xf8\x0e\xa4\xb2\xd0\x19\x04\x5b\x09\x03\x85\xa8\x11\xf0\x21\xc3\xd6\x82\x90\x90\xa9\xa6\xad\x05\x97\x19\xc2\x56\xd8\xca\x6d\xd2\x43\x24\xec\xb7\x1e\x40\xad\x2d\x17\x12\x38\x64\xaa\xdd\x81\x2a\x0e\x57\x01\xb7\x8c\x01\x00\x54\xd6\xb6\xb3\x34\xdd\x6e\xb7\x09\x77\x5e\x26\x4a\x97\x69\xed\x57\x99\xf4\xe3\x62\xfe\xfe\x7a\xf9\x7e\x7a\x9e\xbc\x66\xec\x4e\xd6\x68\x0c\x68\xfc\xbd\x13\x1a\x73\x58\xef\x80\xb7\x6d\x2d\x32\xbe\xae\x11\x6a\xbe\x05\xa5\x81\x97\x1a\x31\x07\xab\xc8\xcf\xad\x16\x56\xc8\x32\x06\xa3\x0a\xbb\xe5\x1a\x59\x2e\x8c\xd5\x62\xdd\xd9\xa3\x04\x0d\x5e\x09\x03\x87\x0b\x94\x04\x2e\x21\xbc\x58\xc2\x62\x19\xc2\xbb\x8b\xe5\x62\x19\xb3\x2f\x8b\xd5\xaf\x37\x77\x2b\xf8\x72\xf1\xe9\xd3\xc5\xf5\x6a\xf1\x7e\x09\x37\x9f\x60\x7e\x73\x7d\xb9\x58\x2d\x6e\xae\x97\x70\x73\x05\x17\xd7\xbf\xc1\x87\xc5\xf5\x65\x0c\x28\x6c\x85\x1a\xf0\xa1\xd5\xe4\xbb\xd2\x20\x28\x75\x98\x27\x6c\x89\x78\xb4\x79\xa1\xbc\x33\xa6\xc5\x4c\x14\x22\x83\x9a\xcb\xb2\xe3\x25\x42\xa9\xee\x51\x4b\x21\x4b\x68\x51\x37\xc2\x50\xf1\x0c\x70\x99\xb3\x5a\x34\xc2\x72\xeb\xbe\x3f\x09\x27\x61\xaf\x52\xc6\xd2\x14\x6e\x79\xb6\x21\x1c\xd5\xa2\x14\x79\x83\x96\xe7\xdc\x72\xb0\x68\xac\x71\x06\x37\x8b\xcb\x39\x45\x9e\xd1\x46\x3b\x40\x99\xb7\x4a\x48\x6b\x60\x5b\x89\xac\x02\xae\x11\x5a\xae\x2d\xa8\x82\xe0\xc8\x62\x89\xfa\x5e\x64\x78\x91\x65\xaa\x93\x76\x61\x4c\x87\xfa\x72\x04\x28\x90\xdb\x4e\x63\xc2\xda\x93\x3b\x33\x26\x9a\x56\x69\x0b\x11\x0b\xc2\x4c\x49\x8b\x0f\x36\x64\x41\x58\x34\xee\x43\xa8\x54\xa8\xce\x8a\x9a\xbe\xd4\xaa\xa4\x0f\x89\x36\x25\xae\x84\x8c\x05\x4a\xe4\x19\x84\xa5\xb0\x55\xb7\x4e\x32\xd5\xa4\x99\xd2\xa8\x4c\x5a\xaa\x29\xbd\xa2\xe5\x07\x2f\x4d\x5b\xfc\xe5\xaf\x69\xa6\xd6\x9a\xbb\x37\x8a\xd2\xea\x58\xf6\x90\x2a\xde\xd9\xea\xdc\x3f\x6e\x37\x65\x22\x64\x6a\x7e\xef\xb8\x46\xc2\xfa\xa6\x0c\x26\xf7\xe7\xe9\xb7\xad\xf3\x6a\xf3\x37\x93\x08\x95\x66\xb5\x40\x69\xa7\xa5\x4a\x35\x1a\x1b\xb2\x89\xcb\xf0\xbc\xc9\x57\x68\xec\x9f\x67\x45\x18\x3a\x50\x9e\xb7\xa5\xac\x94\xb1\x30\x27\xb7\x12\x76\xcf\xf5\xf3\x20\xde\xc2\x99\x8b\x24\x99\xab\xa6\xe1\x32\xff\xce\x82\x3b\x83\x33\x00\x08\xa9\x9a\x53\xe3\xad\xa7\xdc\x9b\x4f\x85\xb3\x9f\x8e\xa5\x0d\x63\x16\x2c\x2b\xa5\xed\x0c\xc2\xd5\x58\xfe\x67\x15\x93\x4c\x3f\x2a\x59\xce\x20\xfc\x84\x3c\x37\xe0\xce\x76\x43\x16\xee\xbc\x6d\x90\x4e\x4b\x0e\xdc\x5a\x6c\x5a\x42\x56\x70\x8f\x5a\x14\x3b\x10\x16\x78\xc9\x85\x34\xd6\xcb\xd1\xed\x02\xc8\x51\xd4\x2f\x0d\x84\xf0\xff\x2c\x08\x42\xc7\xc0\x91\x77\x31\x74\x86\xe8\xce\x49\x7d\x74\x3e\x25\xf2\xed\x3c\x4b\xe9\xf8\x60\x83\xd2\xb3\x3e\x21\xaf\x2e\x74\x69\x66\xe0\xf3\xf2\x4f\xfe\x20\x9a\xae\xb9\xa6\x67\xd1\xeb\x49\xcc\x82\x4f\x9d\x9c\x01\x34\x5c\xc8\x98\xfd\x60\x2e\xd5\x11\x0b\x9c\xbf\xb7\xdc\x56\x30\xfe\xa3\x73\x2f\x4b\x16\xf0\x2e\x17\x48\xd2\xf6\xf4\x95\x90\xf3\xba\x33\xf6\x30\x3b\x6b\xa5\x6a\x22\x41\xd1\xc9\x0c\x84\x14\x36\x9a\xc0\x77\x16\x14\x06\x66\x6f\x9f\x55\xd3\xe4\xaa\xe6\xa5\x89\x26\x64\x93\x2c\xdd\x46\x9f\xb9\x8e\xce\x46\x0f\x63\x08\xdd\xdf\xd3\x96\xdb\x2a\x8c\x21\xa4\xff\xce\x75\xab\x40\x23\xcf\xa1\xaf\x3a\xf4\x55\xef\x8b\x51\x68\xd5\x24\xe1\x13\xdc\x21\xbc\x18\xc2\xe1\xcf\x01\xf4\x62\x88\xdc\x2a\xc8\x2a\xcc\x36\xa4\x80\x1a\x33\x14\xf7\x43\x89\x07\xc0\x77\x4a\xd5\x0e\xee\x69\x4a\x62\x08\x85\x9c\x66\xfe\xe9\x21\xf5\xa0\xe0\xb5\xc1\x98\xca\xbd\x90\x59\xdd\xe5\xe8\xe9\xb7\x5f\x0d\x6b\xe4\x9a\x44\xcc\x05\x20\xa4\xd3\x7a\x34\x16\x2a\xe4\x39\x6a\x93\x40\x48\x6c\x09\xc2\x3b\x83\xb0\xad\x50\xc2\x3d\xaf\x45\xce\xad\x23\x4b\x4f\xb1\x23\x7a\x9d\x10\xb5\x78\x00\xf1\xe2\xd6\xb7\x13\x20\x29\x40\x69\x45\xd6\x13\x6b\x42\x6c\x71\x55\x25\xee\x44\x59\x93\xc3\xab\xa3\xb3\x17\x03\xd7\xa5\x81\x7f\xfd\xc7\xb3\xc3\x95\x3d\xb3\x0f\x31\xa0\xd6\x54\x7c\xea\x8c\x37\xd4\x97\xcf\xe7\x4e\x33\xa2\x5e\xe9\x92\x77\x3c\xdb\x94\x5a\x75\x32\x8f\x26\x13\x16\x88\xc2\x59\xfc\xf2\x16\xa4\xa8\x09\x24\xa8\x55\x99\x5c\x71\xcb\xeb\x08\xb5\x9e\xb0\xe0\x07\x63\x81\xe6\xdb\x11\xb9\x44\xeb\x32\x14\x3d\xd3\xda\x3d\xba\xd5\x42\xda\x28\xbc\xf9\x30\x83\xbf\xab\x9e\x23\x54\x4c\xab\x36\x23\xf0\xb7\xad\x4d\x6e\xb9\x36\xb8\x14\xa5\xc4\x3c\xd2\x7c\xfb\xdc\x2d\xe8\x5c\x75\xd2\xf0\x02\xe7\x35\x17\x8d\x81\xcc\x7d\x8c\xd6\xb3\xb7\xb4\x65\x72\x77\xb0\xe4\x8b\xb0\x95\xea\xec\x67\x12\x89\x3e\xed\xd1\xd9\x21\xc6\xe4\xcd\xcf\xc4\x56\xf8\xe0\x4a\x65\xc1\xcb\x1e\xbc\x30\x61\x7c\xe4\x54\xe2\xcf\xde\xe4\xd8\xea\xaa\xab\xeb\x98\xe6\x9d\x69\xcf\x26\xcc\x7b\xef\x67\xf0\x6f\xf9\xe2\xff\xee\x1f\xa1\x4c\x18\x0b\x84\x31\x63\xd6\xa8\xe9\x24\xd7\xb8\xbd\xd5\xea\x5e\xe4\xa8\x23\xc7\x82\xd3\xfb\xfe\x5c\xb9\xfa\x90\xe6\x4a\x1a\xab\xbb\x8c\x1c\x73\x22\xd8\xf6\x3b\xb9\x99\x61\x08\xf6\xb1\x9b\xe3\xa6\x54\x9c\x5a\xe4\xab\x83\x42\x0b\x63\x12\x9f\x77\xd4\xd1\x99\x0b\x60\xae\x64\x21\xca\xef\x9e\xab\x8b\xcb\x19\x0c\xea\xf0\x63\xe2\x97\xee\x7c\x5c\x3f\xc1\x89\x47\xb4\xfb\x3c\x66\xd7\x88\x52\xba\xa6\x42\x02\xf3\x8f\x2f\xab\xd0\x3b\xa9\xe1\x4f\xf9\x33\x44\x91\xf8\x15\xd1\xd9\xff\xca\x94\xfd\x29\x70\x90\xfd\x56\x4e\x30\xfd\xb9\xf8\x25\x3c\x49\x91\x3f\xa6\xc7\xa1\x2b\xa4\x1b\x76\xd7\x22\x6c\xba\x35\x5e\xf3\x06\xc1\x17\x8f\xdc\x1a\xbe\x92\x5e\x7d\xfd\x66\x94\x9c\x85\x92\x37\x18\x7e\x65\xc1\xdd\xe2\x12\x1e\xbd\xea\x44\x1e\x7e\x3d\x82\xeb\x73\x73\x0c\x68\x5a\x3e\x74\xab\xde\x1e\x0e\xc1\xdd\x6b\xda\xe1\xb8\x0d\xed\xdd\xeb\xd7\xf6\x5d\xa4\x6f\x22\x07\x1b\x67\x8f\x37\x25\x99\xf0\x9e\x30\x16\x1c\x5c\x42\x0e\x3c\xec\x31\x37\xe3\xcb\x44\x28\x0f\xe9\x24\x35\xda\xc0\x2b\x0f\x3b\x01\xdf\x9b\xa2\xc9\xe0\xfc\x77\x16\x68\xb4\x9d\x96\x50\x34\x36\x59\xb6\x7d\x09\x5e\x98\xf4\x85\x71\x84\x77\xc7\x7a\x93\xec\x37\x4e\xc6\x2c\x3c\x7a\x7e\x1c\xb1\x5b\x46\x2b\x86\x3e\xb7\x97\xf8\xbd\xa2\x42\xe4\xdd\x70\x47\x45\x69\xa7\xea\xeb\xfd\xb9\x71\x73\x69\x42\x03\xd0\x95\xa8\x31\x1a\x9b\xf4\x64\x74\xda\x9b\x47\xeb\x89\x33\xa2\x1d\xd2\xf4\x49\x2f\x00\xbf\xd8\xb8\xdb\x91\xeb\x0a\x60\x2b\x4e\x77\xab\xbe\x2f\x72\x09\xbf\xae\x56\xb7\xe0\x97\xc7\xfb\xe1\x9e\xd0\xfc\xd8\x9a\xd0\x82\x1e\x6e\x83\xbb\x04\x16\x05\xc0\x74\x7a\xaa\xf7\xd2\xe8\x69\x75\x87\xb1\xeb\xb7\x7e\x84\x85\xad\xa8\x6b\x42\xf3\x97\xbc\xa3\xdb\xe4\x62\x68\xea\x5e\x14\x12\xb8\xa1\x5b\xcc\x56\xd0\x15\xc9\x1b\x92\x15\x19\xd3\x4c\x9e\x5c\x62\xc1\xbb\xda\xae\x34\x97\x86\xe6\xfa\x84\xde\xd0\x05\xf5\x2b\x29\xcb\x57\xa8\xc5\x5a\x73\xbd\x03\x8d\x74\xb7\xe9\x87\xce\xa7\x41\x0c\x99\xd8\xe0\xee\x0d\x88\x82\xb6\x12\x06\x0c\xda\x78\xb8\x75\x0c\x40\x83\x07\xee\x61\x2f\x86\xb9\xf7\x65\xc8\x2f\x77\xf7\x2e\x5b\x71\xe9\x16\xe5\xde\x45\x02\x72\x79\xf5\x39\xe8\x1d\x15\x06\x78\x5d\xab\x2d\xcd\xe7\x34\xfb\xa0\x34\xa4\x4d\xfd\xf0\x61\x88\x1d\xa0\x55\xe7\xe7\xdc\x47\x23\x2c\x31\x92\x50\x4e\x27\x3e\xf6\x53\x72\x36\x06\x58\x88\xb2\xa3\xbb\xeb\x78\x6d\xe6\x6d\xab\x55\xab\x05\xb7\x08\xf3\x8b\xc4\xd3\xf1\x0f\x47\x87\xb9\xff\x9c\xc0\xe3\x27\x87\x74\xa5\x98\x6e\x2e\x6f\xa2\xc6\xf2\xae\x40\x39\x99\xc1\x52\x35\x98\xf3\x5d\x0c\x8d\xfb\x01\x61\xcb\xdd\x90\x08\x59\xc5\x65\xd9\xdf\xf0\x8d\xf2\x0c\xdc\x22\x64\x94\x33\x34\xd6\x23\x39\x86\x6b\xf5\x0d\x33\x6a\xd0\xde\x71\x2e\x5d\x06\xc6\x49\xd9\xa0\x1d\x32\x83\x0f\x16\xb5\xe4\xf5\xbe\x47\x91\x85\x83\x1a\xf3\x39\x4c\x6a\xe3\xda\xfd\x85\x33\xa2\x5b\xbb\x9b\xcb\x32\x4e\x33\x1e\xbe\xa4\xf1\x56\xe6\x0e\x80\x43\x2e\x8a\x02\x35\x8e\x33\xae\xf7\x06\xa4\x92\xd3\x03\xfa\x0e\x7e\x4d\x12\xe6\xec\xde\xed\x86\xfa\xc7\x23\x6b\xfa\x07\x8e\x34\x60\x07\xe6\xee\xeb\x62\x76\xc6\x62\x03\x5a\x29\x0b\xeb\x4e\xe6\x35\x0d\xae\x69\x0a\x46\x50\xc0\xc2\xbe\x34\xa7\x66\xcf\xa3\x0c\x08\x69\x9d\x47\x09\x0b\xb4\x25\xf5\x38\x79\x58\x5c\x87\x3b\x71\xb1\xa0\x26\x96\xa6\x74\xa8\x0f\xe6\xe3\x03\x62\xd1\xb4\x3a\x46\x73\xb0\xc4\x93\x8c\xea\xe9\x4b\xe9\x61\x0e\xa6\xdb\x83\xdf\x6c\xf6\x34\x4e\x58\x10\x64\x45\x39\x0a\x1d\x5d\x6e\x93\x47\x32\x40\xe3\xe6\x89\xc6\x3f\x08\x9f\x14\xb5\x97\xbc\x80\x9a\x6d\xa0\x3d\x27\xa1\xc7\x1a\xe3\xbd\x52\x3a\xca\x8a\xf2\x19\x58\x24\xff\xef\x89\xd5\x45\x14\x66\xaa\xab\x73\xf7\x9b\x54\x7f\x18\x65\x6e\xb5\x68\x5b\xd4\x33\x3f\xf9\xf8\x2e\x4f\x3b\xd3\xb4\x9c\xd9\x07\x8a\x62\x38\x24\x34\x69\x7e\xe6\x75\x87\x27\x67\x70\xba\x91\x3c\x51\xa3\x18\xce\x0e\xf4\xc4\xf9\x36\x86\x30\x03\x6d\xc9\xe8\xc7\x5e\xf5\xdd\x68\x24\x45\xcd\x7e\xb0\xff\x06\x00\x00\xff\xff\xb4\x88\x6d\x9a\xac\x13\x00\x00") + +func testImagesAgnhostOpenidmetadataOpenidmetadataGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostOpenidmetadataOpenidmetadataGo, + "test/images/agnhost/openidmetadata/openidmetadata.go", + ) +} + +func testImagesAgnhostOpenidmetadataOpenidmetadataGo() (*asset, error) { + bytes, err := testImagesAgnhostOpenidmetadataOpenidmetadataGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/openidmetadata/openidmetadata.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostPausePauseGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x93\x41\x6f\xdb\xc6\x13\xc5\xcf\x9c\x4f\xf1\x40\xe0\xff\x07\x65\xd0\xa4\xed\x9e\xaa\x26\x07\x55\x71\x5b\x22\x8e\x1c\x98\x72\x83\xa0\x2d\x90\xd5\x72\x48\x2e\x4c\xee\xb2\xbb\xcb\x48\x42\xe0\xef\x5e\x2c\xa9\xa0\x56\xd3\x43\x2f\x04\x76\xe7\xbd\x99\xdf\xcc\x2c\xf3\x0b\x5a\x9b\xe1\x68\x55\xd3\x7a\xdc\x5c\x5d\x7f\x8f\x6d\xcb\x78\x3b\xee\xd8\x6a\xf6\xec\xb0\x1a\x7d\x6b\xac\xcb\x88\xee\x94\x64\xed\xb8\xc2\xa8\x2b\xb6\xf0\x2d\x63\x35\x08\xd9\x32\x4e\x91\x14\xbf\xb2\x75\xca\x68\xdc\x64\x57\x48\x82\x20\x3e\x85\xe2\xc5\x0f\x74\x34\x23\x7a\x71\x84\x36\x1e\xa3\x63\xf8\x56\x39\xd4\xaa\x63\xf0\x41\xf2\xe0\xa1\x34\xa4\xe9\x87\x4e\x09\x2d\x19\x7b\xe5\xdb\xa9\xc8\x29\x45\x46\x1f\x4f\x09\xcc\xce\x0b\xa5\x21\x20\xcd\x70\x84\xa9\x5f\xaa\x20\x3c\x11\x00\xb4\xde\x0f\xcb\x3c\xdf\xef\xf7\x99\x98\x28\x33\x63\x9b\xbc\x9b\x55\x2e\xbf\x2b\xd6\xb7\x9b\xf2\xf6\xf2\x26\xbb\x22\x7a\xd4\x1d\x3b\x07\xcb\x7f\x8e\xca\x72\x85\xdd\x11\x62\x18\x3a\x25\xc5\xae\x63\x74\x62\x0f\x63\x21\x1a\xcb\x5c\xc1\x9b\xc0\xb9\xb7\xca\x2b\xdd\xa4\x70\xa6\xf6\x7b\x61\x99\x2a\xe5\xbc\x55\xbb\xd1\x9f\x0d\xe8\x2b\x95\x72\x78\x29\x30\x1a\x42\x23\x5e\x95\x28\xca\x18\x3f\xae\xca\xa2\x4c\xe9\x43\xb1\xfd\xe5\xfe\x71\x8b\x0f\xab\x87\x87\xd5\x66\x5b\xdc\x96\xb8\x7f\xc0\xfa\x7e\xf3\xa6\xd8\x16\xf7\x9b\x12\xf7\x3f\x61\xb5\xf9\x88\xb7\xc5\xe6\x4d\x0a\x56\xbe\x65\x0b\x3e\x0c\x36\xb0\x1b\x0b\x15\x46\xc7\x55\x46\x25\xf3\x59\xf1\xda\xcc\x30\x6e\x60\xa9\x6a\x25\xd1\x09\xdd\x8c\xa2\x61\x34\xe6\x33\x5b\xad\x74\x83\x81\x6d\xaf\x5c\x58\x9e\x83\xd0\x15\x75\xaa\x57\x5e\xf8\xe9\xfc\x4d\x3b\x19\x5d\xe4\x44\x83\x90\x4f\x21\xc9\x20\x46\xc7\x44\xaa\x1f\x8c\xf5\x48\x28\x8a\xeb\xde\xc7\x14\xc5\xc6\xcd\xdf\xdc\xa9\x46\x8b\x2e\x1c\xdc\xd1\x49\xd1\x75\x31\x51\x14\x37\xca\xb7\xe3\x2e\x93\xa6\xcf\xdd\x50\x5f\x7f\x97\x4b\xb3\xb3\x22\xa6\x05\x51\x9e\x63\xdd\x57\xef\x43\xe2\x30\xba\xd1\x9d\x96\xd2\xe8\xd6\x38\x8f\x75\x10\x66\xf4\x59\xd8\xbf\x65\xaf\xf1\xff\xc9\x9f\xad\x4d\xdf\x0b\x5d\x7d\xa1\xe8\xd1\xf1\x12\x40\x3c\x01\xc6\x29\x45\x65\x6b\xac\x5f\x22\x9e\x1c\x6e\xea\x88\x0f\x2c\xc7\xd0\x66\x88\xdf\x19\xdd\x2c\x81\x4f\xff\x16\xcf\xf0\xe8\xb8\x1e\xbb\x69\x9a\x4f\xcc\x43\x98\x5a\x50\x48\xa3\xc3\x73\x64\xeb\x60\x47\xad\x4f\xaf\x02\x66\x5a\x8f\x9c\x61\x1c\xa4\xd0\xd8\x7d\x4d\xc7\x55\xf6\x29\xa5\x68\x65\x1b\xb7\x04\x66\xec\x77\xe2\xa0\xfa\xb1\xdf\x84\xcb\xe4\x6a\x91\x52\xf4\x30\xea\x80\x3f\xd1\xa7\xf4\x4c\x54\x8f\x5a\xce\xc7\x44\xf6\x15\x2e\xce\xfa\x4d\x21\x6c\xe3\xf0\xdb\x1f\xe1\x95\xe9\x66\x81\x2f\x14\xd5\xbd\xcf\xde\x5b\xa5\x7d\xa7\x93\xb9\xe9\x2a\x5e\x50\xe4\x54\xb3\x6e\xb1\x7c\x8d\x5e\x3c\x71\x22\x5b\xa1\x61\x5c\x56\x4e\x4b\x5a\x50\x54\x19\xcd\xe7\x51\xa5\x7d\x8a\xeb\xd9\xa9\x45\x97\x6d\x8c\x57\xf5\x31\x99\xf2\xa4\x38\xed\x34\x2b\x8b\x9f\x8b\xcd\xf6\x3f\xa8\xb6\xb7\x0f\xef\x16\x14\x35\x06\xa1\xa3\x64\x42\x0d\xa6\x50\xf4\xd5\xe5\xa4\x0f\x17\x7b\xe5\x65\x8b\x70\x1f\xe2\x52\x38\xfe\x47\xa9\x25\x45\xd1\x4c\xfb\xea\x12\xd7\xe1\x60\x5c\x76\x7b\x50\x3e\x09\xac\xdf\x38\x42\xd9\x33\xcb\xcd\x4b\xcb\x4d\xb0\x3c\x53\xf4\x9c\x2c\x28\xb2\xec\xc6\xce\xcf\x3c\x41\xfd\x62\x94\x75\x12\xf3\x61\xfa\xf9\xf1\xbf\xea\x77\x1d\xa7\x98\xc5\x0b\x7a\xa6\xbf\x02\x00\x00\xff\xff\x2b\x3f\x3c\x77\x4d\x05\x00\x00") + +func testImagesAgnhostPausePauseGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostPausePauseGo, + "test/images/agnhost/pause/pause.go", + ) +} + +func testImagesAgnhostPausePauseGo() (*asset, error) { + bytes, err := testImagesAgnhostPausePauseGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/pause/pause.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostPortForwardTesterPortforwardtesterGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x58\x6f\x73\x1b\xb7\xf1\x7e\x4d\x7c\x8a\xf5\xcd\xf8\xf7\x23\x1d\xf2\x28\xc9\xc9\x4c\x43\x57\xed\xd0\x94\x5c\xb3\x51\x64\x8d\x48\xc7\x4d\xd3\x8c\x03\xe2\xf6\xee\x30\xc2\x01\x67\x00\x47\x8a\xf5\xb8\x9f\xbd\xb3\xc0\x1d\xff\xd8\x52\xe2\xe9\x1b\x5b\x24\x80\x67\x17\x8b\x67\xf7\xd9\xe5\xf8\x19\x9b\x99\x7a\x6b\x65\x51\x7a\x38\x3b\x39\xfd\x0e\x96\x25\xc2\x0f\xcd\x0a\xad\x46\x8f\x0e\xa6\x8d\x2f\x8d\x75\x29\x63\x57\x52\xa0\x76\x98\x41\xa3\x33\xb4\xe0\x4b\x84\x69\xcd\x45\x89\xd0\xae\x0c\xe1\x27\xb4\x4e\x1a\x0d\x67\xe9\x09\xf4\x69\x43\xd2\x2e\x25\x83\x17\x6c\x6b\x1a\xa8\xf8\x16\xb4\xf1\xd0\x38\x04\x5f\x4a\x07\xb9\x54\x08\x78\x2f\xb0\xf6\x20\x35\x08\x53\xd5\x4a\x72\x2d\x10\x36\xd2\x97\xc1\x48\x0b\x91\xb2\x9f\x5b\x00\xb3\xf2\x5c\x6a\xe0\x20\x4c\xbd\x05\x93\x1f\xee\x02\xee\x19\x03\x00\x28\xbd\xaf\x27\xe3\xf1\x66\xb3\x49\x79\xf0\x32\x35\xb6\x18\xab\xb8\xcb\x8d\xaf\xe6\xb3\xcb\xeb\xc5\xe5\xe8\x2c\x3d\x61\xec\xad\x56\xe8\x1c\x58\xfc\xd0\x48\x8b\x19\xac\xb6\xc0\xeb\x5a\x49\xc1\x57\x0a\x41\xf1\x0d\x18\x0b\xbc\xb0\x88\x19\x78\x43\x7e\x6e\xac\xf4\x52\x17\x43\x70\x26\xf7\x1b\x6e\x91\x65\xd2\x79\x2b\x57\x8d\x3f\x0a\x50\xe7\x95\x74\x70\xb8\xc1\x68\xe0\x1a\x92\xe9\x02\xe6\x8b\x04\x5e\x4e\x17\xf3\xc5\x90\xbd\x9b\x2f\x5f\xbf\x79\xbb\x84\x77\xd3\xdb\xdb\xe9\xf5\x72\x7e\xb9\x80\x37\xb7\x30\x7b\x73\x7d\x31\x5f\xce\xdf\x5c\x2f\xe0\xcd\x2b\x98\x5e\xff\x0c\x3f\xcc\xaf\x2f\x86\x80\xd2\x97\x68\x01\xef\x6b\x4b\xbe\x1b\x0b\x92\x42\x87\x59\xca\x16\x88\x47\xc6\x73\x13\x9d\x71\x35\x0a\x99\x4b\x01\x8a\xeb\xa2\xe1\x05\x42\x61\xd6\x68\xb5\xd4\x05\xd4\x68\x2b\xe9\xe8\xf1\x1c\x70\x9d\x31\x25\x2b\xe9\xb9\x0f\x9f\xbf\xb8\x4e\xca\x9e\x8d\x19\x1b\x8f\x61\x0a\x5e\xea\x2d\xac\xa4\xe6\x76\x1b\xed\xa0\xf3\x01\xcf\x58\x4f\x5f\x6c\xb8\xcd\xa4\x2e\xd2\x40\xab\xdc\x28\x65\x36\xb4\x8c\x7a\x2d\xad\xd1\x15\x6a\x0f\x6b\x6e\x25\x05\xda\x11\xa2\x30\xda\x5b\xa3\x82\xb5\x08\xfb\xff\x0e\x94\x29\xa4\x98\xb0\xf1\x98\x76\xbc\x9c\x5f\x5f\xbc\xbf\x79\x73\xbb\x84\x51\xd8\xb5\x9c\xdd\x44\x6b\xde\x04\x5a\x75\xb7\x55\xd2\x79\xd4\x68\xe9\xcc\xe5\x3f\x6e\x2e\x67\xcb\xcb\x8b\xf7\xb3\xab\xf9\xe5\xf5\xf2\xfd\xc5\x74\x39\x85\x11\x64\xdc\x73\xf0\x25\xf7\xb0\x21\x12\xd6\x28\x02\x8a\x45\x81\x72\x8d\x90\x5b\x53\x05\x28\xa1\x24\x6a\xff\x22\x90\x6f\x85\x90\x24\x29\x81\xce\x5e\xbf\xbd\xfe\x61\x01\x23\x28\xcd\x06\x2a\xae\xb7\x20\xca\x46\xdf\x39\x62\x64\x40\xde\x20\xb8\xd2\x34\x2a\x03\x87\x3a\x30\x67\x0f\xb6\x03\x78\xbf\x98\xff\xf3\xb2\x05\x51\xdc\x16\x08\xc8\x45\x19\xa1\xba\xe3\x2b\xdc\x6f\x9f\x5f\x2f\x2f\x6f\x7f\x9a\x5e\xb5\xb7\xcf\x50\xf1\x2d\x31\x72\x85\x7e\x83\xa8\x83\xa9\x10\xe1\x1d\x4a\x1b\xb7\x2b\x53\x40\x85\xce\xf1\x02\x1d\x70\x8b\x81\xc3\x1e\x35\xf9\xe5\x7c\x66\x1a\x0f\x3c\x3e\x86\x69\x1c\x38\x1f\xf6\xb5\xc9\xb5\x7b\x09\xbc\x47\xd1\x10\x2b\x42\x04\x96\xe8\x3c\x08\x93\x21\x08\xae\xc1\xa2\xb7\x12\xd7\x6d\x62\xd3\x43\x72\xa9\xd1\xc6\xf7\x23\x52\xc1\x9a\x2b\x99\x71\x8f\x31\xe6\x04\x1c\x83\x8e\x19\xa1\xad\xb0\xe4\x6b\x49\x44\x76\xe0\xf9\x5d\x60\x91\xe2\x02\x53\xc6\x6a\x2e\xee\x88\xaf\xf4\xce\x2d\xa9\x88\x68\x68\x19\x93\x55\x78\xfc\x3e\xeb\x25\x79\xe5\x13\xd6\x4b\x34\x86\xff\x8c\xa3\x7f\x9d\xb7\xc2\xe8\x75\xfb\xa7\xd4\x45\xf8\xd6\xcb\x0a\x13\xc6\x7a\x49\x21\x7d\xd9\xac\x52\x61\xaa\xb1\xab\xf3\xd3\xe7\x63\x61\x56\x96\x27\x6c\xc0\x58\xde\x68\x01\x05\xfa\x4b\xbd\x9e\x6b\xdf\xd7\xbc\x42\x88\x10\x03\x90\xda\xc3\x47\xd6\x73\x30\x39\x07\xe3\xd2\xbf\xa1\x47\xbd\x0e\x5b\x06\xac\xb7\xe6\xaa\xc1\x21\xa0\xb5\xb4\xdc\x3a\x90\x4e\xbd\x91\x7d\x37\x60\x3d\x99\x87\xa5\x27\xe7\xa0\xa5\x22\x94\x5e\x5e\xf9\xf4\xc6\x4a\xed\xf3\x7e\x72\x69\xad\xb1\x50\x73\xeb\xe8\xfe\x4f\x1d\x3c\xfd\x30\x81\xa7\xeb\x7f\xe9\x64\x08\x84\x3f\x04\x17\xa0\x07\xac\xd7\x33\x2e\xbd\xbc\x97\xbe\x7f\x3a\x60\xbd\x4f\xac\x67\xd1\x37\x56\x43\x30\xcf\x3e\x85\xfc\xf4\xfc\x0e\x75\xe4\xb1\x46\x3f\xa6\x9a\x38\x76\x68\xd7\x68\xd3\xc2\x74\x09\x65\x9d\x9f\xae\x8d\xcc\xa8\xea\x5e\x44\x3a\xb9\xf0\x38\xbc\x32\x8d\xf6\x81\x03\xb2\xc2\x40\x67\x85\x58\x03\xcf\x3d\x5a\x10\xca\x04\x1f\x7d\x19\xd8\x49\x6c\x42\x70\x32\x43\x3a\xc0\x43\x5a\x0a\xa3\x35\x0a\xa2\x0b\xac\x30\x37\x16\x0f\x0f\x01\x6a\x2f\x2d\x82\x33\xe2\x0e\x7d\xe0\xd3\xcb\x6d\xb4\x10\x2a\xeb\x06\x41\x6a\x61\x91\xbb\x58\xcd\x44\x49\x0e\xba\x3d\x77\x62\x22\x81\x43\xe2\x69\x63\xe1\xd5\xfc\x9a\x40\x88\x68\xb5\x35\x02\x9d\x43\x07\xd2\x93\xc6\x68\xae\x62\x4a\xb6\x6e\xf8\x12\xb7\xdd\xa6\x58\x1a\x9b\x95\xc3\x0f\x0d\xe1\xdd\x2e\x96\x04\x13\x82\xd6\xb9\xcb\x0f\xaf\x12\x84\xe9\x4e\x9b\x8d\x86\x46\x5b\xe4\x59\x80\x8e\x09\x41\xcc\xbf\x5d\x2c\xc9\xa9\xca\x51\x66\x19\x21\x1a\x0b\x95\x71\x5e\x6d\xa9\xec\xbf\x5c\x5c\x80\xdb\x3a\x8f\x95\x4b\xa1\x3f\xd5\x19\xbc\x93\x3a\x33\x1b\xf7\xd7\xc1\x0e\x80\xa2\x4d\xe9\x28\x1d\x38\x53\xe1\x86\x2e\xcc\xed\x4a\x7a\x4b\x55\xb6\xff\x1f\xc5\x3d\x6a\xb1\x05\x6e\x4d\x43\x75\xa5\x44\x4a\x14\x8d\x7e\x90\x32\x61\xb4\xf3\x0f\x3c\xe9\x39\x7c\x77\x72\x02\xcf\x02\x76\xfa\xa3\x54\x4a\x3a\x14\x46\x67\x81\x26\xb3\x2a\xbb\x31\xd6\xbf\x8a\x99\xb5\x0c\x99\x45\xd6\x1b\xd7\x8a\x61\xa1\x4b\xe3\x3c\xcc\x28\x39\x52\xb6\xe6\xf6\xe1\x23\xe7\xf0\x7f\x21\x7f\xd2\x99\xa9\x2a\xae\xb3\x8f\xac\xf7\xd6\xe1\x04\x00\x12\x4a\xd2\x51\x9b\xba\xa3\x98\xbb\xc9\x90\xf5\x16\xa5\xb1\x7e\x02\xc9\xcc\x22\xa7\x6e\x23\xf2\x26\x52\x34\xbe\x34\xd5\x33\xf7\x59\x65\xa5\x93\x57\x46\x17\x13\xf8\xed\x2a\x54\x79\x17\xaa\xfe\x31\xe5\x5c\x50\x59\x28\xe4\x1a\x35\xf0\x2c\x0b\x32\x19\xc8\x61\xac\x1f\x82\xa9\x69\x13\x57\x8a\xca\x36\x8a\xbb\xc8\x83\x40\x92\xb6\xfe\x67\x43\x46\xdb\xa3\x03\x81\x01\xb9\x2c\x1a\x1b\x7a\x02\xdd\x54\x2b\xb4\xbb\x4a\x1f\xdd\x1b\x46\x6a\x7c\xb6\x55\x6a\x8f\x76\xcd\xd5\xae\x42\xc7\xcd\x29\x63\xcb\x48\x3c\x11\x83\x15\x03\xde\x25\xc7\x1f\x48\xe5\x84\xb1\x51\x54\xc2\xe9\xc5\xc5\xed\xe5\x62\x01\xfd\xee\x42\x83\x49\xd0\xda\xee\xc6\x44\xd8\x52\x8a\x12\xa4\x87\x8d\x54\x8a\x2a\xbb\xf5\xad\x3a\x12\xfe\x43\x91\xeb\x67\x98\xf3\x46\xf9\x58\x4c\x26\xa0\x8c\xe0\x8a\x28\x30\xe8\xcc\x92\x00\x47\x43\xa1\xfc\xfe\x2f\x56\x52\x36\x7a\x58\x98\x0f\xaf\x32\xcf\xc1\xa1\x1f\xee\x70\xc3\x5b\xed\x6b\x00\xb5\x6c\x24\x42\xf1\x91\x42\x26\x53\x9d\xc6\x7b\x2e\x7c\x9b\x96\xa3\x56\xa8\x27\xf0\xfa\x11\x9d\xf6\xa6\xad\x5e\x52\xb7\xa0\xae\x36\xa1\xcd\x19\x1d\x68\x74\xbc\x6d\x27\x58\xe0\xe4\xbf\x43\xa5\x0b\x3a\xdb\x49\x69\x54\xed\x16\x37\x25\xe7\xa5\x87\xcc\xa0\x0b\x4d\x6f\xc5\xbd\x88\x2d\x2d\x17\xbe\xe1\x6a\x87\x41\x5f\x75\x10\x74\x72\x7f\x5d\xbc\x0f\x7f\xb5\x9d\x70\xf8\x14\xf4\xf6\xdb\xbd\x6f\x5d\x43\xd0\x3e\xfb\x71\xcd\xa6\xab\x71\xe9\x0f\x1b\x84\x96\x7e\xbf\x0d\x59\x6f\x6a\x0b\x37\x81\x98\xb2\x3f\xf2\x7b\x59\x35\xd5\x35\x7d\xd7\x3f\x19\x0c\x59\xef\xb6\xd1\x13\x80\x8a\x4b\x3d\x24\x39\x09\x7a\x48\x9f\xfa\xa2\xca\xe0\xd9\x51\xa2\x0f\x81\xdb\xc2\xc1\x2f\xbf\x76\x02\xf9\x91\xf5\x56\x52\x67\xd3\x96\x84\x47\x32\x99\x1c\xf2\x36\x89\x8a\x78\xb8\xf9\xfc\x1c\x92\x24\x08\xe3\xd1\xb7\x90\xec\x58\x98\x04\xbd\xa3\x55\xaa\x41\x0f\xa1\x13\x3d\x09\x9a\xb2\x60\x27\xc5\x1a\x7d\x7a\x8b\xce\xa8\x35\x2e\x67\x37\x04\xdc\x4f\xbc\xa8\x49\x59\xd1\xa7\x7f\x37\x52\xbf\x36\xce\x13\x64\xff\xc0\xf2\x10\x3a\x43\x83\xaf\x54\x6f\x1b\x6c\x48\xaa\x4f\xad\x72\x3f\x2c\xd8\x5d\x87\x7a\xe4\x60\x2c\x68\xcb\xd9\x4d\xe7\x1b\x5d\xe1\x2b\x0d\xef\xd2\xed\xf7\x0d\xb3\x1e\x65\xe1\xce\x6a\xe7\x46\x3a\x15\x34\x86\x91\xe9\xaf\xb4\xc7\xc3\x01\x4a\xef\x7d\x5a\xff\x91\xe9\x1d\x8a\xd2\xfd\x24\x5a\xc4\xac\xd3\xf2\x3d\x4c\x32\x60\xac\xd7\x25\xdb\x2c\xac\x5e\x50\xae\x1e\xbf\xf5\x43\xe5\xa3\x65\x94\x42\xdd\xff\xf2\xfc\x00\xfe\x02\x27\x91\x5b\x4d\x4e\x60\x15\xbf\xc3\xfe\x2f\xbf\xae\xb6\x1e\x87\x8f\x9d\xa1\x6b\x90\xce\xef\x22\x46\x6e\xa6\xb7\xc8\xb3\xfe\xaa\xc9\x69\x55\xe6\x10\x1a\x81\x27\xe7\x8f\xda\x25\x9b\xc7\x21\xec\x2a\x49\x98\x38\x78\x06\x4f\x49\x6b\x49\x04\xdb\xd6\x83\xce\x0e\x61\xd5\x78\x28\x8c\xa7\x55\xa9\x9d\x47\x9e\xa5\xe4\xc6\x79\x1b\xe5\x47\xcc\x0d\x61\xe7\x30\xf9\xb7\x7b\x85\x33\xfa\xf4\x29\x7a\xfc\x40\x74\x9f\x9c\xb7\x2d\x6e\xb8\xd8\x63\x3e\xef\x3d\xfe\x70\xe0\xdf\x87\x23\xbf\xbe\x04\x1f\x1e\x42\x7f\xe9\xd9\xf3\x43\xcf\x8e\x89\x77\xe4\x02\x85\x9d\x36\x7c\xce\xb3\x4f\x87\x0c\x25\x6e\xdd\xb6\x2a\xbe\x2f\xd9\x2d\xc9\x42\x07\xd1\x25\x42\x54\x82\xc9\xf9\x41\xa7\x9f\x44\xbd\xa0\x2d\x61\x79\x41\x55\xfa\x81\x1d\x41\x15\x76\xbb\xe6\x9d\xcc\x3f\xb4\xb3\xab\xd1\x81\xd5\x31\x0c\x1d\x9b\xdb\xa9\x24\xbd\xc5\x1a\xb9\xef\x27\xf7\xc9\x10\x76\x66\x07\xac\x97\xb5\xfb\x22\x47\xfb\xfb\xc3\x04\x45\xaa\x2a\x69\xf5\xe4\x05\x48\xf8\x73\x5b\xdb\x5f\x80\xfc\xe6\x9b\x10\xb9\x56\x54\x8e\x89\xfb\x8e\xb4\xae\x9f\x05\x88\x10\xee\x4e\x7a\x9e\x9c\xef\x2d\xff\x3e\x5f\xa3\x5c\x3e\x4e\xd8\x8d\x35\x71\xfd\x21\xca\xee\x6c\x0c\xe1\xd0\xbf\x23\x36\x7c\xfb\x95\x6c\x08\x77\x79\x8c\x0e\x32\x07\xf9\xcd\xe9\x2e\x2c\xf1\x74\x68\x80\x17\x34\x65\xf4\xc3\x9f\x17\x8d\x0d\x3f\x73\xf4\x8f\x5e\x71\xf0\x40\xab\xdc\xc2\x7e\x51\xc4\x16\x65\xe3\x43\x11\xcc\x68\x24\xf8\xac\x84\x8d\xc7\xd4\xbf\x80\x92\xba\xa0\x8e\xb6\xed\xec\xbd\x81\x5c\x35\xae\x84\x55\x93\xe7\x68\x5d\x1a\x1b\xff\x76\xee\x32\x79\x2e\x85\xe4\x0a\x36\x7c\x4b\x35\xd6\x84\x9f\x50\xba\xdf\x0f\x0a\x03\xbc\x96\x90\x19\xe1\x52\x78\xd9\xf8\x60\xc3\x97\x68\x31\x4c\xf5\xf1\x07\x94\x35\x5a\x47\x08\x99\x74\xa2\x69\x7f\xd6\xd9\x94\x18\x7e\x32\x0a\xe3\x79\x68\xec\xa0\xe4\xd4\x12\x6f\x41\x56\x35\x35\x4c\x46\x87\x49\x85\xa6\x09\x1a\xb3\x2b\x17\xb0\xfb\xc2\x54\x35\x41\xd3\xf8\xe8\x26\xe3\x31\x75\x20\x16\xd7\x12\x37\x29\xaf\x6b\x57\x1b\x1f\x06\xe8\xef\xbf\x7b\x7e\x76\x72\xf2\xed\xf3\x41\x1a\x05\x26\x5d\xa0\xbf\x0a\xf7\xee\x8f\x4e\xdb\x58\xbc\x0a\xb7\x0e\xd3\xdb\x7e\xa0\x12\x0a\xb9\x56\xdb\xe1\x41\xd3\xdb\x99\x5a\x29\x53\xa4\x3a\xf8\xad\xf8\xca\xa5\x5a\x8d\xb9\xf5\x52\x28\x74\xe3\xb3\x93\x93\xef\xc7\x27\xa7\xe3\xd3\x3f\x8d\x7d\x89\xa3\x46\x79\x59\x71\x8f\x23\x67\xde\xc7\x70\x8f\x6a\x5e\xe0\xc8\xd8\xd1\xa6\xdc\x8e\xa4\x1b\x55\xdb\x91\x17\xf5\x48\x1b\x3f\xb2\xa8\x42\x23\x3d\x09\x5e\x9d\xa6\x61\xd2\xc3\x96\xd7\x25\x57\x39\x75\x50\x87\x33\x5f\x68\x6e\xbb\x51\xe0\xd5\xfc\x1a\x6a\x4e\x63\x6b\x38\x7e\x96\x86\x29\x63\x37\x90\x1a\x6a\xbc\xda\xee\xab\xfb\x2d\x89\xae\x4c\x03\x2a\xed\x7f\xde\x99\x8b\x71\xa8\x6a\x85\xfe\x30\x20\x6d\xf8\x66\xb4\x27\x26\xeb\x80\x1d\xf2\xf6\x8b\xe9\x6e\x70\x78\xa2\x3f\xf8\x9c\xa0\x17\x46\x63\x32\x60\x9f\xd8\x7f\x03\x00\x00\xff\xff\xaa\xaf\xdd\xd7\xed\x15\x00\x00") + +func testImagesAgnhostPortForwardTesterPortforwardtesterGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostPortForwardTesterPortforwardtesterGo, + "test/images/agnhost/port-forward-tester/portforwardtester.go", + ) +} + +func testImagesAgnhostPortForwardTesterPortforwardtesterGo() (*asset, error) { + bytes, err := testImagesAgnhostPortForwardTesterPortforwardtesterGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/port-forward-tester/portforwardtester.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostPorterLocalhostCrt = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x94\x4b\xaf\xba\x48\x1b\xc4\xf7\x7c\x8a\x77\x6f\xde\x78\x01\x01\x17\xb3\x78\x9a\x6e\x6e\xd2\x4a\x23\x08\xb2\xa3\x3d\x02\xc2\x01\x14\x90\x56\x3e\xfd\xe4\x7f\x26\x99\x4c\xe6\x52\xcb\xa7\x92\x7a\x16\xf5\x4b\xfd\xff\x97\x10\xb1\x9c\xc3\xff\x0c\x12\x84\x8e\xe9\x18\x10\x92\x9f\xab\x44\x1d\x07\x5b\xa1\x61\x40\x61\x15\x20\x1c\x04\x85\x13\xc0\x11\xe0\xb5\xd9\xbe\xf1\xf0\xc9\xca\x43\x8a\x4e\xc9\x10\xc5\xe5\x20\x30\xbb\xb8\xfb\x2e\x75\xca\xe9\x7a\x00\x46\x3c\xc4\x40\x48\xa4\x22\x8c\x82\x62\xc1\x3a\x22\x46\x49\x6d\x16\x1f\xc6\xf4\x84\x30\x9f\xa1\x30\xc5\x4a\xa6\x18\xde\x14\x13\x41\x31\x08\x8a\x51\x66\x81\xfe\xa1\xb8\x58\x51\x4c\x3e\xc7\x90\x6c\xa4\x1f\xc3\xec\xc4\x7f\x07\x19\x06\x9c\x9c\xbf\x7f\x47\x88\x01\x2e\x0a\xe2\x4b\x80\x0d\x03\x58\x67\x14\x05\x41\xe0\xca\xbc\x6b\xf4\xd8\xb6\xcc\xd0\xe2\x64\xb8\x6d\x6a\x95\x97\xc0\xde\x55\xfb\x76\xa7\xef\x95\xbc\xc0\x6d\xd1\xb7\x3d\x0f\xa3\xe4\xa5\xce\x62\x5d\x2f\xb9\xd4\xd6\xeb\x75\x6a\xe7\x4e\xea\x3f\x5a\xab\xfb\x9c\x48\x7c\xf1\x9e\x36\xba\x07\x77\x3a\x59\x22\x28\x2c\x78\xc9\x56\x3f\xe6\x72\x93\xdf\x9c\xb6\x1a\xd6\xd9\x2d\x31\x6f\x8f\x2c\xb9\x6a\xfb\xa0\x51\xb8\x34\x2f\x73\x21\x03\x12\x93\xcb\x76\xbd\x2b\x76\x8b\x84\xeb\x73\xfa\x44\xd1\xa3\xf3\xd2\xb9\xaa\x22\x1c\xd6\x9b\xcd\xe3\x00\xa7\x5d\x42\xab\xe0\x74\x8c\x46\x6f\xf6\xc9\xc5\xde\xe6\x9e\xba\x26\x93\xe4\x6a\x26\xd6\x46\x71\x6f\xb3\x88\xa7\x10\xb1\xa9\x58\xb7\x83\x47\xbc\x51\xd7\xc6\x05\xef\x76\xaa\xf2\x50\x1f\x8b\x59\xd3\x0a\x35\x44\x99\xea\xfb\xb7\xf9\xdc\x7e\xcd\x4d\x20\x9b\xab\xb3\x6f\x9f\xa5\xc0\xf3\x8f\x5f\xbb\xe2\x29\x78\x67\x5e\xcb\xb2\x93\x67\x55\x4f\x0f\x5c\xe9\xdb\x7d\xb1\xce\x3f\xfc\x95\x1d\xfd\xa4\x11\x68\x8f\x83\x3a\x63\x14\xe6\xef\x16\x9f\x6f\x1b\x45\xed\xdf\xea\x51\x15\x85\xc4\xdd\xfd\xf4\xce\x92\xe9\x7e\xab\xae\x7b\xea\xbf\xd2\x15\xc1\xd5\x7b\xee\x62\xbb\x6a\x4b\xb5\xeb\xee\xc7\xc8\x00\x41\x00\xb2\x43\x47\xad\x8b\xc0\xc5\x05\x9f\x83\x95\x0f\xcc\x5e\x22\x60\x58\x82\x62\x5f\x53\x44\x7f\xd5\xf7\xe5\x32\x46\x29\x74\x96\x61\x0c\x16\xb0\xc8\x44\x82\x22\x0a\xfa\x8f\x47\x04\x41\x4b\xc1\x4c\x0a\x14\x41\xae\x0b\xef\x8f\xa0\x40\x42\xc6\x55\xb8\x17\xc7\x4b\x93\xb2\xe4\x09\x1a\xd2\xd3\xb6\xe2\x9b\x8d\x8d\x6c\x1d\x00\x2c\x9b\xc0\xbf\x89\xfc\xc9\x85\xf4\x17\x2c\xf1\x0f\x0b\x56\x22\xda\xe5\x34\x31\x58\xd9\x98\xc7\x7a\xdc\x86\x10\x3f\xa6\x19\xf2\xec\xa8\x56\xaa\x80\x01\x0b\x75\xa0\xe3\x95\xe1\x6e\xfa\xbc\x6a\x89\xc9\xa6\x51\xa7\x2e\x62\x7a\xb6\x6e\x8c\x6f\x64\x25\xd3\x2d\xce\x70\x2f\xf3\x48\x97\x65\xe7\xcc\x1c\x14\x4e\x83\xd7\x78\x0d\xdb\x8d\x9b\x4b\xdf\x8f\x9c\xc4\x9f\xbc\x18\xe6\xa7\xb5\x57\x0c\x4d\xaa\x1d\xfe\x89\x92\x9b\x46\xcc\xbb\x1b\xfb\x1a\xac\xe2\xa7\xb8\xdb\xe3\x91\xf2\x5a\xaf\x74\x45\x5f\x1a\xcd\x7d\xef\x28\x78\xfb\x58\x5c\x8a\xe4\x5c\xbc\x7a\x7f\xed\xb0\xed\xa8\xed\xd8\x32\xc5\x1f\x2c\x11\x77\x5c\xd8\xa3\x3b\xf5\x46\xb7\x4b\xed\xec\xda\x18\xba\xba\xbd\x75\x6e\x6a\xa9\x83\xb5\x89\xbe\x55\xc5\x71\xc6\xe0\x82\x53\xde\x6f\xb7\xd1\xfe\x7c\x77\xf5\x5e\x5f\x33\x55\x6b\x0f\xc6\xb4\xd4\xb1\x94\x2b\xcb\xfd\x26\x5f\x34\x77\xff\x9c\x85\xd4\x83\xef\x6f\x75\x36\x42\x4d\x77\x16\xf2\xfd\xe4\xfb\x47\xf9\x63\x34\xde\x72\x13\x7d\x3d\x94\x6c\xbd\x72\x9f\x7d\x3e\x2d\x4a\x9e\xeb\xa3\x82\xa3\xeb\xf3\x7b\x96\x94\xc4\xec\x23\x7b\x78\x04\x38\xbd\x5a\x89\xe9\x78\x2d\x0c\x87\xe3\x23\xdf\x6b\x51\x13\x45\x2b\x51\x73\xb3\x28\x6b\xe7\x37\xe9\x67\x3e\xc8\x01\xff\x73\x52\x7e\x0f\x00\x00\xff\xff\x75\xaa\xd9\x75\x6f\x04\x00\x00") + +func testImagesAgnhostPorterLocalhostCrtBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostPorterLocalhostCrt, + "test/images/agnhost/porter/localhost.crt", + ) +} + +func testImagesAgnhostPorterLocalhostCrt() (*asset, error) { + bytes, err := testImagesAgnhostPorterLocalhostCrtBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/porter/localhost.crt", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostPorterLocalhostKey = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\xd5\xa7\x12\xa4\x00\x02\x04\x50\xcf\x57\xac\xa7\xae\xc8\x49\x9c\x20\xc3\x90\x33\x8c\x23\x0f\x39\xc7\xaf\xbf\xda\xd5\xd7\xb6\x4d\x8b\xae\x7a\xff\xf9\x1b\x4e\x94\x55\xf3\x8f\xeb\xb1\x7f\x6c\x57\x0d\x59\x5f\xfc\xa3\x89\xc9\xbf\x06\x30\x54\x55\x9c\x6a\x95\x63\x59\x8d\x67\x1d\x91\x1d\x8b\xa3\xc9\xee\x24\x4f\x42\xe3\xbb\x79\x37\x95\xfa\xf3\x21\x72\x82\x6c\x55\xe2\x00\xc6\x7e\x85\x5b\x25\x7f\x94\xfb\x6e\xba\x25\xb5\xda\x42\x04\xf8\xcc\x51\xfa\x71\xd8\x15\xf4\xaf\x03\x87\x3c\x6d\x3f\xaa\xfb\xad\x8f\x29\x97\x3f\xb2\xfa\xd0\x19\x27\xb3\x09\x4f\xe5\xe9\x81\x40\xe5\x97\xc1\x9b\xd2\x7a\xc3\x99\xc8\x43\xb2\x9f\x8b\x77\x9b\x65\x20\xfb\x9d\x36\x03\x09\x39\xab\xf0\x74\x2f\xa0\xdb\x28\x60\x44\x71\xbe\xe6\x30\x49\xde\x50\xef\xa3\x65\x99\x8e\x69\xf9\x59\xda\xc1\x9c\x8e\xe4\x8f\x29\xa9\x84\x07\x9f\x06\xed\xd6\x55\x4f\x9f\x2b\x10\x78\xf4\xb8\x05\xf6\x81\xf1\x5a\x31\xbb\x7b\xc7\xb9\x3c\x28\x44\xe5\xb5\x39\x07\xf6\x1e\x18\x71\xb4\xd8\xda\x8c\xcb\x48\xd9\xe7\x21\xcc\x86\xb4\x4e\x34\x43\x99\x51\x81\x59\x5f\x25\x8f\xdd\x00\xa0\x8b\x50\xdc\x68\x02\x43\xf9\x95\x3b\xea\xf0\x91\xe5\xb6\xb2\xd7\xbb\x43\xce\xe6\xc8\x17\x21\x84\x3e\x07\x31\xe1\x4c\x99\xb1\xe2\x64\xca\xee\xcc\x5e\x82\x15\xe5\x66\x48\x65\xed\x72\x2a\x13\x05\xac\x3c\xb7\x75\x0b\x24\xcd\x25\xf8\x21\xcd\x6b\xba\x40\x62\x74\x1c\xcb\x56\xac\x5f\x52\x5a\xa5\xb2\x34\x8d\x4a\x38\xaa\xc0\x3a\x2c\xc7\x4e\x2a\xc7\xca\xc8\xe5\x0e\x91\xef\x90\xc7\xdc\xb2\x85\x0e\xa0\x43\xfe\xb4\x55\x7f\x86\x24\x86\x10\xe6\x6c\xbd\xa4\xc9\x55\xe1\x5b\x9c\xb9\x74\x69\xd9\x10\xe0\x1d\x63\x10\xe4\x81\xec\xcd\xaf\xa6\xd7\xe6\xc1\x05\xd5\x0b\x1b\xcb\xa7\xb1\xe3\x28\xea\xd2\x01\xf2\x0c\xb4\x9f\xf7\xcc\xa0\xb9\x1f\xf6\x81\x42\x85\x79\x2a\x6c\xf4\xab\xf4\x71\x46\x8e\xc1\x7d\x90\xb1\x61\xad\x77\xb3\x74\xfc\x7e\x43\xee\x96\x5f\x3b\xfc\x0a\x35\xed\x11\xd3\x81\xca\x53\x17\x03\xb1\x21\x3b\xe7\x6f\x2f\x9a\xee\xfe\x71\x0a\xa7\x0e\x92\xf6\x2e\xc3\xba\x69\xaf\xc2\x58\xd8\x94\xf6\x73\xcc\x2b\xbe\xaa\x14\x68\x2a\x18\xdd\xb0\x1a\x59\xd1\x7a\xa0\xe7\xd9\x5c\x4f\x3e\xed\xf4\x02\x4c\x9a\x8d\xe9\xbb\x5b\x78\x06\x77\x14\x19\x8c\x10\x89\xd3\x2f\x42\x7d\x19\x17\xb4\xce\x25\x38\x23\x9d\xbf\x79\x9d\x8e\xb9\x4a\x2e\x88\x4e\x54\x3d\x2c\xd6\x39\xd4\xec\xd5\x5d\x9b\x37\xc3\xbe\x00\xce\xcf\x92\x19\x27\xcc\xd4\x6e\x1c\xab\xaf\x73\xb3\x2c\xf5\xef\x6d\xa7\xbb\xf7\xa5\xa3\x80\x83\x50\xba\x38\xa3\xb7\x90\x73\x74\x84\x9e\xec\x2b\x7d\x7b\xed\x96\x61\xf5\x1c\x5a\xee\x52\x19\x2a\x05\xce\xce\xf0\x7a\x3a\xe0\xeb\x44\x64\xe1\xc8\x94\x7e\x4c\x3b\xbf\xd8\xa8\x8d\x75\xb6\x5a\xca\x8d\x9d\x0f\xa9\x74\x2a\xd5\x4e\xfb\x86\x75\x11\xad\xe7\x43\x8f\x1c\xae\x3a\x5a\x96\x4c\x8e\xe5\xda\x03\x03\xec\x79\x36\xb4\x73\x03\x7e\x1a\x1a\xdc\xbf\x57\x2f\x54\xa9\x6f\xdb\x64\xb0\x9c\xca\xc8\xe1\x9a\xca\x14\x35\xf6\xf7\x45\xfe\xd6\xdd\x3c\x62\xac\x83\x08\x7d\xe3\x6d\x0e\x14\x53\xea\xf9\x14\xf0\x89\xe0\x5b\xc7\x57\x41\x6a\xc1\x09\x67\x39\xc8\x60\x9a\xca\x26\x90\xd3\xac\x4d\x32\x88\xb0\x50\x6a\xe4\x19\x80\x89\xc0\xd5\x2c\x3e\x2f\xf9\x73\x3d\xd3\xae\xe1\xdb\xbf\xc5\x97\x0d\x42\x80\xc5\xa5\xed\x62\x7e\x96\x6d\x6e\xb4\x89\x0c\xce\x52\xe3\x95\x09\x06\x75\x12\x5c\x57\xa7\x11\xb1\x8b\xd5\x14\x8c\x52\x19\x18\x31\x25\x47\xe7\x5e\x8d\xdb\x63\x99\x03\x85\x5f\xb1\x2e\xce\x91\xfc\x80\x10\x14\xaa\x26\xee\xf6\xae\xc2\xaa\xc5\x7b\xf1\x5e\x23\xca\x69\x50\xd7\x0b\x6c\x6f\x3b\xac\x6a\x55\x50\x5a\x3b\xf0\x3e\xd3\x93\xd2\xdb\x6d\x07\x27\x21\x12\xe1\x41\x15\x27\x29\xe6\xcd\x28\x22\x40\xb5\x6d\x86\x2c\xbc\x1b\xde\xe7\x21\x2a\xfb\x58\x36\xd6\x84\xcf\x64\xb5\x86\xac\x6d\x8e\x30\x48\xc3\x5b\x67\x0a\xd3\x7c\x9d\x70\x0f\x23\xf5\x19\x83\x93\xd2\x9d\x1c\xed\x3a\xf3\x34\xd3\x36\x31\x00\x47\x95\xf0\x44\x54\xa2\xfc\xa6\x11\xfe\x6d\xcb\xe1\x9a\x41\x4d\x53\xf9\x49\x09\xec\xf1\x93\x8c\xd4\x85\x5d\x14\x31\xf7\xf1\xf7\x65\xec\x70\xa2\x2d\x51\x3d\x73\x92\x0c\x87\x22\xe7\xbb\xc7\xeb\x80\x13\x12\x74\x69\x64\xe6\xb0\xf3\xa9\xe6\xe3\x3d\x8e\x02\x1d\xa4\x7e\x43\x42\x01\x47\xd5\xab\xe0\xfb\x9d\x49\x0b\xb8\xd8\xcb\x25\xb8\xc8\xcf\xb7\x57\x2f\x8c\xa4\x66\xc9\xce\xd6\x9b\x1a\x9d\xa1\x80\x4f\x7d\x0b\x3b\x5a\x12\x3f\x12\xf5\x72\x47\xe0\x2a\x67\x56\x4a\x47\xe3\x6a\xe5\x3b\xe5\x45\x3b\x36\x87\x88\xef\x08\x42\x45\xae\xb5\x17\xc6\x87\xb1\xd6\x79\x74\x50\x71\xc9\xe8\xd3\xdb\x63\x59\x05\x64\xc8\xf3\xc2\xf1\xaa\x9f\xe9\x42\xf6\x58\x0c\x11\xa7\x1f\x5f\x61\x10\xbe\xc5\x57\x2a\x27\x06\x42\xc8\xf0\x72\xee\xa0\x3c\xad\x11\xb4\x03\x97\x64\x46\xef\x43\x0c\x10\xb5\x4c\x89\x6a\x80\x83\x01\x6c\x25\x1e\x50\xf3\x43\x86\xe8\x2e\x53\x28\x94\x0c\x51\x68\xfc\x08\x28\xd5\xf4\x46\x89\xa5\x05\x94\x25\x54\xae\x71\xfa\x0b\xad\x70\xb0\xdb\x03\xb7\x78\x55\x33\x3a\x31\x9d\x79\xa0\xde\x25\x9c\x08\x10\xea\xfa\x63\x27\x99\xb5\xaa\x71\x64\x2d\xb6\xf5\x16\xcd\xff\x4a\x84\x4e\xf1\x9f\x8f\xc2\x25\xc9\x74\xed\x79\x51\x6b\x05\x57\x89\x7a\x64\x83\x65\xe4\xd6\xb1\x1d\x79\xd4\x16\x1d\xac\x48\x52\x30\xe0\xf9\x42\xb5\xc2\xda\x3d\x76\xab\x61\xc9\x27\xec\xd9\xb3\x49\x2d\xe1\x8f\x79\xed\x55\xda\xab\xf8\xd5\xbb\x96\xa4\x6a\xea\x29\xee\x40\x35\x09\x22\xaf\x85\xc9\x96\xf4\x99\x0f\xdd\x98\xa6\x94\x00\x18\xb3\xf0\xca\xb3\x3b\x6c\x4b\x6e\x71\x10\xfe\x31\x31\x94\x49\x0b\x53\x45\xf4\x6d\xb4\x97\x87\x60\xf4\x97\xbb\x05\x03\xfa\x44\x29\x4e\xb1\x64\x42\x85\xf9\x7f\x81\x7f\xa4\x88\xa6\xf0\xff\xa9\xf9\x5f\x00\x00\x00\xff\xff\x45\x85\x28\xa6\x8b\x06\x00\x00") + +func testImagesAgnhostPorterLocalhostKeyBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostPorterLocalhostKey, + "test/images/agnhost/porter/localhost.key", + ) +} + +func testImagesAgnhostPorterLocalhostKey() (*asset, error) { + bytes, err := testImagesAgnhostPorterLocalhostKeyBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/porter/localhost.key", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostPorterPorterGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x57\x51\x73\xdb\x36\x12\x7e\x26\x7e\xc5\x1e\x67\x9a\xa3\x5c\x9a\x92\xdd\xeb\xdc\x55\x1d\x3d\xa8\xaa\x7c\x71\xe3\xc8\x1e\x53\x49\x9a\xc9\x78\x5c\x88\x5c\x51\x88\x29\x80\x01\x40\x29\x9a\x8c\xfe\xfb\xcd\x02\x14\x25\xc5\xea\xb5\x7d\xbd\xb9\x17\x5b\x04\x17\xdf\x7e\xbb\xd8\xfd\x16\xec\x9e\xb1\x91\xaa\x36\x5a\x14\x0b\x0b\x97\xbd\x8b\xef\x61\xba\x40\x78\x55\xcf\x50\x4b\xb4\x68\x60\x58\xdb\x85\xd2\x26\x61\xec\x46\x64\x28\x0d\xe6\x50\xcb\x1c\x35\xd8\x05\xc2\xb0\xe2\xd9\x02\xa1\x79\x13\xc3\x5b\xd4\x46\x28\x09\x97\x49\x0f\x22\x32\x08\x9b\x57\x61\xe7\x47\xb6\x51\x35\x2c\xf9\x06\xa4\xb2\x50\x1b\x04\xbb\x10\x06\xe6\xa2\x44\xc0\xcf\x19\x56\x16\x84\x84\x4c\x2d\xab\x52\x70\x99\x21\xac\x85\x5d\x38\x27\x0d\x44\xc2\xde\x37\x00\x6a\x66\xb9\x90\xc0\x21\x53\xd5\x06\xd4\xfc\xd0\x0a\xb8\x65\x0c\x00\x60\x61\x6d\xd5\xef\x76\xd7\xeb\x75\xc2\x1d\xcb\x44\xe9\xa2\x5b\x7a\x2b\xd3\xbd\xb9\x1e\x8d\x27\xe9\xf8\xfc\x32\xe9\x31\xf6\x46\x96\x68\x0c\x68\xfc\x54\x0b\x8d\x39\xcc\x36\xc0\xab\xaa\x14\x19\x9f\x95\x08\x25\x5f\x83\xd2\xc0\x0b\x8d\x98\x83\x55\xc4\x73\xad\x85\x15\xb2\x88\xc1\xa8\xb9\x5d\x73\x8d\x2c\x17\xc6\x6a\x31\xab\xed\x51\x82\x76\xac\x84\x81\x43\x03\x25\x81\x4b\x08\x87\x29\x5c\xa7\x21\xfc\x34\x4c\xaf\xd3\x98\xbd\xbb\x9e\xbe\xbc\x7d\x33\x85\x77\xc3\xfb\xfb\xe1\x64\x7a\x3d\x4e\xe1\xf6\x1e\x46\xb7\x93\x9f\xaf\xa7\xd7\xb7\x93\x14\x6e\xaf\x60\x38\x79\x0f\xaf\xae\x27\x3f\xc7\x80\xc2\x2e\x50\x03\x7e\xae\x34\x71\x57\x1a\x04\xa5\x0e\xf3\x84\xa5\x88\x47\xce\xe7\xca\x93\x31\x15\x66\x62\x2e\x32\x28\xb9\x2c\x6a\x5e\x20\x14\x6a\x85\x5a\x0a\x59\x40\x85\x7a\x29\x0c\x1d\x9e\x01\x2e\x73\x56\x8a\xa5\xb0\xdc\xba\xe7\x67\xe1\x24\xec\xac\xcb\x58\xb7\x0b\x43\xb0\x42\x6e\x60\x26\x24\xd7\x1b\xef\x07\x8d\x75\x78\x4a\x5b\x93\xb0\x6e\x97\xcc\xee\x91\xe7\x06\x50\xae\x60\xc5\xb5\xf9\xd1\x19\xe2\x0a\xf5\x86\x9e\x77\x07\x38\x57\x7a\x09\xe9\xf8\xfe\xed\xf8\xf1\xee\xf6\x7e\xfa\xf8\x6b\x0c\xeb\x05\x6a\x84\x5f\x29\x7b\x1c\x56\xbc\x14\x39\xa1\x11\x34\xc8\x7a\x39\x43\x1d\xbb\x07\xd4\x60\x2c\xd7\x96\x98\xc3\xcb\xe9\xf4\x0e\x0c\xea\x15\x6a\x58\x2f\x44\xb6\xf0\x0f\xc6\xf9\x68\x28\xfc\xdd\x10\x5a\x8d\x84\x26\x24\x68\x34\x95\xa2\x44\x59\x05\x5c\x6e\xe0\x53\x8d\x7a\x93\x30\x56\xf1\xec\x89\xb2\xe4\x7d\x30\x26\x96\xce\x75\xc4\x82\x10\x65\xa6\x72\x21\x8b\xee\x47\xa3\x64\xc8\x82\x70\xbe\xb4\xf4\xaf\x54\x05\xfd\x93\x68\xbb\x54\x80\xf4\x5b\x19\xfa\x4b\x67\x2f\x0b\x13\x32\x16\x84\x85\xb0\x8b\x7a\x96\x64\x6a\xd9\x15\x66\x21\x72\xbe\xe6\x96\xeb\xba\x6b\x32\xbf\xe3\xe0\xbd\xa9\xe6\x17\xdf\x75\x33\x35\xd3\x3c\x64\x1d\xc6\x32\x25\x8d\x05\x9b\x55\x77\x1a\xe7\xe2\x33\x0c\x20\x3c\x48\x59\xd8\xbc\x27\xa0\xaf\x0d\xd2\xd1\xf4\xee\xd8\xca\x96\xe6\x6b\xa3\xe9\x4d\xba\xb3\xa1\xdc\x8c\x96\xf9\x9d\xcf\xaf\x30\xd4\xb2\xbe\x33\x0a\xb9\x50\xc6\xc2\x88\x48\x25\x8c\x4e\x70\x6f\x37\x80\x17\x8e\x6c\x32\x52\xcb\x25\x97\xf9\x17\x16\xbc\x31\xd8\x07\x80\xd0\x67\x31\x8c\x59\x90\x2e\x94\xb6\x7d\x08\x53\x7f\x30\xd4\x76\x68\xa8\x2d\x72\x6e\x39\xf5\x86\x2b\x9e\x5d\xb9\x62\x4e\x67\x34\x9e\xbc\xa5\x93\x13\xd4\x91\x86\x40\x6e\x94\x2c\xfa\xf0\xdb\x5f\xc1\x40\xb9\x12\x5a\xc9\x25\x4a\xbb\xc7\x3a\x51\x7e\x5f\x28\x05\xf1\x2e\x17\x71\x9b\xb9\xed\xe3\x87\xc9\x64\x32\x79\x48\x80\x05\x0c\x8b\x3e\x3b\x3b\xac\xd7\x1f\x7a\xbd\x0b\x38\xf7\xd5\x06\xd3\xd1\x1d\x64\x4a\x4a\xcc\x7c\x0b\x35\x84\x80\x8c\xda\x6d\x6d\xb6\x7f\xe8\xf5\x2e\xf7\x5b\x6f\xd2\x73\x94\x99\xde\x54\x14\xce\x7f\x01\xba\x6c\x81\xf6\x67\xfb\x43\xaf\xf7\x5d\x8b\x44\xcb\xbf\xb7\xf9\x3b\xc6\x48\xe8\x85\xcc\xca\x3a\xc7\x1c\xc2\x52\x65\xbc\xa4\x83\x4d\x32\x6d\x43\xdf\x72\x77\xe3\xd7\xe7\xae\xd2\x89\xc8\x4d\x0a\x19\x6a\xeb\x75\x39\x1d\x4e\xe0\xfa\xce\x40\x78\x71\xf9\xcf\xa4\x97\xf4\x92\x8b\x90\x64\x03\xc2\x0f\xfd\xfe\xc5\x43\x18\x93\x2e\x09\xaa\x78\xca\xfb\x2f\x5c\xd6\xa4\x0f\x97\xbd\x7f\xfd\x23\x86\x02\x25\x6a\x4e\xb1\xcd\xb5\x5a\x42\x68\x74\xd6\x75\xd1\xaa\xae\x2d\x4d\x98\x30\x36\x55\x6e\x3e\x70\xc8\xc5\x7c\x8e\x9a\x8e\x8b\x3c\x77\x9f\x70\x13\xc3\x52\xd5\xd2\xd2\x89\x2d\x41\x48\xab\xdc\xd9\x55\x2a\x77\xde\x0d\xba\x37\x10\x8e\xc6\xf7\xd3\xc7\xab\xeb\x9b\x71\xc3\xea\xd5\xf8\x7d\xf3\x78\xba\x06\x1a\x9c\x1c\x8d\xd3\xff\x8a\xdb\x85\x49\x7e\x8b\x59\x30\xd4\x85\xe9\x83\x2f\xe9\xd7\xfc\xb3\x58\xd6\xcb\x09\xad\x45\xbd\x4e\xcc\x82\xfb\x5a\xf6\x01\x96\x5c\xc8\x98\x6d\x5d\xc7\xfc\x92\xde\x4e\xee\x77\x72\x82\xd2\xa3\x9f\x9f\x93\x4a\x9c\xb7\x32\x33\x2f\x79\xe1\xfa\xe6\xc8\x7a\xa6\x54\xc9\x98\xdd\x54\x08\x64\xde\xae\x1b\xab\xeb\xcc\xc2\x17\x16\xbc\x46\xbb\x50\x39\x78\x29\x61\xc1\x4f\x2a\xdf\x00\xec\x1e\xb7\x8c\xcd\x6b\x99\x81\x90\xc2\x46\x1d\x32\x6f\xbb\x32\xb9\x2a\x79\x61\xa2\x4e\xf2\x93\x52\xe5\x5b\xae\xa3\x17\x87\x8e\x63\x08\x8f\xe8\x85\x31\xcc\x79\xe9\xd6\xbd\x49\xee\xf2\xd3\x74\x98\xf1\xe7\xcf\x1d\xc7\x03\xe5\x5c\x70\xbb\x2b\x26\xd3\xe4\x72\xce\xeb\xd2\x7a\xa1\xdd\x0f\x73\x52\xc5\xe4\xde\x63\x81\x0f\x28\xec\xb4\xe4\x29\x95\x51\xb6\xcc\xe1\xec\x48\x45\x62\xe0\xba\x30\xf0\xe1\xc1\xc7\xea\xa2\xa3\x19\xf2\x18\xc3\xea\x09\xfa\x03\xd0\x5c\x16\x08\xca\x24\x63\x7f\xbc\x3e\x01\x41\xb7\x0b\x77\xb5\xf5\xa3\xc6\x2e\xa8\x1a\x67\x38\x57\xda\x4f\xc7\xb9\xd0\xc6\xc2\x00\x8c\x28\x24\x55\x69\x45\x13\xe4\x43\xef\x21\x76\xf3\xcf\x6d\x3e\xd8\x88\x25\x4d\xf1\x9d\xd5\xc5\x03\x44\xb8\x42\x09\xc2\x89\x87\x46\xe0\x1a\x61\x59\x97\x56\x54\x25\xc2\xc0\x6f\xcf\x16\x5c\xf3\xcc\xa2\x36\x9d\x84\x05\x81\xdb\x4a\x6c\x9b\x59\x90\xa4\x55\x29\xec\x24\x5a\x3d\xc5\x10\x0e\xc2\x18\x2e\x3b\x2c\x08\x9e\x70\x43\x36\x3b\x36\x2c\x08\x7c\x06\xdb\xb5\x8b\x07\xc6\x82\xc0\xac\x85\xcd\x16\x2e\xca\x8c\xfb\x2a\x71\x98\x2f\x79\x23\xea\x91\xeb\x96\x76\x52\x74\xfa\x2c\x08\x02\xd7\xfd\x07\x0c\xa6\x5a\x2c\x4f\x9b\x93\x75\xa1\xbc\x90\x50\x15\x45\xb4\x35\xf6\xa7\xd9\xf9\x03\xa7\xfb\xf1\xf3\xe7\xbc\x1e\xd8\x1f\xba\x25\xf9\xfa\xab\xae\xdb\x99\xf6\x27\xe3\x6d\xcd\x0f\x1d\x4f\x6f\xd2\x53\x7e\xb7\x2c\xd8\x32\x16\x18\x2c\x91\xfa\x71\xdb\x56\xed\xc9\x24\xc1\xbe\x56\x59\xe0\x8e\xfd\x85\xab\x7d\x37\xb0\x34\x9d\xdb\x30\xcf\x75\x1f\xc2\x9e\xd3\xcf\x5e\x3f\x84\x6f\x9d\x3a\xc7\x2c\x08\x5e\x72\x99\x97\xa8\xfb\xbe\x5d\x9a\xa7\xab\x5a\x66\x11\x39\x8c\xd6\xbb\x36\xf2\xdd\xf7\x4e\x0b\x4b\x77\x21\x0d\x67\x87\xed\xe5\x7b\x20\x98\x91\x4c\xf4\x07\xcd\x8d\x27\x08\x02\x31\x3f\x16\x1e\x67\x15\x7c\x8c\x01\xb5\x26\x43\xea\xec\xe4\x35\xd7\x66\xc1\xcb\xe8\xc5\xa1\x16\x79\xcb\x46\x87\xfa\xa0\x13\xff\x2b\xf6\xcb\xa4\x47\x34\xe9\x9d\xa3\xad\xcb\x28\xf9\x22\xd4\xbf\x0d\x40\x8a\xb2\xf1\x14\x38\x92\x63\xad\x95\x8e\xd6\x31\xcc\x97\x36\x49\x2b\x2d\xa4\x9d\x47\xe1\xb5\xb4\xa8\x25\x2f\xc1\xa7\x09\x9c\x55\x1f\xbe\x59\x85\x8e\x5e\x27\x86\xef\x7b\x3d\x0f\x1d\x68\xb4\xb5\x96\xee\xf7\xd6\xfd\x5d\x27\x2f\x91\xe7\xa8\xa3\x4e\x92\xa2\x8d\xc2\x91\x92\x16\xa5\x3d\x9f\x6e\x2a\x52\xb5\xb0\xb9\xd3\xd3\x2c\xf4\xf7\x36\x0f\xe4\x12\xb4\xab\x91\xe8\xa3\x5b\x74\x80\xc4\xec\xca\x31\x23\x9e\x64\xe6\xca\x80\x94\x7f\xcb\x82\x52\x15\xc9\x5d\x43\xbb\xb9\x6f\xee\xe6\xeb\x37\x9f\x60\xce\x45\x89\x79\xc3\xdc\x97\x85\x49\x6e\x84\xb1\x28\x87\x32\x77\xd1\x45\x9d\xce\x71\x09\x9d\xa8\xbb\x83\x2a\xfa\x7f\x11\xfd\x0f\x16\x11\xdd\x6b\xae\xe8\x13\xb8\x3f\xa0\xf1\xf5\x6f\xb4\x28\x57\xd1\xc1\xfd\xa5\xc3\x28\xfc\x12\x65\xb4\x33\xed\xc0\x60\x00\x3d\xaf\xfc\xbb\xdd\x83\xaf\xef\x6f\x0e\xfc\x09\x37\x27\xb0\xdb\xbb\xd0\x1e\xba\x31\x3c\x40\xde\x6d\x3d\x02\x7e\xc2\x4d\xf8\xac\xf4\x6d\x69\xe0\x79\xf9\xbb\x79\xbf\xa3\x37\xf8\xe6\x53\x0c\x0d\xe2\xe0\x74\x6f\xec\x4c\x5b\xbb\xe7\xed\x32\xbd\x49\xa3\x67\x66\x5f\xb7\xd0\xa9\x99\x71\xd4\x43\x8e\x29\x35\x0d\x1a\xd3\x16\x2b\x0d\x20\x6a\x04\x55\x7a\x04\x7a\x1f\x85\xee\x73\x2c\x3e\xe8\xad\x6f\x09\xd4\x67\xed\xab\x7a\xa4\x84\x5c\x71\xcb\xcb\x28\x4c\x33\x5b\xf5\x9b\x10\xfd\xbd\xc9\xc1\x02\xf7\x3e\x13\xda\xaa\x74\xbf\x29\x45\x3f\x52\x4a\x17\x28\x75\xdf\x21\x21\x1f\x3e\xf1\x69\xb9\x1c\xd1\xff\x23\x26\x57\x2d\x07\x8f\xef\xbe\x07\x4e\xf8\x3f\x3a\xce\x94\x3e\xa4\x31\xf7\xdf\x0e\xde\x5d\xd8\x61\x2c\xc8\x71\x8e\x1a\x76\x44\x93\x51\xa9\x0c\x46\x9d\xdd\xba\x13\x94\x4e\x4b\xa0\x05\xdb\x83\x00\x7e\x16\x16\xe9\xae\x17\x6c\x23\x02\xa4\xfb\x9b\xab\x61\x25\x65\x1b\x77\x8b\x3f\xcc\x32\xac\xac\x8b\x9d\xda\xe5\x84\x02\x9c\x0c\x94\xbb\x6d\xa7\x03\x75\xed\x58\x28\xcf\x95\xbc\xc2\x99\x4b\x33\x19\x8f\x94\x94\x8d\xd2\xf9\x80\xe8\xfd\x3e\xc8\x83\xa8\x4a\x19\x85\x29\x4a\xfa\xf6\x6f\x6f\xbf\x5e\x02\x1e\x7d\x14\x03\xbf\xd7\xc9\x69\xf4\xe1\x61\xb6\xb1\x18\xf9\x2b\x44\x87\xfd\x8e\x96\x1d\x81\xef\x83\x31\x28\x73\x38\xb8\x95\x37\x61\x1c\x6a\xd6\xf6\x19\xb7\xfd\x67\x03\x4a\xeb\x88\x6d\x5d\xb0\xee\xa4\xb7\xec\x3f\x01\x00\x00\xff\xff\x15\x83\xf8\xd6\xef\x13\x00\x00") + +func testImagesAgnhostPorterPorterGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostPorterPorterGo, + "test/images/agnhost/porter/porter.go", + ) +} + +func testImagesAgnhostPorterPorterGo() (*asset, error) { + bytes, err := testImagesAgnhostPorterPorterGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/porter/porter.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostResourceConsumerControllerControllerGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xe4\x5a\x6d\x6f\xdb\x46\xf2\x7f\x2d\x7e\x8a\x29\x01\xb7\x54\xca\x90\x4e\xff\x7f\x1c\x0a\xa5\x3e\xc0\x91\xe3\xd6\xa8\x25\xbb\x96\xdd\xa0\x68\x7b\xc1\x8a\x1c\x51\x0b\x93\xbb\xcc\xee\xd2\x8a\xcf\xf5\x77\x3f\xec\xf2\x59\x22\x25\xc5\x71\x7b\x77\xb8\xbc\x88\x24\xce\xec\x3c\xef\x6f\x66\xb9\xf6\x5f\x58\x63\x9e\xde\x0b\x1a\x2d\x15\x7c\x73\xf8\xea\x6f\x70\xbd\x44\xf8\x31\x9b\xa3\x60\xa8\x50\xc2\x71\xa6\x96\x5c\x48\xcf\xb2\xce\x69\x80\x4c\x62\x08\x19\x0b\x51\x80\x5a\x22\x1c\xa7\x24\x58\x22\x14\x14\x17\x7e\x46\x21\x29\x67\xf0\x8d\x77\x08\x8e\x66\xb0\x0b\x92\x3d\x7c\x6d\xdd\xf3\x0c\x12\x72\x0f\x8c\x2b\xc8\x24\x82\x5a\x52\x09\x0b\x1a\x23\xe0\xc7\x00\x53\x05\x94\x41\xc0\x93\x34\xa6\x84\x05\x08\x2b\xaa\x96\x46\x49\x21\xc2\xb3\x7e\x29\x04\xf0\xb9\x22\x94\x01\x81\x80\xa7\xf7\xc0\x17\x4d\x2e\x20\xca\xb2\x00\x00\x96\x4a\xa5\x23\xdf\x5f\xad\x56\x1e\x31\x56\x7a\x5c\x44\x7e\x9c\x73\x49\xff\xfc\x6c\xfc\x76\x3a\x7b\xfb\xf2\x1b\xef\xd0\xb2\x6e\x58\x8c\x52\x82\xc0\x0f\x19\x15\x18\xc2\xfc\x1e\x48\x9a\xc6\x34\x20\xf3\x18\x21\x26\x2b\xe0\x02\x48\x24\x10\x43\x50\x5c\xdb\xb9\x12\x54\x51\x16\xb9\x20\xf9\x42\xad\x88\x40\x2b\xa4\x52\x09\x3a\xcf\x54\x2b\x40\xa5\x55\x54\x42\x93\x81\x33\x20\x0c\xec\xe3\x19\x9c\xcd\x6c\x78\x73\x3c\x3b\x9b\xb9\xd6\xbb\xb3\xeb\x1f\x2e\x6e\xae\xe1\xdd\xf1\xd5\xd5\xf1\xf4\xfa\xec\xed\x0c\x2e\xae\x60\x7c\x31\x3d\x39\xbb\x3e\xbb\x98\xce\xe0\xe2\x14\x8e\xa7\xbf\xc0\x8f\x67\xd3\x13\x17\x90\xaa\x25\x0a\xc0\x8f\xa9\xd0\xb6\x73\x01\x54\x87\x0e\x43\xcf\x9a\x21\xb6\x94\x2f\x78\x6e\x8c\x4c\x31\xa0\x0b\x1a\x40\x4c\x58\x94\x91\x08\x21\xe2\x77\x28\x18\x65\x11\xa4\x28\x12\x2a\x75\xf2\x24\x10\x16\x5a\x31\x4d\xa8\x22\xca\xfc\xde\x70\xc7\xb3\x5e\xf8\x96\x95\x92\xe0\x56\x0b\x11\x28\x03\xce\x64\x96\xa0\x08\x94\x88\x2d\x8b\x26\x29\x17\x0a\x1c\x6b\x60\x2f\x12\x65\x5b\x03\x3b\xe6\x91\xfe\x60\xa8\x7c\x9d\x97\xf2\x7b\x26\x62\xfd\x55\x60\x84\x1f\xcd\x43\xa9\x44\xc0\xd9\x9d\xf9\x7a\xcf\x02\xdb\xb2\x06\x76\x44\xd5\x32\x9b\x7b\x01\x4f\x7c\x99\x2e\x5e\xfd\x9f\x1f\xf0\xb9\x20\x86\x74\xfb\xad\xf4\x28\xf7\x6f\xab\x6a\xf5\x15\x4a\xe5\xd3\x84\x44\x28\x7d\x12\xb1\x25\x97\xca\x0f\x99\xb4\x77\x32\x0b\x94\x3c\x13\x01\xbe\x2c\x5d\xf1\x03\x9e\x24\x9c\xd9\xd6\xd0\xb2\x7c\x1f\xc6\x49\x78\x55\xb0\x8c\x0b\x8e\x31\x67\x4a\xf0\x38\x46\xa1\xd3\x9b\xc9\xa2\x70\x72\xad\x30\xd6\x56\x7a\xd6\x1d\x11\x3b\xd6\x1e\xc1\x97\xc6\x23\x6f\xcc\x93\x84\xb0\xf0\xc1\x1a\xdc\x48\x1c\x01\x80\xbd\x61\x94\xfe\x52\xac\xb3\x5d\x6b\x30\x5b\x72\xa1\x46\x60\xcf\x14\x11\x4a\x02\x81\x1f\xae\xaf\x2f\x41\xa2\xb8\x33\xf9\x22\x0a\x64\x2a\x90\x84\x79\x69\xa3\xd4\x3c\x82\x67\x2c\x84\x52\x32\x94\x92\xa5\x96\x77\xce\x59\x34\x82\xe7\x91\xe7\x19\x20\x69\x0a\x58\x12\x99\x97\x21\x49\x10\x90\x85\x29\xa7\x4c\x99\x6a\x83\x4c\xea\x42\x2a\xe8\x9c\xe9\x52\x25\x2b\x96\x07\x54\x3f\xfa\x6d\x33\x14\xbf\xd9\x20\xb3\x79\x90\xc7\xcc\xd3\xd6\x1f\x8b\x48\x8e\x00\xf2\x60\x4e\xc8\x47\x9a\x64\xc9\x54\x3f\x74\x0e\x87\xae\x35\xb8\xca\x98\x0e\x6a\x42\x28\x73\xad\x47\xcb\x64\xc6\xb1\x06\xa6\x54\xbb\xfe\x51\xa6\xac\x41\xa9\xed\x72\x9d\xab\x45\x9d\xa1\xb8\xa3\x01\x4e\xb5\x63\xe6\x9f\xde\xe9\x2c\xea\x64\x90\x29\x09\xb0\x62\x08\x99\x3c\xe1\xda\xa4\x75\xed\x05\x43\x5e\x7c\x11\xaa\x93\xe9\xac\x60\x5c\x91\xf8\x56\x07\x4a\xf0\x2c\x5a\xc2\xc9\x74\xa6\x63\xbe\xa0\x51\x26\xcc\x76\x35\xf1\x8c\x39\xbf\x95\x66\xdf\xdb\xf2\x2e\xf0\x16\x9c\xdb\x20\x30\xe0\x22\xd4\xe2\x56\x4b\x14\x08\xb6\x79\x4a\x25\x04\x99\x10\xc8\x54\x7c\x5f\x09\xc2\xd0\xc8\x95\xd9\x62\x41\x3f\x9a\x44\x32\x48\x69\x60\xd4\x12\x05\x5f\x2d\x38\xff\x0a\x52\x22\x14\x64\xa9\x16\x48\x4c\x05\xa8\x4c\x30\xa9\xf1\x91\x40\x40\x74\x89\x7a\xd6\x22\x63\x41\xcb\x7a\x67\x58\x78\x06\x0f\xd6\x80\x2e\xa0\xf6\xff\x8b\x23\xb0\x6d\xfd\x74\x90\x4b\xaa\x49\xd6\xe0\xd1\x04\x6a\x66\xcc\x39\xa7\x52\xc1\xe8\x48\x93\xbd\xef\x8d\xe4\xfa\xb9\x33\xb4\x06\xc2\x85\xf7\x9a\x9e\x83\x8a\xde\x54\x29\x8d\xd1\xb1\xff\xa1\x03\x61\x0f\xad\x81\x8e\xca\x7b\xb7\xf4\xba\x5a\x6f\xd6\x10\x16\x21\xb4\x55\x69\x8b\xe8\x02\x84\x37\x21\x2a\x58\xce\x8c\xf1\xce\xfa\xe2\xa1\x61\x1b\xf8\x3e\xcc\xc8\x1d\x36\x82\x67\xba\x18\xcf\x94\xa9\xe2\xaf\xb4\x09\x79\xe0\x34\x77\xed\xfb\xd1\x86\x35\xbf\xfe\xff\xe8\x77\xcd\x33\x17\x48\x6e\xad\x81\x8e\xc0\xe3\x5a\xc0\x8e\xaa\x80\xa5\x84\xd1\xc0\xb1\xc7\x3c\x8b\x43\xd3\x5d\x17\x94\x35\x33\x08\x52\xef\x67\x1d\x74\xd3\x53\x0b\x33\x64\x36\xcf\x53\xa1\x83\xf2\x68\x6d\x86\xfd\xd1\xca\xf3\x47\x19\x55\x8e\xf1\x70\x2b\x90\x79\xa7\x31\x89\xa4\x33\xf4\xce\x98\xfa\x99\x08\xe7\x4b\xbd\xb3\x5c\xb0\xf5\x87\xed\xc2\xb7\x87\xdf\x1e\xba\x60\x9b\x8d\xc4\xb2\x64\x8e\xc2\x64\xe3\xd3\x44\x36\xb7\xa3\x0b\x76\x05\x8b\xbd\x3a\xf4\x74\x50\x43\xd2\xfe\x0a\xf3\x3c\xb7\x74\x36\xf6\x70\x53\xb5\xcc\x1f\xbf\x64\x24\x41\xdb\xed\xc0\x6c\xfd\xd0\x20\x03\x5f\x40\xc1\xac\x4d\xd2\x23\x8c\x4e\x49\x07\x72\x3e\x97\x99\x06\x6a\xfa\x6c\x35\x44\x6d\x5b\x88\x0b\x92\xc5\xaa\x34\x33\xc7\xa7\x4f\xb1\xb5\xac\x13\xb3\xbf\x83\x24\x84\x17\xad\x7e\xe6\x02\x11\x91\x84\x5f\x7f\xcf\xab\xcd\x14\x52\x12\x09\xbd\xdf\x18\xae\x6a\xa7\xf4\xe6\x8d\x79\xe4\x9d\x12\x45\x62\x47\x8f\x09\x9e\xde\x80\xc8\x8e\x59\xa8\x9d\x42\x67\x91\x28\x6f\x96\x0a\xca\xd4\xc2\xb1\x47\x07\xa1\xed\x82\x4e\xfc\xd0\x85\x24\x12\x43\x63\x88\xba\x4f\x73\x8b\x8b\xe6\x2a\x95\xc8\x02\xb3\x89\x05\xca\x94\x33\x89\xef\x04\x55\x28\xce\x79\x70\x0b\x7a\xc4\xf0\x26\x99\xc2\x8f\xd6\x60\x45\xa8\xfa\x5e\xf0\x2c\x6d\x40\xb0\x26\xbf\x2b\x9f\x57\x6e\xae\x19\xad\xbd\xad\xd4\x3d\x58\x83\x40\x3b\xf6\x65\xfd\xec\xa1\xde\x5a\x41\x25\xc3\x09\x9a\xcb\x86\x60\xfc\xd3\xbd\xd2\x59\x99\xc1\xd5\xbb\x6a\x59\xeb\xea\x7e\x0b\x2f\x0a\x8a\xe9\xbc\xc3\x02\x40\x05\x7e\xf0\x26\xa8\x96\x3c\x34\x08\x7a\x79\x31\xbb\xce\x41\xc1\x30\xbf\x15\x82\x0b\x67\xe5\x42\x3e\xcc\x78\x6f\x48\x58\xac\x77\x73\x3d\x33\x45\x54\x26\xeb\xc7\xc3\x0a\x7f\x0d\x26\xf8\xbe\x46\x2b\xa9\x73\xaf\x25\x97\x6d\x1f\x42\xa2\x88\x41\xfd\x9b\xab\x73\xf3\xc3\xd8\x82\x42\xe4\xc8\xfb\xc1\xbb\x24\x42\xe2\x29\x17\x89\x33\x7c\x6d\x9e\x7f\x71\x04\x8c\xc6\x1d\x96\xa1\x10\xc5\x8f\xe1\xde\x36\x2d\x09\x0b\xe3\xaa\x0a\xc7\x97\x37\x55\x28\x6e\xae\xce\xbd\x4b\xa2\x96\x1a\x1d\x0b\x9f\xc7\x15\xd7\x71\x18\x9a\x59\x59\x1b\x11\x78\xb9\x90\x9a\xaa\x8d\xd1\x22\xb4\xd5\xbb\x54\x4e\x30\xd9\x43\xe5\x04\x93\x2d\x2a\x27\x98\xec\xa5\x72\x9e\x25\xe9\x04\x95\xa0\xc1\x36\x95\x6f\x2a\xae\x2e\x95\x35\x75\x8b\xca\xce\x8a\xb9\x61\xb7\x8c\xaf\xd8\x69\xc6\x02\x3d\x5d\xb4\x52\x34\xe5\xea\x54\x4f\x7f\xc3\xde\xba\xde\x8c\x71\x77\x79\x7f\xc8\x50\xdc\x43\x26\x62\xef\x67\x12\x67\x28\x4d\x75\xe7\x83\x8f\xe9\x5b\xc5\xcc\x60\xca\x4e\xf7\xef\x66\xe6\xc3\x62\xf0\x99\x61\x90\xc3\xa1\xae\x41\x23\x50\xcf\x07\x4e\xe1\xc7\x49\xcd\xf5\x93\xa6\x0d\xad\x41\x42\xe3\x98\x06\x5c\xa0\xdc\xb2\x6e\x52\x31\x95\xcb\x8a\x3d\x30\xa3\xff\xc4\x33\x36\xd9\x47\xc6\x55\xf7\x8a\x52\xa0\xee\xea\x1b\x3e\xe4\xdd\xfd\x8f\x3f\x60\xc3\xca\x8a\xb2\xdd\x90\x7a\x3c\xe8\xcc\xeb\x94\xab\xef\xe9\x1d\x56\x89\x3d\x16\x51\x96\x20\xdb\x0f\x17\x4c\x6e\xf4\x41\x0d\x45\x81\x05\x4e\x9e\x21\x99\x1f\x8f\x95\x1c\x6e\x4b\x93\xdb\xf4\xd7\x18\xa6\xc3\x56\x9c\xfd\xbc\x63\xc5\xa9\xb3\x11\x90\x56\xbe\xdc\x46\x54\xba\xd7\xaf\x47\xad\x3f\x6f\x6e\x5f\x1c\xbb\x05\x6f\x0d\xfa\x46\x32\x73\x19\x05\xf6\xb5\x92\xb9\x4e\xd9\x6a\xc4\x4e\x36\xf8\xee\x08\x0e\xfb\x93\x7d\xc6\x02\x2e\x04\x06\xea\x89\xd9\x0e\x78\xc6\xcc\xd0\x5d\xdb\x0f\x7e\x9f\x2d\xa6\xd5\xae\x73\xbf\x04\x23\xe3\x45\xef\x1a\xdd\xdb\x4f\x8b\xde\xbe\x72\xc1\xbe\x1a\x43\x42\x18\x89\x50\x8c\x40\x22\x0b\x75\x49\x1f\xdc\xd5\xe7\x4e\xc5\xcb\xea\xd2\x8f\x1b\x9a\x90\x04\x4b\xd3\x9a\x5e\x55\xdd\xaa\x8f\xf7\x37\x66\xbb\xb9\x5d\xbd\x45\xa0\x09\x26\x1e\x74\x91\x73\xc2\xdf\x8b\x40\x07\x5e\x35\x32\x78\xc7\x61\xe8\x18\xea\xd0\x10\xb4\xbd\x35\xe6\x15\x31\x95\x79\x3e\xb6\x2b\x6b\x94\xce\xb0\x9c\xf8\x4d\x34\xfb\xb4\xbe\xd2\x1a\x23\x0e\xb9\xd2\x0b\x86\x1b\x7a\x73\xc0\xd7\x0d\x7f\x43\x78\x53\x98\x9e\x73\x9c\x3d\x81\xdc\x74\xae\x67\x05\x72\xd3\x4f\x9f\x0e\xe4\x18\x91\xf9\xbd\xda\x8e\xe3\x25\x4f\x37\x8c\xef\x21\xe1\xaa\x73\xc1\x9e\x20\xbe\x26\xbf\x07\xc3\x3b\xb9\xfe\x23\x20\x7c\x3d\x41\x4f\x85\xf0\xd2\x43\xb7\x0e\x49\x0f\x80\xb7\x63\xd1\x9b\xb0\xf5\xcd\xb4\x5d\xea\xb6\x70\xef\x06\xef\xb6\xec\x3e\x50\xfe\x34\xae\xbf\x0c\xb9\x2b\x85\xeb\xc0\x5d\x12\x1a\xb8\x5d\xf1\x76\xc3\x76\xbd\xe2\xf3\x50\x7b\xf2\x66\x37\x5a\x4f\xde\xf4\xa3\x74\xb3\x06\x3e\x07\xa4\x27\x98\xec\x04\xe9\x5a\xd7\xb3\x61\x74\xad\xf6\x39\x31\xba\x39\xea\x3f\x0f\x46\xaf\xcb\xd5\xdb\x58\x7f\xf6\xe0\xac\x26\x4d\x49\x82\x25\x32\x86\x18\x2b\xb2\x0d\xd0\x35\xbd\x62\x7e\x6a\x0f\x68\x64\x6b\x9c\x49\xc5\x93\xdc\x90\xfd\xf0\xbc\xb9\x62\x5f\x40\x37\x11\xa8\x7e\x37\x9d\xec\x02\xf7\x0e\x9b\xfe\xbd\xe8\xee\x2f\x62\x4e\x4a\x90\xdf\xcc\xf0\xe7\x43\xbd\x89\x88\x9b\x07\xa6\x67\x55\x1d\xb3\xfe\x04\xba\x7d\x51\xdc\x09\xf0\x9b\x21\xdf\x89\xf0\x0d\x63\x3b\x71\x7b\x53\xff\x4e\xb6\xbf\x0a\xdf\x8d\xe9\x6d\x6c\x6f\x9a\x51\x83\x7b\xce\xd8\x01\xec\x6d\xf6\x27\x20\xfb\x3c\x4b\x52\x08\x8c\x94\x72\x7f\xcc\xef\x35\x53\x37\xc8\x1b\x76\xc3\xd0\x83\xf0\xeb\x65\xf0\x59\x73\x78\x43\x96\xf6\x27\x29\xa4\xee\xd2\xfa\x7c\x03\x79\x8f\x01\x9f\x0f\xfb\x7d\xa7\x8d\xde\x17\x89\x86\xde\x3c\x42\xb7\xf4\x6b\x74\x30\x1d\x41\x03\x03\xd5\x15\x73\xf8\x1a\x28\x7c\x57\xad\x7c\x0d\xf4\xeb\xaf\x8d\xef\x3b\xcf\x1d\x3d\x2a\x8c\x8b\x7b\xb8\xd3\xea\xcb\x3b\xdd\xe9\xec\xd0\x9f\xe7\x4d\xbb\x43\x77\x6b\xd8\xd7\x99\x76\x01\x74\x7b\x53\xec\x9a\x1c\xaa\x9b\xce\x95\x60\xfa\x6c\x69\xea\xa9\xc6\x4d\x3d\x2d\xf7\x02\x81\x44\x55\xf7\x11\x37\x57\xe7\x4e\x75\xc1\x94\xbf\xda\xaf\xef\xf6\x7c\x1f\xa6\x17\xd7\x6f\x47\xb0\xc8\xe2\xd8\xdc\x45\x31\x92\x60\x75\x51\x1e\x66\xa8\x31\x40\x2d\x11\xde\x51\x16\xf2\x95\x84\x34\x26\x6a\xc1\x45\x62\xb6\x84\xa0\x06\x0d\x8b\xab\xca\xcb\x9f\x4e\xa6\x12\x88\x40\x73\xbb\x25\xb3\x34\xe5\x42\x61\xe8\x55\x6f\xd6\x5b\x37\x03\xc5\x5f\x7e\x1c\x48\xef\x40\x7a\xf2\x2e\xf0\x0e\xe4\xe8\x20\x3c\x90\x06\x64\x3a\xee\x72\xfa\x6f\x4e\xda\x37\x97\x35\x67\x7e\xfd\x94\xfb\x6e\x36\xa6\xef\x43\xdf\x3e\x30\x04\xd9\x7e\x7d\x6e\x0e\x56\x69\x56\xc8\x4b\xb5\xa7\xfd\xf5\xd3\xbd\xb9\x7a\x0a\xa8\x7e\x0f\x42\x99\xea\x2e\x98\x10\x17\x28\xa0\x09\x30\x27\x9c\xa1\x33\xb4\x06\xf9\x60\x38\x3a\xea\xc8\x73\xdf\xbb\xf4\xa1\x35\x78\xef\x96\x2f\xfe\x8d\x49\x97\x5c\x2a\xf3\xe2\xdf\x48\x73\x1b\x73\xe6\x43\xf7\x2b\xd5\x11\x3c\x94\x2d\xfc\x4c\x71\xd2\x78\x75\x37\x7c\xac\xfa\xe4\xfa\xc4\xb7\xbe\xa8\x59\xb1\x8f\x8f\x43\x0d\xa0\x9b\x17\x3e\x9e\xfe\xcf\x19\xd6\x21\xe8\x60\xb9\x61\x71\xc1\x54\x5c\x68\x34\x2e\x2e\xd6\x7b\xe2\x29\xa1\x71\xfe\x17\x41\x01\x67\x0c\x83\xe6\xd9\x45\x8c\xca\xc6\x86\x42\xac\xbd\x68\x5f\x97\x53\x44\x35\x84\x83\x70\xfd\xed\x54\x23\x18\x9d\x75\x56\x23\x54\x5f\x9d\x25\x98\x70\x71\xff\xa9\xa5\xd6\x44\xbe\x3e\xac\x2a\x0f\x89\x7f\x66\xa5\xd5\x57\x28\x4f\xaa\xb4\xd6\x5b\x9a\x8d\x42\x2b\xa9\xff\x93\x75\x56\x3a\x9f\x97\x59\x15\x8a\x6e\x34\x6b\x0e\xb4\x7d\x78\xd6\x1a\xfc\x3e\x15\xd9\xf6\x68\x8e\x41\x83\xc7\xdc\xa7\x97\x6d\x32\x9f\x68\xff\x94\x2a\xdc\xb8\x55\xdb\x59\x85\xd6\x60\xd0\x55\x87\xad\x43\xf1\x08\x1e\xd6\x9d\x79\x62\x05\xd6\xab\xaa\x43\xf4\x06\xbf\xa6\xfc\xf7\xd5\xaa\x8e\x3c\x86\x65\x39\x1d\x48\x73\x52\x08\xf3\x93\xc2\x5a\xec\x8a\x0a\xd0\xa5\xfb\xaf\x00\x00\x00\xff\xff\x44\x06\x4f\x9b\xce\x2a\x00\x00") + +func testImagesAgnhostResourceConsumerControllerControllerGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostResourceConsumerControllerControllerGo, + "test/images/agnhost/resource-consumer-controller/controller.go", + ) +} + +func testImagesAgnhostResourceConsumerControllerControllerGo() (*asset, error) { + bytes, err := testImagesAgnhostResourceConsumerControllerControllerGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/resource-consumer-controller/controller.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostServeHostnameServe_hostnameGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x57\xdf\x73\xdb\xb8\x11\x7e\x26\xfe\x8a\x2d\x67\x92\x92\x1e\x06\x74\x72\x9d\x74\xaa\x36\x0f\x3a\xd9\xae\x35\x97\xb3\x3d\x92\x7c\x99\x9b\x34\xd3\x83\xc8\x15\x89\x86\x04\x58\x00\xb4\xa2\xb9\xf3\xff\xde\x59\x80\x54\xa4\xd8\xb9\x3a\x33\xf7\x62\x11\xe4\xfe\xf8\xf6\xdb\x0f\x0b\x38\x3f\x61\x33\xdd\xed\x8c\xac\x6a\x07\xaf\x4e\x5f\xfe\x05\x56\x35\xc2\x0f\xfd\x1a\x8d\x42\x87\x16\xa6\xbd\xab\xb5\xb1\x9c\xb1\xb7\xb2\x40\x65\xb1\x84\x5e\x95\x68\xc0\xd5\x08\xd3\x4e\x14\x35\xc2\xf0\x25\x83\x9f\xd0\x58\xa9\x15\xbc\xe2\xa7\x90\x90\x41\x3c\x7c\x8a\xd3\xbf\xb3\x9d\xee\xa1\x15\x3b\x50\xda\x41\x6f\x11\x5c\x2d\x2d\x6c\x64\x83\x80\x9f\x0a\xec\x1c\x48\x05\x85\x6e\xbb\x46\x0a\x55\x20\x6c\xa5\xab\x7d\x92\x21\x04\x67\x3f\x0f\x01\xf4\xda\x09\xa9\x40\x40\xa1\xbb\x1d\xe8\xcd\xa1\x15\x08\xc7\x18\x00\x40\xed\x5c\x37\xc9\xf3\xed\x76\xcb\x85\x47\xc9\xb5\xa9\xf2\x26\x58\xd9\xfc\xed\x7c\x76\x7e\xb5\x3c\x7f\xf1\x8a\x9f\x32\x76\xab\x1a\xb4\x16\x0c\xfe\xb7\x97\x06\x4b\x58\xef\x40\x74\x5d\x23\x0b\xb1\x6e\x10\x1a\xb1\x05\x6d\x40\x54\x06\xb1\x04\xa7\x09\xe7\xd6\x48\x27\x55\x95\x81\xd5\x1b\xb7\x15\x06\x59\x29\xad\x33\x72\xdd\xbb\x23\x82\x46\x54\xd2\xc2\xa1\x81\x56\x20\x14\xc4\xd3\x25\xcc\x97\x31\x7c\x3f\x5d\xce\x97\x19\x7b\x37\x5f\x5d\x5e\xdf\xae\xe0\xdd\x74\xb1\x98\x5e\xad\xe6\xe7\x4b\xb8\x5e\xc0\xec\xfa\xea\x6c\xbe\x9a\x5f\x5f\x2d\xe1\xfa\x02\xa6\x57\x3f\xc3\x0f\xf3\xab\xb3\x0c\x50\xba\x1a\x0d\xe0\xa7\xce\x10\x76\x6d\x40\x12\x75\x58\x72\xb6\x44\x3c\x4a\xbe\xd1\x01\x8c\xed\xb0\x90\x1b\x59\x40\x23\x54\xd5\x8b\x0a\xa1\xd2\x77\x68\x94\x54\x15\x74\x68\x5a\x69\xa9\x79\x16\x84\x2a\x59\x23\x5b\xe9\x84\xf3\xeb\x07\xe5\x70\x76\x92\x33\x96\xe7\x30\x05\xdb\x8a\xa6\x81\xde\xc9\x46\xba\x1d\x91\xf3\x9f\xde\x3a\xb0\x68\xee\x02\x86\x5a\x5b\xa7\x44\x8b\x54\xf2\x6a\x76\x43\xb1\x73\x6d\xe0\xf6\xec\x86\x33\xd6\x89\xe2\x23\xc1\xf0\xe6\xa3\x25\x63\xb2\xed\xb4\x71\x90\xb0\x28\xde\xb4\x2e\x66\x51\xdc\xe8\x8a\x7e\x14\xba\xe1\x27\xa7\xf6\xd2\xb3\xb6\xe1\x6f\x6e\x65\xa5\x44\x43\x0b\xbb\xb3\x85\x68\xfc\xa3\x93\x2d\xc6\x8c\x45\x71\x25\x5d\xdd\xaf\x79\xa1\xdb\xdc\x76\x9b\x97\xdf\xe5\x85\x5e\x1b\x11\xb3\xd4\x97\x31\x6b\xcb\x25\x41\xb8\x1c\xc1\x4a\x4b\x0a\x0d\x42\xa8\x14\x21\x83\x19\x39\x70\x76\x27\xcc\x43\xf3\x37\xf0\xdc\xc7\xe3\x33\xdd\xb6\x42\x95\xbf\xb2\xe8\xd6\xe2\x04\x00\x62\x5f\xda\x8b\xb1\xb6\x38\x63\xd1\xb2\xd6\xc6\x4d\x20\xf6\x21\xec\x11\x49\xf4\xf9\xad\x56\xd5\x04\xe0\x97\x47\x3e\x83\xab\x8d\xee\xab\x1a\x2e\x57\xab\x1b\xc8\x3d\x9f\x39\x51\x49\xe4\x92\x61\x25\xef\x50\x01\x91\xc7\x7f\xc9\x58\x34\x35\x95\x9d\x00\x04\x68\x3f\x8a\x4f\xb2\xed\xdb\x2b\x7a\x99\x9c\xa6\x19\x8b\x16\xbd\x22\x88\xad\x90\x2a\x63\xf7\xcc\x97\x96\xb0\xa8\xd4\x14\x17\x60\xad\x75\x43\x2b\x8a\xff\x79\xe5\x53\xef\x57\xb3\x46\x5b\x1c\x56\xbe\x67\x00\x20\x95\x23\x5a\x37\xbd\x2a\x40\x2a\xe9\x92\x14\x7e\x65\xd1\x97\x9c\xf1\x8b\x46\x54\x36\x49\xf9\xf7\x5a\x37\x3f\x09\x93\x3c\xf7\x79\x33\x88\x5d\xd1\xc5\x19\x6c\x44\x43\x03\x25\xb0\x04\x86\xb6\xe0\x1d\x1a\x2a\x99\xc7\xe9\xd3\xc2\xdd\x9e\x51\xb8\xbe\xfc\x9d\x70\x24\xc3\xa7\x86\xa3\xca\x33\x88\xbd\xf0\x32\x70\xa6\xff\x1c\x8f\x3e\x3d\x39\x8e\xe7\x2c\x83\xb8\xa0\xdf\x03\x68\x81\xcb\x42\x2b\x85\x05\xed\x3b\xda\x92\x80\xa2\x18\xda\x4d\xc3\x09\xad\xfb\xfd\x34\x73\xe5\x7c\x16\xea\x45\x06\x31\xfd\xc4\x19\xfc\xed\xbb\xbf\xbe\xce\x20\xbe\xa1\x06\xa9\xbe\x5d\xa3\xa1\x28\xf7\x43\x8f\xa8\xff\x49\xd1\x96\x70\x72\xa4\xe1\x0c\x84\xa9\x2c\xbc\xff\x40\x53\x4b\x55\xbe\x89\x72\x03\x83\x02\x9e\x3f\x87\x24\x08\xe5\xb7\xdf\xc0\x53\xed\x0d\xa2\x46\x57\xfc\x42\x38\xd1\x6c\x92\x78\x26\xd4\x9f\x87\x51\xe0\x1b\x97\x93\x92\x5a\x5d\x22\x0d\x81\x50\x54\x58\xb9\x30\x9d\xbc\xc2\x69\xc3\xa6\x2c\xba\x67\x2c\x1a\x65\x9f\x01\x1a\x03\x93\x37\xa0\x2d\x1f\x2b\x4e\x52\x8f\x86\x3e\xfc\xe9\x0d\x28\xd9\x3c\xc8\x7e\x6e\x8c\x36\xb0\x31\xba\x3d\xf6\x9b\xc0\x33\x1b\xfb\x90\x43\x1a\x5f\x14\x55\xe2\x23\x48\xeb\x50\xa1\xd9\xe7\x54\xe8\xf8\x5b\xff\x32\x19\x95\xd9\x3a\xbe\xec\x8c\x54\x6e\x93\xc4\x93\x67\x65\x9c\xf9\x1d\x97\xa6\x2c\x7a\x04\xd2\xd7\x30\x1d\xc4\x3d\x86\x14\xdd\xb3\x28\xaa\x34\x50\x6f\xc2\xd6\x89\x22\x1a\xe0\xfe\x21\x22\x79\xec\xb1\x8d\x60\xf9\xb4\xa0\xf3\x93\x38\x89\x1e\xc5\xf0\x55\x14\xa3\xe3\x31\x82\x80\x21\x38\xdd\x0c\x85\x12\x41\x83\x04\x83\xab\x77\x20\x38\x7c\x81\xad\x76\x38\x2d\x4b\x93\xa4\x7c\xe9\xd5\x92\xa4\xe9\x1e\x2e\x7f\x67\xa4\xc3\xe4\xfd\x87\xf5\xce\x61\x32\x36\xf5\xd0\xc0\x2b\x3f\xa0\xa7\xc4\xf7\x89\xef\x4c\x68\x0c\x69\x86\x6a\x10\x65\x79\xdc\x94\x05\x5a\xdd\xdc\xe1\xed\xd9\x8d\xcf\x3c\xee\xf3\x3f\xac\x39\x5f\xc4\x7f\xa4\x49\x56\x17\x1f\x1f\xd1\xc9\xed\xd9\xcd\x88\x86\x40\x7f\x5b\xe6\xcf\x21\xfe\xbf\x2a\x68\x5e\xaf\xfb\xcd\x06\x0d\xbc\x7f\xf9\xda\xd3\x7b\x2c\x96\x7f\x67\x50\x34\x72\x7a\xc8\x1c\x61\xe6\x0b\x14\xe5\x85\xd1\x6d\x12\xbc\xdf\x9f\x4e\x3e\x7c\xbb\x74\xf6\x41\x9e\x20\x1e\x6a\xe2\x23\xe2\x09\xd8\xbe\x90\x8c\x47\xe8\x25\xb3\xd2\x0f\x44\xb3\x77\x7a\x5c\x2c\x7e\xa6\x10\x6c\x1a\xd2\xfc\x52\xa8\xb2\xc1\x0b\x62\x2c\xce\x49\x1b\xf4\xb4\xf5\x17\x43\xea\x6e\xa7\x95\x45\x9f\xc8\x64\x60\xe0\x64\x78\xef\x51\xa6\x9f\x9b\x34\xd6\x70\x38\x84\x0f\x8a\x30\x07\xf2\x4f\x19\x0b\x24\x8e\x07\x63\x60\x90\xee\x49\x65\x19\xae\xbb\x35\x0a\x7f\x97\xd2\x74\x29\x2b\x90\x1e\xfc\x39\xe0\x27\xe0\xc1\xec\x17\x1b\x87\xc6\xcf\x4e\xba\x9c\xd1\xc7\x71\xfe\xfb\x90\x5b\x7e\xe9\x03\x25\x29\x9f\x96\x65\x12\xcf\xf6\x9e\xf1\xfe\x64\x19\x28\xf2\x92\x68\x1d\xbf\x18\x76\xc5\x36\x83\xd8\x23\xdf\x93\x4a\x2c\xa6\x0f\xe5\x95\xe7\xb0\xe8\x15\x84\x8b\x76\xa3\x6d\x6f\x10\xac\x0e\xf4\x05\x99\x4e\x55\x38\x86\xa0\xd4\x68\x69\xd6\xaf\x1b\x5d\x7c\x3c\x52\x77\xf2\x88\x79\xf2\xb5\x4d\x9a\x91\xec\xbc\x0c\xc6\xae\x1e\x36\x60\x39\x90\xa1\xc3\x0d\x07\x9e\x95\xfc\x5f\x6a\x74\x65\x51\xb8\xff\x59\x12\x79\x2b\x3e\x62\x52\xd4\x42\xd1\xe4\x5f\xfa\xf7\x19\xbc\xdc\xdb\xf0\x2b\xed\xe4\x66\x97\x0c\x1e\x19\x0c\x17\x46\xbe\x9c\xff\x73\x75\xbe\xf8\x31\x18\x52\xa0\x7f\xbc\x18\x6c\xbe\x40\x52\xf7\x8e\x6e\xff\x50\xea\xed\xd8\x2a\x83\x05\x4a\x8f\x2f\xb8\xd0\xa6\x08\xf8\xac\xac\xd2\x63\xff\xe9\x56\xf8\xff\x1e\xa0\xd3\x25\x94\xd8\x20\x35\x8e\x8c\x53\x16\xd1\x01\xc8\x97\x0d\x62\x97\xbc\x3e\x85\x13\x08\x6b\x2c\xb4\x2a\xe9\xc8\xfe\x5f\x00\x00\x00\xff\xff\xfe\x9a\xce\x0f\xaf\x0d\x00\x00") + +func testImagesAgnhostServeHostnameServe_hostnameGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostServeHostnameServe_hostnameGo, + "test/images/agnhost/serve-hostname/serve_hostname.go", + ) +} + +func testImagesAgnhostServeHostnameServe_hostnameGo() (*asset, error) { + bytes, err := testImagesAgnhostServeHostnameServe_hostnameGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/serve-hostname/serve_hostname.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostTestWebserverTestWebserverGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x55\x4b\x6f\xdb\x46\x10\x3e\x73\x7f\xc5\x80\x40\x53\xca\xe0\xc3\x79\x1c\x0a\x15\x39\xa8\xb2\x5d\x0b\xb1\x25\x41\x94\xe3\x04\x45\x0f\x2b\x72\x48\x0e\x42\xee\x32\xbb\x43\x53\x42\xe0\xff\x5e\xec\x4a\x71\xe3\x26\x40\x73\x5a\x71\x77\x66\xbe\x6f\xbe\x79\x28\x3b\x13\x73\xdd\x1f\x0c\xd5\x0d\xc3\xab\xf3\x97\x6f\x60\xdb\x20\xbc\x1b\x76\x68\x14\x32\x5a\x98\x0d\xdc\x68\x63\x53\x21\x6e\xa8\x40\x65\xb1\x84\x41\x95\x68\x80\x1b\x84\x59\x2f\x8b\x06\xe1\xf4\x12\xc3\x7b\x34\x96\xb4\x82\x57\xe9\x39\x44\xce\x20\x3c\x3d\x85\x93\xdf\xc5\x41\x0f\xd0\xc9\x03\x28\xcd\x30\x58\x04\x6e\xc8\x42\x45\x2d\x02\xee\x0b\xec\x19\x48\x41\xa1\xbb\xbe\x25\xa9\x0a\x84\x91\xb8\xf1\x20\xa7\x10\xa9\xf8\x78\x0a\xa0\x77\x2c\x49\x81\x84\x42\xf7\x07\xd0\xd5\xb7\x56\x20\x59\x08\x00\x80\x86\xb9\x9f\x66\xd9\x38\x8e\xa9\xf4\x2c\x53\x6d\xea\xac\x3d\x5a\xd9\xec\x66\x31\xbf\x5c\xe6\x97\xc9\xab\xf4\x5c\x88\x3b\xd5\xa2\xb5\x60\xf0\xf3\x40\x06\x4b\xd8\x1d\x40\xf6\x7d\x4b\x85\xdc\xb5\x08\xad\x1c\x41\x1b\x90\xb5\x41\x2c\x81\xb5\xe3\x39\x1a\x62\x52\x75\x0c\x56\x57\x3c\x4a\x83\xa2\x24\xcb\x86\x76\x03\x3f\x13\xe8\x2b\x2b\xb2\xf0\xad\x81\x56\x20\x15\x84\xb3\x1c\x16\x79\x08\x7f\xcc\xf2\x45\x1e\x8b\xfb\xc5\xf6\x7a\x75\xb7\x85\xfb\xd9\x66\x33\x5b\x6e\x17\x97\x39\xac\x36\x30\x5f\x2d\x2f\x16\xdb\xc5\x6a\x99\xc3\xea\x0a\x66\xcb\x8f\xf0\x6e\xb1\xbc\x88\x01\x89\x1b\x34\x80\xfb\xde\x38\xee\xda\x00\x39\xe9\xb0\x4c\x45\x8e\xf8\x0c\xbc\xd2\x47\x32\xb6\xc7\x82\x2a\x2a\xa0\x95\xaa\x1e\x64\x8d\x50\xeb\x07\x34\x8a\x54\x0d\x3d\x9a\x8e\xac\x2b\x9e\x05\xa9\x4a\xd1\x52\x47\x2c\xd9\x7f\x7f\x97\x4e\x2a\xce\x32\x21\xb2\x0c\xd6\xb2\xf8\xe4\xe2\x30\x5a\x1e\x71\x67\xd1\x3c\xa0\x01\x5d\x55\x68\x2c\x48\x60\x52\x07\x18\x71\x07\xa7\x07\x6e\x24\x1f\x7f\xbb\x57\xeb\xe2\x17\xbe\x03\x52\xd1\xff\x28\x92\x10\xd4\xf5\xda\x30\x44\x22\x08\xab\x8e\x43\x11\x84\xad\xae\xdd\xa1\x90\x33\x57\xe2\x50\x88\x20\xac\x89\x9b\x61\x97\x16\xba\xcb\x6c\x5f\xbd\x7c\x9d\x15\x7a\x67\x64\x28\x26\x9e\xe4\xbc\x2b\xb7\x68\xf9\xfe\x89\x1f\x59\xd7\x7f\xc7\x32\xd7\xaa\xd1\x96\x61\xee\x1c\x52\xf1\x20\xcd\xf7\xe6\x6f\xe1\x85\x8f\x97\xce\x75\xd7\x49\x55\x7e\x11\xc1\x9d\xc5\x29\x00\x84\x8e\x6d\xf2\x44\x37\x8c\x45\x90\x37\xda\xf0\x14\xc2\x9c\xa5\x61\x9f\xa5\x2b\x0b\xc2\xf5\x76\xbb\xf6\xa9\xfe\x6b\x7a\xa3\x55\x3d\x85\xff\x35\x75\xcd\xe2\xb4\xaf\xe9\x01\x15\x24\x89\x13\x24\x86\xb1\xa1\xa2\x79\xd2\x52\x1d\x8e\x83\x74\xaa\x30\x96\xae\x47\x9d\xd3\xdd\xe6\x06\x7a\xc9\x4d\x0c\x54\x01\x31\xe0\x9e\x2c\xdb\xd4\xc1\xcf\x4c\x6d\xa7\x00\xc7\xd4\x6e\xe5\x9e\xba\xa1\x5b\xba\xcb\xe8\x7c\x12\x8b\x60\x33\x28\x97\x62\x27\x49\xc5\xe2\x51\x78\x69\x22\x11\xf8\x72\x90\x62\xa7\x6d\x35\xa8\x02\x48\x11\x47\x13\xf8\x22\x82\xff\x0a\x97\x5e\xb5\xb2\xb6\xd1\x24\x5d\x28\x7e\x2f\x4d\xf4\xe2\xc8\x3c\x74\x47\x18\xc3\x6f\xe7\x31\x84\x6b\x17\x4e\x0d\xdd\x0e\x4d\x1a\x4e\x1c\x8e\x0f\xea\x50\xa3\xa2\x2b\xe1\xec\x99\xf2\x31\x48\x53\x5b\xf8\xeb\x6f\x37\x49\xaa\xf6\xa8\x95\x85\xe9\x5b\x3f\xed\x69\xce\x86\xfa\xb5\xc1\x8a\xf6\x51\x98\x85\xf1\xf1\xf6\x8a\x5a\xcc\x3d\xa1\xc8\x7f\x5f\x90\x71\xaf\x93\xc9\x44\x88\xc0\xdf\x5c\x4b\x55\xb6\x78\x35\xa8\xe2\xe8\xe6\x28\x44\xe3\xd1\x7b\x83\xb6\xd7\xca\xe2\xbd\x21\x46\x13\x83\x81\xb3\xd3\xfd\xe7\x01\x2d\x7b\x0a\xc1\x98\x5e\xa3\x2c\xd1\x44\x93\x34\x47\x8e\xc2\xb9\xdb\x37\xc9\x5c\x2b\x36\xba\x0d\x5d\xca\x86\x1e\x24\x63\x38\x11\x41\x90\x65\xb0\x44\x2c\xb1\xf4\x73\xd9\xea\x42\xb6\xd0\x1b\xbd\x3f\xb8\xd5\xf2\xed\xe2\x5d\x2f\x9e\xe6\x46\xc3\xa8\xcd\xa7\xf4\x07\x50\xb3\xa2\x40\x6b\xbf\x62\x25\xb3\xb6\xd5\x63\xb2\x32\x54\x93\x72\xc0\x67\x1e\xf2\xa7\x9c\xe6\x06\x4b\x54\x4c\xb2\xb5\xce\x93\xcd\x80\x3f\xef\x7c\x8b\xdc\xe8\xd2\x3b\xfe\x79\xb9\x8d\x61\xbd\xca\xb7\x31\xac\xd6\x7e\x71\xfd\x7c\x98\xa3\x89\x0f\x73\xb1\xdc\xc6\x1f\x92\xdb\x7d\xb2\xc1\xcf\x5b\xfd\x09\x55\xfc\x0e\xb1\x4f\x66\x2d\x3d\x60\x7c\x67\xd1\x24\xb3\x1a\x15\xc7\x1f\x92\x53\x29\xb0\x4c\xee\x89\x9b\xf8\x99\xf8\xb1\x3b\x51\x71\xb2\x3d\xf4\x4f\xf2\x5f\x90\xf5\x8b\x7d\x51\x25\xb7\xba\xf4\xf3\x92\xe4\xe4\xfe\x73\xac\x86\xa1\x2f\x25\x63\x52\x62\xa7\x81\xac\xfa\x95\x61\x67\x1c\xbc\xdb\x16\xaf\xcf\xdf\x58\x11\x04\xe6\x94\x4a\x7a\x81\x6d\x14\x7e\x17\xc5\xc3\x54\x36\xf5\x4d\xe7\x86\x39\x1a\x63\x30\x13\x11\x3c\xba\x8e\xab\x35\xb4\xba\x4e\xaf\x24\xcb\xf6\xd8\x90\x37\x64\x19\xd5\x4c\x95\xde\x21\xaa\x3a\x4e\xf3\xde\x90\xe2\x2a\x0a\xa7\xbf\x94\x61\x0c\x6e\x62\x26\x31\x28\x6a\x7d\xd3\x5a\x6c\xb1\x60\xf8\xf2\x28\x1e\xc5\x3f\x01\x00\x00\xff\xff\xbc\x81\x8d\x15\xc0\x07\x00\x00") + +func testImagesAgnhostTestWebserverTestWebserverGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostTestWebserverTestWebserverGo, + "test/images/agnhost/test-webserver/test-webserver.go", + ) +} + +func testImagesAgnhostTestWebserverTestWebserverGo() (*asset, error) { + bytes, err := testImagesAgnhostTestWebserverTestWebserverGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/test-webserver/test-webserver.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookAddlabelGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x53\x41\x6f\xdb\x38\x13\x3d\x8b\xbf\x62\xaa\x43\x61\x07\xae\x94\xe4\x54\xf8\x83\x0f\xfe\xd2\x14\xeb\x6d\xd6\x5e\xd8\x4e\x8a\x22\x08\x90\x91\x38\x96\x98\xd0\x24\x4b\x52\x56\x85\xc0\xff\x7d\x41\xc6\xde\xb5\x37\x29\x36\x87\xea\x26\xf2\xcd\xbc\x37\x6f\x1e\xf3\x13\x76\xa1\x4d\x67\x45\x55\x7b\x38\x3f\x3d\xfb\x08\xcb\x9a\xe0\x4b\x53\x90\x55\xe4\xc9\xc1\xb8\xf1\xb5\xb6\x2e\x63\xec\x4a\x94\xa4\x1c\x71\x68\x14\x27\x0b\xbe\x26\x18\x1b\x2c\x6b\x82\xdd\xcd\x00\x6e\xc8\x3a\xa1\x15\x9c\x67\xa7\xd0\x0b\x80\x74\x77\x95\xf6\xff\xc7\x3a\xdd\xc0\x1a\x3b\x50\xda\x43\xe3\x08\x7c\x2d\x1c\xac\x84\x24\xa0\x1f\x25\x19\x0f\x42\x41\xa9\xd7\x46\x0a\x54\x25\x41\x2b\x7c\x1d\x49\x76\x2d\x32\xf6\x6d\xd7\x40\x17\x1e\x85\x02\x84\x52\x9b\x0e\xf4\xea\x10\x05\xe8\x19\x03\x00\xa8\xbd\x37\xc3\x3c\x6f\xdb\x36\xc3\xa8\x32\xd3\xb6\xca\xe5\x33\xca\xe5\x57\x93\x8b\xcb\xe9\xe2\xf2\xc3\x79\x76\xca\xd8\xb5\x92\xe4\x1c\x58\xfa\xde\x08\x4b\x1c\x8a\x0e\xd0\x18\x29\x4a\x2c\x24\x81\xc4\x16\xb4\x05\xac\x2c\x11\x07\xaf\x83\xce\xd6\x0a\x2f\x54\x35\x00\xa7\x57\xbe\x45\x4b\x8c\x0b\xe7\xad\x28\x1a\x7f\x64\xd0\x5e\x95\x70\x70\x08\xd0\x0a\x50\x41\x3a\x5e\xc0\x64\x91\xc2\xff\xc7\x8b\xc9\x62\xc0\xbe\x4e\x96\xbf\xcd\xae\x97\xf0\x75\x3c\x9f\x8f\xa7\xcb\xc9\xe5\x02\x66\x73\xb8\x98\x4d\x3f\x4d\x96\x93\xd9\x74\x01\xb3\xcf\x30\x9e\x7e\x83\x2f\x93\xe9\xa7\x01\x90\xf0\x35\x59\xa0\x1f\xc6\x06\xed\xda\x82\x08\xd6\x11\xcf\xd8\x82\xe8\x88\x7c\xa5\x9f\xc5\x38\x43\xa5\x58\x89\x12\x24\xaa\xaa\xc1\x8a\xa0\xd2\x1b\xb2\x4a\xa8\x0a\x0c\xd9\xb5\x70\x61\x79\x0e\x50\x71\x26\xc5\x5a\x78\xf4\xf1\xff\xc5\x38\x19\x3b\xc9\x19\x33\x58\x3e\x86\x26\x2d\x15\xb5\xd6\x8f\x8c\x89\xb5\xd1\xd6\x43\x8f\x25\x29\xa9\x52\x73\xa1\xaa\xfc\xc1\x69\x95\x32\x96\xa4\x8f\x1f\x5d\x26\x74\x8e\x46\xe4\xc8\x77\x54\xf9\xe6\x2c\x65\xc9\x9a\x3c\x6e\xce\xe0\x00\xb1\xc6\xb2\x16\x8a\x6c\x97\x9b\xc7\x2a\x1c\xb8\x3c\x80\x9e\xe1\x7b\xdc\xa3\xd4\x55\xbe\x39\x4f\x59\x9f\xb1\x52\x2b\x17\x89\x91\xf3\xcf\xc2\x3a\x7f\x85\x05\xc9\x3f\xd1\x97\x35\x04\xd7\x55\x05\x23\xb8\xbf\x8d\xc1\x88\xdf\x13\xa4\xda\xa4\x43\x48\x91\xf3\x74\x00\xa9\x41\x5f\x87\xdf\xc8\xc3\xd1\x63\x2e\x43\x07\x17\xee\x36\x28\x1b\x4a\x87\xf0\x14\xc0\xc4\x3f\xc4\x9b\x00\xee\xc8\xa5\xdb\xed\x73\xd3\xbb\xfb\x48\x3e\xe6\x5c\x04\xd3\x50\xfe\x2a\x05\xf9\x21\xe9\x81\x9a\xc8\x0e\x07\xec\x8d\xe1\xe8\xe9\xcd\xb4\x96\x8c\xc4\x92\x7e\x05\x75\x9f\xb1\x3c\x87\x31\xe7\x80\x10\xc1\x3f\xb1\x2a\xbc\x9d\x90\x22\x5d\x3c\x50\xe9\xd9\xaa\x51\x25\x20\xe7\x51\x72\x0f\x2d\x6c\xce\xb2\xf1\x3e\x1a\x73\xda\x08\x6a\xfb\x70\x72\x7c\xe8\x8c\x0e\x89\x7e\x62\x49\x58\x7f\x76\xd3\x3b\xef\x67\x13\xb5\xd2\xbd\xb4\x44\x29\xc3\xb8\xc8\xf7\xb4\x7d\x96\xe8\xe2\x01\x86\xa3\xe0\x44\x53\xfa\x50\xb5\x0b\x5b\x36\x8b\x12\xfe\x20\x8f\x70\x1f\x22\x3a\x4c\xf7\xb3\x0f\xf4\x5a\x78\x5a\x1b\xdf\xa5\xf7\x2c\xd9\x3e\x6d\x59\x62\xb1\x0d\x5d\xd0\x66\x73\xfa\xde\x90\xf3\xbb\xf2\x6c\x8e\x2d\x4b\xc8\xda\x70\x1b\xba\x64\xd7\x6a\x8d\xd6\xd5\x28\x7b\x16\xdb\x01\xbc\xd7\xc5\x43\x9f\x25\x62\x05\x01\xf4\x6e\x04\x4a\xc8\xa8\x22\x8a\xbf\xb4\x56\xdb\x1e\x59\xdb\x67\x49\x62\xc9\x37\x56\x81\xd7\x37\x67\x2f\xc6\xdd\x61\xb6\x8c\x25\x36\xda\xf2\xb7\x0f\xc3\x11\xbc\xe6\x4f\x14\x7d\x84\xcc\xc6\x52\xea\x96\x38\x8c\xc0\xdb\x86\x18\x4b\x8c\xdf\x55\xc7\xb0\x2c\x3b\x43\xbf\x2f\x66\xd3\xf8\xc3\x92\x68\xe0\x4d\x58\xf7\x00\x6a\x74\x71\x43\x01\xae\x8b\x87\x03\xeb\xb2\x78\xee\x6e\x8f\x96\x7d\xc7\x12\xd7\x8a\x90\xbf\x27\x96\x94\xe8\x08\x24\xa9\xde\xab\x85\x7d\x18\x8d\xe0\x74\x18\xa7\x3f\x12\xfb\x9c\xdf\x11\xdc\xde\x15\x9d\xa7\xde\xcb\x47\xdd\xff\x49\x4d\x18\x03\x46\xf0\xde\xf8\x1d\xf7\xbb\xbd\xfa\x37\xb1\xbc\xf6\x7a\xdf\x4c\xf5\x8f\x67\x61\xd3\x31\xf1\xff\x4d\xfa\xef\x47\xfb\x16\x36\x4e\x2b\x6c\xa4\x0f\xcd\xf3\x1c\x50\x5a\x42\xde\x81\x23\x1f\x22\xb2\x0f\xd2\xfb\xe3\x2e\x6c\xcb\xfe\x0a\x00\x00\xff\xff\x2a\xc0\xc9\x38\xea\x07\x00\x00") + +func testImagesAgnhostWebhookAddlabelGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookAddlabelGo, + "test/images/agnhost/webhook/addlabel.go", + ) +} + +func testImagesAgnhostWebhookAddlabelGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookAddlabelGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/addlabel.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookAddlabel_testGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x54\x61\x6f\xdb\x36\x10\xfd\x2c\xfe\x8a\xab\x86\x0e\x72\xe0\x52\x4d\x3f\x6d\x1e\xf2\xc1\x4b\x52\xcc\x68\x6b\x0f\xb6\xbb\xa2\xe8\x8a\x81\xa6\x4e\x12\x13\x89\x64\xc9\x93\x15\x23\xf0\x7f\x1f\x28\xc9\x4d\xbc\xa4\xdb\xb2\x05\x88\x21\xf1\xde\xbd\xf7\xee\x74\xc7\xf4\x84\x9d\x1b\xbb\x73\xaa\x28\x09\x5e\xbd\x3c\xfd\x11\xd6\x25\xc2\x9b\x66\x83\x4e\x23\xa1\x87\x69\x43\xa5\x71\x9e\x33\xf6\x56\x49\xd4\x1e\x33\x68\x74\x86\x0e\xa8\x44\x98\x5a\x21\x4b\x84\x21\x32\x86\xdf\xd0\x79\x65\x34\xbc\xe2\x2f\x21\x09\x80\x78\x08\xc5\xa3\x9f\xd8\xce\x34\x50\x8b\x1d\x68\x43\xd0\x78\x04\x2a\x95\x87\x5c\x55\x08\x78\x23\xd1\x12\x28\x0d\xd2\xd4\xb6\x52\x42\x4b\x84\x56\x51\xd9\x89\x0c\x14\x9c\x7d\x1c\x08\xcc\x86\x84\xd2\x20\x40\x1a\xbb\x03\x93\xdf\x47\x81\x20\xc6\x00\x00\x4a\x22\x3b\x49\xd3\xb6\x6d\xb9\xe8\x5c\x72\xe3\x8a\xb4\xea\x51\x3e\x7d\x3b\x3b\xbf\x9c\xaf\x2e\x5f\xbc\xe2\x2f\x19\x7b\xaf\x2b\xf4\x1e\x1c\x7e\x69\x94\xc3\x0c\x36\x3b\x10\xd6\x56\x4a\x8a\x4d\x85\x50\x89\x16\x8c\x03\x51\x38\xc4\x0c\xc8\x04\x9f\xad\x53\xa4\x74\x31\x06\x6f\x72\x6a\x85\x43\x96\x29\x4f\x4e\x6d\x1a\x3a\x6a\xd0\xc1\x95\xf2\x70\x1f\x60\x34\x08\x0d\xf1\x74\x05\xb3\x55\x0c\x3f\x4f\x57\xb3\xd5\x98\x7d\x98\xad\x7f\x59\xbc\x5f\xc3\x87\xe9\x72\x39\x9d\xaf\x67\x97\x2b\x58\x2c\xe1\x7c\x31\xbf\x98\xad\x67\x8b\xf9\x0a\x16\xaf\x61\x3a\xff\x08\x6f\x66\xf3\x8b\x31\xa0\xa2\x12\x1d\xe0\x8d\x75\xc1\xbb\x71\xa0\x42\xeb\x30\xe3\x6c\x85\x78\x24\x9e\x9b\xde\x8c\xb7\x28\x55\xae\x24\x54\x42\x17\x8d\x28\x10\x0a\xb3\x45\xa7\x95\x2e\xc0\xa2\xab\x95\x0f\x1f\xcf\x83\xd0\x19\xab\x54\xad\x48\x50\xf7\xfe\xa0\x1c\xce\x4e\x52\xc6\xac\x90\xd7\x81\xa4\xc5\x4d\x69\xcc\x35\x63\xaa\xb6\xc6\x11\x24\x2c\x8a\x51\x4b\x93\x29\x5d\xa4\x57\xde\xe8\x98\x45\xb1\xc3\xbc\x42\x49\xe1\x91\xd0\x87\xde\xc5\x8c\x45\x21\x6a\x05\xc9\x12\xe2\x42\x51\xd9\x6c\xb8\x34\x75\x8a\x5b\xa1\x6d\x79\xd3\xe5\xbe\xe8\xc2\x21\xed\xfa\x07\xcf\x95\x49\x85\x55\xa9\xc8\x06\xaf\xe9\xf6\x34\x66\x91\x34\x0e\xb7\xa7\x70\x1f\x11\x8e\xfa\x60\x8d\x24\x8e\x83\xb5\x90\xa5\xd2\xe8\x76\xa9\xbd\x2e\xc2\x81\x4f\x03\xa8\x87\x7f\x13\xe7\x1a\x4d\xaa\xc6\x98\x8d\x18\xcb\x1b\x2d\x61\x8d\x9e\xa6\x59\xf6\x56\x6c\xb0\x4a\x08\x4e\x86\xb2\xf8\x7a\x04\xb7\x2c\x0a\x6f\xe7\xc2\xa3\x87\xc9\x19\x7c\xfa\xec\xc9\x35\x92\x42\x20\xd2\xa2\x46\xb8\xfb\x0b\x43\xa1\x0b\x16\x45\x4a\x2b\x52\xa2\xea\xf8\x3c\x40\x2d\xec\xa7\x3e\xf6\xf9\x2b\x04\x6f\x2c\x4a\xc2\x6c\xc0\x3c\x02\xd9\x07\x85\xf0\xdf\xc9\x4c\xee\xe9\xc4\x22\xcb\x20\x57\xce\x13\x54\x21\x3d\x1e\x07\xd4\x91\xe8\x04\x40\xab\xaa\x3b\x3f\x56\x9a\x3c\x94\xba\x0d\x7c\x98\xbd\xe8\xb9\x26\x10\xef\xd0\xc7\xfb\x90\xdb\xfd\x7c\xdb\x82\x47\x69\x74\xf6\x77\x1e\x1e\xd1\x32\x61\xd6\x1f\xd1\xfa\x37\x3e\x1f\xc9\x1d\xc3\x7f\x71\xaf\x32\xac\xad\x21\xd4\x04\x8d\xcd\x04\xe1\x13\x8b\xf8\x96\xe4\xff\x6d\xf6\x9e\xb1\x28\xac\xf8\x1f\x63\x20\x19\xc6\xcd\x09\x5d\x20\xdc\x4d\x60\x28\x87\xf8\xb2\xd1\x09\x49\x1e\xca\x1a\x43\x98\xe0\x87\x43\x1b\x45\xe1\x0a\x44\x4f\x81\xa5\xdf\x2a\x7e\x6e\x74\xae\x8a\x77\xc2\xde\x2e\x36\x57\x28\xe9\x1d\x92\x98\x40\xbf\x55\xfc\xee\xe8\xf6\x60\x9e\x24\x3f\xea\xc5\x7e\xdf\xf1\x8a\x76\x0c\xe8\x5c\x20\x0e\x6b\xcd\xdf\x09\xe7\x4b\x51\x25\x83\xe0\xa8\xeb\x61\xde\x41\x9e\x9d\x85\x31\xec\xfd\x44\xc4\x5f\x0b\x12\x55\x82\xce\x75\x98\x9e\x0d\xb7\x0a\xdb\xc0\xb5\x3d\xe5\xd3\xc3\x65\xb0\xec\x4e\x6f\x97\x3d\xe3\x04\xbe\x3f\x0e\x76\xa7\x43\x11\x13\x18\xd6\x99\x2f\x45\x7b\x79\x43\xa8\x03\xe6\x76\x29\xda\x09\x38\xd1\xee\x07\xd3\xe8\xad\x09\x17\xe8\xe4\x0c\xc4\x61\xd3\x7b\xed\x83\xdf\x03\x84\xff\xda\xdd\x62\x47\xd6\xbb\x9b\x6b\xb1\xb9\x3a\x2a\xbc\x3b\xe4\x17\x28\x4d\x86\x5d\x4e\xf2\xe9\xf3\x66\x47\x98\x1c\x33\x8d\x3a\x81\x47\x3b\xf2\xa0\x25\x7d\x4f\xee\x5a\x7c\x06\x07\x65\x3e\xb5\xb6\xda\x25\x4e\xb4\x4f\xa6\x0b\x43\x15\x45\x66\x73\xb5\xde\xd9\xae\x01\xc3\x05\xce\xc3\xfb\x22\x3f\xfa\x6e\x01\x35\x0c\xcd\x01\x35\xc7\x36\x19\x92\x47\x7c\xa6\x09\x5d\x2e\x24\x26\x1d\xbc\xf7\xd8\x4d\xc1\x7b\x5d\x1f\xe6\x20\xb8\x1f\x88\x9e\x36\x0c\x42\x52\x23\xaa\x20\x3e\xa4\xf3\xe4\xe4\xaf\xb3\x7b\x60\x7c\x76\xf0\x77\x81\x68\x2f\xbf\x34\xa2\x4a\xfa\x74\xde\x0f\x6b\xd8\x20\x7e\xbc\x8e\xa3\xaf\xda\x97\xce\x19\x97\x27\xf1\xef\xfa\x80\x80\xe7\xdf\x6d\xc7\x50\x18\xea\x1f\xba\xb6\x4f\xe0\xf9\x36\x1e\xc3\x3f\xd1\x8e\x87\x8b\xff\xd1\xef\x1e\xea\xda\x8f\xc2\x66\xef\xd9\x9f\x01\x00\x00\xff\xff\xdd\x8c\x48\xdf\xa1\x09\x00\x00") + +func testImagesAgnhostWebhookAddlabel_testGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookAddlabel_testGo, + "test/images/agnhost/webhook/addlabel_test.go", + ) +} + +func testImagesAgnhostWebhookAddlabel_testGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookAddlabel_testGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/addlabel_test.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookAlwaysallowGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x7c\x52\x5d\x6f\xdb\x36\x14\x7d\x36\x7f\xc5\x81\x1e\x0a\x3b\x48\xa4\xc4\x40\x81\x2d\x43\x1e\xb4\x24\xc5\x84\x76\x36\x60\xb9\x2d\xfa\x48\x4b\xd7\xd2\x85\x29\x92\x23\x29\xab\x46\xd0\xff\x3e\x50\x72\x86\x64\x29\xfa\x64\x93\xf7\xe8\x7c\xdc\xc3\xec\x42\xdc\x1b\x7b\x72\xdc\xb4\x01\xcb\xeb\x9b\xdf\xb1\x6d\x09\x1f\xfb\x1d\x39\x4d\x81\x3c\xf2\x3e\xb4\xc6\xf9\x54\x88\x4f\x5c\x91\xf6\x54\xa3\xd7\x35\x39\x84\x96\x90\x5b\x59\xb5\x84\xf3\xe4\x12\x5f\xc8\x79\x36\x1a\xcb\xf4\x1a\xf3\x08\x48\xce\xa3\x64\xf1\x87\x38\x99\x1e\x9d\x3c\x41\x9b\x80\xde\x13\x42\xcb\x1e\x7b\x56\x04\xfa\x5e\x91\x0d\x60\x8d\xca\x74\x56\xb1\xd4\x15\x61\xe0\xd0\x8e\x22\x67\x8a\x54\x7c\x3b\x13\x98\x5d\x90\xac\x21\x51\x19\x7b\x82\xd9\xbf\x44\x41\x06\x21\x00\xa0\x0d\xc1\xde\x66\xd9\x30\x0c\xa9\x1c\x5d\xa6\xc6\x35\x99\x9a\x50\x3e\xfb\x54\xdc\x3f\xae\xca\xc7\xab\x65\x7a\x2d\xc4\x67\xad\xc8\x7b\x38\xfa\xa7\x67\x47\x35\x76\x27\x48\x6b\x15\x57\x72\xa7\x08\x4a\x0e\x30\x0e\xb2\x71\x44\x35\x82\x89\x3e\x07\xc7\x81\x75\x73\x09\x6f\xf6\x61\x90\x8e\x44\xcd\x3e\x38\xde\xf5\xe1\xd5\x82\x9e\x5d\xb1\xc7\x4b\x80\xd1\x90\x1a\x49\x5e\xa2\x28\x13\xfc\x99\x97\x45\x79\x29\xbe\x16\xdb\xbf\xd6\x9f\xb7\xf8\x9a\x6f\x36\xf9\x6a\x5b\x3c\x96\x58\x6f\x70\xbf\x5e\x3d\x14\xdb\x62\xbd\x2a\xb1\xfe\x80\x7c\xf5\x0d\x1f\x8b\xd5\xc3\x25\x88\x43\x4b\x0e\xf4\xdd\xba\xe8\xdd\x38\x70\x5c\x1d\xd5\xa9\x28\x89\x5e\x89\xef\xcd\x64\xc6\x5b\xaa\x78\xcf\x15\x94\xd4\x4d\x2f\x1b\x42\x63\x8e\xe4\x34\xeb\x06\x96\x5c\xc7\x3e\x96\xe7\x21\x75\x2d\x14\x77\x1c\x64\x18\xcf\x6f\xe2\xa4\xe2\x22\x13\xc2\xca\xea\x10\x49\x06\xda\xb5\xc6\x1c\x84\xe0\xce\x1a\x17\x30\x17\xb3\x24\x70\x47\x89\x10\xb3\xe4\xf0\x9b\x4f\xd9\x64\xd2\x72\x26\xeb\xb3\x42\x76\xbc\x49\xc4\xac\xa3\x20\x8f\x37\x78\x81\xe8\x64\xd5\xb2\x26\x77\xca\xec\xa1\x89\x17\x3e\x8b\xa0\x09\xfe\x8c\x3b\x28\xd3\x64\xc7\x65\x22\x16\x42\x64\x19\xa4\x1a\xe4\xc9\xe7\x4a\x99\xe1\x81\x94\x3c\x7d\xe0\x23\x95\x54\x19\x5d\x7b\x78\x45\x64\xfd\x18\x7f\xcf\x47\x82\x3f\xdf\x4b\x5d\x43\xc6\x2f\x7c\xfc\x19\x6b\x27\x1f\x3c\x3a\x59\x53\xec\x77\x7a\x98\xbd\xae\x62\xfc\x54\xc4\x7f\xbf\xd2\x99\x4b\x87\xe3\x4d\x9a\x3f\xc7\xdb\xd0\x91\x69\x58\xe0\xe2\xf5\xa5\xb7\x26\x96\xf1\x24\x66\x31\x42\xfa\x65\xbe\x5c\xa4\x85\xde\x9b\x79\x32\x71\x5f\x8d\x96\xae\xe2\xb3\xbf\xaa\xa3\xc4\xe4\x3f\x96\x13\x13\xbc\x7f\xb6\x9f\x2c\xc4\x2c\xae\x37\x2d\xe3\x78\xfe\x1e\x17\x98\x8e\xe3\x78\xf1\x96\xbe\x92\x4a\x45\x96\x97\x32\x91\xc4\x8d\x3e\xff\x33\x76\x7b\x87\x9f\x19\x7e\xfa\xf1\x7f\x64\x3a\x6e\x81\x6a\xdc\x21\xb8\x9e\xde\x8c\x37\xe4\x7b\x15\x70\x87\x77\x53\xc5\x69\x19\x64\xe8\xfd\xd3\xdf\xe4\xbd\x6c\xe8\x16\xc9\xb8\xe0\xf3\xb3\xf9\x59\x13\xc9\xa8\x19\x7a\xa7\xf1\xee\x35\xb9\xf8\x21\xfe\x0d\x00\x00\xff\xff\xf1\xee\x8b\x02\xb2\x04\x00\x00") + +func testImagesAgnhostWebhookAlwaysallowGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookAlwaysallowGo, + "test/images/agnhost/webhook/alwaysallow.go", + ) +} + +func testImagesAgnhostWebhookAlwaysallowGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookAlwaysallowGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/alwaysallow.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookAlwaysdenyGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x92\x41\x6f\xeb\x36\x10\x84\xcf\xe6\xaf\x18\xe8\xf0\x60\x07\x7e\x52\xec\xd3\x43\x8a\x1c\xd4\x24\x45\x85\xa4\x36\x60\x39\x09\x72\x5c\x4b\x6b\x89\x30\x45\xb2\x24\x65\x45\x08\xf2\xdf\x0b\xd9\x4e\x61\x37\xbd\x49\xdc\x8f\xb3\xb3\xb3\x4c\xae\xc4\x9d\xb1\xbd\x93\x55\x1d\x30\xbf\x9e\xfd\xc2\xba\x66\x3c\xb6\x1b\x76\x9a\x03\x7b\xa4\x6d\xa8\x8d\xf3\xb1\x10\x4f\xb2\x60\xed\xb9\x44\xab\x4b\x76\x08\x35\x23\xb5\x54\xd4\x8c\x53\x65\x8a\x17\x76\x5e\x1a\x8d\x79\x7c\x8d\xf1\x00\x44\xa7\x52\x34\xf9\x4d\xf4\xa6\x45\x43\x3d\xb4\x09\x68\x3d\x23\xd4\xd2\x63\x2b\x15\x83\xdf\x0b\xb6\x01\x52\xa3\x30\x8d\x55\x92\x74\xc1\xe8\x64\xa8\x0f\x4d\x4e\x12\xb1\x78\x3b\x09\x98\x4d\x20\xa9\x41\x28\x8c\xed\x61\xb6\xe7\x14\x28\x08\x01\x00\x75\x08\xf6\x26\x49\xba\xae\x8b\xe9\xe0\x32\x36\xae\x4a\xd4\x91\xf2\xc9\x53\x76\xf7\xb0\xc8\x1f\x7e\xce\xe3\x6b\x21\x9e\xb5\x62\xef\xe1\xf8\xef\x56\x3a\x2e\xb1\xe9\x41\xd6\x2a\x59\xd0\x46\x31\x14\x75\x30\x0e\x54\x39\xe6\x12\xc1\x0c\x3e\x3b\x27\x83\xd4\xd5\x14\xde\x6c\x43\x47\x8e\x45\x29\x7d\x70\x72\xd3\x86\x8b\x80\xbe\x5c\x49\x8f\x73\xc0\x68\x90\x46\x94\xe6\xc8\xf2\x08\xbf\xa7\x79\x96\x4f\xc5\x6b\xb6\xfe\x73\xf9\xbc\xc6\x6b\xba\x5a\xa5\x8b\x75\xf6\x90\x63\xb9\xc2\xdd\x72\x71\x9f\xad\xb3\xe5\x22\xc7\xf2\x0f\xa4\x8b\x37\x3c\x66\x8b\xfb\x29\x58\x86\x9a\x1d\xf8\xdd\xba\xc1\xbb\x71\x90\x43\x74\x5c\xc6\x22\x67\xbe\x68\xbe\x35\x47\x33\xde\x72\x21\xb7\xb2\x80\x22\x5d\xb5\x54\x31\x2a\xb3\x67\xa7\xa5\xae\x60\xd9\x35\xd2\x0f\xcb\xf3\x20\x5d\x0a\x25\x1b\x19\x28\x1c\xfe\xbf\x8d\x13\x8b\xab\x44\x08\x4b\xc5\x6e\x10\xe9\x78\x53\x1b\xb3\x13\x42\x36\xd6\xb8\x80\xb1\x18\x45\xbb\x5f\x3e\x96\x26\x21\x2b\x13\x2a\x4f\xc2\xc9\x7e\x16\x89\x51\xc3\x81\xf6\x33\x9c\x11\x0d\x15\xb5\xd4\xec\xfa\xc4\xee\xaa\xe1\xc0\x27\x03\x74\xc4\xbf\xb8\x9d\x32\x55\xb2\x9f\x47\x62\x22\x44\x92\x80\x54\x47\xbd\xbf\x67\xdd\x83\x94\x3a\x6c\x8e\x7d\xf0\x68\xa8\xe4\x61\x45\xc7\xb7\xd5\xea\x62\x98\x20\x16\xc3\xd7\xd9\x9d\x31\x39\xec\x67\x71\xfa\xe5\x6c\xc5\x7b\xc9\xdd\x04\x57\x97\x87\xde\x9a\x21\xbe\x0f\x31\x1a\xba\xc7\x2f\xe3\xf9\x24\xce\xf4\xd6\x8c\xa3\x82\x94\x1a\x52\x3b\x4a\xfe\x2c\x59\xf7\xd1\x44\x8c\xdc\x41\xe7\xdf\x8b\x37\xb7\xf8\x3f\xc1\x8f\xcf\xff\x92\x71\xaa\x94\xe9\xb8\xc4\x2d\xb6\xa4\x3c\x7f\xab\xaf\xd8\xb7\x2a\xe0\x16\x3f\x8e\xf1\xc5\x79\xa0\xd0\xfa\x8f\xbf\xd8\x7b\xaa\xf8\x06\xd1\x61\xe0\xd3\x26\x50\xb2\x96\xec\x2f\x92\x89\x0e\x4d\x43\xeb\x34\x7e\x5c\x8a\x8b\x4f\xf1\x4f\x00\x00\x00\xff\xff\x4c\x4c\xc1\x4f\x05\x04\x00\x00") + +func testImagesAgnhostWebhookAlwaysdenyGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookAlwaysdenyGo, + "test/images/agnhost/webhook/alwaysdeny.go", + ) +} + +func testImagesAgnhostWebhookAlwaysdenyGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookAlwaysdenyGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/alwaysdeny.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookConfigGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x93\x41\x6f\xe3\x36\x10\x85\xcf\x9a\x5f\xf1\xea\x43\x11\x07\xae\x94\x06\x28\xb0\x4d\xb1\x07\xd7\x49\x50\x23\x81\x5d\x44\xde\xdd\x2e\x8a\x1e\x68\x69\x24\x11\xa6\x49\x95\x1c\x45\x2b\x04\xf9\xef\x05\x25\x05\xbb\x8b\xde\x24\xce\xf0\x7b\x8f\x8f\xc3\xec\x92\x36\xae\x1d\xbc\xae\x1b\xc1\xf5\xd5\xcf\xef\x70\x68\x18\x0f\xdd\x91\xbd\x65\xe1\x80\x75\x27\x8d\xf3\x21\x25\x7a\xd4\x05\xdb\xc0\x25\x3a\x5b\xb2\x87\x34\x8c\x75\xab\x8a\x86\x31\x57\x56\xf8\xc8\x3e\x68\x67\x71\x9d\x5e\xe1\x22\x36\x2c\xe6\xd2\x62\xf9\x1b\x0d\xae\xc3\x59\x0d\xb0\x4e\xd0\x05\x86\x34\x3a\xa0\xd2\x86\xc1\x5f\x0a\x6e\x05\xda\xa2\x70\xe7\xd6\x68\x65\x0b\x46\xaf\xa5\x19\x45\x66\x44\x4a\x9f\x67\x80\x3b\x8a\xd2\x16\x0a\x85\x6b\x07\xb8\xea\xdb\x2e\x28\x21\x02\x80\x46\xa4\xbd\xc9\xb2\xbe\xef\x53\x35\xba\x4c\x9d\xaf\x33\x33\x75\x85\xec\x71\xbb\xb9\xdb\xe5\x77\x3f\x5d\xa7\x57\x44\x1f\xac\xe1\x10\xe0\xf9\xdf\x4e\x7b\x2e\x71\x1c\xa0\xda\xd6\xe8\x42\x1d\x0d\xc3\xa8\x1e\xce\x43\xd5\x9e\xb9\x84\xb8\xe8\xb3\xf7\x5a\xb4\xad\x57\x08\xae\x92\x5e\x79\xa6\x52\x07\xf1\xfa\xd8\xc9\x77\x01\xbd\xb9\xd2\x01\xdf\x36\x38\x0b\x65\xb1\x58\xe7\xd8\xe6\x0b\xfc\xbe\xce\xb7\xf9\x8a\x3e\x6d\x0f\x7f\xec\x3f\x1c\xf0\x69\xfd\xf4\xb4\xde\x1d\xb6\x77\x39\xf6\x4f\xd8\xec\x77\xb7\xdb\xc3\x76\xbf\xcb\xb1\xbf\xc7\x7a\xf7\x19\x0f\xdb\xdd\xed\x0a\xac\xa5\x61\x0f\xfe\xd2\xfa\xe8\xdd\x79\xe8\x18\x1d\x97\x29\xe5\xcc\xdf\x89\x57\x6e\x32\x13\x5a\x2e\x74\xa5\x0b\x18\x65\xeb\x4e\xd5\x8c\xda\x3d\xb3\xb7\xda\xd6\x68\xd9\x9f\x75\x88\x97\x17\xa0\x6c\x49\x46\x9f\xb5\x28\x19\xff\xff\x77\x9c\x94\x2e\x33\xa2\x56\x15\xa7\x08\xe9\xf9\xd8\x38\x77\x22\xd2\xe7\xd6\x79\xc1\x05\x25\x8b\xc2\x0f\xad\xb8\x4c\x4c\x58\x10\x25\x8b\xd3\xbb\x90\x6a\x97\x9d\x8c\xab\xb3\xe7\xeb\x05\x2d\x89\xb2\x0c\x1b\x67\x2b\x5d\xa3\x70\x36\xde\x67\x98\x3c\xb2\x7f\x66\x3f\x0d\xcf\x0c\x5e\xa2\x60\x2f\xd1\x15\x4e\x3c\xa4\x24\x43\xcb\x6f\x7b\x83\xf8\xae\x10\xbc\x50\xb2\x61\x2f\xf7\x71\x98\x62\xca\xb6\xa6\xe4\x81\x87\xf1\xff\x6d\xe1\x95\xa8\xea\x6c\x11\xe5\x2a\x5d\x1f\x1e\xf3\x8b\xe9\x6b\x46\x2d\x71\x29\x26\xa4\x33\xf7\x85\x92\x10\x89\x2b\xb0\xf7\xb8\x79\x8f\x58\x7b\x74\xaa\xfc\xeb\x97\xab\x5f\x1f\x78\xf8\x53\x69\x3f\xef\x4f\xdf\x94\x57\x33\x3a\x9d\x95\x97\x94\xe8\x6a\xdc\xff\xc3\x7b\x58\x6d\x22\x34\x89\x11\xa4\xf7\x4a\x94\xb9\x60\xef\x97\x94\xbc\x52\xe2\x59\x3a\x6f\xf1\xe3\x57\xfd\xd8\x19\xb1\xf1\xb6\x94\x70\xb8\xc1\xdf\xff\x8c\xd5\xaf\x6b\x2f\xa3\xbf\xd7\x15\x25\x49\x96\xe1\xb0\xbf\xdd\xdf\xc4\x57\x15\x70\xee\xa4\x53\x26\x1a\x86\xaa\x84\x3d\x7a\x9e\x66\x37\x4e\x5d\xdf\x28\x99\xe2\x8c\x01\xab\x56\xcf\x79\x87\xc6\x75\xa6\x8c\x80\x74\x02\x6e\x8c\x66\x2b\xf1\xf1\xdf\x00\xe3\xe9\x9f\xa6\xd7\xb1\xb6\xe5\x47\xf6\xba\x1a\xa6\x8e\x31\xa4\x78\x8a\x57\xfa\x2f\x00\x00\xff\xff\x32\xc2\xa5\x30\x4b\x04\x00\x00") + +func testImagesAgnhostWebhookConfigGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookConfigGo, + "test/images/agnhost/webhook/config.go", + ) +} + +func testImagesAgnhostWebhookConfigGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookConfigGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/config.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookConfigmapGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x56\x51\x6f\xdb\x36\x10\x7e\x16\x7f\xc5\x55\xc0\x02\xbb\x70\xa4\xd8\x4f\x85\x0b\x3f\x78\x49\xb6\x79\xed\xec\xc1\x4e\x5a\x14\x45\xb1\x9e\xa5\x93\xc4\x59\x26\x59\x92\xb2\xea\xa5\xfe\xef\x03\x29\xdb\xb5\x93\x3a\x5b\xd1\x61\x2f\x5b\x10\x3f\x48\xf7\xf1\xee\xd3\x77\xc7\x8f\x8c\x9f\xb2\x4b\xa9\xd6\x9a\xe7\x85\x85\xde\x45\xf7\x19\xdc\x14\x04\x2f\xaa\x39\x69\x41\x96\x0c\x0c\x2b\x5b\x48\x6d\x22\xc6\x5e\xf2\x84\x84\xa1\x14\x2a\x91\x92\x06\x5b\x10\x0c\x15\x26\x05\xc1\x36\xd2\x81\x57\xa4\x0d\x97\x02\x7a\xd1\x05\xb4\x1c\x20\xdc\x86\xc2\xf6\x73\xb6\x96\x15\x2c\x71\x0d\x42\x5a\xa8\x0c\x81\x2d\xb8\x81\x8c\x97\x04\xf4\x31\x21\x65\x81\x0b\x48\xe4\x52\x95\x1c\x45\x42\x50\x73\x5b\xf8\x22\xdb\x14\x11\x7b\xb3\x4d\x20\xe7\x16\xb9\x00\x84\x44\xaa\x35\xc8\xec\x10\x05\x68\x19\x03\x00\x28\xac\x55\xfd\x38\xae\xeb\x3a\x42\xcf\x32\x92\x3a\x8f\xcb\x06\x65\xe2\x97\xa3\xcb\xeb\xf1\xec\xfa\xbc\x17\x5d\x30\x76\x2b\x4a\x32\x06\x34\x7d\xa8\xb8\xa6\x14\xe6\x6b\x40\xa5\x4a\x9e\xe0\xbc\x24\x28\xb1\x06\xa9\x01\x73\x4d\x94\x82\x95\x8e\x67\xad\xb9\xe5\x22\xef\x80\x91\x99\xad\x51\x13\x4b\xb9\xb1\x9a\xcf\x2b\x7b\x24\xd0\x8e\x15\x37\x70\x08\x90\x02\x50\x40\x38\x9c\xc1\x68\x16\xc2\xf7\xc3\xd9\x68\xd6\x61\xaf\x47\x37\x3f\x4d\x6e\x6f\xe0\xf5\x70\x3a\x1d\x8e\x6f\x46\xd7\x33\x98\x4c\xe1\x72\x32\xbe\x1a\xdd\x8c\x26\xe3\x19\x4c\x7e\x80\xe1\xf8\x0d\xbc\x18\x8d\xaf\x3a\x40\xdc\x16\xa4\x81\x3e\x2a\xed\xb8\x4b\x0d\xdc\x49\x47\x69\xc4\x66\x44\x47\xc5\x33\xd9\x90\x31\x8a\x12\x9e\xf1\x04\x4a\x14\x79\x85\x39\x41\x2e\x57\xa4\x05\x17\x39\x28\xd2\x4b\x6e\x5c\xf3\x0c\xa0\x48\x59\xc9\x97\xdc\xa2\xf5\xcf\x0f\x3e\x27\x62\x4f\x63\xc6\x14\x26\x0b\x97\xa4\xa6\x79\x21\xe5\x82\x31\xbe\x54\x52\x5b\x68\xb1\x60\xd5\x85\x70\xf1\xcc\x44\x5c\xc6\xa8\x78\x8c\xe9\x36\x77\xbc\xea\x86\x2c\x48\xa4\xa6\x7b\x08\xf7\xaa\x09\x2e\xc9\xe2\x71\x70\x89\x49\xc1\x05\xe9\x75\xac\x16\xb9\x7b\x61\x62\x07\x6a\xe0\x3b\xdc\xa2\x94\x79\xbc\xea\x85\xac\xcd\x58\x22\x85\xf1\x34\x12\x29\x32\x9e\xff\x82\xea\x57\xb4\x49\xd1\x05\xd7\x00\x91\xc3\x00\xde\xbf\xf5\x33\xe2\xff\xee\x20\x94\x2a\xec\x43\x88\x69\x1a\x76\x20\x54\x68\x0b\xf7\x18\xa7\x68\x31\x5e\x56\x8d\x0a\xe7\xc6\x62\x4e\xe7\x5d\x87\x58\x61\x59\x91\x83\xac\xc9\x84\xb0\x69\x52\xbd\x7b\x7f\xbf\x5e\xef\x1f\xa8\xd7\x7b\xac\x5e\x9b\xb1\x38\x86\x94\xc4\x1a\x9a\xca\x4b\x54\xa6\xd9\x37\xfb\x56\x2f\x68\x7d\xee\xd7\x83\x42\xae\x23\x96\x55\x22\x01\xd7\x0f\x7b\xb9\x23\x6b\x5a\xa8\x61\xd5\x8d\x86\xbb\x2e\x4d\x69\xc5\xa9\x6e\xc3\xd3\xe3\x97\x46\x49\x37\x4d\x77\x2c\x70\x62\x47\xaf\x5a\xbd\x76\x34\x12\x99\x6c\x85\x3e\x9f\xdb\x0f\x07\x3c\xc2\xf6\x81\x1e\x53\x32\xb2\xd2\x09\x41\x7f\x00\x4d\x83\xa3\x1f\xb5\xac\xd4\xd6\x2f\x76\xe1\x3b\xff\xb2\x0f\x61\xb8\xb7\x92\x3e\x84\x2b\x27\xfa\x0e\xd2\x87\xf0\xa0\xc6\x86\x05\x3c\x03\xd4\xd1\x94\x3e\x54\x64\x6c\xb4\x2f\xf4\x64\x00\x0f\xab\xdf\xb1\xa0\xe1\x7e\xad\xb5\xd4\x59\x2b\xa4\x8f\x8a\x12\x0b\x7a\x07\xb0\x12\xe6\x04\xdf\x99\xb0\xf3\x70\x75\x9b\x05\x81\x26\x5b\x69\x01\x82\x97\x2c\xd8\x30\x16\xac\x50\x83\xc6\x1a\xde\xbe\x9b\xaf\x2d\xdd\x27\x33\x51\xa4\x7d\x33\x61\x30\x70\x02\x5f\x51\x49\xb6\x61\xe1\x16\x0d\x8e\xb0\x65\x3a\x99\xff\x4e\x89\x8d\xa6\x58\xb3\x60\x03\x54\x9a\x53\xd0\x43\xdc\x4e\xe4\x25\x2a\x27\x6e\xb3\xb5\xa2\x7d\x6f\xef\x36\x2c\x48\xc9\x90\xe6\x58\xf2\x3f\x48\x37\x98\x94\x12\x13\xdd\x0a\xbe\x22\x6d\xb0\xbc\x3a\x88\xb7\xda\xfe\x23\x7e\xeb\xb8\x7f\xd2\x1e\x7f\xb8\x3e\xba\x22\xb7\xbc\xa5\xb1\xee\x38\x19\x3a\x70\xb6\xaf\xdf\x7e\xee\x57\x3c\x19\xb8\xc0\x3d\xad\x5b\xa4\xf5\x81\x80\x56\xbe\xea\x3e\x98\xac\x2d\x66\xc3\x02\xed\x07\x70\x3f\x71\xfd\x01\x7c\x69\x12\xef\x1e\x20\xa3\x61\x59\xca\x9a\x52\x18\x80\xd5\x15\xb1\xc0\x39\xdf\xa2\x03\x2b\x97\x42\xa3\xc8\xe9\xf3\x80\x46\x57\x68\xd1\xb3\xe4\x19\x2c\x5c\x87\xc2\xad\x91\x9d\x53\x8f\xce\x2d\x19\x1b\xc2\xd9\x19\xac\x8e\x42\x29\x37\xe8\x6a\xb8\x10\x0b\x82\xa0\xf5\x48\xbb\x2f\x35\xa1\x25\xf8\xf4\xe9\xb1\x99\xb8\x55\x29\x5a\x6a\x7b\x22\xa7\xbf\x26\xc3\xd2\xd0\x17\x10\x53\x32\x55\x69\x61\x00\x67\xdb\x5d\x35\xb3\x68\x2b\xe3\x93\x05\x53\x42\xe3\x37\x90\x73\xee\xcf\x53\x92\x48\xe1\x8e\x4f\x67\xeb\x35\x0a\x77\x1a\x2d\x68\xed\x3c\x1f\x1a\x9f\xe9\xb8\xc5\x1b\xd6\xfc\xbe\x46\x1b\x21\x45\xea\x26\xdc\x1d\x9a\x3e\xfc\xf7\xb6\xc2\xbf\xf4\xd5\x28\xdc\xbd\x63\x4e\xe0\x39\xba\x43\x9e\x12\x74\xd7\x10\x6e\xbf\x4a\x12\x3f\x74\x7e\x88\xcf\x8e\x69\xb1\x0d\x6b\xdc\xd5\x5b\x38\x5d\xee\x5d\xea\x9b\xed\xb5\x39\x13\xfe\x7b\xee\xea\x9c\xaf\x7f\xd2\xfa\xfe\xf7\xbd\xd3\xbe\xc7\xb3\x7b\x46\xf7\x36\x3c\xbc\x58\x68\x1b\xbe\xf3\x5b\xd7\x5f\x28\xfc\x21\x73\x9c\xcf\xdf\x5f\x60\xb0\x3d\xd7\x5a\xf7\xee\x51\x0d\xd9\xbf\xa8\xe1\x2f\x4b\xdf\x50\xa5\xd7\x6e\x86\x80\x67\x50\x92\x68\x7d\x69\x69\xdb\x69\x7e\xe1\x33\x2b\xbb\x55\xcb\x07\x6e\xd6\x8a\x7e\x9e\x4d\xc6\xfe\xe1\x44\x5d\x87\x71\x16\xa2\xec\x76\xd8\x4e\x6d\xea\x3f\x03\x00\x00\xff\xff\xdb\xd6\x49\x67\x22\x0d\x00\x00") + +func testImagesAgnhostWebhookConfigmapGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookConfigmapGo, + "test/images/agnhost/webhook/configmap.go", + ) +} + +func testImagesAgnhostWebhookConfigmapGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookConfigmapGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/configmap.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookConvertGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x56\xc1\x6e\xe3\x36\x10\x3d\x8b\x5f\x31\xf5\x21\x70\x02\x57\x8a\x73\x6a\x5d\xe4\xa0\x26\x29\x2a\x64\x6b\x17\x96\x93\x60\x8f\xb4\x34\x96\xd8\xc8\x24\x77\x48\xd9\x6b\x04\xf9\xf7\x82\x92\xac\x48\x76\xbc\xbb\x3d\x15\x2d\x36\xa7\xf8\xbd\xe7\x99\x37\x9c\x27\xca\xc1\x05\xbb\x51\x7a\x47\x22\xcb\x2d\x5c\x5d\x8e\x7f\x86\x45\x8e\x70\x5f\x2e\x91\x24\x5a\x34\x10\x96\x36\x57\x64\x7c\xc6\x3e\x88\x04\xa5\xc1\x14\x4a\x99\x22\x81\xcd\x11\x42\xcd\x93\x1c\xa1\x61\x46\xf0\x88\x64\x84\x92\x70\xe5\x5f\xc2\xd0\x09\x06\x0d\x35\x38\xff\x85\xed\x54\x09\x6b\xbe\x03\xa9\x2c\x94\x06\xc1\xe6\xc2\xc0\x4a\x14\x08\xf8\x39\x41\x6d\x41\x48\x48\xd4\x5a\x17\x82\xcb\x04\x61\x2b\x6c\x5e\x35\x69\x4a\xf8\xec\x63\x53\x40\x2d\x2d\x17\x12\x38\x24\x4a\xef\x40\xad\xba\x2a\xe0\x96\x31\x00\x80\xdc\x5a\x3d\x09\x82\xed\x76\xeb\xf3\xca\xa5\xaf\x28\x0b\x8a\x5a\x65\x82\x0f\xd1\xcd\xdd\x34\xbe\xfb\xf1\xca\xbf\x64\xec\x41\x16\x68\x0c\x10\x7e\x2a\x05\x61\x0a\xcb\x1d\x70\xad\x0b\x91\xf0\x65\x81\x50\xf0\x2d\x28\x02\x9e\x11\x62\x0a\x56\x39\x9f\x5b\x12\x56\xc8\x6c\x04\x46\xad\xec\x96\x13\xb2\x54\x18\x4b\x62\x59\xda\xde\x01\xed\x5d\x09\x03\x5d\x81\x92\xc0\x25\x0c\xc2\x18\xa2\x78\x00\xbf\x86\x71\x14\x8f\xd8\x53\xb4\xf8\x7d\xf6\xb0\x80\xa7\x70\x3e\x0f\xa7\x8b\xe8\x2e\x86\xd9\x1c\x6e\x66\xd3\xdb\x68\x11\xcd\xa6\x31\xcc\x7e\x83\x70\xfa\x11\xee\xa3\xe9\xed\x08\x50\xd8\x1c\x09\xf0\xb3\x26\xe7\x5d\x11\x08\x77\x74\x98\xfa\x2c\x46\xec\x35\x5f\xa9\xda\x8c\xd1\x98\x88\x95\x48\xa0\xe0\x32\x2b\x79\x86\x90\xa9\x0d\x92\x14\x32\x03\x8d\xb4\x16\xc6\x2d\xcf\x00\x97\x29\x2b\xc4\x5a\x58\x6e\xab\xcf\x47\xe3\xf8\xec\x22\x60\x4c\xf3\xe4\xd9\x15\xd9\xe2\x32\x57\xea\x99\x31\xb1\xd6\x8a\x2c\x0c\x99\xb7\x19\xc3\xe0\xf9\x27\xe3\x0b\x15\x70\x2d\x02\x9e\x36\xb5\x83\xcd\x78\xc0\xbc\x53\xd4\x12\x2d\x77\xfc\x1a\x2d\xef\x57\x58\xf3\x24\x17\x12\x69\x17\xe8\xe7\xcc\x01\x26\x70\xa2\xaa\xdc\x39\x63\xab\x52\x26\x90\x28\xb9\x41\xb2\xe1\xbe\xe0\x1c\x3f\x95\x68\xec\x42\x3d\x8e\x87\x04\x17\x4d\x79\xff\x90\x3f\x77\xd4\x11\x0a\x2f\xcc\x23\xb4\x25\x49\x38\x7b\x87\x7e\x61\x9e\x77\x2f\x64\x3a\x81\xfe\x1f\xf9\x0e\x1d\x31\xcf\x9b\xf2\x35\x1a\xcd\x13\x9c\x74\xd9\x16\xdd\x4b\x8e\x0b\x38\xd4\xb1\xb3\xe5\x5f\x98\xd8\xc9\x01\x5b\xa3\x8e\x9f\xa3\x51\x25\xf5\xea\x03\xf9\x7b\xb4\xaa\xa0\x91\xaa\x0d\x76\x24\x9b\xb1\xdf\xc2\x43\x7a\xfb\xff\xdc\x7d\xe1\x21\xba\x3d\xf4\x03\xe4\x3f\x44\xb7\x8e\xbc\xa5\xdd\xbc\x94\x87\x7e\x6a\xb4\xea\x56\xa4\x47\x96\xc9\x6f\xd1\xda\x50\x95\xa7\xc9\xc1\x48\x35\x5a\xcf\x54\x9d\x6e\xef\x64\xdd\x4c\x2d\xda\x11\xf5\xe6\x6f\x45\xdd\xf9\x1b\x28\x2e\x97\x6f\xda\x56\xd8\x41\x9d\xb6\x27\x6a\x3b\x1f\x88\x1e\x0c\x52\x24\x57\xaa\x7f\xe4\x7b\x74\xc4\xbc\x57\xf6\xfa\xf5\x30\x56\x31\xac\x13\xf9\x7e\x18\xdf\xcf\x69\x3f\x91\xef\x6b\xfe\xc3\xb1\xac\x07\xfa\x9e\xcd\x7f\x25\x9b\x46\x2b\x69\xf0\x0b\x37\x65\x2d\x38\xba\x2a\x6b\xd8\x25\x73\xc3\x09\xb4\xad\xf8\x3f\xb9\x4d\xf2\xc5\x4e\x23\xf3\xc4\x0a\xe8\xed\x33\xfc\x70\x0d\x52\x14\x4e\xee\x59\x98\x5c\x43\x57\x3c\xbc\xe8\x28\xcf\x99\xe7\x69\x0b\xd7\x70\x66\x9d\xf1\x13\x37\x71\xdd\xfd\xe5\xdd\x70\xb4\xd1\x08\x8b\x42\x6d\x31\xed\x2d\xbe\xc1\x2a\xba\x4c\x85\x0d\xa5\x54\xcd\xbb\xce\x6d\xe1\x10\x73\xba\xca\xda\x41\x38\x2a\xac\x25\x9d\xef\x56\xa0\xf7\xcf\x42\x59\xd8\xa3\x27\xa1\x2c\x2a\xf6\x89\x57\x6f\xde\x4e\xe4\xc8\xdf\x63\xdf\xbc\xaf\x13\x97\x49\x67\x5f\x27\x76\xd9\x5f\x5a\x2d\xfa\x27\x9b\x3b\xf8\xc6\x37\xae\xef\x84\x99\xff\xff\x0e\xad\x7a\x1c\x1f\x8d\x3d\x44\x22\x40\x22\x45\x5f\x78\xb2\xbe\x96\xfd\xbd\xc1\xb3\xfa\x57\x93\x1f\x5b\x6e\x4b\xe3\x18\xef\x0f\x34\x86\x67\x38\x71\x3d\xfc\x3b\xd7\x67\x58\xdd\xa5\xaf\x8d\xb5\xbf\x03\x00\x00\xff\xff\x37\xa3\xe3\x05\xfc\x0b\x00\x00") + +func testImagesAgnhostWebhookConvertGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookConvertGo, + "test/images/agnhost/webhook/convert.go", + ) +} + +func testImagesAgnhostWebhookConvertGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookConvertGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/convert.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookConvert_testGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x54\xdd\x6e\xdb\x46\x13\xbd\xe6\x3e\xc5\x7c\x04\xf2\x81\x4c\x54\x52\x4a\x81\xa2\x75\xda\x0b\xd5\x3f\xa8\x90\x40\x02\x24\x25\x41\x80\xde\x2c\x97\x43\x72\x6a\x72\x97\xde\x9d\xb5\xac\x04\x7e\xf7\x62\x29\xfa\x27\x36\x62\x17\x45\x51\xf4\x4a\x1c\xcd\x99\xd9\x73\x0e\x0f\x37\x7f\x29\x8e\x4d\xbf\xb7\x54\x37\x0c\xaf\xa7\xb3\x9f\x60\xdb\x20\xbc\xf5\x05\x5a\x8d\x8c\x0e\xe6\x9e\x1b\x63\x5d\x26\xc4\x3b\x52\xa8\x1d\x96\xe0\x75\x89\x16\xb8\x41\x98\xf7\x52\x35\x08\x63\x67\x02\x1f\xd0\x3a\x32\x1a\x5e\x67\x53\x48\x02\x20\x1e\x5b\x71\xfa\x46\xec\x8d\x87\x4e\xee\x41\x1b\x06\xef\x10\xb8\x21\x07\x15\xb5\x08\x78\xa5\xb0\x67\x20\x0d\xca\x74\x7d\x4b\x52\x2b\x84\x1d\x71\x33\x1c\x32\xae\xc8\xc4\xa7\x71\x81\x29\x58\x92\x06\x09\xca\xf4\x7b\x30\xd5\x7d\x14\x48\x16\x02\x00\xa0\x61\xee\x8f\xf2\x7c\xb7\xdb\x65\x72\x60\x99\x19\x5b\xe7\xed\x01\xe5\xf2\x77\x8b\xe3\xd3\xe5\xe6\xf4\xbb\xd7\xd9\x54\x88\xf7\xba\x45\xe7\xc0\xe2\x85\x27\x8b\x25\x14\x7b\x90\x7d\xdf\x92\x92\x45\x8b\xd0\xca\x1d\x18\x0b\xb2\xb6\x88\x25\xb0\x09\x3c\x77\x96\x98\x74\x3d\x01\x67\x2a\xde\x49\x8b\xa2\x24\xc7\x96\x0a\xcf\x5f\x19\x74\xc3\x8a\x1c\xdc\x07\x18\x0d\x52\x43\x3c\xdf\xc0\x62\x13\xc3\xaf\xf3\xcd\x62\x33\x11\x1f\x17\xdb\xdf\x56\xef\xb7\xf0\x71\xbe\x5e\xcf\x97\xdb\xc5\xe9\x06\x56\x6b\x38\x5e\x2d\x4f\x16\xdb\xc5\x6a\xb9\x81\xd5\x19\xcc\x97\x9f\xe0\xed\x62\x79\x32\x01\x24\x6e\xd0\x02\x5e\xf5\x36\x70\x37\x16\x28\x58\x87\x65\x26\x36\x88\x5f\x1d\x5e\x99\x03\x19\xd7\xa3\xa2\x8a\x14\xb4\x52\xd7\x5e\xd6\x08\xb5\xb9\x44\xab\x49\xd7\xd0\xa3\xed\xc8\x85\x97\xe7\x40\xea\x52\xb4\xd4\x11\x4b\x1e\xea\x47\x72\x32\xf1\x32\x17\xa2\x97\xea\x3c\x2c\xd9\x61\xd1\x18\x73\x2e\x04\x75\xbd\xb1\x0c\x89\x88\xe2\xaa\xe3\x58\x44\x71\x27\xb9\xc9\xad\xd4\x65\x28\x2c\x56\x2d\xaa\xe1\x7f\x46\x17\xec\x8b\x85\x88\x2a\xff\xf9\x33\xc4\x35\x71\xe3\x8b\x4c\x99\x2e\xaf\x8d\xa9\x5b\xcc\x6b\x13\x3a\x01\x71\x39\x83\xf8\xfc\x47\x97\x91\xc9\x65\x4f\xb9\x2c\x47\xa2\xf9\xe5\x2c\xec\xfa\x46\xab\x40\x96\x0f\xfa\x9d\x54\x0d\x69\xb4\xfb\xbc\x3f\xaf\x0f\x03\x3d\x8d\x54\xf2\x70\x1a\xda\xa7\x06\xac\xd7\x4c\x1d\xfe\x05\x48\xee\xd0\x92\x6c\xe9\x99\x85\x9e\xa9\xcd\x4b\xaa\xaa\x58\x44\xb7\xd4\x0f\x3c\x6e\x15\x9f\xdf\x7e\x89\x37\xa4\xdd\x3d\x99\x37\xa4\x53\x21\x2a\xaf\x15\x6c\xd1\xf1\xb1\xd1\x97\x68\x79\x7e\x03\x5a\xe3\x85\x47\xc7\x5b\xf3\x61\x96\x30\xbc\x1c\xf5\x66\xdb\x14\xbe\x88\xa8\x82\xa3\x5f\xe0\xb0\x25\x3b\x1b\x7e\xce\x8c\x4d\x1e\x90\xc9\xce\xbc\x56\x6e\x02\xe1\x45\x66\x4b\xdc\x6d\x8c\xb7\x0a\x93\xa1\x5c\x68\xfe\xe1\xfb\x24\x4d\x27\x70\xa7\x39\x60\x8e\x4d\x89\xea\x4c\x2a\x36\x76\x9f\x8c\xb6\x0c\xb3\xaa\xc1\x0e\x93\x34\x4d\x45\x14\x72\x49\x81\xc0\xf4\x0d\x10\xfc\x0c\xb3\x69\x78\x78\xf5\x2a\x10\x8b\x38\x5b\x7b\x9d\x54\x1d\x67\x9b\xde\x92\xe6\x2a\x89\xd7\x5e\xc3\x8b\x32\x9f\x4d\xa7\xf1\x04\x28\x9d\x40\xd0\xfc\x58\x53\x14\x19\x4b\x75\xd8\xfb\xff\x31\x06\xd9\x43\x33\xbe\x5c\x07\x58\x35\x48\x4e\x02\x3a\x0d\xb5\x3a\x38\x87\x65\x98\x55\x4f\xd8\x78\x3b\x61\xf9\x19\xe8\x70\x7c\x72\xbb\x78\x18\xa2\x0a\xfe\x37\x7e\x0b\xd9\x09\x62\x7f\x7a\xe1\x65\x3b\xec\x9c\x80\xe5\x51\x42\xc4\xd9\xa9\xb5\xc6\x56\x49\x8c\x57\x3d\xaa\xc0\x4a\xb6\xed\x70\x47\xa1\x63\xa8\x08\xdb\xd2\x85\xdb\xa8\xc0\xc3\xc5\x79\xc3\xdd\x14\x7f\xa0\x62\x28\x3c\x43\x65\xbc\x0e\xb7\x91\x54\xca\x78\x1d\x9a\xc1\xf2\x90\x38\xb4\xa8\x15\xba\xc9\x50\x1c\xfd\xae\x5f\xb8\xf8\xf0\x9c\xad\x86\xf1\xf5\x81\xdf\x09\x55\xd5\xc8\xec\x4e\xc3\x20\x22\x18\x78\x9d\x8a\xe8\x5a\x5c\x3f\x99\x3d\xd7\x1b\xed\xf0\xce\x8a\x6f\x27\x30\xa4\x23\xf9\x97\x52\x91\x3d\x62\xf8\xb7\x12\xf1\x50\xdc\xb3\xb9\xb8\x1b\xf8\x27\x33\xf1\x5f\xca\xc2\x9f\x01\x00\x00\xff\xff\x0e\x52\xf0\x28\x50\x08\x00\x00") + +func testImagesAgnhostWebhookConvert_testGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookConvert_testGo, + "test/images/agnhost/webhook/convert_test.go", + ) +} + +func testImagesAgnhostWebhookConvert_testGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookConvert_testGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/convert_test.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookCrdGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xe4\x56\xdd\x6e\xe3\x36\x13\xbd\x16\x9f\x62\x3e\x01\x1b\xd8\x81\x22\x25\xbe\x5a\x38\xf0\x85\x3f\x3b\xdd\x1a\x9b\xda\x80\xed\x64\xb1\x08\x82\x82\xa2\x46\x12\x6b\x89\xd4\x92\x94\x14\x37\xc8\xbb\x17\xd4\x4f\x62\x37\x4e\x51\xb4\x97\x05\x0c\x1b\x22\xcf\x9c\x39\x3c\x33\x1a\x3a\x38\x27\x33\x59\xec\x15\x4f\x52\x03\xa3\xcb\xab\xcf\xb0\x4d\x11\xbe\x96\x21\x2a\x81\x06\x35\x4c\x4b\x93\x4a\xa5\x7d\x42\x6e\x39\x43\xa1\x31\x82\x52\x44\xa8\xc0\xa4\x08\xd3\x82\xb2\x14\xa1\xdb\xf1\xe0\x1e\x95\xe6\x52\xc0\xc8\xbf\x84\x81\x05\xb8\xdd\x96\x3b\xbc\x26\x7b\x59\x42\x4e\xf7\x20\xa4\x81\x52\x23\x98\x94\x6b\x88\x79\x86\x80\x4f\x0c\x0b\x03\x5c\x00\x93\x79\x91\x71\x2a\x18\x42\xcd\x4d\xda\x24\xe9\x28\x7c\xf2\xbd\x23\x90\xa1\xa1\x5c\x00\x05\x26\x8b\x3d\xc8\xf8\x10\x05\xd4\x10\x02\x00\x90\x1a\x53\x8c\x83\xa0\xae\x6b\x9f\x36\x2a\x7d\xa9\x92\x20\x6b\x51\x3a\xb8\x5d\xcc\x6e\x96\x9b\x9b\x8b\x91\x7f\x49\xc8\x9d\xc8\x50\x6b\x50\xf8\xa3\xe4\x0a\x23\x08\xf7\x40\x8b\x22\xe3\x8c\x86\x19\x42\x46\x6b\x90\x0a\x68\xa2\x10\x23\x30\xd2\xea\xac\x15\x37\x5c\x24\x1e\x68\x19\x9b\x9a\x2a\x24\x11\xd7\x46\xf1\xb0\x34\x47\x06\xf5\xaa\xb8\x86\x43\x80\x14\x40\x05\xb8\xd3\x0d\x2c\x36\x2e\xfc\x7f\xba\x59\x6c\x3c\xf2\x6d\xb1\xfd\x79\x75\xb7\x85\x6f\xd3\xf5\x7a\xba\xdc\x2e\x6e\x36\xb0\x5a\xc3\x6c\xb5\x9c\x2f\xb6\x8b\xd5\x72\x03\xab\x9f\x60\xba\xfc\x0e\x5f\x17\xcb\xb9\x07\xc8\x4d\x8a\x0a\xf0\xa9\x50\x56\xbb\x54\xc0\xad\x75\x18\xf9\x64\x83\x78\x94\x3c\x96\xad\x18\x5d\x20\xe3\x31\x67\x90\x51\x91\x94\x34\x41\x48\x64\x85\x4a\x70\x91\x40\x81\x2a\xe7\xda\x16\x4f\x03\x15\x11\xc9\x78\xce\x0d\x35\xcd\xf3\xbb\xe3\xf8\xe4\x3c\x20\xa4\xa0\x6c\x67\x49\x6a\x0c\x53\x29\x77\x84\xf0\xbc\x90\xca\xc0\x80\x38\x6e\x9c\x1b\x97\x10\xc7\xdd\x7d\xd6\x3e\x97\x01\x2d\x78\x40\xa3\x2e\x41\x50\x5d\xb9\xc4\xa1\x05\xc7\x27\x83\xa2\x49\x59\x5d\xc1\x01\xf4\x6d\xfd\x82\x16\x5c\xa3\xaa\x50\x05\xc5\x2e\xb1\x7b\xfa\x18\x70\x92\x2b\x44\x43\xff\x05\x61\x13\xee\x12\x27\x47\x43\x8f\x85\xe5\x94\xa5\x5c\xa0\xda\xbf\x05\x5b\x50\x2b\xa2\xc7\xed\x32\x99\x04\xd5\xc8\x25\x43\x42\x82\x00\xb6\x4d\x97\x97\x82\x59\x2f\x6d\xb9\x90\x19\x0d\x34\xcb\x60\xb6\x9e\x6b\xd0\x65\x98\x73\x63\xba\xc6\x32\xf6\x3b\x44\x38\x92\xe4\x77\xc4\xfd\xc1\x6c\x2f\x9e\xde\xf7\x89\x4d\x04\xd6\x69\x33\x5b\xcf\x07\x54\x41\x75\xe5\x4f\x7b\xe3\xd7\x58\x71\xac\x87\x70\x7e\xbc\xa8\x0b\x69\xbb\xe4\x99\x38\x56\xba\x7f\x3f\x18\x0d\xfd\x85\x88\xe5\xc0\x6d\x88\x6c\x9f\x03\x53\x91\x3b\x24\xc4\x51\xa8\x65\xa9\x18\xc2\x78\x02\x2e\x2b\xb5\x91\x79\xbf\x14\x61\xcc\x05\x6f\x3a\xc6\x25\x4e\x27\xf6\xcb\xfd\xda\x42\x5b\x2b\xfd\x2f\x4a\x96\x45\x37\x23\xd6\x5d\xd8\x73\xb3\x38\x86\x53\x35\x6c\x03\x96\x34\x7f\x1b\x2d\x63\x70\xfb\x0a\x79\xd0\x73\x8c\xa1\x17\xf1\x62\x33\xff\xe3\xa4\x1f\xe5\xfb\x20\x95\xb5\xc3\x3a\xfa\x6a\xe1\x78\x02\xa7\xac\x7d\x7e\xf9\x33\xd2\x9f\x66\x99\xac\x31\x82\x09\x18\x55\xa2\x65\xa2\xb5\x0d\xa7\xca\x5f\xe3\x8f\x12\xb5\xf1\x57\xe1\x6f\xc8\x8c\xbf\xa6\x35\x71\x2a\xaa\x20\xa3\x21\x66\x1a\x72\x5a\x3c\xd8\x41\x22\x92\xc7\xf6\x87\x10\x47\xd7\xdc\xb0\xf4\x30\xb8\x97\x6b\xab\xca\xa8\x46\x78\xab\xc7\x98\x38\x0e\x53\x51\x93\xed\x94\xe7\xb3\xa6\xaa\x3d\xc1\xfc\xb5\xaa\xf6\x14\x4e\x84\x1a\x15\xa7\x19\xff\x1d\x95\x65\x60\x32\x42\xa6\xfd\x3b\xc1\x2b\x54\x9a\x66\xf3\x83\xfd\xc1\x90\x38\x0e\x8f\xe1\x57\xcf\x7e\x50\x35\x01\x87\x04\xfe\x1c\x6d\xfc\x40\xd1\xda\x03\xc1\x33\x0f\xce\x98\x8a\x86\xd7\x0d\xf6\x7f\x13\xbb\x64\xf5\x3b\x6d\x5f\xde\x28\x25\xd5\x00\x95\xb2\xb4\x8e\x42\x53\x2a\x01\x46\xde\x5f\xbd\xf3\xbb\x07\x59\xc1\x9d\x6b\x13\xdb\xc1\xfe\x6d\xf3\xf0\xea\xc8\x5f\x9a\xf1\x5f\xf0\x21\xc2\x98\x96\x99\xb1\x26\x74\xb2\xe2\xdc\xb4\x09\xe2\x81\xdb\xce\xaa\xd7\x7e\xef\x46\x93\x14\x68\xaf\xdc\x87\x4f\x95\x07\x9f\xaa\x47\x08\x4b\x03\x89\x34\xf0\xa9\x72\xbd\x83\x2e\xf3\x5a\x7f\xbd\x53\x4d\x69\x35\xbd\x3f\xca\xdf\x38\x89\x7d\xe5\x78\x0c\x95\x07\x72\x67\xd5\xb6\x87\x7a\x70\xbb\x1b\xe8\x02\x47\x78\x61\x50\x1b\xf7\xf1\xda\x22\x9e\x5b\xdf\x2b\x98\x4c\xe0\x15\x13\x71\x4d\xed\xcb\xe7\xb6\x96\x7e\xf8\x5e\xc6\x34\xd3\x78\x02\xb1\x46\x5d\x66\x06\x26\x70\xd6\xcd\x97\x8d\xa1\xa6\xd4\xcf\xbf\xa0\xd6\x34\xc1\x31\xb8\xf6\xa2\xb4\x3d\xc5\xa4\xb0\xff\x53\xec\xfd\x59\x53\x61\x47\x7c\xa3\xd7\x7d\x69\x4b\xd2\x0c\x85\xe6\xc8\x67\xc7\x29\x08\x79\x21\x7f\x04\x00\x00\xff\xff\x70\x6d\x73\x5e\x97\x09\x00\x00") + +func testImagesAgnhostWebhookCrdGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookCrdGo, + "test/images/agnhost/webhook/crd.go", + ) +} + +func testImagesAgnhostWebhookCrdGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookCrdGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/crd.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookCustomresourceGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xd4\x56\xd1\x6f\xdb\xb6\x13\x7e\x16\xff\x8a\xfb\xe9\x21\xb0\x0b\x47\x8a\xfd\x54\xe4\x07\x3f\x78\x49\x86\x79\xed\xec\xc1\x76\x52\x14\x41\x80\x9e\xa5\xb3\xc4\x5a\x26\x55\xf2\x64\xd5\x48\xfd\xbf\x0f\xa4\x94\xc2\x6e\x9d\x60\xc3\xba\x01\x0b\x10\x18\x12\x3f\xde\x7d\xf7\xdd\x47\xf1\xe2\x57\xe2\x4a\x97\x3b\x23\xb3\x9c\x61\x70\xd1\x7f\x0d\x8b\x9c\xe0\x4d\xb5\x24\xa3\x88\xc9\xc2\xa8\xe2\x5c\x1b\x1b\x09\xf1\x56\x26\xa4\x2c\xa5\x50\xa9\x94\x0c\x70\x4e\x30\x2a\x31\xc9\x09\xda\x95\x1e\xdc\x91\xb1\x52\x2b\x18\x44\x17\xd0\x71\x80\xb0\x5d\x0a\xbb\xff\x17\x3b\x5d\xc1\x06\x77\xa0\x34\x43\x65\x09\x38\x97\x16\x56\xb2\x20\xa0\xcf\x09\x95\x0c\x52\x41\xa2\x37\x65\x21\x51\x25\x04\xb5\xe4\xdc\x27\x69\x43\x44\xe2\x7d\x1b\x40\x2f\x19\xa5\x02\x84\x44\x97\x3b\xd0\xab\x43\x14\x20\x0b\x01\x00\x90\x33\x97\x97\x71\x5c\xd7\x75\x84\x9e\x65\xa4\x4d\x16\x17\x0d\xca\xc6\x6f\xc7\x57\x37\x93\xf9\xcd\xf9\x20\xba\x10\xe2\x56\x15\x64\x2d\x18\xfa\x54\x49\x43\x29\x2c\x77\x80\x65\x59\xc8\x04\x97\x05\x41\x81\x35\x68\x03\x98\x19\xa2\x14\x58\x3b\x9e\xb5\x91\x2c\x55\xd6\x03\xab\x57\x5c\xa3\x21\x91\x4a\xcb\x46\x2e\x2b\x3e\x12\xe8\x89\x95\xb4\x70\x08\xd0\x0a\x50\x41\x38\x9a\xc3\x78\x1e\xc2\x4f\xa3\xf9\x78\xde\x13\xef\xc6\x8b\x5f\xa6\xb7\x0b\x78\x37\x9a\xcd\x46\x93\xc5\xf8\x66\x0e\xd3\x19\x5c\x4d\x27\xd7\xe3\xc5\x78\x3a\x99\xc3\xf4\x67\x18\x4d\xde\xc3\x9b\xf1\xe4\xba\x07\x24\x39\x27\x03\xf4\xb9\x34\x8e\xbb\x36\x20\x9d\x74\x94\x46\x62\x4e\x74\x94\x7c\xa5\x1b\x32\xb6\xa4\x44\xae\x64\x02\x05\xaa\xac\xc2\x8c\x20\xd3\x5b\x32\x4a\xaa\x0c\x4a\x32\x1b\x69\x5d\xf3\x2c\xa0\x4a\x45\x21\x37\x92\x91\xfd\xf3\x77\xe5\x44\xe2\x55\x2c\x44\x89\xc9\xda\x05\xa9\x69\x99\x6b\xbd\x16\x42\x6e\x4a\x6d\x18\x3a\x22\x08\x49\x25\x3a\x95\x2a\x8b\x3f\x5a\xad\x42\x21\x82\x6d\x1f\xc2\xf5\x6b\x1b\x49\x1d\x63\x29\x63\x4c\xdb\x6c\xf1\xb6\x1f\x8a\x60\x43\x8c\xc7\x88\x0d\x26\xb9\x54\x64\x76\x71\xb9\xce\xdc\x0b\x1b\x3b\x50\x03\x7f\xc2\xad\x0b\x9d\xc5\xdb\x41\x28\xba\x42\x24\x5a\x59\x9f\x3b\xa9\x2c\xeb\xcd\x8c\xac\xae\x4c\x42\xbf\x23\x27\x79\x1f\x9c\xf4\x2a\x83\x21\x7c\xb8\xf7\xee\xf0\x7f\x8f\x10\xea\x32\xbc\x84\x10\xd3\x34\xec\x41\x58\x22\xe7\xee\x31\x4e\x91\x31\xde\x54\x4d\xfd\xe7\x96\x31\xa3\xf3\xbe\x43\x6c\xb1\xa8\xc8\x41\x76\x64\x43\xd8\x37\xa1\x1e\x3e\x9c\x4c\x3a\xf8\x01\x49\x07\x2f\x25\xed\x0a\xb1\xaa\x54\x02\x7e\x0f\x5d\x1d\x31\xe8\xa0\x81\x6d\x3f\x1a\x3d\xc9\x3c\xa3\xad\xa4\xba\x0b\xaf\x8e\x5f\xda\x52\x3b\x83\x3c\x8a\xc0\x49\x19\xdd\x75\x06\xdd\x68\xac\x56\xba\x13\x36\x44\x54\x06\x4d\x65\x60\xda\xc0\x61\x57\x04\x89\x81\xcb\xa1\xab\xae\x4a\xd8\xed\x6d\xdb\x17\x4d\x97\x1f\x29\xe1\xdf\x88\x51\x04\xc1\x35\x32\xc2\x06\xcb\xfb\x46\x85\x87\xe6\x47\x04\xfb\xc7\xbd\x10\x81\xc1\xda\xc5\x40\x13\xcd\xe8\x53\x45\x96\xdb\xcd\xd1\x0c\x6b\x11\x90\xf1\x19\x9c\x77\xa2\x5b\xb5\x41\x63\x73\x2c\x3a\x06\xeb\x1e\x9c\x25\xa6\x2b\x02\xb9\x02\x87\xf9\xdf\x10\x94\x2c\x3c\x05\xcf\xff\xc6\x18\x6d\x3a\x64\x1c\x24\x30\xc4\x95\x51\xc0\xfa\xae\xff\x5d\xc5\x2d\xc6\x33\xf1\xca\x7c\x95\xe2\x72\x08\xa7\x24\x7a\xdc\x7f\x8b\x8c\x46\x45\xa1\x6b\x4a\x61\x08\x6c\x2a\x12\x9e\x54\x62\x22\x57\xf7\x7d\x78\xd8\x47\xc3\xe1\x03\x0c\x87\x6d\xff\x1e\x3d\xb5\xa3\x48\xde\x2e\x30\x84\xfb\x87\xe5\x8e\xa9\x73\xca\xc0\x9e\xec\xb3\x19\xbc\x3d\xff\x6e\x8e\xc1\xd7\x1c\x05\xa9\xce\xa9\xed\x5d\x27\xf8\x85\x8f\x5e\x72\xab\x94\x5f\x58\xec\x4a\xfa\x75\x3e\x9d\xf8\x87\x67\x72\x3b\x0c\x0c\xe1\xac\x64\x9f\xa6\xed\xce\xd9\x31\x54\xec\x5b\x4f\xbb\xef\x03\xff\x60\x4b\xfb\x98\xff\xa0\xa7\xb7\x68\xc0\xf9\xba\x91\xd8\x2b\x79\xe8\xef\x92\x8c\x6f\x98\x6b\xd3\xb6\x1f\x5d\x53\x41\x4c\x4d\xab\xb0\x86\xe3\xb3\x50\xa4\x87\xc7\x61\x0f\x54\xd8\xe7\xa0\x87\xb8\xff\xe6\xc9\x09\xdc\xfd\xb4\xee\xc1\xd6\x85\x30\xa8\x32\x7a\x72\xb9\xe7\x27\x57\xb0\xf6\xd6\x6e\xef\x99\x73\x1a\xd0\x39\x93\xe5\x10\xce\xce\x60\x7b\xb4\x94\x4a\x8b\x2e\xb8\x5b\x12\x41\x10\x74\x5e\x68\xc0\x95\x21\x64\x82\x2f\x5f\x5e\xea\xd2\x6d\x99\x22\x53\xd7\x13\x79\xbe\x8c\x15\x16\x96\x4e\x20\x66\x64\xab\x82\x9d\xeb\x5b\x37\xcd\x19\xb9\xb2\x3e\x58\x30\x23\xb4\x5a\x5d\x42\xe8\x2e\xd6\x6f\x1c\x09\x89\x56\x6e\xc6\x71\x77\x6f\x8d\xca\x8d\x0c\xee\x7a\x08\x7b\x6e\xe7\x5e\x34\xff\x7f\x45\x18\xa5\x55\xea\x0c\xe7\x06\x1a\xbf\xfc\xe7\x9c\xf9\xaf\x96\x8c\xca\x4d\x86\x4b\x02\xcf\xd4\x8d\x61\x94\xa0\x1b\x14\x25\x9f\xd0\x63\x4d\x3b\x37\xa8\x40\x73\x3b\x1e\x0a\xf3\xd2\xd7\xe5\x8f\x00\x00\x00\xff\xff\x0f\x5b\x65\x7b\xef\x0a\x00\x00") + +func testImagesAgnhostWebhookCustomresourceGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookCustomresourceGo, + "test/images/agnhost/webhook/customresource.go", + ) +} + +func testImagesAgnhostWebhookCustomresourceGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookCustomresourceGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/customresource.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookMainGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x58\x5f\x6f\xdb\x36\xf7\xbe\x16\x3f\xc5\x99\x80\x16\x52\x20\x4b\x6d\xb7\x01\xfb\x79\xc8\x85\x9b\xb4\x6b\xd0\x34\x19\x62\xb7\xc5\x30\x0c\xbf\xd1\xd2\x91\xcc\x5a\x22\x35\x92\xb2\xeb\x05\xfd\xee\x2f\x0e\x25\x2b\x72\x6c\xa7\xdb\xb0\xe0\x7d\x7d\xd1\x46\x22\xf9\x3c\x87\xe7\xcf\xc3\x23\x26\x27\xec\x4c\xd5\x1b\x2d\x8a\x85\x85\x17\xcf\x9e\xff\x00\xb3\x05\xc2\xdb\x66\x8e\x5a\xa2\x45\x03\x93\xc6\x2e\x94\x36\x31\x63\x97\x22\x45\x69\x30\x83\x46\x66\xa8\xc1\x2e\x10\x26\x35\x4f\x17\x08\xdd\x48\x04\x1f\x50\x1b\xa1\x24\xbc\x88\x9f\x41\x40\x13\xfc\x6e\xc8\x0f\x7f\x64\x1b\xd5\x40\xc5\x37\x20\x95\x85\xc6\x20\xd8\x85\x30\x90\x8b\x12\x01\x3f\xa7\x58\x5b\x10\x12\x52\x55\xd5\xa5\xe0\x32\x45\x58\x0b\xbb\x70\x24\x1d\x44\xcc\x7e\xe9\x00\xd4\xdc\x72\x21\x81\x43\xaa\xea\x0d\xa8\x7c\x38\x0b\xb8\x65\x0c\x00\x60\x61\x6d\x3d\x4e\x92\xf5\x7a\x1d\x73\x67\x65\xac\x74\x91\x94\xed\x2c\x93\x5c\x5e\x9c\xbd\xba\x9a\xbe\x1a\xbd\x88\x9f\x31\xf6\x5e\x96\x68\x0c\x68\xfc\xa3\x11\x1a\x33\x98\x6f\x80\xd7\x75\x29\x52\x3e\x2f\x11\x4a\xbe\x06\xa5\x81\x17\x1a\x31\x03\xab\xc8\xce\xb5\x16\x56\xc8\x22\x02\xa3\x72\xbb\xe6\x1a\x59\x26\x8c\xd5\x62\xde\xd8\x1d\x07\x6d\xad\x12\x06\x86\x13\x94\x04\x2e\xc1\x9f\x4c\xe1\x62\xea\xc3\xcb\xc9\xf4\x62\x1a\xb1\x8f\x17\xb3\x37\xd7\xef\x67\xf0\x71\x72\x73\x33\xb9\x9a\x5d\xbc\x9a\xc2\xf5\x0d\x9c\x5d\x5f\x9d\x5f\xcc\x2e\xae\xaf\xa6\x70\xfd\x1a\x26\x57\xbf\xc0\xdb\x8b\xab\xf3\x08\x50\xd8\x05\x6a\xc0\xcf\xb5\x26\xdb\x95\x06\x41\xae\xc3\x2c\x66\x53\xc4\x1d\xf2\x5c\xb5\xc6\x98\x1a\x53\x91\x8b\x14\x4a\x2e\x8b\x86\x17\x08\x85\x5a\xa1\x96\x42\x16\x50\xa3\xae\x84\xa1\xe0\x19\xe0\x32\x63\xa5\xa8\x84\xe5\xd6\x3d\xef\x6d\x27\x66\x27\x09\x63\x35\x4f\x97\x04\xb2\xc6\xf9\x42\xa9\x25\x63\xa2\xaa\x95\xb6\x10\x30\xcf\x47\x99\xaa\x4c\xc8\x22\xf9\x64\x94\xf4\x99\xe7\xe7\x95\xa5\xff\x84\x4a\x84\x6a\xac\x28\xe9\x41\xa2\x4d\x28\x4c\x3e\x63\x9e\x5f\x08\xbb\x68\xe6\x71\xaa\xaa\xc4\xd4\xf9\xf3\x6f\x93\x54\xcd\x35\xa7\xa1\xd5\x73\xf0\x97\x3f\x98\x58\xa8\x84\xd7\x22\xe1\x59\x67\x68\xb2\x7a\x4e\x28\x47\x86\xe6\x68\xf9\xbd\xf1\x8a\xa7\x0b\x21\x51\x6f\x92\x7a\x59\x24\xba\x91\x56\x54\x38\x98\xb2\x2c\x55\x91\xac\x5e\xf8\xcc\x4b\x12\x98\x5d\x9f\x5f\x8f\xc1\xea\x4d\x9b\xa7\xa5\x98\x6b\x4e\x0f\x0a\x0c\x22\x88\x1c\x84\x85\x02\x25\x6a\x4e\x55\x92\x2a\xad\x31\xb5\x40\xdb\x85\x9a\xdb\x74\xe1\x40\x68\x77\x66\x9c\x24\x83\xcd\x55\xdc\xda\x39\x17\x3a\x73\xae\x69\xa7\x86\x8c\xad\xb8\x26\xc7\xa5\xa8\xed\x6b\x2a\x09\xfa\x51\xbe\xc8\x82\x79\x4b\xdc\xf4\xef\xfa\x97\xce\xd5\xdb\x9f\x90\x96\x79\x46\x64\x98\x72\x7d\x51\x51\x50\xba\x69\x21\x63\x49\x02\x67\x55\xf6\xb1\x0d\x12\x25\x62\x63\xba\x14\x2f\xe4\x42\x19\x0b\x67\xe4\xe8\xd8\x59\x30\x98\x78\x0a\x4f\x5d\x04\xe2\x33\x55\x55\x5c\x66\xb7\xcc\x7b\x6f\x70\x0c\x00\x7e\x17\x70\x3f\x62\xde\x74\xa1\xb4\x1d\x83\x3f\xb5\x5c\x5b\x03\x1c\xde\xcc\x66\x3f\x83\x41\xbd\x42\x1d\x11\x53\xde\x94\x6d\xfe\xa1\xa1\x82\x81\x77\x0d\x65\x95\x2c\x26\xdb\x50\x6d\xf9\xb8\xcc\xe0\x03\x2f\x45\x76\x70\x98\xb8\x2e\x95\x2c\xc6\xf0\xfb\x63\x53\xc5\x6c\x92\x5b\xd4\x90\x61\x5d\xaa\x0d\x01\x09\x4b\x61\x1f\x68\x62\x5a\x36\xc6\x12\xab\xd3\xc0\xac\x12\x92\x6a\x9b\x5b\xa5\x41\x22\x66\x86\xa6\xa7\x1a\xb9\x45\xe0\x03\xa6\x8e\xe0\x4c\xc9\x5c\x14\x8d\x76\xd5\xc5\x84\x74\x28\xfb\xe8\x04\xa2\xb1\x10\xee\x6f\x8d\x95\xb2\x7d\xa9\x41\x9f\xe8\x90\x2a\x69\xb5\x2a\x4b\xd4\x26\xfe\x3d\x62\xde\x44\x17\x66\x0c\x6d\xe4\xde\xf1\xcf\xa2\x6a\xaa\x2b\x7a\x17\x3c\x0b\x23\xe6\xdd\x34\x72\x0c\x50\x71\x21\x23\xf6\x85\xb1\xbc\x91\x29\x08\x29\x6c\x10\xc2\x2d\xf3\xee\xa2\x1f\xbf\x2e\x79\x61\x82\x30\x9e\xba\x34\xfa\xc0\x75\xf0\x74\x9b\x9a\x11\xf8\xb6\x34\x23\x7a\x1c\x91\x7a\xfb\x11\xf8\x14\x1e\xcf\x77\x49\x4a\x06\x71\xe1\x34\x85\xf6\x95\x61\xce\x9b\xd2\xc2\xe7\xef\x9f\xfd\x1f\x9c\xa1\xb6\x24\x40\xe4\x18\x8a\x14\x45\x70\x1a\x43\x70\x36\x01\x82\x8b\xa8\xac\xb8\xdc\x44\x04\x42\x93\x24\x27\xb1\xe4\x2e\x1c\x6d\xa0\xdd\xbc\x30\xf6\xc3\xaf\x59\xdb\xd5\x4c\x67\x6c\xad\xc5\x8a\x5b\x1c\x2d\x71\xf3\x77\x6d\xee\x96\xc2\x12\x37\x50\x51\xb5\xd2\xac\xd1\x68\xc7\x05\xc7\xec\xb9\x90\xd6\x19\x43\xb5\x1a\x81\x4f\xff\xf9\x11\x7c\xf7\xdd\xb7\x8e\x7a\x8a\x69\xa3\x11\x5c\x21\xdb\x05\xb7\x8e\x7b\x1b\xe1\x92\xe2\x2e\x0d\x28\xf9\xf5\xbd\x0e\x0b\x3f\x02\xbf\x7b\x1c\x09\x7a\xbe\xdb\x69\xab\x0b\x56\xc1\x1c\x5b\x09\xe0\xc6\x31\x0a\xf9\x09\x53\xf2\x73\xb7\xce\x0f\x29\x35\x92\xc4\x25\x99\xed\x84\xf4\x35\x65\xca\x82\xcb\xac\x44\x2a\xbd\xee\xed\x5d\x1e\x32\xbb\xa9\x71\x7f\x05\x25\x58\xd0\xbd\x88\xfb\x42\xbb\xc1\x95\xc0\x75\x08\x27\x07\x46\x4c\xad\xa4\xc1\xaf\xf3\x1f\xa1\x1e\xb2\x1e\x24\x7c\x88\xeb\x8d\xc3\xd7\xa4\x91\xbc\x23\xd3\x91\x4b\xd4\xb9\xb2\x0b\x58\xb5\x85\xac\xb4\x3b\x21\xa1\x22\x79\x51\xda\x44\x6d\xf0\x4c\x53\x53\x24\x0d\x54\x4d\x69\x45\x5d\xe2\xa0\x48\xb5\xe3\x87\x55\xdb\x1d\x99\x81\xc5\x5b\x4a\x63\x75\x93\x5a\x2a\xc2\xa1\x6b\x87\xbb\x77\xe7\xa0\xfb\x0d\xb6\xda\x17\xb1\xc4\xf5\x39\x96\x58\x70\x8b\x33\xf5\xe1\xf9\x64\x80\x1d\xe4\xc3\x15\xe1\x2e\xef\x2d\xf3\x34\xda\x46\xcb\x9d\xd7\xb7\xcc\xdb\xda\x31\x86\xac\xc3\xfd\xd0\xbe\x70\xd0\xc4\x11\xe4\xa4\x28\xde\xea\xf9\xb8\x35\x2b\x8f\x98\xf7\xa5\x37\xe8\xf8\xaa\x03\xd6\x0c\x83\x7c\x67\x91\x0b\xe3\xd6\x75\x7f\x3f\x87\x08\xc9\x13\x12\xc6\xa7\xb0\x9f\x0b\xb7\x37\xf8\x47\x83\xc6\x92\x54\xca\x15\x6a\x3b\x18\x77\x03\xce\xd6\x96\x3c\xee\x5e\x85\x5f\x98\xe7\xa9\xc6\x12\x62\x1e\x08\x19\x32\x6f\x6b\xea\x3e\x48\x6b\x03\xa1\x38\xf3\x02\xd5\xd8\xb0\xf3\x4f\x92\xb4\x62\xd6\xe7\x33\x55\x21\x75\x0a\x4e\x0a\x28\x5f\x54\x0e\xdc\x75\xa3\x68\x2c\x09\x90\x72\x87\x01\x4d\x77\x12\xa5\xa8\x79\x74\x8e\x23\x2c\x72\x93\x3b\x49\x9c\xdf\x1d\x72\xb0\x76\x78\xf1\xd6\x8c\x8f\x5a\xb8\xe3\x4a\xc3\x49\xf7\xde\x41\x47\x2d\xc8\x4e\xe8\xdd\x41\x40\xad\xc0\x5c\x65\x1b\xf8\xf5\xb7\xf9\xc6\x22\xf3\x44\x0e\x3a\x7e\x49\x6f\xbe\x39\x05\x29\xca\xd6\xb7\x39\x64\xdc\xf2\x08\x50\x6b\xf2\x49\xdb\xd8\xc5\x37\xc8\xb3\x49\x59\x06\xed\x82\xf0\x47\x37\x7c\x7a\xb7\xcc\x73\xc8\xa7\x6e\x2d\xf3\xbc\x2f\xe4\x15\xd7\x2c\xad\x50\x8b\x7c\xe3\xbc\x41\x82\x8c\xd2\x82\x2b\x14\x2a\xc7\x34\xa5\xf3\x12\x99\xd7\x8d\xcc\x68\x60\x7c\x0a\x3a\x7e\x83\x3c\x43\x1d\xff\x84\x36\xf0\xcf\xda\xc1\x11\x8d\x92\x6c\x8a\x1c\x86\xf3\xbf\x39\x05\xbf\xeb\xeb\xc9\x61\x6d\x6f\xea\x6c\xa2\xce\x2f\x7e\xa5\xb5\xd2\x79\xe0\x0f\x96\x9c\x3e\x31\x11\xb5\xd8\xd4\xda\xed\xad\x8c\x86\xe0\x77\xc9\xd0\xee\xc7\x21\x7e\x08\x5e\xd0\x21\x90\xab\x20\xaf\x6c\x3c\xad\xb5\x90\x36\x0f\x7c\x17\x77\x8a\xa4\xde\x26\xe1\x13\xe3\x47\xce\xe3\x61\xc8\x98\x97\xa1\x41\x2d\x78\x29\xfe\x44\xe7\xd8\x54\x65\x98\x9a\xf8\xbd\x14\xa4\x20\xbc\x3c\x1f\x8c\x07\x21\xf3\xd4\xfc\x53\x04\xc5\x6a\xd9\x47\x62\x08\x10\x9f\x23\xad\x0f\x08\x3d\xa2\x20\xb8\x7f\x5a\xe7\xd0\xf4\x41\x40\x2b\x53\xb8\xdc\x1e\xda\xda\xa5\x0a\xa4\xaa\x29\x33\xf7\xe9\x36\xa7\x03\x92\x20\xb3\x31\x3c\x59\xf9\x8e\x34\xdc\xf1\x61\x50\x99\x82\xde\xb8\x5c\x6b\xdf\xac\x23\xa8\x4c\x11\xb5\x69\x39\xb5\xdc\x36\xe6\x25\xcf\xb6\x85\x75\xcf\x77\x94\x7e\xba\x4b\xdd\xeb\xf9\x27\xe8\x3a\xf5\xf8\x7a\x4e\x27\x15\xf3\xcc\x5a\xd8\x74\x01\x27\xc5\x6a\x49\x76\xa7\xdc\x60\x2f\x10\xd3\x74\x81\x15\xfe\xa4\x55\x53\x77\x1f\xa3\xf1\x47\x61\x17\x6f\x85\xcc\x02\xff\x9e\x08\xf8\xe1\xd8\x31\x3b\x23\x30\xbb\x37\x1a\x81\x5a\x92\x3b\xd4\xfc\x53\x1c\x1c\x92\x19\x27\x40\x6d\x1d\x7c\xa3\x96\x6d\x6e\xef\x24\xd2\x2b\x97\x38\x98\x1d\x53\x2f\x98\x37\x16\x0a\x45\xf1\x9f\xf9\x11\x11\x11\x5c\xef\x0a\x2a\x0d\x6f\xeb\x87\xfb\x4b\xc7\xa7\xf0\xf4\x08\xec\xed\x03\xeb\xe2\x29\xda\xa1\x73\x9c\x5f\xc8\x91\xe1\x03\x6b\x7a\x45\x3d\x6d\xa5\x22\xee\x88\x83\x93\x63\xbe\xfb\x2b\x68\xf1\xfb\x8b\x73\x38\x85\x63\x10\x5b\x91\xa2\x69\x03\x34\xca\x87\x53\x38\x82\xdd\xe7\xc2\x23\xa6\xc1\x3f\xcd\x80\x7f\x3f\xf8\xff\x8d\xb8\xff\x0f\x86\xbc\xeb\xd6\xc7\x47\x04\xec\xbd\xec\x3a\x33\xcc\xa0\x20\x0f\x6c\xdb\x30\x58\x0a\xb9\x95\xb0\xce\x11\xff\x9e\x84\x3d\x24\xff\x06\xdb\x73\x7c\xbb\xa3\xce\x86\xc1\x76\xc3\x90\xb9\xdd\xbf\xdc\x58\x34\xbd\xaa\xd3\xa1\x13\xbf\xe3\xda\x2c\x78\x19\x0c\x67\x1f\xd2\xf2\xc1\x56\x3a\x7d\xde\xdd\x0a\x6a\xdd\x3d\x84\x3b\x5b\xba\x90\x16\xb5\xe4\xe5\xd4\x7d\x6e\xb9\x19\xbb\x7b\xf3\xd6\xdd\x91\x4b\xdf\x20\x7b\x87\x6e\x74\xe0\x84\x6d\xed\xfb\xff\x7e\x1f\xeb\xd8\xf5\x23\x41\xbf\xc3\xae\x47\x78\xc8\xfa\xbb\xc6\xd2\x35\x38\x93\x72\xcd\x37\x66\x52\x96\x8a\xda\x5e\xbe\x79\x2d\x56\x38\xc5\x54\xc9\xcc\xfc\xc5\xde\xc7\xf5\x39\x5d\xb3\x14\x81\x8e\x1e\xec\xa0\xf9\x71\xba\x30\x3c\x64\xd9\x39\xca\xcd\xe3\x19\x42\xe8\x7b\xbc\x59\x76\xc9\xe7\x58\x3e\x0a\x6b\x87\x7d\x9f\xf3\x67\xf5\x48\xee\xa6\x07\x02\xdf\xdb\xa4\xb5\xee\x0a\xaf\x78\x2c\xe6\x0c\xe5\x66\xda\xdd\x92\xb6\x64\x15\x4a\x7b\xdf\x0c\x77\xb1\xf4\x68\xbb\xaf\x7a\xf4\xe3\xbc\xd3\xf6\x53\xfd\x71\xe9\x3b\x92\xfb\x56\xb4\xd7\x57\x15\xaf\x1f\x2f\xf6\x2d\xc5\x3b\x5e\x1f\x71\xc1\xe3\x9a\x50\xdd\xe3\xd8\x73\x40\x63\xac\xaa\x6e\xd0\xa8\x46\xa7\x7f\xf5\x5b\xeb\x1f\x38\x61\x87\xe6\x88\x23\x1e\xdd\x94\xea\x00\xcf\x9e\x43\x6e\xce\x1f\xcf\x0b\x37\xe7\x03\xba\x8a\x0b\x19\xa4\x55\x06\x27\x3b\x77\xd3\x11\x70\x5d\x18\xf8\xf5\xb7\xf6\xd6\xdb\xb1\xa4\x2e\x7e\x74\xde\xb4\x91\xa4\x63\xe5\xac\xbb\xc2\x1c\x43\x7f\x99\xc9\x3c\xef\x6d\x7b\x55\x38\x06\xd8\x5e\x1a\xb6\x67\xb8\x33\xbc\x35\xe6\x75\x23\xd3\xc0\x4f\x5a\xf9\x1d\x71\x3a\x08\x46\x19\x9d\x04\xa3\xef\xe9\xcb\xed\x6b\x67\x52\xf8\x00\x18\x49\xce\x2e\x84\x93\xf7\x83\x2b\xb2\x6c\x54\x92\x10\xf7\xf3\xb7\xc2\x7c\x68\x76\xad\xb2\xde\x36\xa7\x26\xc7\x26\x25\xdc\x29\x5d\x0f\x3a\x14\xd9\x83\x8b\xaa\xee\x62\x7d\x34\xa4\xb8\x13\xa7\xaf\xaf\x19\x6d\xaf\x1a\xf7\xd6\x6e\x35\xe7\x10\x44\xda\x57\xe4\x76\xdd\xa0\x46\x1f\xe4\xdc\x5f\x79\x5f\x47\x0e\x13\xba\xac\x1f\xe9\x2e\xed\x7b\xd6\xdd\x62\x78\x98\xf9\x30\xc4\xa1\xea\x3d\x6c\x82\xce\x7a\xda\x9b\xf3\x83\x53\x34\xf2\x6c\xf3\xa7\x1f\xb5\xf7\x65\xc7\xea\x10\xff\xd8\xab\xc4\xbe\x11\x6b\x6f\x79\x02\x5f\x2d\xfd\x30\x84\x2f\x61\x57\xa2\xae\x59\x7b\xda\xf6\x86\xee\x99\x4a\x68\x92\x65\x7a\x7b\xe1\x37\x6c\x6a\xc7\x4f\xc8\x50\xea\xb3\xdd\xad\xe0\xec\x72\xda\x3a\xd7\x5d\xb0\xe5\xa2\x98\x5d\x4e\x83\xf6\xaf\xd0\x95\x97\xd7\x35\x83\x2d\x53\x7c\xe9\xae\xbb\x27\x32\x73\x4c\x34\xd9\x77\x37\xd7\x07\x7b\xdb\x9a\x4b\x91\x0e\x1a\xc3\xff\x04\x00\x00\xff\xff\xb5\xee\xc0\x8c\xc4\x1e\x00\x00") + +func testImagesAgnhostWebhookMainGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookMainGo, + "test/images/agnhost/webhook/main.go", + ) +} + +func testImagesAgnhostWebhookMainGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookMainGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/main.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookPatch_testGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xdc\x57\x4d\x6f\xdb\x38\x13\x3e\x8b\xbf\x62\xaa\x17\x6f\x61\x17\x8e\x54\xe7\x54\x78\xd1\x83\x37\x49\xb1\xee\x87\x5d\x44\xce\x16\x45\x1a\x2c\x28\x6a\x24\x31\x91\x48\x96\xa4\xe2\x18\x85\xff\xfb\x82\xfa\x88\xe5\xe6\xa3\x6e\xb7\x3d\xec\x1e\x62\x89\xe4\x70\xe6\x99\x67\x66\x34\x93\xf0\x19\x39\x92\x6a\xad\x79\x96\x5b\x38\x7c\x3e\x7e\x01\xcb\x1c\xe1\x4d\x15\xa3\x16\x68\xd1\xc0\xb4\xb2\xb9\xd4\x26\x20\xe4\x2d\x67\x28\x0c\x26\x50\x89\x04\x35\xd8\x1c\x61\xaa\x28\xcb\x11\xda\x93\x11\xfc\x89\xda\x70\x29\xe0\x30\x78\x0e\x03\x27\xe0\xb7\x47\xfe\xf0\x37\xb2\x96\x15\x94\x74\x0d\x42\x5a\xa8\x0c\x82\xcd\xb9\x81\x94\x17\x08\x78\xc3\x50\x59\xe0\x02\x98\x2c\x55\xc1\xa9\x60\x08\x2b\x6e\xf3\xda\x48\xab\x22\x20\x1f\x5b\x05\x32\xb6\x94\x0b\xa0\xc0\xa4\x5a\x83\x4c\xfb\x52\x40\x2d\x21\x00\x00\xb9\xb5\x6a\x12\x86\xab\xd5\x2a\xa0\x35\xca\x40\xea\x2c\x2c\x1a\x29\x13\xbe\x9d\x1d\x9d\xcc\xa3\x93\x83\xc3\xe0\x39\x21\x67\xa2\x40\x63\x40\xe3\xe7\x8a\x6b\x4c\x20\x5e\x03\x55\xaa\xe0\x8c\xc6\x05\x42\x41\x57\x20\x35\xd0\x4c\x23\x26\x60\xa5\xc3\xb9\xd2\xdc\x72\x91\x8d\xc0\xc8\xd4\xae\xa8\x46\x92\x70\x63\x35\x8f\x2b\xbb\x43\x50\x87\x8a\x1b\xe8\x0b\x48\x01\x54\x80\x3f\x8d\x60\x16\xf9\xf0\xfb\x34\x9a\x45\x23\xf2\x61\xb6\xfc\x63\x71\xb6\x84\x0f\xd3\xd3\xd3\xe9\x7c\x39\x3b\x89\x60\x71\x0a\x47\x8b\xf9\xf1\x6c\x39\x5b\xcc\x23\x58\xbc\x82\xe9\xfc\x23\xbc\x99\xcd\x8f\x47\x80\xdc\xe6\xa8\x01\x6f\x94\x76\xd8\xa5\x06\xee\xa8\xc3\x24\x20\x11\xe2\x8e\xf1\x54\x36\x60\x8c\x42\xc6\x53\xce\xa0\xa0\x22\xab\x68\x86\x90\xc9\x6b\xd4\x82\x8b\x0c\x14\xea\x92\x1b\x17\x3c\x03\x54\x24\xa4\xe0\x25\xb7\xd4\xd6\xeb\x3b\xee\x04\xe4\x59\x48\x88\xa2\xec\xca\x29\x59\x61\x9c\x4b\x79\x45\x08\x2f\x95\xd4\x16\x06\xc4\xf3\x51\x30\x99\x70\x91\x85\x97\x46\x0a\x9f\x78\x7e\x5a\x5a\xf7\xd0\x98\x16\xc8\xea\x57\x8b\xc6\x51\xe8\x13\xe2\x39\x21\x45\x2d\xcb\xc1\xcf\xb8\xcd\xab\x38\x60\xb2\x0c\xf1\x9a\x0a\x95\xdf\xd4\x2a\x0e\xea\x63\x9f\x78\x4c\x6a\xbc\x1e\x83\x7f\xf5\xc2\x04\x5c\x86\x54\xf1\xd0\x6d\x85\xd7\x63\xa7\x73\xbb\x5b\x52\x96\x73\x81\x7a\x1d\xaa\xab\xcc\x6d\x98\xb0\x44\x4b\xc3\xeb\x71\x58\x09\x63\x75\xc5\x6c\xa5\x31\xf1\xc9\x90\x90\xb4\x12\x0c\x96\x68\xec\x7b\x67\x04\xcd\xc0\xc2\xb3\x16\x5d\xb0\x1c\xc2\x17\xe2\x19\x9e\x20\xa3\x7a\x56\x3a\x7f\x5f\x42\x8d\xfd\x80\xbb\x95\x4f\x3c\xb7\x38\xa2\x06\x0d\x4c\x5e\xc2\xf9\x45\xa3\xdc\xdd\xf2\x1a\x9f\x00\xc0\x45\x5e\x64\xc4\xf3\xb8\xe0\x96\xd3\x02\x80\x0b\x8b\x3a\xa5\x0c\xbf\x6c\x88\xe7\xe1\x8d\x42\xe6\x12\x63\x77\xdb\x4a\x87\x0a\xbe\x92\xde\x38\xd5\xee\xaf\xd1\x3f\x01\x26\x45\xca\xb3\x77\x54\xd5\xf8\xc7\x23\x77\xd4\x1a\x72\x87\x8e\xb0\xe0\xa8\x93\xa9\x2f\x7a\xc7\xd4\xd2\x09\x94\x54\x9d\x37\xd0\x2e\x9a\x47\x73\xe8\xf9\x65\xd5\xc4\xfe\xc0\x58\xaa\xad\x3f\x01\x7f\x8d\xc6\xaf\x15\x7b\x9b\xfa\xd1\xfc\x76\xb8\x27\xf0\xf4\xe7\xd8\x81\xbe\xa5\xdd\xf3\x0c\x0f\xc6\x0f\x22\xa9\x7f\x1e\xe6\xe4\xf0\xbf\xcb\xc9\xe1\x63\x9c\x7c\x45\x8a\x92\x89\x99\x09\x6e\x8f\xa4\x70\x5f\x50\xd4\x35\x39\xf7\x72\xf3\x5e\x26\x0d\xa0\x48\x21\xeb\xef\xba\x75\x0b\x75\x47\x95\x99\xc0\xf9\xc5\xd6\xe1\x66\xf3\xcb\x66\x1f\x7e\x7e\x92\xad\x46\xd0\xeb\x9e\x5e\x5d\xad\x8e\x3e\x00\xbf\xfd\x46\x1d\xd0\x24\xc1\xa4\xad\xdc\x51\x27\x38\xa7\x65\x2b\x77\x47\x50\x70\x7b\xc0\x3a\x0b\xdb\x1b\xa7\x68\x64\xa5\x19\x9a\x5b\xb4\xdd\xce\x69\xd3\x43\x4a\x14\xd6\x74\xde\x77\x9e\xdf\x3e\x1f\x4b\xdc\xb4\xb4\x41\xa4\x34\x17\x36\x1d\xb8\x78\x45\xcd\xa7\xa7\x89\x14\xf4\x3f\x44\xc3\x1f\x0e\xdc\x3f\x20\xb2\xa6\x6e\x7c\x3f\x77\xb7\x44\x8d\x7f\x05\x53\x3f\x98\x38\xff\x02\x5f\xef\xb5\xde\x8f\xf4\x1e\x99\xda\x8a\xff\xaa\x14\xdd\x10\xcf\x4d\x11\x7f\x8d\xc0\x75\x3b\x46\x0d\xba\x66\xa7\xa9\xc8\x10\xb6\xfd\xcf\xf9\x21\xe3\xcb\xd7\xd1\x08\x50\x6b\x27\xe1\x7a\x77\xf0\x8e\x6a\x93\xd3\x62\xd0\x5d\x0d\xda\x9c\x1d\xba\x86\x98\xd6\xa2\x4f\x5e\x82\xe0\x45\xad\xc0\xb3\xc1\x2b\x6a\x69\x31\x40\xad\x9d\xc4\xa6\x6b\xa4\x8b\xf8\x72\x47\x6f\xbd\x19\x1c\x23\x93\x09\xd6\xe5\x31\x38\xbf\x88\xd7\x16\xb7\x76\x6a\x89\xe1\xbe\x66\x3a\x3b\x98\xf4\x1c\xe8\x2c\x07\x53\xa5\x8a\xf5\xa0\xf6\x6e\x7f\xdc\x32\xbe\x5c\xae\x55\xc3\x55\x33\xf9\x04\x6e\xbd\x48\xef\xe5\xc2\x49\xbb\x7e\xdf\x93\x9e\xe3\x6a\xd0\x2a\x19\x06\xb3\x6e\x0a\x18\x38\x69\x67\xbe\x25\xf8\x4c\x94\x2d\xc5\x3d\x07\x5a\x6d\xfb\x83\xe5\x29\x3c\xe9\xec\x1e\x23\xaa\x93\xcf\x15\x2d\x06\xad\x9a\x6d\xe0\x83\xae\x0e\x87\x9d\xa6\x13\xad\xa5\x4e\x07\xfe\x27\x71\x3b\xc7\xfc\xff\x7f\xd7\x9f\xc4\x08\x32\x69\xdd\xab\x7f\xcf\xed\x1d\x80\x6e\xaa\x21\x64\xd3\x1b\xc5\x5e\x47\x8b\x79\x1d\xd4\x57\x52\x9f\xf5\x06\xb6\xbb\xb3\x19\xab\xe3\xf4\xb4\x3f\xd5\x05\xfd\x1b\x0e\xe4\x22\xbe\x44\x66\x77\x9a\x6e\x6f\xa4\xaa\xdd\xf0\xaf\xb8\x48\xfc\xb6\xb8\xc0\x8f\x64\x89\x36\x77\xf3\x69\x5d\x08\x3e\x55\xbc\xfd\xe7\xc6\xf5\x5b\x23\x4b\xcc\xb4\xac\x94\x9b\x3b\x1b\x81\x84\x5a\xea\x3f\x6a\xe1\xd1\x11\xa2\x5f\x69\x4c\x3f\x54\x41\xcc\x05\xeb\x6e\x34\x77\x83\xe9\x32\xf9\xfb\x0a\xe6\xab\x01\x72\xb8\x97\x91\x6f\x17\x8b\xf3\xe3\xbb\x54\x2d\xe2\x4b\xa7\xe6\xe1\x50\x6e\xc8\x37\xd3\xfe\xe9\x56\xd7\x7e\xb6\xbb\x84\x74\x63\x99\xb3\xfe\x70\x04\x1f\x1d\xcd\x1e\x9b\x55\x5d\x44\xee\xaf\xae\x2d\xd8\xa0\xc9\xd1\xf3\x26\x91\x2e\x46\xd0\xc7\x35\x6c\xa1\xef\x53\x69\xfd\x7b\x23\x78\xd0\x40\xed\xfc\x86\xfc\x1d\x00\x00\xff\xff\x4a\xcc\x89\x60\x00\x10\x00\x00") + +func testImagesAgnhostWebhookPatch_testGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookPatch_testGo, + "test/images/agnhost/webhook/patch_test.go", + ) +} + +func testImagesAgnhostWebhookPatch_testGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookPatch_testGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/patch_test.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookPodsGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x58\x5f\x6f\xe3\xb8\x11\x7f\x16\x3f\xc5\x84\xc5\xee\xd9\x5b\x59\x4a\x02\x14\x38\x38\xf5\x83\x9b\xdd\x6b\xdd\xdb\x3a\x41\x9c\xdd\xc3\x21\x0d\x6e\x69\x69\x6c\xb3\x91\x48\x2d\x49\xd9\xeb\xfa\xfc\xdd\x0b\x92\xb2\x2c\xc5\xce\xde\x65\xf7\xae\xe8\x43\x81\x00\x89\x38\xc3\x99\xdf\xfc\x1f\x26\x7e\x45\x2e\x65\xb1\x56\x7c\xbe\x30\x70\x7e\x7a\xf6\x2d\xdc\x2e\x10\xbe\x2f\xa7\xa8\x04\x1a\xd4\x30\x2c\xcd\x42\x2a\x1d\x11\xf2\x96\x27\x28\x34\xa6\x50\x8a\x14\x15\x98\x05\xc2\xb0\x60\xc9\x02\xa1\xa2\x84\xf0\x1e\x95\xe6\x52\xc0\x79\x74\x0a\x1d\xcb\x40\x2b\x12\xed\x5e\x90\xb5\x2c\x21\x67\x6b\x10\xd2\x40\xa9\x11\xcc\x82\x6b\x98\xf1\x0c\x01\x3f\x25\x58\x18\xe0\x02\x12\x99\x17\x19\x67\x22\x41\x58\x71\xb3\x70\x4a\x2a\x11\x11\xf9\xb1\x12\x20\xa7\x86\x71\x01\x0c\x12\x59\xac\x41\xce\x9a\x5c\xc0\x0c\x21\x00\x00\x0b\x63\x8a\x7e\x1c\xaf\x56\xab\x88\x39\x94\x91\x54\xf3\x38\xf3\x5c\x3a\x7e\x3b\xba\x7c\x33\x9e\xbc\xe9\x9d\x47\xa7\x84\xbc\x13\x19\x6a\x0d\x0a\x3f\x96\x5c\x61\x0a\xd3\x35\xb0\xa2\xc8\x78\xc2\xa6\x19\x42\xc6\x56\x20\x15\xb0\xb9\x42\x4c\xc1\x48\x8b\x73\xa5\xb8\xe1\x62\x1e\x82\x96\x33\xb3\x62\x0a\x49\xca\xb5\x51\x7c\x5a\x9a\x96\x83\x76\xa8\xb8\x86\x26\x83\x14\xc0\x04\xd0\xe1\x04\x46\x13\x0a\x7f\x19\x4e\x46\x93\x90\xfc\x30\xba\xfd\xdb\xd5\xbb\x5b\xf8\x61\x78\x73\x33\x1c\xdf\x8e\xde\x4c\xe0\xea\x06\x2e\xaf\xc6\xaf\x47\xb7\xa3\xab\xf1\x04\xae\xbe\x83\xe1\xf8\x47\xf8\x7e\x34\x7e\x1d\x02\x72\xb3\x40\x05\xf8\xa9\x50\x16\xbb\x54\xc0\xad\xeb\x30\x8d\xc8\x04\xb1\xa5\x7c\x26\x3d\x18\x5d\x60\xc2\x67\x3c\x81\x8c\x89\x79\xc9\xe6\x08\x73\xb9\x44\x25\xb8\x98\x43\x81\x2a\xe7\xda\x06\x4f\x03\x13\x29\xc9\x78\xce\x0d\x33\xee\xfb\xc0\x9c\x88\xbc\x8a\x09\x29\x58\xf2\x60\x85\xac\x70\xba\x90\xf2\x81\x10\x9e\x17\x52\x19\xe8\x90\x80\xce\x72\x43\x49\x40\xad\xc5\x62\xae\x29\x21\x01\x7d\xf8\x56\x47\x5c\xc6\xac\xe0\x31\x4b\x2b\x5d\xf1\xf2\x8c\x92\x20\x91\x0a\x97\x67\xd0\xe4\xb0\x47\x9e\x98\xa3\x61\x6d\x62\xce\x92\x05\x17\xa8\xd6\x71\xf1\x30\xb7\x07\x3a\xb6\x4c\x9e\x7d\xc7\xf7\x90\xc9\x79\xbc\x3c\xa7\xa4\x4b\x48\x22\x85\x76\xb0\x0a\x99\xea\x91\xe0\xe6\x52\x0a\x9b\x41\xa8\xae\x99\x49\x16\xe0\x51\xc2\x00\x3e\xdc\x91\x20\x80\x0d\x95\x05\xed\x53\x96\xa6\x34\xa4\x05\x33\x0b\xda\xa7\xb1\xf5\x5d\xcc\x9b\x77\x35\x0d\xe9\x92\x65\x25\xd2\xfe\xdd\x86\xf2\x9c\xcd\x91\xf6\x69\xe5\x8c\x1e\x4b\x53\x4c\x7b\xfe\x34\xa4\x82\xe5\x47\x88\x82\x9b\x5e\xb2\x13\x47\x43\xaa\x50\xcb\x52\x25\xa8\x69\x7f\xb3\xdd\xde\x6f\x49\x70\xff\xc1\x83\x9e\xf0\x14\x13\x76\x14\x6e\x13\x2d\xb4\xe1\xd6\xb2\x75\xdc\xdb\x83\xdd\x63\x7d\xb1\x7c\x0a\x9a\xf6\xfa\x0e\x30\x79\x48\x5d\x42\xe2\x18\xa4\xc8\xd6\xc0\xb2\x4c\xae\xc0\x42\xb4\x85\x51\x94\x59\x06\x4e\xba\x86\x99\x92\xf9\x3e\xe3\x14\xce\x6d\xfa\xaf\x23\x32\x2b\x45\x02\x36\x01\xcc\xb5\x4c\x75\x87\x29\x58\x9e\x45\xc3\x5d\x42\xdc\xe0\x92\xe3\xaa\x0b\xaf\xda\x87\xba\x90\x36\x91\x37\x24\xb0\x71\x8d\xde\x77\xce\xbb\xd1\x48\xcc\x64\x87\x3a\x49\xc6\x65\xb0\x4c\x35\xed\x3a\x7f\xdd\x54\xa0\xa1\x3f\x00\x9f\x3f\xd1\x5f\x95\x2c\x8b\xaa\x3d\xed\xc8\x1b\x77\xd8\x07\x4a\xeb\xce\xd5\x07\xba\x3c\xa3\x21\xec\x58\xfa\x40\x9d\xdc\x2d\x09\xf8\x0c\x98\x8a\x6e\xf0\x63\x89\xda\x44\xb5\x8a\x93\x01\x34\x35\x6e\x48\x10\xa0\x52\x56\xf3\x2c\x37\xd1\x1b\xa5\xa4\x9a\x75\x28\x7e\x2a\x30\x31\xb0\xf3\xa6\x75\xd6\x14\xe1\x85\xa6\x61\xf3\x76\x97\x04\xde\x40\x77\xad\x83\x4a\xd9\x13\x85\xa6\x54\x02\x8c\x7c\x7f\x76\xe0\x92\x8a\x67\x4b\x48\xa0\xd8\xca\x6a\x6d\x60\xbc\x9a\xfe\x0b\x13\x13\xdd\xb0\x95\xf3\x8a\xa5\xfa\x52\x8b\xae\x65\xba\xd9\x92\x20\x45\x8d\x8a\xb3\x8c\xff\x1b\x95\xa7\xa6\x98\xe8\xe8\x9d\xe0\x4b\x54\x9a\x65\xaf\x1b\xf4\x4e\xd7\xb9\xe0\xa7\xd0\xfe\x54\x16\x36\xef\x47\xaf\xd1\x5e\xef\x28\xb6\x0a\x41\xf0\x2c\x84\x97\x85\x4c\xbb\x17\x8e\xf7\x64\x60\x8f\x9c\x73\xbe\xd0\xbe\x40\xb9\xcc\xa8\x53\xa1\x3f\x80\x63\x29\xb2\x39\xe0\x8c\x86\x36\x45\x31\x85\x01\x18\x55\x22\x21\xc1\x92\x29\xc8\xf5\xbc\xaa\x23\x67\xd5\x32\x04\xf9\x60\x65\x16\x32\x8d\xde\xb2\x29\x66\xfa\xae\x2e\x09\x3c\xc7\x9e\x41\x6d\xe8\xfd\x85\xe5\xb2\x46\xd8\x2b\x30\x18\x40\xcd\x93\x72\xed\x4a\x81\x3a\xf2\xd3\x10\x66\x2c\xd3\x68\x39\x2c\x80\x81\x83\xf1\x47\xa0\xb6\xb5\xda\x00\x55\x05\x6b\x3b\xee\x8a\x09\x3b\x28\x32\x8b\xe5\x02\x28\x09\xac\x0f\x1a\x7a\x19\x37\xbd\x99\x0d\x26\xaa\xaf\xd3\xa9\x76\x1e\xd5\x0b\x59\x66\xa9\x9b\xce\x53\x04\x8d\xc2\x78\xbd\xc1\x9f\x7b\x39\x7b\xc0\x4e\xb2\x60\x02\xb8\x30\x5d\x88\x63\x98\x64\x88\x05\x54\x00\xa0\x07\x42\x82\x14\xee\x96\xef\x04\x6e\xb6\xdb\x1b\x02\x33\x8f\x7d\x4b\x02\x3b\x87\x7e\x0a\xa1\x6e\x4b\xd6\xe1\x8a\x89\xb9\x03\x12\x4d\x0a\x4c\xa2\x7d\x77\xdd\xf9\xb9\x1a\x21\x3b\x8a\xee\xd4\xd7\xa3\x31\xcb\x31\x3c\x12\x83\xee\x6f\x1c\x84\x3d\x60\xdb\x2c\xeb\x68\xf8\x9e\x70\xf2\x84\x9a\x0d\x39\x40\x70\x83\xba\xcc\x0c\x0c\xe0\x65\xd5\x94\x26\x86\x99\x52\x6f\xfe\x81\x5a\xb3\x39\xf6\x6b\x5b\x6f\x15\xcf\x27\x05\x4b\xb0\x93\xeb\x79\x77\x5b\xe5\xbf\xab\x92\x97\x6d\x99\x64\x4b\x7c\x47\xcd\x4b\xc3\x0c\x7e\x51\x4b\xf5\x81\x77\xb3\xe5\xda\x77\x09\x2b\xb1\x63\x7d\xf1\x6a\xdf\x2f\xba\x30\x95\x32\xdb\x45\xc5\x06\xcc\xba\xdf\x56\x76\x1d\x00\x23\x7b\x53\xec\x79\x24\x69\x9d\x95\x0e\xf6\xce\xe5\xdb\x7d\xbd\x9f\x2c\x98\xae\xc3\xdd\xa9\x33\xa0\x35\x9f\x75\x23\xbc\x47\x87\x66\xb7\xe9\x1b\xbb\xb3\xad\xaf\xa5\x37\xa5\xc3\x54\x08\x6d\xd3\x5c\xaf\x3d\xb2\x00\x74\x8f\x78\xb1\x9a\xb8\xcf\x76\xa6\xcd\x58\x7f\x75\x64\xe7\xa0\x2b\x56\x5a\x25\x83\x0f\xe0\xd1\xb6\x65\x5d\x55\x65\x4e\xdf\x3b\x2b\xb4\x47\x3e\x63\xfa\x8f\x13\xc6\x92\x02\xff\x77\x1f\x80\x7e\xc7\x78\x56\x2a\xa4\xee\x4a\x50\x67\x13\x1d\x4b\x3f\x8c\x77\x63\xd8\x6f\xb6\x6e\x13\xf4\x10\xfd\x7e\x02\x05\x53\x2c\x47\x63\x77\x10\x27\xe1\x52\xa6\xd8\xb7\x3b\xf4\x9f\x4e\x4f\xdd\xc9\x36\xac\x33\xfe\xd9\xc9\xf2\xf9\x68\x7f\x26\xd2\xbb\x1d\xe4\x99\x21\xb6\x53\x77\x52\x28\x2e\xcc\xac\xf3\x78\x75\x0a\x5b\xb1\xe9\xee\xe3\xde\x02\xb7\x5f\x9b\xe0\xee\xbe\xb2\xa9\xa6\x36\xda\x97\xcb\x7f\x5f\xb2\x7b\x7b\x9f\xee\x71\xc9\x41\x6b\x6b\x77\x32\x9b\x2a\x6d\xd9\xcd\x02\x72\xb3\x6b\x17\x84\x56\x51\xed\x6c\x78\xec\x9a\x23\x79\xfb\xd8\x5b\x3e\x76\x07\x71\x0b\xa1\x68\x2c\x9a\xcf\x58\xc6\x5c\xf9\xfc\x6f\xed\x62\xfb\x75\xe3\x59\x5b\x58\xe5\x61\xc1\xb3\xff\x2f\x57\xcf\x58\xae\x5c\xfb\x6b\xa5\x58\xc7\x01\x3d\x36\x0d\xfd\x63\x66\x00\x77\xf7\xd3\xb5\xc1\x4e\xe1\x3b\x71\x10\x14\xa6\xd2\xef\x18\x6e\xd7\x05\xfe\x7d\x72\x35\x76\x1f\x4f\x08\xb1\x3c\x76\xaa\x16\xe6\x17\x26\x65\x1c\x43\x8a\x62\x3d\xa9\x5e\x25\x43\x63\x58\xb2\xc8\x51\x18\x7b\xcc\x51\xc3\x87\x87\x72\x8a\x89\xc9\x80\x39\x12\xf8\x89\xe6\x3f\x30\xed\xd9\x38\xf7\x38\xf4\x92\x41\x5d\xa8\x67\xd4\xbd\x85\x14\xe0\xc7\x92\x2f\x59\x66\x85\x25\x19\xb7\xbf\x94\xcf\x14\x5d\xbd\x79\x8e\x6b\xfe\xea\x07\xd0\x82\x89\x34\xb3\x35\xe7\x51\x36\xab\xaf\x5d\x25\xf5\xb8\x3e\x34\xea\x57\x0c\xa8\x7a\x38\xd9\x38\xfb\x2e\xf4\x3b\x16\x37\x86\xc0\xaa\x75\x7c\xc7\x10\x1e\xab\xf8\x0b\x70\x26\xb1\xe7\x3e\xbb\x42\x98\x4b\xe3\x0b\xdf\x0a\xfe\x8a\x77\x57\x13\x2d\xf5\x3e\xa5\x2d\xa8\x93\x72\xfa\x4c\xb4\xba\x9c\xfe\x8e\x80\x7f\x45\x2f\xf3\xd9\x79\x55\xf8\xff\xfe\xb4\x1a\x5b\x8b\xf4\xdf\xe9\x72\x2d\x95\xbf\x5d\xcb\x7b\x54\x47\xcd\xb5\x81\x3e\xd6\x3a\x78\xf1\x87\xe5\x3f\x85\x9f\x12\x6d\x38\xde\xa2\x93\xc7\xe7\xd1\xc4\xa4\x5c\xc0\xcf\x3f\x1f\xdc\xd8\x6f\x12\xae\x16\x1b\x7d\xe4\x8b\x6a\xf0\x97\x96\xca\xc3\x9d\xf2\x33\x2b\xe5\x7e\x73\xdc\xf7\x12\x23\xdd\xa3\xe8\x9b\xc3\xa6\xf1\x0d\x70\xed\x5e\x8b\xcc\xeb\x70\xcb\xa3\xdd\x14\xb7\x64\x4b\xfe\x13\x00\x00\xff\xff\x16\xa1\xb8\xcd\x57\x16\x00\x00") + +func testImagesAgnhostWebhookPodsGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookPodsGo, + "test/images/agnhost/webhook/pods.go", + ) +} + +func testImagesAgnhostWebhookPodsGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookPodsGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/pods.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesAgnhostWebhookSchemeGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x92\x4f\x4f\xeb\x46\x14\xc5\xd7\xcc\xa7\x38\xca\x2a\x41\xa9\x0d\xac\x50\x2b\x16\x6e\x00\xd5\x82\x26\x12\x0e\x45\x2c\x27\xe3\x1b\xfb\x2a\xf6\x8c\x3b\x33\x8e\x49\x2b\xbe\xfb\x93\x1d\xe7\x91\x04\x78\x7a\x7f\x96\xb9\xe7\x77\xcf\x39\xbe\x99\xf0\x54\x4c\x4c\xb5\xb1\x9c\xe5\x1e\x17\x67\xe7\x97\x98\xe7\x84\xbb\x7a\x41\x56\x93\x27\x87\xa8\xf6\xb9\xb1\x2e\x10\xe2\x9e\x15\x69\x47\x29\x6a\x9d\x92\x85\xcf\x09\x51\x25\x55\x4e\xe8\x95\x31\xfe\x21\xeb\xd8\x68\x5c\x04\x67\x18\xb6\xc0\xa0\x97\x06\xa3\x3f\xc4\xc6\xd4\x28\xe5\x06\xda\x78\xd4\x8e\xe0\x73\x76\x58\x72\x41\xa0\x17\x45\x95\x07\x6b\x28\x53\x56\x05\x4b\xad\x08\x0d\xfb\xbc\x0b\xe9\x2d\x02\xf1\xdc\x1b\x98\x85\x97\xac\x21\xa1\x4c\xb5\x81\x59\xee\x53\x90\x5e\x08\x00\xc8\xbd\xaf\x7e\x0f\xc3\xa6\x69\x02\xd9\xb5\x0c\x8c\xcd\xc2\x62\x4b\xb9\xf0\x3e\x9e\xdc\x4c\x93\x9b\xdf\x2e\x82\x33\x21\x1e\x75\x41\xce\xc1\xd2\xbf\x35\x5b\x4a\xb1\xd8\x40\x56\x55\xc1\x4a\x2e\x0a\x42\x21\x1b\x18\x0b\x99\x59\xa2\x14\xde\xb4\x3d\x1b\xcb\x9e\x75\x36\x86\x33\x4b\xdf\x48\x4b\x22\x65\xe7\x2d\x2f\x6a\x7f\x70\xa0\x5d\x2b\x76\xd8\x07\x8c\x86\xd4\x18\x44\x09\xe2\x64\x80\x3f\xa3\x24\x4e\xc6\xe2\x29\x9e\xff\x35\x7b\x9c\xe3\x29\x7a\x78\x88\xa6\xf3\xf8\x26\xc1\xec\x01\x93\xd9\xf4\x3a\x9e\xc7\xb3\x69\x82\xd9\x2d\xa2\xe9\x33\xee\xe2\xe9\xf5\x18\xc4\x3e\x27\x0b\x7a\xa9\x6c\xdb\xdd\x58\x70\x7b\x3a\x4a\x03\x91\x10\x1d\x84\x2f\xcd\xb6\x8c\xab\x48\xf1\x92\x15\x0a\xa9\xb3\x5a\x66\x84\xcc\xac\xc9\x6a\xd6\x19\x2a\xb2\x25\xbb\xf6\xcf\x73\x90\x3a\x15\x05\x97\xec\xa5\xef\x7e\xbf\xfb\x9c\x40\x9c\x86\x42\x54\x52\xad\x5a\x93\x86\x16\xb9\x31\x2b\x21\xb8\xac\x8c\xf5\x18\x8a\x13\x99\xf6\x66\xeb\x73\x0c\x56\x97\x2e\x60\x13\xca\x8a\xc3\xaf\xf3\x70\x7d\x3e\x38\xc0\x16\xe4\xe5\xe7\x6c\xa7\xee\x2f\x58\xca\xda\x73\x76\x05\x3f\xcb\xd8\x67\x8e\xf2\x0e\xd7\xbf\x91\x7d\xe4\xb1\xeb\xa1\x8c\xa5\xa3\xd8\x76\xb4\x4d\xd9\x9b\x96\x52\xe5\xac\xc9\x6e\xc2\x6a\x95\x85\xb6\xd6\x9e\x4b\xfa\x0e\x24\x74\x64\x59\x16\xfc\x1f\xd9\x81\x38\xa9\x3d\x17\xbd\x80\x4f\x37\x5b\xe8\x2d\x61\x24\xc4\x5a\x5a\x38\x95\x53\x49\xb8\x42\x2f\x04\x53\x6a\x92\x6e\x36\x1c\x75\x80\x32\x29\x29\x87\x2b\xbc\x05\xb6\xcc\xa4\x1d\xdf\x4a\xe5\x8d\xdd\x0c\xb7\x26\x23\x21\x96\xb5\x56\x60\xcd\x7e\x38\xc2\xff\xed\x35\xd3\xb9\xe9\xdd\x76\xcc\x6b\x4f\xbd\xd7\x70\xba\xeb\xb0\x1d\x77\x16\x7b\x5f\x16\xfc\x5d\x3b\x3f\xdc\x1e\x36\x88\xde\x5b\x8f\x3e\xa0\x8f\xdf\xcf\x0f\xef\x7d\xf0\x0e\x7e\x22\xfb\x17\x63\x3f\x5e\x7f\x15\x5f\x02\x00\x00\xff\xff\xff\xeb\x6a\xaa\x9b\x05\x00\x00") + +func testImagesAgnhostWebhookSchemeGoBytes() ([]byte, error) { + return bindataRead( + _testImagesAgnhostWebhookSchemeGo, + "test/images/agnhost/webhook/scheme.go", + ) +} + +func testImagesAgnhostWebhookSchemeGo() (*asset, error) { + bytes, err := testImagesAgnhostWebhookSchemeGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/agnhost/webhook/scheme.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\xcc\x29\xc8\xcc\x4b\xb5\x32\xd6\xb3\xe0\x82\x0a\x17\xe5\xda\x26\x16\xe5\x1a\x1b\x95\x99\xe9\x63\x93\x04\xe9\x01\x91\x65\x16\x98\xd2\x05\x05\xc9\x66\x26\x39\xa9\xb6\x50\x1a\x59\x01\x20\x00\x00\xff\xff\x60\x32\x37\xfb\x74\x00\x00\x00") + +func testImagesApparmorLoaderBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderBaseimage, + "test/images/apparmor-loader/BASEIMAGE", + ) +} + +func testImagesApparmorLoaderBaseimage() (*asset, error) { + bytes, err := testImagesApparmorLoaderBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x93\x41\x73\xab\x36\x14\x85\xf7\xfa\x15\x67\xa0\x8b\x76\xc6\x40\xea\x45\x17\xed\x74\xc1\xb3\xfd\xde\x63\x5e\x0c\x29\xd8\xcd\x78\x3a\x99\x8c\x8c\xae\x41\x53\x59\x52\x24\x11\xe2\x7f\xdf\x01\x27\x69\xd3\xc7\x8a\xcb\x3d\x1c\xbe\x7b\x0f\x8a\xb1\x32\xf6\xe2\x64\xd7\x07\x2c\x6f\x7e\xfe\x05\xbb\x9e\xf0\x6d\x38\x92\xd3\x14\xc8\x23\x1f\x42\x6f\x9c\x4f\x59\xcc\x62\xdc\xca\x96\xb4\x27\x81\x41\x0b\x72\x08\x3d\x21\xb7\xbc\xed\xe9\xad\xb3\xc0\x9f\xe4\xbc\x34\x1a\xcb\xf4\x06\x3f\x4e\x82\xe8\xb5\x15\xfd\xf4\x1b\x8b\x71\x31\x03\xce\xfc\x02\x6d\x02\x06\x4f\x08\xbd\xf4\x38\x49\x45\xa0\x97\x96\x6c\x80\xd4\x68\xcd\xd9\x2a\xc9\x75\x4b\x18\x65\xe8\xe7\xcf\xbc\x9a\xa4\x2c\xc6\xe1\xd5\xc2\x1c\x03\x97\x1a\x1c\xad\xb1\x17\x98\xd3\x7f\x75\xe0\x61\x06\x9e\xae\x3e\x04\xfb\x6b\x96\x8d\xe3\x98\xf2\x19\x36\x35\xae\xcb\xd4\x55\xe8\xb3\xdb\x62\xb5\x29\x9b\x4d\xb2\x4c\x6f\xe6\x57\xf6\x5a\x91\xf7\x70\xf4\x34\x48\x47\x02\xc7\x0b\xb8\xb5\x4a\xb6\xfc\xa8\x08\x8a\x8f\x30\x0e\xbc\x73\x44\x02\xc1\x4c\xbc\xa3\x93\x41\xea\x6e\x01\x6f\x4e\x61\xe4\x8e\x58\x0c\x21\x7d\x70\xf2\x38\x84\x0f\xcb\x7a\xa3\x93\xfe\x83\xc0\x68\x70\x8d\x28\x6f\x50\x34\x11\x3e\xe5\x4d\xd1\x2c\x58\x8c\xfb\x62\xf7\xb5\xda\xef\x70\x9f\xd7\x75\x5e\xee\x8a\x4d\x83\xaa\xc6\xaa\x2a\xd7\xc5\xae\xa8\xca\x06\xd5\x67\xe4\xe5\x01\xdf\x8a\x72\xbd\x00\xc9\xd0\x93\x03\xbd\x58\x37\xf1\x1b\x07\x39\xad\x91\xc4\xb4\xb3\x86\xe8\x03\xc0\xc9\x5c\x81\xbc\xa5\x56\x9e\x64\x0b\xc5\x75\x37\xf0\x8e\xd0\x99\x67\x72\x5a\xea\x0e\x96\xdc\x59\xfa\x29\x4c\x0f\xae\x05\x8b\xa1\xe4\x59\x06\x1e\xe6\x27\xdf\x0d\x95\x32\x96\xd7\x5f\x26\xfa\x4d\xb1\xcd\xbf\x6c\xd8\xe7\xba\xda\xe2\x87\x7f\x6b\xb6\xaa\xab\xa6\x79\xfc\xb4\x2f\x6e\xd7\x8f\xab\xea\xee\x80\x27\x3a\x0f\xc9\x1f\x9b\xed\x3e\xaf\x57\x5f\x13\x3f\x59\xb7\xc8\x06\xef\xb2\xa3\xd4\x19\x63\xf5\xbe\x04\xb7\x7f\x83\x0b\x31\x65\xc0\xdd\xd9\x38\x28\x79\x7c\xbf\x4f\x92\xc1\x0a\x1e\x28\x69\xe7\x9f\x30\x49\x1c\x59\xe3\x65\x30\xee\xf2\x16\xbb\x50\x49\x2b\x74\xca\x95\x95\x9a\x94\xd4\xc3\xcb\x1c\xff\xb5\xce\x48\x74\x94\x05\xf2\x53\x7e\x19\x92\x84\x2b\x65\xc6\x64\xd0\xc1\x0d\x3e\x90\x60\x2c\x5f\xaf\xa1\x0c\x9f\x66\x7d\x07\xbb\xd6\x8c\x6d\xca\x5d\x7d\xb8\xab\x8a\x72\x87\xbf\xa2\xff\x75\xa3\x05\xa2\x44\x99\x2e\x18\x1f\x04\xb9\x6b\xfd\xfc\xfb\x32\x7a\x60\x2c\xc6\x9a\x4e\x7c\x50\x01\x42\x3a\x6a\x67\xda\x60\x30\xf2\xd0\xf6\x29\x5b\x6d\xd7\x93\x9d\x75\x66\x3a\x16\x3e\x7a\x60\xff\x04\x00\x00\xff\xff\x50\x23\xa2\xf6\xa3\x03\x00\x00") + +func testImagesApparmorLoaderDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderDockerfile, + "test/images/apparmor-loader/Dockerfile", + ) +} + +func testImagesApparmorLoaderDockerfile() (*asset, error) { + bytes, err := testImagesApparmorLoaderDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x6b\xdb\x3e\x14\xc5\x9f\xff\xfa\x14\x87\xb8\x0f\x09\xa4\x4e\xff\x65\x74\xd0\x51\x86\x97\x64\xa9\x69\x67\x0f\x3b\x6d\xe9\x53\x91\xed\x1b\xfb\x82\x22\x79\x92\x3c\x27\xdf\x7e\x28\x6d\x61\x65\x7a\xbb\xf7\x9e\x7b\xf4\xd3\x51\x84\xa5\xe9\x8f\x96\xdb\xce\xe3\xf2\xe2\xff\x2b\x6c\x3b\xc2\xdd\x50\x91\xd5\xe4\xc9\x21\x19\x7c\x67\xac\x8b\x45\x24\x22\xdc\x73\x4d\xda\x51\x83\x41\x37\x64\xe1\x3b\x42\xd2\xcb\xba\xa3\xf7\xc9\x1c\x8f\x64\x1d\x1b\x8d\xcb\xf8\x02\xd3\x20\x98\xbc\x8d\x26\xb3\x2f\x22\xc2\xd1\x0c\xd8\xcb\x23\xb4\xf1\x18\x1c\xc1\x77\xec\xb0\x63\x45\xa0\x43\x4d\xbd\x07\x6b\xd4\x66\xdf\x2b\x96\xba\x26\x8c\xec\xbb\xd3\x35\x6f\x26\xb1\x88\xf0\xfc\x66\x61\x2a\x2f\x59\x43\xa2\x36\xfd\x11\x66\xf7\xb7\x0e\xd2\x9f\x80\xc3\xe9\xbc\xef\xaf\x17\x8b\x71\x1c\x63\x79\x82\x8d\x8d\x6d\x17\xea\x55\xe8\x16\xf7\xe9\x72\x9d\x95\xeb\xf3\xcb\xf8\xe2\xb4\xf2\xa0\x15\x39\x07\x4b\xbf\x06\xb6\xd4\xa0\x3a\x42\xf6\xbd\xe2\x5a\x56\x8a\xa0\xe4\x08\x63\x21\x5b\x4b\xd4\xc0\x9b\xc0\x3b\x5a\xf6\xac\xdb\x39\x9c\xd9\xf9\x51\x5a\x12\x11\x1a\x76\xde\x72\x35\xf8\x0f\x61\xbd\xd3\xb1\xfb\x20\x30\x1a\x52\x63\x92\x94\x48\xcb\x09\xbe\x25\x65\x5a\xce\x45\x84\xa7\x74\x7b\x9b\x3f\x6c\xf1\x94\x14\x45\x92\x6d\xd3\x75\x89\xbc\xc0\x32\xcf\x56\xe9\x36\xcd\xb3\x12\xf9\x77\x24\xd9\x33\xee\xd2\x6c\x35\x07\xb1\xef\xc8\x82\x0e\xbd\x0d\xfc\xc6\x82\x43\x8c\xd4\x84\xcc\x4a\xa2\x0f\x00\x3b\xf3\x0a\xe4\x7a\xaa\x79\xc7\x35\x94\xd4\xed\x20\x5b\x42\x6b\x7e\x93\xd5\xac\x5b\xf4\x64\xf7\xec\xc2\x67\x3a\x48\xdd\x88\x08\x8a\xf7\xec\xa5\x3f\x75\xfe\x79\x54\x2c\x44\x59\x2c\xcb\x1b\x65\x64\x43\x56\xe4\x25\xbe\xde\x40\xb1\x1e\x0e\x22\x29\x96\xb7\xa1\x92\xfb\xe6\xea\x93\xd8\x26\xc5\x66\xbd\x0d\xf5\xd9\x74\xf9\x50\xac\xd2\x62\x26\x36\x79\x52\xfc\x08\xad\xcf\x62\x93\xdf\x27\xd9\xe6\xe5\x71\x5d\x94\x69\x9e\x9d\x4c\xa4\x27\xe7\x83\xfb\xcb\x2a\x2d\x10\xf6\xb4\xf1\x0d\x5b\x9c\x4d\x5d\x47\x4a\xa1\x1f\x9b\xd9\x4c\xd0\xa1\x37\xd6\x0b\x51\xb1\xbe\x16\xff\xc5\xf1\x82\xf7\xb2\xa5\xf3\xc1\xb3\x8a\x5d\x87\x8a\x35\xce\xa6\x81\x71\x26\x44\xfc\xf3\x36\xcf\x9e\xaf\x43\x53\xfc\x09\x00\x00\xff\xff\xc9\x5a\xa2\x25\x03\x03\x00\x00") + +func testImagesApparmorLoaderMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderMakefile, + "test/images/apparmor-loader/Makefile", + ) +} + +func testImagesApparmorLoaderMakefile() (*asset, error) { + bytes, err := testImagesApparmorLoaderMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xc9\xcc\x2d\xe6\x02\x04\x00\x00\xff\xff\xe2\x68\x65\xd7\x14\x00\x00\x00") + +func testImagesApparmorLoaderOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderOwners, + "test/images/apparmor-loader/OWNERS", + ) +} + +func testImagesApparmorLoaderOwners() (*asset, error) { + bytes, err := testImagesApparmorLoaderOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe4\x02\x04\x00\x00\xff\xff\x9e\xc5\x88\x7d\x04\x00\x00\x00") + +func testImagesApparmorLoaderVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderVersion, + "test/images/apparmor-loader/VERSION", + ) +} + +func testImagesApparmorLoaderVersion() (*asset, error) { + bytes, err := testImagesApparmorLoaderVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderExampleConfigmapYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x94\x5f\x6f\xeb\x44\x10\xc5\xdf\xfd\x29\x46\xea\x0b\x44\x4e\x17\x24\x84\x20\x02\x04\xba\xe8\xbe\x20\x04\x02\x89\x97\xe8\x26\x1a\xef\x8e\xed\xbd\xde\x7f\xcc\x8e\xe3\x86\xd2\xef\x7e\x65\x37\x69\xd3\xdb\x6d\xfb\x90\x97\xf3\x9b\x3d\x7b\x66\x67\xe2\x2b\xf8\x25\x00\xdd\xa0\x4f\x8e\xe0\x5d\x0c\xad\xed\x7e\xc7\x04\x86\x7c\x0c\x59\x18\xc5\x86\x0e\xfa\x38\x41\xe2\xd8\x5a\x47\x19\x34\x06\x68\x08\xb2\x44\x26\x03\x98\xe1\xb7\xb1\x21\x0e\x24\x94\x21\x36\x1f\x49\x4b\xae\x01\x83\x01\x17\xd1\x90\x81\xe6\x58\x5d\x81\xf4\x04\x98\x12\xb2\x8f\xbc\x5e\x00\xc3\xaf\x38\x5f\xf2\x37\xc9\x75\x55\x61\xb2\xff\x10\x67\x1b\xc3\x06\x0e\x5f\x57\x83\x0d\x66\xf3\x18\xa7\xf2\x24\x68\x50\x70\x53\x01\x04\xf4\xb4\x79\x34\x3b\xe7\x3a\x91\x9c\x50\x5f\xe0\xea\x7c\xea\x0a\xde\x5b\x47\x73\x05\x0c\xdf\xe5\x75\xe8\x6c\xb8\x01\x8f\x29\x83\xc4\x25\x9d\xa1\xd6\x06\x2b\x36\x06\x88\xed\xa2\xdc\xd7\x9c\xfc\xaf\x2b\x78\x3c\xb8\x81\xff\xd7\x15\x00\xc0\x95\x0d\xda\x8d\x86\xe0\x07\x19\x03\x36\x8e\xb2\xea\x5c\x6c\xd0\xfd\x54\xdd\x73\x78\xcf\xd1\x43\x2f\x92\xf2\x46\xa9\xce\x4a\x3f\x36\xd7\x3a\x7a\xf5\xb1\x65\xfc\x8f\x9c\x23\xd5\x60\x20\xd5\xb8\xd8\x28\x8f\x59\x88\x95\x89\x7a\x20\xbe\xbf\x69\x9d\x97\xc9\x2c\x66\xa7\x24\x17\xf9\x5b\x87\x5d\xfe\xf1\x0b\x14\x41\xdd\xef\x8d\xcd\x3a\x86\x40\x5a\xc8\xd4\x9e\x8c\x45\xa1\xbd\x21\x47\x42\xe6\x4b\xb8\x5d\x3c\x2e\x23\x63\x33\x0f\x58\xcf\x2d\x67\xd5\x60\xa6\x53\x68\x80\x40\x32\x45\x1e\xc0\x06\x12\x10\x9d\xea\x92\x3e\x9a\xb2\x6e\xb5\x4f\xf5\xd9\xc9\x50\x38\x3e\x60\xc6\xa9\x0c\x12\xea\x81\xe4\x81\xcd\x5d\x9e\xad\x47\x1f\xc7\x20\x4f\x8f\xa9\xc6\x06\xb5\x5a\xc1\xe4\xea\xa7\x72\x8c\x52\xd2\x0d\x1d\x4a\x32\x89\x2e\xc9\x7d\xf4\x54\xd2\x9d\x6d\x5e\x90\xbf\xfd\xa6\x04\x96\x09\x14\x41\x28\xa6\x8c\xa9\x28\x27\x8e\xc5\x98\xfc\x42\xb3\xf9\x85\xc7\xc9\x5c\x7c\x04\xf1\xa9\x58\x7d\xcc\x25\x79\xcc\x7c\x96\x4f\x3a\x8e\xc6\x0a\x2c\xe2\x83\xa6\x0e\xc8\x8a\xc7\xa0\x96\x2d\xbd\x4e\xd6\x5c\xc2\xd9\x63\x09\x79\xbf\xc3\xf6\xa6\x30\x5c\x83\xb9\x07\xcf\xd3\xe0\x6e\xea\x67\xf0\x05\x34\xfb\xce\x58\x62\x7a\xe0\xa7\x02\x8d\x09\x1b\xeb\xac\x1c\x41\xf7\x71\x0a\xf5\x73\xdd\xa0\xde\xc7\x03\x31\x5b\x43\x05\x9c\x49\x46\x6b\xca\xa0\x2b\x82\x40\xb2\x6f\x6c\x30\xfb\x4c\x7c\xb0\x9a\x9e\x76\xf9\xf3\xed\x9f\x7f\xfd\xf1\xee\x4e\xdd\xae\xea\xd5\x6a\xb7\xfd\x6a\xfd\xfd\xea\x43\x3d\x3f\xfa\x30\x7f\x4a\x9d\xca\xbd\x5f\xdd\xc1\x34\x3c\xed\xf1\x7c\x2a\x1f\x33\xff\xbb\x16\xb6\x5d\x47\x0c\xcf\xdf\xe2\x5c\xe7\xc9\xbf\x42\x87\x37\xb0\x8e\x4c\x05\x7e\xfa\x43\x7e\xbe\x2d\xdb\x5d\xfb\x61\xb5\xec\xc1\xb3\xc9\xcc\xb8\xdd\xee\xf2\xab\x7c\x76\xd0\x6f\x54\xe8\xed\xae\x7b\xab\xa4\xdb\xee\xf8\xd5\x1a\xcb\x7e\x42\x26\x45\xad\x9d\x7f\x07\xe4\x65\xd5\x0b\x1b\x75\x39\x0f\xd2\x23\x5b\x39\x7e\x56\x79\x57\x7d\x0a\x00\x00\xff\xff\x7e\x92\x58\xad\x40\x07\x00\x00") + +func testImagesApparmorLoaderExampleConfigmapYamlBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderExampleConfigmapYaml, + "test/images/apparmor-loader/example-configmap.yaml", + ) +} + +func testImagesApparmorLoaderExampleConfigmapYaml() (*asset, error) { + bytes, err := testImagesApparmorLoaderExampleConfigmapYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/example-configmap.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderExampleDaemonYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x54\xc1\x6e\xdb\x3a\x10\xbc\xeb\x2b\x06\xf0\xd9\x76\x1e\x72\xf3\x2d\xc8\x3b\xbe\xbc\x16\x68\xd0\xfb\x86\x5c\x5b\x44\x49\x2e\x4b\xae\x9c\xf8\xef\x0b\x4a\xb6\x2c\xc9\x71\x50\x9d\x6c\x72\x39\x33\x3b\xb3\xe4\x0a\xaf\x2d\x83\x3f\x28\x24\xcf\xf8\x97\x38\x48\xfc\xc1\x0a\x5b\x7f\x14\xcd\xa4\x2e\x1e\xd0\xca\x3b\xb4\x65\xa4\x2c\x7b\xe7\x19\x5e\xc8\x72\x86\xa1\x88\x37\x86\xe5\xe4\xe5\xc4\x16\x12\x55\x40\x30\xbe\x2b\xca\x19\x2a\xcd\x0a\xd4\xa9\x04\x52\x67\xc8\xfb\x53\x7f\x10\x4f\x29\x3d\xe5\x20\xf9\x02\x57\xb0\xcf\x12\x40\x78\x96\xb8\x77\x87\x17\x4a\x9b\xa6\xa1\xe4\x7e\x72\x2e\x4e\xe2\x0e\x94\x52\xd9\x1e\xff\x69\x7e\xb9\x68\x77\x57\x91\x4d\x60\x25\x4b\x4a\xbb\x06\x88\x14\xb8\xaf\xa4\x0a\xbd\x1e\x14\x36\xc0\x0a\xff\x53\xe0\x92\xc8\x30\x42\x57\x14\x81\xd4\xb4\xd0\x96\x14\xb2\xef\xbb\x9a\xd0\x0e\x38\x7d\xf5\x15\xac\x01\x3c\xbd\xb1\x2f\x95\x07\xb0\x3d\xff\x2d\x57\x49\x6c\x6a\x45\x61\xcf\x46\x25\x0f\xd5\x3d\xdd\x7f\x93\xe3\xf7\x01\x00\xe5\x90\x3c\x29\x9f\x8f\x4e\xda\xab\xdf\xbd\x16\xeb\xe7\x67\x0c\x5f\x71\x00\x17\xa1\xf5\x33\x12\x95\x5c\xe4\x3c\x9e\x5d\x7f\xc9\x03\xb8\x40\x07\xde\xe1\x20\x72\xf0\xbc\x5d\x54\xed\xaa\xfa\xa2\x63\x31\xe5\xc3\x44\x54\x4d\xe3\x95\xbd\xef\x5d\x3f\xcf\x90\x0a\x52\x77\x5e\xda\x8e\x03\x61\x5d\xee\x3d\x3c\x81\x8f\x9c\x4f\x78\x7c\x40\x61\x23\xd1\x96\xcd\x04\x6d\x8d\x75\x12\xef\x67\x2b\x8f\x0f\x65\xf6\x7f\xc4\x1c\x57\x0b\x9b\x2e\x3b\x3d\x3d\x4b\x54\xfe\xd0\x85\xbc\xab\xb2\xcc\xbf\x3b\x97\xb9\x20\x8b\x28\x12\xe7\xe0\x4a\x9d\xc7\x52\x35\x93\xd1\xee\x3a\xd1\x93\xbb\x31\x13\x98\xb2\x3b\x3a\xcf\x07\xb6\x3b\x68\xee\x78\xdc\x3a\x8a\xef\x02\xbf\x48\x17\x75\xe2\xcf\xc5\xfa\x72\x9a\xf6\x10\x6a\xd5\x77\xd2\x76\x87\xed\x7c\x27\x33\xd9\x6f\xd1\x9f\x16\xe0\x37\x09\xba\x68\x7c\x67\xf9\x1e\x28\xab\x19\x73\xdc\xd8\xbf\xc7\xbf\x71\x76\x0e\xfb\xc9\xf6\xa7\x80\x83\x17\xa3\x0d\x43\x06\xb5\xd3\xc9\x14\xf4\x37\xf7\x8d\x07\x7c\xb6\x35\x01\x17\x95\x33\x19\xc5\xbb\xd3\xb6\x4f\x60\x7c\x57\x82\xd8\xce\xf3\xa6\xb9\xef\x6a\x2b\x65\x90\x39\x0d\x6b\x69\xf1\x59\xc9\xdc\x9e\x89\x28\x57\x2e\x33\x62\xb1\xef\x69\x8b\x8e\xa6\xe3\x6c\xfa\x78\xa7\xcb\x52\xcf\xfd\x78\xbe\x50\xf7\x69\x56\x2b\xbc\x50\x82\x8b\xb3\x37\xba\xbe\x1c\x4b\xca\x9b\x48\xcc\xe5\xe9\x9b\x52\x2d\xe4\x8d\x87\xfe\x04\x00\x00\xff\xff\x7d\xc7\xad\x50\x2c\x06\x00\x00") + +func testImagesApparmorLoaderExampleDaemonYamlBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderExampleDaemonYaml, + "test/images/apparmor-loader/example-daemon.yaml", + ) +} + +func testImagesApparmorLoaderExampleDaemonYaml() (*asset, error) { + bytes, err := testImagesApparmorLoaderExampleDaemonYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/example-daemon.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderExampleNamespaceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x44\xcb\x31\x0a\x42\x31\x10\x04\xd0\x7e\x4f\x31\x60\x2f\xd8\xe6\x10\x56\x62\x3f\xff\x67\x20\x51\x37\x59\x92\x28\x7a\x7b\x3b\xad\x1f\xef\x80\x4b\x11\xf4\xa6\xc7\x43\x38\xd3\x35\x83\xbb\xf0\x9c\xca\xd8\x3e\xe8\xab\x68\xfc\xbc\x6f\x37\xed\x6b\x1e\xcd\x18\xf5\xaa\x31\x6b\x6f\x09\xaf\x93\xdd\x6b\xcb\xe9\xdf\xcd\xb5\x98\xb9\x98\x0c\x68\x74\x25\x30\x82\xc3\xfb\xb0\x6f\x00\x00\x00\xff\xff\xc3\x16\x28\x79\x72\x00\x00\x00") + +func testImagesApparmorLoaderExampleNamespaceYamlBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderExampleNamespaceYaml, + "test/images/apparmor-loader/example-namespace.yaml", + ) +} + +func testImagesApparmorLoaderExampleNamespaceYaml() (*asset, error) { + bytes, err := testImagesApparmorLoaderExampleNamespaceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/example-namespace.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderExamplePodYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\x91\x3d\x6f\x1b\x31\x0c\x86\x77\xfd\x8a\x17\xf1\x6c\xa5\x01\x3a\x04\xb7\x65\x2e\x50\x64\x08\xba\xf3\x4e\xcc\x99\xb0\x8e\x14\x24\x3a\x48\xfa\xeb\x0b\xc9\x1f\x75\x00\x4d\x14\xf5\xbc\x1f\xda\xe1\xed\xc0\xe0\x4f\xda\x4a\x66\xbc\x5a\xc2\xc9\x25\xcb\x5f\xd1\x15\x7e\x60\x94\x6a\xef\x92\x19\xd9\x28\x71\xc2\xfc\x35\xa6\xed\xbc\x9e\x88\x37\xd3\x18\x02\x15\xf9\xc3\xb5\x89\xe9\x84\x8f\xa7\x70\x14\x4d\x53\x87\x85\x8d\x9d\x12\x39\x4d\x01\x50\xda\x78\x82\xae\xa2\x9f\x7b\x2a\x85\xea\x66\x35\x00\x3b\xfc\x36\x67\xf8\x81\x7c\xb0\xbb\x87\x64\xdc\xa0\xe6\x50\xe6\x04\x37\xcc\x0c\xd1\xab\x34\x0f\x54\x2b\xb4\x30\xa8\x8d\xe9\xb0\x57\x63\x00\x32\xcd\x9c\x5b\xd7\x03\xa8\x94\x8b\x60\x00\x48\xd5\x9c\x5c\x4c\x2f\xb7\x3b\xbc\x71\xce\xf8\x75\x9a\xb9\x2a\x3b\xb7\x2e\x44\xa5\xe4\x73\xc6\x97\x52\x5e\xba\xc5\x5b\x05\x0f\xc7\xe7\xb6\x1f\xb4\x87\x78\x01\xdc\x3b\x97\x86\x7e\x56\xb5\xca\x09\xf2\x3e\x20\x77\x70\xb5\xc4\x7d\xa3\xc7\xaa\x27\xd5\xde\xf0\xc7\xb9\x34\x3c\xc5\x9f\xb0\x8a\xb5\x32\xf9\x39\x06\xb0\x98\x3a\x89\x72\x8d\xd7\xb2\x62\xe3\xe5\x54\xc5\xbf\xe2\xcc\x4e\xf1\x78\x63\x47\xb1\xc7\x61\x6c\x42\xb6\x85\xf2\xc1\x9a\x3f\xde\xdc\x86\x56\x78\xe9\x91\x6f\xc4\x51\xc0\xfe\xfe\x43\x86\xa2\x6c\xb4\x7e\x1b\x14\xab\x7e\x29\x6b\xff\xff\xf5\xab\x55\x9f\xf0\xfc\x23\xfc\x0b\x00\x00\xff\xff\x39\xce\x35\xa3\x3c\x02\x00\x00") + +func testImagesApparmorLoaderExamplePodYamlBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderExamplePodYaml, + "test/images/apparmor-loader/example-pod.yaml", + ) +} + +func testImagesApparmorLoaderExamplePodYaml() (*asset, error) { + bytes, err := testImagesApparmorLoaderExamplePodYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/example-pod.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesApparmorLoaderLoaderGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x59\x6d\x6f\x1b\x37\x12\xfe\xac\xfd\x15\xd3\x05\xd2\xae\x8a\xcd\x6e\x1a\xdc\x01\x07\xb7\x3e\xc0\xf5\xcb\x55\x57\xd7\x36\x2c\x27\x41\xe1\x04\x01\xbd\x3b\x2b\x11\xa2\xc8\x3d\x92\x6b\x59\x08\xfc\xdf\x0f\x43\x72\xdf\x24\x25\x69\x0b\x34\x1f\x62\x69\x77\x38\x7c\x38\xf3\xcc\xf0\x21\x95\x7f\x1f\x9d\xaa\x7a\xab\xf9\x62\x69\xe1\xf5\xab\x1f\xfe\x09\x77\x4b\x84\x5f\x9b\x07\xd4\x12\x2d\x1a\x38\x69\xec\x52\x69\x93\x45\xd1\x25\x2f\x50\x1a\x2c\xa1\x91\x25\x6a\xb0\x4b\x84\x93\x9a\x15\x4b\x84\xf0\x26\x85\xb7\xa8\x0d\x57\x12\x5e\x67\xaf\x20\x21\x83\x38\xbc\x8a\xa7\x3f\x46\x5b\xd5\xc0\x9a\x6d\x41\x2a\x0b\x8d\x41\xb0\x4b\x6e\xa0\xe2\x02\x01\x9f\x0a\xac\x2d\x70\x09\x85\x5a\xd7\x82\x33\x59\x20\x6c\xb8\x5d\xba\x49\x82\x8b\x2c\xfa\x3d\x38\x50\x0f\x96\x71\x09\x0c\x0a\x55\x6f\x41\x55\x43\x2b\x60\x36\x8a\x00\x00\x96\xd6\xd6\x47\x79\xbe\xd9\x6c\x32\xe6\x50\x66\x4a\x2f\x72\xe1\xad\x4c\x7e\x39\x3b\x3d\xbf\x9a\x9f\xbf\x7c\x9d\xbd\x8a\xa2\x37\x52\xa0\x31\xa0\xf1\x7f\x0d\xd7\x58\xc2\xc3\x16\x58\x5d\x0b\x5e\xb0\x07\x81\x20\xd8\x06\x94\x06\xb6\xd0\x88\x25\x58\x45\x38\x37\x9a\x5b\x2e\x17\x29\x18\x55\xd9\x0d\xd3\x18\x95\xdc\x58\xcd\x1f\x1a\x3b\x0a\x50\x8b\x8a\x1b\x18\x1a\x28\x09\x4c\x42\x7c\x32\x87\xd9\x3c\x86\x9f\x4f\xe6\xb3\x79\x1a\xbd\x9b\xdd\xfd\x72\xfd\xe6\x0e\xde\x9d\xdc\xde\x9e\x5c\xdd\xcd\xce\xe7\x70\x7d\x0b\xa7\xd7\x57\x67\xb3\xbb\xd9\xf5\xd5\x1c\xae\x2f\xe0\xe4\xea\x77\xf8\x75\x76\x75\x96\x02\x72\xbb\x44\x0d\xf8\x54\x6b\xc2\xae\x34\x70\x0a\x1d\x96\x59\x34\x47\x1c\x4d\x5e\x29\x0f\xc6\xd4\x58\xf0\x8a\x17\x20\x98\x5c\x34\x6c\x81\xb0\x50\x8f\xa8\x25\x97\x0b\xa8\x51\xaf\xb9\xa1\xe4\x19\x60\xb2\x8c\x04\x5f\x73\xcb\xac\xfb\xbe\xb7\x9c\x2c\xfa\x3e\x8f\xa2\x9a\x15\x2b\x72\xb2\x66\x5c\x46\x11\x5f\xd7\x4a\x5b\x48\xa2\x49\xfc\xd0\x54\x5c\xc5\xf4\x61\x6b\xd1\xd0\x87\x4a\xb0\x85\xfb\xbb\xb6\xf4\x87\xab\x9c\xab\xc6\x72\x41\x5f\x94\xf1\xff\xe7\xf8\x84\x05\x7d\xac\x99\x5d\xb6\x7f\x73\xe2\x47\xfb\x80\xe2\x27\x17\xce\xdc\xf2\x35\xc6\x51\x34\x89\x57\xff\x32\x19\x57\xf9\x4a\xa8\x45\xfe\xf8\x3a\x8e\xa6\x51\xf4\xc8\x34\xc1\xc8\x73\x47\xe5\x92\x6b\x2c\xac\xd2\x1c\x0d\xe5\x4e\x28\x56\x42\xad\x15\xf9\x35\x50\x69\xb5\xce\xa2\x49\xc9\xb5\x81\xfb\x0f\xde\x7f\x34\xa9\x95\x10\x70\x0c\x04\x3a\x3b\x6b\xb4\x8b\x42\x12\xd3\xd3\x38\x85\x97\x3f\xa4\x10\xdf\x90\x85\xdd\xf1\x4e\x61\x96\xb8\xe9\xbd\x07\x06\x73\x03\x5c\x5a\xd4\x8f\x4c\x64\xf0\x96\x89\x06\x0d\xfc\x04\xaf\x88\x10\x8e\x5f\xe4\xd8\x71\x89\xc9\x12\xf0\x89\x5b\x60\x95\x45\xed\xa0\x52\x6a\x68\x9e\xd6\x67\x16\x4f\x69\x89\x85\x92\xc6\xc5\xba\x66\xda\xa0\x26\xbe\xc3\x31\xc4\xac\xae\x99\x5e\x2b\xfd\xd1\x3f\x8e\xa3\x49\xfb\xa4\x32\xf4\x3e\x37\x5b\x93\xaf\xa8\xb2\x45\x6e\xb0\x68\x34\xb7\xdb\xbc\x35\x71\xb1\xab\x1a\x59\xb8\x84\x26\x53\xf8\x14\x4d\x28\xac\xd9\x4c\x72\x7b\x21\xd8\xc2\x24\x92\x8b\x69\x34\x71\x71\x79\x63\x28\xf5\xc7\x40\x03\xbc\xed\xa4\x5a\xdb\xec\xa2\xd6\x5c\xda\x2a\x51\x26\x9b\xdb\x12\xb5\x4e\x21\x76\xa6\x47\xf0\xc2\xc0\xfd\xc5\xe5\xc9\x7f\x3e\x64\x59\x06\xf7\x37\xb7\xd7\x17\xb3\xcb\xf3\x8f\x67\xb3\x5b\x7a\xf0\x5e\xc6\x29\x28\x93\x9d\xe8\x85\xb9\x7f\xf5\x61\xfa\x05\x77\x97\x94\x41\xdf\x7c\xea\x13\x02\xde\x07\x3c\x10\x1c\x4b\x2a\x51\x32\x19\xcc\x32\x4c\x15\x4d\xe7\xa6\xa0\x95\xdc\xd0\x14\x67\x58\xb1\x46\x58\x93\x4c\xa3\xc9\x73\x58\xe2\x0d\x05\x31\x99\x46\x81\x1f\x81\x10\x84\x90\xac\x78\x05\x02\x65\x42\xaf\xa6\x70\x7c\x0c\xaf\x5c\x0c\x5c\xc0\xce\xb5\x56\xba\x4a\xe2\xdf\x1a\x63\x03\xa6\x2d\x30\x0b\x02\x99\xb1\xa0\x64\x4f\x9b\x6d\xd6\xe3\x70\x61\x22\xcf\x13\x65\xb2\xf3\x27\x6e\x93\x1f\x1c\x18\xc7\xe4\xd3\x25\x16\x2b\xb0\x4b\x66\xdd\xba\xba\x4e\x15\xf2\xff\xc0\x25\xd3\x5b\xea\x32\x95\x6a\x64\x99\x39\x78\x1f\x53\x40\xad\xe1\xe8\x18\xa8\xb2\xb2\x4b\xa5\x56\x37\xcc\x2e\x13\x3f\x66\xfa\xa3\x7b\xfb\xcd\x31\x48\x2e\x06\xd8\x9f\xb8\xad\x92\xf8\xb6\x6b\x85\xde\xf3\x0b\xe3\xda\xb6\xf3\x4e\xc1\xbd\x39\xb9\xfb\x25\x4e\xc3\xf4\x07\x61\x12\x7b\x71\x50\x6a\x05\x93\xf0\x40\xc8\xd9\x1e\xbc\x05\xda\x4b\x67\x7d\x13\x8c\x93\x2f\x83\x7b\x23\x5d\xdd\x58\x05\xac\x28\xa8\xf9\xb5\x14\xee\x66\x3b\x82\x17\x8f\xb1\xf3\x1f\xb0\xf1\x0a\xbe\x77\x65\xfd\x53\x48\x94\x6e\xe4\xb5\x2c\x5c\xbc\x9f\x01\x85\x41\xf7\x94\x4c\x2e\x94\xc6\x47\xd4\x9e\x09\xcf\x51\x94\xe7\x70\xa5\xda\x22\x3d\x02\xdd\x48\x50\xb4\x3f\xb5\xd5\x9a\xf9\xa2\xe9\x1c\x92\x23\x5e\x81\x69\x1c\xb6\x94\x5a\x42\xbb\x2e\x5a\x2c\xc5\xe5\xaa\x7f\x44\x4b\xfd\x26\xd8\x3a\x08\x81\x57\x83\x51\x53\xf8\x77\x00\x3d\x8a\xc2\x95\xb2\xc0\x84\x18\xb4\x1b\xd4\xd8\x4e\x5b\x35\x42\x6c\x43\x0e\x32\xf0\xd1\x0d\x41\x19\x7a\x8e\x26\xc3\xd5\xf7\xee\x93\xd8\x71\xb8\x6b\x41\xc3\xf6\x33\xa1\x02\x19\x8c\xfa\x3a\xe0\x99\xac\x54\x95\xc4\xf3\x7d\x68\xbb\x09\xfb\x1a\xb6\x77\xcc\xed\x56\xb4\xf8\x71\xab\xf5\xb4\xef\xd0\x85\xbc\x1d\x6c\xd3\x5c\x96\x58\x71\xc9\x2d\x8a\x6d\xc8\xdd\x28\xed\x5d\xdf\x7b\x9b\xbc\x9e\xb6\xd8\x6f\x7c\xfa\xa9\x0e\xc8\x8a\x0a\x22\x4e\x21\x6c\x48\xd9\x7f\x15\xf7\x9d\x20\x85\x38\x85\x78\x9a\x3a\x8f\xd9\xdc\xbd\x4e\xa6\x53\xbf\xa5\x5c\x48\xca\xff\xa0\x61\x7e\xfc\x3a\x39\xfe\x50\x7c\x87\x40\xff\x42\x90\x5d\xc7\xf3\x00\x93\x29\xe4\x39\xdc\x36\x12\xf8\x7a\x8d\x25\x67\x3e\x48\x13\xcb\x8b\x15\xba\x5a\xa5\x8d\x37\xbb\xc2\xcd\x9d\x7b\x92\xb8\xa2\xa2\x3d\x41\x69\xd0\x4c\x2e\x10\xbc\x69\x76\xda\xd7\x93\xec\x4a\xc9\x05\x7b\x6f\x8d\x90\xb4\xfc\x7f\x50\x4a\x8c\x63\xd2\x6e\xca\x2e\x60\x62\xd4\x24\xbe\xd4\x3e\x5c\x05\x1e\xec\x20\xa1\x35\x7b\x7a\x53\x33\xa2\xac\x1e\x8e\x93\xef\x1e\x13\x8d\xb6\xd1\x12\x2a\x26\x48\xe1\x4a\x2e\x7c\x47\x69\x31\x1f\x83\xd5\x0d\xfa\x08\x7c\x4c\x89\x69\x84\xc9\xc7\xc2\xed\x1b\xae\x46\x64\xa5\x7a\xc0\x5e\xfb\x64\xb7\xc8\xca\x33\xae\x89\x38\x21\xcf\x3b\x88\x47\x9c\xdf\x03\xfd\xa2\xc5\x59\x72\xdd\x81\x1d\xc0\x72\x80\xe9\x51\xa1\xa4\xe5\x92\x30\x3a\xe0\x2d\x52\xc2\xd4\x43\x75\x08\xfd\xac\x24\xb7\x1c\x53\x83\xf4\xea\xe8\xed\xc7\x64\x57\x6c\x8d\x8e\xd4\x13\x6a\xf9\xb3\xaa\xdf\xcd\x52\x92\xa1\x66\xbb\x16\x5c\xae\x5c\x7b\x1e\xbe\x32\x2b\x5e\x03\xb5\xcb\x09\xc5\xd4\x28\xf1\x88\x25\x91\xb6\x0b\x4b\x78\x38\xf7\xe3\xfb\x09\xdd\x4c\x07\xa2\xf3\xb9\xf0\x90\x17\x0a\x50\x00\x32\xce\xe6\x28\x1c\x44\x7c\xe7\x7a\x88\x27\x9b\x19\xca\xca\x34\x4c\x92\xe7\x70\xd6\x2e\x02\x04\x37\x24\xfb\x69\xa3\x35\x4b\x26\x84\xda\x64\x3d\x92\xb7\xc9\x3f\xfa\x32\x5c\xf1\xba\x26\xcb\x2e\x00\xbe\x63\x50\x3c\x0f\xc1\x88\x0e\x3a\x29\x98\x94\xa1\xeb\xec\x8a\xcb\xa1\xaf\xfa\x40\x45\x84\x5a\xa0\x5c\x99\xa4\xb3\xfc\x13\x51\xdc\x21\x19\xb9\x18\x04\xf1\x00\xcd\x0e\xac\x88\x57\xd0\xc8\x71\xd5\x26\xbb\x45\x5c\x77\x4d\xcd\xc3\x09\x10\x43\x33\xec\x86\xb9\x25\xec\xa9\x82\xc9\x4e\x59\x9f\xaa\x46\x94\x4e\xa9\x8c\x74\xfe\x2e\x05\x0e\xc2\x1f\xe1\xf7\xcc\xa0\xe4\x9f\x94\xe5\x78\xab\xa1\x43\x04\x27\x1d\x57\xed\xf6\x0d\xcf\x85\x61\xfb\x3a\x26\x69\x82\xb2\x1c\x76\xef\x7e\xc9\x59\x96\x79\x3c\xa1\x22\xc3\xf3\xbe\x28\xbb\x39\xc3\x5a\xc7\xb1\xbb\x0f\xaf\x3f\x74\x3d\xa8\xc5\xfd\xdc\xb6\xf5\xa8\xed\x5e\x87\xd4\x48\xd7\x91\x0f\xd1\x05\xda\xbe\x9b\xb4\x2d\xd8\xc5\x4f\x69\x97\xa7\x62\x5d\x76\xba\xf2\x54\xad\xd7\x4c\x96\x41\x56\xa6\x10\xbf\x7c\x29\xc9\x4d\xcf\x50\xe3\xa4\x3b\x0d\xf8\xd6\x9d\x08\xb3\x9f\x9b\xaa\x42\xfd\xe9\xd9\x39\x0a\xca\x1e\x8e\xc1\xdb\x45\x13\xd5\xd8\x8e\xca\x64\x70\xdd\xd8\xba\xb1\x87\xbb\x3a\x29\x2d\x37\x2c\xbb\x44\xda\xbe\xc6\x3b\x63\xab\x17\x82\xc9\x60\x43\x76\x31\x0a\xc1\x91\x5c\xa4\x40\xc7\x8d\x96\x46\x38\xaa\x81\xd1\x69\xf1\x70\x45\x50\xa4\xad\x76\x7b\x26\x81\x6e\x75\xc1\x9d\xe6\xeb\x79\xcd\x0a\x4c\xfc\x93\x44\x35\x76\xea\xb7\x58\x5c\xab\x47\x04\xab\x19\x77\xba\xe2\xbd\xec\x53\x15\x06\xcf\x6b\xc1\x6d\x12\xbc\xa6\x10\xd3\x99\xc5\xef\x3f\x6d\xde\xbe\x52\x5b\xb0\x66\xf5\xbd\xf7\xf6\xc1\xef\xac\xf5\xfe\xb6\x4a\x2f\x28\x60\x7f\x88\x82\xbc\x82\x6f\x3e\xc7\xc1\x4f\xbe\xaf\xbb\x25\x04\x36\x7a\x65\x31\xdc\x3f\x47\x22\x60\x54\xdb\x1d\xdf\x7c\xec\xbf\xce\xb1\x47\xd4\x0f\xca\xe0\xdf\xc1\xb2\x3d\x51\x75\xa9\x3e\xc3\x84\xf7\xb2\xeb\xea\x29\x50\x72\xff\x2e\x8a\xee\xb3\x73\x57\x9a\x7f\x91\x9d\x03\xa6\x07\x69\x3c\xf3\xb7\x66\x0b\xfe\x88\xd2\xed\xf4\x4e\x0e\x70\x03\xac\xdd\x37\x53\x68\xb3\xb9\x44\xb8\xe0\x02\x29\x18\xed\x6d\x9b\x65\x7a\x81\x36\x83\x6b\xbb\x44\xbd\xe1\xa4\x8c\x7a\x6b\xf2\x3f\x76\xdc\x9e\x91\xc6\x3b\xfc\x03\x33\x78\xd3\xe7\x3e\x48\x12\x65\xb2\x76\xb6\x29\x24\x83\x6f\xc3\x06\xc4\x2b\xaf\x45\x7e\x53\x25\x26\xd3\x6f\x95\x71\x9f\x82\xe3\xfe\x38\xee\xce\x6e\xb6\x5f\x53\xd6\x47\x94\x3b\x8f\x41\xce\x4d\xaa\xc3\xa2\xa7\x45\xb8\xab\x7c\x5a\xbd\x40\x0f\x3a\x12\x75\x43\xcf\x1f\x99\x08\x50\x4c\x52\x05\x7a\xee\xf3\xe2\x6b\xdd\x67\x47\xc7\xf4\xb9\xad\xf6\x92\x7b\x40\x4d\xb9\x2b\x13\x66\x93\x21\xd4\xbf\x00\xa3\x60\xfe\xe0\x63\x2c\xb3\xa0\x64\x0f\x62\x2f\x04\x23\xa2\x8d\x21\xf5\xb4\xbb\xbb\x3e\xbb\x3e\x82\x3b\x77\x27\x66\xa0\x50\x35\xc7\xd2\x33\xb7\xbd\xc8\xeb\x6e\x9e\xf3\x7a\xb5\xd8\xbf\xa5\xca\xf6\xd4\x7e\x46\x7e\xfd\xbf\x5b\xac\x18\x89\x2d\x7f\x03\xb1\x46\xbb\x54\xee\xc2\x16\x9f\x6a\x65\x10\xb8\xbb\x62\x66\xa0\xb1\xf1\x37\x6f\x1b\xb6\xf5\xb7\x6e\x25\x0a\xb4\xe1\x46\xfa\xd1\xdf\x61\x67\xdd\xde\xb8\x7b\xb8\x80\x64\xaf\xb1\xf6\xc4\x6c\xcb\xf1\x26\xf0\xa9\xe7\x52\x7f\x15\x97\x42\xdc\xc9\xb8\x69\x3f\x84\x78\x3e\x4c\xdf\x75\x8d\x32\x19\xfa\xfb\x53\xe9\xab\x18\x17\xfe\xba\x5a\xd5\x38\xc8\xdb\xd0\xe1\x20\x6f\x25\x56\xd8\xdf\x9f\x10\x94\xec\x54\xa8\x70\xff\x55\x0f\x8e\xa8\x3b\x6b\xa7\xf6\x6a\x48\xa7\xfa\xe3\xa1\xbb\xfa\xa5\xf3\xe1\xdc\x3f\x4b\x86\x1e\xc3\x39\x31\x98\x67\x64\x12\x64\x76\xdd\xcb\x0f\x1f\x34\x6d\x70\x20\x49\x92\x76\xc8\x1d\x3e\x59\xdf\x1b\x79\x05\xc3\x41\xc7\xc7\x10\xc7\xbe\xab\xe6\x39\xbc\x91\x2b\xa9\x36\x12\x04\x97\xee\xf6\x7b\xcd\xec\x8f\xa3\xf3\xc7\xe8\x48\xd4\x0b\xe8\xfb\x81\xcb\x5e\x55\xf5\xac\xee\x85\xf6\x80\xd1\x83\xdb\x59\xff\x6b\x86\xbb\x85\xa3\x39\x2d\x96\xfe\x0e\x58\xc9\xce\x06\x6a\xd4\x0e\x57\x0a\x6b\x66\x8b\x25\xd5\x16\x73\xf6\x47\x9e\xc7\x4e\x3b\x91\x66\x38\xca\xf3\x30\xc6\xe9\x29\x48\xd6\xaa\xc4\xa9\x37\xfa\xcc\x8b\x77\x4b\xd4\x08\xf4\x95\x40\x7c\x42\x59\x29\x5d\x60\xea\x7f\x55\x61\x5c\xa6\xb0\xe2\x42\x3c\x67\x0e\x74\x3c\x9c\x29\xa6\x01\x4a\x8a\x2d\x70\x59\x88\x86\x54\xad\x3b\x71\xb4\x26\x25\xb9\xef\x74\x2b\x5c\x84\x5f\x14\xea\x46\x53\x65\x19\xda\x16\xfa\xdf\x8c\x52\xd8\x20\x14\x4a\x1a\xde\xfe\x6e\xd0\xf9\xa1\xd4\xda\x76\x13\x69\x43\x42\x6f\xdb\x9b\x98\xdd\xcc\x07\x9b\x4b\xca\x64\x2b\x11\xfc\x5f\xca\x36\x2d\x75\x26\x4b\x7c\x1a\xaa\x2e\xf7\xe0\xb6\x91\xa3\xc1\x29\x7c\x97\x7c\xe7\x0b\xa8\x1f\xd4\x5d\x06\xfa\xf4\xc6\xf1\x30\xd9\xfb\x22\x6e\xe0\xee\xfe\xa8\xf3\xf2\x61\x1a\x3d\x47\xff\x0f\x00\x00\xff\xff\x15\xdb\x22\x43\x47\x1b\x00\x00") + +func testImagesApparmorLoaderLoaderGoBytes() ([]byte, error) { + return bindataRead( + _testImagesApparmorLoaderLoaderGo, + "test/images/apparmor-loader/loader.go", + ) +} + +func testImagesApparmorLoaderLoaderGo() (*asset, error) { + bytes, err := testImagesApparmorLoaderLoaderGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/apparmor-loader/loader.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesBusyboxBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x2a\xcf\xcc\x4b\xc9\x2f\x2f\xd6\x4f\xcc\x4d\x31\x33\xd1\x37\xb4\x30\xb0\xb4\xcd\x4d\x2e\xd2\xcb\xcd\x4c\x2e\xca\x2f\xce\x4f\x2b\xd1\x4b\xce\xcf\xd5\x87\x29\xca\x4b\xcc\xcb\x2f\x4e\x2d\x2a\x4b\x2d\xb2\x02\xa9\xe4\x42\xd3\x6c\x69\x60\x4c\xa4\x66\x4b\x03\x63\x4c\xcd\xc4\xda\x6c\x69\x60\xc9\x05\x08\x00\x00\xff\xff\x9a\x3b\xd1\x02\xb7\x00\x00\x00") + +func testImagesBusyboxBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesBusyboxBaseimage, + "test/images/busybox/BASEIMAGE", + ) +} + +func testImagesBusyboxBaseimage() (*asset, error) { + bytes, err := testImagesBusyboxBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/busybox/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesBusyboxDockerfile_windows = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xbc\x56\x5f\x73\xda\xb8\x17\x7d\xf7\xa7\x38\x03\xbf\xce\xaf\x9d\x01\x3b\x4b\x3b\xd9\xd9\x74\xfa\xe0\x25\xa4\x65\x9a\x00\x83\x49\x3b\x99\xd2\x07\x21\x5f\xb0\x26\xb2\xe4\x95\x64\x1c\xbe\xfd\x8e\x64\x20\x61\xca\x76\x77\x5f\x36\x0f\x8e\x2d\xdd\x7f\x3a\xe7\x9e\x2b\xba\x18\xea\x6a\x67\xc4\xa6\x70\x18\x5c\x0c\x2e\xb0\x28\x08\x9f\xeb\x15\x19\x45\x8e\x2c\xd2\xda\x15\xda\xd8\x38\xea\x46\x5d\xdc\x0a\x4e\xca\x52\x8e\x5a\xe5\x64\xe0\x0a\x42\x5a\x31\x5e\xd0\x61\xa7\x87\x2f\x64\xac\xd0\x0a\x83\xf8\x02\xaf\xbd\x41\x67\xbf\xd5\x79\xf3\x3e\xea\x62\xa7\x6b\x94\x6c\x07\xa5\x1d\x6a\x4b\x70\x85\xb0\x58\x0b\x49\xa0\x27\x4e\x95\x83\x50\xe0\xba\xac\xa4\x60\x8a\x13\x1a\xe1\x8a\x90\x66\x1f\x24\x8e\xba\x78\xd8\x87\xd0\x2b\xc7\x84\x02\x03\xd7\xd5\x0e\x7a\xfd\xd2\x0e\xcc\x85\x82\xfd\x5f\xe1\x5c\x75\x95\x24\x4d\xd3\xc4\x2c\x14\x1b\x6b\xb3\x49\x64\x6b\x68\x93\xdb\xf1\x70\x34\xc9\x46\xfd\x41\x7c\x11\x5c\xee\x95\x24\x6b\x61\xe8\x8f\x5a\x18\xca\xb1\xda\x81\x55\x95\x14\x9c\xad\x24\x41\xb2\x06\xda\x80\x6d\x0c\x51\x0e\xa7\x7d\xbd\x8d\x11\x4e\xa8\x4d\x0f\x56\xaf\x5d\xc3\x0c\x45\x5d\xe4\xc2\x3a\x23\x56\xb5\x3b\x01\xeb\x50\x9d\xb0\x27\x06\x5a\x81\x29\x74\xd2\x0c\xe3\xac\x83\xdf\xd3\x6c\x9c\xf5\xa2\x2e\xbe\x8e\x17\x9f\xa6\xf7\x0b\x7c\x4d\xe7\xf3\x74\xb2\x18\x8f\x32\x4c\xe7\x18\x4e\x27\xd7\xe3\xc5\x78\x3a\xc9\x30\xbd\x41\x3a\x79\xc0\xe7\xf1\xe4\xba\x07\x12\xae\x20\x03\x7a\xaa\x8c\xaf\x5f\x1b\x08\x0f\x23\xe5\x1e\xb3\x8c\xe8\xa4\x80\xb5\x6e\x0b\xb2\x15\x71\xb1\x16\x1c\x92\xa9\x4d\xcd\x36\x84\x8d\xde\x92\x51\x42\x6d\x50\x91\x29\x85\xf5\x64\x5a\x30\x95\x47\x5d\x48\x51\x0a\xc7\x5c\x58\xf9\xe1\x50\x71\x14\xa5\xf3\x8f\xbe\xfa\xd1\xf8\x2e\xfd\x38\x0a\x5f\xf3\xd1\xc7\x71\xb6\x98\x3f\x44\xfe\x38\xf4\x7f\x43\xa8\xad\x8f\xcd\x70\x2b\x54\xfd\x04\x51\xfa\x9c\x4e\xa3\x56\x15\xe3\x8f\x21\x1e\x33\xbc\x10\x5b\xea\xf9\x0f\x85\x26\x78\x79\x8a\xbd\x9f\x70\xf0\xf5\x79\x8f\xaf\x42\xe5\xba\xb1\x71\x74\x33\x9f\xde\xa1\xdf\xaf\x24\x73\x6b\x6d\xca\x0f\xd2\x47\x4e\x58\x99\x5f\xbe\x03\x93\x95\x50\x74\xf5\x36\xbe\x04\xb3\xa8\x0c\x55\x51\x34\xbf\x9f\xa0\x7c\xcc\x85\x41\xe2\xca\xaa\x9f\x0b\x13\xb5\x31\x68\x40\x8e\x58\x99\xac\x6a\xbb\x5b\xe9\xa7\x7e\x41\xb2\x22\x73\xf5\x4b\x3c\xf8\x2d\xbe\xf0\xfe\xa7\x1b\xa7\x4e\x95\x6e\xc8\xd8\x82\xa4\x3c\xf8\x5d\xc6\x83\xf8\xd7\x90\xd6\x9e\x78\xfc\xef\x19\xa2\x68\x38\x9d\x3d\xa0\xdf\x5f\x1b\x5d\x7e\xf0\xd5\x1d\x4b\x0a\x2f\x27\xdb\xa7\xc9\x91\xac\x84\x0a\x0f\x0f\xed\x64\xba\x18\xbd\xe6\x92\xd5\xb9\xa8\x57\x6f\xae\x70\xaf\xd6\xda\xb8\x5a\x31\x47\x72\xd7\x43\xae\xf9\x23\x19\xac\x6a\x21\xf3\x27\x14\xcc\xc2\xea\xd2\x77\xa1\xad\xc9\x1e\xb1\x0d\xc0\xee\x51\x85\xdd\x95\x52\xa8\x47\xaf\x7b\x74\x6e\x84\x24\x9b\x74\x7c\xdb\x32\xd9\xb0\x5d\x8b\x24\xa9\xbc\x95\x40\x68\xa4\xd6\x1e\x8e\x99\x0d\xb9\x38\x4c\x91\x43\x0c\x6f\x50\x5a\x92\x5b\xb2\x60\x86\x60\x48\x32\x27\xb6\x84\x8a\xb9\xc2\xfa\x4e\xb7\xba\xe7\x85\xa4\x4d\xde\x72\x5b\xb2\x47\x0a\xe3\xa1\x55\x75\xd9\x43\x43\xe0\x4c\xc1\xfa\x9e\xde\x81\xe5\x39\xd8\x81\x0e\xac\x84\x62\x66\xe7\xfd\x86\x57\xcb\x95\x50\xcb\x50\xef\x72\xbf\x1d\xd3\x13\xc5\x7f\x87\x64\xf2\xc2\xb8\x5d\x68\xcf\xfc\x53\x3f\x5e\x1b\xd9\x3e\x7f\x6a\xa6\xc8\x71\xe6\x12\xc5\x2f\xdf\x3d\x87\x57\xdc\xbf\x7b\xee\x84\xe2\xb2\xce\x09\xcf\x0d\xe4\xd5\x06\xe1\x2c\xee\x74\x5e\x4b\x02\x53\x4c\xee\xac\xb0\xe0\x61\x7a\x9d\x36\xcd\xa1\xb7\xf0\xad\x93\xcc\x7c\x88\xcc\x87\xe8\xf4\xd0\x49\x66\x46\x6f\x0c\x2b\xd1\x1e\xe5\xc5\xe6\xf7\x73\x3d\x73\x73\x18\x09\xac\xf4\x14\x31\xab\x15\x4a\x52\x5e\xed\x94\x83\xad\xb4\x97\x64\x43\x28\xd8\x36\x28\x36\x4c\xdd\xaa\xb1\x45\x38\x94\xd3\xfb\x34\x87\x95\x7f\x52\xe5\xd1\xf8\xa7\xe5\xee\xa9\xe8\x7c\xff\x8b\x90\xc9\xbd\x25\x63\x93\xa1\x56\xfe\x3e\x20\x93\xe6\xa5\x50\x7e\xba\x32\xa7\x4d\x92\x56\xd5\x35\x73\x2c\xb9\xd5\x9c\xc9\xe4\x4e\x70\xa3\xfd\x98\x4e\xf6\x8d\xfe\x32\x4f\x2b\x93\xa4\x45\x3d\xdd\x83\x3e\x0c\xd7\xdb\x7f\x90\x23\x8a\xd2\xeb\x6b\x14\xda\x3a\xe5\x19\x08\x5d\x72\xf8\x6a\x7b\xe5\x3e\x1b\xcd\x71\xbe\x84\x73\x84\x9e\xaa\xde\x92\x0b\x42\xc4\x2c\x5d\x7c\x02\xa9\x2d\xb6\xcc\x88\x70\xa7\x39\x7d\x98\xc7\x7d\x29\x1e\x5b\x8b\x1e\x9a\x42\xf0\xc2\x4b\xde\x5f\xd5\x39\x59\x61\xbc\x71\x1c\x8d\x26\x5f\x82\xc5\x87\x4e\xab\xb6\xf7\xc3\xab\xa5\xd7\x80\xff\xbf\x3f\xf0\x32\xdb\x59\x47\xe5\xdb\xc1\x8b\x35\xff\x7a\xc2\xf0\xf2\x19\x95\xf7\x1d\x2c\x23\x7f\x55\xef\x0d\xc2\x7e\x88\x7f\xe2\x71\xb0\xea\xfa\xc3\x80\x61\x2d\x9e\x28\x87\xd4\x3c\x5c\x49\xc7\x3b\xed\xac\x6a\x82\xe3\xed\x74\x98\xde\xa6\xb3\xd9\x75\xba\x48\x43\xf8\xc0\xea\xf2\x3c\xa4\xcb\x3d\xab\xcb\xc0\xea\xb1\xc2\xec\x0c\x75\x33\xe6\x8a\x7f\x19\x6f\x79\xec\x92\x23\x68\xcf\x78\x2c\x5b\xea\x96\x67\x52\x3d\x63\x30\xf3\x3f\xb4\xac\xc3\xab\x59\x36\x9c\xce\x47\xaf\xe0\x89\x39\x72\xea\xc1\xa8\x2d\x19\x70\xad\xb6\xa4\x04\x29\x4e\xfb\x03\x78\xeb\x1f\xc1\x7d\x99\xfe\x28\xcb\x28\x1a\x4d\x16\xf3\x87\xd9\x74\x3c\x59\xe0\x5b\x87\x97\xf9\x51\xad\x36\x3c\x79\xe7\x7b\xf4\x67\x00\x00\x00\xff\xff\x96\x6e\xa1\x34\x42\x0a\x00\x00") + +func testImagesBusyboxDockerfile_windowsBytes() ([]byte, error) { + return bindataRead( + _testImagesBusyboxDockerfile_windows, + "test/images/busybox/Dockerfile_windows", + ) +} + +func testImagesBusyboxDockerfile_windows() (*asset, error) { + bytes, err := testImagesBusyboxDockerfile_windowsBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/busybox/Dockerfile_windows", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesBusyboxMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x6b\xe3\x38\x14\x85\x9f\x57\xbf\xe2\x10\xf7\x21\x81\xd4\x09\x61\xd9\x85\x2e\x65\xf1\x24\x99\xd4\xb4\x63\x0f\xb6\xdb\xd2\xa7\x22\xdb\x37\xf6\x05\x5b\xf2\x48\xf2\x38\xf9\xf7\x83\xd2\x16\xa6\x8c\xde\xee\xbd\xe7\x1e\x7d\x3a\x0a\xb0\xd5\xc3\xd9\x70\xd3\x3a\x6c\xd6\x9b\x35\x8a\x96\x70\x3f\x96\x64\x14\x39\xb2\x88\x46\xd7\x6a\x63\x43\x11\x88\x00\x0f\x5c\x91\xb2\x54\x63\x54\x35\x19\xb8\x96\x10\x0d\xb2\x6a\xe9\x63\xb2\xc4\x13\x19\xcb\x5a\x61\x13\xae\x31\xf7\x82\xd9\xfb\x68\xb6\xf8\x4f\x04\x38\xeb\x11\xbd\x3c\x43\x69\x87\xd1\x12\x5c\xcb\x16\x47\xee\x08\x74\xaa\x68\x70\x60\x85\x4a\xf7\x43\xc7\x52\x55\x84\x89\x5d\x7b\xb9\xe6\xdd\x24\x14\x01\x5e\xde\x2d\x74\xe9\x24\x2b\x48\x54\x7a\x38\x43\x1f\x7f\xd7\x41\xba\x0b\xb0\x3f\xad\x73\xc3\xcd\x6a\x35\x4d\x53\x28\x2f\xb0\xa1\x36\xcd\xaa\x7b\x13\xda\xd5\x43\xbc\xdd\x27\xf9\xfe\x7a\x13\xae\x2f\x2b\x8f\xaa\x23\x6b\x61\xe8\xc7\xc8\x86\x6a\x94\x67\xc8\x61\xe8\xb8\x92\x65\x47\xe8\xe4\x04\x6d\x20\x1b\x43\x54\xc3\x69\xcf\x3b\x19\x76\xac\x9a\x25\xac\x3e\xba\x49\x1a\x12\x01\x6a\xb6\xce\x70\x39\xba\x4f\x61\x7d\xd0\xb1\xfd\x24\xd0\x0a\x52\x61\x16\xe5\x88\xf3\x19\xbe\x44\x79\x9c\x2f\x45\x80\xe7\xb8\xb8\x4b\x1f\x0b\x3c\x47\x59\x16\x25\x45\xbc\xcf\x91\x66\xd8\xa6\xc9\x2e\x2e\xe2\x34\xc9\x91\x7e\x45\x94\xbc\xe0\x3e\x4e\x76\x4b\x10\xbb\x96\x0c\xe8\x34\x18\xcf\xaf\x0d\xd8\xc7\x48\xb5\xcf\x2c\x27\xfa\x04\x70\xd4\x6f\x40\x76\xa0\x8a\x8f\x5c\xa1\x93\xaa\x19\x65\x43\x68\xf4\x4f\x32\x8a\x55\x83\x81\x4c\xcf\xd6\x7f\xa6\x85\x54\xb5\x08\xd0\x71\xcf\x4e\xba\x4b\xe7\x8f\x47\x85\x42\xe4\xd9\x36\xbf\x6d\xb5\x75\x4a\xf6\x24\xd2\x1c\xff\xdf\xa2\x63\x35\x9e\x44\x94\x6d\xef\x7c\x25\xfb\xfa\x9f\xbf\x45\x11\x65\x87\x7d\xe1\xeb\xab\xf9\xf6\x31\xdb\xc5\xd9\x42\x1c\xd2\x28\xfb\x86\x5b\xfc\x2b\x0e\xe9\x43\x94\x1c\x5e\x9f\xf6\x59\x1e\xa7\xc9\xc5\x43\x3a\xb2\xce\xdb\xbf\xee\xe2\x0c\x7e\x4d\x69\x57\xb3\xc1\xd5\xdc\xb6\xd4\x75\x18\xa6\x7a\xb1\x10\x74\x1a\xb4\x71\x42\x94\xac\x6e\xc4\x5f\x61\xb8\xe2\x5e\x36\x74\x3d\x3a\xee\x42\xdb\xa2\x64\x85\xab\xb9\x87\x5c\x08\x11\x7e\xbf\x4b\x93\x97\x1b\xdf\x14\xbf\x02\x00\x00\xff\xff\x0a\xe0\x85\x2e\x04\x03\x00\x00") + +func testImagesBusyboxMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesBusyboxMakefile, + "test/images/busybox/Makefile", + ) +} + +func testImagesBusyboxMakefile() (*asset, error) { + bytes, err := testImagesBusyboxMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/busybox/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesBusyboxOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xce\x49\x2c\x4d\xc9\x2c\x4d\x4a\xcd\x29\xe5\x02\x04\x00\x00\xff\xff\x9b\x12\xb6\xf7\x1b\x00\x00\x00") + +func testImagesBusyboxOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesBusyboxOwners, + "test/images/busybox/OWNERS", + ) +} + +func testImagesBusyboxOwners() (*asset, error) { + bytes, err := testImagesBusyboxOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/busybox/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesBusyboxVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xb2\xe4\x02\x04\x00\x00\xff\xff\x7c\xeb\x30\xd3\x05\x00\x00\x00") + +func testImagesBusyboxVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesBusyboxVersion, + "test/images/busybox/VERSION", + ) +} + +func testImagesBusyboxVersion() (*asset, error) { + bytes, err := testImagesBusyboxVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/busybox/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesBusyboxHostnameGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x53\xc1\x6e\xdb\x38\x10\x3d\x8b\x5f\xf1\x56\x27\x29\xf0\xd2\x46\x4e\x45\x16\x3d\xa8\x49\x8a\x0a\x0d\x6c\x23\x72\xb6\xe8\x91\x96\x46\xd2\x60\x29\x92\x4b\x52\xeb\x1a\x8b\xfc\xfb\x82\x8a\x53\xa4\x1b\xf8\x40\x0f\xe7\xcd\x7b\x6f\x9e\xa4\xf5\x95\xb8\xb5\xee\xec\x79\x18\x23\xae\x37\xd7\x1b\x1c\x46\xc2\xd7\xf9\x48\xde\x50\xa4\x80\x6a\x8e\xa3\xf5\x41\x0a\xf1\xc0\x2d\x99\x40\x1d\x66\xd3\x91\x47\x1c\x09\x95\x53\xed\x48\xb8\x74\x56\xf8\x93\x7c\x60\x6b\x70\x2d\x37\x28\x12\x20\xbf\xb4\xf2\xf2\x0f\x71\xb6\x33\x26\x75\x86\xb1\x11\x73\x20\xc4\x91\x03\x7a\xd6\x04\xfa\xd1\x92\x8b\x60\x83\xd6\x4e\x4e\xb3\x32\x2d\xe1\xc4\x71\x5c\x44\x2e\x14\x52\x7c\xbf\x10\xd8\x63\x54\x6c\xa0\xd0\x5a\x77\x86\xed\xdf\xa2\xa0\xa2\x10\x00\x30\xc6\xe8\x6e\xd6\xeb\xd3\xe9\x24\xd5\xe2\x52\x5a\x3f\xac\xf5\x0b\x2a\xac\x1f\xea\xdb\xfb\x6d\x73\xff\xfb\xb5\xdc\x08\xf1\x64\x34\x85\x00\x4f\x7f\xcf\xec\xa9\xc3\xf1\x0c\xe5\x9c\xe6\x56\x1d\x35\x41\xab\x13\xac\x87\x1a\x3c\x51\x87\x68\x93\xcf\x93\xe7\xc8\x66\x58\x21\xd8\x3e\x9e\x94\x27\xd1\x71\x88\x9e\x8f\x73\xfc\x25\xa0\x57\x57\x1c\xf0\x16\x60\x0d\x94\x41\x5e\x35\xa8\x9b\x1c\x9f\xaa\xa6\x6e\x56\xe2\x5b\x7d\xf8\xb2\x7b\x3a\xe0\x5b\xf5\xf8\x58\x6d\x0f\xf5\x7d\x83\xdd\x23\x6e\x77\xdb\xbb\xfa\x50\xef\xb6\x0d\x76\x9f\x51\x6d\xbf\xe3\x6b\xbd\xbd\x5b\x81\x38\x8e\xe4\x41\x3f\x9c\x4f\xde\xad\x07\xa7\xe8\xa8\x93\xa2\x21\xfa\x45\xbc\xb7\x2f\x66\x82\xa3\x96\x7b\x6e\xa1\x95\x19\x66\x35\x10\x06\xfb\x0f\x79\xc3\x66\x80\x23\x3f\x71\x48\x0f\x2f\x40\x99\x4e\x68\x9e\x38\xaa\xb8\xd4\xef\xd6\x91\xe2\x6a\x2d\x84\x53\xed\x5f\x89\x64\x52\x6c\x84\xe0\xc9\x59\x1f\x51\x88\x2c\xef\xb5\x1a\xf2\x74\x4e\x31\x1d\xda\x2e\x95\xa1\xa5\xb2\x21\x17\xa5\x10\xfd\x6c\x5a\x0c\x14\x77\x73\x3c\xda\xd9\x74\xf5\xbe\x28\x61\x28\xca\x7a\x8f\x7f\x45\xd6\x5a\x63\x56\x20\xef\x71\xf3\x71\xb9\xbe\x63\xa5\x8b\x7c\xee\x5c\xbe\x42\xfe\x41\x2e\xbf\x9b\x0f\x9b\xbc\x14\x19\xf7\x0b\xf0\xb7\x8f\x30\xac\xd3\x70\xa6\xed\x20\x3f\xab\xa8\x74\x41\xde\x97\x22\x7b\x16\x59\x47\x3d\x79\x24\x5a\x79\xab\x6d\xa0\xa2\x14\x99\xb6\xad\xd2\x55\xd7\x2d\x22\x4b\xeb\xe1\xf5\xa6\x28\x65\x71\x95\x74\x9f\xee\xf6\xa9\x2e\x45\xe6\x29\xce\xde\xe0\xe7\x90\xac\xf7\xe2\xf9\xb2\x48\x8a\xa0\x28\x93\x76\xda\xbd\xde\x27\xc2\xf4\x4f\x7e\xb2\x56\x17\x39\xe7\x2b\xf4\x4a\xa7\x2f\x24\x57\x48\xaf\x81\x19\x92\xf3\x05\xb2\x57\xfe\xc5\x0e\xf7\xb8\xba\x8c\xa7\x25\xd8\x25\x96\xff\x45\x24\xb2\xac\x9f\xa2\xdc\x7b\x36\xb1\x60\x27\x9b\x85\xab\x28\xd3\x92\x20\x1d\x68\x19\x1d\x6d\x88\x46\x4d\xf4\x33\x41\x1b\xe4\x97\xcb\xdd\xc2\xf1\x3e\xb2\x77\x99\xa5\xd0\xde\x68\xbd\x52\x2e\x69\x3e\x8b\xff\x02\x00\x00\xff\xff\xff\xa0\xe4\x9c\x37\x04\x00\x00") + +func testImagesBusyboxHostnameGoBytes() ([]byte, error) { + return bindataRead( + _testImagesBusyboxHostnameGo, + "test/images/busybox/hostname.go", + ) +} + +func testImagesBusyboxHostnameGo() (*asset, error) { + bytes, err := testImagesBusyboxHostnameGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/busybox/hostname.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesCloudbuildYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x54\x71\x6b\xe3\xb8\x13\xfd\xdf\x9f\xe2\x41\x97\xf5\x2e\x44\x71\x36\xbf\xee\xb2\x3f\x43\xfe\xc8\x6d\x73\x6d\xb8\x74\x5b\xda\x2c\xbd\xc2\x81\x91\xed\x89\x2d\x2a\x4b\x3e\x49\x4e\x1b\xb8\x0f\x7f\x48\x72\x7a\x0d\x77\xc7\x41\xc0\xce\x68\xfc\xe6\xcd\xe8\xcd\x3b\xc3\x3d\x11\x5a\xe7\x7a\x9b\x67\x59\x25\xf5\x50\x4f\x1b\xad\x1b\x49\xd3\x4a\x77\x31\xc0\xca\x41\xc8\x3a\xab\x75\x65\xb3\xf0\xca\x2a\xad\x76\xa2\x49\x92\x33\xb8\x56\x58\x74\x83\x75\x28\x09\xb6\xa7\x4a\xec\x04\xd5\x10\x0a\x96\x2a\xad\x6a\x3b\xc5\x7a\x07\xdd\x09\xe7\xa8\x9e\xa0\xa6\x1d\x1f\xa4\xb3\x70\x1a\x5f\x66\x33\x8b\x0f\x9f\x66\xe8\x84\xb2\x1f\x03\x16\xc1\x89\x8e\xf4\xe0\xf0\xcc\x2d\x84\xaa\x0c\x71\x4b\x35\x4a\xaa\xf8\x60\x09\x56\x77\x04\xd1\xf1\x86\x2c\x3a\xd1\xb4\x0e\x8e\x3f\x11\xa4\x56\x0d\x19\x8f\x19\xe8\xe1\x03\x4d\x9b\x69\x0e\xcb\xbb\x5e\x12\xe3\xbd\xb0\x64\xf6\x64\x26\xe8\xc9\xd9\xcc\x50\x2d\x2c\x13\xca\x3a\x2e\x25\x99\x8f\xc9\x58\x33\xc7\xe7\xf3\xd9\xcc\x1e\x9b\xea\x0d\xed\x49\x39\x0b\x32\x46\x1b\x0b\xb1\xc3\x41\x0f\xa8\xb5\x4a\x1d\x3c\x99\x52\xbb\x16\xc5\xe5\x7a\x5b\x6c\x97\x97\xe0\xaa\x46\x71\xfb\x63\xb3\x29\x7e\x5a\xde\xaf\x8a\xbb\xd5\xcf\x93\xe4\x0c\xda\x80\xab\x03\x14\x3d\xc3\x0e\xa5\x75\xc2\x0d\x4e\x68\x65\xc1\xeb\x3a\x8e\xc9\x37\xbd\x1b\xdc\x60\x68\x9a\xe8\x3e\x1c\xe6\x09\x4e\xb2\x8b\x18\xcf\xb1\xdc\x6c\x6e\x1e\x8a\xcd\xcd\xcd\xfd\x2a\x01\x3a\x5e\xb5\x42\xd1\xf6\xd0\x53\x8e\xf4\xfb\xa7\xe2\x6a\x7d\x79\xf5\xed\xf6\x47\xf1\x35\x4d\xac\xa3\x3e\xe0\x30\x28\xde\xf9\xf3\xa6\x32\x53\xa1\xb3\xa7\xaf\x96\x39\xb2\x2e\x0e\x31\x6b\xaa\x92\xd5\xba\x7a\x22\xc3\x9a\x70\xd7\xf9\x7e\x3e\x9b\xcf\x66\xe7\xf3\x39\x2b\xe7\x9f\xeb\xff\x7f\x39\x4f\x13\x00\x20\xe5\xcc\xa1\xd7\x42\xb9\x1c\x69\xc9\x6d\x1b\xc3\xb5\x30\x39\xa6\x99\x47\xcc\x46\xc8\x31\x7d\x9f\x87\x17\x86\x8b\x9b\x6f\xbf\xac\xee\x8a\x6f\x9b\x75\xb1\xfa\xf5\x76\x75\xb7\xbe\x5e\x7d\xdf\x2e\x37\x0b\x52\xbc\x94\x54\x8f\x59\xdb\xe5\xe5\xe2\xdd\x71\x98\x63\xec\x38\xc8\xc5\xbb\xd3\xc1\x8e\xc7\x0f\x57\xcb\xed\xe2\x5d\xe1\x1f\x63\xe4\x6e\x75\xb9\xbe\xdf\xde\x3d\x2e\xde\x34\x6b\x1d\x6f\x84\x6a\x18\xcd\x29\x34\xce\x22\xcd\xf0\xc5\x19\xb6\x2d\x1d\x35\x89\xd0\x7f\x14\x50\xcb\x2d\xae\x6e\xae\x57\x8b\xa8\x77\x32\x59\xeb\x95\xe7\xef\x38\x4e\x2b\x0a\xed\x05\xc2\xab\x14\x99\xd1\xda\x65\xd3\x78\x94\x55\x52\xb0\x5e\x0e\x8d\x50\x36\x1b\x67\x1b\xb3\xc7\x9a\x0f\x04\x45\x54\x7b\xb9\x5a\x72\x41\x00\xbe\x96\xff\x1f\x80\x40\x2f\xbd\x14\x95\x70\xf2\x00\x2b\x54\x45\x78\xa6\xd4\x10\x06\x2b\x54\x73\x5a\x7f\xec\x3b\x52\xf5\xdf\x86\x00\x37\x8d\x3d\x4e\x3f\x65\x55\x3a\xbe\xfe\x11\x9e\x40\xbc\x68\xf0\xc1\xb5\x88\x8b\x3c\x18\x1a\x55\x80\xdf\xc6\xa4\xf7\xef\x8f\x95\xcc\xa0\xc0\x98\xe9\xc0\x58\x6f\xc4\x5e\x48\x6a\xa8\x46\x37\x48\x27\xb8\xa9\xda\xec\x77\xea\x06\x36\x58\x32\x7e\xd4\x4e\x54\x3e\x99\x7c\x63\xac\xc7\x81\xec\x5b\x44\x7a\xe9\xb5\x71\xff\xa5\x88\x7f\xe0\x30\x4e\xdb\xdb\x81\x23\x30\xe6\x35\x0d\xd1\x35\x6c\xbc\x1e\x30\xcf\xe0\xdf\x3f\x14\xca\x5b\x93\x03\x63\xa5\xd6\xce\x3a\xc3\xfb\xb7\xc9\x9d\x37\x11\x2e\x65\x84\x63\x5c\xd5\xac\x1f\x6c\x9b\x9c\xac\xac\x9f\xe8\xd9\x5f\xfb\xfe\x2c\xa4\xf4\x9e\xb7\x13\xd2\x73\x7e\x16\xae\x05\x47\x23\x1c\x2b\x83\x65\x39\xde\x60\xa7\x4d\xb8\xde\x20\xb9\x09\xf4\x2e\x6e\xbb\x36\x1d\xf6\x8f\x8f\x8f\x8f\xd7\xd7\x17\x17\xac\xe5\xb6\x9d\x78\x69\x05\xfc\x8a\x2b\x8f\x3a\x78\x08\x6e\xc1\x4f\x8c\x20\xc1\x6b\xfd\x1c\xe9\xa7\xf9\xff\xce\x3f\xa7\x91\xd5\xc9\x7e\x44\x6e\x95\x56\x8e\x8f\x06\x63\xc8\x97\xe6\xd1\x56\x7d\x6b\x51\x7e\xfe\x67\x44\x13\xbc\xd3\x5b\x5e\x14\x3f\x0b\x90\x1c\xa5\xe1\xaa\x6a\x21\xc5\x13\x21\xed\xb8\x75\x64\x52\x6f\x68\xa9\x21\xe9\x6d\x99\xcd\xa6\xf3\x74\x12\x2c\x2e\x74\x1b\x13\xf7\x3e\x3a\xf5\x4c\x4f\x38\xe5\xaf\x10\x91\xb0\xdf\xda\xbf\xf3\x0c\x83\x0a\x8e\x15\xcc\x9c\x02\x23\x17\xf6\xae\x1f\x4a\x29\x5e\x89\xb7\x84\x71\xb1\x61\xa8\x11\xd6\x99\x43\xa8\xe9\x61\x73\xa4\xfe\x2e\xbd\xb4\xb5\xe9\xb8\xaa\x28\x4d\xfe\x0c\x00\x00\xff\xff\x4f\xeb\x28\x13\xe7\x06\x00\x00") + +func testImagesCloudbuildYamlBytes() ([]byte, error) { + return bindataRead( + _testImagesCloudbuildYaml, + "test/images/cloudbuild.yaml", + ) +} + +func testImagesCloudbuildYaml() (*asset, error) { + bytes, err := testImagesCloudbuildYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/cloudbuild.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesCudaVectorAddBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\xcd\x2b\xcb\x4c\xc9\x4c\xd4\x4f\x2e\x4d\x49\xb4\x32\x34\xd0\x33\xd0\x4d\x49\x2d\x4b\xcd\xd1\x2d\x4d\x2a\xcd\x2b\x29\x35\xb4\xd0\x33\x30\xe1\x82\x28\x2f\x28\x48\x36\x33\xc9\x49\x45\xd6\xa0\x0b\x15\xc3\xa5\x11\x10\x00\x00\xff\xff\x54\xd9\xcc\x89\x68\x00\x00\x00") + +func testImagesCudaVectorAddBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesCudaVectorAddBaseimage, + "test/images/cuda-vector-add/BASEIMAGE", + ) +} + +func testImagesCudaVectorAddBaseimage() (*asset, error) { + bytes, err := testImagesCudaVectorAddBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/cuda-vector-add/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesCudaVectorAddDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x6f\xbb\x36\x14\xc5\xdf\xfd\x29\x8e\xc2\x5f\xd5\x36\x05\x9c\xf5\x65\xd2\xf6\x44\x49\xda\xa2\x34\xd0\x41\xd2\xaa\xd2\xa4\xc8\x81\x1b\xb0\x66\x6c\x6a\x9b\xa4\xf9\xf6\x13\x49\xba\xb5\x9a\xdf\xee\xbd\x87\x73\x7f\xf7\x10\x20\x31\xfd\xc9\xca\xa6\xf5\xb8\x9d\xfd\xfa\x1b\xd6\x2d\x61\x39\xec\xc8\x6a\xf2\xe4\x10\x0f\xbe\x35\xd6\x45\x2c\x60\x01\x9e\x64\x45\xda\x51\x8d\x41\xd7\x64\xe1\x5b\x42\xdc\x8b\xaa\xa5\xcf\xc9\x14\x2f\x64\x9d\x34\x1a\xb7\xd1\x0c\x3f\x8d\x82\xc9\x75\x34\xf9\xf9\x0f\x16\xe0\x64\x06\x74\xe2\x04\x6d\x3c\x06\x47\xf0\xad\x74\xd8\x4b\x45\xa0\x8f\x8a\x7a\x0f\xa9\x51\x99\xae\x57\x52\xe8\x8a\x70\x94\xbe\x3d\xaf\xb9\x9a\x44\x2c\xc0\xdb\xd5\xc2\xec\xbc\x90\x1a\x02\x95\xe9\x4f\x30\xfb\xaf\x3a\x08\x7f\x06\x1e\x5f\xeb\x7d\xff\x3b\xe7\xc7\xe3\x31\x12\x67\xd8\xc8\xd8\x86\xab\x8b\xd0\xf1\xa7\x34\x59\x64\xe5\x22\xbc\x8d\x66\xe7\x4f\x36\x5a\x91\x73\xb0\xf4\x3e\x48\x4b\x35\x76\x27\x88\xbe\x57\xb2\x12\x3b\x45\x50\xe2\x08\x63\x21\x1a\x4b\x54\xc3\x9b\x91\xf7\x68\xa5\x97\xba\x99\xc2\x99\xbd\x3f\x0a\x4b\x2c\x40\x2d\x9d\xb7\x72\x37\xf8\x6f\x61\x7d\xd2\x49\xf7\x4d\x60\x34\x84\xc6\x24\x2e\x91\x96\x13\xdc\xc5\x65\x5a\x4e\x59\x80\xd7\x74\xfd\x98\x6f\xd6\x78\x8d\x8b\x22\xce\xd6\xe9\xa2\x44\x5e\x20\xc9\xb3\x79\xba\x4e\xf3\xac\x44\x7e\x8f\x38\x7b\xc3\x32\xcd\xe6\x53\x90\xf4\x2d\x59\xd0\x47\x6f\x47\x7e\x63\x21\xc7\x18\xa9\x1e\x33\x2b\x89\xbe\x01\xec\xcd\x05\xc8\xf5\x54\xc9\xbd\xac\xa0\x84\x6e\x06\xd1\x10\x1a\x73\x20\xab\xa5\x6e\xd0\x93\xed\xa4\x1b\x7f\xa6\x83\xd0\x35\x0b\xa0\x64\x27\xbd\xf0\xe7\xce\xff\x8e\x8a\x18\x8b\x8b\x87\x91\x7e\x91\xae\xe2\x87\x05\xbb\x2f\xf2\x15\x7e\xfc\x57\xb3\xa4\xc8\xcb\x72\x7b\xb7\x49\x9f\xe6\xdb\x24\x7f\x7e\xc3\x3b\x75\x43\xf8\xe7\x62\xb5\x89\x8b\xe4\x31\x74\xa3\x75\x05\x3e\x38\xcb\x77\x52\x73\xc6\x8a\x4d\x06\xd1\xfb\xb0\x21\x8f\xa1\xaf\x85\x27\xdc\xdc\xfc\xdb\x91\xda\x79\xa1\x14\xc2\x13\xc2\x50\x9b\xf0\x5a\x87\x96\x2a\xd3\x75\xa4\x6b\x87\xbf\x18\xae\xaf\x1a\x6a\x11\x3a\xd1\xf5\x8a\x5c\xf8\x23\xd9\xcc\xe3\xed\xf3\xf2\x61\xfb\xb2\x28\xca\x34\xcf\x46\xdb\x8b\xd6\x76\x08\xed\x1e\xfc\x20\x2c\x57\x72\xc7\x45\xef\xb9\x92\xce\x3b\xfe\x0b\x63\xaf\x79\xb1\x9c\xa7\xc5\x05\x51\x99\x4a\x28\x3e\xfa\xf2\xab\x2f\x9f\x6d\xcb\x31\x73\xe2\x07\xaa\xbc\xb1\x71\x5d\x9f\x4f\xe8\xc4\xdf\xc4\x58\xb2\x9a\x43\x1f\x64\x2d\x45\xe8\x3a\x39\x6e\x8c\xbe\xe8\xfe\x09\x00\x00\xff\xff\xf1\x72\x29\x14\x87\x03\x00\x00") + +func testImagesCudaVectorAddDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesCudaVectorAddDockerfile, + "test/images/cuda-vector-add/Dockerfile", + ) +} + +func testImagesCudaVectorAddDockerfile() (*asset, error) { + bytes, err := testImagesCudaVectorAddDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/cuda-vector-add/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesCudaVectorAddOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\xc8\xca\x4c\xac\xcc\xcc\x4b\xaf\x02\x73\x72\xb3\x4b\x73\x13\x4b\x12\xd3\xb9\x00\x01\x00\x00\xff\xff\xa1\xc6\xdb\x43\x25\x00\x00\x00") + +func testImagesCudaVectorAddOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesCudaVectorAddOwners, + "test/images/cuda-vector-add/OWNERS", + ) +} + +func testImagesCudaVectorAddOwners() (*asset, error) { + bytes, err := testImagesCudaVectorAddOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/cuda-vector-add/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesCudaVectorAddVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd2\x33\xe4\x02\x04\x00\x00\xff\xff\x70\x6a\x3d\x6f\x04\x00\x00\x00") + +func testImagesCudaVectorAddVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesCudaVectorAddVersion, + "test/images/cuda-vector-add/VERSION", + ) +} + +func testImagesCudaVectorAddVersion() (*asset, error) { + bytes, err := testImagesCudaVectorAddVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/cuda-vector-add/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\xcd\x4b\xcf\xcc\xab\xb0\x32\xd4\x33\x34\xd5\x4d\xcc\x29\xc8\xcc\x4b\xe5\x82\xca\x16\xe5\xda\x26\x16\xe5\x1a\x1b\x95\x99\xe9\xe3\x51\x63\x66\x62\x0b\x26\xcb\x2c\x70\xaa\x2a\x28\x48\x36\x33\xc9\x49\xb5\x85\xd2\x38\xd5\x15\x1b\x5b\x1a\x54\xd8\x82\x49\x2c\x6a\xca\x33\xf3\x52\xf2\xcb\x8b\x21\xae\xd6\x37\xb4\x30\xb0\xb4\x0d\x72\x75\xf7\x0c\x0e\x09\x8a\xd4\x4f\x2a\x2d\xae\x4c\xca\x07\xa9\x37\xb2\xd4\x85\x2a\xd4\x05\x2b\xd4\x05\x29\x44\xd7\x6b\x69\x60\x4c\x9c\x5e\x4b\x03\x63\x4c\xbd\x44\xda\x6b\x69\x60\xc9\x05\x08\x00\x00\xff\xff\x2e\xa9\x3f\x08\x68\x01\x00\x00") + +func testImagesEchoserverBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverBaseimage, + "test/images/echoserver/BASEIMAGE", + ) +} + +func testImagesEchoserverBaseimage() (*asset, error) { + bytes, err := testImagesEchoserverBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x91\x5f\x6f\xbb\x36\x14\x86\xef\xfd\x29\x5e\xc1\x2e\x36\x2d\xc1\xfd\x55\x9a\x26\x6d\x57\x34\xa1\x2d\x6a\x03\x1d\x24\xab\xa2\xaa\xaa\x1c\x38\x01\x6b\xc6\xa6\xb6\x59\x92\x6f\x3f\x41\x5a\x65\xdd\x1f\x2e\x90\x79\xcf\xe3\xc3\xe3\xe3\x10\x0b\xd3\x9f\xac\x6c\x5a\x8f\xeb\xab\x6f\x3f\x63\xdd\x12\x1e\x86\x1d\x59\x4d\x9e\x1c\xe2\xc1\xb7\xc6\xba\x88\x85\x2c\xc4\xa3\xac\x48\x3b\xaa\x31\xe8\x9a\x2c\x7c\x4b\x88\x7b\x51\xb5\xf4\x59\x99\xe1\x77\xb2\x4e\x1a\x8d\xeb\xe8\x0a\xdf\x8f\x40\xf0\x51\x0a\x7e\xf8\x95\x85\x38\x99\x01\x9d\x38\x41\x1b\x8f\xc1\x11\x7c\x2b\x1d\xf6\x52\x11\xe8\x58\x51\xef\x21\x35\x2a\xd3\xf5\x4a\x0a\x5d\x11\x0e\xd2\xb7\xd3\x6f\x3e\x9a\x44\x2c\xc4\xf6\xa3\x85\xd9\x79\x21\x35\x04\x2a\xd3\x9f\x60\xf6\x7f\xe7\x20\xfc\x24\x3c\x3e\xad\xf7\xfd\x2f\x9c\x1f\x0e\x87\x48\x4c\xb2\x91\xb1\x0d\x57\x67\xd0\xf1\xc7\x74\x91\x64\x65\x32\xbf\x8e\xae\xa6\x2d\x1b\xad\xc8\x39\x58\x7a\x1f\xa4\xa5\x1a\xbb\x13\x44\xdf\x2b\x59\x89\x9d\x22\x28\x71\x80\xb1\x10\x8d\x25\xaa\xe1\xcd\xe8\x7b\xb0\xd2\x4b\xdd\xcc\xe0\xcc\xde\x1f\x84\x25\x16\xa2\x96\xce\x5b\xb9\x1b\xfc\x97\x61\x7d\xda\x49\xf7\x05\x30\x1a\x42\x23\x88\x4b\xa4\x65\x80\x9b\xb8\x4c\xcb\x19\x0b\xf1\x9c\xae\xef\xf3\xcd\x1a\xcf\x71\x51\xc4\xd9\x3a\x4d\x4a\xe4\x05\x16\x79\xb6\x4c\xd7\x69\x9e\x95\xc8\x6f\x11\x67\x5b\x3c\xa4\xd9\x72\x06\x92\xbe\x25\x0b\x3a\xf6\x76\xf4\x37\x16\x72\x1c\x23\xd5\xe3\xcc\x4a\xa2\x2f\x02\x7b\x73\x16\x72\x3d\x55\x72\x2f\x2b\x28\xa1\x9b\x41\x34\x84\xc6\xfc\x49\x56\x4b\xdd\xa0\x27\xdb\x49\x37\x5e\xa6\x83\xd0\x35\x0b\xa1\x64\x27\xbd\xf0\x53\xf2\xaf\x43\x45\x8c\xc5\xc5\xdd\x68\x9f\xa4\xab\xf8\x2e\x61\xb7\x45\xbe\xc2\x77\x97\x6f\xb6\x28\xf2\xb2\x7c\xbb\xd9\xa4\x8f\xcb\xb7\x45\xfe\xb4\xc5\x3b\x75\xc3\xfc\xb7\x64\xb5\x89\x8b\xc5\xfd\xdc\x8d\xad\x2b\xf0\xc1\x59\xbe\x93\x9a\x33\x36\x41\x52\x3b\x2f\x94\x9a\xd7\xd4\xbb\xc8\xb5\xe0\xac\xd8\x64\x78\x09\x5c\x1b\xcc\x10\xcc\xab\xf1\xcd\xff\x01\x05\xaf\x13\xd4\xfd\x51\x4b\x8b\x79\x0f\x6e\x07\xcd\x75\x23\xf5\x91\xb1\x78\xb9\xc4\xb4\x8c\x2a\xa3\xf7\xe0\xe4\xab\x73\x89\x5f\xd2\x09\xf2\xd4\xf5\x4a\x78\x8a\xd4\x20\xce\x56\xca\x54\x42\x71\xd7\x0a\x4b\x5c\x0d\x82\xff\x14\x7d\xe3\x13\x5a\x24\xf1\x72\x95\x44\x5d\x7d\x59\x4d\xb9\x1d\xf4\xa4\x7c\xd9\x3c\x1e\xec\x9c\x4e\x86\x55\xdb\x99\x1a\x3f\x1e\xff\x07\x49\xb2\x75\xb1\x7d\xca\xd3\x6c\x8d\x97\xe0\x3f\x91\xe0\x95\xfd\x15\x00\x00\xff\xff\xcc\x8d\x1d\x40\xc2\x03\x00\x00") + +func testImagesEchoserverDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverDockerfile, + "test/images/echoserver/Dockerfile", + ) +} + +func testImagesEchoserverDockerfile() (*asset, error) { + bytes, err := testImagesEchoserverDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverDockerfile_windows = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x52\x51\x73\xe2\x36\x10\x7e\xd7\xaf\xd8\x81\xce\xb5\x9d\xc1\x36\x10\x26\x43\xc9\xe4\xc1\x25\x4e\xce\x73\x39\x9b\xc1\xe4\x52\xa6\xdc\x83\xb0\x17\x5b\x73\xb2\xa4\x4a\x72\x1c\xfa\xeb\x3b\x32\xe4\xe2\xf4\x2e\xbc\x60\xed\xf7\xed\xee\xb7\xdf\xee\x10\x96\x52\x1d\x35\x2b\x2b\x0b\xd3\xf1\x74\x0c\x9b\x0a\xe1\x53\xb3\x47\x2d\xd0\xa2\x81\xb0\xb1\x95\xd4\xc6\x27\x43\x32\x84\x7b\x96\xa3\x30\x58\x40\x23\x0a\xd4\x60\x2b\x84\x50\xd1\xbc\xc2\x17\x64\x04\x5f\x50\x1b\x26\x05\x4c\xfd\x31\xfc\xe6\x08\x83\x33\x34\xf8\xfd\x8a\x0c\xe1\x28\x1b\xa8\xe9\x11\x84\xb4\xd0\x18\x04\x5b\x31\x03\x07\xc6\x11\xf0\x39\x47\x65\x81\x09\xc8\x65\xad\x38\xa3\x22\x47\x68\x99\xad\xba\x36\xe7\x22\x3e\x19\xc2\xf6\x5c\x42\xee\x2d\x65\x02\x28\xe4\x52\x1d\x41\x1e\xfa\x3c\xa0\xb6\x13\xec\x7e\x95\xb5\x6a\x11\x04\x6d\xdb\xfa\xb4\x13\xeb\x4b\x5d\x06\xfc\x44\x34\xc1\x7d\xbc\x8c\x92\x2c\xf2\xa6\xfe\xb8\x4b\x79\x10\x1c\x8d\x01\x8d\xff\x34\x4c\x63\x01\xfb\x23\x50\xa5\x38\xcb\xe9\x9e\x23\x70\xda\x82\xd4\x40\x4b\x8d\x58\x80\x95\x4e\x6f\xab\x99\x65\xa2\x1c\x81\x91\x07\xdb\x52\x8d\x64\x08\x05\x33\x56\xb3\x7d\x63\xdf\x98\xf5\xa2\x8e\x99\x37\x04\x29\x80\x0a\x18\x84\x19\xc4\xd9\x00\xfe\x0c\xb3\x38\x1b\x91\x21\x3c\xc6\x9b\x8f\xe9\xc3\x06\x1e\xc3\xf5\x3a\x4c\x36\x71\x94\x41\xba\x86\x65\x9a\xdc\xc4\x9b\x38\x4d\x32\x48\x6f\x21\x4c\xb6\xf0\x29\x4e\x6e\x46\x80\xcc\x56\xa8\x01\x9f\x95\x76\xfa\xa5\x06\xe6\x6c\xc4\xc2\x79\x96\x21\xbe\x11\x70\x90\x27\x41\x46\x61\xce\x0e\x2c\x07\x4e\x45\xd9\xd0\x12\xa1\x94\x4f\xa8\x05\x13\x25\x28\xd4\x35\x33\x6e\x99\x06\xa8\x28\xc8\x10\x38\xab\x99\xa5\xb6\x8b\xfc\x30\x94\x4f\x48\xb8\xbe\x73\xea\xa3\xf8\x73\x78\x17\x75\xaf\x75\x74\x17\x67\x9b\xf5\x96\xb8\x71\xf0\x57\x8d\xd0\x18\x57\x9b\xc2\x3d\x13\xcd\x33\xb0\xda\xf5\xb4\x12\x1a\xa1\x68\xfe\xad\xab\x47\x75\x5e\xb1\x27\x1c\xb9\x87\x80\xb6\xcb\x72\x2b\x76\x79\xcc\x82\xd3\xe7\x32\x1e\x99\x28\x64\x6b\x7c\x72\xbb\x4e\x3f\x83\xe7\x29\x4e\xed\x41\xea\xfa\x9a\xbb\xca\x01\xad\x8b\xcb\x19\x50\xae\x98\xc0\xc5\x85\x7f\x09\xd4\x80\xd2\xa8\x08\x09\x6f\x6e\xba\x9b\x30\x8b\x20\x90\x0a\x85\x46\x63\x8f\xdd\x4d\x14\xb2\x15\x5c\xd2\xe2\x35\xec\x4d\xfc\xc9\x85\x7f\xe9\x4f\xbd\x96\x89\xcb\x99\xff\x2f\x53\xd0\x43\xbf\x07\xc9\xfa\x21\x81\xfa\x5b\xc1\x74\x0f\x86\x0f\x1f\x76\xc4\x5d\x60\x23\xde\xcb\x03\xaf\xe8\xc5\xc9\x69\x96\x5f\x5e\x5c\x0b\xda\xd3\x8c\x5e\x67\x93\xb7\x6f\x18\x2f\x50\x7b\x15\x72\x85\x7a\x31\xf1\x27\xde\x0b\xa1\x9b\xd6\x9b\xcc\xc7\x7f\xb8\x39\x4f\x84\x73\xb1\xd7\x85\x90\x65\xba\xda\x82\xe7\x1d\xb4\xac\xaf\x9d\x17\xbd\xd6\xef\x8e\xdc\x97\xd7\xcf\x3f\xf5\x80\xe0\xbc\x86\x20\x3b\x1a\x8b\xf5\xc5\x34\x78\xca\x75\x23\x2c\xab\x71\x32\x1b\xfb\x05\xe7\x3f\xa1\xfc\xac\xd0\xdf\x83\x60\xa5\x65\xa9\x69\x0d\xb7\x8c\xa3\x09\x52\x85\x22\xcb\xee\x07\x23\x78\x0f\xf9\x4a\x48\x94\x7c\x81\x55\xb8\xf9\x78\x3d\x58\x2e\x76\xdf\x85\xee\xae\x96\x8b\xdd\x9e\x89\xee\x3f\x6f\x34\xef\x3e\xce\x32\x76\xe6\x2c\xa3\x17\x73\x9f\x6f\x7a\xec\x56\xb2\x45\x9d\x55\xc8\xf9\xd5\xe0\x74\x32\xba\x11\xbe\xa9\xfa\x96\x9d\x22\x1d\x28\x4a\x26\x9e\xfd\x5c\x8a\x43\x9f\xe0\xde\xc1\x2b\xd4\x31\x2d\xd6\xee\x52\xd1\xe7\x0d\xed\x73\x79\x43\x83\x3e\x46\x48\xf4\xd7\x2a\xcd\x22\x98\x8f\x61\x36\xbb\x80\xf9\x78\x3e\x86\xf9\x6c\x76\x41\xa2\x64\xb3\xde\xae\xd2\x38\xd9\x38\xd3\xf6\x4c\x04\xa6\xea\x5c\xfa\xbf\xb2\xc1\x57\xf2\x5f\x00\x00\x00\xff\xff\xfc\xe4\xaf\xc7\xde\x05\x00\x00") + +func testImagesEchoserverDockerfile_windowsBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverDockerfile_windows, + "test/images/echoserver/Dockerfile_windows", + ) +} + +func testImagesEchoserverDockerfile_windows() (*asset, error) { + bytes, err := testImagesEchoserverDockerfile_windowsBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/Dockerfile_windows", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xc9\xcc\x2d\xe6\x02\x04\x00\x00\xff\xff\xe2\x68\x65\xd7\x14\x00\x00\x00") + +func testImagesEchoserverOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverOwners, + "test/images/echoserver/OWNERS", + ) +} + +func testImagesEchoserverOwners() (*asset, error) { + bytes, err := testImagesEchoserverOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd2\x33\xe6\x02\x04\x00\x00\xff\xff\xf2\x08\x0b\x5d\x04\x00\x00\x00") + +func testImagesEchoserverVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverVersion, + "test/images/echoserver/VERSION", + ) +} + +func testImagesEchoserverVersion() (*asset, error) { + bytes, err := testImagesEchoserverVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverInstallDepsSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x92\x51\x6b\xdb\x4a\x10\x85\xdf\xf7\x57\x9c\x2b\xe5\x21\x01\x4b\x32\xce\xcb\xbd\x37\x24\xa0\x3a\x29\x11\x09\x36\x58\x4e\x43\x28\x7d\x58\x4b\x63\x69\xc8\x6a\x77\xbb\xbb\x8a\x6d\x4a\xff\x7b\x91\xe2\x40\x43\xdb\x97\xea\x4d\x33\x67\xce\x7c\x9a\xa3\xf8\x9f\x6c\xc3\x3a\xf3\xad\x10\x31\xe6\xc6\x1e\x1c\x37\x6d\xc0\x6c\x3a\x9b\x62\xdd\x12\xee\xfa\x0d\x39\x4d\x81\x3c\xf2\x3e\xb4\xc6\xf9\x54\xc4\x22\xc6\x3d\x57\xa4\x3d\xd5\xe8\x75\x4d\x0e\xa1\x25\xe4\x56\x56\x2d\xbd\x75\x26\xf8\x44\xce\xb3\xd1\x98\xa5\x53\x9c\x0e\x82\xe8\xd8\x8a\xce\x2e\x44\x8c\x83\xe9\xd1\xc9\x03\xb4\x09\xe8\x3d\x21\xb4\xec\xb1\x65\x45\xa0\x7d\x45\x36\x80\x35\x2a\xd3\x59\xc5\x52\x57\x84\x1d\x87\x76\x5c\x73\x34\x49\x45\x8c\xa7\xa3\x85\xd9\x04\xc9\x1a\x12\x95\xb1\x07\x98\xed\xcf\x3a\xc8\x30\x02\x0f\x4f\x1b\x82\xfd\x3f\xcb\x76\xbb\x5d\x2a\x47\xd8\xd4\xb8\x26\x53\xaf\x42\x9f\xdd\x17\xf3\x9b\x45\x79\x93\xcc\xd2\xe9\x38\xf2\xa0\x15\x79\x0f\x47\x5f\x7b\x76\x54\x63\x73\x80\xb4\x56\x71\x25\x37\x8a\xa0\xe4\x0e\xc6\x41\x36\x8e\xa8\x46\x30\x03\xef\xce\x71\x60\xdd\x4c\xe0\xcd\x36\xec\xa4\x23\x11\xa3\x66\x1f\x1c\x6f\xfa\xf0\xee\x58\x6f\x74\xec\xdf\x09\x8c\x86\xd4\x88\xf2\x12\x45\x19\xe1\x43\x5e\x16\xe5\x44\xc4\x78\x2c\xd6\xb7\xcb\x87\x35\x1e\xf3\xd5\x2a\x5f\xac\x8b\x9b\x12\xcb\x15\xe6\xcb\xc5\x75\xb1\x2e\x96\x8b\x12\xcb\x8f\xc8\x17\x4f\xb8\x2b\x16\xd7\x13\x10\x87\x96\x1c\x68\x6f\xdd\xc0\x6f\x1c\x78\x38\x23\xd5\xc3\xcd\x4a\xa2\x77\x00\x5b\xf3\x0a\xe4\x2d\x55\xbc\xe5\x0a\x4a\xea\xa6\x97\x0d\xa1\x31\x2f\xe4\x34\xeb\x06\x96\x5c\xc7\x7e\x08\xd3\x43\xea\x5a\xc4\x50\xdc\x71\x90\x61\xac\xfc\xf2\x51\xa9\x10\xf9\x6a\x7e\x7b\x79\x72\xda\x6b\xd9\x11\x92\xee\x4c\x08\xde\xe2\x33\xa2\x93\x6f\x43\xe7\x7b\x84\x4b\x44\xfe\xfc\xbf\xe9\x3e\xc2\x97\x8b\x61\x56\x8b\x21\x20\xaa\x5a\x83\xe8\x18\x53\xad\x92\xaa\xd6\xa9\x54\x96\x35\x29\xd6\xfd\x7e\x8c\xeb\xf5\x3d\x7b\x39\x4f\xff\xcd\x3a\xc9\x3a\xc2\x15\x32\x0a\x55\x26\xed\x73\xe6\xc8\x1a\xcf\xc1\x38\x26\xff\x57\x8e\x95\xe9\xba\x5e\x73\x38\x44\xb8\xfa\x93\xef\x96\x85\x90\xf6\x19\xb2\xae\x91\x24\xda\x24\xd5\xf8\xe3\x1b\x4b\xda\x7b\x05\xdd\xb0\xde\x27\x9d\xa9\x93\x61\x6d\xa2\x7a\xf9\x9b\x52\xd2\x5b\x1f\x1c\xc9\x4e\x08\xda\x73\xc0\x54\xfc\x08\x00\x00\xff\xff\x30\xd5\x64\x9a\x8a\x03\x00\x00") + +func testImagesEchoserverInstallDepsShBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverInstallDepsSh, + "test/images/echoserver/install-deps.sh", + ) +} + +func testImagesEchoserverInstallDepsSh() (*asset, error) { + bytes, err := testImagesEchoserverInstallDepsShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/install-deps.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverNginxConf = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x56\x41\x6f\xdb\x3a\x12\x3e\x8b\xbf\x62\xa0\x20\x88\x0d\xc4\x52\xd2\x06\x8b\xae\x03\x1f\xd2\x6d\x80\x06\x8b\x36\x41\xd2\x3d\x05\x81\x40\x53\x63\x8b\x30\x45\xaa\x24\x65\x5b\x6b\xf8\xbf\x3f\x0c\x25\xd9\x72\x93\x77\x78\x27\x81\xc3\x6f\x66\xc8\xe1\x37\xdf\x48\x19\x9e\x67\xa5\xc9\x6b\x85\xd0\x7e\x5c\xaa\xf3\x55\x56\x78\x5f\x75\xf6\xc4\x99\x5b\xf6\x21\x6e\xb9\x6d\x71\xaa\xe6\xff\x08\x5b\x57\xce\x5b\xe4\xe5\xd0\x89\xe1\x1a\xb5\x77\xb0\x63\xd1\xc6\xd8\x15\xda\x4c\x18\xad\x51\x78\x69\xb4\x83\xeb\xab\x4f\x37\xb7\x6c\xcf\x18\xea\x35\x7c\x7f\x7c\xf9\xf5\xf3\xee\xc7\xfd\x6d\x58\xfd\x7c\xfc\x76\x9f\x1d\x97\x4f\x8f\xdf\x3e\x58\xbd\x3c\xdd\xfd\x67\x60\x7a\x78\xba\x65\x8c\x8e\x43\xe9\x72\x5c\xf0\x5a\xf9\xcc\x37\x15\xc2\x85\xc7\xad\x4f\x2b\xc5\xa5\xbe\xb8\x65\xd1\x19\x94\x7c\x2b\xcb\xba\x04\xae\x94\xd9\x60\x0e\x4e\xfe\x1f\xc1\x2c\xc0\x17\x08\x42\x49\xd4\x1e\x2c\xfe\xae\xd1\x79\x98\x9b\xbc\x49\xe0\x6b\x03\x5d\x44\xf0\x85\x74\x20\x1d\x5c\x97\x09\x85\x7a\xee\x70\x1b\xe9\x0b\x98\xcb\xe5\x12\x2d\xf9\x48\x74\xa0\x97\x52\x6f\x61\x23\x95\x02\x8b\xbe\xb6\x1a\xd0\x5a\x63\x41\x98\x1c\xe1\xe6\xfa\x73\xf0\xa7\x03\x4f\xd3\x34\x60\x13\x63\x97\x29\xea\x34\x37\xc2\xa5\xb4\x71\xac\xb0\x30\x16\xfb\xca\x16\xbe\x54\x67\xed\x31\xb3\x92\x6f\x33\x3a\x62\x46\x57\x60\xd1\x47\x56\xb8\xbe\x2a\x6f\x19\x8b\xa4\x96\x3e\x9b\x37\xe1\xb1\xe6\xca\x88\x15\xd5\x29\x52\x46\x70\x05\x1e\xcb\x4a\x71\x8f\x30\x0b\x17\x97\x16\x47\x71\x6f\x8b\xc7\x2c\x8a\x26\x93\x23\xc6\x35\xda\xf3\x2d\xe4\x46\xd4\x25\x6a\x8f\x39\x14\x68\x71\xda\xa2\xe8\xb4\x6e\x9a\xa6\x4b\xe9\x8b\x7a\x9e\x08\x53\xa6\xf3\x5a\x2f\x15\xa6\xaa\xe6\x13\x8b\xce\x37\x93\x3e\x52\x3a\x57\x66\x9e\x96\xdc\x79\xb4\xe9\xf3\xfd\xdd\xb7\x1f\xf7\x49\x99\xb3\x28\xf2\x65\xa5\x60\x76\xc8\x48\x51\x2a\xa9\x70\xf4\xfa\xca\x18\xfb\x6e\x9c\xd7\xbc\xc4\x29\xec\x76\xc6\x25\x4b\xf4\xa8\xd7\xa3\xb8\x27\x50\x3c\x06\x63\x21\xfe\x99\xde\xc5\xfb\x3d\x63\x4f\x26\x87\x07\xbd\x30\xb6\xe4\xc4\xba\x29\xdb\x9d\x83\x5c\xc0\xc0\xb1\xa7\x53\x3c\xa6\xf7\xd7\x70\xbe\x67\x91\xa6\x27\x0a\x49\xa2\x93\x24\x07\x5e\x9e\x66\x89\x2a\x93\x7f\x04\x1f\x84\xfe\x08\xed\x2a\x2e\xfe\xce\x25\x90\xfb\x03\xbf\x87\xa7\x0f\x1c\x1e\x9e\x4e\x91\xbb\x73\x40\xe5\x30\x5c\x65\xa2\x0d\x90\xa3\x3c\x16\x01\xf8\x9a\x4b\xc5\xe7\x0a\x27\x01\xaa\x73\x42\xb2\x17\xb4\x6b\xb4\xb0\xe6\xaa\x46\x37\x65\x91\x0b\xeb\x6c\x8d\xd6\x49\xa3\x67\x81\xa2\x54\x74\xbd\xdc\x26\x6b\x6e\x93\x60\xe8\xb7\xf7\x7b\x98\x80\xaa\x79\x0f\x10\x46\x2f\xe4\x32\x21\x02\x13\xe1\x0e\x28\xc6\xfa\x8e\x39\x79\x95\x9e\xb9\x3c\xcf\x2d\x3a\x37\x3b\x66\xb1\x58\x1a\x8f\x61\x83\x6a\x50\xa2\x2f\x4c\xde\xed\x5b\xfc\x4d\x75\xc8\x5a\xe3\x68\x4c\x00\x8b\x5c\x41\xc5\x7d\x71\x12\x23\xa4\xcc\x6a\x2b\x09\xf2\xbb\x46\xdb\x0c\xb6\xc3\x3a\x73\xde\x4a\xbd\x0c\x65\x8c\xdb\x40\xad\x53\x7f\xff\x63\xca\xd0\x91\x9d\xb9\x4f\xda\x62\x9d\x28\xb0\xc4\x41\xe8\xd6\x30\x84\xd4\x56\xbe\xdb\x4f\x92\x78\x9a\xa6\x71\x92\xf4\xe6\xc2\x38\x4f\xc6\x81\xa9\x7b\x8d\xca\x58\x7f\x34\x9e\x5e\xec\x50\xda\xef\xc8\x73\xb4\x2e\x90\x7d\x61\x2c\xc8\x4b\x58\x61\x03\x52\x83\xac\xb8\xb4\x6e\xb4\xc2\xc6\x8d\x21\x37\x81\x21\xbb\x73\x68\x55\x60\xcd\xa9\xeb\x8a\xd6\xf9\x75\x85\xcd\x5b\xbf\x2f\x17\x40\x4a\x3a\x5a\x73\x35\x86\xd9\x0c\x62\x4f\xec\x89\x8f\x0d\x13\xf5\x99\x60\x06\xd7\x97\x67\x14\xa9\x8f\xbe\x5b\x61\xb3\xdf\xcf\x76\xbb\x35\x57\xaf\xf2\x6d\xdf\xa1\x3b\xd6\x45\x43\xae\x9e\x60\xf7\xdd\x66\x8b\x1b\xf0\xb4\xbf\xe5\x57\x93\x37\x53\xf6\xfe\x95\x49\xf9\xc2\x33\x06\xee\x87\x95\xd4\xbd\xa0\x4f\xe8\x6d\xdf\xde\xc6\x2c\xda\xb3\x9e\xe2\x41\x08\xcf\xa0\x52\xc8\x1d\x82\x28\x50\xac\xc2\x28\x98\xa3\xc6\x85\xf4\x8e\x46\x83\xc5\xda\x21\x15\xff\xa0\x70\x9b\xcd\xa6\x6d\x81\x56\xe4\x94\x59\xa6\xce\x88\x15\xfa\x89\x2b\xb8\xcd\xa5\x5e\x4e\xc2\xf6\xc4\x62\x08\x3c\xb9\x9e\xfc\x7b\x72\x1d\x32\xcd\xb9\x93\x82\x2b\x45\x07\x73\xde\xd6\xc2\x3b\xf0\x06\x84\x45\xd2\x57\xae\x41\xea\x5c\xae\x65\x5e\x73\x05\x4a\x3a\x8f\x9a\x98\xd9\x46\x0f\x65\x46\x2e\x0a\x68\x47\x2a\x54\xd6\x08\x74\x0e\x46\xb5\x23\x14\x1d\xfc\xe5\x31\x7b\xbe\xff\xdf\xcb\xfd\xd3\xe3\xf3\xaf\x90\xb0\x73\x35\x15\x75\xdb\xf8\xb2\x1d\x7c\x84\xe6\xb0\x42\xab\x51\x51\xfa\x5c\x52\x0b\xcc\x6b\x8f\x20\xb5\x30\x25\xed\x0f\xe7\xf5\x1c\xfd\x06\x51\xff\x91\x17\x5d\x42\x63\x24\x9c\x12\xbe\x5c\x7d\xb9\xea\x27\x65\xd6\x15\xf7\x50\xb9\xdb\x01\xee\xe6\xe6\xf3\x9f\x38\xe7\x54\xa8\xed\xa7\xa1\x07\x8b\x22\xe7\x54\x26\xd0\x7a\xb9\x90\x82\xca\x93\xd2\xc2\xa5\x03\x53\x22\xda\xe0\x7f\x20\x33\xe2\x7c\x87\xae\xac\x5c\x73\x8f\xff\xc5\x26\x59\x61\x13\xe2\xd2\xec\xae\x14\x17\x08\x17\xd9\x45\x3b\xbf\x1b\x53\x5b\x28\xba\xf9\x42\xd7\xea\x9a\x8e\x96\x90\x75\x5e\x0e\x3d\x28\xa3\x97\xb0\x42\xac\xb8\x92\x6b\xcc\xbc\x2c\xd1\xd4\x1e\xe6\x28\x78\xed\x10\x9c\x29\x11\xe8\x8f\x69\xce\x15\xd7\xa2\x2d\xd6\x96\xfe\x09\x70\x5b\xa1\xf0\xed\x8f\xc6\xa1\xb4\x21\xac\x37\x60\xb1\xe4\x52\x83\xa9\x50\x87\x57\xe6\x1e\x88\x39\x1e\xa8\x64\xa5\xd4\xb5\x6f\x8b\xfd\x3e\xf1\xbf\x3e\x5d\xb9\x70\x3c\x6a\xe4\x20\xf1\x69\x20\x75\x44\xda\xab\x11\xf3\xec\xb4\x39\x34\x95\x2b\x12\x46\x7b\x12\xdd\x77\x3f\x05\x51\x44\x3d\xd5\x0a\xc1\x6b\xdc\xce\x85\xf8\x0d\x66\x10\xa3\x28\x4c\x5b\x94\x98\x05\x60\xab\x1c\x9d\x66\xc0\x0c\x86\xb2\xdc\x59\x47\xe3\x01\x92\x94\x07\x66\xb0\xdb\x07\x1b\xdd\x72\x85\xcd\x65\x90\x1e\xa9\xa1\x55\xa7\xce\x8f\x04\x2a\xa0\xa2\xa0\x36\x89\xd4\x0e\xad\x0f\xda\x15\xf4\xac\x0d\x8b\x3a\x67\x47\x8c\x33\x1d\x62\xcc\x0e\xf7\x70\xbc\x19\xd1\x1f\xc5\x68\x67\xdc\xcc\xb8\x4b\x3a\xe3\x4c\x2f\xb7\x21\x88\x9b\xb5\xf1\xba\x9c\xb3\xee\xbb\x1f\x87\xe8\x74\xca\x3d\x49\xc5\x9e\xfd\x15\x00\x00\xff\xff\x6d\xfd\xc1\xd0\x55\x0b\x00\x00") + +func testImagesEchoserverNginxConfBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverNginxConf, + "test/images/echoserver/nginx.conf", + ) +} + +func testImagesEchoserverNginxConf() (*asset, error) { + bytes, err := testImagesEchoserverNginxConfBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/nginx.conf", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverRunSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\xd1\x6f\xab\x36\x14\xc6\xdf\xfd\x57\x7c\x83\x97\x4d\x0a\x90\x65\xeb\xd5\xdd\xbd\xca\x43\x96\x76\x1b\x4a\x04\x52\x49\x56\x55\xea\x8b\x03\x07\x38\x0b\xd8\x9e\x6d\x4a\xf8\xef\x27\xd2\x54\x6a\x35\x3f\xd8\xb2\xbf\xcf\xc7\xdf\xf9\x39\xfc\x21\x39\xb1\x4a\x5c\x2b\x44\x88\xad\x36\x93\xe5\xa6\xf5\x58\x2d\x7f\xfe\x8a\x43\x4b\xd8\x0d\x27\xb2\x8a\x3c\x39\x6c\x06\xdf\x6a\xeb\x62\x11\x8a\x10\x7b\x2e\x49\x39\xaa\x30\xa8\x8a\x2c\x7c\x4b\xd8\x18\x59\xb6\xf4\xae\x2c\xf0\x37\x59\xc7\x5a\x61\x15\x2f\xf1\xe3\x6c\x08\x6e\x52\xf0\xd3\x77\x11\x62\xd2\x03\x7a\x39\x41\x69\x8f\xc1\x11\x7c\xcb\x0e\x35\x77\x04\xba\x94\x64\x3c\x58\xa1\xd4\xbd\xe9\x58\xaa\x92\x30\xb2\x6f\xaf\xcf\xdc\x8a\xc4\x22\xc4\xf3\xad\x84\x3e\x79\xc9\x0a\x12\xa5\x36\x13\x74\xfd\xd1\x07\xe9\xaf\x81\xe7\xd1\x7a\x6f\xbe\x25\xc9\x38\x8e\xb1\xbc\x86\x8d\xb5\x6d\x92\xee\xcd\xe8\x92\x7d\xba\x7d\xc8\x8a\x87\x68\x15\x2f\xaf\x57\x8e\xaa\x23\xe7\x60\xe9\xdf\x81\x2d\x55\x38\x4d\x90\xc6\x74\x5c\xca\x53\x47\xe8\xe4\x08\x6d\x21\x1b\x4b\x54\xc1\xeb\x39\xef\x68\xd9\xb3\x6a\x16\x70\xba\xf6\xa3\xb4\x24\x42\x54\xec\xbc\xe5\xd3\xe0\x3f\xc1\x7a\x4f\xc7\xee\x93\x41\x2b\x48\x85\x60\x53\x20\x2d\x02\xfc\xbe\x29\xd2\x62\x21\x42\x3c\xa5\x87\xbf\xf2\xe3\x01\x4f\x9b\xc7\xc7\x4d\x76\x48\x1f\x0a\xe4\x8f\xd8\xe6\xd9\x7d\x7a\x48\xf3\xac\x40\xfe\x07\x36\xd9\x33\x76\x69\x76\xbf\x00\xb1\x6f\xc9\x82\x2e\xc6\xce\xf9\xb5\x05\xcf\x18\xa9\x9a\x99\x15\x44\x9f\x02\xd4\xfa\x2d\x90\x33\x54\x72\xcd\x25\x3a\xa9\x9a\x41\x36\x84\x46\xbf\x92\x55\xac\x1a\x18\xb2\x3d\xbb\xf9\x33\x1d\xa4\xaa\x44\x88\x8e\x7b\xf6\xd2\x5f\x4f\xfe\xd7\x54\x2c\x04\x95\xad\x46\xf0\x27\x29\xb2\x72\x26\x02\x47\x5d\x1d\x39\x6e\x14\x55\x28\xc9\xfa\x40\xf4\xe7\x8a\x2d\x22\x83\x64\xde\x3b\xa1\x0d\x29\xe7\xba\x19\x37\xa2\xcb\xdd\xf2\x37\x44\xae\x95\xab\xbb\x2f\x88\x94\xae\xc8\x21\xaa\xe4\xe4\xf0\xcb\x97\x3b\x44\x8a\xc6\x33\x4d\xb0\x4e\x7e\x5b\x2d\x7f\xfd\x8a\x17\x11\x9d\x69\xd2\x83\xbf\x15\x4b\x8c\xe5\x57\xe9\x69\x47\x53\x3c\x1b\x5f\x44\xf4\x41\x9c\xe7\xb9\x55\xe9\x29\x2e\xad\x9f\x55\x37\x9c\xfe\x41\x90\x6c\xd7\xc7\x5d\x52\x1c\xd6\x4f\xd2\x8e\x5c\x9e\x5d\xcb\x96\x92\xfd\x7a\x4f\xb2\x67\xd5\x78\xad\x92\x7c\x9d\xdb\x26\x93\x3d\x25\xf9\x71\x9d\x1e\x70\x4f\x46\x5a\xdf\x93\xf2\xc9\x36\x5b\xd3\x45\xf6\xa6\xa3\xb8\xd4\x7d\xf0\x0e\xa1\xf0\xd2\x5e\x11\xa8\x86\xd5\x25\x10\xd7\x05\x51\x83\xa0\x92\xd4\x6b\x05\x5d\xd7\xdf\x03\xf1\x5f\x00\x00\x00\xff\xff\x0b\x85\xf1\xac\x89\x03\x00\x00") + +func testImagesEchoserverRunShBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverRunSh, + "test/images/echoserver/run.sh", + ) +} + +func testImagesEchoserverRunSh() (*asset, error) { + bytes, err := testImagesEchoserverRunShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/run.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesEchoserverTemplateLua = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x5b\x7b\x73\xda\xc8\x96\xff\x9f\x4f\x71\x4a\xb3\x33\x16\x13\x19\x1b\x27\xd9\x4c\x32\xc3\x54\x61\x50\x6c\x55\x61\xf0\x4a\xb2\x73\x53\xc4\x4b\x09\xd1\x60\xc5\x42\xd2\xd5\xc3\x86\x71\x79\x3f\xfb\xd6\xe9\x87\xde\x60\xf0\x9d\x57\xa5\x46\x55\x09\x52\x77\x9f\x67\xff\xfa\xf4\x39\x2d\xf9\xf0\x10\xee\x89\x37\xf3\x43\x32\x83\x79\xe8\x2f\xe1\x36\x8e\x83\xe8\xc3\xd1\x51\x68\x3d\xb4\x16\x4e\x7c\x9b\x4c\x93\x88\x84\xb6\xef\xc5\xc4\x8b\x5b\xb6\xbf\x3c\x9a\x26\xde\xc2\x25\x47\x6e\x62\x1d\x86\x24\x8a\xd7\x87\x31\x59\x06\xae\x15\x93\xa3\xf6\xfc\xbd\xf5\xd6\x3e\x79\x33\xb7\xdf\xbd\x7d\x77\x32\x9b\xce\xdf\x4e\xc9\xf1\xf4\xfd\xfc\xa7\xf6\x7f\xff\x64\xdb\xaf\xdf\xff\xf4\x66\x7a\xfc\x7a\x76\xf2\xe6\xc8\x75\xa6\x47\x94\xf6\x48\xd0\xb6\xdc\xc4\x6a\x1c\x1e\x82\xef\xb9\x6b\x58\xfa\x33\x67\xee\xd8\x56\xec\xf8\xde\x07\x08\xc9\xd2\xbf\x27\x70\xc4\xf4\x3b\x37\x2f\x06\x13\x75\x68\x6a\xa6\xa6\x1a\x10\xfb\xe0\xf9\x31\x90\xc8\xb6\x02\x02\x4e\xac\x80\xe5\xcd\x60\xee\xac\x20\xbe\x25\x60\x05\x41\xe8\x07\xa1\x63\xc5\x04\x42\xb2\x20\xab\x56\xe3\xf0\x70\x3c\x6e\xf4\xfc\x60\x1d\x3a\x8b\xdb\x18\x64\xbb\x09\x27\xc7\xed\x37\x70\x88\x3f\xef\xa0\x6b\x05\x3e\x98\x96\x7b\x4f\xbc\xc8\xb2\x42\xa7\xd1\x75\x5d\xa0\x43\x23\x08\x49\x44\xc2\x7b\x32\x6b\x35\x1a\x3a\x99\x39\x51\x1c\x3a\xd3\x04\x55\xa4\x32\x93\x88\x80\xe3\x41\xe4\x27\xa1\x4d\x68\xcb\xd4\xf1\xac\x70\x0d\x73\x3f\x5c\x46\x0a\x3c\x38\xf1\x2d\xf8\x21\xfd\xf5\x93\xb8\x60\xa3\xd2\xb0\x42\x02\x01\x09\x97\x4e\x1c\x93\x19\x04\xa1\x7f\xef\xcc\xc8\x0c\xe2\x5b\x2b\xa6\x96\xcc\x7d\xd7\xf5\x1f\x1c\x6f\x01\xb6\xef\xcd\x1c\x24\x8a\x00\x89\x96\x24\xfe\xd0\x68\xfc\x08\x45\x8d\x22\xf0\xe7\x42\x15\xdb\x9f\x11\x58\x26\x51\x0c\x21\x89\x2d\xc7\x63\x9e\x99\xa2\x4b\xed\xd4\x0f\x9e\x1f\x3b\x36\x51\x20\xbe\x75\xa2\x06\x80\xeb\x44\x31\xb2\xc8\x0b\xf3\x66\x25\x4d\x66\x4e\x64\xbb\x96\xb3\x24\x61\xab\x4e\x03\xc7\xcb\x7b\x40\x68\x10\x84\xfe\x2c\xb1\xc9\x1f\xa0\x04\x70\xd3\x66\xbe\x9d\x2c\x89\x17\x5b\x62\x6a\x8e\xfc\xb0\x01\xe0\xc7\xb7\x24\x84\xa5\x15\x93\xd0\xb1\xdc\x28\xf3\x31\x9d\x18\x4a\x98\x53\x9f\x5a\x34\x24\x0e\x25\xc2\x4e\xcf\x5a\x12\x54\x06\xef\x1f\xfd\x70\x61\x79\xce\x6f\x54\xc2\x13\x78\x7e\x36\x84\x3a\xde\x89\x51\x7d\x5c\x32\x94\x9d\x1f\x46\xb0\xb4\xd6\x30\x25\x08\x92\x19\x62\x96\xae\xb8\x88\x20\x1e\x82\xd0\x5f\xfa\x31\x01\xe6\x98\x38\x82\x19\x09\x9d\x7b\xbe\x1a\x1b\x40\x9d\x01\x91\x3f\x8f\x1f\x70\xba\x05\x7a\xa2\x80\xd8\x08\x1f\x08\x42\x07\x41\x15\x22\x70\x3c\x06\xa1\x28\x62\x06\x98\xe7\x9a\x01\xc6\xe8\xa3\xf9\xa9\xab\xab\xa0\x19\x70\xa9\x8f\xae\xb5\xbe\xda\x87\xd3\xcf\x60\x9e\xab\xd0\x1b\x5d\x7e\xd6\xb5\xb3\x73\x13\xce\x47\x83\xbe\xaa\x1b\xd0\x1d\xf6\xa1\x37\x1a\x9a\xba\x76\x7a\x65\x8e\x74\x03\xa4\xae\x01\x9a\x21\x61\x47\xa3\x3b\xfc\x0c\xea\xbf\x2e\x75\xd5\x30\x60\xa4\x83\x76\x71\x39\xd0\xd4\x3e\x7c\xea\xea\x7a\x77\x88\xab\x51\x01\x6d\xd8\x1b\x5c\xf5\xb5\xe1\x99\x02\xa7\x57\x26\x0c\x47\x26\x0c\xb4\x0b\xcd\x54\xfb\x60\x8e\x14\x2a\x94\x93\x35\x32\x32\x18\x7d\x84\x0b\x55\xef\x9d\x77\x87\x66\xf7\x54\x1b\x68\xe6\x67\xaa\xc8\x47\xcd\x1c\xa2\xac\x8f\x23\x1d\xba\x70\xd9\xd5\x4d\xad\x77\x35\xe8\xea\x70\x79\xa5\x5f\x8e\x0c\x15\xba\xba\xda\xe8\x6b\x46\x6f\xd0\xd5\x2e\xd4\x7e\x0b\xb4\x21\x0c\x47\xa0\x5e\xab\x43\x13\x8c\xf3\xee\x60\x50\x6b\x25\xea\x5e\xb0\xf1\x54\x85\x81\xd6\x3d\x1d\xa8\x28\x89\x5a\xd9\xd7\x74\xb5\x67\xa2\x39\xd9\x5d\x4f\xeb\xab\x43\xb3\x3b\x50\xc0\xb8\x54\x7b\x1a\xde\xa8\xff\x52\x2f\x2e\x07\x5d\xfd\xb3\xc2\x79\x1a\xea\xff\x5c\x61\x68\xea\x0e\xa0\xdf\xbd\xe8\x9e\xa9\x46\x43\x7e\xc6\x25\x97\xfa\xa8\x77\xa5\xab\x17\xa8\xf3\xe8\x23\x18\x57\xa7\x86\xa9\x99\x57\xa6\x0a\x67\xa3\x51\x9f\x3a\xda\x50\xf5\x6b\xad\xa7\x1a\x3f\x37\x06\x23\x83\x7a\xeb\xca\x50\x15\xe8\x77\xcd\x2e\x15\x7c\xa9\x8f\x3e\x6a\xa6\xf1\x33\xde\x9f\x5e\x19\x1a\x75\x9a\x36\x34\x55\x5d\xbf\xba\x34\xb5\xd1\xb0\x09\xe7\xa3\x4f\xea\xb5\xaa\x43\xaf\x7b\x65\xa8\x7d\xea\xdd\xd1\x90\x9a\x6a\x9e\xab\x23\xfd\x33\x32\x45\x1f\x50\xe7\x2b\xf0\xe9\x5c\x35\xcf\x55\x1d\x1d\x4a\x3d\xd5\x45\x17\x18\xa6\xae\xf5\xcc\xfc\xb0\x91\x0e\xe6\x48\x37\x73\x36\xc2\x50\x3d\x1b\x68\x67\xea\xb0\xa7\x62\xef\x08\xb9\x7c\xd2\x0c\xb5\x09\x5d\x5d\x33\x70\x80\x36\x04\x14\xfb\xa9\xfb\x19\x46\x57\xd4\x64\x9c\xa3\x2b\x43\x65\xb7\x9a\xd1\x10\x88\x55\xe8\x4c\x82\xf6\x11\xba\xfd\x6b\x0d\xd5\xe6\x83\x2f\x47\x86\xa1\x71\x9c\x50\x97\xf5\xce\xb9\xbb\x31\xbc\xdf\xdc\x34\x1a\xae\x6f\x5b\x2e\x44\x24\x5e\x92\xd8\x8a\xad\xa9\x4b\xa0\x53\x78\xe4\x23\x5c\xdf\x9a\xe1\x9a\xf7\x16\xd0\xc9\x3d\xe4\x7a\xed\xdb\xc4\xbb\xe3\xcf\xb1\x9f\x8e\x15\xb7\x99\xa4\x39\xf1\xee\x99\x10\xbc\xe3\xed\x21\xf9\x77\xe2\x84\x28\x9c\xdf\xf1\x76\xdb\x0a\xe2\x24\x7b\xf2\x3d\xdb\x8a\x91\x2b\xaa\xd6\x62\x8f\xbc\xcf\x8a\x22\x12\x62\x1f\xbb\xe1\xad\x41\x48\xe6\xce\x8a\x3f\xe0\xda\x47\x11\x8e\xdf\xa2\xb7\x62\x8c\x6d\xb9\x2e\x74\xd8\xaf\x68\xbb\xb5\x22\xd1\xef\x07\xc4\x63\x54\x78\x97\x33\x99\xbb\x42\x18\xbd\x0e\x90\x39\xfe\xf0\x96\x59\xb2\x0c\xd0\x52\xea\x80\x16\x3e\xf1\x8e\xb9\xe3\xcd\xb2\x0e\x7c\xe2\x1d\x8b\x28\x99\x66\x1d\xf8\xc4\x3b\xa6\x6b\xaa\x39\xef\xc0\x27\xde\xe1\x25\xa9\xce\x05\xda\x8c\xd4\x5b\xac\xa0\x83\xff\xf3\xe7\xaf\x0e\x7a\xe9\xab\x23\x5c\x74\x6f\x85\x02\x07\x93\x6b\x55\x37\xb4\xd1\x10\x3a\xe9\xad\xe8\x51\x87\xd7\xd8\xaa\x0e\xaf\x45\xcb\x19\x3e\x9f\x09\xd2\x62\xb2\xd1\x81\xc7\x06\x00\xc0\x58\xfa\x41\xba\x81\x0e\x48\x3f\x58\xcb\xe0\x67\x49\xe1\x8d\xbf\xf0\x46\x37\xce\xda\x7e\xe5\x6d\x8b\xac\xed\x40\x3a\x60\x6d\xff\x4e\xfc\xdc\xc8\x03\x3e\xf2\xbb\xd7\xef\xb1\xf1\x49\xa8\xd0\x1b\xf5\xd5\x3a\x15\x1e\xc5\xf8\xf6\xc9\xeb\x8c\xcb\x53\xd6\xfa\x36\x6b\xfd\xe3\xd5\x65\x8d\x47\xa2\xf1\xcd\xbb\x9f\xa5\xcc\x84\xeb\xae\x3e\xb9\x3c\xef\x1a\xaa\x21\x5a\xfc\x3b\x05\x3c\xf2\x10\x5b\x53\x81\x50\x99\xaf\x10\x05\x24\xb6\x0c\x3c\xf2\x20\x35\x1b\xce\x9c\xe6\x77\xfe\x1d\xee\xb0\x5e\x46\x33\x4f\x3c\x1b\x77\x5f\xb9\x89\x59\x4d\x12\x7a\xf0\xf8\x84\xbb\x2a\xfe\x6b\xa4\xab\xcc\xbe\xe5\xcb\x35\x4c\x04\xb2\x44\xbe\x89\xe0\xa1\xcc\xe4\x63\x05\xda\x27\xcd\x46\x23\xcd\x44\x73\x78\x91\xda\xad\xf7\x52\xd6\x83\x1c\x09\x9a\xda\x81\xc7\xd4\x3a\xa1\x0a\x10\x0f\x15\x9f\xc9\xf7\x96\xdb\xa4\x0e\x71\xe6\x70\x6f\xb9\xd0\xe9\x80\xe7\xb8\xcc\x00\xae\x2c\x2a\x44\x55\xc5\x61\xbc\x8d\x0f\xa5\x5d\x7e\x08\x32\x7f\x96\xda\x12\x3e\x8a\x27\xec\x2e\x34\xf8\x9e\xd4\x6c\xe4\xac\x4e\xd5\x89\x43\x67\x29\x47\xcd\xbc\x08\x5c\x7a\x32\xfd\x2f\x52\x40\xfa\xdf\xef\xa3\x57\x92\x02\x92\xd4\x54\x40\xfa\x3e\x7a\xf5\x5f\xec\xa1\x96\x59\x18\xf8\x91\x7c\xef\x90\x07\x05\x38\xcb\x87\x5b\xc7\x25\x10\xc1\xaf\x70\x0c\x33\x9f\x36\xe1\xc5\x5d\x8f\x4b\x36\x99\x0a\x8a\x94\x88\x7b\xc5\xa6\x9a\x03\xb5\x83\xdd\x7f\x89\xf3\x0f\xc7\xf9\x87\xd5\xf1\xa9\x44\x9d\x97\x72\xc0\x2b\x42\x09\x70\x08\xed\xb4\x95\xb8\x11\x29\x0c\x99\x86\xc4\xba\xcb\xba\xb9\xb7\x4b\x5e\x8f\x6a\xcd\x65\xf5\xc4\xac\x68\xb1\x33\xa7\xe6\xb6\x69\x16\x9a\xb3\x0e\xb5\xe0\x3f\x4d\xa6\xf2\x97\x92\xc2\x9c\xf2\xa4\x86\xf2\x84\xff\x6c\xa0\xcc\x69\x3a\xb7\xdc\x88\x28\xdb\x0c\xce\x81\xab\x30\xae\xde\x72\xce\xef\xb8\x7e\xbe\x89\x35\x9b\x3b\x2e\x91\x03\x2b\xbe\x65\xe6\x8b\x20\x4f\x37\x53\xdc\x33\x68\x9f\x02\x52\x38\x95\x52\x07\xe1\x62\xa5\x43\xf2\x68\x47\xf4\x0b\xe1\xe9\x96\x87\xe5\x24\x2e\x64\xc7\x25\x1f\x50\x1a\x48\x3f\x5a\x12\x1d\x42\x9b\x6c\xd7\x8f\x88\x5c\x40\x2f\x27\xaa\xd5\x17\x77\x2c\x37\xb1\x72\xea\x72\xa2\xa2\x21\x34\xe1\xb6\xe2\xdb\x8d\x3c\xbc\xc5\xaa\x62\xf2\xbd\x15\x22\xda\xb2\x28\x36\xa6\xfb\xa8\xdc\xbc\x29\xf9\x45\xa1\xf7\x94\x57\x07\x98\x73\x28\x2d\xce\xfa\xbd\x15\xb6\x44\x1c\x99\x88\x61\x29\xac\x92\xa9\xcc\x18\xb4\x9b\x40\x81\x70\xc4\x70\x20\xdc\x9d\x0d\x38\x69\xa6\xae\x74\xe6\x99\x3c\x14\x91\x3e\xfc\x5f\x07\xa4\x1a\x04\x26\x53\x59\x0c\x51\xe0\x90\x63\x55\x08\xca\x69\x5e\x1c\xd8\x56\xe0\x30\x27\x34\xb3\x38\x24\xe8\x15\x9e\xca\xc8\x2c\x6b\x79\x84\x8c\xf0\xe0\xe8\x40\xa1\xfa\x3f\x15\xd6\x7e\x48\xa2\x56\x14\x5b\x71\x12\xa1\xfc\x93\xe3\xe3\x02\x54\xb0\x77\xea\xcf\xd6\x15\xd0\x72\x99\xbe\x8f\xa0\x49\xbd\x2a\x17\xdc\x4a\x7b\x69\x68\x0c\x5b\xa2\x0a\xa4\x8d\x6c\xde\x59\xd2\x94\xf3\x06\x76\x55\x3d\xc1\x65\x64\x03\x4a\x1e\x28\x03\x4b\x58\xce\x06\x4b\x47\x12\xb3\x1a\x9e\x4a\x68\xe3\x41\x12\x17\xc9\x62\x55\x9c\x9d\x0c\x5a\xe9\x06\x9f\xc6\x39\x12\xe7\x9e\xd8\xf6\xa0\x94\x56\x3d\xcb\x00\x37\x8f\xb0\x6c\x9b\x44\xd1\x36\x1e\x62\x3d\x6e\x1e\x71\x4b\xac\x19\x09\x27\x73\xc7\x8d\x49\x58\x3b\x02\xa7\x4d\xf4\xd7\xf3\x70\xfd\x45\xc5\x96\x74\xc0\x53\x7a\x97\x6e\xb7\x41\xe8\xd0\x18\xe1\x2d\x56\xfc\x9e\x97\xba\xa4\x3a\x96\x66\xae\x3c\x75\xc5\xac\x50\x0c\x60\xb3\x4e\x17\xa2\x22\xc0\xaa\xd0\xfc\x52\x61\xe9\x30\xe7\x6f\xfb\xde\xdc\x59\xb4\xd8\x70\xb9\xa9\xd0\x46\x4a\x84\x37\x02\xd5\xad\x8c\xc3\x62\xd5\x62\x5c\xf0\x6e\x41\xe2\x09\x4b\xae\x73\x48\xaf\x09\x18\xd5\xe0\x9e\x25\x29\x59\xfa\x90\x83\x34\xcd\x38\x9a\xd5\x50\x9e\x0f\xfd\x15\x7f\xed\xe0\x22\x37\xb1\x0a\xcb\xcb\x99\xe7\xd2\xe4\x0e\x48\x83\xc4\x82\xb7\xad\x76\x29\x8a\xe4\x82\xf7\x0a\x05\x3d\xc2\x64\xe2\x78\x33\xb2\xca\x67\x64\xb1\x02\x77\xcd\xda\x7d\xa9\xc5\x29\xc7\x77\x37\x38\x93\x71\x6a\x26\x6f\x98\x9c\x8d\xef\x6e\xf2\xb6\xe6\x40\xe1\xcc\x69\x8a\x5f\xf1\x5f\x5a\xa4\xe5\x55\xc0\xed\xb5\xa8\x42\x4e\x0d\x56\x49\xc9\x48\xc8\xf7\x61\xcf\x71\xf9\x7f\xf9\x1a\x51\x7e\xcc\x27\x8b\xe9\xed\x93\x22\x1c\xd0\x6c\x16\x65\xe4\x43\x64\x65\x6f\xde\x43\xcf\x6c\x5b\x4a\xeb\x3e\x39\x2b\x4e\x19\x51\x95\x8a\x57\x9e\x32\xd2\xed\x6d\xc8\x26\x5f\x21\xb3\xcd\x36\xd6\x81\xf1\x8f\x86\x88\x3a\xbc\xde\x0c\x92\x1d\x9d\xfc\x47\x02\x21\xbf\x6f\xd1\xb0\x9f\xe5\xe3\xf9\x2a\x02\x27\x92\x2d\xf8\x34\x75\x62\x8f\xb8\x79\xa7\xd5\x42\x39\x38\xa4\xf5\x41\x69\x2f\xe2\xe3\x36\x09\xf4\x93\x38\x48\x62\x39\x9f\xc6\xf2\x9a\xc4\x0f\xf9\x7d\xe2\x16\x0b\x14\x49\xca\x87\x06\xac\xfe\xe5\x88\x6d\x93\x82\xbd\x54\x2c\x68\xca\xb2\xe4\x66\x65\xc7\x14\x87\x26\xa8\xc8\x06\x4d\x59\xde\x8d\xd5\x89\xdd\xac\x13\xce\x18\x54\x73\x1b\xbb\xa0\x4c\x5a\xe1\x8c\x9f\x1e\xbf\x48\xbf\x1e\xfd\x72\xf0\xc3\x8d\xa4\x14\x2b\xe9\x62\x46\x53\x21\xfc\x22\xfd\xca\xa9\x0a\x47\x00\xcd\xba\x44\xba\xc6\xcf\x1b\xcc\xf3\xc8\x03\x47\x9a\x6b\xad\xfd\x24\x66\xec\x38\x0e\x59\x87\x84\x3f\xf0\x60\x45\x34\x95\x4e\x0f\xa9\xe7\xb8\x18\x36\xb2\x69\x49\xf9\x7c\x35\x24\xde\x8c\xe0\x6e\xe7\x2f\x03\x96\x3e\xa6\x94\xa2\x2b\xc3\x22\x1b\x93\xe6\x93\x94\x5f\xc5\xbd\x74\x0a\xb8\x2c\x56\x85\x22\x1a\x37\x97\x2a\xa5\xd5\xc3\xa4\xe6\xd7\x64\x44\xdc\x79\xb6\x7c\x36\x44\xc0\x2c\x88\x88\x3b\x84\x2b\x71\xe7\x95\xf1\xbc\xbf\x35\x75\x7d\xfb\x2e\xca\x08\x44\x83\x1f\x62\xbd\xbe\x89\x8a\x7a\xbc\x23\xdc\xc5\xe2\x85\xbc\x59\x37\xea\x86\x3d\x45\x71\xa2\x54\x52\x4e\xb0\x1f\x82\x24\x6d\x8a\xbf\x8c\xee\x03\x73\xa0\x5c\xd9\x6e\x30\x06\x61\x80\xcd\x9d\x4c\x16\x5c\xfc\xbc\x67\xbf\x35\x77\x6e\x72\x64\x1a\x7b\xf2\x0b\xaf\xe0\xc9\xe6\xb3\x75\xf5\xb7\x8c\xea\xb4\xa8\xa1\x40\x63\x4e\xda\x60\xca\xb7\x81\xbb\xf4\x4c\x81\x8d\xe6\xb0\xa8\x1f\x5f\xc6\xc7\x86\x93\xa4\x17\xc2\xa3\xe8\x7a\x16\xd7\x4b\xd0\x48\xb7\x9d\xdd\x1d\x5f\xb2\x8f\x79\xa3\xc4\x6b\xe3\x3e\x15\x84\x24\x4f\xa8\xf0\xc3\x0c\x94\x19\xe4\x77\x1a\x91\x6b\xcd\x92\x65\x20\x97\xf7\x14\x26\x93\x53\x61\x5a\x43\x0f\x9c\xd2\x6d\x1d\x59\xd6\x55\x17\x35\x07\x4c\x0f\xe2\x80\x09\xc4\xe9\x10\xad\x70\x64\x2a\xbe\xd4\x93\x3f\x37\x2a\x67\x49\xf4\x5d\xce\xa6\xa4\xac\x60\xef\x1d\x59\x2b\x10\xb8\x96\xe3\xbd\x70\x8b\xde\xc8\xae\x95\x9d\x95\xdd\x91\x35\xdd\x4c\x3d\xff\x90\x96\x79\xa5\xfd\x54\x6c\x01\x22\xa7\xcd\x1c\x1c\x58\x61\x94\xce\x0c\xe5\xda\x54\x98\x77\x0b\x66\x53\xfe\xf4\x7f\x3f\x84\x34\x38\x66\x67\xe3\x85\xcc\x80\x36\x08\xcd\xe8\xc3\xf8\x8e\xac\x6f\x0a\x79\x55\xd6\xac\x14\xd3\xd0\x42\xc5\xb2\x9b\xc2\x79\x51\x08\xe4\x34\xdf\xe5\x72\x19\xb0\x2b\x67\x96\xb4\xb8\x61\xa6\x6e\xc2\x6e\x45\xd6\xcb\x66\xb0\xca\xa7\x55\x3c\xe6\xa4\x8d\xc5\x29\xe3\x21\xa8\x50\x71\x97\xea\x0f\x67\x4e\xdf\x7a\x71\xc6\x6d\x85\x9f\x19\x9f\xbc\x2b\x78\x9a\x32\xaa\x3f\x02\xfb\x0a\x1d\x38\xc9\xcf\x24\x16\x59\xe3\x71\x83\x87\x8c\x4e\xab\xd5\xe2\x81\xb2\x74\xbc\xe9\x78\xb6\x9b\xcc\x88\x7c\x8f\xc9\x75\x25\x77\x4d\x01\xdb\x94\x6d\x7a\xf8\xce\xc3\x14\x95\xce\xdf\x8d\x4d\x26\x0a\x8b\xc4\x0a\x0b\x97\x9d\xc7\x27\xa5\x10\x9a\x6f\x6e\x78\x31\xc6\x08\x1c\x85\x1e\xd3\xb7\x15\xfa\x6a\x50\xf8\xfe\x51\xa2\x76\x23\x80\x8a\x6f\x12\x2a\x6f\x11\x62\x05\x82\xe2\x8b\x04\x78\xc5\x8e\xda\x5f\x41\xbb\xc9\x7e\x4f\x0a\x79\x2a\x5d\x4f\x8f\x35\x89\x29\x63\x48\xe8\x81\x73\xa6\xca\xd3\x93\xa4\x40\x90\xd7\x25\xc7\x8c\x54\xb9\x64\x9c\x7e\x53\x00\x67\xba\xf6\x3d\x41\x89\x8f\x03\xbf\xd0\x23\xfe\x87\x7a\x7e\x78\xd9\xe3\xaf\xf4\xc5\xd9\x64\x32\x19\x7f\x37\x99\x4c\x5e\xb5\x6f\x3a\xe3\xce\xf8\x8b\x57\x4d\x0c\xf9\xf0\x57\xed\x9b\x82\x67\x1c\xfe\x02\x02\xe5\x54\xb5\x10\x44\x27\x54\xca\x4d\xe7\x66\x13\xe7\xaf\x9d\xaf\xaf\x5e\x57\x7a\xf2\x95\x52\xce\xb0\xdf\x36\x1b\xe4\xa0\x72\x55\x3e\xe5\xc4\x6a\x9b\xfd\xe5\x9a\xf0\x19\x57\xb0\xb7\x5d\xa9\x3f\x02\x05\x08\x7d\x21\xf3\x9c\x33\x9a\xfb\xb9\x02\xaf\x48\xa1\xf6\x11\x06\x46\x52\x00\x61\x6a\x6a\xc9\x65\xe5\xb3\xa1\x14\xac\x3f\xee\x0c\xd6\x1f\xff\x01\x6b\xf1\xfa\x3b\x82\x95\x1f\x01\x7c\xa3\x60\xfd\x7e\x67\xb0\x7e\xff\x67\x80\x75\xdb\x9c\xee\x04\x65\xd8\x1f\xce\xf0\x52\x48\xc3\xae\xb0\x86\xad\xf3\x59\x07\x6f\xd8\x1f\xc4\xfc\x23\x1a\x8e\x8c\x2a\x24\x20\x7b\x4b\xc6\x8f\x46\x15\xf0\xf8\x3b\x6a\xaf\x06\x05\xf9\x0b\xb9\x7a\x88\xb7\xbd\x0c\xe0\x67\x57\xd0\x29\x7c\x6b\x40\x97\xc5\x96\x19\xee\x40\xf8\x27\x4d\x6f\xf8\x97\x4c\x2b\x57\x7f\xff\x80\x41\x0d\x90\xb6\xc5\x8b\xfa\x49\xe7\xf1\xc2\x63\x1f\x35\x54\xfd\xba\x73\xac\x90\x77\x8e\x15\xcd\x7f\x36\xb6\xe2\xf5\x17\x6d\x6c\xbc\x5e\x28\x58\x94\x22\x6d\x0b\xc5\x4a\xcc\xe7\x5c\x01\x49\x91\x14\x38\xa9\x9b\xcb\x9c\xca\xab\xfd\x97\xac\x28\x5e\xc6\x9d\xf1\x0e\x0b\x37\x5d\x2e\x73\x5a\x6a\xac\xb6\xac\x15\x28\x4f\x8a\xb2\x9d\xff\xeb\x32\xff\x15\x2d\x46\xb6\x33\x7f\xb3\x7d\xf7\x06\x3e\xe7\x6f\xeb\x43\xc3\xa6\xf9\x82\xdf\xcf\x57\x35\x27\x76\xf9\x81\xa9\x73\x9e\x35\x61\xbf\xe8\xf6\xbb\x26\x27\xe3\x9d\x03\xce\xcd\x3f\x01\xa7\x78\xfd\x8d\x32\x69\x01\xde\x6f\x34\x83\x3e\xdc\x19\xa4\x87\x2f\x06\xe9\x4a\x81\x75\x91\x59\xe1\x53\x4c\xc2\x4f\x4f\xa8\x25\x9b\x22\xf5\xf6\x28\xbd\xdf\x62\x80\x67\x71\x03\x7b\x65\xec\xf0\xb2\xb4\x0e\xfe\x93\xcc\x1d\xf6\x49\xf3\x60\x2b\x9e\x60\x4b\x40\x84\x8d\x8b\x08\x9e\xdb\x09\x70\xca\xd7\x1b\xb3\x6e\xbc\x70\x9f\x5e\x15\x3e\x99\xad\x88\xce\x67\xfc\x6b\x05\xd6\x3b\x66\xfc\xbb\xc9\xdf\x66\x34\xff\x7b\x80\xbd\x57\x36\xd7\x7a\x4a\xf5\xbc\x27\xe1\xd4\x8a\x9d\x25\xfd\x7a\x98\x35\x85\xd6\xc3\x0e\xba\xef\x87\x3d\x78\x39\xfe\xe0\x3f\xc5\x20\xec\x8b\x43\x78\x16\x8b\xf0\xcc\xd4\xc0\x66\x73\xf7\x5e\x6c\x3c\xe6\xac\xfe\xbc\x85\xb6\x6d\xc9\x40\x19\xf2\x2b\x54\x6d\x77\xc8\xc3\x4e\x8b\x0a\x76\xf0\xef\xbe\xc5\x6f\x4e\xfb\x5d\x8a\x60\x71\xfd\xee\xa8\xdd\x52\x14\xe7\x09\xff\x1a\xb4\x1e\xb0\x77\x13\x63\xe9\x60\x37\x98\x4e\x77\x03\xe5\x81\x94\x66\x29\xe3\xce\xf8\x79\xde\xaf\x5f\xba\x04\xde\xec\xb3\x04\xea\x6b\x07\x78\xc6\x5b\x3c\xb7\x59\xb3\x6a\x7f\xbd\x73\xf2\xbe\x73\xbe\xf3\xdd\xce\xf9\xce\x77\xff\x24\xe5\xc5\xeb\x2f\x4a\xca\xc9\xee\x67\x82\x44\x01\xb2\x63\xb8\x14\x5c\xf7\x3b\x13\x4c\x53\x6f\x0a\xcf\xaa\xbe\x5b\x61\x98\xbb\x8f\x4a\x58\x7b\x94\xd2\x77\x89\x19\xdc\x04\x41\x54\x9c\xcc\xdc\x47\x93\xf4\xaf\x77\xea\xfe\xba\x62\x07\xcc\x64\x38\x29\x34\xd5\xa2\x20\x9b\x79\xa1\x93\x10\x50\xf8\x2c\x8c\xea\x23\xea\x25\xfe\xc9\x4e\xf1\x23\x14\x34\xa1\x93\xff\xab\x52\x79\x32\x99\x34\xf9\x3b\xdb\x0e\xfb\x79\x52\x1e\xf9\x17\xba\x1d\xfe\xce\xf7\xa9\x49\xff\x72\xa1\x42\xc7\x14\xcc\xfe\x18\x07\xdb\xed\x8d\xdf\x90\xd4\x7d\xcf\xf2\x3b\x7c\x58\xf1\x2c\x5b\xf1\x96\xbe\xfc\x82\x9b\x7e\x1c\x5f\xff\x91\x4a\x81\x5e\xce\x3e\x8a\xa6\x96\x95\xf8\xfc\x7f\x00\x00\x00\xff\xff\x47\xf1\xfa\x92\x30\x43\x00\x00") + +func testImagesEchoserverTemplateLuaBytes() ([]byte, error) { + return bindataRead( + _testImagesEchoserverTemplateLua, + "test/images/echoserver/template.lua", + ) +} + +func testImagesEchoserverTemplateLua() (*asset, error) { + bytes, err := testImagesEchoserverTemplateLuaBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/echoserver/template.lua", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesImageUtilSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xdc\x5a\x5f\x77\xdb\xb6\x92\x7f\xe7\xa7\x98\xc2\xda\xca\xce\x9a\xa4\x9d\xf4\x36\x89\x52\x9d\x53\xc5\x56\x13\x6f\x1c\xab\x57\x72\x9a\xf4\xc6\x59\x1d\x88\x84\x24\x5c\x93\x00\x0b\x80\x96\x7d\x6d\xe5\xb3\xef\x19\x00\xa4\x48\xd9\x4e\xee\xc3\x9e\x7d\xd8\x9e\x9e\x58\x04\x81\xc1\x60\xfe\xfe\x66\xc0\x9d\x1f\xe2\x52\xab\x78\xc6\x45\xcc\xc4\x15\xcc\xa8\x5e\x06\xc1\x0e\x1c\xc9\xe2\x46\xf1\xc5\xd2\xc0\xd3\x83\xc3\xe7\x70\xbe\x64\xf0\xae\x9c\x31\x25\x98\x61\x1a\x06\xa5\x59\x4a\xa5\xa3\x60\x27\xd8\x81\x53\x9e\x30\xa1\x59\x0a\xa5\x48\x99\x02\xb3\x64\x30\x28\x68\xb2\x64\xd5\x9b\x7d\xf8\x83\x29\xcd\xa5\x80\xa7\xd1\x01\xec\xe2\x04\xe2\x5f\x91\xbd\x57\xc1\x0e\xdc\xc8\x12\x72\x7a\x03\x42\x1a\x28\x35\x03\xb3\xe4\x1a\xe6\x3c\x63\xc0\xae\x13\x56\x18\xe0\x02\x12\x99\x17\x19\xa7\x22\x61\xb0\xe2\x66\x69\xb7\xf1\x44\xa2\x60\x07\xfe\xf4\x24\xe4\xcc\x50\x2e\x80\x42\x22\x8b\x1b\x90\xf3\xe6\x3c\xa0\xc6\x32\x8c\xff\x2d\x8d\x29\x7a\x71\xbc\x5a\xad\x22\x6a\x99\x8d\xa4\x5a\xc4\x99\x9b\xa8\xe3\xd3\x93\xa3\xe1\xd9\x64\x18\x3e\x8d\x0e\xec\x92\x0f\x22\x63\x5a\x83\x62\x7f\x95\x5c\xb1\x14\x66\x37\x40\x8b\x22\xe3\x09\x9d\x65\x0c\x32\xba\x02\xa9\x80\x2e\x14\x63\x29\x18\x89\xfc\xae\x14\x37\x5c\x2c\xf6\x41\xcb\xb9\x59\x51\xc5\x82\x1d\x48\xb9\x36\x8a\xcf\x4a\xd3\x12\x56\xc5\x1d\xd7\xad\x09\x52\x00\x15\x40\x06\x13\x38\x99\x10\x78\x3d\x98\x9c\x4c\xf6\x83\x1d\xf8\x78\x72\xfe\x76\xf4\xe1\x1c\x3e\x0e\xc6\xe3\xc1\xd9\xf9\xc9\x70\x02\xa3\x31\x1c\x8d\xce\x8e\x4f\xce\x4f\x46\x67\x13\x18\xfd\x06\x83\xb3\x3f\xe1\xdd\xc9\xd9\xf1\x3e\x30\x6e\x96\x4c\x01\xbb\x2e\x14\xf2\x2f\x15\x70\x14\x23\x4b\x51\x66\x13\xc6\x5a\x0c\xcc\xa5\x63\x48\x17\x2c\xe1\x73\x9e\x40\x46\xc5\xa2\xa4\x0b\x06\x0b\x79\xc5\x94\xe0\x62\x01\x05\x53\x39\xd7\xa8\x4c\x0d\x54\xa4\xc1\x0e\x64\x3c\xe7\x86\x1a\x3b\x72\xef\x50\x51\x10\x68\x66\x20\x94\xc0\x94\x62\xd7\xdc\x54\x8f\x42\x96\x42\xb3\xfa\xb1\xe0\x05\x9b\x53\x9e\x05\xc1\xf9\x60\xf2\xae\xdf\x39\x0c\x3e\xbe\x1d\x9c\xf7\x3b\x4f\x9d\x2d\x0a\xc1\x12\x94\x26\xca\x96\xc2\x98\xe5\xd2\x30\x38\x96\xc9\x25\x53\x95\x4e\x34\x24\x4c\x19\x64\x9b\xa2\x85\xe2\x59\x68\x69\x96\x4c\x18\x1c\xe1\x52\xec\xc3\x6a\xc9\x93\x25\x24\x54\xc0\x0c\x0f\x5b\x5a\xf6\xa9\x71\xe6\x56\x50\xb3\x8c\xe0\xf5\x0d\xa4\x6c\x4e\xcb\xcc\xec\xe3\x31\x6e\x5a\xb3\x51\xad\x78\xb6\xce\xed\xdb\xd1\xfb\xe1\x1a\xe6\x32\x4b\x99\x8a\xe0\x23\xeb\x2a\x34\xd5\x62\xc3\xe4\x9c\x5b\xe2\x4b\xa6\x18\x90\x28\xb5\x9c\x86\x9d\x5b\xa9\xa7\x57\xce\x15\xd6\xc4\x2f\xd7\x15\x5b\x52\xa0\xe5\x6a\xbb\x83\x60\x09\xd3\x9a\xaa\x9b\xd6\xa1\xa2\xe0\x78\x74\xf4\x6e\x38\x9e\x1e\x0d\xc7\xe7\xd3\xd7\x83\xc9\x70\xfa\xfb\xe0\xfc\x6d\x9f\x74\x6e\x1f\x7c\xd1\x0b\x3d\xa7\x6b\x12\x04\xef\x3e\xbc\x1e\x4e\xc7\xa3\xd1\x79\x9f\x74\x76\x93\x14\x48\x67\x37\xe5\x4a\xd0\x9c\x01\xe9\xdc\xbe\x1e\x4c\xde\x4e\x27\xa3\x0f\xe3\xa3\xe1\xe7\x83\x2f\x6b\xb2\x17\x47\x51\x1c\x45\x04\x7e\xfc\x11\x8a\x55\x0a\xe1\xef\x7b\x24\xd0\xb2\x54\x89\x9d\x5e\x13\x5b\xc7\x4b\x9a\x5c\xc6\x19\x9f\xc5\x99\x5c\x2c\xb8\x58\x44\x7a\xf9\xbd\x99\xa5\xe1\x99\x9d\x16\xec\xc0\x7b\x5a\x14\x28\x33\x39\x87\x85\x84\xc1\xf8\xe8\xad\xd5\x71\x62\x4a\x9a\x01\x55\xc9\x92\x1b\x96\x98\x12\xf5\xab\x97\xbc\x28\x58\x0a\x05\x55\x06\xe7\xe7\x65\x66\x38\x4e\x89\xff\x62\x79\x19\x96\x9a\xa9\x50\xa3\x25\x26\x50\x28\xf9\x4f\x96\x98\x20\x65\x49\x46\x15\x83\x70\x00\x7f\x1f\xbe\xff\x80\xe4\x27\xfd\x5d\xf8\x4c\x68\x9e\xfe\xfc\x13\xf9\xd2\x27\xd7\x2f\x7e\x9e\xfe\xfc\x13\xc1\x21\x95\xe3\x00\xfe\x71\x4f\x6e\x02\xc5\x1d\xdc\x8c\xa2\x48\x7e\xfe\x29\x63\x38\x5a\xfd\x84\xcf\x44\x3f\x7b\x79\x70\x8d\x63\xee\x07\xec\x05\xc1\x8a\x8b\x54\xae\xf4\x74\xa3\x6e\xdd\xdf\x3d\x7c\x71\xf0\x12\x0e\x5f\x1e\x3c\xc3\x7f\x5e\xc2\xd3\x83\x83\x9f\xf6\x9a\x0c\x7e\x3c\x39\x3b\x1e\x7d\x9c\x4c\x47\x93\xe9\x1f\xc3\xf1\x04\x7d\x79\xfa\x7e\xf0\x7b\x10\x70\xc1\xcd\x47\x47\x71\xa4\x7d\x24\xd5\xbb\x7b\x70\x1b\x80\x35\xf3\xcd\x2e\x68\xa0\xa4\x73\xfb\xc0\xf6\x9f\x7f\xfd\xb2\x26\xaf\x20\x95\x01\x06\x3f\x9e\x2f\xa6\x33\xaa\x59\x9f\xe4\x89\x8a\x72\x9e\x28\x89\x51\x2a\x4a\x64\x1e\xfb\xc5\xb1\xa0\x42\x6a\xa6\xae\x98\xea\xb5\xed\xd6\x52\x98\x97\x59\x56\x0d\xf5\x3b\xbb\xce\xc0\x21\xa7\x82\xcf\x99\xc6\x78\x8d\x31\xc4\x20\x33\xd5\x5e\x6b\x02\x77\xb0\x50\xac\x00\x22\x75\xe4\x97\xe2\xd8\x92\xd1\x14\x42\x01\x87\x70\x07\x74\x75\x09\xdd\xdb\x42\x71\x61\xa0\xf3\x74\xdd\xdd\x83\xbb\x3b\x30\xaa\x64\x76\xd3\x47\x24\xf4\x99\xb4\x19\xfc\x82\x0e\xd1\x64\xd0\xf2\x9c\x4a\xc1\x82\xf5\x23\xd2\x44\x4b\x1c\x33\x53\x2a\xa1\x21\xe3\xda\x9a\x17\xcd\x32\xd0\x65\x51\x48\x85\xd1\xb8\x6d\x8a\x73\x25\x73\x0c\xc9\xc3\x93\xf7\x83\x37\x43\x9b\xaa\x02\x5c\x37\xd2\x03\x95\x2c\x2b\xe5\xf0\x9c\x2e\x18\xc6\x32\x80\xa4\x34\x10\xa6\x40\xfa\x04\xc2\x39\x1c\x3a\xc1\xd0\x05\x5b\x93\xb8\x26\x83\xdc\xe9\x22\xe3\x9e\x8a\x27\xd2\x22\x03\xa8\x6c\x64\xc5\x46\x46\xfb\x72\x0e\x9f\x3f\x43\xc7\x0f\x43\xff\x2b\x44\x4f\x62\xfb\x3f\x7c\xf9\xf2\x0a\x83\x89\xb0\xf3\x00\x76\xac\xb1\xf8\xa3\xef\xc3\x8a\xc1\x92\x5e\x31\xf4\x36\x7f\x4a\x98\x49\xb3\x84\xd3\xf3\x09\x06\x76\x98\x0c\x8e\x20\x59\x52\x21\x58\xa6\x31\x89\xc1\xca\x46\xb9\x59\xc9\xb3\x14\x1d\xd6\x7a\x5f\x91\xb1\x8a\xa2\x63\x53\x47\xf5\x6e\x18\xc7\xe6\x52\xe5\xd4\xf8\xc4\xc2\x35\x24\xd4\xe6\xb9\x1e\x8c\x26\x31\x3a\x63\xbc\x51\x65\xb5\x50\xea\x29\x06\xa5\x7e\x67\x97\x25\x4b\x09\xa4\x3a\x1a\x9a\x4a\x25\xc5\xd8\x49\x71\xcf\x2f\x71\x02\xf9\xee\xfc\xa7\x7b\x9b\x2d\x36\xa6\xfb\xbd\x55\xcf\xaa\x55\xba\x9c\xcf\xf9\x75\xdf\x4e\x45\x0e\xc3\x0e\x2e\x08\x3b\x1b\x6a\xce\x35\x58\xf6\x88\x4e\xb6\x15\xf2\x7f\x7b\x52\x42\xbe\x79\x8e\x8a\x77\xcd\xfc\x34\xb7\x07\xe2\xbe\xb6\x9d\xd7\x28\xa1\xb2\x60\xa7\x78\x44\x2f\x08\xdf\x0a\x25\x0b\xa6\xb2\x1b\xaf\x7a\xc3\xd2\x08\x86\x36\x33\xb2\x14\x98\x30\x8a\x33\x6d\x6d\xce\x60\x14\xb7\x48\xae\x2b\x75\x8c\x2c\x74\xf7\x7d\x9a\xed\x5a\x7f\xc6\xa1\x75\x17\x43\x89\x61\x34\x8d\x2a\xf6\x11\x44\x80\xf3\x85\x39\x47\x97\xd9\x78\x2e\x86\x19\xc7\x8c\xf0\x38\xac\x44\x58\xca\x85\x87\x0a\x35\xfb\x54\xdc\xc0\x82\x5f\x31\xd1\x72\xeb\x60\xc1\xcc\x6b\xaa\xd9\x09\x92\xf0\xde\x57\xbb\x1b\xee\xe8\xa2\xd7\x86\xb9\x3e\x69\xc8\xa6\xd2\x41\x1f\xc2\xf9\x53\xc7\xd7\xb9\x85\xb1\xa5\x48\x10\x7e\xc0\x8a\x67\x99\x73\x1f\x30\x36\x46\x5a\x4e\x2d\x3b\x59\x66\x25\xda\x8a\x31\xc1\x0e\xe4\x08\x5e\xa4\x70\x47\x68\x6b\x21\x82\x13\x87\x45\xe8\x4c\x33\xc4\xc4\x72\xbe\x35\x03\xb1\x22\x37\xcd\x5d\x9b\x5b\xb5\x03\x9b\x8b\x79\x21\xd8\xac\xb8\x0f\x54\xe5\xb8\xda\xa6\xc0\x7d\xf0\xa9\x6e\x1f\x6c\x7e\x0b\x2c\xad\xfb\x01\x4e\x96\xa6\x28\xcd\xd4\xdc\x14\x0c\x63\x13\xc6\x5b\x14\x79\x65\x7e\xd3\x64\xc9\x92\x4b\x0c\x59\xce\x39\xc2\x79\x6d\x3f\x9b\x00\xd8\x76\x10\x2f\x65\xdd\xef\xec\x36\x42\x2b\x90\x8e\x5d\x46\xd0\xc4\x6b\x73\xdd\x81\x42\xb1\x82\x89\x14\x32\x2e\xca\xeb\x18\x75\x8f\xc7\xac\x93\x3e\x70\xc3\x72\x1f\x9c\x1a\x84\x6d\xa6\x99\x43\xd7\xad\xfa\x0f\x7d\x21\xba\xa8\xe0\x1f\xea\x75\x9f\x9f\x20\x18\x0a\xac\xad\x05\x00\x97\xe5\x8c\xf5\x7a\x88\x5f\x7a\x3d\x26\x74\xa9\x58\xb8\x10\x65\xa8\x59\x1a\x6c\x92\xb1\x95\x28\x17\x50\x1b\x8a\x5e\xd7\x99\xb7\x11\xdf\x1b\x39\xa0\x69\x54\xa4\x11\xd6\xdd\x30\x3a\xe9\x9a\x40\xbf\x0f\xc4\x27\x67\x0b\xcb\xf0\xe5\x46\xe8\x7e\x82\x93\x3a\xd9\x0e\x35\xce\x99\x8f\xa8\x40\x17\xf5\x36\xb8\x64\xde\x04\xbb\x15\x1f\x5d\x7b\x82\x0d\x2b\x11\xbc\x2e\x79\x66\xea\x08\xef\x21\x2a\x53\x3e\xd6\xd7\x6e\x36\x63\x50\x94\x7a\xe9\x1e\x28\x28\xb6\xc0\x3a\xe6\xa6\xf6\x59\x5c\xc8\x85\xcf\xe2\x4e\x92\x15\x4f\xaf\xab\x7c\xb2\x71\x87\x3a\xb0\xf8\x24\xd1\x6b\xb2\x14\x45\x24\xf0\x2a\x3f\x52\x8c\x1a\x06\x14\x0c\xcb\x0b\xa9\x10\x2d\xa7\x5c\xb1\xc4\x48\x65\xc3\x0f\xb0\x2b\xa6\x6e\x5a\x5e\x65\x33\x9b\xad\x0c\x37\xc7\x47\xe6\x98\x30\x9e\x28\x4e\xd8\x16\x90\xcd\xf6\x0f\x6c\x62\x97\xe4\x97\x29\x57\x10\x16\x6d\xb0\x4b\xe2\xa9\xc9\x0b\x3b\x01\x17\x4e\x53\xae\xfa\x9d\xdd\xfc\x12\x1f\x6c\xa0\xbe\x3f\x39\xc6\xa8\x10\x3a\xc9\x86\x96\x85\xe8\x93\xfd\xcf\x05\xf3\xa6\xe9\x19\x45\x8b\x29\x4d\x53\x20\x2a\x87\x50\xa1\x2f\x55\xbb\xac\x09\x0c\x3f\x9d\x9c\x3b\x19\x25\x05\x84\xaa\x89\x35\x9e\xe0\xc3\x66\x6a\xc3\xd4\x9a\x0e\xf9\x9e\x5e\x32\x1b\x2b\xef\x21\x88\x9c\x5e\x32\x98\x71\x1f\xcc\x0c\x3e\x25\x08\x5f\x3d\x5c\x42\x91\x15\x8a\xd9\x8a\x4c\x73\xe3\x2d\x84\xa5\x2d\x04\x52\x23\x08\x9c\xed\x81\xa3\xdd\xd8\xcf\xb2\x7b\x84\x47\x4d\xf7\xc0\x1d\x47\x93\x7e\xcb\x1d\xd0\x32\x70\xc4\x39\x0d\x9c\x0f\xc6\x6f\x86\x58\xdb\x6c\x1f\x6f\xce\xed\x1f\xb4\xcf\xf4\x81\xd3\xef\x78\x1d\x1b\xba\xb0\xcf\xe7\x83\x37\xfd\xce\xee\x2f\x1e\x94\xec\x05\x6d\x11\x3d\x12\xaa\x60\xf3\xa2\xdf\xd9\x6d\xa6\x91\x96\x67\xc3\x1d\x74\x6e\x27\xc3\xe3\x35\x10\x7d\x37\x1e\xbe\x39\x99\x9c\x8f\xff\xbc\xeb\xdc\x56\x3f\xd7\x77\x0b\xe2\x77\x44\xc6\xce\x46\xe7\xc3\xdd\x24\xa3\x65\xca\xcb\xd9\x5e\x0f\x26\x32\xdf\x46\x5b\x90\xdb\x16\x8d\x2f\x81\x91\x21\xae\x40\xae\x9a\x09\xaf\x26\xb7\x5a\xa2\x4a\x35\xd6\xff\x4c\x81\x14\x4c\x3b\x2d\x0a\x69\x22\x38\x99\x6f\xe3\xbb\x16\x58\xb4\xd1\x1b\xf8\xbc\x26\x46\x36\x1b\x4c\xeb\xa0\xc4\xae\xb9\x36\xb6\xc9\x80\x34\xfd\xdc\x74\x33\xd1\xa2\x9d\xc6\xca\x2a\x3c\x54\xc1\xce\x2b\x97\xc0\x56\xa4\x0b\xe7\x0f\xef\xb7\xa5\x83\x6f\xee\x55\xaf\xf2\x93\xab\x28\x04\x95\x4a\x42\x8e\x5a\x41\x3d\xa2\x65\xdd\x79\xc3\xba\x5b\x10\xe8\x6c\x91\x6d\x45\xb1\x9d\x4d\x38\xb1\x55\xe8\x93\xaa\x04\x9d\x71\x81\xc1\xc2\xc8\x96\x8d\xdb\x68\x59\x87\x17\x8b\xa1\xdb\x01\xca\xcd\x92\x02\xae\x5f\xfc\x0c\x45\x46\x0d\xe2\xa8\xca\x08\x2d\x00\x09\xff\x02\x72\x34\x1e\x4d\x26\xd3\xd7\x1f\x4e\x4e\x8f\xa7\xa4\xa1\xec\x96\x3c\xea\x1c\xe2\xad\x0f\xf3\x83\xab\x7b\xef\x4b\xae\x21\x84\xb8\x49\x3c\x4e\xc9\x7d\x5b\x6a\xa0\xc4\x2d\xf1\x55\x79\xf3\xae\x73\xbb\x49\xa1\x16\x5f\x7e\xb1\xa2\xbc\x47\x0a\x05\x38\xb6\xe9\x82\xa9\x2d\x01\x56\x70\x65\x03\x55\x0a\x25\x13\xa6\xb5\x54\xba\xea\x0b\xa2\x10\x93\x52\x29\x26\x0c\x5a\x74\x4d\xd4\xe5\x96\x8a\x30\x9a\xf3\x03\xca\x41\x24\xea\x3b\x3a\x97\x4c\x09\x96\x91\x7a\x7d\x26\x13\x8a\x3b\xa7\x72\x83\x9b\xeb\x5a\x6b\x97\xa7\x10\x96\x7b\xf0\x43\x1f\x0e\xee\x4b\x12\xdc\x32\xfc\xa7\x1e\xf3\x31\xc8\x89\x0b\xdf\xac\xb7\x5a\x23\x66\xc9\x55\x3a\x2d\xa8\x32\x37\xf1\xe3\x6d\x8d\x58\xf9\x03\xd5\x3f\x22\xbd\x24\x10\x86\x8a\x69\x66\xea\x2d\x92\x52\x65\x10\xea\xc9\xa9\x6d\x72\xea\x5e\x1c\x2f\xb8\x59\x96\x33\x5b\xde\x7f\x93\x7a\xc6\xa8\x66\x3a\x4e\xe5\x4a\x64\x92\xa6\x31\x71\x6a\xf4\xc1\x70\x4d\x62\xd7\x2d\x99\xda\xa5\xe4\x01\x1d\x13\x4f\x2b\x32\x54\x45\x8b\x7f\xc1\x1d\x18\xaa\x20\xbc\xfe\x97\x0f\xe8\x5b\xc1\xd7\xe9\x7f\x68\x81\x14\x16\xa4\xa9\x14\x5d\x03\x0b\x66\x40\x97\xaa\x50\x5c\xbb\x4e\x6b\x99\x53\x7d\x09\x9a\x19\xc3\xc5\x42\x6f\xce\xb9\xcc\x65\x0a\x07\xcf\xff\xf6\xb7\x16\x69\x77\xb0\x07\x98\xf3\xbc\x91\x07\x4d\xb7\x6d\xf5\xf1\x43\xb6\xea\xb5\x58\x79\xbe\x77\x6b\xeb\xcd\xd7\xde\xa9\xc3\x50\xc8\x30\xb1\xbd\xef\x30\x2c\xca\x2c\x83\x30\x74\x20\xad\x6f\x91\xf1\x3d\xcc\x16\x86\x95\x8f\x37\xc1\x5e\x5c\xfb\xec\x45\xcd\x6c\xe8\x30\x41\x48\xd5\xa2\x91\x6d\x5c\xeb\xce\x3d\x58\x72\x9b\x49\x55\x56\xc1\x39\x75\x86\x69\x4f\xd9\x54\xdf\xfd\xad\x1e\x4a\x73\x63\xdb\xc6\xa9\x29\xc4\x55\x5a\xee\x75\x6e\xcf\x07\x6f\xd6\x21\x5a\x34\x56\x94\x6b\x5b\x7a\x92\xce\xed\x56\xb8\x5c\x13\x88\x9c\xc4\x0a\x59\xa4\x8d\x4e\xcc\x43\x15\x82\x2f\x2c\x76\xb6\xa4\xbb\xa4\x1a\x66\x8c\x09\xe0\xc2\x28\x99\x96\x89\xab\x89\x0e\x5f\x46\x07\xcf\x7c\x73\xa2\x06\xa3\x16\x3f\x54\x16\x65\x5b\x1c\xdc\x26\xa3\xf6\x76\x9b\xa6\x55\xd5\x3b\x0b\x43\xdf\xad\xe8\xde\xde\x46\x47\x19\x67\xc2\x44\xbe\x3f\xb4\x5e\x77\xeb\xfa\x8e\x84\x78\x4e\x5b\x91\xfb\x78\x70\xdb\xa6\xbc\xc6\xc0\x60\x39\x8b\x0e\x30\x7b\xdd\x7f\xff\x4b\xfd\xba\x15\x3d\x5c\xd0\x7a\xcf\x05\xcf\xcb\x1c\xb6\xb8\xab\x56\xf0\xc6\x25\x04\x46\xc8\x52\x63\x74\x6b\x49\xab\x77\x7f\xcb\x2f\xbe\xbc\xaf\x6a\xe7\xaa\x72\x7e\xa0\x42\x45\xa0\x74\x0f\x9a\xe9\x00\x87\xef\x57\x7d\x8f\x15\x79\x1e\x45\x35\x90\x67\x0d\xa8\xfe\x5f\x57\x80\x3b\xf6\xa2\xac\x6e\x83\x26\x32\xcf\xb1\xa0\xe0\x1a\xb4\x41\xe1\xb2\xeb\x82\x29\x8e\x75\x3d\xcd\x80\x6a\xc4\xcd\xfe\x16\xe3\xf0\x45\x74\xf0\x32\xc2\xc2\x99\x5d\xdb\x66\x5c\xd5\xd1\x3f\x3d\x99\x0e\x3f\xfd\x3e\x1c\x9f\xbc\x1f\x9e\x9d\x0f\x4e\xfb\x84\x09\x3a\xcb\x58\x4a\xec\x76\x36\xf2\x6f\x36\x44\x31\xbd\xf2\xa0\xdb\x5e\x9a\x51\xcd\x36\x9d\x3a\x8f\x19\x11\xb0\xcf\x18\x9a\xcd\xcc\x96\x77\xb1\x2f\xde\x50\x36\x15\xa5\xfe\xee\x9e\xa5\x8f\xa5\x40\x2d\x2e\xd7\x26\xe0\xc2\x48\x0f\x53\xaa\xd9\x11\x0c\x17\xbd\x4a\x86\x16\x62\x78\x2d\xf8\xde\x41\x17\xb5\xd1\xfd\x56\x10\xb1\xd3\x43\xb7\xf4\xfb\xf3\x2a\xb2\x01\x78\x54\x7b\xf2\xdb\xa4\xdf\xed\x82\xb2\xad\x64\x85\x9b\x33\x2c\xb9\x6b\x06\xff\xb3\xbf\x4b\x3a\x38\x4a\xf6\x5e\xd9\xf8\x03\xbf\xc0\x2f\x5b\x6d\x34\xdd\xc2\xe7\x5f\x2f\xe2\xaf\xe1\xd7\x45\x63\x2c\x64\x38\xfc\xf9\xbf\xe1\xcb\x93\xaf\x9d\x8a\xc3\x8b\xd8\x19\x63\xaf\x73\x3e\x78\x73\x11\xfe\xf8\x75\x61\x6d\x65\xbb\x1f\x9e\xb8\x52\x35\x0c\x69\x8e\x26\xfa\xad\x78\x6a\x9b\x01\xd5\x42\xdb\xb6\x77\x86\xf5\x91\x79\xb8\x6e\xc3\xdc\x92\xd9\x16\x7c\x5d\x6a\x83\xbd\xc8\xe1\x02\xa4\xb2\x37\x70\x12\xd3\xa5\x9d\xd6\xea\xb6\x37\x40\x7d\xa3\x5f\xbb\x83\xf0\xdf\xb5\xf4\x6a\xb6\x20\x4d\x98\xc6\x6c\x6c\x23\x28\x15\x37\xa0\x33\xaa\x97\x4c\xef\x03\x37\x90\x33\x6a\x6f\xaa\xa8\x01\x6e\xba\x1a\xf1\xaa\x3b\x32\xc2\x8c\x00\x6a\xb6\xa6\x85\x62\xb6\xd9\x48\x6a\xbf\xff\x01\x6a\xe1\x3d\xd2\x19\xbd\xb7\xd8\x91\x8e\xb8\x8c\x49\xe0\xd3\xb0\x73\x34\x6f\xd0\x1e\xc4\xb5\xbc\xc0\x5a\xb9\x36\x12\xe3\xa4\x45\x73\xd9\x4d\x64\xd7\xb8\x5b\x37\x88\x5d\x33\xd3\x89\x4d\x03\xcd\x72\xa9\x9d\xc0\x34\xcd\xd9\xbe\xdd\xc2\x76\x27\x29\xcc\xd9\xca\x76\xc2\xbd\xb4\xaa\x6d\xa6\x76\xf7\xa9\xa3\xb7\x69\xca\xde\x6e\xb1\xbf\xfe\xa6\xae\xef\x00\x31\x0e\xd1\x77\xf1\xdd\xf4\x6e\xb1\x79\x8e\x7b\x71\x18\xbb\x62\xf0\x7f\xb1\xab\xb4\x6d\x96\xb6\x1f\xe4\x0c\x53\xea\x76\xb7\x29\x0c\xa9\xa7\xe6\x91\xc8\x77\x6d\xf6\xdf\x41\x08\x55\xcd\xf4\xdb\x3d\x3b\xb4\x17\x12\x34\xd3\xb2\xce\xe3\x5c\x24\x59\x99\xb2\xfb\x46\xfc\x90\xba\x2d\x08\xc0\xd1\x8a\xaa\x90\x69\x95\x18\x12\x2a\xc0\x62\x31\xd7\x9e\x90\x45\x5d\x8c\x71\x63\x77\xf3\x59\xe1\x9b\x65\xe8\x16\xce\x6f\xdd\x7f\x91\xce\xed\x63\x57\x53\x8d\xdb\x81\x2f\xd5\xf1\x91\xa7\x81\xb3\xb5\x5c\x62\x2e\xd8\x7f\x5c\x31\xa9\x74\x5e\x48\xb3\x4c\xae\xa0\xd4\x4d\xcf\xde\xc8\xa4\xba\x9f\xc9\xb2\xea\x4e\xa7\xde\x88\x1b\x90\xa5\xd2\x2c\xbb\x62\x3a\x6a\x67\x27\xeb\x26\xad\xfb\x6d\xef\x28\x98\x99\xfe\x6b\x32\x3a\xab\x2f\x73\xd0\x26\x43\x6e\x7b\x49\x3a\xde\xbd\x20\x52\x5f\x90\x8b\xde\x45\x25\x9d\x0b\xb2\x17\x5f\x1c\xec\x5f\x34\xb4\x74\x41\x7a\x9d\xa6\x8c\xe2\x26\xa2\x24\xfe\x5a\x3a\xf6\x17\xe3\x71\xc5\x92\x8e\x37\xa1\xaf\xe5\x5e\xeb\x47\x5f\x34\x8d\xab\x06\xe9\xa9\xab\x05\xb7\xa5\x6a\xa1\x0d\xe2\x72\xe5\x1a\x33\x8f\xdb\xf3\x43\xe8\x88\xeb\x76\xfb\x6a\x70\x76\x6c\x29\xd6\xcd\x4b\x1d\xc1\x07\xcd\xe6\x65\x86\x96\xd4\xb9\xfd\xf8\x76\x70\xbe\xc6\x55\x84\x66\x59\x98\x48\x61\xe1\xa5\x48\x18\x89\x2a\xda\x36\xa0\x3b\xd5\xfa\x50\xd6\x6a\xa6\xf2\x3c\x67\x29\xa7\x86\xa1\x4a\xe6\xc6\x7d\x59\x71\xd3\xbd\x62\x0e\x0b\xdb\xec\x1d\xb9\x86\xfc\x94\x8a\x74\xfa\x30\x46\x73\x95\x49\x33\x2c\x54\x11\x0a\x25\x66\x65\xb2\x79\xf9\xef\x1c\x1c\x6d\x6f\x21\x21\x41\x0f\x9b\x71\xe1\x77\x74\x25\x33\x06\x8b\x07\x82\x3e\xe9\xdc\xda\x4e\x6e\x58\xb5\x21\x54\xbe\xe5\x52\xad\x85\x6f\x46\x83\xf1\xfb\x7e\xe7\xd6\xfe\xed\x85\xcf\xd7\x75\xdc\x47\x46\x26\xe3\x23\x77\xd1\xfd\x2b\x79\x65\xb5\xbc\x51\xb5\x2a\x11\xc7\xab\x1c\xc2\x2b\xdc\xd3\x35\x05\x9d\x56\xdd\xaf\x7f\x10\xff\xaa\xd1\x7d\xed\xc5\x0b\x19\x6b\x95\xc4\x97\x2f\x34\x26\x99\xcb\xfa\x3b\xa7\xde\x3f\x1a\x56\xbb\x90\x19\x15\x8b\x1e\x41\xb6\x4e\x07\x67\x6f\xa6\x75\x59\xdc\x98\x64\xbf\xa3\x9a\x51\xb4\xb3\x04\xc8\x45\xa3\x2b\xe0\x6b\xd6\x14\x1e\xdd\xcd\x36\x80\x63\x67\x08\x71\xe7\x76\x32\x3e\x9a\x1e\x9f\x8c\xd7\x58\x43\xdc\x27\x74\xf4\x66\x34\x1d\x9e\x0d\x5e\x9f\x0e\x8f\xfb\x07\xe0\xa2\x74\x95\x71\xe0\xcd\x68\x34\xe9\x77\x6e\x47\x13\xfc\x69\x1b\xa5\x4e\xfe\x6b\xd4\x9b\xaf\x54\x29\x84\x5c\x68\x43\xb3\xcc\xf9\x0f\x24\x0b\x09\x61\x98\xa5\xf3\x8c\x2e\x34\x74\xc3\x55\x17\x42\x09\xb5\xe8\x1c\x47\x6b\x88\xe2\xd6\x87\x23\x38\x46\xf6\x9a\x17\xec\x7a\xc9\xe7\x26\x08\x6a\xc5\x5b\x3f\xf0\x6a\xdf\x72\x84\xa6\x09\xdc\xef\x77\xd6\x57\x03\x4f\x06\xa7\xa7\x4f\x36\xfd\xf8\xe6\x67\x46\x0f\x4b\xaf\x4a\xf2\x86\x5e\x22\xde\x15\xc0\xae\x8d\x62\x39\xcb\x6e\xec\x46\x99\x44\x2b\xe6\x39\x83\x5d\x66\xbf\x75\xb2\x41\x4f\xcb\xbc\xda\x60\x6f\xdf\xde\x03\x34\x46\x2c\x9c\x50\x54\xa1\x2b\xda\x4b\x45\x7c\x5f\x3d\x17\x29\x35\x2c\xad\x52\x90\x62\x5d\x6d\xb7\x11\x12\x0a\xc9\x85\xfd\x7a\x4d\xb1\xda\x7d\x68\x96\xf9\xef\xd2\x72\x7f\x43\x81\xac\x44\x8d\x88\x20\x45\x76\xd3\xe8\x12\x1e\x6d\x24\x16\x2a\x96\xe1\x5e\x2d\xf0\x76\xcc\x75\x52\x6a\x64\x2a\x2d\x6d\xaf\xab\xb1\x00\x46\xf3\x39\x4f\x18\xbc\xc5\x24\x00\xef\x19\xb3\x1f\x28\xed\x3e\x3d\x38\x7c\x19\x1d\x3e\x8d\x0e\x9f\xef\xf5\x2c\x8d\xaa\x53\x94\xca\x44\x47\x0b\x29\x17\x19\xb3\xed\xa2\x54\x26\x25\xa6\xa8\x38\x8d\x0f\x3f\x3e\x3b\x14\x9f\x96\x2f\xc7\x7f\x0e\x66\xd3\x3f\xe8\x9f\x97\xab\xf2\xf7\xd3\xf4\x70\xf9\xdb\x75\x39\xfe\xf4\x8c\x7f\x38\x38\xce\xe9\xdf\x7f\xca\x2e\x8f\xf4\xa7\x17\x31\x4b\xb9\xd9\x59\x32\x8a\x27\xee\x2f\xa3\xec\xc5\xf3\xac\x3c\x7c\x7e\x9d\xbf\x9c\x2d\x03\x00\x67\x22\xf6\x5e\xa8\x62\xd4\x45\x75\xdd\xdf\x25\xb3\x52\xdf\xcc\xe4\x35\x01\x42\x17\x62\x29\xb5\x21\x40\x10\x5b\xb9\x8f\x51\x08\x90\x7f\x32\xad\x39\x0b\x53\xa1\xb1\x0c\xd3\x04\xc8\x25\x37\x86\x09\x02\x44\x50\x1c\x2a\x71\x4c\x48\xc1\x56\x85\xe2\x57\xda\x46\x3c\xf7\x45\x12\x5a\x9f\x2e\x73\x4b\x46\xd3\xbc\xc8\x58\x48\x0b\xee\x29\xef\xf9\xf8\xe2\xb1\x81\xfd\x94\xe6\x3e\x87\xed\x2f\x69\xd8\x15\xcd\x5c\xa4\x99\xbc\x73\x30\x68\x03\xbe\x7e\xad\xbd\xc2\x57\xa9\xf7\x26\xff\x4a\x82\x39\x0f\xfe\x27\x00\x00\xff\xff\xb7\x19\x6c\xb9\x82\x29\x00\x00") + +func testImagesImageUtilShBytes() ([]byte, error) { + return bindataRead( + _testImagesImageUtilSh, + "test/images/image-util.sh", + ) +} + +func testImagesImageUtilSh() (*asset, error) { + bytes, err := testImagesImageUtilShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/image-util.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesIpcUtilsBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\xcc\x29\xc8\xcc\x4b\xb5\x32\xd6\x33\xe3\x82\x0a\x17\xe5\xda\x26\x16\xe5\x1a\x1b\x95\x99\xe9\x63\x93\x04\xe9\x01\x91\x65\x16\x98\xd2\x05\x05\xc9\x66\x26\x39\xa9\xb6\x50\x1a\x59\x01\x20\x00\x00\xff\xff\xeb\x4c\x33\x25\x74\x00\x00\x00") + +func testImagesIpcUtilsBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesIpcUtilsBaseimage, + "test/images/ipc-utils/BASEIMAGE", + ) +} + +func testImagesIpcUtilsBaseimage() (*asset, error) { + bytes, err := testImagesIpcUtilsBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/ipc-utils/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesIpcUtilsDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\xcf\x4f\xdb\x30\x1c\xc5\xef\xfe\x2b\x9e\x9a\x1d\x36\xa9\x49\x18\xa7\x69\x3b\x85\x52\x20\x02\x92\x2d\x69\x87\x38\x21\x37\xf9\x36\xf9\x6a\xa9\x6d\xfc\x63\xa1\xff\xfd\x94\x00\xda\xaa\xf9\x66\xbf\xe7\xe7\x8f\x9f\x1d\x61\xa5\xcd\xd1\x72\xd7\x7b\x9c\x9f\x7d\xfe\x82\x4d\x4f\xb8\x0d\x3b\xb2\x8a\x3c\x39\x64\xc1\xf7\xda\xba\x44\x44\x22\xc2\x1d\x37\xa4\x1c\xb5\x08\xaa\x25\x0b\xdf\x13\x32\x23\x9b\x9e\xde\x95\x25\x7e\x92\x75\xac\x15\xce\x93\x33\x7c\x9c\x0c\x8b\x37\x69\xf1\xe9\x9b\x88\x70\xd4\x01\x07\x79\x84\xd2\x1e\xc1\x11\x7c\xcf\x0e\x7b\x1e\x08\xf4\xd2\x90\xf1\x60\x85\x46\x1f\xcc\xc0\x52\x35\x84\x91\x7d\x3f\x1f\xf3\x16\x92\x88\x08\x8f\x6f\x11\x7a\xe7\x25\x2b\x48\x34\xda\x1c\xa1\xf7\xff\xfa\x20\xfd\x0c\x3c\x8d\xde\x7b\xf3\x35\x4d\xc7\x71\x4c\xe4\x0c\x9b\x68\xdb\xa5\xc3\xab\xd1\xa5\x77\xf9\x6a\x5d\xd4\xeb\xf8\x3c\x39\x9b\xb7\x6c\xd5\x40\xce\xc1\xd2\x73\x60\x4b\x2d\x76\x47\x48\x63\x06\x6e\xe4\x6e\x20\x0c\x72\x84\xb6\x90\x9d\x25\x6a\xe1\xf5\xc4\x3b\x5a\xf6\xac\xba\x25\x9c\xde\xfb\x51\x5a\x12\x11\x5a\x76\xde\xf2\x2e\xf8\x93\xb2\xde\xe9\xd8\x9d\x18\xb4\x82\x54\x58\x64\x35\xf2\x7a\x81\x8b\xac\xce\xeb\xa5\x88\xf0\x90\x6f\x6e\xca\xed\x06\x0f\x59\x55\x65\xc5\x26\x5f\xd7\x28\x2b\xac\xca\xe2\x32\xdf\xe4\x65\x51\xa3\xbc\x42\x56\x3c\xe2\x36\x2f\x2e\x97\x20\xf6\x3d\x59\xd0\x8b\xb1\x13\xbf\xb6\xe0\xa9\x46\x6a\xa7\xce\x6a\xa2\x13\x80\xbd\x7e\x05\x72\x86\x1a\xde\x73\x83\x41\xaa\x2e\xc8\x8e\xd0\xe9\xdf\x64\x15\xab\x0e\x86\xec\x81\xdd\xf4\x98\x0e\x52\xb5\x22\xc2\xc0\x07\xf6\xd2\xcf\x2b\xff\x5d\x2a\x11\x22\xab\xae\x27\xfa\x75\x7e\x9f\x5d\xaf\xc5\x55\x55\xde\xe3\xc3\xdf\xb9\x58\x55\x65\x5d\x3f\x5d\x6c\xf3\xbb\xcb\xa7\x55\xf9\xfd\x11\xcf\x74\x08\xf1\x8f\xf5\xfd\x36\xab\x56\x37\xb1\x9b\xa2\x1b\xa4\xc1\xd9\x74\xc7\x2a\x15\xa2\xda\x16\x90\xe6\x17\x64\xdb\x22\x8e\x95\x8e\x9b\xf9\xaf\x05\xcf\x43\x3c\xb0\x0a\x2f\xe2\x4f\x00\x00\x00\xff\xff\xf5\x16\x2c\x14\xbe\x02\x00\x00") + +func testImagesIpcUtilsDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesIpcUtilsDockerfile, + "test/images/ipc-utils/Dockerfile", + ) +} + +func testImagesIpcUtilsDockerfile() (*asset, error) { + bytes, err := testImagesIpcUtilsDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/ipc-utils/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesIpcUtilsVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe4\x02\x04\x00\x00\xff\xff\x9e\xc5\x88\x7d\x04\x00\x00\x00") + +func testImagesIpcUtilsVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesIpcUtilsVersion, + "test/images/ipc-utils/VERSION", + ) +} + +func testImagesIpcUtilsVersion() (*asset, error) { + bytes, err := testImagesIpcUtilsVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/ipc-utils/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesJessieDnsutilsBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\x49\x4d\xca\x4c\xcc\xb3\xca\x4a\x2d\x2e\xce\x4c\xe5\x82\xca\x14\xe5\xda\x26\x16\xe5\x1a\x1b\x95\x99\xeb\xe3\x90\x37\x33\xb1\x05\x93\x65\x16\x58\x55\x14\x14\x24\x9b\x99\xe4\xa4\xda\x42\x69\xac\x6a\x8a\x8d\x2d\x0d\x2a\x6c\xc1\x24\x9a\x7c\x79\x66\x5e\x4a\x7e\x79\x31\xc4\x85\xfa\x86\x16\x06\x96\xb6\x41\xae\xee\x9e\xc1\x21\x41\x91\xfa\x49\xa5\xc5\x95\x49\xf9\x15\x56\x86\x7a\x46\x96\xba\x50\x85\xba\x60\x85\xba\x20\x85\xe8\x7a\x2d\x0d\x8c\x89\xd3\x6b\x69\x60\x8c\xa9\x97\x48\x7b\x2d\x0d\x2c\xb9\x00\x01\x00\x00\xff\xff\x3b\xf6\x24\x3c\x54\x01\x00\x00") + +func testImagesJessieDnsutilsBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesJessieDnsutilsBaseimage, + "test/images/jessie-dnsutils/BASEIMAGE", + ) +} + +func testImagesJessieDnsutilsBaseimage() (*asset, error) { + bytes, err := testImagesJessieDnsutilsBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/jessie-dnsutils/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesJessieDnsutilsDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x53\x51\x6f\xdc\x36\x13\x7c\xe7\xaf\x18\x9c\x3e\x04\x5f\x01\x4b\x72\x8c\xd4\x0f\xee\x93\x72\xbe\x38\x42\xec\xbb\xf4\x64\x37\x30\xda\xc2\xe0\x51\x7b\xd2\xa6\x12\x49\x93\x94\x75\xca\xaf\x2f\x28\xfb\xda\x1a\xd6\x8b\xb0\x9c\xdd\xe5\xec\x70\x36\xc1\xd2\xd8\xc9\x71\xd3\x06\x9c\x9d\xbe\x3f\xc7\x6d\x4b\xf8\x32\xec\xc8\x69\x0a\xe4\x51\x0c\xa1\x35\xce\x67\x22\x11\x09\xae\x59\x91\xf6\x54\x63\xd0\x35\x39\x84\x96\x50\x58\xa9\x5a\x3a\x22\x27\xf8\x8d\x9c\x67\xa3\x71\x96\x9d\xe2\xff\x31\x61\xf1\x02\x2d\x7e\xfa\x45\x24\x98\xcc\x80\x5e\x4e\xd0\x26\x60\xf0\x84\xd0\xb2\xc7\x9e\x3b\x02\x1d\x14\xd9\x00\xd6\x50\xa6\xb7\x1d\x4b\xad\x08\x23\x87\x76\xbe\xe6\xa5\x49\x26\x12\xdc\xbf\xb4\x30\xbb\x20\x59\x43\x42\x19\x3b\xc1\xec\xff\x9b\x07\x19\x66\xc2\xf1\x6b\x43\xb0\x17\x79\x3e\x8e\x63\x26\x67\xb2\x99\x71\x4d\xde\x3d\x27\xfa\xfc\xba\x5c\xae\xd6\xd5\x2a\x3d\xcb\x4e\xe7\x92\x3b\xdd\x91\xf7\x70\xf4\x38\xb0\xa3\x1a\xbb\x09\xd2\xda\x8e\x95\xdc\x75\x84\x4e\x8e\x30\x0e\xb2\x71\x44\x35\x82\x89\x7c\x47\xc7\x81\x75\x73\x02\x6f\xf6\x61\x94\x8e\x44\x82\x9a\x7d\x70\xbc\x1b\xc2\x2b\xb1\x8e\xec\xd8\xbf\x4a\x30\x1a\x52\x63\x51\x54\x28\xab\x05\x3e\x16\x55\x59\x9d\x88\x04\xdf\xca\xdb\xcf\x9b\xbb\x5b\x7c\x2b\xb6\xdb\x62\x7d\x5b\xae\x2a\x6c\xb6\x58\x6e\xd6\x97\xe5\x6d\xb9\x59\x57\xd8\x7c\x42\xb1\xbe\xc7\x97\x72\x7d\x79\x02\xe2\xd0\x92\x03\x1d\xac\x8b\xfc\x8d\x03\x47\x19\xa9\x8e\x9a\x55\x44\xaf\x08\xec\xcd\x33\x21\x6f\x49\xf1\x9e\x15\x3a\xa9\x9b\x41\x36\x84\xc6\x3c\x91\xd3\xac\x1b\x58\x72\x3d\xfb\xf8\x98\x1e\x52\xd7\x22\x41\xc7\x3d\x07\x19\xe6\x93\x37\x43\x65\x42\x14\xdb\xab\xc8\x7e\x55\xde\x14\x57\x2b\xf1\x69\xbb\xb9\xc1\xff\xfe\x8d\xc5\x72\xbb\xa9\xaa\x87\x8f\x77\xe5\xf5\xe5\xc3\x72\xf3\xf5\x1e\x8f\xd4\x0f\xe9\xaf\xab\x9b\xbb\x62\xbb\xfc\x9c\xfa\xd8\x5a\x21\x1f\xbc\xcb\x77\xac\x73\x11\x25\x28\xb6\xeb\x72\x7d\x75\x81\xaf\x1d\x49\x4f\xd1\x36\x71\x10\x19\x9e\xd9\x2b\xc7\x36\x60\x47\x9d\x19\xe1\xa8\x37\x4f\xe4\x9f\x01\x52\x83\xe3\x30\xc1\x4a\xf5\x97\x6c\xc8\x63\xef\x4c\x0f\xe9\xfa\xf3\x0f\x71\x16\x58\xab\xce\x3f\x50\x07\xee\x23\x2a\x12\xc8\xb9\x70\x42\x6d\x66\x6b\xd2\x81\x7d\x80\xd4\x53\x6f\x1c\xc5\x37\x8e\x5d\x6b\xda\xb1\xd4\x70\x64\x8d\xe7\x60\x1c\xc7\xbe\xc6\xe1\x3b\x79\xcf\x94\xa1\x32\x18\xe9\xd8\xc1\x91\x32\x7d\x4f\xba\xc6\xe0\xa3\x9a\xd1\xe8\x22\x79\xbe\x70\xae\x92\x7a\x82\x75\xa6\x1e\x54\x14\x74\x5e\x86\xc8\x6c\xd6\x78\x8e\x66\x47\xb3\x7f\x29\x09\x06\xdf\x07\x1f\x10\xc8\x07\x78\x45\x5a\x3a\x36\x3e\x13\x62\x56\x72\xcf\x87\xc1\xa6\xd2\x86\xb4\x63\x1f\x32\xdf\x22\x17\xdb\xbb\x35\x7e\x5f\xe4\x6f\xa0\xc5\x9f\x62\xc6\xe2\x51\x43\x01\xe9\x23\x06\x5b\xcb\x40\x78\xf7\x0e\x7f\x88\xb8\x32\x47\x88\xb5\x0f\xb2\xeb\x90\x4e\x48\xd3\xbd\x71\x8a\xd2\x89\x3c\x6a\xed\x87\xc0\x9d\x7f\x5b\xa0\x3a\x92\x5a\x88\xe2\xf2\x72\x5e\x3b\x7f\x91\xe7\x0d\x87\x76\xd8\x65\xca\xf4\xb9\x32\x8e\x6a\xed\xff\xf9\x3b\x9a\x5f\xd5\xe7\xb5\x19\x75\x67\x64\x9d\x3f\xbd\xcf\x7e\xce\x4e\x8f\x09\x0f\x73\xf4\xd0\xb1\x1e\x0e\x0f\xd1\x48\xd1\x27\x59\x68\x7e\xe0\x98\x11\x83\x79\x98\x20\x1d\xd2\xc3\x8f\xa7\xfd\x2b\x28\x12\x74\x3d\xd2\xd7\xa7\xe2\xef\x00\x00\x00\xff\xff\x02\x98\x43\x49\xf4\x04\x00\x00") + +func testImagesJessieDnsutilsDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesJessieDnsutilsDockerfile, + "test/images/jessie-dnsutils/Dockerfile", + ) +} + +func testImagesJessieDnsutilsDockerfile() (*asset, error) { + bytes, err := testImagesJessieDnsutilsDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/jessie-dnsutils/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesJessieDnsutilsDockerfile_windows = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x93\x51\x6f\xe2\x38\x10\xc7\xdf\xf3\x29\xfe\x82\x93\x6e\x57\x82\x84\x65\xef\x56\x3a\xaa\x3e\xe4\x28\xdd\x45\xdb\x0d\x15\xa1\x5b\x55\x42\xaa\x9c\x64\x48\x46\x75\xec\x9c\xed\x10\xe8\xa7\x3f\x39\x94\xbb\xa2\xe5\x01\x67\x3c\xff\x99\xf9\x79\xc6\x1e\x62\xae\x9b\xa3\xe1\xb2\x72\x98\x4e\xa6\x13\x6c\x2a\xc2\xf7\x36\x23\xa3\xc8\x91\x45\xdc\xba\x4a\x1b\x1b\x06\xc3\x60\x88\x3b\xce\x49\x59\x2a\xd0\xaa\x82\x0c\x5c\x45\x88\x1b\x91\x57\x74\xf6\x8c\xf0\x93\x8c\x65\xad\x30\x0d\x27\xf8\xe0\x05\x83\x37\xd7\xe0\xe3\x55\x30\xc4\x51\xb7\xa8\xc5\x11\x4a\x3b\xb4\x96\xe0\x2a\xb6\xd8\xb1\x24\xd0\x21\xa7\xc6\x81\x15\x72\x5d\x37\x92\x85\xca\x09\x1d\xbb\xaa\x2f\xf3\x96\x24\x0c\x86\x78\x7a\x4b\xa1\x33\x27\x58\x41\x20\xd7\xcd\x11\x7a\xf7\x5e\x07\xe1\x7a\x60\xff\xab\x9c\x6b\x66\x51\xd4\x75\x5d\x28\x7a\xd8\x50\x9b\x32\x92\x27\xa1\x8d\xee\x96\xf3\x45\x92\x2e\xc6\xd3\x70\xd2\x87\x3c\x28\x49\xd6\xc2\xd0\x3f\x2d\x1b\x2a\x90\x1d\x21\x9a\x46\x72\x2e\x32\x49\x90\xa2\x83\x36\x10\xa5\x21\x2a\xe0\xb4\xe7\xed\x0c\x3b\x56\xe5\x08\x56\xef\x5c\x27\x0c\x05\x43\x14\x6c\x9d\xe1\xac\x75\x17\xcd\x3a\xd3\xb1\xbd\x10\x68\x05\xa1\x30\x88\x53\x2c\xd3\x01\xfe\x8e\xd3\x65\x3a\x0a\x86\x78\x5c\x6e\xbe\xad\x1e\x36\x78\x8c\xd7\xeb\x38\xd9\x2c\x17\x29\x56\x6b\xcc\x57\xc9\xcd\x72\xb3\x5c\x25\x29\x56\xb7\x88\x93\x27\x7c\x5f\x26\x37\x23\x10\xbb\x8a\x0c\xe8\xd0\x18\xcf\xaf\x0d\xd8\xb7\x91\x0a\xdf\xb3\x94\xe8\x02\x60\xa7\x4f\x40\xb6\xa1\x9c\x77\x9c\x43\x0a\x55\xb6\xa2\x24\x94\x7a\x4f\x46\xb1\x2a\xd1\x90\xa9\xd9\xfa\x61\x5a\x08\x55\x04\x43\x48\xae\xd9\x09\xd7\xef\xfc\x72\xa8\x30\x08\xe2\xf5\x57\x4f\xbf\x58\xfe\x88\xbf\x2e\x02\x7f\x02\xfa\xdd\x10\x5a\xeb\xd3\x09\xdc\xb1\x6a\x0f\xe0\xda\x97\x71\x1a\xad\x6a\x44\xfe\xd2\xa7\x10\x26\xaf\x78\x4f\x23\x6f\x28\x74\x7d\x94\x9f\xaa\x8f\x63\x07\x8f\xe4\x23\x1e\x59\x15\xba\xb3\x61\x70\xbb\x5e\xfd\xc0\x78\xdc\x48\xe1\x76\xda\xd4\xd7\xd2\x67\x8e\x44\x5d\x7c\xf9\x03\x42\x36\xac\x68\xf6\x39\xfc\x02\x61\xd1\x18\x6a\x82\x20\xbe\xb9\xe9\xaf\x81\x9d\x45\x51\xc9\xae\x6a\xb3\x30\xd7\x75\x94\x6b\x43\x85\xb2\xff\xad\x86\x24\x09\x7f\x27\x0a\xdd\x29\xa9\x45\x11\xed\x3f\x85\x7f\x86\x93\xb3\xe0\xb9\xb7\x9e\xbb\x13\xc6\x73\x5f\x2f\x74\xe5\x2b\xce\x02\x6f\x04\xeb\x87\x04\x4e\x18\x8c\x0f\xaf\xfb\xdd\xa5\xeb\x04\x4e\x53\x72\x24\xea\x28\x6b\xed\x31\xd3\x87\x71\x45\xb2\x21\x33\xfb\x14\x4e\xff\x0a\x27\x1e\xfa\xd2\x71\x0a\xfa\xed\x5d\x63\xe7\xab\xfb\x27\x8c\xc7\x3b\xa3\xeb\x6b\x7f\xc0\xff\x8b\xd0\x81\x2e\x8c\x0b\xe9\x65\x5a\x44\x05\x97\xfd\x9f\x9f\x54\xb2\xda\x2c\x3e\xe4\x52\xb4\x05\xb7\xd9\xc7\x19\x0a\x9d\xbf\x90\x41\xd6\xb2\x2c\x0e\xb0\xe4\x6c\x3f\xa8\xfb\x78\xf3\x0d\xa4\xf6\xd8\x0b\xc3\xfd\x83\x70\xfa\x3c\xd9\xb1\xe4\x97\x93\x62\x84\xae\xe2\xbc\xf2\xd7\xdc\xbf\xf3\x82\x2c\x1b\x2f\x0e\x83\x45\xf2\xb3\x57\x5c\x0f\xe6\xb3\x6d\xc1\xe5\xf6\x6a\x3e\xdb\x66\xac\xfc\x92\xb7\x46\xfa\xf5\x6d\xca\xdb\xf4\x68\x1d\xd5\x9f\xa7\xef\xf6\xfc\xe7\xbd\xd1\xa5\x11\x35\x6e\x59\x92\xdd\xde\xeb\x8e\x4c\x5a\x91\x94\x57\x83\xe0\xdf\x00\x00\x00\xff\xff\x4f\x67\xb6\x01\xcc\x04\x00\x00") + +func testImagesJessieDnsutilsDockerfile_windowsBytes() ([]byte, error) { + return bindataRead( + _testImagesJessieDnsutilsDockerfile_windows, + "test/images/jessie-dnsutils/Dockerfile_windows", + ) +} + +func testImagesJessieDnsutilsDockerfile_windows() (*asset, error) { + bytes, err := testImagesJessieDnsutilsDockerfile_windowsBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/jessie-dnsutils/Dockerfile_windows", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesJessieDnsutilsOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xc9\xcc\x2d\x06\x33\x72\xb3\x4b\x73\x13\x4b\x12\xd3\xb9\x00\x01\x00\x00\xff\xff\x78\x0c\x5f\x33\x21\x00\x00\x00") + +func testImagesJessieDnsutilsOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesJessieDnsutilsOwners, + "test/images/jessie-dnsutils/OWNERS", + ) +} + +func testImagesJessieDnsutilsOwners() (*asset, error) { + bytes, err := testImagesJessieDnsutilsOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/jessie-dnsutils/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesJessieDnsutilsVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe6\x02\x04\x00\x00\xff\xff\x1c\xa7\xbe\x4f\x04\x00\x00\x00") + +func testImagesJessieDnsutilsVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesJessieDnsutilsVersion, + "test/images/jessie-dnsutils/VERSION", + ) +} + +func testImagesJessieDnsutilsVersion() (*asset, error) { + bytes, err := testImagesJessieDnsutilsVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/jessie-dnsutils/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesJessieDnsutilsFixupAptListSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x93\x51\x6f\xdb\x36\x14\x85\xdf\xf9\x2b\xce\xac\x3e\x34\x40\x24\xaa\x69\x91\xa1\x09\xf6\xe0\x26\x19\x6a\xb4\xb0\x01\xdb\x5d\xd1\xa7\x81\xa2\xae\xa5\xdb\x49\x24\x47\x52\x76\x8c\x65\xff\x7d\xa0\x6c\x6f\x33\x12\xec\x69\x7c\x32\x7c\xaf\xee\xf9\xce\xb9\x64\xf6\x83\x1c\x82\x97\x15\x1b\x49\x66\x8b\x4a\x85\x56\x88\x0c\x77\xd6\xed\x3d\x37\x6d\xc4\x55\xf9\xe6\x47\xac\x5b\xc2\xa7\xa1\x22\x6f\x28\x52\xc0\x74\x88\xad\xf5\xa1\x10\x99\xc8\xf0\x99\x35\x99\x40\x35\x06\x53\x93\x47\x6c\x09\x53\xa7\x74\x4b\xa7\xca\x25\x7e\x21\x1f\xd8\x1a\x5c\x15\x25\x5e\xa7\x86\xc9\xb1\x34\xb9\xb8\x15\x19\xf6\x76\x40\xaf\xf6\x30\x36\x62\x08\x84\xd8\x72\xc0\x86\x3b\x02\x3d\x6a\x72\x11\x6c\xa0\x6d\xef\x3a\x56\x46\x13\x76\x1c\xdb\x51\xe6\x38\xa4\x10\x19\xbe\x1d\x47\xd8\x2a\x2a\x36\x50\xd0\xd6\xed\x61\x37\xff\xee\x83\x8a\x23\x70\x3a\x6d\x8c\xee\x46\xca\xdd\x6e\x57\xa8\x11\xb6\xb0\xbe\x91\xdd\xa1\x31\xc8\xcf\xb3\xbb\x87\xf9\xea\x21\xbf\x2a\xca\xf1\x93\x2f\xa6\xa3\x10\xe0\xe9\xf7\x81\x3d\xd5\xa8\xf6\x50\xce\x75\xac\x55\xd5\x11\x3a\xb5\x83\xf5\x50\x8d\x27\xaa\x11\x6d\xe2\xdd\x79\x8e\x6c\x9a\x4b\x04\xbb\x89\x3b\xe5\x49\x64\xa8\x39\x44\xcf\xd5\x10\xcf\xc2\x3a\xd1\x71\x38\x6b\xb0\x06\xca\x60\x32\x5d\x61\xb6\x9a\xe0\xc3\x74\x35\x5b\x5d\x8a\x0c\x5f\x67\xeb\x8f\x8b\x2f\x6b\x7c\x9d\x2e\x97\xd3\xf9\x7a\xf6\xb0\xc2\x62\x89\xbb\xc5\xfc\x7e\xb6\x9e\x2d\xe6\x2b\x2c\x7e\xc6\x74\xfe\x0d\x9f\x66\xf3\xfb\x4b\x10\xc7\x96\x3c\xe8\xd1\xf9\xc4\x6f\x3d\x38\xc5\x48\x75\xca\x6c\x45\x74\x06\xb0\xb1\x07\xa0\xe0\x48\xf3\x86\x35\x3a\x65\x9a\x41\x35\x84\xc6\x6e\xc9\x1b\x36\x0d\x1c\xf9\x9e\x43\x5a\x66\x80\x32\xb5\xc8\xd0\x71\xcf\x51\xc5\xf1\x9f\x67\xa6\x0a\x21\xee\x1f\x3e\xfc\x3a\x5d\xde\x7d\xfc\xe9\xd5\xeb\xda\xfd\xd6\x20\xcf\x9d\x67\x13\x73\xe5\x75\xcb\x91\x74\x1c\x3c\x5d\xa4\x2b\x77\x5c\x49\x20\x3d\x78\x8e\xfb\xa2\xa6\x8a\x95\x19\xf7\x72\xf8\x99\x9f\x4a\x32\xe5\x14\xe4\x77\x0a\x81\x49\x0e\xae\x56\x91\x82\x9c\x99\x25\x75\xa4\x0e\x49\x8e\x90\xa6\x11\x19\xc8\x44\xcf\x14\x46\x77\xc1\xf6\x04\xd7\xa9\xb8\xb1\xbe\x0f\x69\x37\xd8\x11\xbe\x0f\x21\xc2\x53\x6f\xb7\x87\x3c\x3a\x15\x22\x3a\x36\x94\xf6\x18\xec\xe0\x35\x85\xa2\xe3\x90\xee\xa1\xc8\x20\x29\x6a\xa9\x5c\x94\x67\xa5\x5d\xcb\xba\x4d\xca\x93\x9a\xaa\x93\x97\x9a\xaa\xe7\x36\x70\xe0\xce\x8f\xdc\xe8\x15\x9b\x89\x10\x3a\x91\xbf\xfa\xe3\x14\xd7\x9f\x49\x2c\xdd\xd4\xf0\xf6\x7d\xf9\xf8\xa4\x7c\x7f\xfd\xee\xc9\x39\x7d\xfd\x8e\xba\x8b\xb1\x90\x4e\x96\xf8\x5b\x95\xc0\xed\xf1\xe9\x10\xc6\x64\xb7\x84\x9e\xbd\x1f\x5f\xe9\x3f\xdd\x2b\xa2\x9b\x11\x2e\xdc\x48\x99\xb8\xc3\x0b\x31\xd7\xb4\xa5\x2e\x57\xc6\xd8\xc1\x68\x92\x57\xe5\x9b\xf7\xb2\x7c\x2b\xfb\xd0\x94\x65\x59\x5e\x17\x6d\xec\xbb\xbf\x67\x92\x6e\xed\x99\xe7\xa3\xfa\xf3\xb9\xf2\x68\x7c\x34\x0c\x6d\xd3\x5e\x2a\x18\x6b\xf2\x8d\x27\x9a\xe0\x09\x91\xe8\xe5\x74\x9f\xab\xe5\xc1\xeb\xff\x49\x31\x57\xff\x2d\x7a\x7b\x2b\x28\x28\x2d\x04\x3d\x72\x44\x29\xfe\x0a\x00\x00\xff\xff\x89\x46\xbb\xca\x32\x05\x00\x00") + +func testImagesJessieDnsutilsFixupAptListShBytes() ([]byte, error) { + return bindataRead( + _testImagesJessieDnsutilsFixupAptListSh, + "test/images/jessie-dnsutils/fixup-apt-list.sh", + ) +} + +func testImagesJessieDnsutilsFixupAptListSh() (*asset, error) { + bytes, err := testImagesJessieDnsutilsFixupAptListShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/jessie-dnsutils/fixup-apt-list.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesKittenBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x0d\x72\x75\xf7\x0c\x0e\x09\x8a\xd4\x4f\x4c\xcf\xcb\xc8\x2f\x2e\xb1\x32\xd2\x33\x32\xd4\x05\xab\xd0\x05\xab\xe0\x82\xaa\x2e\xca\xc5\xaf\xb6\x28\x17\xa1\x92\x90\xb9\x20\x15\x50\xd5\x05\x05\xc9\x66\x26\x39\xa9\x78\xd5\x43\xd5\x40\x75\x14\x1b\x5b\x1a\x54\xe0\x55\x0f\x56\xc1\x55\x9e\x99\x97\x92\x5f\x5e\x0c\xf1\xa7\xbe\xa1\x85\x81\x25\x0e\x4d\x50\x85\x10\xef\xea\x82\x14\xa2\xeb\xb5\x34\x30\x26\x4e\xaf\xa5\x81\x31\xa6\x5e\x22\xed\xb5\x34\xb0\xe4\x02\x04\x00\x00\xff\xff\x3f\x6b\x27\xe4\x9a\x01\x00\x00") + +func testImagesKittenBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesKittenBaseimage, + "test/images/kitten/BASEIMAGE", + ) +} + +func testImagesKittenBaseimage() (*asset, error) { + bytes, err := testImagesKittenBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/kitten/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesKittenDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x41\x53\xdb\x30\x10\x85\xef\xfa\x15\x6f\xec\x1e\xda\x99\xe0\x50\x0e\x3d\xb4\x27\x37\x04\xea\x01\xec\x4e\x1c\xca\x30\x9d\x1e\x64\x7b\x63\x2f\x75\x24\x55\x5a\x63\xf2\xef\x3b\x0e\xa1\x90\xa9\x4e\x2b\xbd\xa7\xd5\xa7\xb7\x31\x16\xd6\xed\x3c\xb7\x9d\xe0\xec\xf4\xe3\x27\xac\x3b\xc2\xd5\x50\x91\x37\x24\x14\x90\x0e\xd2\x59\x1f\x12\x15\xab\x18\xd7\x5c\x93\x09\xd4\x60\x30\x0d\x79\x48\x47\x48\x9d\xae\x3b\x7a\x51\x66\xf8\x41\x3e\xb0\x35\x38\x4b\x4e\xf1\x7e\x32\x44\x07\x29\xfa\xf0\x45\xc5\xd8\xd9\x01\x5b\xbd\x83\xb1\x82\x21\x10\xa4\xe3\x80\x0d\xf7\x04\x7a\xaa\xc9\x09\xd8\xa0\xb6\x5b\xd7\xb3\x36\x35\x61\x64\xe9\xf6\xcf\x1c\x9a\x24\x2a\xc6\xfd\xa1\x85\xad\x44\xb3\x81\x46\x6d\xdd\x0e\x76\xf3\xd6\x07\x2d\x7b\xe0\x69\x75\x22\xee\xf3\x7c\x3e\x8e\x63\xa2\xf7\xb0\x89\xf5\xed\xbc\x7f\x36\x86\xf9\x75\xb6\x58\xe6\xe5\xf2\xe4\x2c\x39\xdd\x5f\xb9\x35\x3d\x85\x00\x4f\x7f\x06\xf6\xd4\xa0\xda\x41\x3b\xd7\x73\xad\xab\x9e\xd0\xeb\x11\xd6\x43\xb7\x9e\xa8\x81\xd8\x89\x77\xf4\x2c\x6c\xda\x19\x82\xdd\xc8\xa8\x3d\xa9\x18\x0d\x07\xf1\x5c\x0d\x72\x14\xd6\x0b\x1d\x87\x23\x83\x35\xd0\x06\x51\x5a\x22\x2b\x23\x7c\x4d\xcb\xac\x9c\xa9\x18\x77\xd9\xfa\x5b\x71\xbb\xc6\x5d\xba\x5a\xa5\xf9\x3a\x5b\x96\x28\x56\x58\x14\xf9\x79\xb6\xce\x8a\xbc\x44\x71\x81\x34\xbf\xc7\x55\x96\x9f\xcf\x40\x2c\x1d\x79\xd0\x93\xf3\x13\xbf\xf5\xe0\x29\x46\x6a\xa6\xcc\x4a\xa2\x23\x80\x8d\x7d\x06\x0a\x8e\x6a\xde\x70\x8d\x5e\x9b\x76\xd0\x2d\xa1\xb5\x8f\xe4\x0d\x9b\x16\x8e\xfc\x96\xc3\x34\xcc\x00\x6d\x1a\x15\xa3\xe7\x2d\x8b\x96\xfd\xc9\x7f\x9f\x4a\x94\x4a\x57\x97\x13\xfd\x32\xbb\x49\x2f\x97\xea\x62\x55\xdc\xe0\xdd\xeb\x7e\x51\x7c\xbf\x47\x27\xdb\x7e\xfe\x9b\x45\xc8\x24\x0f\xae\xc5\x6b\xf9\x46\x6f\xb4\xe8\xe4\x21\x58\x83\x7f\x95\x5a\xdc\x9c\xe3\x67\x24\x14\xe4\x64\xa4\x2a\x90\x7f\x24\x1f\xfd\x52\x7f\x03\x00\x00\xff\xff\xe4\xdf\x68\x02\xbf\x02\x00\x00") + +func testImagesKittenDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesKittenDockerfile, + "test/images/kitten/Dockerfile", + ) +} + +func testImagesKittenDockerfile() (*asset, error) { + bytes, err := testImagesKittenDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/kitten/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesKittenOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xce\x49\x2c\x4d\xc9\x2c\x4d\x4a\xcd\x29\x05\xf3\x73\xb3\x4b\x73\x13\x4b\x12\xd3\xb9\x00\x01\x00\x00\xff\xff\xeb\x9e\xa3\x19\x28\x00\x00\x00") + +func testImagesKittenOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesKittenOwners, + "test/images/kitten/OWNERS", + ) +} + +func testImagesKittenOwners() (*asset, error) { + bytes, err := testImagesKittenOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/kitten/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesKittenVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe1\x02\x04\x00\x00\xff\xff\xdb\x31\xff\x00\x04\x00\x00\x00") + +func testImagesKittenVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesKittenVersion, + "test/images/kitten/VERSION", + ) +} + +func testImagesKittenVersion() (*asset, error) { + bytes, err := testImagesKittenVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/kitten/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesKittenHtmlDataJson = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xaa\xe6\x52\x50\x50\xca\xcc\x4d\x4c\x4f\x55\xb2\x52\x50\xca\xce\x2c\x29\x49\xcd\xd3\xcb\x2a\x48\x57\xe2\xaa\xe5\x02\x04\x00\x00\xff\xff\x27\x07\xd0\xf9\x1c\x00\x00\x00") + +func testImagesKittenHtmlDataJsonBytes() ([]byte, error) { + return bindataRead( + _testImagesKittenHtmlDataJson, + "test/images/kitten/html/data.json", + ) +} + +func testImagesKittenHtmlDataJson() (*asset, error) { + bytes, err := testImagesKittenHtmlDataJsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/kitten/html/data.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesMetadataConcealmentDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x91\x51\x6f\xd3\x30\x14\x85\xdf\xfd\x2b\x8e\x92\x17\x90\x4a\x32\xf6\xc0\x03\x3c\x85\xae\x13\xd1\x46\x32\x35\x19\x53\x85\xd0\xe4\x3a\xb7\xc9\x15\x89\x1d\xec\x1b\xb2\xfe\x7b\x94\x6e\x93\xa8\x10\x7e\xf4\xfd\x7c\xfc\xf9\x38\xc6\xda\x8d\x47\xcf\x6d\x27\xb8\xbc\x78\xff\x01\x75\x47\xb8\x99\xf6\xe4\x2d\x09\x05\x64\x93\x74\xce\x87\x44\xc5\x2a\xc6\x2d\x1b\xb2\x81\x1a\x4c\xb6\x21\x0f\xe9\x08\xd9\xa8\x4d\x47\xaf\x93\x15\xbe\x91\x0f\xec\x2c\x2e\x93\x0b\xbc\x59\x80\xe8\x65\x14\xbd\xfd\xa4\x62\x1c\xdd\x84\x41\x1f\x61\x9d\x60\x0a\x04\xe9\x38\xe0\xc0\x3d\x81\x9e\x0c\x8d\x02\xb6\x30\x6e\x18\x7b\xd6\xd6\x10\x66\x96\xee\x74\xcd\x4b\x48\xa2\x62\xec\x5e\x22\xdc\x5e\x34\x5b\x68\x18\x37\x1e\xe1\x0e\x7f\x73\xd0\x72\x12\x5e\x56\x27\x32\x7e\x4c\xd3\x79\x9e\x13\x7d\x92\x4d\x9c\x6f\xd3\xfe\x19\x0c\xe9\x6d\xbe\xde\x14\xd5\xe6\xdd\x65\x72\x71\x3a\x72\x6f\x7b\x0a\x01\x9e\x7e\x4d\xec\xa9\xc1\xfe\x08\x3d\x8e\x3d\x1b\xbd\xef\x09\xbd\x9e\xe1\x3c\x74\xeb\x89\x1a\x88\x5b\x7c\x67\xcf\xc2\xb6\x5d\x21\xb8\x83\xcc\xda\x93\x8a\xd1\x70\x10\xcf\xfb\x49\xce\xca\x7a\xb5\xe3\x70\x06\x38\x0b\x6d\x11\x65\x15\xf2\x2a\xc2\xe7\xac\xca\xab\x95\x8a\xf1\x90\xd7\x5f\xca\xfb\x1a\x0f\xd9\x76\x9b\x15\x75\xbe\xa9\x50\x6e\xb1\x2e\x8b\xab\xbc\xce\xcb\xa2\x42\x79\x8d\xac\xd8\xe1\x26\x2f\xae\x56\x20\x96\x8e\x3c\xe8\x69\xf4\x8b\xbf\xf3\xe0\xa5\x46\x6a\x96\xce\x2a\xa2\x33\x81\x83\x7b\x16\x0a\x23\x19\x3e\xb0\x41\xaf\x6d\x3b\xe9\x96\xd0\xba\xdf\xe4\x2d\xdb\x16\x23\xf9\x81\xc3\xf2\x99\x01\xda\x36\x2a\x46\xcf\x03\x8b\x96\xd3\xce\x3f\x8f\x4a\x94\xba\xde\x96\x5f\x11\x8c\xd7\x62\x3a\xa5\xd6\xe5\xdd\x0e\xa6\x23\xf3\xf3\x71\x20\xd1\x8d\x16\xfd\x68\x9c\x35\xa4\xfb\x81\xac\x20\x55\x6a\x53\xd4\xdb\xdd\x5d\x99\x17\x35\xbe\x47\xe9\xff\xd9\xe8\x87\xfa\x13\x00\x00\xff\xff\x3e\xaf\x22\x2c\xa8\x02\x00\x00") + +func testImagesMetadataConcealmentDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesMetadataConcealmentDockerfile, + "test/images/metadata-concealment/Dockerfile", + ) +} + +func testImagesMetadataConcealmentDockerfile() (*asset, error) { + bytes, err := testImagesMetadataConcealmentDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/metadata-concealment/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesMetadataConcealmentMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x41\x6f\x9b\x40\x10\x85\xcf\xdd\x5f\xf1\x64\x72\xb0\x25\x07\xa7\x51\x95\x4a\xa9\xa2\x8a\xda\xae\x83\x92\x42\x05\x4e\xa2\x9c\xac\x05\xc6\x30\x2a\xec\xd2\xdd\xa5\xd8\xff\xbe\x5a\x27\x91\x1a\x95\xdb\xcc\xbc\x79\xf3\xf1\x36\xc0\x52\xf7\x47\xc3\x75\xe3\x70\x79\xf1\xf1\x0a\xdb\x86\x70\x37\x14\x64\x14\x39\xb2\x88\x06\xd7\x68\x63\x43\x11\x88\x00\xf7\x5c\x92\xb2\x54\x61\x50\x15\x19\xb8\x86\x10\xf5\xb2\x6c\xe8\x6d\x32\xc7\x23\x19\xcb\x5a\xe1\x32\xbc\xc0\xd4\x0b\x26\xaf\xa3\xc9\xec\x8b\x08\x70\xd4\x03\x3a\x79\x84\xd2\x0e\x83\x25\xb8\x86\x2d\xf6\xdc\x12\xe8\x50\x52\xef\xc0\x0a\xa5\xee\xfa\x96\xa5\x2a\x09\x23\xbb\xe6\x74\xe6\xd5\x24\x14\x01\x9e\x5f\x2d\x74\xe1\x24\x2b\x48\x94\xba\x3f\x42\xef\xff\xd5\x41\xba\x13\xb0\xff\x1a\xe7\xfa\xeb\xc5\x62\x1c\xc7\x50\x9e\x60\x43\x6d\xea\x45\xfb\x22\xb4\x8b\xfb\x78\xb9\x4e\xf2\xf5\xf9\x65\x78\x71\x5a\x79\x50\x2d\x59\x0b\x43\xbf\x07\x36\x54\xa1\x38\x42\xf6\x7d\xcb\xa5\x2c\x5a\x42\x2b\x47\x68\x03\x59\x1b\xa2\x0a\x4e\x7b\xde\xd1\xb0\x63\x55\xcf\x61\xf5\xde\x8d\xd2\x90\x08\x50\xb1\x75\x86\x8b\xc1\xbd\x0b\xeb\x8d\x8e\xed\x3b\x81\x56\x90\x0a\x93\x28\x47\x9c\x4f\xf0\x2d\xca\xe3\x7c\x2e\x02\x3c\xc5\xdb\xdb\xf4\x61\x8b\xa7\x28\xcb\xa2\x64\x1b\xaf\x73\xa4\x19\x96\x69\xb2\x8a\xb7\x71\x9a\xe4\x48\xbf\x23\x4a\x9e\x71\x17\x27\xab\x39\x88\x5d\x43\x06\x74\xe8\x8d\xe7\xd7\x06\xec\x63\xa4\xca\x67\x96\x13\xbd\x03\xd8\xeb\x17\x20\xdb\x53\xc9\x7b\x2e\xd1\x4a\x55\x0f\xb2\x26\xd4\xfa\x0f\x19\xc5\xaa\x46\x4f\xa6\x63\xeb\x1f\xd3\x42\xaa\x4a\x04\x68\xb9\x63\x27\xdd\xa9\xf3\xdf\x4f\x85\x42\xe4\xd9\x32\xbf\x29\x1b\x2a\x7f\xed\x3a\x72\xb2\x92\x4e\xee\x4a\xad\x4a\x92\x6d\x47\xca\x89\x34\xc7\xd7\x1b\xb4\xac\x86\x83\x88\xb2\xe5\xad\xaf\x64\x57\x5d\x7d\x12\xdb\x28\xdb\xac\xb7\xbe\x3e\x9b\x2e\x1f\xb2\x55\x9c\xcd\xc4\x26\x8d\xb2\x1f\xbe\xf5\x59\x6c\xd2\xfb\x28\xd9\xec\x1e\xd7\x59\x1e\xa7\xc9\xc9\x44\x3a\xb2\xce\x5f\xdc\xad\xe2\x0c\x7e\x4f\x69\x57\xb1\xc1\xd9\xd4\x36\xd4\xb6\xe8\xc7\x6a\x36\x13\x74\xe8\xb5\x71\x42\x14\xac\xae\xc5\x87\x30\x5c\x70\x27\x6b\x3a\x1f\x1c\xb7\xa1\x6d\x50\xb0\xc2\xd9\xd4\x73\xcf\x84\x08\x7f\xde\xa6\xc9\xf3\xb5\x6f\x8a\xbf\x01\x00\x00\xff\xff\xf0\x72\x29\x8b\x17\x03\x00\x00") + +func testImagesMetadataConcealmentMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesMetadataConcealmentMakefile, + "test/images/metadata-concealment/Makefile", + ) +} + +func testImagesMetadataConcealmentMakefile() (*asset, error) { + bytes, err := testImagesMetadataConcealmentMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/metadata-concealment/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesMetadataConcealmentOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xc9\xcc\x2d\xe6\x02\x04\x00\x00\xff\xff\xe2\x68\x65\xd7\x14\x00\x00\x00") + +func testImagesMetadataConcealmentOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesMetadataConcealmentOwners, + "test/images/metadata-concealment/OWNERS", + ) +} + +func testImagesMetadataConcealmentOwners() (*asset, error) { + bytes, err := testImagesMetadataConcealmentOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/metadata-concealment/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesMetadataConcealmentVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe6\x02\x04\x00\x00\xff\xff\x1c\xa7\xbe\x4f\x04\x00\x00\x00") + +func testImagesMetadataConcealmentVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesMetadataConcealmentVersion, + "test/images/metadata-concealment/VERSION", + ) +} + +func testImagesMetadataConcealmentVersion() (*asset, error) { + bytes, err := testImagesMetadataConcealmentVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/metadata-concealment/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesMetadataConcealmentCheck_metadata_concealmentGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xbc\x58\x6d\x4f\xe3\xb8\x16\xfe\x5c\xff\x8a\x33\x91\xba\xb7\x5d\xa5\x49\x07\x66\xe0\x2e\xab\x6a\xd4\xe5\x65\xb7\x9a\x19\x18\x51\xd8\xb9\xab\xd5\x8a\x71\x93\x93\xc4\xc2\xb5\x83\xed\xb4\x54\x23\xfe\xfb\x95\xf3\x46\x29\xa5\x5b\x5a\x98\x0f\xd0\x36\x39\x7e\xce\x73\x5e\x7d\x6c\xff\x67\x72\x28\xd3\x99\x62\x71\x62\x60\xa7\xfb\x76\x1f\x2e\x12\x84\x8f\xd9\x08\x95\x40\x83\x1a\xfa\x99\x49\xa4\xd2\x1e\x21\x9f\x58\x80\x42\x63\x08\x99\x08\x51\x81\x49\x10\xfa\x29\x0d\x12\x84\xf2\x8d\x0b\x7f\xa2\xd2\x4c\x0a\xd8\xf1\xba\xd0\xb2\x02\x4e\xf9\xca\x69\xff\x4a\x66\x32\x83\x31\x9d\x81\x90\x06\x32\x8d\x60\x12\xa6\x21\x62\x1c\x01\x6f\x03\x4c\x0d\x30\x01\x81\x1c\xa7\x9c\x51\x11\x20\x4c\x99\x49\x72\x25\x25\x84\x47\xfe\x2a\x01\xe4\xc8\x50\x26\x80\x42\x20\xd3\x19\xc8\x68\x5e\x0a\xa8\x21\x04\x00\x20\x31\x26\x3d\xf0\xfd\xe9\x74\xea\xd1\x9c\xa5\x27\x55\xec\xf3\x42\x4a\xfb\x9f\x06\x87\xc7\xa7\xc3\xe3\xce\x8e\xd7\x25\xe4\x52\x70\xd4\x1a\x14\xde\x64\x4c\x61\x08\xa3\x19\xd0\x34\xe5\x2c\xa0\x23\x8e\xc0\xe9\x14\xa4\x02\x1a\x2b\xc4\x10\x8c\xb4\x3c\xa7\x8a\x19\x26\x62\x17\xb4\x8c\xcc\x94\x2a\x24\x21\xd3\x46\xb1\x51\x66\x1e\x38\xa8\x62\xc5\x34\xcc\x0b\x48\x01\x54\x80\xd3\x1f\xc2\x60\xe8\xc0\x6f\xfd\xe1\x60\xe8\x92\xaf\x83\x8b\x3f\xce\x2e\x2f\xe0\x6b\xff\xfc\xbc\x7f\x7a\x31\x38\x1e\xc2\xd9\x39\x1c\x9e\x9d\x1e\x0d\x2e\x06\x67\xa7\x43\x38\x3b\x81\xfe\xe9\x5f\xf0\x71\x70\x7a\xe4\x02\x32\x93\xa0\x02\xbc\x4d\x95\xe5\x2e\x15\x30\xeb\x3a\x0c\x3d\x32\x44\x7c\xa0\x3c\x92\x05\x19\x9d\x62\xc0\x22\x16\x00\xa7\x22\xce\x68\x8c\x10\xcb\x09\x2a\xc1\x44\x0c\x29\xaa\x31\xd3\x36\x78\x1a\xa8\x08\x09\x67\x63\x66\xa8\xc9\x7f\x3f\x32\xc7\x23\x3f\xfb\x84\xa4\x34\xb8\xb6\x20\x63\xca\x04\x21\x6c\x9c\x4a\x65\xa0\x45\x1a\x4e\x34\x36\x0e\x69\x38\x4c\xfa\x4c\x66\x86\x71\xfb\x83\xcb\xd8\x7e\x08\x34\xbe\x8d\x8c\xfd\x2e\xb5\xfd\xaf\x30\xc6\xdb\xd4\x21\x6d\x42\x26\x54\xd9\xf5\x3a\x0b\x02\xd4\xfa\x58\x84\xa9\x64\xc2\x68\xe8\xc1\xdf\xff\x58\xdf\x89\xf8\x3b\x69\x34\x7c\x1f\x8e\x98\x0e\x2c\xf3\x19\x69\x34\x9c\x32\xd0\x6f\xf7\x7e\xf1\x76\xde\xbf\xf3\xca\x4f\xc7\x9d\x7b\x37\x46\x43\x43\x6a\xa8\x17\x4b\x19\x73\xf4\x98\x30\xa8\x04\xe5\x0f\x84\x16\x00\xfc\xb5\x10\xd6\x94\xea\x7a\x6f\xd7\x16\x5c\x13\xd2\x56\x4a\x66\xf0\x73\xf9\x7e\xa3\x45\xfe\xa4\xa0\xe5\xfb\xd0\xe7\x5c\x4e\x31\x84\xfe\x97\x01\x4c\x8a\x2a\xd6\xde\x66\x90\x7e\x85\x39\x44\x35\x61\x01\x02\x0d\x02\x99\x09\x03\x46\x5e\xa3\x00\xac\xe2\xba\x29\x3c\x13\xda\xd8\x0e\xe1\xeb\x02\xbf\x53\xe2\x6b\x3f\xc4\x88\x66\xdc\xf8\xb9\xa2\x8a\xc5\x17\x9b\xd9\xc6\x56\x9d\xc2\x20\x53\x9a\x4d\x10\x6e\x32\x54\x33\x5b\xca\xc3\x7e\xcd\xe7\xf5\xe8\x7c\xa8\x15\xf7\x8c\xca\xb0\x22\xf6\x51\xc8\xa9\x28\xa9\xa4\x54\xd1\xf1\xf6\x1e\x31\x34\xd6\x1f\x28\x37\x3d\x83\xb7\x66\xd3\x94\x58\x80\x9b\x52\x66\xae\x22\xa9\xae\x82\x84\x8a\x18\x7b\x11\xe5\x1a\x5f\x09\xdb\xba\xe7\x27\xc3\xc6\x28\x33\x73\xa5\x31\xe8\x75\x5f\x53\x11\xa7\xda\x5c\xa1\xa1\x71\x2f\xdc\x7d\x17\x8e\x76\x77\x23\xab\xed\x8e\x34\x38\xc6\x34\x98\x0d\x37\xea\x43\x2b\x4b\xdb\xbe\xec\x6c\x53\xae\x23\x34\x74\xfb\x9a\x7d\x40\x65\xb3\x7e\x53\x71\x79\xd1\x62\x7f\xc8\xeb\xc9\x7a\xa2\x41\xbe\x4f\x6f\xc7\xfb\x99\x5d\x64\xc3\x62\x7d\x9e\x45\x1f\x74\x20\x53\xd4\x65\x16\x0a\x69\xc7\xb0\x63\x31\x59\x91\x81\x87\x09\x06\xd7\x60\x12\x6a\xec\xfe\xac\x11\x42\x29\xfe\x63\x20\x46\x03\x74\xae\xdf\x29\xd4\x19\xdf\xbe\xc3\xdd\x37\xb2\xe6\xee\x51\xd1\xca\x00\xc0\xf7\x21\x53\x1c\x45\x20\x43\x0c\x5f\x40\x45\xb3\xfb\xdf\x85\x7e\x69\x55\x8c\x68\x70\xad\x53\x1a\x58\x15\x77\xa4\x11\x51\xc6\x33\x85\x2b\x5c\x73\x96\xcf\x47\x1b\xd4\xc6\xce\xa6\x15\xb1\x53\x17\xc3\x75\x36\xc2\x0e\x8a\xc9\x06\x39\x42\x4d\x39\x25\x6a\xbf\x42\x79\xa1\x44\x7f\x41\xe4\x7f\x07\xf5\x7d\xf8\xf3\x33\xb0\x10\x85\x61\x66\xf6\x92\xb5\x52\x61\xbe\x76\xf9\x6f\xab\xe7\xb9\x2a\x7c\x1f\x4e\xa4\x1a\xb1\x30\x44\xb1\x30\xaa\x30\xdc\x7e\x34\x58\x36\x84\x6c\x07\xd8\xdc\xdf\x69\xee\xbd\x6f\xee\xed\x36\xf7\xdf\xdb\xef\xfb\xbb\xcd\xbd\x5f\x9a\xfb\x7b\xcd\xbd\xf7\x73\x75\x9b\x29\xde\xb9\xef\x0d\xbe\x0f\x97\xe2\x7a\xb1\x97\xc2\x35\xae\x97\x22\x2b\xf9\x68\x39\x46\x93\x30\x11\xf7\xf0\x45\x26\x94\x0f\x59\xc1\xb4\x8a\x4e\xde\x50\xb6\xa6\x39\x57\x30\xaf\x53\x86\x9e\xf7\x3a\x95\xfe\x28\x8b\x7f\x44\xa5\x78\xde\x7a\xd5\x73\x67\xcf\x8f\x51\x26\x82\xfc\x34\xda\x6a\xc3\xf7\xfa\x1c\x09\x07\x3d\xe8\x92\x46\x62\x3f\xc7\x34\xfd\xbb\xd8\x24\xfe\x99\xdf\x2d\x9c\x8a\x4c\xe7\x84\xd3\x89\x54\xce\x01\x7c\x77\x7e\xcf\x79\x3b\x77\xc5\x66\x6c\xcf\xd0\x57\x2e\xa0\x45\x51\x76\x84\x84\x47\xc7\x54\x8b\xc4\x22\x40\xa5\xac\x50\x60\x77\xe6\xcb\xf3\x4f\x2d\x74\x21\x71\x61\xa7\xdb\x75\xc1\x71\xec\x5f\xfb\xd7\x5c\xe6\x4d\x0f\x04\xe3\xf9\xaa\x06\x97\xb1\xf7\x45\x31\x61\xa2\x96\xf3\x55\x49\x11\xdb\x1d\x3b\x95\xd5\xe1\xbd\x39\x39\x80\xe6\xc4\x71\x01\x5d\xbb\xb4\x6d\x97\x54\xd6\xf5\xe0\x2d\x69\x58\x86\x4b\x49\x2e\x99\x21\x56\xd2\x7c\xd7\xdd\x2d\x69\xd6\x89\xf3\x23\xe9\x3e\xda\xd5\xd7\x24\xfb\x7a\x24\xab\xc3\x40\x45\xe9\xf8\x36\xc5\xc0\x60\x38\x34\xd4\x64\x79\x6e\xed\x74\xbb\x64\x19\xc7\x97\xaa\xe7\x90\x69\x3a\xe2\xd8\x29\x78\x74\xea\x89\xda\x99\xcb\xab\xb2\xdd\xd6\x7e\xe8\xdd\xfb\xc1\xf7\x61\x10\xc1\xb7\xa7\x50\xbe\x01\xd3\xa0\xd1\xce\xeb\x60\x51\xdc\x6a\xc3\xb1\x0f\x32\x11\x48\x11\x20\xe5\x18\x42\xb1\xf0\x7e\xa0\x87\x29\xe3\x1c\x14\x9a\x4c\x09\xa0\x36\x16\xb6\x35\xae\x74\x56\xcf\x4a\x3d\x11\xf9\x27\x8e\x5c\x2b\xe3\xbf\x4a\xd9\x0f\x48\x8c\xdb\x13\xa9\xa6\x54\x85\x18\x9e\x48\xf5\x07\xd2\x10\xd5\xaa\x1e\xf3\xbf\x4e\x2d\x6f\xbf\xe5\x3d\x66\x28\xc7\x38\x92\xe1\xac\x63\xf7\xae\x69\x82\xaa\xee\x37\x0f\x67\xfb\x4a\xff\xbd\xf7\x6d\xa5\x00\x8b\x60\x01\xd5\x46\x33\x55\xa8\x31\xbf\xcf\xd8\xaa\x69\x2d\x31\x6f\xeb\x92\x2b\x2e\x75\x17\x38\xaf\xd7\x2c\xa4\xf6\x8e\x6f\x99\x69\x95\xef\xda\xe4\x8e\x90\xca\x49\xba\xf0\x12\x85\xcb\xf3\x4f\xf7\xf7\xc6\x31\x9b\xa0\x80\x24\x67\xae\xcb\x4c\xd5\xf9\x9b\xe2\xb6\xdb\xce\x24\x1e\x29\xea\x03\xcb\xe4\xb9\x90\x87\x52\xe4\xb7\xcb\x4c\x83\x90\xa2\x83\xe3\xd4\xcc\xdc\xc2\x31\xba\x3e\x68\x81\x0d\x1a\x04\x85\xa8\x7e\xbc\x3a\x87\x1d\xb2\x31\xe3\x54\xf1\x99\x6b\x03\x75\x2f\x73\x2a\xcd\x33\x94\x84\x12\xb5\x3d\xd2\x95\xca\x96\xe2\x78\xc5\xd6\x57\x47\x2f\x53\x1c\x8a\xcc\x73\x4b\xfb\xf3\xeb\x70\xaf\x8a\x22\x3e\xac\x4b\x26\x8c\xfb\xd8\x06\x77\x39\xe5\x02\xb7\x6d\x63\x25\x95\x0d\x7b\xc0\x19\x0a\x63\xb3\xe7\xa7\x5c\xc9\x61\xfe\xfb\xfb\x1d\x69\x28\xbc\x71\xab\xcc\xca\x5f\x9d\xe2\xf4\x1c\x6f\x32\xd4\xa6\xe5\xfc\x7e\x7c\xe1\xb8\x76\x3a\x74\x6d\xfe\xb4\xeb\x16\x3a\x97\x4f\x65\x73\x41\xa5\xf2\x0c\x50\x78\x53\x5a\x00\xbd\xd2\x2c\xfb\x50\xa7\xb5\x92\x82\x8a\x77\x24\x5b\x0a\x6f\xd6\x81\x0c\x31\x42\x95\x27\xa9\xf7\x9b\x0c\x67\xde\x21\x97\x1a\x5b\xc5\xca\xfc\x69\xe1\xa1\x43\x19\xa2\x45\x59\xf0\xdb\x1c\x60\x34\x36\xde\xb1\xf5\x48\xd4\x72\x32\x51\xc9\xd5\xe9\x7f\x00\xb1\x34\xd0\x0c\x5d\x98\x52\x61\xbf\x38\xee\x22\xfe\x62\x54\xda\x39\x41\x9b\x02\xb5\x79\xc5\x6d\xba\x77\x8e\x34\xec\x73\xde\xaa\x69\xaf\x63\x29\x5b\x96\xe3\x6f\x7a\xe0\x38\xb9\xf4\x98\x9a\x20\xc1\xb0\x56\x55\xdc\xca\x7b\x9f\xed\xe3\xd6\x92\xd4\x18\x15\x6a\x97\xe8\x7d\xa0\xd8\x6a\xb6\x32\x6f\x4a\xfc\x07\x12\xf3\x3e\x2b\x52\x9d\x85\xf3\x99\xde\xbc\x29\xdd\x96\x77\x87\xc7\x1c\x8a\x4c\x6c\xe5\x54\xda\x75\x9f\x78\xaa\xd4\x9e\x6d\xeb\xfd\xda\x67\x9b\xbb\x96\xb5\x4c\x04\x52\x29\x0c\x0c\xaf\x3b\x09\x86\x4f\x19\x3d\x4f\x66\xb9\xdd\xa5\x1a\xc1\x38\xb9\x23\xff\x0f\x00\x00\xff\xff\x6b\xf2\x86\x74\xd6\x1b\x00\x00") + +func testImagesMetadataConcealmentCheck_metadata_concealmentGoBytes() ([]byte, error) { + return bindataRead( + _testImagesMetadataConcealmentCheck_metadata_concealmentGo, + "test/images/metadata-concealment/check_metadata_concealment.go", + ) +} + +func testImagesMetadataConcealmentCheck_metadata_concealmentGo() (*asset, error) { + bytes, err := testImagesMetadataConcealmentCheck_metadata_concealmentGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/metadata-concealment/check_metadata_concealment.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNautilusBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x0d\x72\x75\xf7\x0c\x0e\x09\x8a\xd4\x4f\x4c\xcf\xcb\xc8\x2f\x2e\xb1\x32\xd2\x33\x32\xd4\x05\xab\xd0\x05\xab\xe0\x82\xaa\x2e\xca\xc5\xaf\xb6\x28\x17\xa1\x92\x90\xb9\x20\x15\x50\xd5\x05\x05\xc9\x66\x26\x39\xa9\x78\xd5\x43\xd5\x40\x75\x14\x1b\x5b\x1a\x54\xe0\x55\x0f\x56\xc1\x55\x9e\x99\x97\x92\x5f\x5e\x0c\xf1\xa7\xbe\xa1\x85\x81\x25\x0e\x4d\x50\x85\x10\xef\xea\x82\x14\xa2\xeb\xb5\x34\x30\x26\x4e\xaf\xa5\x81\x31\xa6\x5e\x22\xed\xb5\x34\xb0\xe4\x02\x04\x00\x00\xff\xff\x3f\x6b\x27\xe4\x9a\x01\x00\x00") + +func testImagesNautilusBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesNautilusBaseimage, + "test/images/nautilus/BASEIMAGE", + ) +} + +func testImagesNautilusBaseimage() (*asset, error) { + bytes, err := testImagesNautilusBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nautilus/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNautilusDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\xc1\x72\x9b\x30\x10\x86\xef\x7a\x8a\x7f\xa0\x87\x76\xc6\xc1\x69\x0e\x3d\xb4\x27\xea\x38\x29\x93\x04\x3a\xc6\x69\x26\xd3\xe9\x41\xc0\x1a\x36\x83\x25\x55\x5a\x42\xfc\xf6\x1d\x1c\xa7\xb5\xa7\x9c\x58\xed\xa7\xd5\xa7\x5f\x31\x16\xd6\xed\x3c\xb7\x9d\xe0\xe2\xfc\xe3\x27\xac\x3b\xc2\xcd\x50\x91\x37\x24\x14\x90\x0e\xd2\x59\x1f\x12\x15\xab\x18\xb7\x5c\x93\x09\xd4\x60\x30\x0d\x79\x48\x47\x48\x9d\xae\x3b\x7a\xeb\xcc\xf0\x83\x7c\x60\x6b\x70\x91\x9c\xe3\xfd\x04\x44\x87\x56\xf4\xe1\x8b\x8a\xb1\xb3\x03\xb6\x7a\x07\x63\x05\x43\x20\x48\xc7\x01\x1b\xee\x09\xf4\x52\x93\x13\xb0\x41\x6d\xb7\xae\x67\x6d\x6a\xc2\xc8\xd2\xed\x8f\x39\x0c\x49\x54\x8c\xc7\xc3\x08\x5b\x89\x66\x03\x8d\xda\xba\x1d\xec\xe6\x98\x83\x96\xbd\xf0\xf4\x75\x22\xee\xf3\x7c\x3e\x8e\x63\xa2\xf7\xb2\x89\xf5\xed\xbc\x7f\x05\xc3\xfc\x36\x5b\x2c\xf3\x72\x79\x76\x91\x9c\xef\xb7\xdc\x9b\x9e\x42\x80\xa7\xdf\x03\x7b\x6a\x50\xed\xa0\x9d\xeb\xb9\xd6\x55\x4f\xe8\xf5\x08\xeb\xa1\x5b\x4f\xd4\x40\xec\xe4\x3b\x7a\x16\x36\xed\x0c\xc1\x6e\x64\xd4\x9e\x54\x8c\x86\x83\x78\xae\x06\x39\x09\xeb\xcd\x8e\xc3\x09\x60\x0d\xb4\x41\x94\x96\xc8\xca\x08\x5f\xd3\x32\x2b\x67\x2a\xc6\x43\xb6\xfe\x56\xdc\xaf\xf1\x90\xae\x56\x69\xbe\xce\x96\x25\x8a\x15\x16\x45\x7e\x99\xad\xb3\x22\x2f\x51\x5c\x21\xcd\x1f\x71\x93\xe5\x97\x33\x10\x4b\x47\x1e\xf4\xe2\xfc\xe4\x6f\x3d\x78\x8a\x91\x9a\x29\xb3\x92\xe8\x44\x60\x63\x5f\x85\x82\xa3\x9a\x37\x5c\xa3\xd7\xa6\x1d\x74\x4b\x68\xed\x33\x79\xc3\xa6\x85\x23\xbf\xe5\x30\x3d\x66\x80\x36\x8d\x8a\xd1\xf3\x96\x45\xcb\x7e\xe5\xbf\x4b\x25\x4a\xa5\xab\xeb\xc9\x7e\x99\xdd\xa5\xd7\x4b\x75\xb5\x2a\xee\xf0\xee\x5f\xbd\x28\xbe\x3f\xa2\x93\x6d\x3f\x37\x7a\x10\xee\x87\x90\x3c\xb9\x16\xc7\xc5\x11\xd3\x68\xd1\xc9\x53\xb0\x06\x7f\xff\xd4\xe2\xee\x12\x3f\x23\xa1\x20\x67\x23\x55\x81\xfc\x33\xf9\xe8\x97\xfa\x13\x00\x00\xff\xff\x3d\xe3\xd5\x42\xc3\x02\x00\x00") + +func testImagesNautilusDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesNautilusDockerfile, + "test/images/nautilus/Dockerfile", + ) +} + +func testImagesNautilusDockerfile() (*asset, error) { + bytes, err := testImagesNautilusDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nautilus/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNautilusOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xce\x49\x2c\x4d\xc9\x2c\x4d\x4a\xcd\x29\x05\xf3\x73\xb3\x4b\x73\x13\x4b\x12\xd3\xb9\x00\x01\x00\x00\xff\xff\xeb\x9e\xa3\x19\x28\x00\x00\x00") + +func testImagesNautilusOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesNautilusOwners, + "test/images/nautilus/OWNERS", + ) +} + +func testImagesNautilusOwners() (*asset, error) { + bytes, err := testImagesNautilusOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nautilus/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNautilusVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe1\x02\x04\x00\x00\xff\xff\xdb\x31\xff\x00\x04\x00\x00\x00") + +func testImagesNautilusVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesNautilusVersion, + "test/images/nautilus/VERSION", + ) +} + +func testImagesNautilusVersion() (*asset, error) { + bytes, err := testImagesNautilusVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nautilus/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNautilusHtmlDataJson = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xaa\xe6\x52\x50\x50\xca\xcc\x4d\x4c\x4f\x55\xb2\x52\x50\xca\x4b\x2c\x2d\xc9\xcc\x29\x2d\xd6\xcb\x2a\x48\x57\xe2\xaa\xe5\x02\x04\x00\x00\xff\xff\xbe\x2a\xe3\xd9\x1e\x00\x00\x00") + +func testImagesNautilusHtmlDataJsonBytes() ([]byte, error) { + return bindataRead( + _testImagesNautilusHtmlDataJson, + "test/images/nautilus/html/data.json", + ) +} + +func testImagesNautilusHtmlDataJson() (*asset, error) { + bytes, err := testImagesNautilusHtmlDataJsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nautilus/html/data.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfNpbEpBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\x49\x4d\xca\x4c\xcc\xb3\x2a\x2e\x29\x4a\x2d\x49\xce\xd0\x2d\xce\xc9\xcc\xe5\x82\xca\x17\xe5\x9a\x99\xd8\x82\xc9\x32\x0b\x7d\xdc\xea\x0a\x0a\x92\xcd\x4c\x72\x52\x6d\xa1\x34\x56\x95\x80\x00\x00\x00\xff\xff\x23\xf1\xf9\x99\x72\x00\x00\x00") + +func testImagesNodePerfNpbEpBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfNpbEpBaseimage, + "test/images/node-perf/npb-ep/BASEIMAGE", + ) +} + +func testImagesNodePerfNpbEpBaseimage() (*asset, error) { + bytes, err := testImagesNodePerfNpbEpBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/npb-ep/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfNpbEpDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x54\x6d\x6f\xd3\x48\x17\xfd\x3e\xbf\xe2\x3c\x09\xaa\x00\xd5\x36\x2f\x8f\x10\xa2\xea\x4a\x6e\x12\xc0\x22\x75\xb2\x76\x0a\xaa\x96\x55\x34\xb6\xaf\xed\x59\xec\x19\x33\x33\x6e\x12\x10\xff\x7d\x35\x4e\x1a\xb5\xdd\x7e\x20\x52\xa4\xf1\x7d\x3d\x73\xe7\x9c\x3b\xc6\x44\x75\x3b\x2d\xaa\xda\xe2\xd5\x8b\x97\x6f\xb1\xaa\x09\x9f\xfa\x8c\xb4\x24\x4b\x06\x61\x6f\x6b\xa5\x8d\xcf\xc6\x6c\x8c\xb9\xc8\x49\x1a\x2a\xd0\xcb\x82\x34\x6c\x4d\x08\x3b\x9e\xd7\x74\xeb\x39\xc5\x67\xd2\x46\x28\x89\x57\xfe\x0b\x3c\x75\x01\xa3\x83\x6b\xf4\xec\x8c\x8d\xb1\x53\x3d\x5a\xbe\x83\x54\x16\xbd\x21\xd8\x5a\x18\x94\xa2\x21\xd0\x36\xa7\xce\x42\x48\xe4\xaa\xed\x1a\xc1\x65\x4e\xd8\x08\x5b\x0f\x6d\x0e\x45\x7c\x36\xc6\xf5\xa1\x84\xca\x2c\x17\x12\x1c\xb9\xea\x76\x50\xe5\xdd\x38\x70\x3b\x00\x76\xbf\xda\xda\xee\x5d\x10\x6c\x36\x1b\x9f\x0f\x60\x7d\xa5\xab\xa0\xd9\x07\x9a\x60\x1e\x4d\x66\x71\x3a\xf3\x5e\xf9\x2f\x86\x94\x2b\xd9\x90\x31\xd0\xf4\xbd\x17\x9a\x0a\x64\x3b\xf0\xae\x6b\x44\xce\xb3\x86\xd0\xf0\x0d\x94\x06\xaf\x34\x51\x01\xab\x1c\xde\x8d\x16\x56\xc8\xea\x14\x46\x95\x76\xc3\x35\xb1\x31\x0a\x61\xac\x16\x59\x6f\xef\x0d\xeb\x16\x9d\x30\xf7\x02\x94\x04\x97\x18\x85\x29\xa2\x74\x84\x8b\x30\x8d\xd2\x53\x36\xc6\x97\x68\xf5\x71\x71\xb5\xc2\x97\x30\x49\xc2\x78\x15\xcd\x52\x2c\x12\x4c\x16\xf1\x34\x5a\x45\x8b\x38\xc5\xe2\x3d\xc2\xf8\x1a\x9f\xa2\x78\x7a\x0a\x12\xb6\x26\x0d\xda\x76\xda\xe1\x57\x1a\xc2\x8d\x91\x0a\x37\xb3\x94\xe8\x1e\x80\x52\xed\x01\x99\x8e\x72\x51\x8a\x1c\x0d\x97\x55\xcf\x2b\x42\xa5\x6e\x48\x4b\x21\x2b\x74\xa4\x5b\x61\xdc\x63\x1a\x70\x59\xb0\x31\x1a\xd1\x0a\xcb\xed\x60\xf9\xcf\xa5\x7c\xc6\xc2\xe4\x83\x43\x3f\x8b\x2e\xc3\x0f\x33\xf6\x3e\x59\x5c\xe2\xc9\xf1\x1b\xdc\x20\xeb\x45\x53\xac\xa5\x2a\x68\xdd\x91\x2e\xd7\xb2\xcb\xd6\xd4\x31\x36\x49\x16\x69\xba\xbe\xb8\x8a\xe6\xd3\xf5\x64\xb1\xbc\xc6\x77\x6a\x7b\xef\xcf\xd9\xe5\x55\x98\x4c\x3e\x7a\xc6\x35\xcd\x11\xf4\x46\x07\x99\x90\x01\x63\xc9\x55\x0c\xde\x59\xaf\x22\x8b\xbe\x2b\xb8\x25\x9c\x9c\x1c\x2d\x42\x1a\xcb\x9b\x06\xde\x6e\xdf\xd1\x23\x63\x48\x5a\xc1\x1b\x54\xa5\xd2\x56\x73\xc9\x58\x38\x9d\xde\xa5\x86\xe4\xc6\xfd\xb9\x5f\xa9\x9b\x80\x1b\x43\xd6\x04\xb2\xcb\x82\x78\x79\xf1\xda\x7f\xed\xbf\xf4\x2d\xd7\x7e\xf5\x03\xfe\xd0\xdb\x72\x8d\xed\x8f\x12\x0f\xbc\x8c\x7d\x59\x24\x9f\xa6\x51\x02\xff\x98\x78\x38\x78\x8b\xcb\xe5\x90\x2a\x4a\xfc\x85\x27\x4f\xb9\xce\xeb\x67\xf8\xdf\x39\x46\xdb\xb7\x6f\xd6\x6f\xfe\x3f\xc2\xdf\x67\x6e\x9c\x12\x5f\x99\x63\xad\x53\x99\x09\xbc\x36\x6f\x55\x41\xcd\x79\x4b\x85\xe8\xdb\x20\xa8\x90\x2b\x59\x8a\x2a\x88\xc3\xd4\x37\xbc\xed\x1a\x32\x41\xcb\xbf\x91\x5f\x50\xe9\x57\x79\xbe\xde\xbe\x7d\x83\x3f\x6e\xa3\x6e\x3d\x67\xf8\xca\xa8\x31\x74\x28\x9e\x77\xbf\x55\xe6\x91\x22\xa5\x18\x2e\xe1\x4c\x98\x2d\x31\x99\x87\x69\x7a\x3e\x65\x6c\xbf\x46\x1c\x6d\x1c\x25\x8e\xe2\x69\x44\xa6\xb9\x16\x64\xf0\xd4\xd4\xdc\x59\x54\xf6\x0f\xe5\x76\x90\xbc\x79\xe6\x04\xe4\xf4\x2b\x6f\x48\x0a\x92\x16\x8d\xca\x07\x7e\xc1\x28\xd8\x9a\x5b\x08\x8b\x9c\x4b\x64\xe4\x54\x2e\xa8\x80\x90\xd6\xb9\x9c\xc6\x5a\x3e\x2c\x0b\xe9\xd6\x00\x69\xa7\xc4\x81\xd2\x94\x2b\x59\xec\x1f\x1e\xc6\xf2\x8a\xf6\x4f\xd6\x7e\x2b\x84\x86\xd7\x21\x68\x44\xe6\x0d\x3b\xe3\xe4\x04\xa5\x90\xc5\x9e\x58\x8d\xc8\xe0\x49\xde\x12\x46\xcf\x7d\xa3\xfc\xe7\x23\x78\xb4\xa5\xdc\x0d\xeb\xe7\xaf\x3b\x59\x5f\xcf\xd8\x43\x6e\x33\x36\xb0\xd6\xf3\x4a\xad\xda\xf3\xc7\x59\x8e\xc7\x18\x31\xd0\x99\x3a\x7f\xea\x6f\x11\xfc\x56\x91\x23\x8c\xe3\x89\xcd\xe2\xcf\x98\x4f\xd7\xf3\xe8\x22\x09\x93\xeb\xf5\x32\x5c\x7d\x3c\x1f\x3d\xf9\xf9\xc0\xf4\xeb\xdd\x31\x63\xc4\xd8\x2c\x5e\x25\xd7\xcb\x45\x14\xaf\x70\xe8\xcf\xfe\x0d\x00\x00\xff\xff\xc8\xdd\xe0\xa9\x0a\x06\x00\x00") + +func testImagesNodePerfNpbEpDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfNpbEpDockerfile, + "test/images/node-perf/npb-ep/Dockerfile", + ) +} + +func testImagesNodePerfNpbEpDockerfile() (*asset, error) { + bytes, err := testImagesNodePerfNpbEpDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/npb-ep/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfNpbEpVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe4\x02\x04\x00\x00\xff\xff\x9e\xc5\x88\x7d\x04\x00\x00\x00") + +func testImagesNodePerfNpbEpVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfNpbEpVersion, + "test/images/node-perf/npb-ep/VERSION", + ) +} + +func testImagesNodePerfNpbEpVersion() (*asset, error) { + bytes, err := testImagesNodePerfNpbEpVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/npb-ep/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfNpbIsBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\x49\x4d\xca\x4c\xcc\xb3\x2a\x2e\x29\x4a\x2d\x49\xce\xd0\x2d\xce\xc9\xcc\xe5\x82\xca\x17\xe5\x9a\x99\xd8\x82\xc9\x32\x0b\x7d\xdc\xea\x0a\x0a\x92\xcd\x4c\x72\x52\x6d\xa1\x34\x56\x95\x80\x00\x00\x00\xff\xff\x23\xf1\xf9\x99\x72\x00\x00\x00") + +func testImagesNodePerfNpbIsBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfNpbIsBaseimage, + "test/images/node-perf/npb-is/BASEIMAGE", + ) +} + +func testImagesNodePerfNpbIsBaseimage() (*asset, error) { + bytes, err := testImagesNodePerfNpbIsBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/npb-is/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfNpbIsDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x54\x6d\x6f\xdb\x38\x13\xfc\xce\x5f\x31\x8f\x5d\x04\x6d\x11\x49\x7d\x79\x50\x14\x0d\x72\x80\x62\xbb\xad\x50\x47\xce\x49\x4e\x8b\xe0\x72\x30\x28\x69\x25\xf1\x22\x91\x2a\x49\xc5\x76\x8b\xfe\xf7\x03\x65\xc7\x48\x72\xf9\x50\x03\x06\xe8\xdd\xe5\xee\x70\x3c\xb3\x63\x4c\x54\xb7\xd5\xa2\xaa\x2d\xde\xbc\x7a\xfd\x1e\xcb\x9a\xf0\xa5\xcf\x48\x4b\xb2\x64\x10\xf6\xb6\x56\xda\xf8\x6c\xcc\xc6\x98\x8b\x9c\xa4\xa1\x02\xbd\x2c\x48\xc3\xd6\x84\xb0\xe3\x79\x4d\x77\x99\x63\x7c\x25\x6d\x84\x92\x78\xe3\xbf\xc2\x73\x57\x30\xda\xa7\x46\x2f\x4e\xd8\x18\x5b\xd5\xa3\xe5\x5b\x48\x65\xd1\x1b\x82\xad\x85\x41\x29\x1a\x02\x6d\x72\xea\x2c\x84\x44\xae\xda\xae\x11\x5c\xe6\x84\xb5\xb0\xf5\x30\x66\xdf\xc4\x67\x63\x5c\xed\x5b\xa8\xcc\x72\x21\xc1\x91\xab\x6e\x0b\x55\xde\xaf\x03\xb7\x03\x60\xf7\xa9\xad\xed\x3e\x04\xc1\x7a\xbd\xf6\xf9\x00\xd6\x57\xba\x0a\x9a\x5d\xa1\x09\xe6\xd1\x64\x16\xa7\x33\xef\x8d\xff\x6a\xb8\x72\x29\x1b\x32\x06\x9a\xbe\xf7\x42\x53\x81\x6c\x0b\xde\x75\x8d\xc8\x79\xd6\x10\x1a\xbe\x86\xd2\xe0\x95\x26\x2a\x60\x95\xc3\xbb\xd6\xc2\x0a\x59\x1d\xc3\xa8\xd2\xae\xb9\x26\x36\x46\x21\x8c\xd5\x22\xeb\xed\x03\xb2\xee\xd0\x09\xf3\xa0\x40\x49\x70\x89\x51\x98\x22\x4a\x47\x38\x0b\xd3\x28\x3d\x66\x63\x7c\x8b\x96\x9f\x17\x97\x4b\x7c\x0b\x93\x24\x8c\x97\xd1\x2c\xc5\x22\xc1\x64\x11\x4f\xa3\x65\xb4\x88\x53\x2c\x3e\x22\x8c\xaf\xf0\x25\x8a\xa7\xc7\x20\x61\x6b\xd2\xa0\x4d\xa7\x1d\x7e\xa5\x21\x1c\x8d\x54\x38\xce\x52\xa2\x07\x00\x4a\xb5\x03\x64\x3a\xca\x45\x29\x72\x34\x5c\x56\x3d\xaf\x08\x95\xba\x25\x2d\x85\xac\xd0\x91\x6e\x85\x71\x7f\xa6\x01\x97\x05\x1b\xa3\x11\xad\xb0\xdc\x0e\x91\xff\x3c\xca\x67\x2c\x4c\x3e\x39\xf4\xb3\xe8\x3c\xfc\x34\x63\x1f\x93\xc5\x39\x9e\x1d\x7e\x83\x1b\x64\xbd\x68\x8a\x95\x54\x05\xad\x3a\xd2\xe5\x4a\x76\xd9\x4a\x18\xc6\x26\xc9\x22\x4d\x57\x67\x97\xd1\x7c\xba\x9a\x2c\x2e\xae\xf0\x9d\xda\xde\xfb\x73\x76\x7e\x19\x26\x93\xcf\x9e\x71\x43\x73\x04\xbd\xd1\x41\x26\x64\xc0\x58\x72\x19\x83\x77\xd6\xab\xc8\xa2\xef\x0a\x6e\x09\x47\x47\x87\x88\x90\xc6\xf2\xa6\x81\xb7\xdd\x4d\xf4\xc8\x18\x92\x56\xf0\x06\x55\xa9\xb4\xd5\x5c\x32\x16\x4e\xa7\xf7\xa5\x21\xb9\x71\x5f\xee\x57\xea\x36\xe0\xc6\x90\x35\x81\xec\xb2\x20\xbe\x38\x7b\xeb\xbf\xf5\x5f\xfb\x96\x6b\xbf\xfa\x01\x7f\x98\x6d\xb9\xc6\xe6\x47\x89\x47\x59\xc6\xbe\x2d\x92\x2f\xd3\x28\x81\x7f\xb8\xb8\x3f\x78\x8b\xf3\x0b\xc6\xc6\x98\x68\x72\x68\x07\x5c\xc8\x95\x2c\x45\x85\x8c\x9b\x9d\x0a\x1c\x9d\x5c\xe7\xb5\xb0\x94\xdb\x5e\x93\xe3\x7d\x5f\xea\x52\x6b\xa5\x6f\x1a\xc5\x8b\x1d\x06\x51\xe2\x2f\x3c\x7b\xee\xea\x5f\xe0\x7f\xa7\x18\x6d\xde\xbf\x5b\xbd\xfb\xff\x08\x7f\x9f\xb8\x6a\x89\x6b\xe6\xe4\xef\x5a\x9b\xc0\x6b\xf3\x56\x15\xd4\x9c\xb6\x54\x88\xbe\x0d\x82\x6a\x3f\x3c\x88\xc3\xd4\x37\xbc\xed\x1a\x32\x41\xcb\x6f\xc8\x2f\xa8\xf4\xab\x3c\x5f\x6d\xde\xbf\xc3\x1f\x77\x55\x77\x99\x13\x5c\x33\x6a\x0c\xed\x9b\xe7\xdd\x6f\xb5\x79\xa2\x49\x29\x86\x47\xb8\x10\xa2\x14\x93\x79\x98\xa6\xa7\xd3\x81\x21\xd5\x6d\x9d\xfe\xdc\x8b\x0f\x2e\x6c\x44\xa6\xb9\x16\x64\xf0\xdc\xd4\xdc\x45\x54\xf6\x0f\xe5\x76\xd8\x1d\xe6\x85\x73\xa2\x5b\x04\xf2\x96\xa4\x20\x69\xd1\xa8\x7c\x10\x2a\x8c\x82\xad\xb9\x85\xb0\xc8\xb9\x44\x46\x6e\x5d\x08\x2a\x20\xa4\x75\x29\x67\xd6\x96\x0f\x5b\x47\xba\x7d\x42\xda\x59\x7a\xf0\x06\xe5\xea\x40\xbf\xb1\xbc\xa2\x1d\xef\xed\x4d\x21\x34\xbc\x0e\x41\x23\x32\x6f\x58\x3e\x47\x47\x28\x85\x2c\x76\x0a\x6d\x44\x06\x4f\xf2\x96\x30\x7a\xe9\x1b\xe5\xbf\x1c\xc1\xa3\x0d\xe5\x8e\xac\x9f\xbf\xee\xdd\xba\x3e\x61\x8f\x4d\xc2\xd8\x20\x7f\xcf\x2b\xb5\x6a\x4f\x9f\xb6\x0b\x9e\x92\xd6\xe0\x0b\x61\xfc\xa9\xbf\x41\xf0\x5b\x4d\x0e\x30\x0e\x27\x36\x8b\xbf\x62\x3e\x5d\xcd\xa3\xb3\x24\x4c\xae\x56\x17\xe1\xf2\xf3\xe9\xe8\xd9\xcf\x47\xa1\x5f\x1f\x0e\x37\x46\x8c\xcd\xe2\x65\x72\x75\xb1\x88\xe2\x25\xf6\xf3\xd9\xbf\x01\x00\x00\xff\xff\xde\x2a\x2d\x70\x53\x06\x00\x00") + +func testImagesNodePerfNpbIsDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfNpbIsDockerfile, + "test/images/node-perf/npb-is/Dockerfile", + ) +} + +func testImagesNodePerfNpbIsDockerfile() (*asset, error) { + bytes, err := testImagesNodePerfNpbIsDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/npb-is/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfNpbIsVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe4\x02\x04\x00\x00\xff\xff\x9e\xc5\x88\x7d\x04\x00\x00\x00") + +func testImagesNodePerfNpbIsVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfNpbIsVersion, + "test/images/node-perf/npb-is/VERSION", + ) +} + +func testImagesNodePerfNpbIsVersion() (*asset, error) { + bytes, err := testImagesNodePerfNpbIsVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/npb-is/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfTfWideDeepBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x2d\xa8\x2c\xc9\xc8\xcf\xb3\x32\xd6\x33\xd3\x2d\xce\xc9\xcc\xd5\x2d\x2e\x29\x4a\x2d\x49\xce\xe0\x82\xaa\x29\xca\x35\x33\xb1\x05\x93\x65\x16\xfa\xb8\xd4\x02\x02\x00\x00\xff\xff\xea\xf7\x16\x80\x50\x00\x00\x00") + +func testImagesNodePerfTfWideDeepBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfTfWideDeepBaseimage, + "test/images/node-perf/tf-wide-deep/BASEIMAGE", + ) +} + +func testImagesNodePerfTfWideDeepBaseimage() (*asset, error) { + bytes, err := testImagesNodePerfTfWideDeepBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/tf-wide-deep/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfTfWideDeepDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x92\x51\x6f\x9c\x38\x14\x85\xdf\xfd\x2b\x8e\x32\x51\xd4\xac\x02\xa4\xd1\x6a\xb5\x9b\x3c\xd1\x09\xed\xa0\x24\x90\x05\xa6\xd1\x48\x95\x22\x0f\x5c\xc0\x12\xd8\xae\x6d\x42\xe8\xaf\x5f\x31\x99\x64\x36\xdb\x4a\xcb\x93\xaf\xef\x39\x87\xcf\xd7\x5e\x60\xa9\xf4\x64\x44\xd3\x3a\x5c\x9c\x7f\xfc\x13\x45\x4b\xb8\x19\xb6\x64\x24\x39\xb2\x08\x07\xd7\x2a\x63\x7d\xb6\x60\x0b\xdc\x8a\x92\xa4\xa5\x0a\x83\xac\xc8\xc0\xb5\x84\x50\xf3\xb2\xa5\xd7\xce\x19\xbe\x92\xb1\x42\x49\x5c\xf8\xe7\xf8\x30\x0b\x8e\xf6\xad\xa3\xd3\x2b\xb6\xc0\xa4\x06\xf4\x7c\x82\x54\x0e\x83\x25\xb8\x56\x58\xd4\xa2\x23\xd0\x73\x49\xda\x41\x48\x94\xaa\xd7\x9d\xe0\xb2\x24\x8c\xc2\xb5\xbb\xdf\xec\x43\x7c\xb6\xc0\x66\x1f\xa1\xb6\x8e\x0b\x09\x8e\x52\xe9\x09\xaa\xfe\xb7\x0e\xdc\xed\x80\xe7\xaf\x75\x4e\x5f\x06\xc1\x38\x8e\x3e\xdf\xc1\xfa\xca\x34\x41\xf7\x22\xb4\xc1\x6d\xbc\x8c\x92\x3c\xf2\x2e\xfc\xf3\x9d\x65\x2d\x3b\xb2\x16\x86\xbe\x0f\xc2\x50\x85\xed\x04\xae\x75\x27\x4a\xbe\xed\x08\x1d\x1f\xa1\x0c\x78\x63\x88\x2a\x38\x35\xf3\x8e\x46\x38\x21\x9b\x33\x58\x55\xbb\x91\x1b\x62\x0b\x54\xc2\x3a\x23\xb6\x83\x7b\x37\xac\x57\x3a\x61\xdf\x09\x94\x04\x97\x38\x0a\x73\xc4\xf9\x11\x3e\x85\x79\x9c\x9f\xb1\x05\x1e\xe2\x62\x95\xae\x0b\x3c\x84\x59\x16\x26\x45\x1c\xe5\x48\x33\x2c\xd3\xe4\x3a\x2e\xe2\x34\xc9\x91\x7e\x46\x98\x6c\x70\x13\x27\xd7\x67\x20\xe1\x5a\x32\xa0\x67\x6d\x66\x7e\x65\x20\xe6\x31\x52\x35\xcf\x2c\x27\x7a\x07\x50\xab\x17\x20\xab\xa9\x14\xb5\x28\xd1\x71\xd9\x0c\xbc\x21\x34\xea\x89\x8c\x14\xb2\x81\x26\xd3\x0b\x3b\x5f\xa6\x05\x97\x15\x5b\xa0\x13\xbd\x70\xdc\xed\x76\x7e\x3a\x94\xcf\x58\x98\x7d\x99\xe9\xa3\xf8\x2e\xfc\x12\xb1\xcf\x59\x7a\x87\xe3\x43\xcd\x96\x59\x9a\xe7\x8f\x9f\xd6\xf1\xed\xf5\xe3\x32\xbd\xdf\xe0\x3b\xf5\x83\xf7\x77\x74\xb7\x0e\xb3\xe5\xca\xb3\x73\x74\x89\x60\xb0\x26\xd8\x0a\x19\x30\x96\xad\x13\x70\xed\xbc\x86\x1c\x06\x5d\x71\x47\x38\x39\x79\xdb\x11\xd2\x3a\xde\x75\xf0\x26\x8c\x73\xed\x44\x4f\x2f\x9e\x92\x5b\xc2\xf1\x87\x41\xf2\x9e\xe0\xf5\xa7\xf3\x25\x7d\x63\xf3\x5b\xe0\xdc\x94\xed\x1f\xbf\x9f\xee\x4b\x40\x0b\xfd\x16\xe4\x48\x5a\x65\xea\x4e\x8d\xde\x5e\x77\xf5\xa6\xbb\x7a\x5d\xfe\xf6\x7f\xde\x5f\x78\xc8\xf2\xf2\x85\x6c\x07\x3a\x3f\x48\x7b\x19\x04\x8d\x70\xed\xb0\xf5\x4b\xd5\x07\x07\x7b\xd0\xab\x8a\x3a\x1b\xcc\x00\xe2\x89\x82\xa7\x8f\xfe\x5f\xfe\xb9\xef\xb8\xf1\x9b\x1f\xf8\xc6\x4e\x4e\xe0\xb8\xc1\xf3\x8f\x1a\xbf\x68\x99\x1e\xde\x7f\x1a\x8c\x3d\xa4\xd9\xcd\x75\x9c\xe1\x78\x95\xde\x45\xfb\x7c\x6f\x27\x09\x54\x5d\x8b\x52\xf0\x2e\x18\x45\x45\x8f\x15\x91\x66\x51\xf2\x15\xf7\x9b\x62\x95\x26\xf7\x61\xb1\xc2\xf1\x61\x7d\xf9\x73\x00\x63\x51\x52\x64\x9b\xfb\x34\x4e\x0a\xe8\xc9\xb5\x4a\xc2\x3f\x84\xf9\x7a\x62\xff\x04\x00\x00\xff\xff\xcb\x15\x24\x20\x61\x04\x00\x00") + +func testImagesNodePerfTfWideDeepDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfTfWideDeepDockerfile, + "test/images/node-perf/tf-wide-deep/Dockerfile", + ) +} + +func testImagesNodePerfTfWideDeepDockerfile() (*asset, error) { + bytes, err := testImagesNodePerfTfWideDeepDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/tf-wide-deep/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNodePerfTfWideDeepVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe4\x02\x04\x00\x00\xff\xff\x9e\xc5\x88\x7d\x04\x00\x00\x00") + +func testImagesNodePerfTfWideDeepVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesNodePerfTfWideDeepVersion, + "test/images/node-perf/tf-wide-deep/VERSION", + ) +} + +func testImagesNodePerfTfWideDeepVersion() (*asset, error) { + bytes, err := testImagesNodePerfTfWideDeepVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/node-perf/tf-wide-deep/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonewprivsGitignore = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xcb\x2b\xe0\x02\x04\x00\x00\xff\xff\xee\x29\x1e\x77\x04\x00\x00\x00") + +func testImagesNonewprivsGitignoreBytes() ([]byte, error) { + return bindataRead( + _testImagesNonewprivsGitignore, + "test/images/nonewprivs/.gitignore", + ) +} + +func testImagesNonewprivsGitignore() (*asset, error) { + bytes, err := testImagesNonewprivsGitignoreBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonewprivs/.gitignore", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonewprivsBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\xcc\x29\xc8\xcc\x4b\xb5\x32\xd6\x33\xe3\x82\x0a\x17\xe5\xda\x26\x16\xe5\x1a\x1b\x95\x99\xe9\x63\x93\x04\xe9\x01\x91\x65\x16\x98\xd2\x05\x05\xc9\x66\x26\x39\xa9\xb6\x50\x1a\x53\x41\xb1\xb1\xa5\x41\x85\x2d\x98\x44\x96\x04\x04\x00\x00\xff\xff\xc8\xfe\x7a\xdd\x91\x00\x00\x00") + +func testImagesNonewprivsBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesNonewprivsBaseimage, + "test/images/nonewprivs/BASEIMAGE", + ) +} + +func testImagesNonewprivsBaseimage() (*asset, error) { + bytes, err := testImagesNonewprivsBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonewprivs/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonewprivsDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x91\x51\x6f\x9b\x3e\x14\xc5\xdf\xfd\x29\x8e\xc2\xff\xe1\x3f\x2d\x85\xae\x2f\x93\xb6\x27\x4a\xd2\x16\xb5\x81\x0d\x92\x55\xd5\x34\x55\x0e\xdc\xc0\x95\xc0\x76\x6d\x33\x9a\x6f\x3f\x41\x5b\x6d\xd1\xe6\x37\xdf\x73\x7c\xfc\xf3\x71\x80\x44\x9b\xa3\xe5\xa6\xf5\xb8\x38\xff\xf0\x11\xdb\x96\x70\x3b\xec\xc9\x2a\xf2\xe4\x10\x0f\xbe\xd5\xd6\x85\x22\x10\x01\xee\xb8\x22\xe5\xa8\xc6\xa0\x6a\xb2\xf0\x2d\x21\x36\xb2\x6a\xe9\x4d\x59\xe2\x1b\x59\xc7\x5a\xe1\x22\x3c\xc7\xff\x93\x61\xf1\x2a\x2d\xde\x7d\x16\x01\x8e\x7a\x40\x2f\x8f\x50\xda\x63\x70\x04\xdf\xb2\xc3\x81\x3b\x02\x3d\x57\x64\x3c\x58\xa1\xd2\xbd\xe9\x58\xaa\x8a\x30\xb2\x6f\xe7\x6b\x5e\x43\x42\x11\xe0\xe1\x35\x42\xef\xbd\x64\x05\x89\x4a\x9b\x23\xf4\xe1\x4f\x1f\xa4\x9f\x81\xa7\xd5\x7a\x6f\x3e\x45\xd1\x38\x8e\xa1\x9c\x61\x43\x6d\x9b\xa8\x7b\x31\xba\xe8\x2e\x4d\xd6\x59\xb9\x3e\xbb\x08\xcf\xe7\x23\x3b\xd5\x91\x73\xb0\xf4\x34\xb0\xa5\x1a\xfb\x23\xa4\x31\x1d\x57\x72\xdf\x11\x3a\x39\x42\x5b\xc8\xc6\x12\xd5\xf0\x7a\xe2\x1d\x2d\x7b\x56\xcd\x12\x4e\x1f\xfc\x28\x2d\x89\x00\x35\x3b\x6f\x79\x3f\xf8\x93\xb2\xde\xe8\xd8\x9d\x18\xb4\x82\x54\x58\xc4\x25\xd2\x72\x81\xcb\xb8\x4c\xcb\xa5\x08\x70\x9f\x6e\x6f\xf2\xdd\x16\xf7\x71\x51\xc4\xd9\x36\x5d\x97\xc8\x0b\x24\x79\xb6\x4a\xb7\x69\x9e\x95\xc8\xaf\x10\x67\x0f\xb8\x4d\xb3\xd5\x12\xc4\xbe\x25\x0b\x7a\x36\x76\xe2\xd7\x16\x3c\xd5\x48\xf5\xd4\x59\x49\x74\x02\x70\xd0\x2f\x40\xce\x50\xc5\x07\xae\xd0\x49\xd5\x0c\xb2\x21\x34\xfa\x27\x59\xc5\xaa\x81\x21\xdb\xb3\x9b\x3e\xd3\x41\xaa\x5a\x04\xe8\xb8\x67\x2f\xfd\x3c\xf9\xeb\x51\xa1\x10\x71\x71\x3d\xd1\xaf\xd3\x4d\x7c\xbd\x16\x57\x45\xbe\xc1\x7f\xbf\xf7\x22\x29\xf2\xb2\x7c\xbc\xdc\xa5\x77\xab\xc7\x24\xff\xf2\x80\x27\xea\x87\xb3\xaf\xeb\xcd\x2e\x2e\x92\x9b\x33\x37\x45\x57\x88\x06\x67\xa3\x3d\xab\x48\x88\xd9\xa4\x94\x79\x99\x75\xba\x92\xdd\xac\x28\x65\x44\xb1\xcb\x50\xb5\xbd\xae\xf1\xde\xfd\x4b\x17\xc9\x66\x85\xef\x0b\xa5\xcc\xe2\x87\xf8\x15\x00\x00\xff\xff\x6f\x34\x51\x3e\xe5\x02\x00\x00") + +func testImagesNonewprivsDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesNonewprivsDockerfile, + "test/images/nonewprivs/Dockerfile", + ) +} + +func testImagesNonewprivsDockerfile() (*asset, error) { + bytes, err := testImagesNonewprivsDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonewprivs/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonewprivsMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x6b\xdb\x3e\x14\xc5\x9f\xff\xfa\x14\x87\xb8\x0f\x09\xa4\x4e\xff\x65\xac\xd0\x51\x86\x97\x64\xa9\x69\x67\x0f\x3b\x6d\xe9\x53\x91\xed\x1b\xfb\x82\x23\x69\x92\x3c\x27\xdf\x7e\x28\x6d\x61\x65\x7a\xbb\xf7\x9e\x7b\xf4\xd3\x51\x84\xa5\x36\x47\xcb\x6d\xe7\x71\x79\xf1\xff\x15\xb6\x1d\xe1\x6e\xa8\xc8\x2a\xf2\xe4\x90\x0c\xbe\xd3\xd6\xc5\x22\x12\x11\xee\xb9\x26\xe5\xa8\xc1\xa0\x1a\xb2\xf0\x1d\x21\x31\xb2\xee\xe8\x7d\x32\xc7\x23\x59\xc7\x5a\xe1\x32\xbe\xc0\x34\x08\x26\x6f\xa3\xc9\xec\x8b\x88\x70\xd4\x03\xf6\xf2\x08\xa5\x3d\x06\x47\xf0\x1d\x3b\xec\xb8\x27\xd0\xa1\x26\xe3\xc1\x0a\xb5\xde\x9b\x9e\xa5\xaa\x09\x23\xfb\xee\x74\xcd\x9b\x49\x2c\x22\x3c\xbf\x59\xe8\xca\x4b\x56\x90\xa8\xb5\x39\x42\xef\xfe\xd6\x41\xfa\x13\x70\x38\x9d\xf7\xe6\x7a\xb1\x18\xc7\x31\x96\x27\xd8\x58\xdb\x76\xd1\xbf\x0a\xdd\xe2\x3e\x5d\xae\xb3\x72\x7d\x7e\x19\x5f\x9c\x56\x1e\x54\x4f\xce\xc1\xd2\xaf\x81\x2d\x35\xa8\x8e\x90\xc6\xf4\x5c\xcb\xaa\x27\xf4\x72\x84\xb6\x90\xad\x25\x6a\xe0\x75\xe0\x1d\x2d\x7b\x56\xed\x1c\x4e\xef\xfc\x28\x2d\x89\x08\x0d\x3b\x6f\xb9\x1a\xfc\x87\xb0\xde\xe9\xd8\x7d\x10\x68\x05\xa9\x30\x49\x4a\xa4\xe5\x04\xdf\x92\x32\x2d\xe7\x22\xc2\x53\xba\xbd\xcd\x1f\xb6\x78\x4a\x8a\x22\xc9\xb6\xe9\xba\x44\x5e\x60\x99\x67\xab\x74\x9b\xe6\x59\x89\xfc\x3b\x92\xec\x19\x77\x69\xb6\x9a\x83\xd8\x77\x64\x41\x07\x63\x03\xbf\xb6\xe0\x10\x23\x35\x21\xb3\x92\xe8\x03\xc0\x4e\xbf\x02\x39\x43\x35\xef\xb8\x46\x2f\x55\x3b\xc8\x96\xd0\xea\xdf\x64\x15\xab\x16\x86\xec\x9e\x5d\xf8\x4c\x07\xa9\x1a\x11\xa1\xe7\x3d\x7b\xe9\x4f\x9d\x7f\x1e\x15\x0b\x51\x16\xcb\x12\x37\x50\xca\x88\xbc\xc4\xd7\x1b\xf4\xac\x86\x83\x48\x8a\xe5\x6d\xa8\xe4\xbe\xf9\xfc\x49\x6c\x93\x62\xb3\xde\x86\xfa\x6c\xba\x7c\x28\x56\x69\x31\x13\x9b\x3c\x29\x7e\x84\xd6\x95\xd8\xe4\xf7\x49\xb6\x79\x79\x5c\x17\x65\x9a\x67\x27\x13\xe9\xc9\xf9\x60\xfe\xb2\x4a\x0b\x84\x3d\xa5\x7d\xc3\x16\x67\x53\xd7\x51\xdf\xc3\x8c\xcd\x6c\x26\xe8\x60\xb4\xf5\x42\x54\xac\xae\xc5\x7f\x71\xbc\xe0\xbd\x6c\xe9\x7c\xf0\xdc\xc7\xae\x43\xc5\x0a\x67\xd3\x80\x38\x13\x22\xfe\x79\x9b\x67\xcf\xd7\xa1\x29\xfe\x04\x00\x00\xff\xff\x9e\x9e\xea\x79\x02\x03\x00\x00") + +func testImagesNonewprivsMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesNonewprivsMakefile, + "test/images/nonewprivs/Makefile", + ) +} + +func testImagesNonewprivsMakefile() (*asset, error) { + bytes, err := testImagesNonewprivsMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonewprivs/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonewprivsOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\xc8\x4a\x2d\x2e\x4e\x2b\x4a\xac\x02\x73\x72\xb3\x4b\x73\x13\x4b\x12\xd3\xb9\x00\x01\x00\x00\xff\xff\x11\x31\x6a\x04\x25\x00\x00\x00") + +func testImagesNonewprivsOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesNonewprivsOwners, + "test/images/nonewprivs/OWNERS", + ) +} + +func testImagesNonewprivsOwners() (*asset, error) { + bytes, err := testImagesNonewprivsOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonewprivs/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonewprivsVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe2\x02\x04\x00\x00\xff\xff\x5d\x96\xa5\x56\x04\x00\x00\x00") + +func testImagesNonewprivsVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesNonewprivsVersion, + "test/images/nonewprivs/VERSION", + ) +} + +func testImagesNonewprivsVersion() (*asset, error) { + bytes, err := testImagesNonewprivsVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonewprivs/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonewprivsNnpGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x41\x6b\xdb\x4c\x10\x86\xcf\x99\x5f\xf1\x22\xf8\xc0\x0e\xfe\xe4\x34\x97\x42\x7a\x52\x13\xb7\x15\x09\x76\xb1\x9c\x86\x40\x2f\x6b\x69\x24\x0d\x95\x76\xb7\xbb\xa3\x28\xa6\xf4\xbf\x17\x39\x2e\x24\xf4\xb8\xcc\xc3\x3b\xcf\xbe\xb3\x3c\xa7\x6b\xe7\x0f\x41\x9a\x56\x71\x79\xf1\xee\x3d\x76\x2d\xe3\x76\xd8\x73\xb0\xac\x1c\x91\x0d\xda\xba\x10\x53\xa2\x3b\x29\xd9\x46\xae\x30\xd8\x8a\x03\xb4\x65\x64\xde\x94\x2d\xe3\x34\x59\xe0\x1b\x87\x28\xce\xe2\x32\xbd\xc0\x6c\x02\x92\xd3\x28\x99\x7f\xa0\x83\x1b\xd0\x9b\x03\xac\x53\x0c\x91\xa1\xad\x44\xd4\xd2\x31\xf8\xb9\x64\xaf\x10\x8b\xd2\xf5\xbe\x13\x63\x4b\xc6\x28\xda\x1e\x97\x9c\x22\x52\x7a\x3c\x05\xb8\xbd\x1a\xb1\x30\x28\x9d\x3f\xc0\xd5\xaf\x29\x18\x25\x02\x80\x56\xd5\x5f\x2d\x97\xe3\x38\xa6\xe6\x68\x99\xba\xd0\x2c\xbb\x17\x2a\x2e\xef\xf2\xeb\xd5\xba\x58\xfd\x7f\x99\x5e\x10\xdd\xdb\x8e\x63\x44\xe0\x9f\x83\x04\xae\xb0\x3f\xc0\x78\xdf\x49\x69\xf6\x1d\xa3\x33\x23\x5c\x80\x69\x02\x73\x05\x75\x93\xe7\x18\x44\xc5\x36\x0b\x44\x57\xeb\x68\x02\x53\x25\x51\x83\xec\x07\x7d\x53\xd0\x5f\x2b\x89\x78\x0d\x38\x0b\x63\x91\x64\x05\xf2\x22\xc1\xc7\xac\xc8\x8b\x05\x3d\xe4\xbb\x2f\x9b\xfb\x1d\x1e\xb2\xed\x36\x5b\xef\xf2\x55\x81\xcd\x16\xd7\x9b\xf5\x4d\xbe\xcb\x37\xeb\x02\x9b\x4f\xc8\xd6\x8f\xb8\xcd\xd7\x37\x0b\xb0\x68\xcb\x01\xfc\xec\xc3\xe4\xee\x02\x64\xaa\x8e\xab\x94\x0a\xe6\x37\xcb\x6b\xf7\x22\x13\x3d\x97\x52\x4b\x89\xce\xd8\x66\x30\x0d\xa3\x71\x4f\x1c\xac\xd8\x06\x9e\x43\x2f\x71\x3a\x5e\x84\xb1\x15\x75\xd2\x8b\x1a\x3d\xbe\xff\xf9\x4e\x4a\xe7\x4b\x22\x6f\xca\x1f\x53\x48\x6f\xc4\x12\x49\xef\x5d\x50\xcc\xe8\x2c\xa9\x7b\x4d\xe8\x2c\x71\x31\xa1\x39\x51\x3d\xd8\xf2\xc8\xcc\xe6\xf8\x45\x67\x75\xaf\xe9\xd7\x20\x56\xeb\x59\xb2\xaa\x6b\x2e\x55\x9e\x18\x83\x54\x57\xf8\xaf\xfa\x6e\x93\x05\x5c\x4c\x3f\xb3\xf2\x20\xd5\x6c\x3e\xa7\xdf\xf4\x27\x00\x00\xff\xff\x1d\x9d\xa7\x78\xa3\x02\x00\x00") + +func testImagesNonewprivsNnpGoBytes() ([]byte, error) { + return bindataRead( + _testImagesNonewprivsNnpGo, + "test/images/nonewprivs/nnp.go", + ) +} + +func testImagesNonewprivsNnpGo() (*asset, error) { + bytes, err := testImagesNonewprivsNnpGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonewprivs/nnp.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonrootBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\xcf\xd1\xaa\x83\x30\x0c\xc6\xf1\x7b\xdf\xc5\x36\xa2\x88\x15\x7c\x98\x5a\x7b\x0e\x65\xa6\x91\x64\x53\x1f\x7f\xe8\xf4\xc2\x89\xc3\xeb\xef\xf7\x6f\x49\x1f\xe2\x6b\xd6\x16\xbb\xb2\x68\x1e\x95\xa8\x7f\xc7\x2a\x90\xee\x7c\x1b\x6c\x4c\x5b\x2b\x3e\x5d\xc7\x7a\xcc\x14\x28\x48\x36\xcf\x78\xa9\x19\x4f\xf6\xc7\xdb\xcb\x78\xf4\xc3\xe0\xca\xa2\xf7\x57\xc5\x36\x1f\x1b\xc9\x0d\xcc\x57\xc5\x3a\xee\x7e\x0a\xb1\xa3\x49\x3e\x17\xeb\xac\x02\xd3\xa0\x63\x85\xc1\x31\x09\xfd\x3d\x95\x23\xd4\x3b\x8a\x36\x92\x78\x1e\x3d\xd7\x8b\xfc\x8e\x0d\xe4\x37\x63\x03\xf9\x39\xbe\xfb\xb3\x01\x93\xbc\x03\x00\x00\xff\xff\xa4\xbc\x2b\x7d\xa7\x01\x00\x00") + +func testImagesNonrootBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesNonrootBaseimage, + "test/images/nonroot/BASEIMAGE", + ) +} + +func testImagesNonrootBaseimage() (*asset, error) { + bytes, err := testImagesNonrootBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonroot/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonrootDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x41\x6f\xd3\x30\x14\xc7\xef\xfe\x14\x7f\x35\x1c\x40\x2a\xe9\x56\xb8\x00\xa7\xd0\x65\x23\xda\x96\x48\x49\xcb\xb4\xa3\x9b\xbc\x26\x4f\x4a\x6d\x63\xbf\x90\xf5\xdb\xa3\x64\x9d\xa0\xc2\x37\xfb\xfd\xfc\xfc\xf3\xff\x45\xd8\x58\x77\xf2\xdc\x76\x82\xf5\xd5\xf5\x17\x6c\x3b\xc2\xfd\xb0\x27\x6f\x48\x28\x20\x19\xa4\xb3\x3e\xc4\x2a\x52\x11\x1e\xb8\x26\x13\xa8\xc1\x60\x1a\xf2\x90\x8e\x90\x38\x5d\x77\xf4\x56\x59\xe2\x27\xf9\xc0\xd6\x60\x1d\x5f\xe1\xfd\x04\x2c\xce\xa5\xc5\x87\x6f\x2a\xc2\xc9\x0e\x38\xea\x13\x8c\x15\x0c\x81\x20\x1d\x07\x1c\xb8\x27\xd0\x4b\x4d\x4e\xc0\x06\xb5\x3d\xba\x9e\xb5\xa9\x09\x23\x4b\x37\x3f\x73\x6e\x12\xab\x08\xcf\xe7\x16\x76\x2f\x9a\x0d\x34\x6a\xeb\x4e\xb0\x87\x7f\x39\x68\x99\x85\xa7\xd5\x89\xb8\xaf\xab\xd5\x38\x8e\xb1\x9e\x65\x63\xeb\xdb\x55\xff\x0a\x86\xd5\x43\xb6\x49\xf3\x2a\xfd\xb8\x8e\xaf\xe6\x2b\x3b\xd3\x53\x08\xf0\xf4\x6b\x60\x4f\x0d\xf6\x27\x68\xe7\x7a\xae\xf5\xbe\x27\xf4\x7a\x84\xf5\xd0\xad\x27\x6a\x20\x76\xf2\x1d\x3d\x0b\x9b\x76\x89\x60\x0f\x32\x6a\x4f\x2a\x42\xc3\x41\x3c\xef\x07\xb9\x08\xeb\xcd\x8e\xc3\x05\x60\x0d\xb4\xc1\x22\xa9\x90\x55\x0b\x7c\x4f\xaa\xac\x5a\xaa\x08\x4f\xd9\xf6\x47\xb1\xdb\xe2\x29\x29\xcb\x24\xdf\x66\x69\x85\xa2\xc4\xa6\xc8\x6f\xb2\x6d\x56\xe4\x15\x8a\x5b\x24\xf9\x33\xee\xb3\xfc\x66\x09\x62\xe9\xc8\x83\x5e\x9c\x9f\xfc\xad\x07\x4f\x31\x52\x33\x65\x56\x11\x5d\x08\x1c\xec\xab\x50\x70\x54\xf3\x81\x6b\xf4\xda\xb4\x83\x6e\x09\xad\xfd\x4d\xde\xb0\x69\xe1\xc8\x1f\x39\x4c\xc3\x0c\xd0\xa6\x51\x11\x7a\x3e\xb2\x68\x99\x4f\xfe\xfb\x54\xac\x54\x52\xde\x4d\xf6\x69\xf6\x98\xdc\xa5\xea\xb6\x2c\x1e\xf1\xee\xef\x5e\xed\xaa\xb4\xc4\xf5\xfa\xd3\x67\xf5\x27\x00\x00\xff\xff\xd2\x2c\xe2\xef\x75\x02\x00\x00") + +func testImagesNonrootDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesNonrootDockerfile, + "test/images/nonroot/Dockerfile", + ) +} + +func testImagesNonrootDockerfile() (*asset, error) { + bytes, err := testImagesNonrootDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonroot/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonrootDockerfile_windows = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x41\x8f\x9b\x3c\x10\x86\xef\xfe\x15\xaf\xc2\x77\xf8\x2a\xa5\x24\xca\xb1\x3d\xd1\x2c\xbb\x45\xbb\x0b\x12\x24\x5d\xed\xd1\x81\x09\x8c\x44\x6c\xd7\x1e\xca\xf2\xef\x2b\xd8\xac\xda\xa8\xbe\xd9\xf3\x78\xfc\xf8\x9d\x08\x7b\xeb\x26\xcf\x6d\x27\xd8\x6d\x77\x5b\x1c\x3a\xc2\xe3\x70\x22\x6f\x48\x28\x20\x19\xa4\xb3\x3e\xc4\x2a\x52\x11\x9e\xb8\x26\x13\xa8\xc1\x60\x1a\xf2\x90\x8e\x90\x38\x5d\x77\xf4\x51\x59\xe3\x07\xf9\xc0\xd6\x60\x17\x6f\xf1\xff\x0c\xac\xae\xa5\xd5\xa7\xaf\x2a\xc2\x64\x07\x5c\xf4\x04\x63\x05\x43\x20\x48\xc7\x01\x67\xee\x09\xf4\x56\x93\x13\xb0\x41\x6d\x2f\xae\x67\x6d\x6a\xc2\xc8\xd2\x2d\xcf\x5c\x9b\xc4\x2a\xc2\xeb\xb5\x85\x3d\x89\x66\x03\x8d\xda\xba\x09\xf6\xfc\x37\x07\x2d\x8b\xf0\xbc\x3a\x11\xf7\x65\xb3\x19\xc7\x31\xd6\x8b\x6c\x6c\x7d\xbb\xe9\xdf\xc1\xb0\x79\xca\xf6\x69\x5e\xa5\x9f\x77\xf1\x76\xb9\x72\x34\x3d\x85\x00\x4f\x3f\x07\xf6\xd4\xe0\x34\x41\x3b\xd7\x73\xad\x4f\x3d\xa1\xd7\x23\xac\x87\x6e\x3d\x51\x03\xb1\xb3\xef\xe8\x59\xd8\xb4\x6b\x04\x7b\x96\x51\x7b\x52\x11\x1a\x0e\xe2\xf9\x34\xc8\x4d\x58\x1f\x76\x1c\x6e\x00\x6b\xa0\x0d\x56\x49\x85\xac\x5a\xe1\x5b\x52\x65\xd5\x5a\x45\x78\xc9\x0e\xdf\x8b\xe3\x01\x2f\x49\x59\x26\xf9\x21\x4b\x2b\x14\x25\xf6\x45\x7e\x97\x1d\xb2\x22\xaf\x50\xdc\x23\xc9\x5f\xf1\x98\xe5\x77\x6b\x10\x4b\x47\x1e\xf4\xe6\xfc\xec\x6f\x3d\x78\x8e\x91\x9a\x39\xb3\x8a\xe8\x46\xe0\x6c\xdf\x85\x82\xa3\x9a\xcf\x5c\xa3\xd7\xa6\x1d\x74\x4b\x68\xed\x2f\xf2\x86\x4d\x0b\x47\xfe\xc2\x61\x1e\x66\x80\x36\x8d\x8a\xd0\xf3\x85\x45\xcb\x72\xf2\xcf\xa7\x62\xa5\x92\xf2\x61\xb6\x4f\xb3\xe7\xe4\x21\x55\xf7\x65\xf1\x8c\xff\xfe\xec\xd5\xb1\x4a\x4b\xec\xad\x99\xc7\x46\xfe\x18\xc8\xab\xdf\x01\x00\x00\xff\xff\xa7\x39\x6a\x2d\x7e\x02\x00\x00") + +func testImagesNonrootDockerfile_windowsBytes() ([]byte, error) { + return bindataRead( + _testImagesNonrootDockerfile_windows, + "test/images/nonroot/Dockerfile_windows", + ) +} + +func testImagesNonrootDockerfile_windows() (*asset, error) { + bytes, err := testImagesNonrootDockerfile_windowsBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonroot/Dockerfile_windows", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonrootOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x28\x49\xcc\xc9\x49\xce\x49\xcc\x2c\xe2\x02\x04\x00\x00\xff\xff\x69\x7f\xf2\x61\x19\x00\x00\x00") + +func testImagesNonrootOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesNonrootOwners, + "test/images/nonroot/OWNERS", + ) +} + +func testImagesNonrootOwners() (*asset, error) { + bytes, err := testImagesNonrootOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonroot/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesNonrootVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe4\x02\x04\x00\x00\xff\xff\x9e\xc5\x88\x7d\x04\x00\x00\x00") + +func testImagesNonrootVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesNonrootVersion, + "test/images/nonroot/VERSION", + ) +} + +func testImagesNonrootVersion() (*asset, error) { + bytes, err := testImagesNonrootVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/nonroot/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsPeerFinderBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\xcc\x4d\x31\x33\xb1\xcd\xb6\x28\xd6\x4b\x4f\x2e\xd2\xcb\xcc\xd7\x4f\x49\x4d\xca\x4c\xcc\xd3\x4d\x4a\x2c\x4e\xd5\x05\x4b\x5a\x19\xe8\x99\xe8\x19\x72\x25\x16\xe5\xe2\x54\x56\x94\x8b\x50\x84\xc7\x34\x90\x24\x54\x61\x41\x41\xb2\x99\x49\x4e\x2a\x2e\xa5\x50\x69\xa8\xe2\x62\x63\x4b\x83\x0a\x5c\x4a\xc1\x92\x50\x85\x80\x00\x00\x00\xff\xff\x82\x15\xeb\x61\xcd\x00\x00\x00") + +func testImagesPetsPeerFinderBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsPeerFinderBaseimage, + "test/images/pets/peer-finder/BASEIMAGE", + ) +} + +func testImagesPetsPeerFinderBaseimage() (*asset, error) { + bytes, err := testImagesPetsPeerFinderBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/peer-finder/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsPeerFinderDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x4f\x9c\x40\x14\x85\xdf\xe7\x57\x9c\x2c\x7d\x68\x93\x5d\xb0\x36\xb1\x69\xfb\x84\x2b\x2a\x51\xc1\x02\x5b\xbb\x69\x1a\x33\xc0\x5d\xb8\x09\x3b\x83\x33\x43\x71\xff\x7d\x03\x6a\xaa\x29\x6f\xcc\xfd\xe6\xcc\x37\x67\x3c\xac\x75\x7f\x30\xdc\xb4\x0e\xc7\x47\x1f\x4f\x50\xb4\x84\xab\xa1\x24\xa3\xc8\x91\x45\x38\xb8\x56\x1b\xeb\x0b\x4f\x78\xb8\xe6\x8a\x94\xa5\x1a\x83\xaa\xc9\xc0\xb5\x84\xb0\x97\x55\x4b\x2f\x93\x25\x7e\x90\xb1\xac\x15\x8e\xfd\x23\xbc\x9f\x80\xc5\xf3\x68\xf1\xe1\x9b\xf0\x70\xd0\x03\xf6\xf2\x00\xa5\x1d\x06\x4b\x70\x2d\x5b\xec\xb8\x23\xd0\x63\x45\xbd\x03\x2b\x54\x7a\xdf\x77\x2c\x55\x45\x18\xd9\xb5\xf3\x31\xcf\x21\xbe\xf0\xb0\x7d\x8e\xd0\xa5\x93\xac\x20\x51\xe9\xfe\x00\xbd\x7b\xcd\x41\xba\x59\x78\xfa\x5a\xe7\xfa\xaf\x41\x30\x8e\xa3\x2f\x67\x59\x5f\x9b\x26\xe8\x9e\x40\x1b\x5c\xc7\xeb\x28\xc9\xa3\xd5\xb1\x7f\x34\x6f\xd9\xa8\x8e\xac\x85\xa1\x87\x81\x0d\xd5\x28\x0f\x90\x7d\xdf\x71\x25\xcb\x8e\xd0\xc9\x11\xda\x40\x36\x86\xa8\x86\xd3\x93\xef\x68\xd8\xb1\x6a\x96\xb0\x7a\xe7\x46\x69\x48\x78\xa8\xd9\x3a\xc3\xe5\xe0\xde\x94\xf5\x62\xc7\xf6\x0d\xa0\x15\xa4\xc2\x22\xcc\x11\xe7\x0b\x9c\x86\x79\x9c\x2f\x85\x87\xbb\xb8\xb8\x4c\x37\x05\xee\xc2\x2c\x0b\x93\x22\x8e\x72\xa4\x19\xd6\x69\x72\x16\x17\x71\x9a\xe4\x48\xcf\x11\x26\x5b\x5c\xc5\xc9\xd9\x12\xc4\xae\x25\x03\x7a\xec\xcd\xe4\xaf\x0d\x78\xaa\x91\xea\xa9\xb3\x9c\xe8\x8d\xc0\x4e\x3f\x09\xd9\x9e\x2a\xde\x71\x85\x4e\xaa\x66\x90\x0d\xa1\xd1\x7f\xc8\x28\x56\x0d\x7a\x32\x7b\xb6\xd3\x63\x5a\x48\x55\x0b\x0f\x1d\xef\xd9\x49\x37\xaf\xfc\x77\x29\x5f\x88\x30\xbb\x98\xec\xa3\xf8\x26\xbc\x88\xc4\x79\x96\xde\xe0\xdd\xbf\x7f\xb1\xce\xd2\x3c\xbf\x3f\xdd\xc4\xd7\x67\xf7\xeb\xf4\x76\x8b\x07\xda\x0f\xab\xef\xd1\xcd\x26\xcc\xd6\x97\x2b\x3b\x45\x57\x08\x06\x6b\x82\x92\x55\x20\x44\xb6\x49\x50\x75\x24\xd5\x8a\x95\x75\xb2\xeb\x30\x36\xe4\x50\x4a\xdb\xa2\x56\x76\x70\xdc\x59\x21\xe6\xa8\x9e\xc8\xac\x76\x3c\x4b\x05\x42\x44\x3f\x6f\xd3\x3c\xc2\x97\x4f\x9f\x4f\x44\x94\x14\xd9\xf6\x36\x8d\x93\x02\xbf\x16\xc1\x2b\x70\xf1\x5b\xfc\x0d\x00\x00\xff\xff\x89\xa7\xb5\xbd\xfe\x02\x00\x00") + +func testImagesPetsPeerFinderDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsPeerFinderDockerfile, + "test/images/pets/peer-finder/Dockerfile", + ) +} + +func testImagesPetsPeerFinderDockerfile() (*asset, error) { + bytes, err := testImagesPetsPeerFinderDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/peer-finder/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsPeerFinderMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x4f\xdc\x3a\x10\x85\x9f\xaf\x7f\xc5\xd1\x86\x07\x90\x96\x84\x8b\xae\xb8\x12\x15\xaa\xd2\xdd\xed\x12\x41\x93\x2a\x09\x20\x9e\x90\x93\xcc\x26\x23\x65\xed\xd4\x76\x9a\xdd\x7f\x5f\x39\x80\x04\xaa\xdf\x66\xe6\x78\xce\xe7\xe3\x00\x2b\x3d\x1c\x0d\xb7\x9d\xc3\xe5\xc5\xbf\x57\x28\x3b\xc2\xdd\x58\x91\x51\xe4\xc8\x22\x1e\x5d\xa7\x8d\x0d\x45\x20\x02\xdc\x73\x4d\xca\x52\x83\x51\x35\x64\xe0\x3a\x42\x3c\xc8\xba\xa3\xf7\xc9\x12\x8f\x64\x2c\x6b\x85\xcb\xf0\x02\xa7\x5e\xb0\x78\x1b\x2d\xce\xbe\x88\x00\x47\x3d\x62\x2f\x8f\x50\xda\x61\xb4\x04\xd7\xb1\xc5\x8e\x7b\x02\x1d\x6a\x1a\x1c\x58\xa1\xd6\xfb\xa1\x67\xa9\x6a\xc2\xc4\xae\x9b\x6d\xde\x96\x84\x22\xc0\xf3\xdb\x0a\x5d\x39\xc9\x0a\x12\xb5\x1e\x8e\xd0\xbb\x8f\x3a\x48\x37\x03\xfb\xd3\x39\x37\x5c\x47\xd1\x34\x4d\xa1\x9c\x61\x43\x6d\xda\xa8\x7f\x15\xda\xe8\x3e\x59\x6d\xd2\x62\x73\x7e\x19\x5e\xcc\x57\x1e\x54\x4f\xd6\xc2\xd0\xaf\x91\x0d\x35\xa8\x8e\x90\xc3\xd0\x73\x2d\xab\x9e\xd0\xcb\x09\xda\x40\xb6\x86\xa8\x81\xd3\x9e\x77\x32\xec\x58\xb5\x4b\x58\xbd\x73\x93\x34\x24\x02\x34\x6c\x9d\xe1\x6a\x74\x9f\xc2\x7a\xa7\x63\xfb\x49\xa0\x15\xa4\xc2\x22\x2e\x90\x14\x0b\x7c\x8b\x8b\xa4\x58\x8a\x00\x4f\x49\x79\x9b\x3d\x94\x78\x8a\xf3\x3c\x4e\xcb\x64\x53\x20\xcb\xb1\xca\xd2\x75\x52\x26\x59\x5a\x20\xfb\x8e\x38\x7d\xc6\x5d\x92\xae\x97\x20\x76\x1d\x19\xd0\x61\x30\x9e\x5f\x1b\xb0\x8f\x91\x1a\x9f\x59\x41\xf4\x09\x60\xa7\x5f\x81\xec\x40\x35\xef\xb8\x46\x2f\x55\x3b\xca\x96\xd0\xea\xdf\x64\x14\xab\x16\x03\x99\x3d\x5b\xff\x99\x16\x52\x35\x22\x40\xcf\x7b\x76\xd2\xcd\x9d\xbf\x1e\x15\x0a\x51\xe4\xab\x02\x37\x18\x88\xcc\xf9\x8e\xbd\x40\x64\x05\xbe\xde\xa0\x67\x35\x1e\x44\x9c\xaf\x6e\x7d\x25\xf7\xcd\xd5\x7f\xa2\x8c\xf3\xed\xa6\xf4\xf5\xc9\xe9\xea\x21\x5f\x27\xf9\x99\xd8\x66\x71\xfe\xc3\xb7\xfe\x17\xdb\xec\x3e\x4e\xb7\x2f\x8f\x9b\xbc\x48\xb2\x74\x5e\x22\x1d\x59\xe7\x4d\x5e\xd6\x49\x3e\xfb\x38\x1b\x7d\x34\xa3\xc3\xa0\x8d\x13\xa2\x62\x75\x2d\xfe\x09\xc3\x28\x0c\x23\xde\xcb\x96\xce\x47\xc7\x7d\x68\x3b\x54\xac\x70\x72\xea\x39\xcf\x84\x08\x7f\xde\x66\xe9\xf3\xb5\x6f\x8a\x3f\x01\x00\x00\xff\xff\x11\x9d\x3d\x9a\x07\x03\x00\x00") + +func testImagesPetsPeerFinderMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsPeerFinderMakefile, + "test/images/pets/peer-finder/Makefile", + ) +} + +func testImagesPetsPeerFinderMakefile() (*asset, error) { + bytes, err := testImagesPetsPeerFinderMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/peer-finder/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsPeerFinderVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe1\x02\x04\x00\x00\xff\xff\xdb\x31\xff\x00\x04\x00\x00\x00") + +func testImagesPetsPeerFinderVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsPeerFinderVersion, + "test/images/pets/peer-finder/VERSION", + ) +} + +func testImagesPetsPeerFinderVersion() (*asset, error) { + bytes, err := testImagesPetsPeerFinderVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/peer-finder/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsPeerFinderPeerFinderGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xd4\x58\x6f\x73\xdb\xb8\xd1\x7f\x2d\x7e\x8a\x0d\x67\x72\x0f\xa9\xa3\xa9\x24\x4f\xa7\xd3\x3a\x75\x6f\x74\xb6\x73\x51\x2f\x27\x7b\x2c\x27\x99\x6b\xec\xb9\x83\xc9\x25\x85\x31\x09\xf0\x00\x50\xb2\xea\xf8\xbb\x77\x16\x00\x29\x5a\x72\xda\xc9\xb5\x6f\x9a\x99\x58\x02\xb0\xd8\xfd\xed\xff\x85\x26\xe3\xe0\x58\x36\x1b\xc5\xcb\xa5\x81\x57\x2f\x5e\xfe\x01\x2e\x97\x08\x3f\xb6\x37\xa8\x04\x1a\xd4\x30\x6d\xcd\x52\x2a\x9d\x06\xc1\x3b\x9e\xa1\xd0\x98\x43\x2b\x72\x54\x60\x96\x08\xd3\x86\x65\x4b\x04\x7f\x92\xc0\x07\x54\x9a\x4b\x01\xaf\xd2\x17\x10\x11\x41\xe8\x8f\xc2\xf8\x75\xb0\x91\x2d\xd4\x6c\x03\x42\x1a\x68\x35\x82\x59\x72\x0d\x05\xaf\x10\xf0\x2e\xc3\xc6\x00\x17\x90\xc9\xba\xa9\x38\x13\x19\xc2\x9a\x9b\xa5\x15\xe2\x59\xa4\xc1\xcf\x9e\x81\xbc\x31\x8c\x0b\x60\x90\xc9\x66\x03\xb2\x18\x52\x01\x33\x41\x00\x00\xb0\x34\xa6\x39\x9c\x4c\xd6\xeb\x75\xca\x2c\xca\x54\xaa\x72\x52\x39\x2a\x3d\x79\x37\x3b\x3e\x9d\x2f\x4e\x0f\x5e\xa5\x2f\x82\xe0\xbd\xa8\x50\x6b\x50\xf8\x5b\xcb\x15\xe6\x70\xb3\x01\xd6\x34\x15\xcf\xd8\x4d\x85\x50\xb1\x35\x48\x05\xac\x54\x88\x39\x18\x49\x38\xd7\x8a\x1b\x2e\xca\x04\xb4\x2c\xcc\x9a\x29\x0c\x72\xae\x8d\xe2\x37\xad\x79\x64\xa0\x0e\x15\xd7\x30\x24\x90\x02\x98\x80\x70\xba\x80\xd9\x22\x84\xef\xa7\x8b\xd9\x22\x09\x3e\xce\x2e\xdf\x9e\xbd\xbf\x84\x8f\xd3\x8b\x8b\xe9\xfc\x72\x76\xba\x80\xb3\x0b\x38\x3e\x9b\x9f\xcc\x2e\x67\x67\xf3\x05\x9c\xbd\x81\xe9\xfc\x67\xf8\x71\x36\x3f\x49\x00\xb9\x59\xa2\x02\xbc\x6b\x14\x61\x97\x0a\x38\x99\x0e\xf3\x34\x58\x20\x3e\x12\x5e\x48\x07\x46\x37\x98\xf1\x82\x67\x50\x31\x51\xb6\xac\x44\x28\xe5\x0a\x95\xe0\xa2\x84\x06\x55\xcd\x35\x39\x4f\x03\x13\x79\x50\xf1\x9a\x1b\x66\xec\x7a\x4f\x9d\x34\x18\x4f\x82\x60\x32\x81\x29\xe8\x9a\x55\x15\xb4\x86\x57\xdc\x6c\xa0\x51\xb2\x54\xac\x26\x23\x55\x52\xde\xb6\x0d\x2c\xa5\x36\x82\xd5\xa8\xc9\x4f\x28\xf2\x46\x72\x61\x34\x58\xf7\x69\x54\x2b\x9e\x61\x1a\x34\x2c\xbb\x25\x38\x35\xe3\x22\x08\x78\xdd\x48\x65\x20\x0a\x46\x61\x51\xb1\x32\xa4\xcf\xda\xd0\x07\x97\x13\x2e\x49\x16\x2d\x2a\x69\x8f\x04\xda\x23\xa9\xdd\xdf\x09\xde\x61\x46\x5f\x15\x96\x78\xd7\xd0\x37\x2d\x95\x25\x21\xf3\x8b\xd2\xd2\x19\x5e\x63\x18\x04\xa3\xf0\xf6\x4f\x3a\xe5\x72\xc2\x1a\x5e\xb3\x6c\xc9\x05\xaa\xcd\xa4\xb9\x2d\x27\x24\x64\xa2\xd1\xe8\x30\x88\x83\x20\x93\x42\x5b\x40\x8d\xac\xaa\x73\x54\x5c\xe6\x70\x04\x2f\x61\x0c\xc4\x28\x5d\x60\x26\x45\x4e\x84\x2b\xa6\x88\x4c\x8a\xe3\x25\x13\x25\x02\x1c\x01\xa9\x90\x2e\xac\xe8\x28\x94\xe2\x20\xb3\x27\x61\x02\x21\xfd\x5f\x64\x8a\x37\x86\xec\xa5\x5a\x41\x61\xe1\x8e\x13\xa8\x5b\x6d\x80\x65\x36\x2f\x18\x08\x5c\x43\xc5\x05\x82\xc6\x86\x29\x46\x21\x54\x71\x6d\xc8\xa6\x0d\xa2\xd2\xb0\xe2\x0c\xb4\xc9\xb9\x48\xc3\x98\xe4\x2f\x0c\x53\x06\x9e\x92\xaf\xe9\xe4\x8b\xe2\xed\xe9\x7f\x28\x5d\xaf\x32\x70\xff\x76\xa4\x7b\x7f\x77\xc2\x7f\xe8\x83\xcf\x1f\x80\x42\xdd\x48\xa1\x39\x65\x5d\x17\xb4\x27\xf3\x05\x28\xcc\xa4\xca\x75\x97\xea\xb9\xa4\x40\x71\xf5\xa3\x91\x39\x25\x97\x17\x6d\x23\xad\x61\x19\xee\x8a\x16\xba\x93\x4a\xe5\x6d\x4b\x36\xe4\xa1\x5a\x61\xd1\x70\x91\xc2\xac\x80\x56\xf8\x7c\xc1\x3c\xb1\x62\xcf\xcf\x4e\x7e\x99\x4f\x7f\x3a\x5d\x9c\x4f\x8f\x4f\x01\xc5\x0a\xc8\xdd\x5c\x53\x31\xcb\xad\x78\x0f\x6c\x5f\x73\x77\x30\x84\x70\x5c\xb5\xda\xa0\x82\x13\x77\x65\xbd\xe4\xd9\xb2\xe3\x45\xf5\xc7\x6c\x69\x12\xe0\x85\x2d\x9a\x1a\x0d\x18\xc5\x51\x93\xc3\x72\x34\x94\xb2\x02\x81\x1b\x28\x94\xac\x61\x82\x26\x9b\x28\xd4\xb2\x5a\xa5\x99\x14\x85\xad\xad\x84\x2b\x0e\x82\xa2\x15\x99\x4f\xc9\x48\xaf\xb2\x39\xab\x11\x5c\x3e\xc4\x10\x51\x9c\x7b\xa8\x09\xa0\x52\x52\xc5\x70\x1f\x8c\xb6\xd9\x7a\x78\x04\x96\x66\x8e\x6b\xaf\x51\x1c\x8c\x7e\x49\x40\xab\xd5\x85\x73\x8d\xbd\x47\x74\x02\x4d\xfa\xce\xca\x59\x5c\x7c\x88\x42\xaf\xb2\x17\x19\x07\x23\x5e\x58\xca\x67\x47\x20\x78\x45\x52\x46\x0a\x4d\xab\xc4\xb6\x36\x58\x56\xc1\xe8\x21\x18\x51\x08\x0c\xa5\x10\x7f\x65\xf3\x6a\x2b\xd8\xb2\x98\x4c\x6c\xd7\x5a\x5c\x7c\xe8\x43\x05\x45\xee\xab\x4c\x98\x86\x7d\x30\x29\x29\x8d\x0f\x9f\x60\x34\xc2\x86\x38\x16\xb5\x49\x17\x8d\xe2\xc2\x14\x51\xf8\x7c\x15\x0e\x04\xa6\x97\x4c\x95\x68\x3e\x1d\x56\x28\xa2\xdd\xdd\xf8\xe0\xe5\x75\x4c\x5c\x3a\xe0\xe9\x4c\x68\x54\x26\xc2\x26\xb6\xf0\xf7\x15\x13\xbc\x0a\x1e\xbc\x33\xf4\x12\xab\xea\xac\x35\x91\x46\x91\x2f\x28\x79\x12\xd0\x2e\x1d\x3b\xc7\xdc\x07\xa3\x4a\x96\xe9\xb9\xc7\x46\x95\x8d\x8b\xf2\x10\x9e\xaf\x5c\x73\xb4\x29\x47\xcb\xb0\xbb\x9a\x40\xcf\x2d\x0e\x82\x51\x56\x5b\x9b\xd1\xc5\xf4\x58\xd6\x35\x13\x79\xe4\x08\x29\x4d\x9d\x4c\xef\xb7\xac\xce\x53\x7b\xef\x9c\x37\x18\x3d\xe9\x28\xc2\xf2\x86\x19\x56\x15\x51\xf8\x86\xf1\xca\x35\xc3\x12\x8d\x03\x02\x0d\x6f\xd0\xa3\x41\xa5\x9c\x0d\xb4\xc9\x65\x6b\x76\xa5\xc8\xd6\xfc\x4e\x31\xb2\x35\x4f\xc9\xb1\xaa\xa6\xb6\xe8\x45\xa4\xb8\x2b\x46\x1f\x15\x37\x18\x7d\xba\xbe\xd9\x18\xdc\x9a\x39\xee\x74\x4f\x8f\x2b\xa9\xd1\xd2\x0f\x31\xba\x0e\x93\x5e\x20\xcb\xa7\x55\x15\x39\xa1\x5f\x81\x94\xac\xdd\x1a\x84\xe7\x2b\x02\x69\xd9\xee\xfa\xc8\xe5\x10\xb1\x1d\xaa\xd0\xfb\x3a\x1a\x10\xc4\x7d\xc0\x50\xd0\x46\x36\x28\x6c\x69\x39\x67\xca\x83\x17\x36\x41\xc7\x7d\x51\xb3\x50\x85\x86\xa3\x23\x08\x43\x0b\x94\x16\x20\x75\xfa\x03\x1a\x14\xab\x28\x7c\x54\xc9\x42\xe7\x29\x5e\xc0\x98\x2a\xb7\xbb\xf5\xf9\xf3\x96\xc3\xe7\xcf\x10\x8d\xfb\x96\xe6\xf6\xbe\xf9\x06\xc6\x5d\x97\xb1\x3b\xf1\x9e\x45\x66\xc2\x0e\x73\x68\x10\x98\x2a\x75\xd2\x8d\x57\x70\xd0\x77\x41\x9a\x34\x26\x52\xd9\x1d\xdf\x79\x0e\xba\x5e\xc0\x44\x0e\x07\xc2\x0e\x36\x4c\xf4\xd5\x96\x12\xf9\x11\xfa\x34\xf4\xd6\xeb\x06\x8d\xde\x8f\x52\xa7\x6f\xfd\xde\xd7\x06\x5a\xc7\xeb\x10\x9e\xeb\x61\x34\x13\x02\x57\x3d\x06\x05\x34\x08\xa8\xfe\xcc\x8a\xae\x2d\x71\x6d\x8b\x75\xa3\xe4\x8a\xe7\xb6\x77\xa8\x4d\xc7\xb8\x2b\xd5\x83\x2a\xed\x2c\xef\xef\x6e\x5d\xe6\x28\x8e\xa5\x28\xbe\xdf\x18\xd4\x4f\x45\xe7\x1b\x5e\x61\x14\xee\x56\x7d\xb2\xc7\xe0\xb6\xad\xdd\x2e\x9c\x76\x58\x12\xdd\xbe\x51\xb6\x56\x89\xc2\xf7\xc2\xce\xbf\x34\x1d\x20\xcb\xf7\xfa\x8b\x95\x44\xa6\xb7\x76\x51\x08\x63\x37\x73\xa5\x17\xf6\xc3\xb1\x7f\x14\x87\x64\x28\x6a\x0e\xd4\x65\xc9\x93\x6c\xdb\xca\x99\xb1\xed\x49\x43\xc5\x6f\xfd\xec\x3f\x4e\xf5\x2a\x4b\xc7\x63\xba\xa8\xbc\x5f\x8f\xc0\xcb\x38\x96\x75\x43\xfa\xff\x7a\x35\x8d\xd2\xf1\x95\x88\xc7\x1a\x99\xca\x96\x57\xfa\xfe\x65\xf2\x40\x5b\xf6\x4b\x3c\x8e\xbe\x3b\xff\x4b\x29\x59\xf5\xd7\x4f\xec\xe0\x1f\xd3\x83\xbf\xbf\x38\xf8\xf3\xc1\xf5\xfd\xcb\xe4\x8f\xff\xff\x60\xf9\x47\xfb\xfb\x57\x69\x3c\xde\xee\x5e\xdf\xbf\xa2\xcd\xf8\x57\xab\x2e\x60\xa5\xf1\xeb\x94\xf9\xaf\x6a\xf1\x3b\x20\xff\x1b\x3f\x3f\x8a\xfe\x4c\x21\x33\x34\x88\x95\x6d\xc5\xfa\xd7\x05\x97\xe2\x51\xc1\x75\x5e\x2f\x95\x6c\x9b\xb9\x9d\xed\xa9\x31\x63\xba\x68\x6f\xf0\xce\xed\x44\x3e\x0a\xdb\xca\xf8\xc3\x37\x9c\xea\x2f\x05\xe2\xa2\xbd\xa9\x99\xc9\x96\x83\x80\x24\x6a\xb2\xe1\x6d\x02\xab\x6d\x97\xf7\xf7\x2d\x5c\x5e\xc0\x56\xde\xa7\xdb\x6b\x1b\x55\x64\x11\x1f\x59\xfb\xb1\x66\x1d\x74\xd2\xe7\x64\x5f\x8c\x1c\x21\xd7\x80\x75\x63\x36\x8e\x72\x90\xd4\x47\xb0\xb2\x7b\x43\x4f\x5b\x56\x73\xff\xfa\xcb\xa4\x58\xa1\x32\xde\xad\xc0\x85\x91\x20\xf4\x20\x56\x77\xd8\x09\x0d\xdf\xda\x21\xe4\xdb\x8e\xb3\xfd\x7b\xa3\x90\xdd\x06\x7e\xf9\xe0\xcb\x51\xd7\xea\x4f\xba\xe1\x2e\xef\x34\x30\x12\x6e\xd0\x95\xa3\x2d\x77\xaa\xfe\x03\x9c\x8f\xc4\xfa\xd7\x4e\xfa\x37\xc9\x45\xf4\xe9\xda\x2d\xef\x85\x4e\x20\xd4\xab\x2c\x4c\xba\x9a\xf3\x90\x10\x38\x5f\x44\xf7\x9a\xc0\x90\xe5\xff\x50\x33\xa8\x37\x16\xf2\xe1\x97\xcc\xb0\x6d\x16\xa4\xee\xd0\xa4\xbd\x39\xfc\x2c\x46\x9d\xd5\xeb\x66\xcd\xe3\xb7\xb7\x71\xd6\x6d\x40\x6f\x95\x1d\x5f\xce\x25\x74\x1a\x81\x6e\x1b\xfb\x46\x4f\x60\xab\xb6\x9d\xe6\xaa\x8a\xdc\xcb\xdc\x69\xff\x10\x4b\xfb\xa1\x21\xee\x07\x62\xf7\xe2\x7a\x62\x22\x7f\xdd\x61\x7b\x46\xd8\x5e\xfb\xa7\x69\x85\xd8\x44\xdb\x67\xab\xf3\x8c\xc0\xf5\x39\xb1\xe9\xbb\x8a\x7f\x19\x90\x31\xfe\x45\x5b\x38\x1f\x0e\xc9\xbe\x12\x8c\x32\x29\x0c\x17\x2d\x6e\x2b\x4d\xc7\x3d\x3d\xfd\xad\x65\x55\x64\x01\xc7\x14\x38\xcf\xfa\x93\xb7\x4c\x47\xce\x47\xf1\x3e\xfb\xb7\x6c\x85\xb6\x85\x16\xb2\x15\x39\xd4\x1b\x8d\x55\x41\xb3\xbc\x7d\x74\x6e\xd0\xa4\x57\xe2\xa7\x0d\xbc\x1d\x34\xe9\x2b\x41\x2b\xdd\x11\xf9\xbe\xed\x24\x24\x8f\x63\xa0\xc7\xf0\x8e\x6b\x13\xc5\x09\xd0\x13\x25\x7e\x4a\x15\x02\x4e\x44\xee\x59\xf3\xe8\x16\xf9\x5d\x2a\xe3\x1f\x4d\x3a\xea\x48\xe3\x1d\xdf\xd3\x1d\x07\xbb\x6d\x72\x7a\x38\x5f\x89\x35\xd3\xf0\x7c\x75\x25\x84\x5c\xbb\x92\xda\x3c\x42\xb3\x23\xc8\x4a\xea\x5f\x0a\x43\x3d\x3a\x91\x09\x84\x57\x22\x8c\x07\x81\x32\x72\x21\xb2\x05\xfd\x85\x28\x7d\xb0\x83\xcb\xe5\xd9\xc9\xd9\x21\x9c\xde\x71\x43\x95\xd1\x2c\x51\xe1\xff\xd1\x04\xb3\x8d\xd0\xef\x82\x7d\x9d\x0a\x6e\x7f\x13\xc2\x3b\xfb\x33\x58\x48\x53\xea\x3f\x03\x00\x00\xff\xff\xb9\xe2\x7f\x68\x4a\x14\x00\x00") + +func testImagesPetsPeerFinderPeerFinderGoBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsPeerFinderPeerFinderGo, + "test/images/pets/peer-finder/peer-finder.go", + ) +} + +func testImagesPetsPeerFinderPeerFinderGo() (*asset, error) { + bytes, err := testImagesPetsPeerFinderPeerFinderGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/peer-finder/peer-finder.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsRedisInstallerBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\xcd\xb6\x28\xd6\x4b\x4f\x2e\xd2\xcb\xcc\xd7\x4f\x49\x4d\xca\x4c\xcc\xd3\x4d\x4a\x2c\x4e\xd5\x05\x4b\x5a\x19\xe8\x99\xe8\x19\x72\x41\x95\x17\xe5\xe2\x54\x5c\x94\x8b\xae\x14\x8f\xc9\x20\x49\x14\xe5\x05\x05\xc9\x66\x26\x39\xa9\xb8\x34\x40\xa5\xa1\x5a\x00\x01\x00\x00\xff\xff\x2a\x1e\xc7\x42\xbc\x00\x00\x00") + +func testImagesPetsRedisInstallerBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsRedisInstallerBaseimage, + "test/images/pets/redis-installer/BASEIMAGE", + ) +} + +func testImagesPetsRedisInstallerBaseimage() (*asset, error) { + bytes, err := testImagesPetsRedisInstallerBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/redis-installer/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsRedisInstallerDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x93\xd1\x6e\xe3\x36\x13\x85\xef\xf9\x14\x07\xf6\x8f\xfd\x5b\x20\x92\x52\x17\xdb\x05\x52\xf4\x42\xb1\xbd\xbb\xc2\x26\xd2\xd6\x72\xba\x08\xda\x22\xa0\xa4\xb1\xc4\xae\x44\x2a\x24\x15\xc5\x79\xfa\x82\x94\xdd\x38\x48\x7c\x65\x91\x67\x66\xce\x7c\x33\x9c\x63\xa9\xfa\xbd\x16\x75\x63\xb1\x38\xff\xe9\x17\x6c\x1b\xc2\x97\xa1\x20\x2d\xc9\x92\x41\x3c\xd8\x46\x69\x13\xb2\x39\x9b\xe3\x4a\x94\x24\x0d\x55\x18\x64\x45\x1a\xb6\x21\xc4\x3d\x2f\x1b\x3a\xde\x9c\xe1\x0f\xd2\x46\x28\x89\x45\x78\x8e\x1f\x9c\x60\x76\xb8\x9a\xfd\xf8\x2b\x9b\x63\xaf\x06\x74\x7c\x0f\xa9\x2c\x06\x43\xb0\x8d\x30\xd8\x89\x96\x40\x8f\x25\xf5\x16\x42\xa2\x54\x5d\xdf\x0a\x2e\x4b\xc2\x28\x6c\xe3\xcb\x1c\x92\x84\x6c\x8e\xdb\x43\x0a\x55\x58\x2e\x24\x38\x4a\xd5\xef\xa1\x76\xa7\x3a\x70\xeb\x0d\xbb\x5f\x63\x6d\x7f\x11\x45\xe3\x38\x86\xdc\x9b\x0d\x95\xae\xa3\x76\x12\x9a\xe8\x2a\x59\xae\xd3\x7c\x1d\x2c\xc2\x73\x1f\x72\x23\x5b\x32\x06\x9a\xee\x07\xa1\xa9\x42\xb1\x07\xef\xfb\x56\x94\xbc\x68\x09\x2d\x1f\xa1\x34\x78\xad\x89\x2a\x58\xe5\xfc\x8e\x5a\x58\x21\xeb\x33\x18\xb5\xb3\x23\xd7\xc4\xe6\xa8\x84\xb1\x5a\x14\x83\x7d\x01\xeb\xe8\x4e\x98\x17\x02\x25\xc1\x25\x66\x71\x8e\x24\x9f\xe1\x32\xce\x93\xfc\x8c\xcd\xf1\x2d\xd9\x7e\xce\x6e\xb6\xf8\x16\x6f\x36\x71\xba\x4d\xd6\x39\xb2\x0d\x96\x59\xba\x4a\xb6\x49\x96\xe6\xc8\x3e\x22\x4e\x6f\xf1\x25\x49\x57\x67\x20\x61\x1b\xd2\xa0\xc7\x5e\x3b\xff\x4a\x43\x38\x8c\x54\x39\x66\x39\xd1\x0b\x03\x3b\x35\x19\x32\x3d\x95\x62\x27\x4a\xb4\x5c\xd6\x03\xaf\x09\xb5\x7a\x20\x2d\x85\xac\xd1\x93\xee\x84\x71\xc3\x34\xe0\xb2\x62\x73\xb4\xa2\x13\x96\x5b\x7f\xf2\xaa\xa9\x90\xb1\x39\xb6\xd9\x2a\xbb\x40\x4d\x16\x5a\x54\x6e\x26\x05\x37\x0d\x2a\xea\x49\x56\x24\xcb\xbd\x4b\x04\x33\x0a\x5b\x36\x0e\x5e\xdf\xba\x09\x16\x83\xd9\x17\xea\xd1\xf9\x74\xcb\x67\xb9\xc6\xf3\x29\x78\x6b\x14\x2a\x45\x46\xfe\xdf\xc2\x10\x75\x2e\xd0\x57\x37\xd6\x65\x73\xdb\xe2\x3a\x16\x4a\x86\x2c\xde\x7c\x72\xfc\xd6\xc9\x75\xfc\x69\xcd\x3e\x6e\xb2\x6b\xfc\xef\xf9\x9b\x2d\x37\x59\x9e\xdf\x5d\xde\x24\x57\xab\xbb\x65\xf6\xf5\x16\xf7\xd4\x0d\xc1\xef\xeb\xeb\x9b\x78\xb3\xfc\x1c\x18\xd7\x5c\x89\x68\x30\x3a\x2a\x84\x8c\x9e\x3b\xfa\x67\x30\xd3\xbe\xfa\x9a\x5c\x57\xd0\x54\x09\x83\xb1\x21\xe9\x20\x68\x3f\x53\x25\x27\xb2\x3f\x87\x8b\xf0\x3c\x64\x9b\x9b\x14\x65\x4b\x5c\x06\x42\x1a\xcb\xdb\x16\xa3\x23\xd3\xf1\xef\x84\xba\x2c\xd1\x8a\xa2\x0c\x2a\x7a\xf0\x90\xd8\x61\x4a\x9b\x75\xbc\xba\x5e\x87\x5d\xe5\xc3\x7d\x40\x70\x9f\x21\xf2\xf5\x82\x29\xb3\xe5\x3a\xac\x9f\x8e\x8b\x5d\xa9\x51\xb6\x8a\x57\xa1\x97\x84\x42\x45\x9a\x5a\xe2\x6e\xb7\xdf\x08\x7a\xf7\x0e\x7f\x31\xf7\x2c\x1c\xe6\xe0\xf1\x69\xf7\x66\xea\x60\x89\xc8\x76\x7d\xe4\xe4\xba\x7b\x4b\xe2\xfc\x2e\x5d\x73\x50\x83\x05\x3d\x0a\xe3\xde\x80\x1b\xb5\x41\x41\x3b\xe5\x88\x4c\x5d\xfb\x85\x61\x73\x37\x3b\x6f\xd9\x5c\x44\x51\x2d\x6c\x33\x14\x61\xa9\xba\x88\x4b\x2b\x34\x3d\x4d\x25\x22\x61\xcc\x40\x26\xfa\xb0\x58\x4c\xf8\xaa\xc9\xc7\x49\x7d\x67\xc9\x23\x74\x2f\xc8\xe3\xf5\x27\xdf\x2b\xa1\x11\xf4\x07\xab\xcf\x6d\x7a\xe9\x91\x7f\x92\xe6\xdb\xf8\xea\xea\xee\x32\x49\x7f\x7b\x25\x7c\x78\x55\x6a\xfa\x1f\x96\x4a\x1e\x29\x9d\x9e\xfc\x17\xa9\x3b\x04\x7a\xf7\x2a\x9a\xb1\x78\xb5\x82\x92\x6e\xad\xb4\x0d\x4d\x83\x88\x31\xbf\x75\x3d\x91\x0e\x76\xc2\xbf\xa0\xc8\xab\x0e\x06\x27\x91\x6f\xbc\xe9\x54\x85\xa0\xc4\x87\xf7\xef\x11\x9d\x5e\xbf\x48\x78\x92\x89\xad\xd3\xed\xe6\xf6\x6b\x96\xa4\x5b\xfc\x39\x3b\x09\x99\xfd\xcd\xfe\x0d\x00\x00\xff\xff\x83\x12\xc0\xa9\xe5\x05\x00\x00") + +func testImagesPetsRedisInstallerDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsRedisInstallerDockerfile, + "test/images/pets/redis-installer/Dockerfile", + ) +} + +func testImagesPetsRedisInstallerDockerfile() (*asset, error) { + bytes, err := testImagesPetsRedisInstallerDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/redis-installer/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsRedisInstallerMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x4f\xdc\x3a\x10\x85\x9f\xaf\x7f\xc5\xd1\x86\x07\x90\x96\x84\x8b\xae\xb8\x12\x15\xaa\xd2\xdd\xed\x12\x41\x93\x2a\x09\x20\x9e\x90\x93\xcc\x26\x23\x65\xed\xd4\x76\x9a\xdd\x7f\x5f\x39\x80\x04\xaa\xdf\x66\xe6\x78\xce\xe7\xe3\x00\x2b\x3d\x1c\x0d\xb7\x9d\xc3\xe5\xc5\xbf\x57\x28\x3b\xc2\xdd\x58\x91\x51\xe4\xc8\x22\x1e\x5d\xa7\x8d\x0d\x45\x20\x02\xdc\x73\x4d\xca\x52\x83\x51\x35\x64\xe0\x3a\x42\x3c\xc8\xba\xa3\xf7\xc9\x12\x8f\x64\x2c\x6b\x85\xcb\xf0\x02\xa7\x5e\xb0\x78\x1b\x2d\xce\xbe\x88\x00\x47\x3d\x62\x2f\x8f\x50\xda\x61\xb4\x04\xd7\xb1\xc5\x8e\x7b\x02\x1d\x6a\x1a\x1c\x58\xa1\xd6\xfb\xa1\x67\xa9\x6a\xc2\xc4\xae\x9b\x6d\xde\x96\x84\x22\xc0\xf3\xdb\x0a\x5d\x39\xc9\x0a\x12\xb5\x1e\x8e\xd0\xbb\x8f\x3a\x48\x37\x03\xfb\xd3\x39\x37\x5c\x47\xd1\x34\x4d\xa1\x9c\x61\x43\x6d\xda\xa8\x7f\x15\xda\xe8\x3e\x59\x6d\xd2\x62\x73\x7e\x19\x5e\xcc\x57\x1e\x54\x4f\xd6\xc2\xd0\xaf\x91\x0d\x35\xa8\x8e\x90\xc3\xd0\x73\x2d\xab\x9e\xd0\xcb\x09\xda\x40\xb6\x86\xa8\x81\xd3\x9e\x77\x32\xec\x58\xb5\x4b\x58\xbd\x73\x93\x34\x24\x02\x34\x6c\x9d\xe1\x6a\x74\x9f\xc2\x7a\xa7\x63\xfb\x49\xa0\x15\xa4\xc2\x22\x2e\x90\x14\x0b\x7c\x8b\x8b\xa4\x58\x8a\x00\x4f\x49\x79\x9b\x3d\x94\x78\x8a\xf3\x3c\x4e\xcb\x64\x53\x20\xcb\xb1\xca\xd2\x75\x52\x26\x59\x5a\x20\xfb\x8e\x38\x7d\xc6\x5d\x92\xae\x97\x20\x76\x1d\x19\xd0\x61\x30\x9e\x5f\x1b\xb0\x8f\x91\x1a\x9f\x59\x41\xf4\x09\x60\xa7\x5f\x81\xec\x40\x35\xef\xb8\x46\x2f\x55\x3b\xca\x96\xd0\xea\xdf\x64\x14\xab\x16\x03\x99\x3d\x5b\xff\x99\x16\x52\x35\x22\x40\xcf\x7b\x76\xd2\xcd\x9d\xbf\x1e\x15\x0a\x51\xe4\xab\x02\x37\x18\x88\xcc\xf9\x8e\xbd\x40\x64\x05\xbe\xde\xa0\x67\x35\x1e\x44\x9c\xaf\x6e\x7d\x25\xf7\xcd\xd5\x7f\xa2\x8c\xf3\xed\xa6\xf4\xf5\xc9\xe9\xea\x21\x5f\x27\xf9\x99\xd8\x66\x71\xfe\xc3\xb7\xfe\x17\xdb\xec\x3e\x4e\xb7\x2f\x8f\x9b\xbc\x48\xb2\x74\x5e\x22\x1d\x59\xe7\x4d\x5e\xd6\x49\x3e\xfb\x38\x1b\x7d\x34\xa3\xc3\xa0\x8d\x13\xa2\x62\x75\x2d\xfe\x09\xc3\x28\x0c\x23\xde\xcb\x96\xce\x47\xc7\x7d\x68\x3b\x54\xac\x70\x72\xea\x39\xcf\x84\x08\x7f\xde\x66\xe9\xf3\xb5\x6f\x8a\x3f\x01\x00\x00\xff\xff\x11\x9d\x3d\x9a\x07\x03\x00\x00") + +func testImagesPetsRedisInstallerMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsRedisInstallerMakefile, + "test/images/pets/redis-installer/Makefile", + ) +} + +func testImagesPetsRedisInstallerMakefile() (*asset, error) { + bytes, err := testImagesPetsRedisInstallerMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/redis-installer/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsRedisInstallerVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe1\x02\x04\x00\x00\xff\xff\xdb\x31\xff\x00\x04\x00\x00\x00") + +func testImagesPetsRedisInstallerVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsRedisInstallerVersion, + "test/images/pets/redis-installer/VERSION", + ) +} + +func testImagesPetsRedisInstallerVersion() (*asset, error) { + bytes, err := testImagesPetsRedisInstallerVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/redis-installer/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsRedisInstallerInstallSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x92\x41\x6f\xe3\x36\x10\x85\xef\xfc\x15\xaf\x52\x0e\xdd\x20\x92\xd2\x14\xe8\xa1\x81\x81\xba\x89\x8b\x0a\x71\x6d\xc0\x72\x12\xec\x69\x41\x4b\x63\x69\x10\x99\x64\x49\x2a\x8a\x91\xe6\xbf\x17\x94\xad\x76\x9d\xb4\x3d\xd4\x27\x8b\x6f\x38\xfc\xe6\xbd\x89\xbf\xc9\x36\xac\xb2\x8d\x74\x8d\x10\x31\x6e\xb4\xd9\x5b\xae\x1b\x8f\xab\xcb\xef\x7e\xc0\xba\x21\xdc\x75\x1b\xb2\x8a\x3c\x39\x4c\x3b\xdf\x68\xeb\x52\x11\x8b\x18\x73\x2e\x49\x39\xaa\xd0\xa9\x8a\x2c\x7c\x43\x98\x1a\x59\x36\x34\x2a\x17\x78\x20\xeb\x58\x2b\x5c\xa5\x97\xf8\x36\x14\x44\x47\x29\xfa\x74\x2d\x62\xec\x75\x87\x9d\xdc\x43\x69\x8f\xce\x11\x7c\xc3\x0e\x5b\x6e\x09\xf4\x52\x92\xf1\x60\x85\x52\xef\x4c\xcb\x52\x95\x84\x9e\x7d\x33\x3c\x73\x6c\x92\x8a\x18\x9f\x8f\x2d\xf4\xc6\x4b\x56\x90\x28\xb5\xd9\x43\x6f\xbf\xae\x83\xf4\x03\x70\xf8\x35\xde\x9b\x1f\xb3\xac\xef\xfb\x54\x0e\xb0\xa9\xb6\x75\xd6\x1e\x0a\x5d\x36\xcf\x6f\x66\x8b\x62\x96\x5c\xa5\x97\xc3\x95\x7b\xd5\x92\x73\xb0\xf4\x7b\xc7\x96\x2a\x6c\xf6\x90\xc6\xb4\x5c\xca\x4d\x4b\x68\x65\x0f\x6d\x21\x6b\x4b\x54\xc1\xeb\xc0\xdb\x5b\xf6\xac\xea\x0b\x38\xbd\xf5\xbd\xb4\x24\x62\x54\xec\xbc\xe5\x4d\xe7\x4f\xcc\x1a\xe9\xd8\x9d\x14\x68\x05\xa9\x10\x4d\x0b\xe4\x45\x84\x9f\xa7\x45\x5e\x5c\x88\x18\x8f\xf9\xfa\xd7\xe5\xfd\x1a\x8f\xd3\xd5\x6a\xba\x58\xe7\xb3\x02\xcb\x15\x6e\x96\x8b\xdb\x7c\x9d\x2f\x17\x05\x96\xbf\x60\xba\xf8\x8c\xbb\x7c\x71\x7b\x01\x62\xdf\x90\x05\xbd\x18\x1b\xf8\xb5\x05\x07\x1b\xa9\x0a\x9e\x15\x44\x27\x00\x5b\x7d\x00\x72\x86\x4a\xde\x72\x89\x56\xaa\xba\x93\x35\xa1\xd6\xcf\x64\x15\xab\x1a\x86\xec\x8e\x5d\x08\xd3\x41\xaa\x4a\xc4\x68\x79\xc7\x5e\xfa\xe1\xe4\xc3\x50\x69\xd8\xa5\x75\x88\xf3\x59\xb7\xdd\x6e\x18\x52\x3a\xd7\xed\x0e\x3e\xd1\x0b\x3b\x1f\xfa\x84\x73\xd7\xc8\x60\xed\x90\xae\x91\x96\x94\x1f\xf3\x63\xc5\x5e\xc4\x28\xb5\x0a\xe1\x92\x4d\x91\xfb\xf1\xcb\x0d\x15\x96\x2a\x76\x60\xe5\xbc\x6c\xdb\x01\x26\x15\xf9\xa2\x58\x4f\xe7\xf3\x2f\x0f\xcb\xf9\xfd\x6f\xb3\x49\x94\x69\xe3\xa3\xff\xc9\x13\xde\x30\x44\x36\xd9\x72\x18\x51\xc4\x03\xd3\xbf\x11\x69\x95\x38\x2f\xad\xcf\xca\x46\xaa\x9a\x82\xb0\xe5\xba\xb3\x03\x18\x5c\x69\xd9\x78\x97\x8a\xc7\xe5\xea\xee\xcb\x6d\xbe\x9a\x44\x59\xaf\xed\x53\x52\xb1\x8d\x84\x78\x98\xad\x8a\x7c\xb9\x98\x44\xdf\xa7\x57\xe9\x65\x24\x44\x88\x85\xc3\x4a\x45\x67\x3f\x45\xa2\xd2\xa2\x94\x8e\x70\x16\x8e\x44\x58\xe5\x84\x27\xe7\x7f\x24\xc9\x71\xf8\x84\x95\xd7\x93\xf3\x4f\x83\xf4\xde\x82\xb3\x57\x8e\xcf\x27\x6f\xd1\x20\xba\x86\xb7\x7e\xf8\x77\x7d\x7d\x68\xd4\x0f\x8d\x46\x96\xb1\xc9\xdf\x98\xff\x7d\xfd\x58\x1e\xa3\x53\x4f\x4a\xf7\x0a\xda\x84\x79\xc7\x12\x72\xb2\x14\x95\x56\x24\x04\x95\x8d\x1e\xc3\x0a\x4b\x75\xf0\x67\x34\x06\x61\x02\x44\x67\xaf\xe3\xc3\x6f\x91\xd8\x3d\x55\x6c\x91\x98\x77\xc7\xa5\x41\x36\x9a\x9d\xba\xe6\x54\xcd\x06\xf9\xab\xd4\xde\xcb\x1f\x38\x86\x2d\x4a\xa2\xb3\xd7\x63\x06\x6f\xd1\x5f\x2c\xa7\x4e\xbe\x23\xfa\x28\x3e\x23\x3b\xac\xe4\x3f\xa8\x07\x45\xfc\x19\x00\x00\xff\xff\xce\xa7\x2e\xcb\x71\x05\x00\x00") + +func testImagesPetsRedisInstallerInstallShBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsRedisInstallerInstallSh, + "test/images/pets/redis-installer/install.sh", + ) +} + +func testImagesPetsRedisInstallerInstallSh() (*asset, error) { + bytes, err := testImagesPetsRedisInstallerInstallShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/redis-installer/install.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsRedisInstallerOnStartSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x54\x61\x6f\xdb\x36\x14\xfc\xce\x5f\x71\x93\x0c\xa4\x0d\x6c\x39\xeb\x80\x0e\x6b\x61\x0c\x5e\xe2\xb6\x46\x5b\x3b\x88\xdd\x15\x45\xd7\x01\xb4\xf4\x24\x71\xa0\x49\x8d\xa4\xa2\x0a\x49\xfe\xfb\xf0\x28\x67\x8d\xd3\xcd\x1f\x6c\x8b\xe2\xe3\xbb\xbb\x77\xbc\xf4\x87\x69\xeb\xdd\x74\xa7\xcc\x94\xcc\x35\x76\xd2\xd7\x42\xa4\x38\xb7\x4d\xef\x54\x55\x07\x3c\x3b\xfb\xf1\x39\xb6\x35\xe1\x6d\xbb\x23\x67\x28\x90\xc7\xbc\x0d\xb5\x75\x3e\x13\xa9\x48\xf1\x4e\xe5\x64\x3c\x15\x68\x4d\x41\x0e\xa1\x26\xcc\x1b\x99\xd7\x74\xff\x66\x8c\xdf\xc9\x79\x65\x0d\x9e\x65\x67\x78\xc2\x1b\x92\xc3\xab\xe4\xe9\x4b\x91\xa2\xb7\x2d\xf6\xb2\x87\xb1\x01\xad\x27\x84\x5a\x79\x94\x4a\x13\xe8\x6b\x4e\x4d\x80\x32\xc8\xed\xbe\xd1\x4a\x9a\x9c\xd0\xa9\x50\xc7\x36\x87\x43\x32\x91\xe2\xd3\xe1\x08\xbb\x0b\x52\x19\x48\xe4\xb6\xe9\x61\xcb\x87\xfb\x20\x43\x04\xcc\x9f\x3a\x84\xe6\xc5\x74\xda\x75\x5d\x26\x23\xd8\xcc\xba\x6a\xaa\x87\x8d\x7e\xfa\x6e\x79\xbe\x58\x6d\x16\x93\x67\xd9\x59\x2c\xf9\x60\x34\x79\x0f\x47\x7f\xb7\xca\x51\x81\x5d\x0f\xd9\x34\x5a\xe5\x72\xa7\x09\x5a\x76\xb0\x0e\xb2\x72\x44\x05\x82\x65\xbc\x9d\x53\x41\x99\x6a\x0c\x6f\xcb\xd0\x49\x47\x22\x45\xa1\x7c\x70\x6a\xd7\x86\x23\xb1\xee\xd1\x29\x7f\xb4\xc1\x1a\x48\x83\x64\xbe\xc1\x72\x93\xe0\xb7\xf9\x66\xb9\x19\x8b\x14\x1f\x97\xdb\x37\xeb\x0f\x5b\x7c\x9c\x5f\x5d\xcd\x57\xdb\xe5\x62\x83\xf5\x15\xce\xd7\xab\x8b\xe5\x76\xb9\x5e\x6d\xb0\x7e\x85\xf9\xea\x13\xde\x2e\x57\x17\x63\x90\x0a\x35\x39\xd0\xd7\xc6\x31\x7e\xeb\xa0\x58\x46\x2a\x58\xb3\x0d\xd1\x11\x80\xd2\x0e\x80\x7c\x43\xb9\x2a\x55\x0e\x2d\x4d\xd5\xca\x8a\x50\xd9\x6b\x72\x46\x99\x0a\x0d\xb9\xbd\xf2\x3c\x4c\x0f\x69\x0a\x91\x42\xab\xbd\x0a\x32\xc4\x95\xef\x48\x65\x42\x78\x0a\x98\x90\x10\xe7\xaf\x5e\xcf\xa6\xb6\x09\x53\x47\x85\xf2\xc3\x77\x96\x5b\x53\x8a\x37\xeb\xcd\x76\x35\x7f\xbf\x98\x8d\x9e\xd4\xd6\x07\x23\xf7\xf4\x54\x5c\xcc\xb7\xf3\x8b\xe5\xd5\x2c\x99\x16\x32\xc8\x44\xa4\xb8\xb4\x2e\xb0\x2a\x5d\xad\xf2\x1a\xb1\x1e\x5a\xf9\x40\xc6\x47\xe8\xb9\x35\x86\xf2\x08\x24\x13\x97\xeb\xab\xed\xec\xf9\x4f\x3f\xff\xc2\x66\xbe\x64\xe4\x74\x4d\xae\xb7\x86\xb0\x6b\x03\x6c\xeb\x3c\xe9\x92\x67\xe5\x89\xa0\xa2\x4f\x1c\x9d\x78\x48\xec\xa5\x0f\xe4\x32\xac\x8d\xee\xc1\x05\x0d\x05\xf8\x20\x5d\xf0\xd1\x41\x90\x08\x6a\x4f\x3c\x59\x2e\xec\x08\x85\x35\x27\x21\x1e\x74\x5f\xcd\xab\xb9\x34\x90\xde\xb7\xfb\x41\xe5\xc6\x7a\xc5\xe0\x78\xce\xdc\x3e\x13\x5d\xcd\x16\x77\x24\x0b\x4c\x9c\xc4\xbb\xe5\x6a\xf1\x12\x85\x15\xec\x4f\x55\xe2\xf3\x67\x24\xa3\x1b\x5e\xfd\x7c\xf6\xe5\x2e\xc1\x6c\x86\xd3\x64\x74\x73\xaf\xd6\x5d\x72\x8a\x2f\x5f\x5e\xf2\xd9\x26\x96\xf0\x87\xaf\xe1\x44\x61\x42\x48\xfc\xed\x9f\x3b\x65\x8a\xec\x74\x74\xcb\xbf\xf8\x76\xd4\x6d\x82\xd1\xcd\xf9\xab\xd7\x77\xb1\x8c\x34\xf7\x42\x32\x7a\xf2\x78\x3a\x93\x5c\x2b\x4c\xea\x63\x14\xca\x94\x16\xb7\xa8\x1c\x35\x70\x56\x13\x6e\x63\xd3\x13\x3f\xfe\xc3\x8d\xc6\xe3\x93\xa7\x09\x66\x48\xf8\xcd\x8b\x41\x8a\x04\x8f\x41\xa6\xd8\xae\x2f\xd6\x2f\xf0\xde\x3a\xa6\xcf\x96\xcf\x83\xba\xe6\xff\x15\x7d\xfd\xf5\x7f\xc8\xa4\xf0\x5a\x5e\x93\x2d\x99\xd1\xe1\xef\x03\x52\x18\xdd\xf0\xcc\x1f\x91\x2b\x95\x28\xac\x21\x11\xdd\x1e\xe2\x1c\xd8\x4e\x28\x94\xa3\x3c\x58\xd7\x47\xe7\xc8\xa6\x21\xc3\x37\x4e\xf7\xd0\xb6\x62\x63\xc3\x1b\xd9\xf8\xda\x86\x98\x43\x3e\xc3\x96\x33\xc9\xd7\xb6\xd5\x6c\xfa\x1d\x8f\xba\xe1\x54\x63\xff\x05\x5c\x5b\xcd\x73\x3e\xd8\x70\x58\xcd\xfb\x4c\x1c\x53\xc8\x4e\x0b\xe5\xc0\xf8\xf9\x77\x74\x73\xf0\xf8\x03\xcc\x22\x8d\x51\xfb\x18\x90\xf2\x31\x4f\x02\x99\xd8\x22\x5a\x19\x9b\xc5\x16\xb6\x21\x17\xef\x5e\x86\x8f\x2a\xd4\xb6\x0d\x43\x78\x7a\x0a\x31\x7d\x44\x7a\xb8\x28\x7f\xb5\x3e\xfc\xcb\xc9\x33\x74\x65\x0b\x95\x4b\xad\xfb\xc3\x85\x62\x5b\x72\x3f\x2f\xcb\x81\x88\x44\x1e\x83\x71\xa0\xde\x29\xad\x45\x8a\xc6\xd9\xa2\xcd\x89\xa3\x69\x00\xc9\x35\x99\xb4\xe5\x90\xd7\xca\x44\x8d\xf9\x5a\xab\xaa\xe5\xa4\xbc\x97\xfb\xb1\x16\xdf\xaa\xa3\x20\x0f\x1e\x7b\xf2\x47\x82\x2c\x22\x5b\xe6\x4f\x08\x4e\x55\x15\x39\xce\x1e\x94\xbe\x37\x79\x86\x2b\xca\xed\x7e\x4f\xa6\xe0\x66\x54\xca\x56\x07\xe6\x92\x44\x91\x3c\xe5\xc9\x78\x20\x28\xd2\xef\x29\xce\x2f\xef\x63\xfc\x10\x1b\xff\x85\x31\xf6\x79\x00\x72\x78\x96\xba\x93\xfd\x43\xa0\xe2\x9f\x00\x00\x00\xff\xff\xce\x83\xcb\x23\x4a\x07\x00\x00") + +func testImagesPetsRedisInstallerOnStartShBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsRedisInstallerOnStartSh, + "test/images/pets/redis-installer/on-start.sh", + ) +} + +func testImagesPetsRedisInstallerOnStartSh() (*asset, error) { + bytes, err := testImagesPetsRedisInstallerOnStartShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/redis-installer/on-start.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsZookeeperInstallerBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\xcd\xb6\x28\xd6\x4b\x4f\x2e\xd2\xcb\xcc\xd7\x4f\x49\x4d\xca\x4c\xcc\xd3\x4d\x4a\x2c\x4e\xd5\x05\x4b\x5a\x19\xe8\x99\xe8\x19\x72\x41\x95\x17\xe5\xe2\x54\x5c\x94\x8b\xae\x14\x8f\xc9\x20\x49\x14\xe5\x05\x05\xc9\x66\x26\x39\xa9\xb8\x34\x40\xa5\xa1\x5a\x00\x01\x00\x00\xff\xff\x2a\x1e\xc7\x42\xbc\x00\x00\x00") + +func testImagesPetsZookeeperInstallerBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsZookeeperInstallerBaseimage, + "test/images/pets/zookeeper-installer/BASEIMAGE", + ) +} + +func testImagesPetsZookeeperInstallerBaseimage() (*asset, error) { + bytes, err := testImagesPetsZookeeperInstallerBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/zookeeper-installer/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsZookeeperInstallerDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x93\x51\x6f\xdb\x36\x14\x85\xdf\xf9\x2b\x0e\xac\xa1\xdb\x80\x48\xca\x3a\x64\x03\xba\x27\xd5\x56\x5b\xa1\x89\xd4\x49\xf6\x8a\x60\x1b\x0a\x4a\xba\x96\x88\x49\x24\x43\x52\x51\x9c\x5f\x3f\x50\x76\x10\x07\x2b\x3a\x3f\xd9\xe4\x3d\x87\xe7\x7e\xf7\x3a\xc0\x5a\xe9\x83\x11\x5d\xef\xf0\xfa\xf2\xa7\x5f\xb0\xed\x09\x1f\xa7\x9a\x8c\x24\x47\x16\xc9\xe4\x7a\x65\x6c\xc4\x02\x16\xe0\x5a\x34\x24\x2d\xb5\x98\x64\x4b\x06\xae\x27\x24\x9a\x37\x3d\x3d\xdd\x5c\xe0\x0f\x32\x56\x28\x89\xd7\xd1\x25\x7e\xf0\x05\xab\xd3\xd5\xea\xc7\xdf\x58\x80\x83\x9a\x30\xf2\x03\xa4\x72\x98\x2c\xc1\xf5\xc2\x62\x2f\x06\x02\x3d\x34\xa4\x1d\x84\x44\xa3\x46\x3d\x08\x2e\x1b\xc2\x2c\x5c\xbf\x3c\x73\x32\x89\x58\x80\xdb\x93\x85\xaa\x1d\x17\x12\x1c\x8d\xd2\x07\xa8\xfd\x79\x1d\xb8\x5b\x02\xfb\x4f\xef\x9c\x7e\x13\xc7\xf3\x3c\x47\x7c\x09\x1b\x29\xd3\xc5\xc3\xb1\xd0\xc6\xd7\xd9\x3a\xcd\xab\x34\x7c\x1d\x5d\x2e\x92\x9d\x1c\xc8\x5a\x18\xba\x9b\x84\xa1\x16\xf5\x01\x5c\xeb\x41\x34\xbc\x1e\x08\x03\x9f\xa1\x0c\x78\x67\x88\x5a\x38\xe5\xf3\xce\x46\x38\x21\xbb\x0b\x58\xb5\x77\x33\x37\xc4\x02\xb4\xc2\x3a\x23\xea\xc9\xbd\x80\xf5\x94\x4e\xd8\x17\x05\x4a\x82\x4b\xac\x92\x0a\x59\xb5\xc2\xdb\xa4\xca\xaa\x0b\x16\xe0\x73\xb6\xfd\x50\xec\xb6\xf8\x9c\x94\x65\x92\x6f\xb3\xb4\x42\x51\x62\x5d\xe4\x9b\x6c\x9b\x15\x79\x85\xe2\x1d\x92\xfc\x16\x1f\xb3\x7c\x73\x01\x12\xae\x27\x03\x7a\xd0\xc6\xe7\x57\x06\xc2\x63\xa4\xd6\x33\xab\x88\x5e\x04\xd8\xab\x63\x20\xab\xa9\x11\x7b\xd1\x60\xe0\xb2\x9b\x78\x47\xe8\xd4\x3d\x19\x29\x64\x07\x4d\x66\x14\xd6\x0f\xd3\x82\xcb\x96\x05\x18\xc4\x28\x1c\x77\xcb\xc9\x7f\x9a\x8a\x18\x0b\xb0\x2d\x36\xc5\x1b\x74\xe4\x60\x44\xeb\x67\x52\x73\xdb\xa3\x25\x4d\xb2\x25\xd9\x1c\xbc\x11\xec\x2c\x5c\xd3\x7b\x78\x7a\xf0\x13\xac\x27\x7b\xa8\xd5\x83\xcf\xe9\x97\xcf\x71\x83\xe7\x53\xf0\xc1\x2a\xb4\x8a\xac\xfc\xde\xc1\x12\x8d\x5e\xb8\xbc\x6e\x9d\x77\xf3\xdb\xe2\x3b\x16\x4a\x46\x2c\x29\xdf\x7b\x7e\x69\x76\x93\xbc\x4f\xd9\xbb\xb2\xb8\xc1\x77\xcf\xbf\xd9\xba\x2c\xaa\xea\xcb\xdb\x5d\x76\xbd\xf9\xb2\x2e\x3e\xdd\xe2\x8e\xc6\x29\xfc\x3d\xbd\xd9\x25\xe5\xfa\x43\x68\x7d\x73\x0d\xe2\xc9\x9a\xb8\x16\x32\x66\xac\xdc\xe5\x68\x06\xe2\x32\x14\xd2\x3a\x3e\x0c\x98\x7d\x73\x4b\x57\x92\x5c\xc3\x1d\x63\xc9\x66\x03\x25\xbd\xd8\xb8\xc8\xf6\x88\x19\x5b\xbc\x35\x91\x09\xf7\x62\xe1\x14\xb3\xd3\x10\xca\x34\xd9\xdc\xa4\xd1\xd8\x2e\xd6\x8b\x59\x78\x87\xb0\x40\xfc\xa8\xd4\x3f\x44\x9a\x4c\xf8\x73\x74\x15\x5d\x86\x7c\xd0\x3d\x8f\x1c\x37\x51\xf7\xf8\xb4\xc3\xdc\x34\xbd\xb8\xa7\xf3\x3d\xf6\x7b\xf4\xac\xfd\xba\xcb\xb7\xbd\x5f\xbd\xc2\x5f\xcc\xff\x51\x3c\xf8\xf0\xe1\x71\xff\x3f\x59\xc2\x35\x62\x37\xea\xd8\x0b\xc7\xfb\xe3\xf7\xaf\x0a\xce\x7c\x7c\xad\x19\xbf\x6d\x7c\x24\x79\xe2\x7c\x04\xb9\xe0\xef\x47\xd5\x22\x6c\xf0\xeb\xd5\x15\xe2\xf3\xeb\x17\xd0\xcf\x68\xb3\x34\xdf\x96\xb7\x9f\x8a\x2c\xdf\xe2\xcf\xd5\x99\x64\xf5\x37\xfb\x37\x00\x00\xff\xff\xde\x7f\x41\x2e\xef\x04\x00\x00") + +func testImagesPetsZookeeperInstallerDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsZookeeperInstallerDockerfile, + "test/images/pets/zookeeper-installer/Dockerfile", + ) +} + +func testImagesPetsZookeeperInstallerDockerfile() (*asset, error) { + bytes, err := testImagesPetsZookeeperInstallerDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/zookeeper-installer/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsZookeeperInstallerMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x4f\xdc\x3a\x10\x85\x9f\xaf\x7f\xc5\xd1\x86\x07\x90\x96\x84\x8b\xae\xb8\x12\x15\xaa\xd2\xdd\xed\x12\x41\x93\x2a\x09\x20\x9e\x90\x93\xcc\x26\x23\x65\xed\xd4\x76\x9a\xdd\x7f\x5f\x39\x80\x04\xaa\xdf\x66\xe6\x78\xce\xe7\xe3\x00\x2b\x3d\x1c\x0d\xb7\x9d\xc3\xe5\xc5\xbf\x57\x28\x3b\xc2\xdd\x58\x91\x51\xe4\xc8\x22\x1e\x5d\xa7\x8d\x0d\x45\x20\x02\xdc\x73\x4d\xca\x52\x83\x51\x35\x64\xe0\x3a\x42\x3c\xc8\xba\xa3\xf7\xc9\x12\x8f\x64\x2c\x6b\x85\xcb\xf0\x02\xa7\x5e\xb0\x78\x1b\x2d\xce\xbe\x88\x00\x47\x3d\x62\x2f\x8f\x50\xda\x61\xb4\x04\xd7\xb1\xc5\x8e\x7b\x02\x1d\x6a\x1a\x1c\x58\xa1\xd6\xfb\xa1\x67\xa9\x6a\xc2\xc4\xae\x9b\x6d\xde\x96\x84\x22\xc0\xf3\xdb\x0a\x5d\x39\xc9\x0a\x12\xb5\x1e\x8e\xd0\xbb\x8f\x3a\x48\x37\x03\xfb\xd3\x39\x37\x5c\x47\xd1\x34\x4d\xa1\x9c\x61\x43\x6d\xda\xa8\x7f\x15\xda\xe8\x3e\x59\x6d\xd2\x62\x73\x7e\x19\x5e\xcc\x57\x1e\x54\x4f\xd6\xc2\xd0\xaf\x91\x0d\x35\xa8\x8e\x90\xc3\xd0\x73\x2d\xab\x9e\xd0\xcb\x09\xda\x40\xb6\x86\xa8\x81\xd3\x9e\x77\x32\xec\x58\xb5\x4b\x58\xbd\x73\x93\x34\x24\x02\x34\x6c\x9d\xe1\x6a\x74\x9f\xc2\x7a\xa7\x63\xfb\x49\xa0\x15\xa4\xc2\x22\x2e\x90\x14\x0b\x7c\x8b\x8b\xa4\x58\x8a\x00\x4f\x49\x79\x9b\x3d\x94\x78\x8a\xf3\x3c\x4e\xcb\x64\x53\x20\xcb\xb1\xca\xd2\x75\x52\x26\x59\x5a\x20\xfb\x8e\x38\x7d\xc6\x5d\x92\xae\x97\x20\x76\x1d\x19\xd0\x61\x30\x9e\x5f\x1b\xb0\x8f\x91\x1a\x9f\x59\x41\xf4\x09\x60\xa7\x5f\x81\xec\x40\x35\xef\xb8\x46\x2f\x55\x3b\xca\x96\xd0\xea\xdf\x64\x14\xab\x16\x03\x99\x3d\x5b\xff\x99\x16\x52\x35\x22\x40\xcf\x7b\x76\xd2\xcd\x9d\xbf\x1e\x15\x0a\x51\xe4\xab\x02\x37\x18\x88\xcc\xf9\x8e\xbd\x40\x64\x05\xbe\xde\xa0\x67\x35\x1e\x44\x9c\xaf\x6e\x7d\x25\xf7\xcd\xd5\x7f\xa2\x8c\xf3\xed\xa6\xf4\xf5\xc9\xe9\xea\x21\x5f\x27\xf9\x99\xd8\x66\x71\xfe\xc3\xb7\xfe\x17\xdb\xec\x3e\x4e\xb7\x2f\x8f\x9b\xbc\x48\xb2\x74\x5e\x22\x1d\x59\xe7\x4d\x5e\xd6\x49\x3e\xfb\x38\x1b\x7d\x34\xa3\xc3\xa0\x8d\x13\xa2\x62\x75\x2d\xfe\x09\xc3\x28\x0c\x23\xde\xcb\x96\xce\x47\xc7\x7d\x68\x3b\x54\xac\x70\x72\xea\x39\xcf\x84\x08\x7f\xde\x66\xe9\xf3\xb5\x6f\x8a\x3f\x01\x00\x00\xff\xff\x11\x9d\x3d\x9a\x07\x03\x00\x00") + +func testImagesPetsZookeeperInstallerMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsZookeeperInstallerMakefile, + "test/images/pets/zookeeper-installer/Makefile", + ) +} + +func testImagesPetsZookeeperInstallerMakefile() (*asset, error) { + bytes, err := testImagesPetsZookeeperInstallerMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/zookeeper-installer/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsZookeeperInstallerVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe1\x02\x04\x00\x00\xff\xff\xdb\x31\xff\x00\x04\x00\x00\x00") + +func testImagesPetsZookeeperInstallerVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsZookeeperInstallerVersion, + "test/images/pets/zookeeper-installer/VERSION", + ) +} + +func testImagesPetsZookeeperInstallerVersion() (*asset, error) { + bytes, err := testImagesPetsZookeeperInstallerVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/zookeeper-installer/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsZookeeperInstallerInstallSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x55\xef\x6f\xdb\x36\x10\xfd\xce\xbf\xe2\x95\xf2\x87\xa4\x88\xe4\xb4\xeb\x86\xa1\xa9\xbb\x79\x89\x8b\x09\xcd\x6c\xc0\x72\x5b\x14\x45\x51\xd0\xd2\xd9\xba\x45\x26\x35\x92\xb2\x9a\x65\xf9\xdf\x07\xca\x76\x7e\xa7\x58\xe7\x4f\x96\xee\xf1\xee\xf1\xbd\xbb\x53\xf4\x04\xfd\x39\xeb\xfe\x5c\xb9\x52\x88\x08\xc7\xa6\x3e\xb7\xbc\x2c\x3d\x9e\x1f\x3e\xfb\x09\xb3\x92\xf0\xb6\x99\x93\xd5\xe4\xc9\x61\xd8\xf8\xd2\x58\x97\x88\x48\x44\x38\xe5\x9c\xb4\xa3\x02\x8d\x2e\xc8\xc2\x97\x84\x61\xad\xf2\x92\x76\x91\x03\xbc\x27\xeb\xd8\x68\x3c\x4f\x0e\xb1\x17\x00\x72\x1b\x92\xfb\x47\x22\xc2\xb9\x69\xb0\x52\xe7\xd0\xc6\xa3\x71\x04\x5f\xb2\xc3\x82\x2b\x02\x7d\xcd\xa9\xf6\x60\x8d\xdc\xac\xea\x8a\x95\xce\x09\x2d\xfb\xb2\x2b\xb3\x4d\x92\x88\x08\x1f\xb7\x29\xcc\xdc\x2b\xd6\x50\xc8\x4d\x7d\x0e\xb3\xb8\x89\x83\xf2\x1d\xe1\xf0\x2b\xbd\xaf\x5f\xf6\xfb\x6d\xdb\x26\xaa\x23\x9b\x18\xbb\xec\x57\x1b\xa0\xeb\x9f\xa6\xc7\xa3\x71\x36\x8a\x9f\x27\x87\xdd\x91\x77\xba\x22\xe7\x60\xe9\xaf\x86\x2d\x15\x98\x9f\x43\xd5\x75\xc5\xb9\x9a\x57\x84\x4a\xb5\x30\x16\x6a\x69\x89\x0a\x78\x13\xf8\xb6\x96\x3d\xeb\xe5\x01\x9c\x59\xf8\x56\x59\x12\x11\x0a\x76\xde\xf2\xbc\xf1\xb7\xc4\xda\xb1\x63\x77\x0b\x60\x34\x94\x86\x1c\x66\x48\x33\x89\xdf\x86\x59\x9a\x1d\x88\x08\x1f\xd2\xd9\xef\x93\x77\x33\x7c\x18\x4e\xa7\xc3\xf1\x2c\x1d\x65\x98\x4c\x71\x3c\x19\x9f\xa4\xb3\x74\x32\xce\x30\x79\x83\xe1\xf8\x23\xde\xa6\xe3\x93\x03\x10\xfb\x92\x2c\xe8\x6b\x6d\x03\x7f\x63\xc1\x41\x46\x2a\x82\x66\x19\xd1\x2d\x02\x0b\xb3\x21\xe4\x6a\xca\x79\xc1\x39\x2a\xa5\x97\x8d\x5a\x12\x96\x66\x4d\x56\xb3\x5e\xa2\x26\xbb\x62\x17\xcc\x74\x50\xba\x10\x11\x2a\x5e\xb1\x57\xbe\x7b\x73\xef\x52\x49\xe8\xa5\x59\xb0\x73\x6d\xaa\x66\xd5\x5d\x52\x39\xd7\xac\x36\x3a\xd1\x57\x76\x3e\xe4\x09\xef\x5d\xa9\x82\xb4\x9d\xbb\xb5\xb2\xa4\xfd\xce\x3f\xd6\xec\x45\x84\xdc\xe8\x60\x2e\xd9\x04\xa9\xdf\x3d\xb9\x0e\xf1\xb7\x31\x67\x44\x35\x59\xb0\x76\x5e\x55\x55\x47\x28\x11\xe9\x38\x9b\x0d\x4f\x4f\xbf\xbc\x9f\x9c\xbe\xfb\x63\x34\x90\x7d\x53\x7b\xf9\x3f\x39\x85\x3a\x35\x91\x8d\x17\x1c\xae\x29\xa2\x8e\xd7\x63\xac\x8c\x8e\x9d\x57\xd6\xf7\xf3\x52\xe9\x25\x85\xc0\x82\x97\x8d\xed\x88\xc1\xe5\x96\x6b\xef\x12\xf1\x61\x32\x7d\x7b\x92\x4e\xaf\x09\xb6\xc6\x9e\xc5\x05\xdb\x8e\xe5\xd0\x05\x09\x86\xb5\xe5\x2a\xee\xe6\x90\x1d\x7e\x48\x5e\x24\x3f\x87\x3f\x81\x4f\xa5\x3c\x39\x0f\xe7\x43\x1f\x1e\x60\xde\x78\xac\x37\xb3\x16\x80\x3f\x26\x87\x30\xba\x55\x36\xf8\xa4\xaa\xca\xb4\x28\xce\xb5\x5a\x71\x0e\x4b\xb7\x08\x25\xe2\xfd\x68\x9a\xa5\x93\xf1\x40\x76\xc7\x62\x55\xd5\xa5\x92\x42\x84\x9e\xe0\xd0\xcf\xb2\xf7\xab\x14\x85\x11\xb9\x72\x84\x5e\x78\x25\xc2\x1c\xc5\x3c\x78\xfa\x4f\x1c\x6f\x55\x8f\x59\x7b\x33\x78\xba\xdf\x85\xee\x6a\xdf\xbb\xe0\xe8\xe9\xe0\x52\x76\x41\x57\xf2\xc2\x77\xff\x8e\x8e\x36\x89\xda\x2e\xd1\xee\xfa\xbb\x24\x77\xf5\xf9\x76\x92\xed\xa1\x08\x8d\x3e\xd3\xa6\xd5\x30\x75\xb8\xdd\x0e\x42\x4e\xe5\xa2\x30\x9a\x84\xa0\xbc\x34\xbb\x5e\x09\x7d\xbd\x51\x63\xe7\x0b\xc2\x3d\x20\x7b\x17\xb7\xcb\x5f\x4a\xb1\x3a\x2b\xd8\x22\xae\x1f\x0c\xe6\x35\xfa\x3b\xdf\x13\x57\x3e\x84\xe9\x77\xa0\x1b\x6d\xf4\x30\xe8\x1e\xbf\xab\x06\x8f\x65\xef\x62\xeb\xd5\xa5\xbc\xe2\x79\x5b\xeb\x3b\x3c\xef\x07\xd7\xe8\x5f\x4f\xcc\x03\x88\xeb\x68\xa0\xfb\x4d\x40\x3f\x28\x17\x1e\xbf\x38\xb5\xaa\x2b\x4a\xf2\xc5\xf2\x3f\x9e\x08\xd0\x6e\x16\x27\x27\x93\x97\xc8\x4a\xd3\x54\xc5\x55\x83\x6e\x0d\x99\x13\x3c\x6f\x06\x33\xf4\xfb\xb6\xb9\x7f\x11\xe9\x9b\x6c\x20\x13\x09\x4b\xaa\x40\x6c\x15\xa6\xa3\xd3\xd1\x30\x1b\xe1\xd5\xab\x57\xb8\x29\x91\xe0\x05\x3e\x41\xf6\xf6\xf6\x64\xef\x62\x0b\xfa\xf4\xec\xf3\xa5\xdc\xdf\x97\x88\x97\x1e\x2f\xf0\xf9\x28\xe4\xde\x74\x49\xa7\xfb\x23\x62\xbb\xa6\xae\x8d\xf5\xee\xb1\x21\x3a\x00\x69\x35\xef\xec\x62\x7f\x9d\x4d\x3a\xaf\x74\xa1\x2a\xa3\x69\x14\xe2\x54\x0c\x16\xaa\x72\x24\xf1\xfa\xf5\xf7\x28\x75\x9d\x70\x5b\xff\xb8\x2b\xfe\x86\x2b\x1a\xdc\xcb\xf2\x48\x92\x64\x7b\xf4\x7b\x6b\x2f\xf8\xda\xa8\x6e\x75\x86\x9d\x89\x52\xe5\x67\x07\xd0\xe4\x73\xe5\xc3\x9b\xdc\xe8\x35\x69\x0e\x9b\xdb\x1b\x94\x6a\x1d\x56\xf7\x9d\xfd\x7c\xb5\x2e\x45\x84\x14\xad\xda\x60\xd5\xda\x70\x81\xc6\x05\xed\x14\xf2\xc6\x79\xb3\xba\xb9\xd4\x57\xe1\x2b\xf4\x67\xe3\xfc\xf6\x23\xc5\x2e\x41\x66\x36\x1f\x79\xf6\x89\x18\x1f\x0f\x7a\x7b\x6d\xc9\x79\x09\x9d\xef\xef\x3c\xbf\x18\x1f\x5f\x4a\x3c\x19\x40\xca\xfb\x26\x87\xb3\xa1\x9c\xce\x1f\x9f\xa2\x00\xde\x0c\x40\x97\xe9\x21\xc8\x82\xc5\xbf\x01\x00\x00\xff\xff\xa3\xa5\x09\x26\x3c\x09\x00\x00") + +func testImagesPetsZookeeperInstallerInstallShBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsZookeeperInstallerInstallSh, + "test/images/pets/zookeeper-installer/install.sh", + ) +} + +func testImagesPetsZookeeperInstallerInstallSh() (*asset, error) { + bytes, err := testImagesPetsZookeeperInstallerInstallShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/zookeeper-installer/install.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesPetsZookeeperInstallerOnStartSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x57\x61\x6f\xdb\x38\x12\xfd\xae\x5f\xf1\x56\x36\xd0\xa4\x17\xcb\x49\x7a\x77\x08\xdc\x3a\x38\x37\x71\x77\x8d\xb6\xc9\x22\x4e\xb7\x28\x82\xa0\xa0\xa5\xb1\xc5\x2d\x45\xaa\x24\x15\xc7\xcd\xfa\xbf\x1f\x86\x92\x6c\x27\xb7\xdd\xc3\x02\x4d\xbe\x58\x12\x39\x9c\x79\xf3\xe6\xcd\xb0\xf3\x13\xfa\x33\xa9\xfb\x33\xe1\xf2\x28\xea\xe0\xcc\x94\x2b\x2b\x17\xb9\xc7\xf1\xe1\xd1\xbf\x71\x9d\x13\xde\x56\x33\xb2\x9a\x3c\x39\x8c\x2a\x9f\x1b\xeb\x92\xa8\x13\x75\xf0\x4e\xa6\xa4\x1d\x65\xa8\x74\x46\x16\x3e\x27\x8c\x4a\x91\xe6\xd4\x7e\x39\xc0\x6f\x64\x9d\x34\x1a\xc7\xc9\x21\xf6\x78\x41\xdc\x7c\x8a\xf7\x5f\x46\x1d\xac\x4c\x85\x42\xac\xa0\x8d\x47\xe5\x08\x3e\x97\x0e\x73\xa9\x08\x74\x9f\x52\xe9\x21\x35\x52\x53\x94\x4a\x0a\x9d\x12\x96\xd2\xe7\xe1\x98\xc6\x48\x12\x75\xf0\xa9\x31\x61\x66\x5e\x48\x0d\x81\xd4\x94\x2b\x98\xf9\xee\x3a\x08\x1f\x1c\xe6\xbf\xdc\xfb\x72\xd0\xef\x2f\x97\xcb\x44\x04\x67\x13\x63\x17\x7d\x55\x2f\x74\xfd\x77\x93\xb3\xf1\xc5\x74\xdc\x3b\x4e\x0e\xc3\x96\x0f\x5a\x91\x73\xb0\xf4\xb5\x92\x96\x32\xcc\x56\x10\x65\xa9\x64\x2a\x66\x8a\xa0\xc4\x12\xc6\x42\x2c\x2c\x51\x06\x6f\xd8\xdf\xa5\x95\x5e\xea\xc5\x01\x9c\x99\xfb\xa5\xb0\x14\x75\x90\x49\xe7\xad\x9c\x55\xfe\x11\x58\xad\x77\xd2\x3d\x5a\x60\x34\x84\x46\x3c\x9a\x62\x32\x8d\xf1\x7a\x34\x9d\x4c\x0f\xa2\x0e\x3e\x4e\xae\x7f\xb9\xfc\x70\x8d\x8f\xa3\xab\xab\xd1\xc5\xf5\x64\x3c\xc5\xe5\x15\xce\x2e\x2f\xce\x27\xd7\x93\xcb\x8b\x29\x2e\xdf\x60\x74\xf1\x09\x6f\x27\x17\xe7\x07\x20\xe9\x73\xb2\xa0\xfb\xd2\xb2\xff\xc6\x42\x32\x8c\x94\x31\x66\x53\xa2\x47\x0e\xcc\x4d\xed\x90\x2b\x29\x95\x73\x99\x42\x09\xbd\xa8\xc4\x82\xb0\x30\x77\x64\xb5\xd4\x0b\x94\x64\x0b\xe9\x38\x99\x0e\x42\x67\x51\x07\x4a\x16\xd2\x0b\x1f\xde\xfc\x4f\x50\x49\x14\x39\xf2\xe8\x91\x41\x29\x4b\x9a\x0b\xa9\x98\x5d\xd7\x9c\x60\x97\x5a\x59\x7a\xa4\x46\xcf\xe5\xa2\xb2\xe4\xf0\xcd\x98\x2f\x44\x25\x59\xa4\xaa\x72\x9e\x2c\x0a\x2a\x66\x64\xe1\x72\x59\x06\xf7\xee\x1a\x22\x99\xf9\x76\x71\xd4\xc1\xe9\x10\x2f\x92\x7f\x25\x87\x09\x26\x1e\x2e\x37\x95\xca\x02\x99\x66\xc4\x7c\xca\xb6\x8c\x31\xba\x97\xe6\x42\x2f\x28\x71\x79\xeb\x80\xd4\x35\xe1\xe8\x5e\x14\xa5\x0a\x6c\x1a\x39\x3e\x61\x54\x5a\xa9\x7a\x81\xff\xd2\xe1\x45\xf2\xcf\xe4\x84\x7f\xb0\x1d\x25\x3c\x39\x0f\xe7\x39\xff\x09\x87\xf4\xda\xf8\x1c\x7d\x53\x7a\x86\x05\x7d\x5f\x94\xfd\x6d\x38\xc2\x12\x84\x73\x55\x51\xd3\x63\x46\xb8\x33\xaa\x2a\xc8\xc1\xe5\xc2\xee\x3a\x58\x0a\x4b\xda\x27\x01\xa3\x90\x91\x42\x78\xf6\x85\x44\x9a\x43\x49\x4d\xb5\xbb\x84\x6c\xa5\x45\x21\xd3\x06\xbe\xba\x5a\xa4\x1b\x44\x1d\x38\xb2\x77\x64\x93\x57\x47\x98\x09\x0e\x5e\xea\x8c\xee\x4f\x87\xaf\xea\xf7\xbd\x4c\xbb\x9e\x16\x05\x9d\x0e\x5e\x95\x44\x16\xa5\xb1\xfe\x74\xf0\x8a\x14\xa5\x9c\xc4\xfa\xf9\x66\x60\x8d\xa2\xdb\x97\x37\xaf\x52\x25\x49\xfb\xf0\x16\x22\xcb\x98\x46\xa7\x83\xdb\xdd\xd7\xa7\x51\x07\x4f\x0e\x6b\x61\xaa\x8f\xac\x5f\xc2\xe7\xc2\xa3\x10\x3e\xcd\xa9\xfe\x2a\x79\x39\x32\xe1\x45\x26\x6d\xbf\x58\x49\xa6\xd3\x8e\x53\xad\x95\x70\xb6\xd1\x58\xe6\x32\xcd\xc1\xdf\x1d\xcb\x41\x51\x69\x99\x0a\x4f\x8c\x68\x28\x3d\x5e\x53\x95\x19\xa7\x86\x0d\x3d\x8e\xe8\x91\xb1\x40\x0a\xe6\x93\x22\xc1\x8c\x6d\x97\x46\x1d\x34\x91\x23\x15\x9a\xf3\xc4\xec\xf5\x06\x66\x56\x87\x72\xc0\x09\xf2\x32\x95\xa5\xd0\x9e\x55\x20\xa3\xb9\xa8\x94\xe7\xf3\xfe\x0c\x29\x3e\xd5\x94\x6c\x5a\xa8\x40\x8c\x66\xbd\x63\xa3\x87\x49\xf8\x7f\xb2\xf7\x3b\x61\xef\xc0\x29\x52\x16\x45\x87\x66\x53\x6a\xb4\xae\xdd\x77\x51\x74\xf6\xe6\xe7\x21\xb3\x70\x4b\xbe\x3e\x33\x84\x1f\x93\x74\xbe\x48\x1a\xda\xf0\xba\xcf\xaf\x47\x6f\xff\x72\xed\x4c\x7c\x89\xde\x7f\xfa\x3c\x39\xff\xfc\x66\xf2\x6e\x3c\x7c\xcc\xe9\x3a\x5f\xbf\x5c\x4e\xaf\x2f\x46\xef\xc7\xc3\xee\x5e\x6e\x9c\x67\x5e\xed\x47\xd1\x32\x67\x36\x5a\x12\x19\x7a\x56\xe0\xdd\xe4\x62\xfc\x12\x99\x89\x58\x78\x7f\x1d\x8f\xaf\xa6\xc3\xbd\xb8\xfb\x10\x7e\xdd\xfc\xe7\x76\x1d\x23\xee\x3e\xf0\xa2\x9b\xc3\xdb\x75\xbc\x1f\x65\x46\x13\x97\xd4\xb9\xd1\xcf\x02\x94\x21\xf8\xb9\xb4\xce\xb7\x82\x20\x58\x7d\x36\x59\x89\xe4\x1c\x37\xe8\x3e\x74\x36\x26\xd1\xa3\xaf\x38\xc2\xed\x4b\xde\xaa\xc3\xc1\x1d\x7c\x24\xe8\x46\xa0\x59\x9d\x09\xa6\x6a\xb9\xd9\x6a\x80\x92\x2e\x94\x5b\x6d\xd7\x41\x6a\x6f\xb0\xc5\x20\x69\x2c\x5d\x18\xa6\x1d\xf3\x39\xec\x6a\x7b\x97\x50\x4b\xb1\x62\x6e\x4a\x9d\xca\x6c\xa7\x51\xb5\xd8\x40\x66\xb5\x09\x4a\x73\x83\x23\x9c\x72\xe4\x5b\xf3\xeb\x78\xfb\x31\x6e\xca\xf8\x68\xd8\x22\x75\x78\xbb\x1e\x1c\x9f\x9c\x9c\x0c\x5e\x9c\x9c\x9c\xbc\x3c\x3e\x3a\x39\x8a\x6b\x03\x67\x6f\x7e\x6e\x76\x76\x70\x7d\x79\x7e\x39\xc0\xb7\x2f\xd3\xba\xd8\xa5\x96\x5e\x0a\x25\xbf\xd1\xa6\x24\xc5\x9c\xb0\x14\x2b\x46\x21\x17\x3a\x53\x84\x5a\x11\x03\x25\x9b\x62\x6c\x8c\xcd\x28\x15\xdc\x8f\x1d\x37\x8d\x15\xab\x9d\xe5\x9e\x86\xa5\x54\x0a\xa9\x25\x2e\x3e\x01\x4d\xcb\x76\xdf\x01\x5e\x7f\xb8\x86\xac\xbb\x6e\xe5\x58\xc8\x83\xed\xac\x31\x58\x9a\x0c\x9e\x8a\x52\x85\xb2\xcd\x69\x85\x22\xcc\x18\xa4\x33\x54\x65\x8d\xd7\x71\x6b\x2c\x34\x18\xcc\xac\xa4\x39\x5c\xa9\xa4\xc7\xcc\x0a\xa9\x1b\x00\xef\xa5\x8f\xe6\x92\x69\x32\xbe\x23\xbb\x82\xab\x66\x8e\xbe\x56\x5c\x10\x0d\x47\xa4\x63\xee\x50\xf6\x84\x2c\xc1\x6a\x69\x4d\x61\x7c\xcd\x05\xb1\x5b\xd3\x51\x0d\xfe\x16\x59\xae\x92\x75\x1c\xc9\xe1\x61\xf4\x6e\x3c\x3a\x1f\x5f\x0d\xbb\x2d\xe9\x23\x56\x90\x20\x57\x52\xe3\x11\xa1\x37\x6c\xdf\xdb\x83\x1c\xca\x7f\x1c\x61\x7f\x3f\x3c\x33\x51\x6f\x78\x2d\x6f\x5b\xc7\x18\x0e\xf1\x3c\xee\x3e\xb4\x16\xd7\xf1\x73\xdc\xee\x92\x16\x35\xf9\x86\x5d\xb9\x7d\xac\xeb\xad\xb6\xd0\xbc\x0d\x4e\x77\xe5\x77\xf8\xf4\x84\x51\xdd\x07\xb9\x6e\xf7\x6f\x09\x35\x68\xf1\x69\x99\xf5\x04\x80\x60\x46\x39\x6a\x2c\xd6\x81\x74\xf7\x82\x65\x67\xef\x2c\xfe\x08\xdd\xaf\xaf\xd3\x9d\xf0\xd8\x14\xfe\xc0\xc2\x52\x89\xf7\x26\xa3\x7d\x0c\x11\xf3\x8f\x41\xa3\xbc\xf1\xd3\x70\x81\x06\xe5\x8d\x91\xe6\xc3\x5c\xfe\x8d\x58\x76\x12\xfa\x17\xe1\xcc\xe5\x46\x6a\xb6\xad\x7a\x19\x44\x27\x50\x3d\xf0\xd1\x54\x1e\x2c\x75\x10\x7a\xb5\x14\xab\xa4\x9d\x5e\x0a\x12\xda\x05\x05\xd9\x14\xf7\x52\x38\xde\xdb\x34\xe8\x40\x0c\xd6\x93\xa4\x96\xa7\x9f\xd0\x9b\x3f\x4d\xcf\x8e\x40\x31\xa1\x71\xd4\x50\xfa\x92\xc7\xdc\xef\x77\xf9\x20\x5f\x9e\x34\x64\x3b\xed\xf0\xb9\x33\x42\x61\x32\x39\x97\x94\xf1\xd4\xd9\x88\xa6\x16\x2a\xea\xc0\xd2\x66\xcc\x0a\x1a\xe8\xea\xf2\x2f\x4b\x62\x67\xad\xa9\x16\xb5\x50\xc5\xed\xc2\x38\x74\x58\xa1\xb3\x24\x4a\x4b\x6c\x91\xab\x7f\xae\xc3\x10\xf7\x63\xa4\xe6\x87\xca\xcc\x8f\x92\x98\x27\x6d\x91\x6f\x46\x6d\xa0\x61\x72\x64\x17\xb7\x18\x7c\xa4\x9d\x34\xb4\x2d\xa6\x9e\xa2\x57\xc1\xc7\x66\x1c\x68\xef\x23\x85\x08\xc3\xad\x70\x50\x46\x2f\x20\x78\x5c\xe1\x39\x9d\x9e\x39\x7c\xad\x8c\xad\x8a\x04\xa3\x34\x35\x36\x63\x18\x7c\x9d\xca\xcc\xa4\x35\xac\x0c\x44\x3b\x58\x39\xfc\x5e\x39\xdf\x34\x1f\x65\x96\xe1\xe8\xa8\x83\x3b\xe3\xe9\x00\xd2\x3f\x73\x70\x9e\x61\xdc\x7e\x65\xed\x2b\x8d\xa3\x96\x53\x4d\x4a\x0e\x02\x14\xd2\xe3\x8b\x36\xcb\x70\x50\xd4\x61\x52\xba\x90\x8a\x5a\x52\x37\x01\xf0\x68\x5f\xf0\xcd\x67\x6e\x4d\x81\xe7\xd2\xbb\xe7\x8d\xb9\x24\x1a\x9d\x9f\x7f\x9e\x8e\xaf\x7e\xe3\x1a\x6e\xab\xb4\x11\xb1\x46\xbc\xbe\x53\xa8\xcd\x38\x34\x08\x05\xfb\xe7\x19\x38\x53\x92\xe1\x6f\x49\x8a\x9e\x0b\xa3\x43\x50\x8c\x75\x1c\x76\xa2\xc7\x03\x43\xdc\x7d\xd8\xfa\xb1\x8e\x39\x55\xbf\x5a\x73\xd7\x34\xed\x25\x3d\xbb\x23\x88\xd4\x57\x42\xa9\x15\x7e\x37\x52\x53\x3d\x64\xd8\x4a\x87\x6b\x4e\x73\xff\x88\x26\xd7\xe3\xab\x11\xdf\xab\x86\x87\x51\xa5\xbd\x54\xb5\xfc\x34\xc7\x6f\x25\x4f\x99\x54\x28\x16\x82\x47\x92\xf7\xc4\x0b\x9c\xa2\x9f\xd1\x5d\x5f\x57\x4a\x35\x1d\xa2\x16\xee\xcd\x29\xb7\x58\x8a\x70\x6d\x0c\xc3\x69\x3d\xcb\x66\xed\x69\xcc\xa9\x95\x4e\x31\x13\xe9\x17\x7e\xd8\x9c\x19\x01\x4e\x11\x95\x38\x8a\x42\xc7\xd9\x3a\xbd\xf9\xd5\x76\xa0\x7a\x50\xda\xbc\x0e\x63\xd2\xf1\xe1\xa3\x39\xa9\x11\xa2\x1d\x79\xfc\xbf\xc5\x60\xca\xe8\xbf\x01\x00\x00\xff\xff\xa6\x97\x4d\xe4\x40\x10\x00\x00") + +func testImagesPetsZookeeperInstallerOnStartShBytes() ([]byte, error) { + return bindataRead( + _testImagesPetsZookeeperInstallerOnStartSh, + "test/images/pets/zookeeper-installer/on-start.sh", + ) +} + +func testImagesPetsZookeeperInstallerOnStartSh() (*asset, error) { + bytes, err := testImagesPetsZookeeperInstallerOnStartShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/pets/zookeeper-installer/on-start.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRedisBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\xcc\x29\xc8\xcc\x4b\xb5\x32\xd6\x33\xe3\x82\x0a\x17\xe5\xda\x26\x16\xe5\x1a\x1b\x95\x99\xe9\x63\x93\x04\xe9\x01\x91\x65\x16\x98\xd2\x05\x05\xc9\x66\x26\x39\xa9\xb6\x50\x1a\x53\x41\xb1\xb1\xa5\x41\x85\x2d\x98\x44\x96\x2c\xcf\xcc\x4b\xc9\x2f\x2f\x86\x38\x49\xdf\xd0\xc2\xc0\xd2\x36\xc8\xd5\xdd\x33\x38\x24\x28\x52\x3f\xa9\xb4\xb8\x32\x29\xbf\xc2\xca\x50\xcf\xc8\x52\x17\xaa\x50\x17\xac\x50\x17\xa4\x10\x5d\xaf\xa5\x81\x31\x71\x7a\x2d\x0d\x8c\x31\xf5\x12\x69\xaf\xa5\x81\x25\x17\x20\x00\x00\xff\xff\xa0\x4d\x41\x80\x45\x01\x00\x00") + +func testImagesRedisBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesRedisBaseimage, + "test/images/redis/BASEIMAGE", + ) +} + +func testImagesRedisBaseimage() (*asset, error) { + bytes, err := testImagesRedisBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/redis/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRedisDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\x51\x4f\xdb\x30\x14\x85\xdf\xfd\x2b\x8e\x92\x3d\x6c\x52\x9b\x30\x26\x0d\x6d\x7b\x0a\x69\x80\x88\x36\x61\x49\x0b\x43\xd3\x84\x5c\xe7\x36\xb1\x96\xda\xc1\x76\x08\xfd\xf7\x53\x02\x88\xb1\xf9\xc9\xd7\xf7\xf8\xf8\xf3\xb1\x7d\xc4\xba\x3b\x18\x59\x37\x0e\xc7\x47\x1f\x4f\xb0\x6e\x08\x97\xfd\x96\x8c\x22\x47\x16\x51\xef\x1a\x6d\x6c\xc0\x7c\xe6\x63\x29\x05\x29\x4b\x15\x7a\x55\x91\x81\x6b\x08\x51\xc7\x45\x43\x2f\x9d\x19\xae\xc9\x58\xa9\x15\x8e\x83\x23\xbc\x1f\x05\xde\x73\xcb\xfb\xf0\x8d\xf9\x38\xe8\x1e\x7b\x7e\x80\xd2\x0e\xbd\x25\xb8\x46\x5a\xec\x64\x4b\xa0\x47\x41\x9d\x83\x54\x10\x7a\xdf\xb5\x92\x2b\x41\x18\xa4\x6b\xa6\x63\x9e\x4d\x02\xe6\xe3\xf6\xd9\x42\x6f\x1d\x97\x0a\x1c\x42\x77\x07\xe8\xdd\xdf\x3a\x70\x37\x01\x8f\xa3\x71\xae\xfb\x1a\x86\xc3\x30\x04\x7c\x82\x0d\xb4\xa9\xc3\xf6\x49\x68\xc3\x65\x1a\x27\x59\x99\xcc\x8f\x83\xa3\x69\xcb\x46\xb5\x64\x2d\x0c\xdd\xf7\xd2\x50\x85\xed\x01\xbc\xeb\x5a\x29\xf8\xb6\x25\xb4\x7c\x80\x36\xe0\xb5\x21\xaa\xe0\xf4\xc8\x3b\x18\xe9\xa4\xaa\x67\xb0\x7a\xe7\x06\x6e\x88\xf9\xa8\xa4\x75\x46\x6e\x7b\xf7\x26\xac\x17\x3a\x69\xdf\x08\xb4\x02\x57\xf0\xa2\x12\x69\xe9\xe1\x34\x2a\xd3\x72\xc6\x7c\xdc\xa4\xeb\x8b\x7c\xb3\xc6\x4d\x54\x14\x51\xb6\x4e\x93\x12\x79\x81\x38\xcf\x16\xe9\x3a\xcd\xb3\x12\xf9\x19\xa2\xec\x16\x97\x69\xb6\x98\x81\xa4\x6b\xc8\x80\x1e\x3b\x33\xf2\x6b\x03\x39\xc6\x48\xd5\x98\x59\x49\xf4\x06\x60\xa7\x9f\x80\x6c\x47\x42\xee\xa4\x40\xcb\x55\xdd\xf3\x9a\x50\xeb\x07\x32\x4a\xaa\x1a\x1d\x99\xbd\xb4\xe3\x63\x5a\x70\x55\x31\x1f\xad\xdc\x4b\xc7\xdd\xb4\xf2\xdf\xa5\x02\xc6\xa2\xe2\x7c\xa4\x4f\xd2\x55\x74\x9e\xb0\xb3\x22\x5f\xe1\xdd\x6b\xcd\xe2\x22\x2f\xcb\xbb\xd3\x4d\xba\x5c\xdc\xc5\xf9\xd5\x2d\xee\x69\xdf\xcf\xbf\x27\xab\x4d\x54\xc4\x17\x73\x3b\x5a\x0b\x84\xbd\x35\xe1\x56\xaa\x90\xb1\x62\x93\x81\x77\xbf\xc1\xab\x0a\xf3\xb9\xd2\x73\x31\xfd\x35\x43\x95\xb4\x8c\x4d\x16\xd3\x3c\x10\x5a\xed\x10\x92\x13\xe1\x6b\xcd\x58\xf2\xe3\x2a\x2f\x13\x7c\xfe\x74\xf2\x85\x5d\xe7\xcb\xcd\x2a\x41\x58\x71\xc7\x19\x8b\x57\x0b\xfc\xf4\x26\xed\xdc\x92\x79\x20\xe3\xcd\xe0\xfd\x63\xe0\xfd\x62\x7f\x02\x00\x00\xff\xff\x65\x6b\x18\x97\x1d\x03\x00\x00") + +func testImagesRedisDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesRedisDockerfile, + "test/images/redis/Dockerfile", + ) +} + +func testImagesRedisDockerfile() (*asset, error) { + bytes, err := testImagesRedisDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/redis/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRedisDockerfile_windows = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x92\x51\x8f\xe3\x34\x14\x85\xdf\xfd\x2b\x8e\x5a\xb4\x80\xd4\x26\xa5\xb3\x1a\xc4\xa0\x7d\x08\x6d\x77\x89\x76\xda\xac\x9a\xce\x0e\x23\xe0\xc1\x4d\x6e\x93\xab\x49\x6c\x63\x3b\x93\x96\x5f\x8f\x9c\xb6\x68\x46\x88\x3c\xc5\xf7\x9e\x73\xfc\xf9\xda\x63\x2c\xb4\x39\x59\xae\x6a\x8f\xf9\x6c\x3e\xc3\xae\x26\x7c\xee\xf6\x64\x15\x79\x72\x48\x3a\x5f\x6b\xeb\x22\x31\x16\x63\xdc\x73\x41\xca\x51\x89\x4e\x95\x64\xe1\x6b\x42\x62\x64\x51\xd3\xb5\x33\xc1\x57\xb2\x8e\xb5\xc2\x3c\x9a\xe1\xbb\x20\x18\x5d\x5a\xa3\xef\x7f\x16\x63\x9c\x74\x87\x56\x9e\xa0\xb4\x47\xe7\x08\xbe\x66\x87\x03\x37\x04\x3a\x16\x64\x3c\x58\xa1\xd0\xad\x69\x58\xaa\x82\xd0\xb3\xaf\x87\x6d\x2e\x21\x91\x18\xe3\xe9\x12\xa1\xf7\x5e\xb2\x82\x44\xa1\xcd\x09\xfa\xf0\x5a\x07\xe9\x07\xe0\xf0\xd5\xde\x9b\xbb\x38\xee\xfb\x3e\x92\x03\x6c\xa4\x6d\x15\x37\x67\xa1\x8b\xef\xd3\xc5\x6a\x93\xaf\xa6\xf3\x68\x36\x58\x1e\x54\x43\xce\xc1\xd2\x5f\x1d\x5b\x2a\xb1\x3f\x41\x1a\xd3\x70\x21\xf7\x0d\xa1\x91\x3d\xb4\x85\xac\x2c\x51\x09\xaf\x03\x6f\x6f\xd9\xb3\xaa\x26\x70\xfa\xe0\x7b\x69\x49\x8c\x51\xb2\xf3\x96\xf7\x9d\x7f\x33\xac\x2b\x1d\xbb\x37\x02\xad\x20\x15\x46\x49\x8e\x34\x1f\xe1\x97\x24\x4f\xf3\x89\x18\xe3\x31\xdd\xfd\x9a\x3d\xec\xf0\x98\x6c\xb7\xc9\x66\x97\xae\x72\x64\x5b\x2c\xb2\xcd\x32\xdd\xa5\xd9\x26\x47\xf6\x11\xc9\xe6\x09\x9f\xd3\xcd\x72\x02\x62\x5f\x93\x05\x1d\x8d\x0d\xfc\xda\x82\xc3\x18\xa9\x0c\x33\xcb\x89\xde\x00\x1c\xf4\x19\xc8\x19\x2a\xf8\xc0\x05\x1a\xa9\xaa\x4e\x56\x84\x4a\xbf\x90\x55\xac\x2a\x18\xb2\x2d\xbb\x70\x99\x0e\x52\x95\x62\x8c\x86\x5b\xf6\xd2\x0f\x95\xff\x1c\x2a\x12\x22\xd9\x7e\x0a\xf4\xab\x74\x9d\x7c\x5a\x89\x70\x02\xfa\xd6\x12\x3a\x17\xe2\x24\xee\x59\x75\x47\x70\x1b\xb6\xf1\x1a\x9d\x32\xb2\x78\x1e\x22\xa4\x2d\x6a\x7e\xa1\x49\x58\x28\xf4\x83\x2b\xdc\x6a\xf0\xb1\x47\x40\x0a\x8e\x47\x56\xa5\xee\x5d\x24\x3e\x6e\xb3\x35\xa6\x53\xd3\x48\x7f\xd0\xb6\xfd\xd0\x84\xe4\x58\xb6\xe5\xed\x7b\xc8\xc6\xb0\xa2\xbb\x9b\xe8\x16\xd2\xc1\x58\x32\x42\x24\xcb\xe5\xf0\x0c\xdc\x5d\x1c\x57\xec\xeb\x6e\x1f\x15\xba\x8d\xd7\x79\x66\x48\xed\xa8\xa8\x63\x4b\x25\xbb\xd8\x52\x43\x32\x3c\x8a\x52\xf7\xaa\xd1\xb2\x8c\x7b\x56\xd3\x9b\x68\x1e\xfd\x30\x9b\xc5\xdb\xa0\x99\x1e\x6f\xdf\x5f\x2b\xd1\xdf\x6c\x70\xb6\x86\x5f\xb1\x7d\xd8\xa0\x7d\x2e\xd9\x5e\x8a\x78\xf7\xee\x0f\x11\x9e\x60\xa7\xde\x2a\x31\x2d\x2f\x2b\x71\x3e\xcb\x37\xaf\xc6\xb6\xc8\xbe\x3c\x61\x3a\x3d\x58\xdd\x7e\x08\xf8\xd7\xb0\xab\x61\xe8\x9f\xa3\x0a\xad\x0e\xf8\x97\x3d\x54\xfa\xcb\x88\x42\x47\x88\xd5\x6f\x5f\xb2\x7c\x85\xdb\x9b\x1f\x7f\x12\x5f\xb3\xfb\x87\xf5\x0a\x8b\xbb\xb8\x94\x5e\x0a\xb1\x58\x2f\xf1\xfb\xe8\xb5\x79\xea\xc8\xbe\x90\x8d\xe8\x48\xa3\x09\x46\xff\x9b\x3b\xfa\x53\xfc\x13\x00\x00\xff\xff\xbe\x27\x73\x71\x36\x04\x00\x00") + +func testImagesRedisDockerfile_windowsBytes() ([]byte, error) { + return bindataRead( + _testImagesRedisDockerfile_windows, + "test/images/redis/Dockerfile_windows", + ) +} + +func testImagesRedisDockerfile_windows() (*asset, error) { + bytes, err := testImagesRedisDockerfile_windowsBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/redis/Dockerfile_windows", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRedisOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\xc8\xcd\x2e\xcd\x4d\x2c\x49\x4c\xe7\x4a\xcd\x4d\x2d\xca\x2c\x29\x2d\x8e\x47\x53\x50\x94\x9b\x9b\x01\x08\x00\x00\xff\xff\x64\x89\x71\xde\x34\x00\x00\x00") + +func testImagesRedisOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesRedisOwners, + "test/images/redis/OWNERS", + ) +} + +func testImagesRedisOwners() (*asset, error) { + bytes, err := testImagesRedisOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/redis/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRedisVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd5\x33\xd0\x33\xd5\x4d\xcc\x29\xc8\xcc\x4b\xe5\x02\x04\x00\x00\xff\xff\xdd\xda\x14\xcc\x0d\x00\x00\x00") + +func testImagesRedisVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesRedisVersion, + "test/images/redis/VERSION", + ) +} + +func testImagesRedisVersion() (*asset, error) { + bytes, err := testImagesRedisVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/redis/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRedisRedisConf = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\xca\xcc\x4b\x51\x30\xd0\x03\x43\xae\x94\xcc\x22\x05\xfd\x94\xc4\x92\x44\xae\x82\xa2\xfc\x92\xd4\xe4\x92\xd4\x14\xdd\xdc\xfc\x94\x54\x85\xbc\x7c\x2e\x40\x00\x00\x00\xff\xff\x78\xab\x4d\x26\x29\x00\x00\x00") + +func testImagesRedisRedisConfBytes() ([]byte, error) { + return bindataRead( + _testImagesRedisRedisConf, + "test/images/redis/redis.conf", + ) +} + +func testImagesRedisRedisConf() (*asset, error) { + bytes, err := testImagesRedisRedisConfBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/redis/redis.conf", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRegressionIssue74839Gitignore = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xd2\x2f\x4a\x4d\x2f\x4a\x2d\x2e\xce\xcc\xcf\xd3\xcd\x2c\x2e\x2e\x4d\xd5\x35\x37\xb1\x30\xb6\xe4\x02\x04\x00\x00\xff\xff\x58\x2f\x20\xa0\x18\x00\x00\x00") + +func testImagesRegressionIssue74839GitignoreBytes() ([]byte, error) { + return bindataRead( + _testImagesRegressionIssue74839Gitignore, + "test/images/regression-issue-74839/.gitignore", + ) +} + +func testImagesRegressionIssue74839Gitignore() (*asset, error) { + bytes, err := testImagesRegressionIssue74839GitignoreBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/regression-issue-74839/.gitignore", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRegressionIssue74839Dockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x91\x41\x8f\xd3\x3c\x10\x86\xef\xfe\x15\xaf\x92\xcb\xf7\x49\x6d\x52\x0a\x12\x2c\x9c\x42\xdb\x15\xd1\x2e\x09\x6a\xb2\xac\x2a\xc4\xc1\x49\xa6\xc9\x48\xa9\x6d\x6c\x87\x6c\xff\x3d\x4a\xb6\x2b\x51\x01\x3e\xce\x3c\x1e\x3f\xf3\x3a\xc4\x46\x9b\xb3\xe5\xb6\xf3\x58\xaf\x5e\xdd\xa0\xec\x08\x77\x43\x45\x56\x91\x27\x87\x64\xf0\x9d\xb6\x2e\x12\xa1\x08\x71\xcf\x35\x29\x47\x0d\x06\xd5\x90\x85\xef\x08\x89\x91\x75\x47\x2f\x9d\x05\xbe\x92\x75\xac\x15\xd6\xd1\x0a\xff\x4d\x40\x70\x69\x05\xff\x7f\x10\x21\xce\x7a\xc0\x49\x9e\xa1\xb4\xc7\xe0\x08\xbe\x63\x87\x23\xf7\x04\x7a\xaa\xc9\x78\xb0\x42\xad\x4f\xa6\x67\xa9\x6a\xc2\xc8\xbe\x9b\x9f\xb9\x0c\x89\x44\x88\xc3\x65\x84\xae\xbc\x64\x05\x89\x5a\x9b\x33\xf4\xf1\x77\x0e\xd2\xcf\xc2\xd3\xe9\xbc\x37\xef\xe3\x78\x1c\xc7\x48\xce\xb2\x91\xb6\x6d\xdc\x3f\x83\x2e\xbe\x4f\x37\xbb\xac\xd8\x2d\xd7\xd1\x6a\xbe\xf2\xa0\x7a\x72\x0e\x96\x7e\x0c\x6c\xa9\x41\x75\x86\x34\xa6\xe7\x5a\x56\x3d\xa1\x97\x23\xb4\x85\x6c\x2d\x51\x03\xaf\x27\xdf\xd1\xb2\x67\xd5\x2e\xe0\xf4\xd1\x8f\xd2\x92\x08\xd1\xb0\xf3\x96\xab\xc1\x5f\x85\xf5\x62\xc7\xee\x0a\xd0\x0a\x52\x21\x48\x0a\xa4\x45\x80\x8f\x49\x91\x16\x0b\x11\xe2\x31\x2d\x3f\xe5\x0f\x25\x1e\x93\xfd\x3e\xc9\xca\x74\x57\x20\xdf\x63\x93\x67\xdb\xb4\x4c\xf3\xac\x40\x7e\x8b\x24\x3b\xe0\x2e\xcd\xb6\x0b\x10\xfb\x8e\x2c\xe8\xc9\xd8\xc9\x5f\x5b\xf0\x14\x23\x35\x53\x66\x05\xd1\x95\xc0\x51\x3f\x0b\x39\x43\x35\x1f\xb9\x46\x2f\x55\x3b\xc8\x96\xd0\xea\x9f\x64\x15\xab\x16\x86\xec\x89\xdd\xf4\x99\x0e\x52\x35\x22\x44\xcf\x27\xf6\xd2\xcf\x95\x3f\x96\x8a\x84\xb8\xdd\xe7\x9f\xd1\xd6\x36\x62\x1d\xcf\xfb\xe9\x29\xca\xb8\x92\x8e\x84\x48\xb6\x5b\x58\x6a\x27\x39\xd6\x6a\xc9\xce\x0d\xb4\x7c\xfb\xe6\xdd\xeb\x1b\xc4\x7f\xaf\x0b\xb1\xcb\xca\xfd\xe1\x4b\x9e\x66\x25\xbe\x05\xff\xa0\x82\xef\x42\xfc\x0a\x00\x00\xff\xff\x39\x3c\x7b\xcf\xc5\x02\x00\x00") + +func testImagesRegressionIssue74839DockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesRegressionIssue74839Dockerfile, + "test/images/regression-issue-74839/Dockerfile", + ) +} + +func testImagesRegressionIssue74839Dockerfile() (*asset, error) { + bytes, err := testImagesRegressionIssue74839DockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/regression-issue-74839/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRegressionIssue74839Makefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\xd1\x4f\xdb\x30\x10\xc6\x9f\xe7\xbf\xe2\x53\xc3\x43\x2b\xb5\x29\x63\x68\x0c\x26\x34\x65\x6d\x57\x22\x58\x32\x25\x05\xc4\x13\x72\x92\x6b\x72\x52\x6a\x67\xb6\xb3\xb4\xff\xfd\xe4\x02\xd2\xd0\xfc\x76\x77\xdf\xdd\xfd\xee\x73\x80\x85\xee\x0e\x86\xeb\xc6\xe1\xec\xf4\xe3\x25\x36\x0d\xe1\xb6\x2f\xc8\x28\x72\x64\x11\xf5\xae\xd1\xc6\x86\x22\x10\x01\xee\xb8\x24\x65\xa9\x42\xaf\x2a\x32\x70\x0d\x21\xea\x64\xd9\xd0\x5b\x65\x8a\x07\x32\x96\xb5\xc2\x59\x78\x8a\xb1\x17\x8c\x5e\x4b\xa3\xc9\x57\x11\xe0\xa0\x7b\xec\xe4\x01\x4a\x3b\xf4\x96\xe0\x1a\xb6\xd8\x72\x4b\xa0\x7d\x49\x9d\x03\x2b\x94\x7a\xd7\xb5\x2c\x55\x49\x18\xd8\x35\xc7\x35\xaf\x43\x42\x11\xe0\xe9\x75\x84\x2e\x9c\x64\x05\x89\x52\x77\x07\xe8\xed\xbf\x3a\x48\x77\x04\xf6\xaf\x71\xae\xbb\x9a\xcf\x87\x61\x08\xe5\x11\x36\xd4\xa6\x9e\xb7\x2f\x42\x3b\xbf\x8b\x17\xab\x24\x5f\xcd\xce\xc2\xd3\x63\xcb\xbd\x6a\xc9\x5a\x18\xfa\xdd\xb3\xa1\x0a\xc5\x01\xb2\xeb\x5a\x2e\x65\xd1\x12\x5a\x39\x40\x1b\xc8\xda\x10\x55\x70\xda\xf3\x0e\x86\x1d\xab\x7a\x0a\xab\xb7\x6e\x90\x86\x44\x80\x8a\xad\x33\x5c\xf4\xee\x9d\x59\x6f\x74\x6c\xdf\x09\xb4\x82\x54\x18\x45\x39\xe2\x7c\x84\xef\x51\x1e\xe7\x53\x11\xe0\x31\xde\xdc\xa4\xf7\x1b\x3c\x46\x59\x16\x25\x9b\x78\x95\x23\xcd\xb0\x48\x93\x65\xbc\x89\xd3\x24\x47\xfa\x03\x51\xf2\x84\xdb\x38\x59\x4e\x41\xec\x1a\x32\xa0\x7d\x67\x3c\xbf\x36\x60\x6f\x23\x55\xde\xb3\x9c\xe8\x1d\xc0\x56\xbf\x00\xd9\x8e\x4a\xde\x72\x89\x56\xaa\xba\x97\x35\xa1\xd6\x7f\xc8\x28\x56\x35\x3a\x32\x3b\xb6\xfe\x33\x2d\xa4\xaa\x44\x80\x96\x77\xec\xa4\x3b\x66\xfe\x3b\x2a\x14\x22\xcf\x16\xf9\xb5\xa1\xda\x03\xb0\x56\x33\xb6\xb6\xa7\xd9\xc5\xf9\x97\x4f\x97\x22\xcd\xf1\xed\x1a\x2d\xab\x7e\x2f\xa2\x6c\x71\xe3\x23\xb9\xab\x3e\x9f\x8b\x4d\x94\xad\x57\x1b\x1f\x9f\x8c\x17\xf7\xd9\x32\xce\x26\x62\x9d\x46\xd9\x4f\x9f\xba\x10\xeb\xf4\x2e\x4a\xd6\xcf\x0f\xab\x2c\x8f\xd3\xe4\x38\x44\x3a\xb2\xce\x6f\x7b\x5e\xc6\x19\x7c\x9f\xd2\xae\x62\x83\x93\xb1\x6d\xa8\x6d\xd1\x0d\xd5\x64\x22\x04\xed\x3b\x6d\x9c\x10\xe1\xaf\x9b\x34\x79\xba\x42\xc1\x4a\x14\xac\xae\xc4\x87\x30\x9c\xf3\x4e\xd6\x34\xeb\x1d\xb7\xa1\x6d\x7c\x09\x27\x63\x7f\xc0\x44\x88\xbf\x01\x00\x00\xff\xff\x04\x52\x01\x2e\x14\x03\x00\x00") + +func testImagesRegressionIssue74839MakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesRegressionIssue74839Makefile, + "test/images/regression-issue-74839/Makefile", + ) +} + +func testImagesRegressionIssue74839Makefile() (*asset, error) { + bytes, err := testImagesRegressionIssue74839MakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/regression-issue-74839/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRegressionIssue74839Owners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xcc\x4b\x4b\x2d\xca\x4b\x4d\x85\x70\xf2\xb3\x52\x13\xb9\x00\x01\x00\x00\xff\xff\x00\x4e\x8b\xd3\x22\x00\x00\x00") + +func testImagesRegressionIssue74839OwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesRegressionIssue74839Owners, + "test/images/regression-issue-74839/OWNERS", + ) +} + +func testImagesRegressionIssue74839Owners() (*asset, error) { + bytes, err := testImagesRegressionIssue74839OwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/regression-issue-74839/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRegressionIssue74839Version = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe2\x02\x04\x00\x00\xff\xff\x5d\x96\xa5\x56\x04\x00\x00\x00") + +func testImagesRegressionIssue74839VersionBytes() ([]byte, error) { + return bindataRead( + _testImagesRegressionIssue74839Version, + "test/images/regression-issue-74839/VERSION", + ) +} + +func testImagesRegressionIssue74839Version() (*asset, error) { + bytes, err := testImagesRegressionIssue74839VersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/regression-issue-74839/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRegressionIssue74839MainGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x57\x6d\x6f\xdb\x38\x12\xfe\x2c\xfe\x8a\x89\x80\xee\xc9\x5d\x55\x76\x72\x2f\x40\xbd\x9b\x0f\xde\xb4\xb9\x15\x5a\x38\x86\x95\xbd\xa2\x08\x82\x82\x96\x46\x36\xcf\x32\xc9\x92\x94\xdd\xdc\x36\xff\xfd\x30\x24\xed\xda\x4d\xee\x50\x17\xb0\x43\x72\x5e\x9e\x79\x66\x38\x9c\x0e\x5f\xb2\x2b\xa5\x1f\x8c\x58\xae\x1c\x5c\x8c\xce\x5f\xc3\xed\x0a\xe1\x5d\xbf\x40\x23\xd1\xa1\x85\x49\xef\x56\xca\xd8\x82\xb1\xf7\xa2\x46\x69\xb1\x81\x5e\x36\x68\xc0\xad\x10\x26\x9a\xd7\x2b\x84\x78\x92\xc3\xbf\xd0\x58\xa1\x24\x5c\x14\x23\xc8\x48\x20\x8d\x47\xe9\xe0\x17\xf6\xa0\x7a\xd8\xf0\x07\x90\xca\x41\x6f\x11\xdc\x4a\x58\x68\x45\x87\x80\x5f\x6a\xd4\x0e\x84\x84\x5a\x6d\x74\x27\xb8\xac\x11\x76\xc2\xad\xbc\x93\x68\xa2\x60\x1f\xa3\x01\xb5\x70\x5c\x48\xe0\x50\x2b\xfd\x00\xaa\x3d\x96\x02\xee\x18\x03\x00\x58\x39\xa7\xc7\xc3\xe1\x6e\xb7\x2b\xb8\x47\x59\x28\xb3\x1c\x76\x41\xca\x0e\xdf\x97\x57\x6f\xa7\xd5\xdb\x57\x17\xc5\x88\xb1\x3f\x64\x87\xd6\x82\xc1\xcf\xbd\x30\xd8\xc0\xe2\x01\xb8\xd6\x9d\xa8\xf9\xa2\x43\xe8\xf8\x0e\x94\x01\xbe\x34\x88\x0d\x38\x45\x38\x77\x46\x38\x21\x97\x39\x58\xd5\xba\x1d\x37\xc8\x1a\x61\x9d\x11\x8b\xde\x9d\x10\xb4\x47\x25\x2c\x1c\x0b\x28\x09\x5c\x42\x3a\xa9\xa0\xac\x52\xf8\x6d\x52\x95\x55\xce\x3e\x94\xb7\xbf\xdf\xfc\x71\x0b\x1f\x26\xf3\xf9\x64\x7a\x5b\xbe\xad\xe0\x66\x0e\x57\x37\xd3\x37\xe5\x6d\x79\x33\xad\xe0\xe6\x1a\x26\xd3\x8f\xf0\xae\x9c\xbe\xc9\x01\x85\x5b\xa1\x01\xfc\xa2\x0d\x61\x57\x06\x04\x51\x87\x4d\xc1\x2a\xc4\x13\xe7\xad\x0a\x60\xac\xc6\x5a\xb4\xa2\x86\x8e\xcb\x65\xcf\x97\x08\x4b\xb5\x45\x23\x85\x5c\x82\x46\xb3\x11\x96\x92\x67\x81\xcb\x86\x75\x62\x23\x1c\x77\x7e\xfd\x24\x9c\x82\xbd\x1c\x32\xa6\x79\xbd\x26\x23\x1b\x2e\x24\x63\x62\xa3\x95\x71\x90\xb1\x24\x6d\x37\x2e\x65\x49\xda\xa9\x25\xfd\x48\xf4\x2b\x65\xe9\x9b\x28\x90\x4b\xff\xa7\x13\x1b\x4c\xd9\x80\xb1\xe1\x10\x6e\xaf\x66\xe0\xd5\x9d\x82\x4e\x58\x87\x92\xd5\x4a\x5a\x17\x36\x2f\xe1\xf5\x68\x34\x62\xac\xed\x65\xed\xbd\x65\x03\xf8\x93\x25\x42\x5b\x18\x5f\xc2\x12\x5d\x39\xb3\xd9\x80\x25\xa2\x85\x0e\x65\x26\xb4\x1d\xc0\xe5\x25\x8c\x48\x28\xd1\x5c\x8a\x3a\x4b\xa7\x0a\xb6\xbc\x13\x0d\x94\x33\x68\x55\x2f\x9b\x74\xc0\x92\x47\xc6\x92\xe1\x30\x7a\x0c\x20\x78\xbd\x46\x67\x43\x96\xff\x8d\xb5\xf3\x61\xab\xde\x51\x99\x29\x43\x3c\x1c\x89\xb1\x84\xa8\xfd\x94\x83\xd0\x84\xc4\x70\xb9\x44\x20\x58\xe4\xb8\x53\xcb\x62\x66\x84\x74\x6d\x96\xe2\x17\x87\x46\xf2\x0e\x84\x1e\xc3\x8b\x6d\x4a\x1a\x45\xe5\xb9\xc8\x06\x03\x96\x24\x4b\x05\xda\xa8\x05\x66\xa7\xfb\x04\xf0\xd8\x4e\x44\xaa\x24\xbc\xd8\x8e\x5f\x34\x69\x0e\xe9\xa8\xf0\xff\xd2\xdc\x73\x35\x08\x11\x29\x8d\x74\x3f\x2c\x9a\x2d\x9a\x18\x1f\x65\xd9\x29\x40\xeb\xf8\xa2\x13\x36\xdc\x2d\x0a\xa6\x56\x52\x62\xed\x53\xcd\x92\x20\x8b\x26\x07\x34\x86\x82\x92\xe8\x8a\xf7\x7e\x33\x4b\x5d\xad\xd3\x1c\xda\x8d\x2b\x2a\x1d\x11\x45\xf7\x01\x8c\x47\x10\x12\x41\xda\x67\x97\x20\x45\x77\x94\x05\x34\x26\x06\x45\xbc\xd1\x3e\xf9\x3e\xb8\xda\xfb\x2e\x26\x35\xf5\x03\x4a\xe9\x33\xa6\x4e\x6c\x79\x63\xc4\x1e\xd5\x46\x46\xd6\x3c\xe0\x2b\x25\xe5\x20\x48\x0f\x87\x70\xd5\x29\x1b\x6e\xc4\xb7\x50\x81\xb7\x0e\x0d\x9c\x8f\xc0\x62\x6d\x49\x90\xea\xb1\xa8\x3a\x44\x9d\x9d\x8f\xe0\x25\x84\x35\xd6\x4a\x36\xe4\xc8\x43\x2d\xbc\x29\x0f\xec\xd1\x7b\xf3\xe1\x3c\xc6\xd2\xdc\x67\x10\x42\x95\x7b\x00\xc7\xd9\xa3\x73\xca\x42\x2c\x00\xca\x95\xd0\x93\xa6\x39\x25\x7b\x8e\x56\x75\x5b\x2c\x67\x74\x92\xa5\x42\x8f\x03\xed\xa4\xf0\x03\xcc\x9e\x30\xfa\x2d\x79\xe5\xec\xc4\x14\xd9\xfe\x21\x73\x1a\x65\x43\x98\xc7\x97\xb0\xe1\x6b\xcc\x36\x5c\xdf\x85\xf0\xee\x7b\x21\xdd\x5f\x2f\x28\x8a\x2d\x37\xb0\xe8\xdb\x16\x0d\xdc\xfd\x6d\xf4\xfa\x1f\xf7\x8b\x07\x87\xdf\x92\x2c\x73\xe0\xc7\x51\x7a\x26\xe7\xc8\x9b\x6b\xa3\x36\x59\x50\xbc\x1b\xdf\xff\x8f\x74\x1f\x33\x78\xaa\x39\x20\x59\x65\xe2\x8d\x8a\x05\x41\x04\x38\x21\x7b\xdc\x17\x87\x5e\x3b\x72\xfa\x93\xab\xf5\xcc\x5f\xdb\x3f\x1f\x59\x92\x34\xdc\xf1\x03\x20\xbd\x76\x45\x83\xb5\x6a\xf0\x80\x46\xfe\x08\x1c\x57\xeb\xd8\x0a\x40\x73\x63\xf1\x87\xf0\x88\xd6\xfb\x7b\x83\xd6\xcd\xa8\xbb\x9d\x85\xf6\x16\xac\x7f\x2f\xfc\xbc\xb7\x31\xbc\xf8\x79\x9b\x43\xdb\xf1\x25\x39\xcb\x81\xa2\x09\x7f\x11\xd1\x11\x80\x5e\x3b\xff\x55\x5c\x77\x7c\xb9\x6f\x2a\x41\x36\xc8\x0d\x8e\xe0\x90\x8c\xfd\xa9\xfa\x38\x25\x3c\x11\x4c\xcc\xfd\x1d\xc9\x1e\xba\xd2\x3d\x04\xbe\x2a\xfc\x0c\x3f\xc3\xf9\x13\xd0\xdf\x59\x9c\x57\xb7\x47\x16\x0f\xe1\x74\x32\x4b\xdf\xce\xe7\x37\xf3\x31\x90\x84\xc1\x1a\xc5\x16\x7d\x53\x7e\x6a\x63\x72\xf5\xee\xc8\x86\x68\xc1\xe2\xe7\x1c\xd4\xda\xa7\xee\x59\x8c\xbf\xd0\xa9\x97\x3e\x75\x79\x74\xff\x0f\x7d\x30\x7a\x4d\x92\x06\x3b\x74\x98\x45\x8b\x81\xa2\xa3\x66\xec\x65\x16\xbc\x99\x3d\xa9\x27\x7f\x92\x54\xa6\xa6\x7c\x8e\x69\xf8\x38\x4e\x70\x1e\x8e\xf7\xcb\x71\x3c\x8e\xe2\xf1\x74\x52\xaf\xbd\x22\x7d\x28\xba\x68\x12\x3f\x1f\x76\x49\x67\x52\xaf\xe1\x15\x9c\x8f\xe8\x93\x87\xed\xe1\x10\x7e\xe3\xcd\x98\x94\xe8\x99\x7a\xa5\xda\x57\x3b\x21\x1b\xb5\x0b\x16\x3c\x81\xd1\x46\xf6\x77\xf8\xf5\x57\x38\xbf\x18\xc0\x57\x98\x55\xbf\xc3\x57\x98\x5c\xbd\xcb\xc9\xc2\x4d\xdb\x5a\x74\xf4\xee\x83\x57\x00\x50\x4a\xa9\xd1\x68\x74\x0d\xd7\xf1\x03\x99\x1a\x2b\x2f\x96\xc3\xf5\x98\x2a\xcf\x06\xd6\x92\x0f\xde\x5d\x25\xfe\x83\x63\x0f\xf2\xdb\x3a\x44\xf1\x18\x98\xa3\xb2\x23\xde\xee\x7c\x73\xc8\xd2\x85\x52\x9b\xb3\xb3\xb3\xc8\xbd\xc1\x8d\x72\x58\xce\xf6\x4d\x6b\x46\xd7\xa9\x9c\x65\xdf\xe5\x20\x24\xb4\xe6\xdd\x53\x49\xdf\x1a\xde\xd3\x99\xef\x9b\x83\xef\xb4\x3e\x9d\x76\x9f\x0f\x46\x38\xbc\x55\x59\xc8\x67\x81\xd2\x5f\xfe\x68\x3a\x87\x3d\x9c\x70\x5b\xa8\x37\xed\x6f\x4c\x92\x3c\xdb\x15\x9e\x69\x53\x7b\x17\xcf\x77\xa9\xe4\x11\xb0\xb3\xf8\x44\x9b\xaa\x94\xa8\xd9\xf7\x95\x30\x85\x1c\x6a\x94\xee\x86\xff\x7a\x8c\x0f\xcf\x70\x18\x07\x20\xfa\xb1\xfe\x91\xa3\x45\x6b\xd4\xc6\x2f\x1a\xb5\x93\x3b\x6e\x1a\x98\xcc\x4a\x12\xde\xd1\x96\xfc\x8b\x83\x15\xdf\x22\xcd\x03\x7e\x2a\xe2\x0e\x0f\xaa\x0b\xac\x79\x6f\x91\x84\xdd\x0a\x1f\x80\x1b\x3c\x08\x35\xa0\x0d\x6e\x85\xea\x6d\xf7\x40\x53\xf2\xfa\xf0\xff\x84\xe1\xd5\xb4\x0c\xaf\xe0\x7e\x1e\x83\xbb\x7b\xca\x4f\x39\xa3\x18\xe9\x85\xa0\xc1\x68\xbf\xc7\x12\xad\x1a\xe2\xd7\xff\xf8\x39\x4e\xd9\xe2\x9f\xe8\x50\x6e\xb3\x74\x76\xf3\xe6\x53\x39\x4b\x07\xf9\xd3\xcd\x2a\x0d\xcf\x56\xd4\x3b\xbb\x84\x34\xf5\x24\x3e\x33\x89\xc5\x61\xb3\xa8\x74\x27\x5c\x16\x34\x72\x48\xf3\x34\x8e\x06\x04\xe8\x92\x26\x7d\x94\x0d\x4d\x8d\xf9\x49\x41\x09\x3d\x88\xdd\x28\xa6\x6a\xef\xf5\xc8\xe9\xff\xb7\xe0\xa5\xc3\x18\x97\x18\x74\xbd\x91\xc4\x01\x7b\x64\xff\x0d\x00\x00\xff\xff\xff\x68\x86\x92\x75\x0d\x00\x00") + +func testImagesRegressionIssue74839MainGoBytes() ([]byte, error) { + return bindataRead( + _testImagesRegressionIssue74839MainGo, + "test/images/regression-issue-74839/main.go", + ) +} + +func testImagesRegressionIssue74839MainGo() (*asset, error) { + bytes, err := testImagesRegressionIssue74839MainGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/regression-issue-74839/main.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRegressionIssue74839TcpGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x57\x6d\x6f\xdb\x38\x12\xfe\x2c\xfe\x8a\x59\x03\x5b\x48\x8d\x57\xb2\x5d\x9f\x37\x97\xad\x03\xb8\x6e\x76\x6b\x74\xe1\x18\x56\x72\x45\x2f\xc8\x01\xb4\x34\xb6\x09\xcb\xa4\x4a\x51\x49\xd3\x5c\xfe\xfb\x61\xa8\x17\x2b\x56\x13\x1c\x90\xc8\xf2\xcc\xc3\x99\xe1\x33\x2f\xa4\x83\xb7\x6c\xaa\xd2\x07\x2d\x36\x5b\x03\x83\x5e\xff\x9f\x70\xb5\x45\xf8\x9c\xaf\x50\x4b\x34\x98\xc1\x24\x37\x5b\xa5\x33\x9f\xb1\xbf\x45\x84\x32\xc3\x18\x72\x19\xa3\x06\xb3\x45\x98\xa4\x3c\xda\x22\x94\x9a\x2e\xfc\x0b\x75\x26\x94\x84\x81\xdf\x03\x97\x00\x9d\x52\xd5\xf1\xfe\x60\x0f\x2a\x87\x3d\x7f\x00\xa9\x0c\xe4\x19\x82\xd9\x8a\x0c\xd6\x22\x41\xc0\xef\x11\xa6\x06\x84\x84\x48\xed\xd3\x44\x70\x19\x21\xdc\x0b\xb3\xb5\x4e\x4a\x13\x3e\xfb\x5a\x1a\x50\x2b\xc3\x85\x04\x0e\x91\x4a\x1f\x40\xad\x9b\x28\xe0\x86\x31\x00\x80\xad\x31\xe9\x59\x10\xdc\xdf\xdf\xfb\xdc\x46\xe9\x2b\xbd\x09\x92\x02\x95\x05\x7f\xcf\xa6\x17\xf3\xf0\xe2\xb7\x81\xdf\x63\xec\x5a\x26\x98\x65\xa0\xf1\x5b\x2e\x34\xc6\xb0\x7a\x00\x9e\xa6\x89\x88\xf8\x2a\x41\x48\xf8\x3d\x28\x0d\x7c\xa3\x11\x63\x30\x8a\xe2\xbc\xd7\xc2\x08\xb9\xe9\x42\xa6\xd6\xe6\x9e\x6b\x64\xb1\xc8\x8c\x16\xab\xdc\x3c\x23\xa8\x8a\x4a\x64\xd0\x04\x28\x09\x5c\x42\x67\x12\xc2\x2c\xec\xc0\x87\x49\x38\x0b\xbb\xec\xcb\xec\xea\xd3\xe5\xf5\x15\x7c\x99\x2c\x97\x93\xf9\xd5\xec\x22\x84\xcb\x25\x4c\x2f\xe7\x1f\x67\x57\xb3\xcb\x79\x08\x97\x7f\xc2\x64\xfe\x15\x3e\xcf\xe6\x1f\xbb\x80\xc2\x6c\x51\x03\x7e\x4f\x35\xc5\xae\x34\x08\xa2\x0e\x63\x9f\x85\x88\xcf\x9c\xaf\x55\x11\x4c\x96\x62\x24\xd6\x22\x82\x84\xcb\x4d\xce\x37\x08\x1b\x75\x87\x5a\x0a\xb9\x81\x14\xf5\x5e\x64\x94\xbc\x0c\xb8\x8c\x59\x22\xf6\xc2\x70\x63\xbf\xb7\xb6\xe3\xb3\xb7\x01\x63\x41\x00\x0b\xae\x8d\xe0\x49\xf2\x40\xa9\x10\x18\xc3\x5a\xab\xbd\xa5\x3e\x3b\x0b\x82\x8d\x30\xdb\x7c\xe5\x47\x6a\x1f\xac\xd4\x3d\x8a\x20\xa1\x2a\xdb\xaa\x3c\xc3\x60\x95\xa8\x55\xb0\xe7\x99\x41\x1d\xa4\xbb\x4d\x90\x6a\xb5\xc2\xc0\x44\xa9\xbf\x51\x8c\xa5\x3c\xda\x51\x7c\x7b\x2e\x24\x63\x62\x9f\x2a\x6d\xc0\x65\x4e\x67\xf5\x60\x30\xeb\x30\xa7\x83\x32\x52\xb1\x90\x9b\x60\x25\x24\xd7\x0f\x24\x4a\xd4\x86\x3e\x24\x9a\x0e\xf3\x18\x8b\x94\xcc\xec\x22\x13\xa5\x9f\x90\xc7\xa8\x43\xf1\x03\x61\x0c\x83\x9e\x95\x2d\xb4\x32\x6a\x9e\xef\x01\x60\x0c\xa3\x67\x2b\x82\x00\xa6\x4a\x1a\xad\x12\xf8\x20\x4c\xe6\xc3\x08\x56\xf4\x69\x35\xbd\x1e\x95\x57\xaf\x6f\x9f\x03\xfb\x7c\x67\x9f\x43\xfb\xfc\x87\x05\x5d\xd3\x3b\x4c\xec\x73\x61\x9f\x4b\xfb\x0c\xed\xf3\x4f\x66\x41\x7f\xce\xe6\x54\x18\x1c\xae\xa6\x0b\x58\x27\x7c\xc3\x1c\x12\xe5\x42\x9a\xfe\x08\xc6\xd0\x87\xf7\xef\x41\x28\xc3\x2d\x3a\xfc\xda\x42\x87\x5f\xe7\x56\xb5\x0c\xaf\x8e\x55\xcb\xf0\xca\xaa\x16\xe1\xa7\x63\xd5\x22\xfc\x64\x55\x93\xe9\xe7\x63\xd5\x64\xfa\xb9\x08\x7f\xf9\xd7\xb1\xea\x7a\xf9\x97\x55\x5d\x4c\x2f\x8e\x55\x17\xd3\x8b\x82\xb3\x2f\xcb\x63\xd5\xf4\xcb\xd2\xaa\xe6\xe1\xb1\x66\x1e\x12\xe5\xe6\x21\x45\xa0\x64\xf0\x68\x87\x06\x32\xa3\xf3\xc8\xc0\x23\x73\x42\x1d\x2d\x28\xe9\x15\x1b\x44\x3c\x73\x3e\x62\x66\xac\xf8\x20\x1d\x30\x27\xc4\x6f\x96\x56\x2b\x7d\x37\x20\xe9\x90\x39\x93\x68\x77\x2c\x3d\x2d\x68\x4f\xf8\x26\x03\x5b\x49\x20\x64\x94\xe4\x31\x66\x56\xf1\x91\x1b\x0e\x97\xeb\x75\x86\xc6\x87\x61\x23\xe5\x1a\x33\xd4\x77\x18\xfb\xf0\xae\x90\x82\xbb\xcf\x33\x03\x2b\x84\x1f\xa8\x95\x57\x12\x33\xef\xc2\xc5\x77\x1a\x1b\xc2\x50\xfd\x6c\x30\xa3\xfe\x81\xb9\x32\xd4\x75\xb6\x99\x6a\x0b\xad\x22\x03\x77\x89\x3c\xb1\xe4\x64\x5e\xa3\xe2\x8a\x68\xeb\x8d\x14\x9b\xee\x0f\x98\xf3\x45\xc8\x58\xdd\xdb\x9a\x6e\x28\x86\xcc\x99\x6e\x31\xda\x65\xb6\xb0\x1b\x8a\x11\x73\xae\xf5\x06\xa5\x59\x18\xfd\x4c\x51\x90\x32\xe8\xb1\x27\xc6\xd6\xb9\x8c\xc0\x35\xf0\xb6\x4e\x89\x07\x31\x46\x2a\x46\x37\xdd\x19\xb8\xb9\x25\xd6\x3c\x70\x8b\x97\x2e\xa0\xd6\x4a\x7b\x94\x2f\xd4\x1a\xce\xc6\x50\x74\xa3\xbf\x44\x1e\xbb\x96\x61\x7f\x8e\xf7\x4b\xdb\x7d\x64\xc1\xeb\x56\x88\x0f\x62\x73\x21\x63\xc1\x65\x17\x8c\xc7\x1c\xb1\x26\x5b\xf0\xcb\x18\xa4\x48\xc8\x9e\xa3\xd1\xe4\x5a\xd2\x57\xeb\x86\x39\x4f\x8c\x55\xc2\x74\x67\x6e\x8c\x4f\xe9\x2a\xb2\xe5\x7a\x67\xb7\x5d\x82\xbe\xb4\x87\x26\x14\x84\xb4\x15\x56\xda\x12\xd2\xb8\xae\xf1\x0b\x9a\xcf\xcf\xa1\x3f\xf0\xe0\x2d\x0c\xbd\x97\x4c\x11\x30\x34\x5a\xc8\x8d\xeb\x51\xbd\xd2\xf0\x7c\x64\x8e\xca\x0d\xed\xbf\xd3\x61\x76\x33\xa5\xc1\x37\xd4\xcf\xbf\x8c\xa1\x67\xb7\x44\x98\x93\x31\x74\x48\xd8\xa1\x0d\x35\x91\xd4\xde\x2d\x24\x09\x5b\x48\xea\xf6\x16\x92\x84\x2d\x24\x35\x7f\x0b\x49\xc2\x16\x92\x66\x41\x0b\x49\xc2\x16\x92\x46\x43\x0b\x49\xc2\x16\x92\x26\x45\x0b\x49\xc2\x16\x92\x06\x47\x0b\x49\xc2\x16\x72\x1e\xb6\x81\xf3\xb0\xc0\xd5\x29\x55\xb9\x79\x29\x7b\xf6\xd8\x40\x37\xd3\x51\x17\x62\xcc\x0c\x48\x34\xfe\x6c\xd1\x85\x98\x7a\xbf\xaa\xef\xe2\x93\x9c\x50\xd5\x9f\x8d\x61\xcf\x77\x58\x17\xfd\xa0\x47\xff\x27\x09\x4a\x97\x56\x79\x1e\x63\x4e\x61\xb7\xd9\x02\x75\x81\xd7\x4a\x7f\x91\x9b\x6b\xdb\x77\xd4\x0a\x5d\x30\x7e\x39\xe4\xbc\x17\x20\x37\x03\x2a\x6b\xe3\x57\x53\xaf\x8d\x7b\x37\xb0\xb8\x61\x81\x0b\xf1\xdb\x8b\x90\xd3\x02\x32\x89\x76\x2f\x7a\xeb\x97\xee\x2c\xd3\x2f\xa3\x4a\x67\x87\xf1\xf3\x32\xb4\x74\x5a\xcf\x1d\x62\x2a\xaa\xa6\xd3\xd9\x18\xaa\xf7\xab\xe9\xe2\x90\x92\xae\x6d\xef\xb3\x67\xa7\xf6\x6d\x91\x20\xcf\x26\xe4\xa6\x3f\xba\x85\xb1\x1d\x61\xa7\x6e\x6d\xee\x0d\xf4\xbe\xaf\xd7\x15\xe2\xf7\x9f\x20\xce\xcf\xe1\x94\x22\xa0\x9c\x8e\xe9\x82\x87\x32\x2e\x32\x41\xb6\x7d\xdf\xf7\x9e\x4d\x98\xba\x84\x7e\x1a\x65\x5d\x38\x75\x9c\x47\x35\x54\x4e\xd8\x47\xe6\x24\x6a\xe3\x2f\xb4\x90\x66\xed\x76\x22\x9e\x24\x34\x31\x1a\x36\xcf\xe0\xd7\xbb\xfa\xaf\xd3\x85\x06\x11\x47\xb6\x3d\x62\x6f\x47\xc4\xbd\x31\x51\x5a\x8d\xf9\x3d\xea\xc7\xa7\xe2\x42\x71\x61\xd3\x00\x69\x86\x79\xac\xb6\x76\xa5\x6f\xdb\x27\xd3\x91\x7f\xa5\x86\xae\xd7\x9c\xb0\x41\x00\xb3\xc5\xdd\x10\x6e\x48\x0d\xee\xd0\x83\xff\x42\x4c\x17\x20\xfb\xa6\xb3\x3b\x70\xfb\xf4\x96\xd2\x45\xa9\x7c\x37\x51\x0a\x09\xca\x8d\xd9\x82\x3b\xf0\xe0\x16\x7c\xdf\x2f\xc5\x85\x3f\xb2\xc1\xe9\xc6\x42\xa1\xfa\x3c\x8e\xdd\xda\xb7\xd7\x10\xd2\xfe\x0e\xd2\x22\xe0\x62\xab\xad\x76\x1b\x1e\x23\x6e\xfa\x94\xdc\xc6\x0d\x8e\x39\xce\x71\xd3\x35\x2b\xb1\xb9\xd4\x96\x78\x91\x1a\xb7\x6e\x60\xdb\xca\x35\xd7\xde\xb3\x40\x9b\xab\xa9\x3e\x9e\x00\x93\x0c\x2b\xfe\xaa\x9b\xae\x51\x2a\xc9\x7c\x81\x66\x6d\x7f\x65\x6c\xcd\x3e\x09\xf4\x3a\x1a\x0c\x47\x3d\xe2\x78\x54\xb3\x3d\xaa\xd8\xee\x8f\x6a\xba\x8b\xd7\x94\x3f\x24\x8a\xc7\x35\xbb\x36\x09\xff\x46\xad\xc0\x7d\x47\xaf\xf3\x4f\xc1\x21\x11\xff\x3f\xef\xfd\xd1\x4f\x89\xaf\xc4\xaf\x32\x7f\xea\xbd\xc2\x2c\xcd\x95\xc6\xe2\x6e\x79\xcd\x7a\x9d\xd5\x67\xb9\xf8\xbd\x9d\xc6\x9f\xb3\x6e\x67\x7b\xa5\x3a\x58\x3c\xc8\x8a\xe6\x38\xea\xb4\xb2\x3d\x50\x9f\xc1\xaf\x27\xd4\x58\xd1\x76\xd7\xe8\x70\x5a\xbb\x16\x92\x27\xe2\x07\xba\xf6\xb4\xaf\xee\xa2\x8d\xc6\x6a\x5c\x48\x8b\x0b\x55\x75\x9b\x64\x8e\x8a\xe3\x0f\x74\x48\x10\x55\xcc\x29\xb3\x46\xb7\x89\xc3\xd1\x13\xd9\xa3\xa7\x61\xce\x83\x83\xc7\xc6\x80\xd0\x68\x0f\x99\xc8\xcf\x88\x04\xb1\x86\xc8\x2f\xec\xfd\x3a\x80\xf3\xf2\xb0\x23\xcc\xc9\xb8\x22\x39\xf2\x4b\xf7\x96\x9c\xc3\xbe\x13\xe9\x76\x34\x9a\x33\xe8\x74\x41\x23\x1d\x18\xf4\xdb\x4f\xa3\x39\x3f\xef\x8f\x9e\xd9\x1a\x93\xf4\x0d\x8d\xcc\xf5\x1a\x4e\x2a\x08\x73\x5e\xb3\xf5\xba\xa7\x92\xd7\xff\x94\xdd\x65\x85\xaf\x51\x51\x25\xae\x9e\x98\x8f\x76\xef\x75\xfd\xc0\x78\x7c\x88\x37\xd7\xd2\xfa\xdf\xf2\x3b\xbc\x2c\x99\xb7\x94\x35\x89\x62\x4e\xf5\x9d\xa8\xaa\x0d\x59\xb3\xcd\x85\x64\xd3\x7a\xae\x4f\x81\x22\x84\xc7\x9a\xd6\xa7\xc6\x99\x40\x6e\x89\x45\x41\x0e\x7b\x7f\x80\x80\xf7\x07\xdb\xbf\xf5\x49\x70\x32\x86\x81\xb5\x6a\x53\xd8\xc8\x13\x61\x6e\xc4\xad\x07\x27\xcf\x25\x27\xfd\x5b\xef\xfd\xfb\xd3\xea\x76\xf3\x93\x7c\xd7\xa1\xc0\xd8\x86\x72\xd3\x70\x79\x4b\xeb\x9e\xd8\xff\x02\x00\x00\xff\xff\xae\xa2\xde\x7e\xbb\x11\x00\x00") + +func testImagesRegressionIssue74839TcpGoBytes() ([]byte, error) { + return bindataRead( + _testImagesRegressionIssue74839TcpGo, + "test/images/regression-issue-74839/tcp.go", + ) +} + +func testImagesRegressionIssue74839TcpGo() (*asset, error) { + bytes, err := testImagesRegressionIssue74839TcpGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/regression-issue-74839/tcp.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesRegressionIssue74839Tcp_testGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x94\x6f\x8f\xda\xc6\x13\xc7\x1f\x7b\x5f\xc5\xf7\x87\x94\x9f\x20\x72\x6d\x43\x9b\x5c\x8e\xe8\x1e\x50\x72\x55\x51\x22\xee\x74\x90\x46\x51\x14\x45\x6b\x33\xb6\x57\xb1\x77\xdd\xdd\x71\x80\x9c\x78\xef\xd5\x1a\xee\xca\xfd\x49\xda\xf4\x01\x46\x9e\xf9\xce\x67\xc6\x33\xbb\x13\x3f\x15\x53\xd3\x6c\xad\x2a\x4a\xc6\x28\x19\x9e\x62\x59\x12\x5e\xb7\x29\x59\x4d\x4c\x0e\x93\x96\x4b\x63\x5d\x24\xc4\x1b\x95\x91\x76\xb4\x42\xab\x57\x64\xc1\x25\x61\xd2\xc8\xac\x24\x1c\x3c\x21\xfe\x20\xeb\x94\xd1\x18\x45\x09\xfa\x5e\xd0\x3b\xb8\x7a\x83\x97\x62\x6b\x5a\xd4\x72\x0b\x6d\x18\xad\x23\x70\xa9\x1c\x72\x55\x11\x68\x93\x51\xc3\x50\x1a\x99\xa9\x9b\x4a\x49\x9d\x11\xd6\x8a\xcb\x2e\xc9\x01\x11\x89\xf7\x07\x80\x49\x59\x2a\x0d\x89\xcc\x34\x5b\x98\xfc\x58\x05\xc9\x42\x00\x40\xc9\xdc\x8c\xe3\x78\xbd\x5e\x47\xb2\xab\x32\x32\xb6\x88\xab\xbd\xca\xc5\x6f\x66\xd3\xf3\xf9\xe2\xfc\xa7\x51\x94\x08\xf1\x56\x57\xe4\x1c\x2c\xfd\xd9\x2a\x4b\x2b\xa4\x5b\xc8\xa6\xa9\x54\x26\xd3\x8a\x50\xc9\x35\x8c\x85\x2c\x2c\xd1\x0a\x6c\x7c\x9d\x6b\xab\x58\xe9\x22\x84\x33\x39\xaf\xa5\x25\xb1\x52\x8e\xad\x4a\x5b\xbe\xd3\xa0\x9b\xaa\x94\xc3\xb1\xc0\x68\x48\x8d\xde\x64\x81\xd9\xa2\x87\x5f\x27\x8b\xd9\x22\x14\xef\x66\xcb\xdf\x2f\xde\x2e\xf1\x6e\x72\x75\x35\x99\x2f\x67\xe7\x0b\x5c\x5c\x61\x7a\x31\x7f\x35\x5b\xce\x2e\xe6\x0b\x5c\xfc\x86\xc9\xfc\x3d\x5e\xcf\xe6\xaf\x42\x90\xe2\x92\x2c\x68\xd3\x58\x5f\xbb\xb1\x50\xbe\x75\xb4\x8a\xc4\x82\xe8\x4e\xf2\xdc\xec\x8b\x71\x0d\x65\x2a\x57\x19\x2a\xa9\x8b\x56\x16\x84\xc2\x7c\x21\xab\x95\x2e\xd0\x90\xad\x95\xf3\xc3\x73\x90\x7a\x25\x2a\x55\x2b\x96\xdc\xbd\x3f\xf8\x9c\x48\x3c\x8d\x85\x88\x63\x5c\x4a\xcb\x4a\x56\xd5\xd6\x8f\x42\xd1\x0a\xb9\x35\x75\xd7\x7a\x37\x8e\xe3\x42\x71\xd9\xa6\x51\x66\xea\x38\x35\x6b\x52\x71\xe5\x4f\x59\x69\x5a\x47\x71\x5a\x99\x34\xae\xa5\x63\xb2\x71\xf3\xb9\x88\x1b\x6b\x52\x8a\x39\x6b\x3e\x31\x39\x8e\x0a\x23\x44\x23\xb3\xcf\xbe\xc8\x5a\x2a\x2d\x84\xaa\x1b\x63\x19\x7d\x11\xf4\xbc\x42\xe9\xa2\x27\x06\x42\xe4\xad\xce\xb0\x24\xc7\xcb\xe9\xe5\xb4\xa4\xec\xb3\x6b\xeb\x9a\x6c\x9f\xf1\xf4\x20\x8b\x96\x03\x5c\x8b\x80\xa3\x4b\x69\x65\x55\x51\xd5\x1f\x08\x11\xf8\x9e\x7c\x0a\xc1\x19\xc6\x67\xb0\x52\x17\x84\x0f\x1f\x1d\xdb\x36\x63\xaf\x0e\x56\xe4\x32\xf8\x81\xe9\xc2\xbf\x49\x96\xf8\xf0\xf1\xc3\xc7\x74\xcb\x24\x82\x60\x2d\x35\xa3\x55\x9a\x87\xcf\x45\xb0\xf3\x7a\xff\xeb\x82\xc6\xe8\x51\xdd\xf0\xb6\x17\x76\x16\xc9\x72\x7c\x1b\x79\xbd\xeb\x8c\x3e\x7a\x8c\x64\x93\xe7\x79\xee\x0d\x9d\xf5\x18\x30\x84\x57\x3f\x4a\xb8\x4e\x36\xcf\x9e\xed\xee\x73\xa4\x7c\x94\x33\xea\x38\xee\xdb\xa0\x10\xc9\xe6\xc5\x8b\x7b\xb8\x93\x93\x6f\xe0\x7e\xfe\x77\x38\xff\x3c\x3d\x7d\x00\x1d\x0e\xbf\x07\x45\x8c\x21\x24\x43\x82\x55\xfd\xbd\x4f\x0f\x71\xdd\xd5\xdc\xfd\xff\x97\x34\x23\x0c\xff\xb1\x21\x3f\x08\x77\xfe\xea\x11\xfc\x81\x25\x7e\x14\xee\x4d\xfb\x90\x20\x48\x36\x27\xb9\xcf\x93\x24\x47\xcf\x61\x88\x38\xc6\x70\x74\x12\x25\x51\x12\x0d\x7f\x5c\x79\xf0\x3e\xef\xbc\xcb\xe9\x25\x1a\x6b\xd8\xe0\xf9\x5d\xff\xf0\x97\xce\xbf\x50\x5f\x09\x67\x18\x25\xfb\xae\xdc\xd5\x3c\xdb\x2b\xbb\xcc\xa7\x37\x99\xef\xa5\xb9\x2d\xe5\xc8\xf2\x98\x64\xcf\x4a\x46\xdf\xa3\x24\x0f\x29\xfb\xbe\xdf\x3f\xe5\xa7\xb7\xdd\xdf\x75\x77\x94\xa3\xab\x56\xf7\x39\x8b\xfc\x18\x42\xf8\x55\xf0\xf0\xde\x07\x41\x77\xc5\xff\xcf\x59\x73\xb4\x1f\xae\x77\xde\x73\x58\x02\xe9\xdf\x3b\xc0\xc3\xfc\x5d\xdf\x8f\x2a\x8b\xe4\x6a\xd5\x4f\x07\x5d\x31\xfe\x51\x18\xf6\xda\x2c\xca\x95\x96\x95\xfa\x4a\xfd\xce\xa7\x72\x78\xcf\xff\xce\x7c\x7c\xb7\x1b\xf6\xf1\x1c\x9d\x5b\x6b\x6c\xde\xef\x1d\x47\xe0\x0c\x4f\x36\x21\x3a\xdd\x93\xcd\xcb\xfd\x08\xc6\x78\xf2\xa5\x17\x7a\x4c\x78\x03\x09\x6f\xaa\xb9\xcd\xbf\x1b\x88\x60\x27\x76\xe2\xaf\x00\x00\x00\xff\xff\x83\x6f\xed\xc1\xb5\x07\x00\x00") + +func testImagesRegressionIssue74839Tcp_testGoBytes() ([]byte, error) { + return bindataRead( + _testImagesRegressionIssue74839Tcp_testGo, + "test/images/regression-issue-74839/tcp_test.go", + ) +} + +func testImagesRegressionIssue74839Tcp_testGo() (*asset, error) { + bytes, err := testImagesRegressionIssue74839Tcp_testGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/regression-issue-74839/tcp_test.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerGitignore = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\xce\xcf\x2b\x2e\xcd\x4d\x2d\xe2\x82\x32\x74\x93\x0b\x4a\xf5\x91\xd8\x20\xf1\x92\xa2\xfc\x9c\x9c\xd4\x22\x7d\x04\x93\x0b\x10\x00\x00\xff\xff\x1b\x0f\x16\x78\x37\x00\x00\x00") + +func testImagesResourceConsumerGitignoreBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerGitignore, + "test/images/resource-consumer/.gitignore", + ) +} + +func testImagesResourceConsumerGitignore() (*asset, error) { + bytes, err := testImagesResourceConsumerGitignoreBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/.gitignore", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\xcd\xb6\x28\xd6\x4b\x4f\x2e\xd2\xcb\xcc\xd7\x4f\x49\x4d\xca\x4c\xcc\xd3\x4d\x4a\x2c\x4e\xd5\x05\x4b\x5a\x19\xe8\x99\xe8\x19\x72\x41\x95\x17\xe5\xe2\x54\x5c\x94\x8b\xae\x14\x8f\xc9\x20\x49\x14\xe5\x05\x05\xc9\x66\x26\x39\xa9\xb8\x34\x40\xa5\x51\xb4\x14\x1b\x5b\x1a\x54\xe0\xd2\x00\x96\x84\x2a\x07\x04\x00\x00\xff\xff\x71\x77\xcf\xba\xeb\x00\x00\x00") + +func testImagesResourceConsumerBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerBaseimage, + "test/images/resource-consumer/BASEIMAGE", + ) +} + +func testImagesResourceConsumerBaseimage() (*asset, error) { + bytes, err := testImagesResourceConsumerBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x4f\x6f\xdb\x30\x0c\xc5\xef\xfa\x14\x0f\xf1\x0e\x1b\x90\xc4\x59\x0f\x43\xb1\x9d\xdc\xc4\x6d\x8d\xb6\x76\x67\x3b\xeb\x82\x61\x28\x14\x99\xb1\x09\x38\x92\x2b\xc9\x73\xf3\xed\x07\xa7\x7f\xd6\x62\x3a\x89\xe4\x23\xf5\xe3\x53\x80\xa5\xe9\x0e\x96\xeb\xc6\xe3\x64\xf1\xf9\x0b\xca\x86\x70\xd5\x6f\xc9\x6a\xf2\xe4\x10\xf5\xbe\x31\xd6\xcd\x45\x20\x02\x5c\xb3\x22\xed\xa8\x42\xaf\x2b\xb2\xf0\x0d\x21\xea\xa4\x6a\xe8\xa5\x32\xc5\x0f\xb2\x8e\x8d\xc6\xc9\x7c\x81\x8f\xa3\x60\xf2\x5c\x9a\x7c\xfa\x26\x02\x1c\x4c\x8f\xbd\x3c\x40\x1b\x8f\xde\x11\x7c\xc3\x0e\x3b\x6e\x09\xf4\xa8\xa8\xf3\x60\x0d\x65\xf6\x5d\xcb\x52\x2b\xc2\xc0\xbe\x39\x3e\xf3\x3c\x64\x2e\x02\x6c\x9e\x47\x98\xad\x97\xac\x21\xa1\x4c\x77\x80\xd9\xbd\xd5\x41\xfa\x23\xf0\x78\x1a\xef\xbb\xaf\x61\x38\x0c\xc3\x5c\x1e\x61\xe7\xc6\xd6\x61\xfb\x24\x74\xe1\x75\xb2\x8c\xd3\x22\x9e\x9d\xcc\x17\xc7\x96\xb5\x6e\xc9\x39\x58\x7a\xe8\xd9\x52\x85\xed\x01\xb2\xeb\x5a\x56\x72\xdb\x12\x5a\x39\xc0\x58\xc8\xda\x12\x55\xf0\x66\xe4\x1d\x2c\x7b\xd6\xf5\x14\xce\xec\xfc\x20\x2d\x89\x00\x15\x3b\x6f\x79\xdb\xfb\x77\x66\xbd\xd0\xb1\x7b\x27\x30\x1a\x52\x63\x12\x15\x48\x8a\x09\xce\xa2\x22\x29\xa6\x22\xc0\x5d\x52\x5e\x66\xeb\x12\x77\x51\x9e\x47\x69\x99\xc4\x05\xb2\x1c\xcb\x2c\x5d\x25\x65\x92\xa5\x05\xb2\x73\x44\xe9\x06\x57\x49\xba\x9a\x82\xd8\x37\x64\x41\x8f\x9d\x1d\xf9\x8d\x05\x8f\x36\x52\x35\x7a\x56\x10\xbd\x03\xd8\x99\x27\x20\xd7\x91\xe2\x1d\x2b\xb4\x52\xd7\xbd\xac\x09\xb5\xf9\x43\x56\xb3\xae\xd1\x91\xdd\xb3\x1b\x3f\xd3\x41\xea\x4a\x04\x68\x79\xcf\x5e\xfa\x63\xe6\xbf\xa5\xe6\x42\x44\xf9\xc5\x48\x1f\x27\x37\xd1\x45\x2c\xce\xf3\xec\x06\x1f\xfe\xc5\x62\x99\x67\x45\x71\x7f\xb6\x4e\xae\x57\xf7\xcb\xec\x76\x83\x07\xda\xf7\xb3\xef\xf1\xcd\x3a\xca\x97\x97\x33\x37\x8e\x56\x08\x7b\x67\xc3\x2d\xeb\x50\x88\x7c\x9d\x42\xb5\x24\xf5\x8c\xb5\xf3\xb2\x6d\xe1\xfc\xb8\x9c\x10\xd1\x6a\x05\x65\xb4\xeb\xf7\x64\x11\xbe\xdc\xde\xa6\x67\xaa\xeb\x5f\x2b\x63\x20\xe2\x9f\xb7\x59\x11\xe3\x74\x71\xba\x10\x71\x5a\xe6\x9b\xdb\x2c\x49\x4b\xfc\x9a\xbc\xf6\x4f\x7e\x8b\xbf\x01\x00\x00\xff\xff\x1c\xcd\x8d\x79\x0f\x03\x00\x00") + +func testImagesResourceConsumerDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerDockerfile, + "test/images/resource-consumer/Dockerfile", + ) +} + +func testImagesResourceConsumerDockerfile() (*asset, error) { + bytes, err := testImagesResourceConsumerDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x5f\x4f\xdb\x4a\x10\xc5\x9f\xef\x7e\x8a\xa3\x98\x87\x44\x0a\x0e\x17\x5d\x71\x25\x2a\x54\xb9\x49\x1a\x2c\xa8\x5d\xd9\x01\xc4\x13\xda\xd8\x13\x7b\x24\x7b\x77\xbb\xbb\xae\x93\x6f\x5f\x6d\x00\x09\x54\x3f\xcd\x9f\x33\x33\x3f\x9f\x8d\xb0\xd4\xe6\x68\xb9\x69\x3d\x2e\x2f\xfe\xbd\xc2\xb6\x25\xdc\x0d\x3b\xb2\x8a\x3c\x39\x24\x83\x6f\xb5\x75\xb1\x88\x44\x84\x7b\xae\x48\x39\xaa\x31\xa8\x9a\x2c\x7c\x4b\x48\x8c\xac\x5a\x7a\xef\xcc\xf1\x48\xd6\xb1\x56\xb8\x8c\x2f\x30\x0d\x82\xc9\x5b\x6b\x32\xfb\x22\x22\x1c\xf5\x80\x5e\x1e\xa1\xb4\xc7\xe0\x08\xbe\x65\x87\x3d\x77\x04\x3a\x54\x64\x3c\x58\xa1\xd2\xbd\xe9\x58\xaa\x8a\x30\xb2\x6f\x4f\x67\xde\x96\xc4\x22\xc2\xf3\xdb\x0a\xbd\xf3\x92\x15\x24\x2a\x6d\x8e\xd0\xfb\x8f\x3a\x48\x7f\x02\x0e\x5f\xeb\xbd\xb9\x5e\x2c\xc6\x71\x8c\xe5\x09\x36\xd6\xb6\x59\x74\xaf\x42\xb7\xb8\x4f\x97\xeb\xac\x5c\x9f\x5f\xc6\x17\xa7\x91\x07\xd5\x91\x73\xb0\xf4\x6b\x60\x4b\x35\x76\x47\x48\x63\x3a\xae\xe4\xae\x23\x74\x72\x84\xb6\x90\x8d\x25\xaa\xe1\x75\xe0\x1d\x2d\x7b\x56\xcd\x1c\x4e\xef\xfd\x28\x2d\x89\x08\x35\x3b\x6f\x79\x37\xf8\x4f\x66\xbd\xd3\xb1\xfb\x24\xd0\x0a\x52\x61\x92\x94\x48\xcb\x09\xbe\x25\x65\x5a\xce\x45\x84\xa7\x74\x7b\x9b\x3f\x6c\xf1\x94\x14\x45\x92\x6d\xd3\x75\x89\xbc\xc0\x32\xcf\x56\xe9\x36\xcd\xb3\x12\xf9\x77\x24\xd9\x33\xee\xd2\x6c\x35\x07\xb1\x6f\xc9\x82\x0e\xc6\x06\x7e\x6d\xc1\xc1\x46\xaa\x83\x67\x25\xd1\x27\x80\xbd\x7e\x05\x72\x86\x2a\xde\x73\x85\x4e\xaa\x66\x90\x0d\xa1\xd1\xbf\xc9\x2a\x56\x0d\x0c\xd9\x9e\x5d\x78\x4c\x07\xa9\x6a\x11\xa1\xe3\x9e\xbd\xf4\xa7\xca\x5f\x3f\x15\x0b\x51\x16\xcb\x12\x37\xa8\xb4\x72\x43\x4f\xf6\x3d\x38\xaf\xcc\xb0\xf8\x10\x8b\xbc\xc4\xd7\x1b\x74\xac\x86\x83\x48\x8a\xe5\x6d\xc8\x64\x5f\x5f\xfd\x27\xb6\x49\xb1\x59\x6f\x43\x7e\x36\x5d\x3e\x14\xab\xb4\x98\x89\x4d\x9e\x14\x3f\x42\xe9\x7f\xb1\xc9\xef\x93\x6c\xf3\xf2\xb8\x2e\xca\x34\xcf\x4e\x4b\xa4\x27\xe7\xc3\xe5\x97\x55\x5a\x20\xcc\x29\xed\x6b\xb6\x38\x9b\xba\x96\xba\x0e\x66\xac\x67\x33\x41\x07\xa3\xad\x17\x62\xc7\xea\x5a\xfc\x13\xc7\x0b\xee\x65\x43\xe7\x83\xe7\x2e\x76\x2d\x76\xac\x70\x36\x0d\xfc\x33\x21\xe2\x9f\xb7\x79\xf6\x7c\x1d\x8a\xe2\x4f\x00\x00\x00\xff\xff\xe6\x5b\xa6\xf0\x1f\x03\x00\x00") + +func testImagesResourceConsumerMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerMakefile, + "test/images/resource-consumer/Makefile", + ) +} + +func testImagesResourceConsumerMakefile() (*asset, error) { + bytes, err := testImagesResourceConsumerMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe7\x02\x04\x00\x00\xff\xff\x18\x62\xd2\x2b\x04\x00\x00\x00") + +func testImagesResourceConsumerVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerVersion, + "test/images/resource-consumer/VERSION", + ) +} + +func testImagesResourceConsumerVersion() (*asset, error) { + bytes, err := testImagesResourceConsumerVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerCommonCommonGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x94\x41\x73\xdb\x36\x10\x85\xcf\xc4\xaf\xd8\xc1\x29\xc9\xd8\xa4\xeb\x43\x0f\xed\xf8\x40\xcb\x76\xca\x49\x44\xb9\xa6\xdc\x4c\x8e\x10\xb8\x22\x31\x26\x00\x06\x58\x84\x51\x7e\x7d\x07\x14\x65\x49\x96\xcc\x9b\xf4\xbe\xf7\x76\xdf\x52\xa3\xec\x13\x9b\xd9\x7e\xe3\x54\xd3\x12\x5c\x5f\xfd\xf1\x27\x2c\x5b\x84\x2f\x61\x85\xce\x20\xa1\x87\x3c\x50\x6b\x9d\x4f\x19\xfb\xaa\x24\x1a\x8f\x35\x04\x53\xa3\x03\x6a\x11\xf2\x5e\xc8\x16\x61\x52\x2e\xe0\x3f\x74\x5e\x59\x03\xd7\xe9\x15\x7c\x88\x00\x9f\x24\xfe\xf1\x6f\xb6\xb1\x01\xb4\xd8\x80\xb1\x04\xc1\x23\x50\xab\x3c\xac\x55\x87\x80\xbf\x24\xf6\x04\xca\x80\xb4\xba\xef\x94\x30\x12\x61\x50\xd4\x8e\x43\xa6\x88\x94\x7d\x9f\x02\xec\x8a\x84\x32\x20\x40\xda\x7e\x03\x76\x7d\x48\x81\x20\xc6\x00\x00\x5a\xa2\xfe\xaf\x2c\x1b\x86\x21\x15\xe3\x96\xa9\x75\x4d\xd6\x6d\x29\x9f\x7d\x2d\x66\xf7\x65\x75\x7f\x79\x9d\x5e\x31\xf6\x6c\x3a\xf4\x1e\x1c\xfe\x08\xca\x61\x0d\xab\x0d\x88\xbe\xef\x94\x14\xab\x0e\xa1\x13\x03\x58\x07\xa2\x71\x88\x35\x90\x8d\x7b\x0e\x4e\x91\x32\xcd\x05\x78\xbb\xa6\x41\x38\x64\xb5\xf2\xe4\xd4\x2a\xd0\xd1\x81\x76\x5b\x29\x0f\x87\x80\x35\x20\x0c\xf0\xbc\x82\xa2\xe2\x70\x9b\x57\x45\x75\xc1\xbe\x15\xcb\x7f\x16\xcf\x4b\xf8\x96\x3f\x3d\xe5\xe5\xb2\xb8\xaf\x60\xf1\x04\xb3\x45\x79\x57\x2c\x8b\x45\x59\xc1\xe2\x01\xf2\xf2\x3b\x7c\x29\xca\xbb\x0b\x40\x45\x2d\x3a\xc0\x5f\xbd\x8b\xbb\x5b\x07\x2a\x9e\x0e\xeb\x94\x55\x88\x47\xc3\xd7\x76\xbb\x8c\xef\x51\xaa\xb5\x92\xd0\x09\xd3\x04\xd1\x20\x34\xf6\x27\x3a\xa3\x4c\x03\x3d\x3a\xad\x7c\x7c\x79\x1e\x84\xa9\x59\xa7\xb4\x22\x41\xe3\xe7\x93\x3a\x29\xfb\x94\x31\xd6\x0b\xf9\x12\x43\xa4\xd5\xda\x1a\xc6\xb2\x0c\x66\xd6\x78\x12\x86\xe2\x2d\x3b\x41\xdb\x73\x3d\x3a\xab\x91\x5a\x0c\x1e\x34\x92\x53\xd2\xa7\x4c\x46\x10\x3e\xb0\x24\x3a\x82\xc6\xd9\xe3\x73\x5e\xd7\x63\x93\xed\x73\x03\x3c\xdb\x6b\xfc\x15\x9c\xa3\x7e\x17\x9c\xa3\xe6\x2c\xb9\x0d\xba\x9f\x8f\x73\x4e\xc1\xbd\xc6\x59\xf2\x19\x69\x16\x9c\x43\x43\x15\x09\x0a\x7e\x87\x47\xf0\xad\xc6\x59\xb2\xf5\xf9\xe3\xd0\x29\x77\xea\xc5\x19\x4b\xe6\xaa\xeb\x94\xb4\x0e\xfd\xbf\x01\xdd\x06\x8e\x9e\x1b\xe0\xfa\x55\x1f\x33\x1b\xb1\xda\xd0\x59\x76\x84\x77\xfa\xeb\xfc\x52\x68\x7c\x27\x78\xd7\xeb\x0e\x3b\x12\xe7\x02\x27\xb0\x8e\x7a\xe4\x82\x1b\x5f\x70\x85\xf2\x94\x8e\xdc\x5e\xe7\x2c\x79\xc2\x1f\x01\x3d\x55\xea\x37\x16\xe6\x6d\xc9\x1b\xe0\x6e\xaf\xcf\x0f\x2b\x1e\xfb\xde\xf4\x7d\xe3\x3b\x68\x7b\x60\x9b\x05\x4f\x56\x6f\xeb\x9f\x1d\xb7\x3f\xfe\xad\xa8\x27\xe3\x99\xde\xb7\xa2\x86\xc9\x96\x42\x69\x09\x04\x3c\x2e\xaa\xe5\xee\x3b\xce\x92\x67\xf3\x62\xec\x60\x1e\x82\x91\xb1\xf8\xb1\x3d\x6c\x45\x58\x4f\x2a\x67\x49\x61\xa4\x75\x0e\x25\xed\x1c\xb9\x6b\x82\x46\x43\x91\x57\x3b\xf1\xd5\x01\x62\x92\x39\x4b\x4a\x4b\x9f\xd5\x4f\x34\x27\xce\x68\x8d\xff\x90\x4d\x54\xcf\x59\x59\xf2\xe0\x84\xc6\xc1\xba\x97\xf8\x63\x88\x7c\x6b\x9d\xfa\x6d\x0d\x89\xee\xb2\xb7\xf5\xa5\x08\x64\xbd\x14\x9d\x32\x0d\x67\x1f\xd9\xff\x01\x00\x00\xff\xff\xe1\xe8\xc2\x46\xe3\x05\x00\x00") + +func testImagesResourceConsumerCommonCommonGoBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerCommonCommonGo, + "test/images/resource-consumer/common/common.go", + ) +} + +func testImagesResourceConsumerCommonCommonGo() (*asset, error) { + bytes, err := testImagesResourceConsumerCommonCommonGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/common/common.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerConsumeCpuConsume_cpuGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x7c\x52\x5d\x6f\xa3\x46\x14\x7d\x66\x7e\xc5\x11\x4f\x90\x78\xc1\x89\xda\x4a\xdd\x24\x0f\x6e\x92\xb6\xd6\x6e\x9d\x28\x38\x5d\xed\xe3\x78\xb8\xc0\x68\x61\x86\x9d\xb9\xc4\xb1\xaa\xfc\xf7\x6a\xc0\x49\xec\x56\x2d\x2f\xc0\xb9\x5f\xe7\xdc\x73\xf3\x13\x71\x6d\xfb\x9d\xd3\x75\xc3\x38\x9f\x9f\xfd\x88\x75\x43\xf8\x34\x6c\xc8\x19\x62\xf2\x58\x0c\xdc\x58\xe7\x33\x21\x3e\x6b\x45\xc6\x53\x89\xc1\x94\xe4\xc0\x0d\x61\xd1\x4b\xd5\x10\xf6\x91\x19\xfe\x24\xe7\xb5\x35\x38\xcf\xe6\x48\x42\x42\xbc\x0f\xc5\xe9\x85\xd8\xd9\x01\x9d\xdc\xc1\x58\xc6\xe0\x09\xdc\x68\x8f\x4a\xb7\x04\x7a\x56\xd4\x33\xb4\x81\xb2\x5d\xdf\x6a\x69\x14\x61\xab\xb9\x19\x87\xec\x5b\x64\xe2\xeb\xbe\x81\xdd\xb0\xd4\x06\x12\xca\xf6\x3b\xd8\xea\x30\x0b\x92\x85\x00\x80\x86\xb9\xff\x98\xe7\xdb\xed\x36\x93\x23\xcb\xcc\xba\x3a\x6f\xa7\x2c\x9f\x7f\x5e\x5e\xdf\xae\x8a\xdb\x0f\xe7\xd9\x5c\x88\x47\xd3\x92\xf7\x70\xf4\x7d\xd0\x8e\x4a\x6c\x76\x90\x7d\xdf\x6a\x25\x37\x2d\xa1\x95\x5b\x58\x07\x59\x3b\xa2\x12\x6c\x03\xcf\xad\xd3\xac\x4d\x3d\x83\xb7\x15\x6f\xa5\x23\x51\x6a\xcf\x4e\x6f\x06\x3e\x5a\xd0\x2b\x2b\xed\x71\x98\x60\x0d\xa4\x41\xbc\x28\xb0\x2c\x62\xfc\xb2\x28\x96\xc5\x4c\x7c\x59\xae\x7f\xbf\x7b\x5c\xe3\xcb\xe2\xe1\x61\xb1\x5a\x2f\x6f\x0b\xdc\x3d\xe0\xfa\x6e\x75\xb3\x5c\x2f\xef\x56\x05\xee\x7e\xc5\x62\xf5\x15\x9f\x96\xab\x9b\x19\x48\x73\x43\x0e\xf4\xdc\xbb\xc0\xdd\x3a\xe8\xb0\x3a\x2a\x33\x51\x10\x1d\x0d\xaf\xec\x44\xc6\xf7\xa4\x74\xa5\x15\x5a\x69\xea\x41\xd6\x84\xda\x3e\x91\x33\xda\xd4\xe8\xc9\x75\xda\x07\xf3\x3c\xa4\x29\x45\xab\x3b\xcd\x92\xc7\xff\x7f\xc9\xc9\xc4\x49\x2e\x44\x2f\xd5\xb7\xd0\xa4\x93\xda\x08\xa1\xbb\xde\x3a\x46\x22\xa2\xb8\x6a\x65\x1d\x8b\x28\xee\x24\x37\xe1\xcd\xba\xa3\x58\x88\x28\xde\x68\xde\x0c\xea\x1b\xf1\xe8\xc5\x86\x1c\xeb\x6e\xf0\x3f\xe7\x7e\xe7\x99\x3a\xcf\x92\x63\x91\x0a\xa1\xac\xf1\x0c\xdf\x12\xf5\xb8\x42\xa8\xce\x6e\x06\x37\x92\x49\xce\xe6\x29\x4e\x26\xec\x0f\xdd\xb6\xda\x93\xb2\xa6\x14\xa2\x1a\x8c\x42\x69\x0b\xdb\x11\x37\xda\xd4\x49\x8a\xbf\x44\x14\x94\x6b\x7c\xbc\xc2\xd9\x05\x34\x2e\x71\x36\x9f\x9e\x0b\xe8\xd3\xd3\x90\x10\x3d\x87\x68\xd5\x5a\xc9\x3f\xfd\x90\xcc\xd3\x11\x39\xbd\x42\xa0\x9e\x15\xdf\x1d\x8f\xd8\x8b\x78\x11\xe2\x49\xba\xa0\xae\x0b\x53\x95\x75\xe4\x81\x50\x29\xeb\x6c\x69\x38\x89\xdf\xf1\x78\x86\xf9\x0c\x07\x00\xcc\xd0\x6d\xc8\xc5\xa9\x88\xca\xbd\x8e\x82\xd4\x51\xf5\x2b\xfe\xc1\x93\xda\xd7\xbf\x42\xa3\xd8\x70\x73\x93\x54\x1f\xa7\x61\x47\xa3\xde\xb0\xf9\xbd\xd0\xd0\xe9\x5e\x3a\x4f\x49\x2a\xa2\x3c\x87\xb2\xe6\x89\x1c\xe3\x80\x05\xdb\xe0\xb2\x22\xc3\xb2\xa6\x43\x21\xf7\x8a\x0f\xb7\x70\xf2\x1e\x49\x91\xbf\xc1\x67\xf3\x03\xfe\x21\xff\xd8\x98\x93\x03\x69\x6f\x16\x15\x93\x3b\x91\x67\xe9\xf8\xad\x66\x65\xb7\x81\x65\xa5\x9d\x1f\xc1\x77\xfb\xb3\xdf\x88\xef\x9d\x55\xd7\xf7\x8f\x85\xec\xfa\x76\x54\x33\x9e\xef\xd8\x4d\x1b\x45\xc9\xd8\x2b\xc5\x25\xde\xb8\x04\x1f\x55\x3f\xfc\x67\xab\xc5\x13\x39\x59\x53\x32\x0e\x9c\xfd\xff\xb8\x7f\x86\x1f\xfb\x30\x3a\x49\xb3\xe9\x23\x1c\x88\xae\xa0\xfa\x21\x5b\x5b\x96\x6d\x58\xdd\x25\x8e\x57\x19\xe8\x44\x47\xa7\x28\xa2\xe8\x05\xd4\x7a\x9a\x62\x93\x98\x70\xde\xc9\x78\xe4\x63\x7c\xba\xb2\xbf\x03\x00\x00\xff\xff\xa6\x15\x1f\xf2\x8f\x05\x00\x00") + +func testImagesResourceConsumerConsumeCpuConsume_cpuGoBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerConsumeCpuConsume_cpuGo, + "test/images/resource-consumer/consume-cpu/consume_cpu.go", + ) +} + +func testImagesResourceConsumerConsumeCpuConsume_cpuGo() (*asset, error) { + bytes, err := testImagesResourceConsumerConsumeCpuConsume_cpuGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/consume-cpu/consume_cpu.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerResource_consumerGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x91\x51\x6b\xdb\x4a\x10\x85\x9f\xb3\xbf\xe2\x20\xb8\x20\x05\x5d\xd9\x37\x70\x21\xa4\xe4\x41\x75\x12\x22\x12\xec\x60\x39\x0d\x79\x5c\x4b\x23\x69\xa9\xb4\xbb\xdd\x1d\x45\x31\xa5\xff\xbd\xac\xe2\x42\x42\xdb\xa7\x65\x74\xce\xcc\xf9\x34\xb3\x38\x15\x2b\x63\x0f\x4e\xb5\x1d\xe3\x6c\xf9\xdf\xff\xd8\x75\x84\xbb\x71\x4f\x4e\x13\x93\x47\x3e\x72\x67\x9c\xcf\x84\xb8\x57\x15\x69\x4f\x35\x46\x5d\x93\x03\x77\x84\xdc\xca\xaa\x23\x1c\x95\x14\x5f\xc8\x79\x65\x34\xce\xb2\x25\xe2\x60\x88\x8e\x52\x94\x7c\x12\x07\x33\x62\x90\x07\x68\xc3\x18\x3d\x81\x3b\xe5\xd1\xa8\x9e\x40\xaf\x15\x59\x86\xd2\xa8\xcc\x60\x7b\x25\x75\x45\x98\x14\x77\x73\xc8\x71\x44\x26\x9e\x8f\x03\xcc\x9e\xa5\xd2\x90\xa8\x8c\x3d\xc0\x34\xef\x5d\x90\x2c\x04\x00\x74\xcc\xf6\x62\xb1\x98\xa6\x29\x93\x33\x65\x66\x5c\xbb\xe8\xdf\x5c\x7e\x71\x5f\xac\xae\xd7\xe5\xf5\xbf\x67\xd9\x52\x88\x47\xdd\x93\xf7\x70\xf4\x6d\x54\x8e\x6a\xec\x0f\x90\xd6\xf6\xaa\x92\xfb\x9e\xd0\xcb\x09\xc6\x41\xb6\x8e\xa8\x06\x9b\xc0\x39\x39\xc5\x4a\xb7\x29\xbc\x69\x78\x92\x8e\x44\xad\x3c\x3b\xb5\x1f\xf9\xc3\x82\x7e\x51\x29\x8f\xf7\x06\xa3\x21\x35\xa2\xbc\x44\x51\x46\xf8\x9c\x97\x45\x99\x8a\xa7\x62\x77\xbb\x79\xdc\xe1\x29\xdf\x6e\xf3\xf5\xae\xb8\x2e\xb1\xd9\x62\xb5\x59\x5f\x15\xbb\x62\xb3\x2e\xb1\xb9\x41\xbe\x7e\xc6\x5d\xb1\xbe\x4a\x41\x8a\x3b\x72\xa0\x57\xeb\x02\xbb\x71\x50\x61\x75\x54\x67\xa2\x24\xfa\x10\xde\x98\x37\x18\x6f\xa9\x52\x8d\xaa\xd0\x4b\xdd\x8e\xb2\x25\xb4\xe6\x85\x9c\x56\xba\x85\x25\x37\x28\x1f\x8e\xe7\x21\x75\x2d\x7a\x35\x28\x96\x3c\xd7\xbf\xfd\x4e\x26\x4e\x17\x42\x58\x59\x7d\x0d\x43\x06\xa9\xb4\x10\x6a\xb0\xc6\x31\x62\x71\x12\x35\xbd\x6c\xa3\xf0\x0e\x1c\x9e\xde\xcc\x95\x26\x5e\x84\xa3\x44\x22\x11\xe2\x45\x3a\xcc\xfe\x4b\x04\x77\x56\x68\x8e\xa3\xf0\x21\x4a\x71\xbe\x3c\x5f\xa6\x88\x1e\x82\xac\xc7\x61\x4f\x2e\x8b\x12\x21\x9a\x51\x57\x73\x56\x9c\xe0\xbb\x38\x99\xdb\x1e\xa4\xf3\x14\x27\xe2\xc4\x91\x37\xa3\xab\x68\x65\xb4\x1f\x07\x72\xb7\x52\xd7\x3d\x39\x5c\x5c\x62\x4d\xd3\xf6\xcf\x6a\x68\xec\x4d\x9b\xdd\x48\x96\x7d\x1c\xd8\xb2\x7b\xe5\x99\x74\xae\xeb\x92\xdc\x0b\xc5\xcd\xc0\x59\x69\x9d\xd2\xdc\xc4\xd1\xc5\x3f\x75\x94\xe2\x34\x50\x26\x29\xfe\x92\x98\x24\xe2\x87\xf8\x19\x00\x00\xff\xff\x8b\x9d\x03\xcd\x55\x03\x00\x00") + +func testImagesResourceConsumerResource_consumerGoBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerResource_consumerGo, + "test/images/resource-consumer/resource_consumer.go", + ) +} + +func testImagesResourceConsumerResource_consumerGo() (*asset, error) { + bytes, err := testImagesResourceConsumerResource_consumerGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/resource_consumer.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerResource_consumer_handlerGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x58\x6f\x6f\xdb\xbe\x11\x7e\x6d\x7e\x8a\xab\x86\xfc\x60\x65\xaa\xd4\x5f\xd1\x15\x43\x0a\xbf\x70\xd3\xa4\x31\x9a\x38\x5e\xec\x34\x28\xba\x62\xa0\xa5\x93\x4c\x58\x22\x55\x92\x8a\xeb\xa5\xf9\xee\x03\x29\xd9\x96\xff\xc8\xf9\xb3\xa2\x5b\x5f\xd4\x96\x79\xba\xbb\xe7\xe1\x3d\x77\x64\x82\x43\x72\x2c\xf2\xb9\x64\xc9\x44\xc3\xeb\x57\x7f\xfe\x0d\x46\x13\x84\x4f\xc5\x18\x25\x47\x8d\x0a\xba\x85\x9e\x08\xa9\x7c\x42\xce\x59\x88\x5c\x61\x04\x05\x8f\x50\x82\x9e\x20\x74\x73\x1a\x4e\x10\xaa\x15\x0f\x3e\xa3\x54\x4c\x70\x78\xed\xbf\x82\xb6\x31\x70\xaa\x25\xc7\x7d\x47\xe6\xa2\x80\x8c\xce\x81\x0b\x0d\x85\x42\xd0\x13\xa6\x20\x66\x29\x02\xfe\x08\x31\xd7\xc0\x38\x84\x22\xcb\x53\x46\x79\x88\x30\x63\x7a\x62\x83\x54\x2e\x7c\xf2\xa5\x72\x20\xc6\x9a\x32\x0e\x14\x42\x91\xcf\x41\xc4\x75\x2b\xa0\x9a\x10\x00\x80\x89\xd6\xf9\x51\x10\xcc\x66\x33\x9f\xda\x2c\x7d\x21\x93\x20\x2d\xad\x54\x70\xde\x3b\x3e\xe9\x0f\x4f\x5e\xbe\xf6\x5f\x11\x72\xcd\x53\x54\x0a\x24\x7e\x2f\x98\xc4\x08\xc6\x73\xa0\x79\x9e\xb2\x90\x8e\x53\x84\x94\xce\x40\x48\xa0\x89\x44\x8c\x40\x0b\x93\xe7\x4c\x32\xcd\x78\xe2\x81\x12\xb1\x9e\x51\x89\x24\x62\x4a\x4b\x36\x2e\xf4\x1a\x41\x8b\xac\x98\x82\xba\x81\xe0\x40\x39\x38\xdd\x21\xf4\x86\x0e\xbc\xef\x0e\x7b\x43\x8f\xdc\xf4\x46\x67\x97\xd7\x23\xb8\xe9\x5e\x5d\x75\xfb\xa3\xde\xc9\x10\x2e\xaf\xe0\xf8\xb2\xff\xa1\x37\xea\x5d\xf6\x87\x70\x79\x0a\xdd\xfe\x17\xf8\xd4\xeb\x7f\xf0\x00\x99\x9e\xa0\x04\xfc\x91\x4b\x93\xbb\x90\xc0\x0c\x75\x18\xf9\x64\x88\xb8\x16\x3c\x16\x65\x32\x2a\xc7\x90\xc5\x2c\x84\x94\xf2\xa4\xa0\x09\x42\x22\x6e\x51\x72\xc6\x13\xc8\x51\x66\x4c\x99\xcd\x53\x40\x79\x44\x52\x96\x31\x4d\xb5\x7d\xde\x82\xe3\x93\xc3\x80\x90\x9c\x86\x53\xe3\x24\xa3\x8c\x13\xc2\xb2\x5c\x48\x0d\x6d\xd2\x72\xe2\x4c\x3b\xa4\xe5\x70\xd4\x81\xd9\x85\xc5\xf7\x42\xa6\xe6\xab\xd2\x32\x14\xfc\xd6\x7e\x9d\xf3\xd0\x7c\x6a\x96\xa1\x43\x48\xcb\x99\xfe\x5d\xf9\x4c\x04\xd3\x65\xf9\x05\x1a\x95\x0e\x58\x46\x13\x54\x81\x44\x25\x0a\x19\xe2\xcb\x50\x70\x55\x64\x28\x83\x50\x64\x99\xe0\x0e\x71\x09\x09\x02\xb8\xaa\xd6\x8f\xab\xe5\x33\xca\xa3\x14\x25\x4c\x44\x1a\x29\xc8\x50\x4b\x16\x2a\xcb\x06\x85\x85\x2f\x58\xf8\xf2\x89\x9e\xe7\xd8\xe8\x43\x69\x59\x84\x1a\xee\x48\x6b\xe1\xc7\xfc\xcb\x68\xfe\xd5\xec\x2a\x4f\xbe\xc5\xa9\xa0\xfa\xed\x9b\xe5\xfa\xb9\x08\xa7\x60\x00\xfa\x17\x85\xc6\x1f\xe4\xde\xa6\xd8\xc7\x59\x53\x84\x50\x22\x35\x82\xa3\x3c\x02\xc6\x99\x66\x34\x65\xff\x36\xcf\x8d\x39\x69\x01\x11\xc6\xb4\x48\xb5\xf2\x49\x5c\xf0\x70\x8f\xfb\xb6\x0b\x87\x4d\x7e\xee\x48\x4b\xa2\x2e\x24\x87\x3f\x1a\x4c\xee\x2a\x50\x47\x3b\x10\xdf\xdd\xdf\x1b\x70\x36\x7e\x7b\x52\xb9\x6c\x8a\xe5\xc2\x10\xe5\x2d\x9e\x8d\x46\x83\xf6\xcc\x6a\xd4\xbf\x42\x95\x0b\xae\xf0\x46\x32\x8d\xd2\x33\x2a\x84\xc3\x6a\xe5\x7b\x81\x4a\xbb\x26\xc1\x20\x80\xd2\xb7\xa9\x78\xa1\x4c\xc9\x2e\x36\x82\x71\x18\x48\x91\xa1\x9e\x60\x61\xb7\x37\xa3\x1a\xda\x63\xa1\x27\xf0\xf1\x64\x04\x7f\xc0\xe0\x72\x38\x72\x49\x8b\xc5\xc6\xb7\x7f\x7d\x75\xee\x0f\xa8\x9e\x40\xa7\x03\x65\xfd\xf8\x17\xa5\xa7\x6e\x14\x59\x2d\xdd\x91\x56\xab\x02\xe2\x97\x9f\x95\x41\x7b\xe6\x92\x56\xc5\x15\x69\xdd\x2f\x5d\x5e\xa0\x9e\x88\x08\x5e\x74\xc0\x31\xb1\x9c\xd2\x83\x81\x70\x22\xa5\x90\xed\x99\xb7\x88\xf4\x9e\x46\x15\x2a\xaf\x44\x3f\xd4\x54\x17\x6a\xf5\xf3\x46\x80\x20\x80\x9c\x4a\x0b\xd7\x78\xb6\x2d\x0a\x95\x86\x88\x6a\x6a\x2b\xe5\xfa\xea\xdc\x3e\xd8\x5c\x50\x4a\x38\xea\xd8\x94\x06\x54\x2a\x3c\x15\x32\x6b\xbb\xef\xec\xef\x2f\x3a\xc0\x59\xba\x23\x33\x94\xb2\x7a\x70\x1f\x9d\x53\xb5\x15\x95\x76\x8e\x07\xd7\xfb\xd8\x3d\x5e\x5a\x35\x13\xbc\xb2\x31\x29\x19\x47\x26\xf7\x87\x02\x5f\x60\xf6\x88\xc0\x17\x98\x3d\x18\xf8\x02\xb3\x47\x05\x4e\x50\x1f\x17\x52\x22\xd7\x25\x49\xfb\xc2\x7f\xdc\xb0\x6d\x4e\x62\xd3\x72\xab\xce\x56\x09\x8c\x8b\x2c\x2f\xab\x71\x5f\xe8\xf7\x4b\xab\xe6\xa0\x2b\x9b\x3d\xc8\xd7\x4b\x25\xce\xb4\x3f\xcc\x25\xe3\x3a\x6e\x3b\x07\xea\x08\x0e\x94\xb3\x2c\xed\x6b\x3e\xe5\x62\xc6\x4f\x0b\x1e\x9a\xb1\xe1\xad\xe5\xb6\x5e\x5a\x7d\xa1\x4f\x45\xc1\x23\xf7\x29\x8d\x63\xbb\x50\x76\xf7\x8f\xef\x05\xca\x39\x14\x32\xf5\x3f\xd3\xb4\x40\xb5\x68\x1f\x09\x6a\x33\xb2\xa1\xec\x5e\xa5\x82\xcc\x2c\xa8\x17\x71\x54\x48\x3b\xf3\x86\x18\x0e\x4b\xb3\xa3\x4e\xe9\xd0\xec\x66\xbb\x42\xfa\x61\x65\xf5\x0f\xb3\xe6\x92\x56\xc6\xd2\x94\x85\x42\xa2\xda\xf3\xde\xc5\xd2\x68\xf1\x1a\x8b\x61\x3b\x64\xa7\x03\x8e\x03\x3f\x7f\xc2\x96\xd3\x72\xa5\xb1\xb9\xf4\x85\xfe\xc8\x6e\x71\xb9\x05\x5d\x99\x14\x19\xf2\xc7\xb5\x1a\xcb\x91\x19\xcc\x28\xab\xf6\xd2\x2e\x99\x52\xe5\x91\x47\x2b\x77\x1f\x5d\x5e\x1d\x88\x4d\xcc\x50\x50\xcd\x7a\xbf\xab\x05\x6b\x6f\x21\x5d\xe3\xcd\xab\xc1\xdd\xfd\xfe\x26\x1d\x5b\xfc\x95\xaf\x55\x8d\x6e\x8d\xbf\xb5\x95\x46\xfe\x7a\x3c\x14\x52\x62\xa8\x9f\x49\x60\x22\xa0\x56\x9e\x75\x68\xb5\x24\x5d\xd2\x32\x32\x3a\xb5\x32\x4a\x79\x2d\xfc\x56\x9f\xfc\xfa\xe7\xd1\xb7\x1d\xe6\x75\xc7\x8d\x95\xb5\xf9\xd2\xda\x56\x35\xd6\xf1\x73\xe5\x68\xdb\xe7\x2f\x95\xa3\x6d\xed\xcf\x97\x23\x26\x74\x3c\xd7\xfb\xd5\xb8\xb0\x79\xa4\x18\x37\x5c\xfe\x1f\x69\x71\x93\xab\xe7\x6a\x71\x81\xd0\x5b\x81\x6d\x50\xe2\x3a\x17\x0f\x0b\x71\xdd\xdd\xef\xd3\xa1\xa9\xcb\x1a\xac\xa7\xc8\x70\x75\x6a\x68\x92\xe1\xca\x6f\x53\x45\xfd\x26\x11\x6e\x1f\x1f\x76\x49\xd1\x0a\x6f\xcb\x74\x47\x96\xce\x0d\xb5\x77\xc2\x23\x7b\x53\x37\xb7\x4a\x34\xe4\x63\xf4\xc2\x59\xb3\xae\x71\xd6\x70\xd4\x29\x99\x7b\x32\x9e\xe5\x69\xbb\x11\xc6\xe2\x24\x53\xbb\x6b\xf9\xe6\x3f\x03\x27\xc2\xd8\xdc\xf9\x76\x58\x5c\xf3\xb4\xb2\x31\xe2\x99\x7a\x70\x6b\x4f\xcb\x94\x27\xb8\x69\x6f\x8b\x73\x05\x35\xb6\xbc\xfc\x05\xce\x4e\xce\x07\x70\x60\xae\x1c\xb1\x80\x0c\x95\xa2\x09\xfa\xff\xe4\x8e\x07\x53\x77\xe7\x0b\xa3\x2f\x83\x13\xf3\x42\x42\x8b\x04\x9b\x0d\x0f\x14\x1c\xc4\xe5\xb2\x07\xb7\xae\x29\xe3\x27\xb0\xb6\x3a\x13\xb6\xcb\xf4\xab\xa6\xea\x41\x84\xa9\x69\xab\xe5\x45\x6d\x55\x7f\x60\x2e\xdc\xcb\xca\x7b\x90\x51\x16\xc3\xbf\x3c\x10\x53\xc3\xd6\x86\xdd\xd7\xf2\xf3\xdb\x3b\xb3\x5c\x3f\x63\x6e\xac\xc3\x5f\x3b\x65\x32\xa4\x75\x0f\x98\x2a\xdc\x6b\xbc\xb2\xdd\x9d\xd8\x72\x23\x49\xcb\x22\x19\xa6\x88\xf9\xb2\xa7\x99\x9f\xf7\xc1\x69\x8a\xfa\x72\x19\x76\x6f\xcc\x27\x97\x73\xfd\xa0\xfd\x6b\x66\xe4\xa6\xdf\xc5\x1f\x1d\x1a\xe6\x9c\x59\xea\xd3\x0c\x17\x6d\xc9\xa2\xdc\x37\x50\xcd\xfa\xd2\xf8\xb9\x33\xf8\xa1\x71\x6a\x13\x5e\x3e\xd7\x73\xfa\xdf\x8e\xd6\xc0\xca\xa5\x9a\xb0\xdb\x4c\xff\xf7\x73\xd6\x42\xad\xb4\xb9\xf5\x56\x79\x6f\x37\x19\xb4\x6b\x94\x78\xf0\xf6\xcd\x83\x53\xb6\xe6\xf0\x37\x4c\xd8\x85\x46\xb6\x9a\x4f\x85\xcc\x5b\x6f\x32\x75\x26\xdc\xc3\x52\xb5\x18\x0a\x73\x07\x6c\x1a\xc4\x5b\x97\xd8\xc6\x41\x5c\x86\x6d\xac\xf7\xad\x31\x5c\xe6\xb7\xab\xda\x9f\x3b\xb1\xff\x13\x00\x00\xff\xff\x25\xcb\xc3\xb1\x47\x17\x00\x00") + +func testImagesResourceConsumerResource_consumer_handlerGoBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerResource_consumer_handlerGo, + "test/images/resource-consumer/resource_consumer_handler.go", + ) +} + +func testImagesResourceConsumerResource_consumer_handlerGo() (*asset, error) { + bytes, err := testImagesResourceConsumerResource_consumer_handlerGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/resource_consumer_handler.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesResourceConsumerUtilsGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x55\x5d\x8f\xda\x46\x14\x7d\x66\x7e\xc5\x91\xa5\x48\x90\x82\xbd\x8b\xd4\x97\xad\xf6\x81\x90\x6d\x8b\x92\x85\x68\xcd\x36\xca\xe3\x30\xbe\xd8\xa3\x7a\x66\xdc\xf9\x80\x45\x55\xfe\x7b\x35\xe6\xcb\xb0\xda\x2a\x79\x31\xc3\xdc\x73\xee\x3d\xf7\x9e\x6b\xc8\xde\xb3\xa9\x69\x76\x56\x96\x95\xc7\xf8\xe6\xf6\x57\x2c\x2b\xc2\xa7\xb0\x22\xab\xc9\x93\xc3\x24\xf8\xca\x58\x97\x32\xf6\x59\x0a\xd2\x8e\x0a\x04\x5d\x90\x85\xaf\x08\x93\x86\x8b\x8a\x70\x88\x0c\xf1\x17\x59\x27\x8d\xc6\x38\xbd\x41\x3f\x02\x92\x43\x28\x19\xfc\xc6\x76\x26\x40\xf1\x1d\xb4\xf1\x08\x8e\xe0\x2b\xe9\xb0\x96\x35\x81\x5e\x04\x35\x1e\x52\x43\x18\xd5\xd4\x92\x6b\x41\xd8\x4a\x5f\xb5\x45\x0e\x29\x52\xf6\xed\x90\xc0\xac\x3c\x97\x1a\x1c\xc2\x34\x3b\x98\x75\x17\x05\xee\x19\x03\x80\xca\xfb\xe6\x2e\xcb\xb6\xdb\x6d\xca\x5b\x95\xa9\xb1\x65\x56\xef\x51\x2e\xfb\x3c\x9b\x3e\xcc\xf3\x87\xd1\x38\xbd\x61\xec\x59\xd7\xe4\x1c\x2c\xfd\x13\xa4\xa5\x02\xab\x1d\x78\xd3\xd4\x52\xf0\x55\x4d\xa8\xf9\x16\xc6\x82\x97\x96\xa8\x80\x37\x51\xe7\xd6\x4a\x2f\x75\x39\x84\x33\x6b\xbf\xe5\x96\x58\x21\x9d\xb7\x72\x15\xfc\xc5\x80\x8e\xaa\xa4\x43\x17\x60\x34\xb8\x46\x32\xc9\x31\xcb\x13\x7c\x98\xe4\xb3\x7c\xc8\xbe\xce\x96\x7f\x2e\x9e\x97\xf8\x3a\x79\x7a\x9a\xcc\x97\xb3\x87\x1c\x8b\x27\x4c\x17\xf3\x8f\xb3\xe5\x6c\x31\xcf\xb1\xf8\x1d\x93\xf9\x37\x7c\x9a\xcd\x3f\x0e\x41\xd2\x57\x64\x41\x2f\x8d\x8d\xda\x8d\x85\x8c\xa3\xa3\x22\x65\x39\xd1\x45\xf1\xb5\xd9\x8b\x71\x0d\x09\xb9\x96\x02\x35\xd7\x65\xe0\x25\xa1\x34\x1b\xb2\x5a\xea\x12\x0d\x59\x25\x5d\x34\xcf\x81\xeb\x82\xd5\x52\x49\xcf\x7d\xfb\xfd\x55\x3b\x29\x7b\x9f\x31\xd6\x70\xf1\x77\x4c\xa2\xb8\xd4\x8c\x49\xd5\x18\xeb\xd1\x67\xbd\x64\xad\x7c\xc2\x7a\x49\x6d\xca\xf8\x61\x5c\x46\x2f\x24\xe2\xd1\x79\x2b\x8c\xde\x24\x6c\xc0\x98\x30\xda\xb5\xf0\x78\x08\x8a\xa6\x5f\x9e\x3f\x48\xcd\xed\x0e\xf7\x48\xd2\xec\x70\x3b\x12\x4d\xe8\x9e\x93\x13\xfe\x91\xd4\x19\xef\x7c\x1c\x42\x9b\x37\xcb\x30\x3d\x65\xc4\x01\xec\xc0\x51\xca\x0d\x69\xe8\xa0\x56\x64\xe3\xd2\x28\x59\xd7\x52\x18\x4b\xee\x7a\x40\x54\xa0\x08\xb6\x6d\x3e\x65\xeb\xa0\x45\x27\x63\xbf\x43\x93\xda\x0f\x4f\xc8\x9c\x44\xbc\x18\xe0\x5f\xd6\xab\x4d\x99\x7e\xb1\x52\xfb\x75\x3f\xe9\x88\x39\x53\xef\xf0\x6e\x73\x41\x8d\x17\xc9\xb0\x83\xb8\x88\x0e\x58\x2f\xcb\x20\x2c\xf1\xb8\x74\xd0\xb4\x3d\x36\x06\xd1\x04\x34\xd6\x08\x72\x8e\xf5\xb8\x2d\x6f\x71\x77\x8f\xb5\xf2\x69\xde\x1c\x04\x8c\xce\x49\xef\xdf\x15\x17\x45\x06\x2d\x65\xfc\x9a\x72\xac\x3d\x72\x24\xf6\xa4\x4b\x35\x67\xcf\x22\x37\xda\x9b\x4e\x8d\x52\x5c\x17\xfd\x6b\x3b\x87\x88\xaa\xda\xe7\xf8\x82\x99\x3e\x05\xdd\x1f\xb0\xef\x5d\xcb\x1e\x49\xfd\xaf\x65\x54\xf2\xd5\xce\xff\x84\x63\x8f\xa4\xfa\x67\xd6\xcf\x18\x16\xa5\x9c\x98\x6f\xfa\x75\x04\x5c\x0f\xe8\x14\xc8\xbd\x8d\x96\xdd\xdd\xe3\xb0\xfc\xe9\xcc\x1b\x7e\xd6\x34\xc0\x2f\x48\x1e\x13\xd6\xeb\xf0\xdf\xe0\xfc\xd8\x42\x28\x52\xc6\xee\xce\x3b\x71\x7e\x5d\xde\xb2\xea\xf4\x26\x0d\x91\x8c\x54\x32\x44\x72\x1b\x1f\xa3\xd1\x46\x8d\x5a\x8d\xdd\x46\xf7\xda\x8e\xe1\x8a\xeb\x32\x62\x6f\x5a\x82\xbf\xdc\x93\x3d\x74\xd0\x95\x70\xe1\xf9\x1f\xe4\xa7\xc1\x5a\xd2\x3e\xf7\xdc\x07\x87\x76\xfd\x1c\x4c\xf0\xe0\xd0\x66\x64\x9a\x83\x99\xd7\xc8\xfe\x2b\xd3\xae\x11\xc9\x7e\x42\xf1\xaf\x26\xfe\x2c\x92\x22\xed\xa9\x60\xdf\xd9\x7f\x01\x00\x00\xff\xff\x36\xd7\xfc\x69\xf0\x06\x00\x00") + +func testImagesResourceConsumerUtilsGoBytes() ([]byte, error) { + return bindataRead( + _testImagesResourceConsumerUtilsGo, + "test/images/resource-consumer/utils.go", + ) +} + +func testImagesResourceConsumerUtilsGo() (*asset, error) { + bytes, err := testImagesResourceConsumerUtilsGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/resource-consumer/utils.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleApiserverBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x8e\xd1\x0a\xc3\x20\x0c\x45\xdf\xfb\x31\xea\x66\x11\x53\xf0\x63\xc4\x3a\x10\x8c\x4a\xdc\x6c\x3f\x7f\xb8\x75\x30\xe6\x1e\xfa\x72\x03\xb9\xe7\x90\xc4\x90\x1e\x3b\xb7\xb8\xaa\xd9\xd8\x58\x42\xf2\x8b\x64\x7a\x3a\xd6\x84\xc6\x12\xca\x6b\x53\xfc\x5f\xd9\x9d\x9e\x4d\x8f\x75\x29\x4e\xcd\xd1\x9b\x63\x8e\x40\x95\x20\x76\xf3\xca\xef\x72\x0b\x69\xcd\x5b\x7d\xbf\xc4\x2f\x5a\x80\x41\x47\x0c\x83\xa3\x5c\xf3\xed\xce\x5c\x46\xfe\x81\x92\x4d\xb9\x7a\x6a\x9e\x96\x4e\xfe\xca\x20\xe4\x49\x19\x84\x1c\xe5\xb3\x97\x41\xc0\xf4\x0c\x00\x00\xff\xff\xb9\xda\xfe\xbd\x48\x01\x00\x00") + +func testImagesSampleApiserverBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleApiserverBaseimage, + "test/images/sample-apiserver/BASEIMAGE", + ) +} + +func testImagesSampleApiserverBaseimage() (*asset, error) { + bytes, err := testImagesSampleApiserverBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-apiserver/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleApiserverDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\x41\x4f\xdb\x4e\x10\xc5\xef\xfb\x29\x9e\xec\xff\xe1\x5f\x29\x38\x90\x4b\xab\xf6\xe4\x92\x40\x2d\xc0\x46\xb1\x29\x42\x55\x0f\x6b\x7b\x62\x8f\xe4\xec\x6e\x77\xd7\x98\x7c\xfb\x6a\x1d\xa0\xa5\xf8\x36\x33\xcf\xf3\x7e\x33\xb3\x31\xce\xb5\x39\x58\xee\x7a\x8f\xd5\xe9\xd9\x27\x54\x3d\xe1\x6a\xac\xc9\x2a\xf2\xe4\x90\x8e\xbe\xd7\xd6\x25\x22\x16\x31\xae\xb9\x21\xe5\xa8\xc5\xa8\x5a\xb2\xf0\x3d\x21\x35\xb2\xe9\xe9\xa5\xb2\xc0\x77\xb2\x8e\xb5\xc2\x2a\x39\xc5\xff\x41\x10\x3d\x97\xa2\x0f\x5f\x44\x8c\x83\x1e\xb1\x97\x07\x28\xed\x31\x3a\x82\xef\xd9\x61\xc7\x03\x81\x9e\x1a\x32\x1e\xac\xd0\xe8\xbd\x19\x58\xaa\x86\x30\xb1\xef\x67\x9b\xe7\x26\x89\x88\xf1\xf0\xdc\x42\xd7\x5e\xb2\x82\x44\xa3\xcd\x01\x7a\xf7\xb7\x0e\xd2\xcf\xc0\xe1\xeb\xbd\x37\x9f\x97\xcb\x69\x9a\x12\x39\xc3\x26\xda\x76\xcb\xe1\x28\x74\xcb\xeb\xec\x7c\x93\x97\x9b\x93\x55\x72\x3a\xff\x72\xa7\x06\x72\x0e\x96\x7e\x8d\x6c\xa9\x45\x7d\x80\x34\x66\xe0\x46\xd6\x03\x61\x90\x13\xb4\x85\xec\x2c\x51\x0b\xaf\x03\xef\x64\xd9\xb3\xea\x16\x70\x7a\xe7\x27\x69\x49\xc4\x68\xd9\x79\xcb\xf5\xe8\xdf\x2c\xeb\x85\x8e\xdd\x1b\x81\x56\x90\x0a\x51\x5a\x22\x2b\x23\x7c\x4d\xcb\xac\x5c\x88\x18\xf7\x59\xf5\xad\xb8\xab\x70\x9f\x6e\xb7\x69\x5e\x65\x9b\x12\xc5\x16\xe7\x45\xbe\xce\xaa\xac\xc8\x4b\x14\x17\x48\xf3\x07\x5c\x65\xf9\x7a\x01\x62\xdf\x93\x05\x3d\x19\x1b\xf8\xb5\x05\x87\x35\x52\x1b\x76\x56\x12\xbd\x01\xd8\xe9\x23\x90\x33\xd4\xf0\x8e\x1b\x0c\x52\x75\xa3\xec\x08\x9d\x7e\x24\xab\x58\x75\x30\x64\xf7\xec\xc2\x31\x1d\xa4\x6a\x45\x8c\x81\xf7\xec\xa5\x9f\x33\xef\x86\x4a\x84\x88\xe7\xc7\x43\x2b\x82\xec\x3a\x4b\x9d\xf4\xc1\x86\x9c\x9f\x07\x26\xc7\x9d\x3a\x2e\x6d\xce\xc9\x9a\x07\xf6\x87\x10\xdb\x51\xc1\xc9\xbd\x19\xe8\x44\x1a\x76\x64\x1f\xc9\x42\x06\xdb\xd7\x4e\xd4\xe2\x98\x0f\xe3\x38\x3a\xda\xcc\x7d\x94\xdc\x53\x8b\xa8\xec\xf5\x38\xb4\xa8\x09\xf3\xa1\xbc\x86\x1b\x8d\xd1\xd6\xcf\x90\x67\xc9\xd9\x47\x94\xb3\x05\xd2\xdb\x0c\xe5\xd1\x63\x74\x61\xd2\x20\x68\x46\x6b\x49\x79\xa4\xaf\xe4\x91\x10\xe9\xf6\x32\x9c\x63\x93\xdd\xa4\x97\x1b\x71\xb1\x2d\x6e\xf0\xdf\x9f\x38\x5d\xaf\xdf\x53\x2f\xff\xcd\x08\xb1\xc9\xab\xed\xc3\x6d\x91\xe5\x15\x7e\x44\xef\xea\xd1\x4f\xf1\x3b\x00\x00\xff\xff\x2d\x0a\xdc\x76\x84\x03\x00\x00") + +func testImagesSampleApiserverDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleApiserverDockerfile, + "test/images/sample-apiserver/Dockerfile", + ) +} + +func testImagesSampleApiserverDockerfile() (*asset, error) { + bytes, err := testImagesSampleApiserverDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-apiserver/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleApiserverDockerfile_windows = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x52\xd1\x6e\xdc\x36\x10\x7c\xe7\x57\x0c\x4e\x7e\x68\x01\x4b\x3a\x5f\x8a\x16\x48\x91\x07\xd5\xbe\xb8\x42\x12\xc9\x90\x94\x18\x87\xa2\x28\x78\xd2\x9e\x44\x80\x22\x59\x92\x8a\x7c\x7f\x5f\x88\xb2\x13\xbb\x2e\x50\xbe\xed\xee\xec\xce\xec\x2c\x23\x5c\x6b\x73\xb6\xa2\x1f\x3c\x76\xdb\xdd\x16\xcd\x40\xf8\x30\x1d\xc9\x2a\xf2\xe4\x90\x4d\x7e\xd0\xd6\x25\x2c\x62\x11\x3e\x8a\x96\x94\xa3\x0e\x93\xea\xc8\xc2\x0f\x84\xcc\xf0\x76\xa0\xa7\xca\x25\xbe\x90\x75\x42\x2b\xec\x92\x2d\x7e\x58\x00\x9b\xc7\xd2\xe6\xc7\x5f\x59\x84\xb3\x9e\x30\xf2\x33\x94\xf6\x98\x1c\xc1\x0f\xc2\xe1\x24\x24\x81\x1e\x5a\x32\x1e\x42\xa1\xd5\xa3\x91\x82\xab\x96\x30\x0b\x3f\x04\x9a\xc7\x21\x09\x8b\x70\x78\x1c\xa1\x8f\x9e\x0b\x05\x8e\x56\x9b\x33\xf4\xe9\x39\x0e\xdc\x07\xc1\xcb\x1b\xbc\x37\x6f\xd3\x74\x9e\xe7\x84\x07\xb1\x89\xb6\x7d\x2a\x57\xa0\x4b\x3f\xe6\xd7\xfb\xa2\xde\xc7\xbb\x64\x1b\x5a\x3e\x2b\x49\xce\xc1\xd2\xdf\x93\xb0\xd4\xe1\x78\x06\x37\x46\x8a\x96\x1f\x25\x41\xf2\x19\xda\x82\xf7\x96\xa8\x83\xd7\x8b\xde\xd9\x0a\x2f\x54\x7f\x09\xa7\x4f\x7e\xe6\x96\x58\x84\x4e\x38\x6f\xc5\x71\xf2\x2f\xcc\x7a\x52\x27\xdc\x0b\x80\x56\xe0\x0a\x9b\xac\x46\x5e\x6f\xf0\x5b\x56\xe7\xf5\x25\x8b\x70\x9f\x37\xbf\x97\x9f\x1b\xdc\x67\x55\x95\x15\x4d\xbe\xaf\x51\x56\xb8\x2e\x8b\x9b\xbc\xc9\xcb\xa2\x46\xf9\x1e\x59\x71\xc0\x87\xbc\xb8\xb9\x04\x09\x3f\x90\x05\x3d\x18\xbb\xe8\xd7\x16\x62\xb1\x91\xba\xc5\xb3\x9a\xe8\x85\x80\x93\x5e\x05\x39\x43\xad\x38\x89\x16\x92\xab\x7e\xe2\x3d\xa1\xd7\x5f\xc9\x2a\xa1\x7a\x18\xb2\xa3\x70\xcb\x31\x1d\xb8\xea\x58\x04\x29\x46\xe1\xb9\x0f\x99\x57\x4b\x25\x8c\x45\xe1\xf3\xd0\x8e\xc0\xfb\xde\x52\xcf\xfd\x42\x43\xce\x87\x85\xc9\x89\x5e\xad\xa6\x85\x1c\x3f\x0a\x29\xfc\x79\x89\xed\xa4\xe0\xf8\x68\x24\xc5\xdc\x08\x47\xf6\x2b\x59\xf0\x85\xf6\xdb\x24\xea\xb0\xe6\x97\x75\x1c\xad\x34\x61\x8e\xe2\x23\x75\xd8\xd4\x83\x9e\x64\x87\x23\x21\x1c\xca\x6b\xb8\xc9\x18\x6d\x7d\x10\x79\x95\x5c\xfd\x82\x3a\x50\x20\xbb\xcb\x51\xaf\x1c\x93\x5b\x36\x5d\x00\xed\x64\x2d\x29\x8f\xec\x9b\xf2\x0d\x63\x59\x75\xbb\x9c\x63\x9f\x7f\xca\x6e\xf7\x21\xaa\xf6\xb7\x79\xdd\x54\x87\x10\x94\xf5\x5f\x5f\xf6\x55\x9d\x97\x05\x63\xef\xab\xf2\x13\xe2\xd8\x48\xee\x4f\xda\x8e\xef\xa4\x50\xd3\x43\xca\xc7\xee\xe7\x9f\x70\xf1\xd4\x95\xce\x42\x75\x7a\x76\xf1\xba\x4a\xab\x2d\xc5\xed\xf2\x25\xdf\x5e\x25\xdb\x38\xb4\xc4\xa1\x25\xbe\xf8\x3e\x7b\x31\xe2\x19\x7e\x20\x69\xc8\xae\x7c\x17\xdf\xc5\xb1\xeb\xf2\xee\x80\x38\x3e\x59\x3d\xbe\x7b\x05\x47\x7a\xbf\x32\xa7\xf5\xd9\x79\x1a\xdf\xec\x52\x45\x9e\x1b\xf1\x66\x97\x74\x52\xfe\x4f\x99\x65\x37\x37\xaf\xef\x93\xfe\x3b\x93\xd0\x03\x31\xb6\x2f\x9a\xea\x70\x57\xe6\x45\x83\x3f\x36\xff\x89\xd9\xfc\xc9\xfe\x09\x00\x00\xff\xff\xf8\xb2\x97\x28\x76\x04\x00\x00") + +func testImagesSampleApiserverDockerfile_windowsBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleApiserverDockerfile_windows, + "test/images/sample-apiserver/Dockerfile_windows", + ) +} + +func testImagesSampleApiserverDockerfile_windows() (*asset, error) { + bytes, err := testImagesSampleApiserverDockerfile_windowsBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-apiserver/Dockerfile_windows", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleApiserverMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x54\x61\x6f\xdb\x36\x10\xfd\x1c\xfe\x8a\x07\x2b\xe8\x9a\xc1\x92\xec\x60\x5d\x87\x14\xc6\xa6\xda\x9e\x63\x34\xb5\x06\xcb\x69\xd1\xa1\x40\x40\x49\x67\x89\x8b\x44\x6a\x24\x65\xd9\x08\xf2\xdf\x07\xca\x4e\xba\x22\x18\x30\x7f\x91\x25\xde\xbd\x7b\xf7\xf8\xee\x3c\x4c\x55\x73\xd0\xa2\x28\x2d\x2e\x47\x97\x23\x6c\x4a\xc2\x87\x36\x25\x2d\xc9\x92\x41\xd4\xda\x52\x69\x13\x30\x8f\x79\xb8\x11\x19\x49\x43\x39\x5a\x99\x93\x86\x2d\x09\x51\xc3\xb3\x92\x9e\x4e\x86\xf8\x44\xda\x08\x25\x71\x19\x8c\xf0\xda\x05\x0c\x4e\x47\x83\x8b\x77\xcc\xc3\x41\xb5\xa8\xf9\x01\x52\x59\xb4\x86\x60\x4b\x61\xb0\x15\x15\x81\xf6\x19\x35\x16\x42\x22\x53\x75\x53\x09\x2e\x33\x42\x27\x6c\xd9\x97\x39\x81\x04\xcc\xc3\x97\x13\x84\x4a\x2d\x17\x12\x1c\x99\x6a\x0e\x50\xdb\x7f\xc7\x81\xdb\x9e\xb0\xfb\x95\xd6\x36\x57\x61\xd8\x75\x5d\xc0\x7b\xb2\x81\xd2\x45\x58\x1d\x03\x4d\x78\xb3\x9c\xce\x57\xc9\xdc\xbf\x0c\x46\x7d\xca\xad\xac\xc8\x18\x68\xfa\xbb\x15\x9a\x72\xa4\x07\xf0\xa6\xa9\x44\xc6\xd3\x8a\x50\xf1\x0e\x4a\x83\x17\x9a\x28\x87\x55\x8e\x6f\xa7\x85\x15\xb2\x18\xc2\xa8\xad\xed\xb8\x26\xe6\x21\x17\xc6\x6a\x91\xb6\xf6\x3b\xb1\x9e\xd8\x09\xf3\x5d\x80\x92\xe0\x12\x83\x28\xc1\x32\x19\xe0\x7d\x94\x2c\x93\x21\xf3\xf0\x79\xb9\xb9\x8e\x6f\x37\xf8\x1c\xad\xd7\xd1\x6a\xb3\x9c\x27\x88\xd7\x98\xc6\xab\xd9\x72\xb3\x8c\x57\x09\xe2\xdf\x11\xad\xbe\xe0\xc3\x72\x35\x1b\x82\x84\x2d\x49\x83\xf6\x8d\x76\xfc\x95\x86\x70\x32\x52\xee\x34\x4b\x88\xbe\x23\xb0\x55\x47\x42\xa6\xa1\x4c\x6c\x45\x86\x8a\xcb\xa2\xe5\x05\xa1\x50\x3b\xd2\x52\xc8\x02\x0d\xe9\x5a\x18\x77\x99\x06\x5c\xe6\xcc\x43\x25\x6a\x61\xb9\xed\xbf\xbc\x68\x2a\x60\x2c\x4e\xf0\xeb\x04\x95\x90\xed\x9e\x45\xeb\xe9\xb5\x7b\xe3\x75\xfe\xf3\x4f\x6c\x13\xad\x17\xf3\x8d\x7b\x3f\x7f\x3d\xbd\x5d\xcf\x96\xeb\x0b\xb6\x88\xa3\xf5\x47\x4c\xf0\x96\x2d\xe2\x9b\x68\xb5\xb8\xfb\x34\x5f\x27\xcb\x78\xd5\x63\x70\x4b\xc6\xb2\x64\x3d\xbd\x9b\x2d\xd7\x70\x69\x52\xd9\x5c\x68\x9c\xbf\x36\x25\x55\x15\x9a\x2e\xbf\xb8\x60\xb4\x6f\x94\xb6\x8c\x79\x78\xdf\x8a\x2a\xc7\x6e\x1c\x8c\xdf\x06\x23\x77\x31\x24\x4d\xab\x8f\x5d\x67\xad\xd6\x24\x2d\x34\x55\xc4\x0d\xc1\xb4\x8d\x4b\x33\xe0\x68\xb4\x50\x1a\xbb\x93\x69\x4f\x26\x32\xbc\x6e\x2a\x02\x6f\x84\x21\xbd\x23\xcd\x3c\x2c\xc8\xf6\x66\x54\xad\x45\xea\x4a\x39\x85\xac\x42\xa3\x9a\xd6\x91\x45\xad\xf2\xb6\x22\x64\xce\x60\xcc\x73\x53\x24\x87\x28\x4e\x59\x88\x93\xd0\x09\xe2\x3f\xeb\x4d\x72\xe7\xd2\x7b\x28\x96\x0a\x79\xc5\xce\x72\x95\xdd\x93\x86\x6e\x25\x7c\x5f\xd7\xf0\x85\x85\xbf\xc3\xe0\xfc\xe1\xa8\xde\xe3\xd5\xb7\x7f\x7f\x0e\x70\xff\x8b\x09\x8a\x4c\x07\x42\x85\x3d\x8a\x2f\x6a\x5e\x50\x78\xdf\xa6\xe4\x67\x5a\x19\x73\xe5\xc4\x78\x13\x8c\xdf\xf8\x15\x15\x3c\x3b\xf8\x63\x7c\x65\x67\x67\x61\x2a\x64\x98\x72\x53\xc2\xcf\x30\x70\x5f\xce\xea\x7b\xa7\xac\xdf\x20\x2c\x54\x68\x74\xd6\x3f\x53\x21\xf1\xea\x55\x9f\x72\xb6\x88\xc7\xe3\xf1\xc7\x78\x76\x7b\x33\x9f\x28\x89\x42\xf5\x9d\xf9\x79\x4f\x42\xa8\xf0\x28\x98\xff\x2c\xd8\x6f\xbb\xd1\xf1\x1e\xfe\x03\x60\xba\x88\xef\xe6\xab\xe8\xfd\xcd\x7c\x36\x19\xa1\x37\xc2\xe4\xfc\xa1\x7f\x3e\x62\x11\xc7\xc9\xe4\xfc\x21\x4e\x1e\xfb\x93\xe9\xf5\xe4\xfc\xc1\x3d\x1e\x9f\xea\xfe\xdf\xa2\x5b\x21\xf3\xe7\x56\x7c\xc9\xeb\xa7\x9b\xfd\x96\xf3\x23\x7c\xda\x53\x86\xac\xc1\xc3\x23\x9e\xf5\x7d\x81\x8d\xaf\xef\x06\x0e\xd2\xeb\x27\x87\xeb\x7a\xe8\xc8\x08\x69\x2c\xaf\x2a\xb7\xc8\xcc\x53\xa1\xb0\xb7\xff\x5d\x1f\x62\x14\xfe\x6a\x8d\x45\x4f\xc4\x19\xab\x5f\x74\x5c\xe6\xc7\x95\x25\xac\xb3\x80\x2d\xe9\x88\xac\x95\xb2\x2e\xa5\x73\x2e\x92\xcf\x21\xce\x71\x5b\xad\xea\xe3\xaa\xb4\xa5\x56\x1d\x78\xc7\x0f\xc8\x94\x74\x0b\x90\xdc\xa0\xbb\xc9\xed\x83\x38\x8c\xe5\x32\xe7\x3a\x47\xa5\xb2\x7e\x56\x83\x23\xfc\x67\x21\x73\xd5\x19\xb8\x7e\x5b\xeb\x96\x99\x41\xc9\x77\x84\x80\xf6\x6e\xfb\x5a\x92\x6e\x06\x86\xe8\x4a\x91\x95\x6e\x45\x75\xe5\x01\x1d\xfd\xa0\x09\x86\xb8\xce\x4a\x67\xf9\x17\x02\x32\x16\xfc\x71\x1d\xaf\xbe\x5c\x21\x15\x92\xfd\x13\x00\x00\xff\xff\x36\x98\xb1\xc9\x4e\x06\x00\x00") + +func testImagesSampleApiserverMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleApiserverMakefile, + "test/images/sample-apiserver/Makefile", + ) +} + +func testImagesSampleApiserverMakefile() (*asset, error) { + bytes, err := testImagesSampleApiserverMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-apiserver/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleApiserverOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\x48\xc9\xcc\x2d\xe6\x02\x04\x00\x00\xff\xff\xe2\x68\x65\xd7\x14\x00\x00\x00") + +func testImagesSampleApiserverOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleApiserverOwners, + "test/images/sample-apiserver/OWNERS", + ) +} + +func testImagesSampleApiserverOwners() (*asset, error) { + bytes, err := testImagesSampleApiserverOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-apiserver/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleApiserverVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\x34\xd7\x33\xe6\x02\x04\x00\x00\xff\xff\x34\xa3\x0e\x79\x07\x00\x00\x00") + +func testImagesSampleApiserverVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleApiserverVersion, + "test/images/sample-apiserver/VERSION", + ) +} + +func testImagesSampleApiserverVersion() (*asset, error) { + bytes, err := testImagesSampleApiserverVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-apiserver/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleDevicePluginBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\xcc\x29\xc8\xcc\x4b\xb5\x32\xd6\xb3\xe0\x82\x0a\x17\xe5\xda\x26\x16\xe5\x1a\x1b\x95\x99\xe9\x63\x93\x04\xe9\x01\x91\x65\x16\x98\xd2\x05\x05\xc9\x66\x26\x39\xa9\xb6\x50\x1a\x53\x41\xb1\xb1\xa5\x41\x85\x2d\x98\x44\x96\x04\x04\x00\x00\xff\xff\xa4\xbc\x38\xda\x91\x00\x00\x00") + +func testImagesSampleDevicePluginBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleDevicePluginBaseimage, + "test/images/sample-device-plugin/BASEIMAGE", + ) +} + +func testImagesSampleDevicePluginBaseimage() (*asset, error) { + bytes, err := testImagesSampleDevicePluginBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-device-plugin/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleDevicePluginDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x91\x41\x6f\xd3\x30\x14\xc7\xef\xfe\x14\x7f\x25\x1c\x40\xea\xd2\xb1\x13\x82\x53\x68\xb3\x11\x6d\x4b\x50\x92\x31\x55\x88\x83\x9b\xbc\x26\x4f\x72\x6d\x63\x3b\xcb\xfa\xed\x51\xba\x4e\x50\x0d\xdf\xfc\xde\xcf\xcf\x3f\xff\x1d\x63\x65\xec\xc1\x71\x3f\x04\x5c\x5d\x7e\xfc\x84\x66\x20\xdc\x8e\x5b\x72\x9a\x02\x79\xa4\x63\x18\x8c\xf3\x89\x88\x45\x8c\x3b\x6e\x49\x7b\xea\x30\xea\x8e\x1c\xc2\x40\x48\xad\x6c\x07\x7a\xed\x2c\xf0\x83\x9c\x67\xa3\x71\x95\x5c\xe2\xfd\x0c\x44\xa7\x56\xf4\xe1\x8b\x88\x71\x30\x23\xf6\xf2\x00\x6d\x02\x46\x4f\x08\x03\x7b\xec\x58\x11\xe8\xb9\x25\x1b\xc0\x1a\xad\xd9\x5b\xc5\x52\xb7\x84\x89\xc3\x70\xbc\xe6\x34\x24\x11\x31\x36\xa7\x11\x66\x1b\x24\x6b\x48\xb4\xc6\x1e\x60\x76\xff\x72\x90\xe1\x28\x3c\xaf\x21\x04\xfb\x79\xb9\x9c\xa6\x29\x91\x47\xd9\xc4\xb8\x7e\xa9\x5e\x40\xbf\xbc\xcb\x57\x59\x51\x67\x17\x57\xc9\xe5\xf1\xc8\x83\x56\xe4\x3d\x1c\xfd\x1e\xd9\x51\x87\xed\x01\xd2\x5a\xc5\xad\xdc\x2a\x82\x92\x13\x8c\x83\xec\x1d\x51\x87\x60\x66\xdf\xc9\x71\x60\xdd\x2f\xe0\xcd\x2e\x4c\xd2\x91\x88\xd1\xb1\x0f\x8e\xb7\x63\x38\x0b\xeb\xd5\x8e\xfd\x19\x60\x34\xa4\x46\x94\xd6\xc8\xeb\x08\x5f\xd3\x3a\xaf\x17\x22\xc6\x63\xde\x7c\x2b\x1f\x1a\x3c\xa6\x55\x95\x16\x4d\x9e\xd5\x28\x2b\xac\xca\x62\x9d\x37\x79\x59\xd4\x28\xaf\x91\x16\x1b\xdc\xe6\xc5\x7a\x01\xe2\x30\x90\x03\x3d\x5b\x37\xfb\x1b\x07\x9e\x63\xa4\x6e\xce\xac\x26\x3a\x13\xd8\x99\x17\x21\x6f\xa9\xe5\x1d\xb7\x50\x52\xf7\xa3\xec\x09\xbd\x79\x22\xa7\x59\xf7\xb0\xe4\xf6\xec\xe7\xcf\xf4\x90\xba\x13\x31\x14\xef\x39\xc8\x70\xac\xbc\x79\x54\x22\x44\x5a\xdd\xcc\xf6\x59\x7e\x9f\xde\x64\xe2\xba\x2a\xef\xf1\xee\xef\x3e\x5d\xaf\xe1\xe5\xde\x2a\xea\xe8\x89\x5b\xb2\x6a\xec\x59\x63\xf9\xb6\x26\xb2\xa2\xa9\x36\xdf\xcb\xbc\x68\xf0\x33\xfa\x0f\x10\x2d\x10\x5d\x48\xe5\x8d\x32\x7d\x30\x3e\x74\xe4\x5c\xf4\x4b\xfc\x09\x00\x00\xff\xff\x21\xa9\x98\x3a\xcc\x02\x00\x00") + +func testImagesSampleDevicePluginDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleDevicePluginDockerfile, + "test/images/sample-device-plugin/Dockerfile", + ) +} + +func testImagesSampleDevicePluginDockerfile() (*asset, error) { + bytes, err := testImagesSampleDevicePluginDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-device-plugin/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleDevicePluginMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x51\x4f\xdb\x4a\x10\x85\x9f\xef\xfe\x8a\xa3\x98\x87\x44\x0a\x0e\x17\x5d\xdd\x56\x54\xa8\x72\x93\x34\x58\x50\xbb\xb2\x03\x88\x27\xb4\xb1\x27\xf6\x48\xeb\xdd\xed\xee\x1a\x27\xff\xbe\x72\x00\xa9\xa8\x7e\x9b\x99\x33\x67\x3e\x9f\x8d\xb0\x34\xf6\xe8\xb8\x69\x03\x2e\x2f\xfe\xfd\x8c\x6d\x4b\xb8\xed\x77\xe4\x34\x05\xf2\x48\xfa\xd0\x1a\xe7\x63\x11\x89\x08\x77\x5c\x91\xf6\x54\xa3\xd7\x35\x39\x84\x96\x90\x58\x59\xb5\xf4\x3e\x99\xe3\x81\x9c\x67\xa3\x71\x19\x5f\x60\x3a\x0a\x26\x6f\xa3\xc9\xec\x8b\x88\x70\x34\x3d\x3a\x79\x84\x36\x01\xbd\x27\x84\x96\x3d\xf6\xac\x08\x74\xa8\xc8\x06\xb0\x46\x65\x3a\xab\x58\xea\x8a\x30\x70\x68\x4f\x67\xde\x4c\x62\x11\xe1\xe9\xcd\xc2\xec\x82\x64\x0d\x89\xca\xd8\x23\xcc\xfe\x4f\x1d\x64\x38\x01\x8f\x5f\x1b\x82\xbd\x5a\x2c\x86\x61\x88\xe5\x09\x36\x36\xae\x59\xa8\x57\xa1\x5f\xdc\xa5\xcb\x75\x56\xae\xcf\x2f\xe3\x8b\xd3\xca\xbd\x56\xe4\x3d\x1c\xfd\xea\xd9\x51\x8d\xdd\x11\xd2\x5a\xc5\x95\xdc\x29\x82\x92\x03\x8c\x83\x6c\x1c\x51\x8d\x60\x46\xde\xc1\x71\x60\xdd\xcc\xe1\xcd\x3e\x0c\xd2\x91\x88\x50\xb3\x0f\x8e\x77\x7d\xf8\x10\xd6\x3b\x1d\xfb\x0f\x02\xa3\x21\x35\x26\x49\x89\xb4\x9c\xe0\x5b\x52\xa6\xe5\x5c\x44\x78\x4c\xb7\x37\xf9\xfd\x16\x8f\x49\x51\x24\xd9\x36\x5d\x97\xc8\x0b\x2c\xf3\x6c\x95\x6e\xd3\x3c\x2b\x91\x7f\x47\x92\x3d\xe1\x36\xcd\x56\x73\x10\x87\x96\x1c\xe8\x60\xdd\xc8\x6f\x1c\x78\x8c\x91\xea\x31\xb3\x92\xe8\x03\xc0\xde\xbc\x02\x79\x4b\x15\xef\xb9\x82\x92\xba\xe9\x65\x43\x68\xcc\x0b\x39\xcd\xba\x81\x25\xd7\xb1\x1f\x1f\xd3\x43\xea\x5a\x44\x50\xdc\x71\x90\xe1\xd4\xf9\xeb\xa7\x62\x21\xca\x62\x59\x5e\x7b\xd9\x59\x45\x35\xbd\x70\x45\x56\xf5\x0d\x6b\x91\x97\xf8\x7a\x0d\xc5\xba\x3f\x88\xa4\x58\xde\x8c\x95\xec\xea\xff\xff\x13\xdb\xa4\xd8\xac\xb7\x63\x7d\x36\x5d\xde\x17\xab\xb4\x98\x89\x4d\x9e\x14\x3f\xc6\xd6\x27\xb1\xc9\xef\x92\x6c\xf3\xfc\xb0\x2e\xca\x34\xcf\x4e\x26\x32\x90\x0f\xe3\xa5\xe7\x55\x5a\x60\xdc\xd3\x26\xd4\xec\x70\x36\xf5\x2d\x29\x05\x3b\xd4\xb3\x99\xa0\x83\x35\x2e\x08\xb1\x63\x7d\x25\xfe\x89\xe3\x05\x77\xb2\xa1\xf3\x3e\xb0\x8a\x7d\x8b\x1d\x6b\x9c\x4d\x47\xde\x99\x10\xf1\xcf\x9b\x3c\x7b\xba\x1a\x9b\xe2\x77\x00\x00\x00\xff\xff\x2f\x48\xaa\xda\x0f\x03\x00\x00") + +func testImagesSampleDevicePluginMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleDevicePluginMakefile, + "test/images/sample-device-plugin/Makefile", + ) +} + +func testImagesSampleDevicePluginMakefile() (*asset, error) { + bytes, err := testImagesSampleDevicePluginMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-device-plugin/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleDevicePluginVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe2\x02\x04\x00\x00\xff\xff\x5d\x96\xa5\x56\x04\x00\x00\x00") + +func testImagesSampleDevicePluginVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleDevicePluginVersion, + "test/images/sample-device-plugin/VERSION", + ) +} + +func testImagesSampleDevicePluginVersion() (*asset, error) { + bytes, err := testImagesSampleDevicePluginVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-device-plugin/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesSampleDevicePluginSampledevicepluginGo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xa4\x56\x4f\x6f\xdb\x3e\x12\x3d\x9b\x9f\x62\x42\xa0\x81\x9c\xaa\x52\x93\x53\xe1\xc2\x07\xaf\x9d\xb6\xda\x74\x9d\xc0\x4e\xb6\x28\x8a\xa2\xa0\xa5\x91\x4c\x58\x22\x59\x92\xb2\x63\x04\xfe\xee\x0b\x52\xb2\x23\x3b\x29\xba\xc0\x2f\x87\x24\xe6\xcc\xbc\x79\x6f\xfe\x90\x8e\x2f\xc8\x58\xaa\xad\xe6\xc5\xd2\xc2\xd5\xfb\xcb\x0f\x70\xbf\x44\xb8\xa9\x17\xa8\x05\x5a\x34\x30\xaa\xed\x52\x6a\x13\x11\xf2\x95\xa7\x28\x0c\x66\x50\x8b\x0c\x35\xd8\x25\xc2\x48\xb1\x74\x89\xd0\x5a\x42\xf8\x2f\x6a\xc3\xa5\x80\xab\xe8\x3d\x04\xce\x81\xb6\x26\xda\xff\x48\xb6\xb2\x86\x8a\x6d\x41\x48\x0b\xb5\x41\xb0\x4b\x6e\x20\xe7\x25\x02\x3e\xa6\xa8\x2c\x70\x01\xa9\xac\x54\xc9\x99\x48\x11\x36\xdc\x2e\x7d\x92\x16\x22\x22\xdf\x5b\x00\xb9\xb0\x8c\x0b\x60\x90\x4a\xb5\x05\x99\x77\xbd\x80\x59\x42\x00\x00\x96\xd6\xaa\x41\x1c\x6f\x36\x9b\x88\x79\x96\x91\xd4\x45\x5c\x36\x5e\x26\xfe\x9a\x8c\xaf\xa7\xf3\xeb\x77\x57\xd1\x7b\x42\x1e\x44\x89\xc6\x80\xc6\xdf\x35\xd7\x98\xc1\x62\x0b\x4c\xa9\x92\xa7\x6c\x51\x22\x94\x6c\x03\x52\x03\x2b\x34\x62\x06\x56\x3a\x9e\x1b\xcd\x2d\x17\x45\x08\x46\xe6\x76\xc3\x34\x92\x8c\x1b\xab\xf9\xa2\xb6\x47\x05\xda\xb3\xe2\x06\xba\x0e\x52\x00\x13\x40\x47\x73\x48\xe6\x14\xfe\x35\x9a\x27\xf3\x90\x7c\x4b\xee\xbf\xdc\x3e\xdc\xc3\xb7\xd1\x6c\x36\x9a\xde\x27\xd7\x73\xb8\x9d\xc1\xf8\x76\x3a\x49\xee\x93\xdb\xe9\x1c\x6e\x3f\xc1\x68\xfa\x1d\x6e\x92\xe9\x24\x04\xe4\x76\x89\x1a\xf0\x51\x69\xc7\x5d\x6a\xe0\xae\x74\x98\x45\x64\x8e\x78\x94\x3c\x97\x0d\x19\xa3\x30\xe5\x39\x4f\xa1\x64\xa2\xa8\x59\x81\x50\xc8\x35\x6a\xc1\x45\x01\x0a\x75\xc5\x8d\x6b\x9e\x01\x26\x32\x52\xf2\x8a\x5b\x66\xfd\xe7\x17\x72\x22\x72\x11\x13\xa2\x58\xba\x72\x20\x15\xe3\x82\x10\x5e\x29\xa9\x2d\x04\xa4\x47\xf3\xca\x52\xd2\xa3\xd2\xb8\xdf\x8a\xd9\x65\xec\xba\xec\xfe\x71\x07\x96\x57\x48\x09\xe9\xd1\xd5\x07\x13\x71\x19\xaf\x4a\x59\xc4\xeb\x2b\x4a\x7a\xaa\xac\x0b\x2e\x98\xe2\x70\xb0\xd5\x0b\x2c\xd1\xc6\x6a\x55\xc4\x4c\x71\x13\x67\xb8\xe6\x29\x36\x8e\xf1\xfa\x72\x81\x96\x5d\x52\xd2\xcb\xaa\xa3\x90\x66\x74\x7d\xd4\x1e\x21\xad\xda\xd8\x8a\x09\x56\xa0\xa6\xa4\x4f\x48\x2a\x85\xf1\x94\x35\x1a\x59\xeb\x14\xa7\xac\x42\x18\x02\xc5\x47\x56\xa9\x12\xa3\x54\x56\xf1\xde\xe6\x23\xe2\x18\x8c\xad\x17\xa3\xb2\x94\xe9\xa7\x5a\xa4\x90\x6a\x64\x6e\x4d\x98\xc8\x40\xa3\xad\xb5\xab\x9f\xb3\xfa\xda\x81\x46\xa3\x64\xb7\x07\x5c\xa8\xda\xee\x3d\xd0\x8f\x1c\x1a\x4b\x72\x87\x75\x84\x1c\x68\xb8\x38\x14\x24\x1a\xb5\x01\xb3\xc6\x3f\x84\x0c\xd7\x06\x2a\xa6\x7e\xb8\xa1\x12\xc5\xcf\x67\xd7\x89\x97\xd9\x87\xe0\xd5\xf0\x86\x4e\x08\xa8\xb5\xd4\x7d\x78\x22\xbd\x35\xd3\x07\x9a\x06\xfe\x1c\x43\x7a\x4e\xc3\xaf\xd0\x71\x86\xc1\x10\x34\x13\x05\x82\x8e\xc6\x52\xb8\x75\x44\xdd\x72\x33\x0e\xb4\x77\x10\x3e\x18\xc2\xf9\x33\xe8\xc1\xf9\x14\xfd\x69\x47\x7a\x9d\x04\x0e\x28\x99\x74\xd2\xe0\xef\x56\x98\x49\x26\x4d\x86\x5e\x86\xeb\x10\xe4\xca\x39\xb9\x6a\xfc\x38\x84\xfd\x74\x56\x9e\xc3\x99\x5c\x35\x9e\xbd\xa6\x33\x20\x78\x19\x42\x5e\xd9\xe8\xda\xa9\xcf\x03\xca\xc5\x9a\x95\x3c\x3b\xee\x98\x47\x69\xae\x1f\x21\xc5\x3b\x7c\xe4\xc6\xed\x3a\x34\xf3\x03\x6f\x0c\xed\x50\xec\x3b\xfc\x1d\x69\x33\x66\xb8\x8e\xbe\x20\x2b\xed\x12\xce\x86\x9d\x5a\x36\x67\xdb\x7f\xc8\xa6\x16\xcb\x16\xa7\xa1\x32\xf8\x33\x97\x38\x6e\x27\x13\x72\xb6\xc2\x3d\x75\xb7\x86\xce\x9a\xbb\x5d\x74\x75\xdb\xef\x65\xf4\x6f\xc9\x45\x40\x63\x5b\x29\xea\x67\x2b\x72\x68\x7b\xa0\x12\x99\x80\x9c\x6b\x63\x5b\x99\xa8\xb5\x8b\x96\x26\x9a\x61\x25\xd7\x38\x2a\xcb\xc0\x63\xf6\x3f\x7a\xdb\xd9\xd0\x89\xfb\x8b\xda\x9c\xf1\xb2\xb9\x4f\xdb\x04\x27\x44\x21\xd7\xb2\x02\xa5\x71\xcd\x65\x6d\x40\xd7\xa2\xd5\x8b\x5a\x77\x94\xe6\x61\x87\xce\xd8\x6b\x6e\xb9\x74\xc8\xb6\x84\xce\xcf\xe1\x4c\x9a\x28\x31\xd7\xae\xa7\x81\x03\xfa\xff\x49\xbe\x5e\xce\xd7\x39\x45\xe3\x52\x1a\x0c\x9a\x12\xee\x57\x21\xfa\x8f\xac\x85\x35\x30\x74\x8f\x0b\x8a\x2c\x38\x31\x84\xdd\x45\xf1\x47\x0d\xb7\xc3\xce\xdc\x31\xbb\x1c\x80\x17\x17\x7a\xcb\x17\x69\x6c\x73\xe8\x7f\x9e\x2d\x3b\x47\x66\xd7\x59\x43\xd3\x5d\xd3\xfd\xae\xbf\x20\xf2\x9a\x57\x78\xb8\x1c\xfa\xc4\xcb\x6b\x4b\x75\xae\x9f\x3d\x04\x2f\xc9\x8e\x34\x97\x98\x7b\x0d\x02\x5f\x56\x7f\x45\x0d\x86\xf0\xe3\xe7\xc5\xe9\xed\xe4\x84\x3d\x25\x93\x01\xd0\x09\xae\xdf\x5d\xd2\x10\x9a\x0d\x19\xbc\xdc\x99\x5d\x78\xe4\x7b\xf5\x37\x5f\x47\xb1\x31\xcc\x65\xba\x32\x13\xbe\x9f\x8d\xcf\x68\x51\xac\x03\x7a\xf7\xf5\xe1\x73\x32\xfd\x35\xbf\x1d\xdf\xfc\x9a\x24\x33\xda\x27\x3d\xf7\x04\x45\x89\xc8\x65\x1e\xd0\xe3\xd8\xb6\xbd\xc7\x87\x7d\xe2\xe6\xea\x24\xc9\x70\x08\x94\xfa\x69\xf2\x68\xfb\x01\xba\xae\x94\xdd\x9e\xf8\xba\x94\x6d\x19\x1d\xdf\x9e\x91\xe9\x0a\x7d\x23\x1d\xd5\x13\xdc\xb7\x40\xe3\x4c\x45\x14\xde\xfa\xc1\x9c\x2b\xcd\x85\xcd\x03\xfa\x26\xa3\x21\xb8\xb7\x34\x9a\xca\x4d\xd0\x8f\x1e\x04\x7f\x0c\xfa\x6e\xe2\x32\x75\xe9\xef\xc4\x2a\x9a\xe2\xa6\xa9\xf7\x5d\x83\x69\xeb\x45\xe0\xba\xe2\xbe\xb6\xec\x53\xfa\xfe\x1e\x1e\xbf\x10\x72\x56\x9a\xfd\x9f\x46\x68\xbb\x5e\x99\xba\x8c\xe6\x96\x69\x1b\xbc\xdc\x72\xc5\x04\x4f\xfd\x3e\x11\xaf\xc8\xfb\xa2\x7d\x7e\xcc\x8e\x9e\xb6\x17\xb0\x33\x2c\xb8\xb1\xa8\x83\xe7\x8e\xde\x34\xef\xf6\xdc\xf3\x3c\xe5\x78\x3a\x4e\x8d\xbc\xbb\x57\x2f\xa0\x0e\x35\x5f\x6b\x2c\x31\xb5\xf0\xb4\x23\x3b\xf2\xbf\x00\x00\x00\xff\xff\x4f\xbe\x49\x55\xfc\x0a\x00\x00") + +func testImagesSampleDevicePluginSampledevicepluginGoBytes() ([]byte, error) { + return bindataRead( + _testImagesSampleDevicePluginSampledevicepluginGo, + "test/images/sample-device-plugin/sampledeviceplugin.go", + ) +} + +func testImagesSampleDevicePluginSampledevicepluginGo() (*asset, error) { + bytes, err := testImagesSampleDevicePluginSampledevicepluginGoBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/sample-device-plugin/sampledeviceplugin.go", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\x28\x28\xca\x2f\x4b\x2d\x2a\xb6\xe2\x52\x50\xd0\x55\xc8\x2a\x4e\x4c\x2b\x4a\xcc\x4b\x05\x73\x72\xb3\x4b\x73\x13\x4b\x12\xd3\xb9\x00\x01\x00\x00\xff\xff\x2d\x3f\xb3\x41\x25\x00\x00\x00") + +func testImagesVolumeOwnersBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeOwners, + "test/images/volume/OWNERS", + ) +} + +func testImagesVolumeOwners() (*asset, error) { + bytes, err := testImagesVolumeOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeGlusterBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\x4b\x4d\xc9\x2f\x4a\xb4\x32\xb2\xe0\x82\x8a\x16\xe5\x9a\x99\xd8\x82\xc9\x32\x0b\x7d\x74\xd9\x82\x82\x64\x33\x93\x9c\x54\x5b\x28\x8d\x24\x0f\x08\x00\x00\xff\xff\xc6\xfc\xc2\x5e\x54\x00\x00\x00") + +func testImagesVolumeGlusterBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeGlusterBaseimage, + "test/images/volume/gluster/BASEIMAGE", + ) +} + +func testImagesVolumeGlusterBaseimage() (*asset, error) { + bytes, err := testImagesVolumeGlusterBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/gluster/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeGlusterDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x61\x6f\xb3\x36\x10\xc7\xdf\xfb\x53\xfc\x15\xa6\x6a\x93\x12\x48\xa3\xac\xd3\xb6\x57\x34\xa1\x2d\x6a\x0b\x1d\x24\xeb\xa2\x69\xaa\x1c\xb8\x80\x25\x63\x53\xdb\x24\xcd\xb7\x9f\x20\xe9\xba\x3c\x0f\xaf\xf0\xdd\xef\xee\x7e\x3e\x7b\x58\xe8\xf6\x68\x44\x55\x3b\xcc\xa6\xd7\x37\x58\xd5\x84\xc7\x6e\x4b\x46\x91\x23\x8b\xb0\x73\xb5\x36\xd6\x67\x1e\xf3\xf0\x24\x0a\x52\x96\x4a\x74\xaa\x24\x03\x57\x13\xc2\x96\x17\x35\x7d\x66\xc6\xf8\x93\x8c\x15\x5a\x61\xe6\x4f\xf1\x63\x0f\x8c\xce\xa9\xd1\x4f\xbf\x33\x0f\x47\xdd\xa1\xe1\x47\x28\xed\xd0\x59\x82\xab\x85\xc5\x4e\x48\x02\x7d\x14\xd4\x3a\x08\x85\x42\x37\xad\x14\x5c\x15\x84\x83\x70\xf5\x30\xe6\xdc\xc4\x67\x1e\x36\xe7\x16\x7a\xeb\xb8\x50\xe0\x28\x74\x7b\x84\xde\xfd\x9f\x03\x77\x83\x70\xff\xd5\xce\xb5\xbf\x05\xc1\xe1\x70\xf0\xf9\x20\xeb\x6b\x53\x05\xf2\x04\xda\xe0\x29\x5e\x44\x49\x1e\x4d\x66\xfe\x74\x28\x59\x2b\x49\xd6\xc2\xd0\x7b\x27\x0c\x95\xd8\x1e\xc1\xdb\x56\x8a\x82\x6f\x25\x41\xf2\x03\xb4\x01\xaf\x0c\x51\x09\xa7\x7b\xdf\x83\x11\x4e\xa8\x6a\x0c\xab\x77\xee\xc0\x0d\x31\x0f\xa5\xb0\xce\x88\x6d\xe7\x2e\x96\xf5\x69\x27\xec\x05\xa0\x15\xb8\xc2\x28\xcc\x11\xe7\x23\xdc\x86\x79\x9c\x8f\x99\x87\xd7\x78\xf5\x90\xae\x57\x78\x0d\xb3\x2c\x4c\x56\x71\x94\x23\xcd\xb0\x48\x93\x65\xbc\x8a\xd3\x24\x47\x7a\x87\x30\xd9\xe0\x31\x4e\x96\x63\x90\x70\x35\x19\xd0\x47\x6b\x7a\x7f\x6d\x20\xfa\x35\x52\xd9\xef\x2c\x27\xba\x10\xd8\xe9\x93\x90\x6d\xa9\x10\x3b\x51\x40\x72\x55\x75\xbc\x22\x54\x7a\x4f\x46\x09\x55\xa1\x25\xd3\x08\xdb\x3f\xa6\x05\x57\x25\xf3\x20\x45\x23\x1c\x77\x43\xe4\xbb\x4b\xf9\x8c\x85\xd9\x7d\x6f\x1f\xc5\xcf\xe1\x7d\xc4\xee\xb2\xf4\x19\x3f\x7c\x9d\xd9\x22\x4b\xf3\xfc\xed\x76\x1d\x3f\x2d\xdf\x16\xe9\xcb\x06\xef\xd4\x74\x93\x3f\xa2\xe7\x75\x98\x2d\x1e\x26\xb6\x6f\x5d\x20\xe8\xac\x09\xb6\x42\x05\x8c\x65\xeb\x04\xc7\xae\xc1\xe4\x08\xa1\xac\xe3\x52\xa2\xd6\xd6\x29\xde\x10\x2a\xd9\x59\x47\x66\x67\x27\x96\xcc\x9e\x0c\xae\xae\x06\xb6\x90\xc4\x15\xb8\x94\x2c\x5c\x2e\x3f\xa9\xd2\xdf\x6b\x89\x80\x5c\x11\xfc\x57\x17\x0c\x80\xe9\xd4\xdb\x39\xe4\xdb\xfa\x34\x5c\xea\x82\xcb\x93\x42\x8f\x08\x55\xd2\x87\x5f\xbb\x46\x22\xd8\x6b\x19\x0c\x5a\x45\xdd\xe8\x12\x37\xf3\xf9\x29\xf6\xc5\x30\x16\xfd\xf5\x92\xe6\x11\x66\xf3\xe9\xf4\x97\xc0\x15\x2d\xe6\xbf\x5e\xff\x3c\xeb\xff\x18\x8b\x92\x55\xb6\x79\x49\xe3\x64\x85\xbf\x47\xdf\x0c\xbb\x54\x19\xfd\xc3\xfe\x0d\x00\x00\xff\xff\x0d\x00\xfd\xb0\x9b\x03\x00\x00") + +func testImagesVolumeGlusterDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeGlusterDockerfile, + "test/images/volume/gluster/Dockerfile", + ) +} + +func testImagesVolumeGlusterDockerfile() (*asset, error) { + bytes, err := testImagesVolumeGlusterDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/gluster/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeGlusterVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe4\x02\x04\x00\x00\xff\xff\x9e\xc5\x88\x7d\x04\x00\x00\x00") + +func testImagesVolumeGlusterVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeGlusterVersion, + "test/images/volume/gluster/VERSION", + ) +} + +func testImagesVolumeGlusterVersion() (*asset, error) { + bytes, err := testImagesVolumeGlusterVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/gluster/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeGlusterGlusterdVol = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x90\x41\x4e\xc3\x30\x10\x45\xf7\x3e\xc5\x57\xb3\x01\xa9\x4e\x29\x82\x05\xf7\xe0\x02\xae\x3d\x49\x47\xb5\x3d\xd1\x78\x92\xaa\xb7\x47\x69\x05\x08\xa9\x20\xb6\x5f\x6f\xde\x1f\xfd\x0e\xef\x47\x6e\xe0\x86\x44\x43\x98\xb3\x61\xcc\x73\x33\xd2\xd4\x2f\x92\xf1\xc0\x35\xe6\x1e\x51\x4a\xa1\x6a\x94\x20\xb3\xe1\x10\x1a\xf9\x49\xd4\x1e\xb7\xae\xc3\x99\xed\x88\x90\x12\x25\x6c\x74\x8a\x3e\xcc\x76\xf4\x21\x67\x39\x7b\xae\x8d\xe2\xac\x04\xa9\x1b\x98\xe0\x9a\x22\x4a\xad\x14\x8d\xa5\xba\x0e\x83\x4a\x41\x95\xea\x27\xe5\x85\x33\x8d\x94\xb0\xaa\x5b\xef\xdc\x22\x79\x2e\x84\x12\x6a\x18\x69\xed\x77\x00\x60\x97\x89\x50\xc6\x62\xbb\xcf\x4f\xaf\xb1\x4c\xab\x11\x67\xd1\x13\xd7\xd1\x27\x56\x8a\x26\x7a\xc1\x6e\x09\xba\xcb\x7c\xb8\x8b\x9b\x86\xda\xd6\x3e\x7f\xd5\x36\x89\x27\xb2\xad\xa6\x12\xee\x52\xfd\x0d\xe8\x4f\x44\x53\xc8\xbc\x90\x37\x2e\x84\xfd\xd3\x3f\x69\xae\x46\xba\x84\x8c\xe7\x3f\x0f\x94\x42\xf2\x43\xe0\xec\xb3\x8c\x90\x61\x70\xdd\x37\xfd\xb5\x3e\x5e\xde\xf6\xaf\x3f\x44\xbf\xcf\xef\xa8\x26\x7f\xdb\xd3\x7d\x04\x00\x00\xff\xff\xbe\xa1\x56\x52\xf3\x01\x00\x00") + +func testImagesVolumeGlusterGlusterdVolBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeGlusterGlusterdVol, + "test/images/volume/gluster/glusterd.vol", + ) +} + +func testImagesVolumeGlusterGlusterdVol() (*asset, error) { + bytes, err := testImagesVolumeGlusterGlusterdVolBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/gluster/glusterd.vol", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeGlusterIndexHtml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xf2\x48\xcd\xc9\xc9\x57\x48\x2b\xca\xcf\x55\x70\xcf\x29\x2d\x2e\x49\x2d\x72\x0b\x56\xe4\x02\x04\x00\x00\xff\xff\xed\xdd\x63\xe1\x16\x00\x00\x00") + +func testImagesVolumeGlusterIndexHtmlBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeGlusterIndexHtml, + "test/images/volume/gluster/index.html", + ) +} + +func testImagesVolumeGlusterIndexHtml() (*asset, error) { + bytes, err := testImagesVolumeGlusterIndexHtmlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/gluster/index.html", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeGlusterRun_glusterSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x93\x5f\x6f\xdb\x36\x14\xc5\xdf\xf9\x29\xce\xa4\x3c\xc4\x43\x24\x65\x01\x82\x01\x2d\x0a\xcc\x8b\x3d\x4c\x68\x67\x03\x96\xbb\xa2\x4f\x03\x2d\x5d\x49\x44\x25\x92\x23\x2f\xad\x18\xc3\xbe\xfb\x20\xc9\xa9\x63\x64\x7a\x3c\xbc\x7f\x7e\xe7\x90\x8a\x7f\xc8\x82\x77\xd9\x41\xe9\x8c\xf4\x11\x07\xe9\x5b\x21\x62\x3c\x19\x7b\x72\xaa\x69\x19\x0f\xf7\x3f\x3d\x62\xdf\x12\x3e\x86\x03\x39\x4d\x4c\x1e\xcb\xc0\xad\x71\x3e\x15\xb1\x88\xf1\x49\x95\xa4\x3d\x55\x08\xba\x22\x07\x6e\x09\x4b\x2b\xcb\x96\x5e\x4e\xee\xf0\x27\x39\xaf\x8c\xc6\x43\x7a\x8f\xdb\xb1\x20\x3a\x1f\x45\x8b\xf7\x22\xc6\xc9\x04\xf4\xf2\x04\x6d\x18\xc1\x13\xb8\x55\x1e\xb5\xea\x08\xf4\x5c\x92\x65\x28\x8d\xd2\xf4\xb6\x53\x52\x97\x84\x41\x71\x3b\xad\x39\x0f\x49\x45\x8c\xaf\xe7\x11\xe6\xc0\x52\x69\x48\x94\xc6\x9e\x60\xea\xd7\x75\x90\x3c\x01\x8f\x5f\xcb\x6c\xdf\x65\xd9\x30\x0c\xa9\x9c\x60\x53\xe3\x9a\xac\x9b\x0b\x7d\xf6\x29\x7f\x5a\x6f\x8a\x75\xf2\x90\xde\x4f\x2d\x9f\x75\x47\xde\xc3\xd1\xdf\x41\x39\xaa\x70\x38\x41\x5a\xdb\xa9\x52\x1e\x3a\x42\x27\x07\x18\x07\xd9\x38\xa2\x0a\x6c\x46\xde\xc1\x29\x56\xba\xb9\x83\x37\x35\x0f\xd2\x91\x88\x51\x29\xcf\x4e\x1d\x02\x5f\x85\xf5\x42\xa7\xfc\x55\x81\xd1\x90\x1a\xd1\xb2\x40\x5e\x44\xf8\x75\x59\xe4\xc5\x9d\x88\xf1\x25\xdf\xff\xbe\xfd\xbc\xc7\x97\xe5\x6e\xb7\xdc\xec\xf3\x75\x81\xed\x0e\x4f\xdb\xcd\x2a\xdf\xe7\xdb\x4d\x81\xed\x6f\x58\x6e\xbe\xe2\x63\xbe\x59\xdd\x81\x14\xb7\xe4\x40\xcf\xd6\x8d\xfc\xc6\x41\x8d\x31\x52\x35\x66\x56\x10\x5d\x01\xd4\x66\x06\xf2\x96\x4a\x55\xab\x12\x9d\xd4\x4d\x90\x0d\xa1\x31\x47\x72\x5a\xe9\x06\x96\x5c\xaf\xfc\x78\x99\x1e\x52\x57\x22\x46\xa7\x7a\xc5\x92\x27\xe5\x8d\xa9\x54\x88\x55\xbe\xfb\x10\xdd\xdc\xf6\xdf\x98\x7a\x8b\xa4\x5a\x44\x42\xd4\x41\x97\x63\x07\x3c\x4b\xc7\xb7\x0b\xf1\x8f\x18\x2f\xa5\x37\x41\x33\x12\x06\xf7\xb6\xf6\x60\xf2\x8c\xe8\x66\x95\xef\xa2\xe9\xb8\x6c\x7b\x53\xe1\xe7\xc7\xc7\x2b\xd1\x22\x3b\x9a\x2e\xfb\x71\x16\xb3\x59\x9d\xde\xb4\x1f\x1f\x75\xd3\x05\xcf\xe4\x2a\x24\x16\x99\x0b\x17\x21\xb5\xaa\x9a\x6a\xcf\x02\x8e\xa6\x0b\x3d\xa1\x74\x24\x99\xa6\xe5\x7f\x1d\x4d\x87\xe8\xe6\xb6\x35\x9e\xb5\xec\x09\x89\x5a\xbc\x9b\x56\x8f\x59\x95\xf4\x7f\xed\x93\xa3\xef\xdd\xe2\xdf\x2b\xb3\xc6\x7e\xf7\xfa\xd2\x96\x24\xbd\xa9\xe8\x83\x2f\x9d\xb2\x7c\x19\x62\xec\x85\xe0\xb2\xeb\x9b\xea\x26\xa0\x52\xf2\x5b\x33\x8b\xd9\x7a\x98\x53\x7c\x15\x91\xeb\x91\xb8\xfa\xb5\x42\xcf\x8a\x71\x3f\xc2\x09\x76\xd2\xce\xfb\xf6\xeb\xdd\x1f\x42\xcc\xfc\xd1\xcd\x2f\x91\x10\x43\x3b\xfe\x83\xec\x02\xbd\x47\x65\xa6\x4e\xdf\x11\x59\x3c\x8a\xca\x68\x12\xe2\xbf\x00\x00\x00\xff\xff\x0e\x77\xa5\x03\x3d\x04\x00\x00") + +func testImagesVolumeGlusterRun_glusterShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeGlusterRun_glusterSh, + "test/images/volume/gluster/run_gluster.sh", + ) +} + +func testImagesVolumeGlusterRun_glusterSh() (*asset, error) { + bytes, err := testImagesVolumeGlusterRun_glusterShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/gluster/run_gluster.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeIscsiBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\x4b\x4d\xc9\x2f\x4a\xb4\x32\xb2\xe0\x82\x8a\x16\xe5\x9a\x99\xd8\x82\xc9\x32\x0b\x7d\x74\xd9\x82\x82\x64\x33\x93\x9c\x54\x5b\x28\x8d\x24\x0f\x08\x00\x00\xff\xff\xc6\xfc\xc2\x5e\x54\x00\x00\x00") + +func testImagesVolumeIscsiBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeIscsiBaseimage, + "test/images/volume/iscsi/BASEIMAGE", + ) +} + +func testImagesVolumeIscsiBaseimage() (*asset, error) { + bytes, err := testImagesVolumeIscsiBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/iscsi/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeIscsiDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x91\xc1\x6e\xdb\x38\x10\x86\xef\x7c\x8a\x1f\xd6\x22\xd8\x05\x6c\x29\x9b\x43\x0f\xed\x49\xb1\x9d\x44\x48\x22\xa5\x92\xdd\xc0\x28\x0a\x83\xa6\xc7\xd2\xa0\x34\xa9\x90\x54\x1d\xf5\xe9\x0b\xd9\x09\xda\xb4\xe5\x8d\x9c\x7f\x3e\x7e\x1c\x46\x98\xda\xb6\x77\x5c\x37\x01\x17\xe7\xff\xbf\xc3\xa2\x21\xdc\x76\x1b\x72\x86\x02\x79\xa4\x5d\x68\xac\xf3\xb1\x88\x44\x84\x3b\x56\x64\x3c\x6d\xd1\x99\x2d\x39\x84\x86\x90\xb6\x52\x35\xf4\x5a\x19\xe3\x13\x39\xcf\xd6\xe0\x22\x3e\xc7\xbf\x43\x60\xf4\x52\x1a\xfd\xf7\x41\x44\xe8\x6d\x87\xbd\xec\x61\x6c\x40\xe7\x09\xa1\x61\x8f\x1d\x6b\x02\x3d\x2b\x6a\x03\xd8\x40\xd9\x7d\xab\x59\x1a\x45\x38\x70\x68\x8e\xd7\xbc\x40\x62\x11\x61\xf5\x82\xb0\x9b\x20\xd9\x40\x42\xd9\xb6\x87\xdd\xfd\x9a\x83\x0c\x47\xe1\x61\x35\x21\xb4\xef\x93\xe4\x70\x38\xc4\xf2\x28\x1b\x5b\x57\x27\xfa\x14\xf4\xc9\x5d\x36\x9d\xe7\xd5\x7c\x72\x11\x9f\x1f\x5b\x96\x46\x93\xf7\x70\xf4\xd4\xb1\xa3\x2d\x36\x3d\x64\xdb\x6a\x56\x72\xa3\x09\x5a\x1e\x60\x1d\x64\xed\x88\xb6\x08\x76\xf0\x3d\x38\x0e\x6c\xea\x31\xbc\xdd\x85\x83\x74\x24\x22\x6c\xd9\x07\xc7\x9b\x2e\xbc\x19\xd6\xab\x1d\xfb\x37\x01\x6b\x20\x0d\x46\x69\x85\xac\x1a\xe1\x32\xad\xb2\x6a\x2c\x22\x3c\x66\x8b\x9b\x62\xb9\xc0\x63\x5a\x96\x69\xbe\xc8\xe6\x15\x8a\x12\xd3\x22\x9f\x65\x8b\xac\xc8\x2b\x14\x57\x48\xf3\x15\x6e\xb3\x7c\x36\x06\x71\x68\xc8\x81\x9e\x5b\x37\xf8\x5b\x07\x1e\xc6\x48\xdb\x61\x66\x15\xd1\x1b\x81\x9d\x3d\x09\xf9\x96\x14\xef\x58\x41\x4b\x53\x77\xb2\x26\xd4\xf6\x1b\x39\xc3\xa6\x46\x4b\x6e\xcf\x7e\xf8\x4c\x0f\x69\xb6\x22\x82\xe6\x3d\x07\x19\x8e\x27\x7f\x3c\x2a\x16\x22\x2d\xaf\x07\xfb\x79\x76\x9f\x5e\xcf\xc5\x55\x59\xdc\xe3\x9f\x9f\x7b\x31\x2d\x8b\xaa\x5a\x5f\x2e\xb3\xbb\xd9\x7a\x5a\x3c\xac\xf0\x44\xfb\x6e\xf2\x71\x7e\xbf\x4c\xcb\xe9\xcd\xc4\x0f\x68\x85\xa4\xf3\x2e\xd9\xb0\x49\x84\x28\x97\x39\xfa\x6e\x0f\x36\x3e\x48\xad\x31\xe9\x11\xa4\xab\x29\x28\xcd\x38\x3b\x3b\xd6\x94\x26\x69\x20\xb5\x16\xe9\x6c\x06\xd7\x99\x35\x7b\xe5\x79\x7d\x0a\xc6\xbe\x39\x01\xb5\x55\x52\x9f\xb0\x43\x6e\xa3\xad\xfa\x1a\x07\xe9\xe2\xfa\x3b\x12\x21\xe6\xf9\xa2\x5c\x3d\x14\x59\xbe\xc0\xe7\xd1\x6f\x0d\x7f\x61\x8e\xbe\x88\x1f\x01\x00\x00\xff\xff\x28\x6d\xd2\xab\x38\x03\x00\x00") + +func testImagesVolumeIscsiDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeIscsiDockerfile, + "test/images/volume/iscsi/Dockerfile", + ) +} + +func testImagesVolumeIscsiDockerfile() (*asset, error) { + bytes, err := testImagesVolumeIscsiDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/iscsi/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeIscsiVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd2\x33\xe4\x02\x04\x00\x00\xff\xff\x70\x6a\x3d\x6f\x04\x00\x00\x00") + +func testImagesVolumeIscsiVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeIscsiVersion, + "test/images/volume/iscsi/VERSION", + ) +} + +func testImagesVolumeIscsiVersion() (*asset, error) { + bytes, err := testImagesVolumeIscsiVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/iscsi/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeIscsiBlockTarGz = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\xdd\x79\x58\x53\x67\xbe\x07\xf0\x28\x2a\x3a\xb6\xd2\xd6\x8e\xd6\x52\xc5\xd6\x05\x2b\xe2\x52\xab\x28\x08\xb8\x4c\x55\x44\x8c\xcb\x54\x54\x36\xa9\x28\x6a\x59\x5c\x58\x15\x12\x2b\x55\x3a\xb6\xb2\xa5\x82\x82\x24\x76\x0c\x64\x54\x10\x05\x25\xc8\x16\x94\x51\x44\x96\x68\x82\x06\x12\x11\x14\x25\x1e\xd9\x44\x22\x09\x21\xcb\x7d\xea\x5c\xdf\x73\xef\xf3\xdc\x79\x9e\xb9\x73\x6f\x27\x9d\xfa\xfd\xfc\xf9\x3b\xe7\xfd\xfd\x7e\xef\x9b\xf7\x9c\xf3\x8f\xbe\x58\x7d\x3f\x94\x91\x50\x9c\xe0\xc9\x30\x6b\x57\x44\x16\x2b\xbf\xf4\xaa\xe8\x2e\x7a\xeb\xcf\xdf\x9d\xd8\x96\x79\x65\xec\x1e\x57\xdb\x8f\xfc\x3c\xff\xec\x96\x97\xe4\x79\xcb\x71\x4e\x4a\xf9\xd9\xa7\x33\x4f\x57\x6f\xde\xbe\x75\x4a\x50\xc3\xd2\x73\xc9\xb6\xe6\xe1\xb6\x29\xd3\x6c\xab\x0e\x7d\xa6\xc8\xab\xa9\xcb\x6a\x6f\xde\x94\xea\xfa\xc5\x9f\x6c\x4a\x9c\xa7\x38\xae\x1e\x53\x75\x73\x8a\xb8\x87\x6a\x19\xac\xde\x2b\x12\x59\xed\xed\x8a\x89\xf4\xe9\xf3\x8f\x6b\x2c\x51\x17\xc4\x06\x44\x05\x75\xfc\xe0\xd1\x2e\x0f\xbd\xda\xd4\xf2\x09\x5b\xf4\xe4\xbc\x17\x4f\xa3\xf9\x6e\x42\x78\x87\x3c\xf4\xaf\x89\xc2\x82\x86\x9a\x17\x7d\x13\xc2\x1e\xe8\x92\xed\x9a\xb6\x3b\x38\x57\xf8\xc8\x06\xaf\x6a\x14\x1a\x8f\xaf\xdb\xa4\x98\xb7\xb5\xeb\x81\x9e\x47\x85\x1a\x1b\xf6\x1e\x30\x06\x8f\x4b\x7c\x90\x7f\x65\xf7\xe3\xbb\x73\xe7\x72\x0d\xf2\x9a\xa3\x7b\x99\x8a\xfa\xfa\xe2\xa7\x3d\xbd\xdd\xb5\x0b\xe6\x95\xe8\xaa\xfb\xd7\xa7\x59\x2a\x79\x6c\xa1\x3a\xd0\xfb\x79\x61\xe1\x8c\x28\xea\x50\x57\x51\x94\xbd\x63\xe3\xd4\xc0\x8c\x8e\x90\x8a\xf0\x93\xdd\xcf\xac\x17\xa8\x9f\xb6\x39\xb5\x0c\x89\xdf\x5f\x3d\xc6\x7f\xc1\x8b\x30\x9e\x76\xeb\xfd\x10\x63\xa5\x45\xf6\x08\x76\x73\xfa\x38\xd5\x85\xd8\xae\x62\xf1\x9d\xf0\x82\x1e\xb6\xb2\xa8\x41\xb7\xd2\xc2\xea\x72\x77\xd2\xb9\x93\x3d\xad\x8a\x93\x6a\x7e\x4a\xc9\xee\xa6\xb4\x5a\x07\x75\xe3\xcb\x47\x4b\x9c\xbb\xdb\xff\xdc\x54\x61\xe4\x9b\x45\x2f\x8a\x8d\x9a\xce\x9a\xa5\x99\x16\xa8\xb4\x7b\x1a\x17\xb2\x5a\x7b\xfb\xf2\xb8\xfd\xcf\xef\xdd\x88\x63\xb2\x58\x1b\xb8\x82\x18\xc9\xc7\xb2\xf3\xbc\x81\x3c\x5d\x54\xcf\xbd\x86\x08\xf9\xaa\x58\x6f\xa5\x94\x17\x6c\xc5\x11\xf3\x63\xe2\xe6\x97\xf5\x33\xc5\xfd\xd2\x5e\xca\x3c\xc2\xb8\xb1\x6f\xa5\xfd\xd3\x2c\xb3\x62\x63\x7b\xb1\x73\x20\x2f\xfa\x80\x9a\xf7\xf3\x2d\xb5\xf3\xcb\xfa\x7b\x44\xd9\x97\xd2\xa7\xf7\xea\x63\x03\x5b\xfb\x9b\xaa\xd5\xa2\xc8\x03\x5d\xce\x5d\x4c\x85\xb0\x54\xa3\x0e\xee\x5d\xc0\x54\xe8\x19\x62\xa6\xb8\xe7\x52\xb4\x76\x00\x37\x7e\x01\x53\xd1\xc2\x10\x8b\x6b\x7b\x2e\x45\xf7\x0e\xe0\x8a\x17\x30\x15\xd4\x0b\x05\xcf\x70\xf2\x72\xa0\xb0\x4e\xba\x3c\xaf\x53\xac\x61\xff\x54\xa6\x4c\x1c\x6b\xfb\xf2\x73\x49\x96\xc2\xe0\xfb\x7b\xf3\xcb\x3f\xc7\x83\xfa\x63\xbf\xf4\xcc\xcc\xe0\x2e\x4d\x0d\x55\x38\x67\x3d\x6a\x4e\xde\xf7\xe1\x8e\x7b\x81\xc6\x0b\x47\xaa\xf2\xc9\xe5\xf3\xe4\x72\x02\x7d\x59\xf8\xfa\xf2\x47\xf2\xb5\xcc\x09\x35\x85\x1d\x56\xeb\x77\x1f\x22\x97\x67\x6c\x3f\x23\x48\xdc\xd6\xd8\x6b\x71\xae\xe0\x2b\x57\xc7\xa3\x9f\xb7\xe5\xb3\x37\x5c\x1f\x4d\xa7\x3c\x43\x52\xde\x22\x0d\xf9\xd4\x91\x44\xc7\xe8\x44\x41\x24\xd1\x4e\x92\x28\xe5\x12\x49\x94\x4d\x12\x3d\xa3\x13\xd1\x1d\x1d\x25\x89\xbe\xa6\x8b\x9f\x23\x63\xe4\x64\x8c\x6c\xc7\xeb\x3a\xdb\x49\x2c\x96\xac\x50\xd4\x46\x52\x3b\xd4\xe3\xd9\x0e\xfe\x46\xa1\xbe\x7c\xea\x79\x19\x29\xa3\x27\x65\x2c\x49\x6b\xf7\x2f\x90\x32\x55\x64\x4c\x10\x3d\xc7\x16\x32\x26\x8d\x8c\x89\xfa\x82\xd4\x71\x27\xfd\x7e\xf4\x80\x8c\x91\x92\x31\xe9\xa4\xcb\x65\x74\xc5\x2c\x52\xf1\x26\xb9\xd1\x8b\xdc\x68\x17\x4c\x96\x92\x2e\x63\x4b\xb7\x76\xf7\x75\x99\xee\x2f\xe9\xe4\xf4\x12\x84\x92\x31\x32\xba\xdf\x40\x3a\x48\xdf\x19\x4d\x82\xd9\x74\x76\x29\xc9\xfe\x36\xc9\x2e\x0c\x7c\xdd\x91\xe6\x06\x69\x38\x78\x27\x09\xb6\x92\xa0\x82\x64\xff\xa8\x91\x24\xb2\xa5\x13\xd1\x53\x5b\x42\x8a\x8f\x25\xc5\x3b\xc9\xaa\x77\x67\x93\x31\x4d\xf7\xc8\xb2\x2a\x49\x9d\x22\x7a\x31\x2f\x93\xc5\x0c\x22\x63\xc2\xe9\x3a\xcb\x48\x1d\x47\x52\xa7\xb4\x84\x8c\xf1\x26\x63\xd4\xf4\x0e\x66\x92\x31\xe1\x74\x1d\x21\x19\xc3\xa2\xc7\x90\x3a\x11\x0b\x5f\x8f\xf9\x82\xc4\xe6\xd1\xcf\x6b\x3d\xe9\xbc\x65\xd3\xeb\x2e\xe2\xe8\x1b\x7f\x22\x37\xfe\x95\xdc\x68\x4e\x36\xd6\x82\xbf\x90\xcb\x7c\xfa\x32\x79\xb0\x17\xf0\x5f\x5f\xfe\x2a\x9c\x34\x5e\x49\x7a\xdc\x4f\x0a\xf6\xd2\x19\x2f\x91\x8c\xbe\xe4\x46\x01\x99\x6b\xfb\xd7\xaf\x3b\xab\x6f\x22\x8b\x4f\x3f\xd6\xe5\xf4\x42\xe6\x91\x3c\x97\x48\x67\xf4\x46\x5f\x90\x4b\x2e\x17\x91\x2e\x4a\x8b\x48\x90\x6e\x6d\x1c\xbd\xa9\x4b\xe8\x86\xe8\x29\x16\x92\x31\xb3\xc8\x65\x7f\xba\x4e\x3e\xb9\xbc\x9b\x5c\x8e\xa7\x7f\x9b\xc5\xa4\xf5\x91\x74\xeb\x39\x64\x8c\x0b\xbd\xd7\xc8\x74\xbb\xcd\x48\xd0\xb9\x9e\x04\x97\xd0\xc1\xfb\x64\x61\xb6\x91\xec\xf1\xa4\x23\xdd\x76\x3a\x48\x1e\x09\x5d\x04\x09\x32\xe9\x3b\xfd\x48\x90\x43\x9a\xe3\x4a\x48\xc9\x75\x74\x49\xfa\x89\xaa\x23\x8b\xcd\x23\xef\x43\x4d\x03\x1d\x24\xbf\x9f\xa6\x8f\x04\xef\x90\x86\xd7\x93\x8a\x52\xf2\x03\x70\xc9\xcb\xab\xfb\x07\x32\xc4\x9f\xde\x30\xf4\xbb\xb8\x81\x34\x24\x26\xb5\x23\x82\x48\xca\x1e\x92\x92\x45\xef\xea\xd1\xf4\xcc\xe8\x15\x3e\x48\xea\xd0\x1f\x9c\x62\x7a\xab\xa7\x90\x44\xde\x64\xad\xbb\xab\x48\x71\x11\xbd\x44\x49\x24\x51\x0a\x49\xa4\xa3\xb7\x6b\x0e\xf9\x01\x8a\xe9\x17\xaf\x8c\x74\xc4\x3a\x4d\x82\x4f\x48\xf6\x1c\xf2\x5d\x8c\xd8\x4a\x12\x9d\x23\x1d\xd5\x92\x77\x85\xa6\x86\x14\x6f\x22\x2f\xc4\x08\xfa\x1d\x1c\x4c\xf6\x70\x31\xfd\x36\x08\xa7\xd7\x88\x7e\xab\xa8\xe9\xa0\x88\x04\x2d\x48\xd0\x40\x7f\xa6\xe2\xe9\x60\x01\x09\x5e\x26\xbd\xb3\xe9\x95\x11\xd0\x41\xf2\x16\xed\x56\xd2\x41\xb2\x27\xba\x0b\xc9\x34\x44\x01\x64\x1a\xf4\x07\xc2\x92\x94\x7c\x40\x3f\x0d\xee\x24\xd1\x7f\xf9\x16\xb4\xd1\x89\xe8\xad\xa9\x20\x41\x3b\xb2\x1e\x3a\x2f\x92\x9d\x54\x9c\x27\x20\xf3\xa1\x3f\x1a\xc1\xe4\xeb\x13\xe1\x41\x86\x28\xc8\xef\xf7\x80\x9e\x44\x2d\x5d\x9b\x3c\xfc\x9a\x58\x12\x0c\xa7\x37\x02\xfd\x0e\xb2\xa2\x13\xd1\x9f\xbe\x07\x64\x8c\x9a\x1e\x43\xff\x2a\x3c\xfa\x07\xb8\x42\x82\x3e\xf4\xee\xa0\x3f\x97\x32\x92\x88\x4d\x3f\x93\xe4\x53\x71\x3d\x92\x4c\xd2\x8a\xac\x81\x66\x35\xb9\x1c\x4b\x7a\x73\xa2\x7f\xd3\x3b\x24\x25\xfd\x66\x39\xf9\xfa\xa9\x4a\xde\xbd\xc1\x7e\x72\xfa\xb1\xda\x33\x3f\xe7\x4c\x6b\x30\x6e\xeb\x15\x9d\xd0\x07\x73\xd7\xfd\x9c\x23\x3f\xd7\x98\xdd\xce\xb6\xe9\x6f\xb2\x17\xbc\x1a\xc3\x1e\xe6\xa5\x7c\xcf\xa0\x65\xc9\xcb\x32\x94\x3a\x1b\x6f\xb9\xcf\x55\x63\xbe\xab\x76\xa4\x85\x13\xdb\xb3\xe0\xc8\x6c\x1f\x56\x6b\xf4\x8c\x76\xf6\xde\xa3\x5d\x57\xdc\x0c\xb9\x2d\x8f\x58\xfa\x8e\xa3\xd9\xcc\xe2\x4c\x83\xe5\x43\x33\xc3\x92\x6f\xc4\xdf\x48\xad\xd2\x45\xed\xf7\x2f\xb6\x48\xd9\xc6\xc0\xa0\x80\xb1\xfb\x2a\x0d\x0d\x0e\xf9\x86\x1e\xd9\x2e\xca\xbe\x88\x65\x68\x2f\x2e\xe0\x39\x7b\x58\xba\x17\xdd\x6c\xab\xad\x12\xf3\x2c\x32\x2d\x32\x2c\x04\xf1\xfc\xf8\xcc\xf8\x8c\x1e\xbb\x19\x11\x7d\x37\xb6\xc9\x57\x28\x78\xd7\x45\x6a\xff\xc7\xea\xa6\x63\x73\xa7\x77\xca\x9a\xb2\xac\xbe\xe7\x69\xa6\x74\xcc\x2b\x73\x6e\x16\x35\x47\x76\xb1\x6b\xe6\x8c\x78\xb1\xff\x5d\xc6\x9b\xe4\x80\xd1\x3c\x5f\xf2\x93\x65\x9a\x47\xac\xb1\xa2\xc2\xc3\x23\x56\x59\x10\xe5\x54\x7a\xeb\xc6\xc7\x1e\x45\xea\x4e\x05\x9b\x33\x52\xcd\x2d\x54\x6a\xf6\xe5\x5f\xec\x2e\xec\x58\x32\x97\x29\xdf\xab\x1b\x26\x18\x6b\x38\xa5\xb7\xee\x2a\xfd\xa3\x28\xa4\xf9\xbd\xb3\xe9\x3e\x21\x46\x65\x10\x3b\xca\x58\xf6\x49\x98\xa7\xdc\x87\xb1\xeb\xcc\x45\xf6\x86\x14\x7d\x79\x61\xbb\xd5\xbd\xad\xc6\x0b\xd3\xfb\x63\x43\x1b\x9c\xb3\xaa\x0c\xbe\x5e\xbd\x16\x6d\xb9\xaf\x2e\x25\xe5\xcf\xb5\x9b\x9b\x6f\xe7\x64\x98\xd0\x7c\x2a\xe4\x44\xc8\xae\xc2\x80\x42\x4f\x7b\xbf\x96\x6b\xce\x13\x2e\x5c\xdc\x7d\x48\x35\x98\x3a\x42\x0d\x97\x1e\x93\x1c\x93\x8e\x0e\xac\xe3\xfd\x5e\x5e\xaf\x79\x14\x72\x57\x35\x89\xda\x49\x3d\xa3\x5c\xa5\x73\x24\x73\xa4\x97\x25\x97\xa5\xa1\x6b\x5d\x63\x33\x66\xb8\xca\xdc\x64\xae\x32\xa6\xdd\x72\xbb\x95\x3e\xdc\xa0\x1f\x83\x4e\x06\x25\x95\x7e\x12\xbd\xf5\xac\x73\xea\x2e\xe9\xa5\xd9\x63\x13\x83\x92\xe3\x56\x16\x49\x6a\xa4\xb6\x12\x5b\x69\xb6\xc4\x3d\xe3\xb4\xc4\x5d\x90\xe3\xe2\x93\x56\x3a\x3d\x3a\xba\x30\xb4\xd0\x4d\x7b\x38\x44\xa1\x3a\x4a\xa5\x49\xec\x04\x8a\x8c\xd3\x52\x21\x5f\x21\x70\xe0\x3b\x64\x3a\x64\x04\xbb\x35\x25\x77\x9e\xec\x4c\xea\x4c\xed\x4c\xee\xe4\x76\x26\x76\x9e\x28\x75\x6c\xb4\x69\x74\x68\xb4\x8e\x5e\x56\x18\x5c\xe8\x53\xc8\xde\xb7\xf0\x19\x75\x3c\x24\xc0\x7e\xfa\x58\xde\xaa\xe5\xd6\x99\xe6\x99\xe6\x19\x1c\x49\x8c\x74\xc9\x5a\xfd\x9a\x73\x1c\x29\xf7\x92\x9d\xe3\xe7\x8e\xd3\xd2\x93\x7a\x33\xf4\x54\x9d\xea\xb9\x2a\x9d\xba\xa4\xfa\x4e\x75\x53\xe5\x45\x15\x49\xd5\xfc\x65\x19\x5d\x6e\x02\xc1\x32\x41\x05\x7f\xb6\x64\x8b\xb4\x45\xd2\x22\x1d\x29\x19\x29\x55\x67\x58\x67\x74\x31\x9d\x13\x58\x33\xf5\xab\xb5\x0f\x43\xb6\x69\x13\x55\xa7\xa9\x0a\x49\xbc\x80\xb7\xdc\xf9\x04\xf7\x24\x37\x89\x35\x55\x1f\xb2\x6f\xa7\xf6\x84\x2a\x8f\x52\x4a\xc4\x82\xc4\xda\x15\x4c\x57\x26\x53\xbc\x5c\xbc\x52\xbc\x42\xbc\x4a\xec\x22\x76\x13\xbb\x8a\x12\x58\xb3\x1c\x9d\x4b\xc6\x97\xcc\x2c\x99\xa2\x5f\xbb\x6f\xb7\xf6\x89\xca\x86\x9a\x44\x65\x50\xee\xd2\x9c\x8c\x94\x0c\x1f\xa6\x28\xd1\x9b\xeb\x9d\xe8\x7d\xc2\xfb\x58\xed\x2a\xd1\x09\x96\x4d\x89\xbd\x3e\x6c\x9f\x9b\x36\x5d\x55\x44\xa9\x25\x5d\x02\xe7\xe5\xec\xe3\x86\x29\xfa\xdd\xfb\x02\xb5\x1c\x95\x80\x12\x4b\x78\x02\xd1\xf2\x1c\x57\xf6\x09\x6f\xde\x83\x84\x07\xc7\x0d\x53\x4b\x3e\xd5\x87\x6a\xd3\x54\x42\xaa\x86\xea\x92\xac\x54\xf2\x85\x7c\x61\xa6\x30\x43\x28\x08\xe7\x87\x67\x8a\x98\xc6\x84\x07\xc7\x1e\xa4\x1b\x66\x95\x58\x97\xd8\x95\xcc\x28\x71\xd6\xaf\xd3\x2a\x55\x33\xa8\xfb\xaa\x1c\xaa\x49\x62\x2e\x89\xa4\x62\xa8\x25\x54\x39\x35\x81\x3a\x4d\x6d\xa1\x74\x97\x12\x1b\x83\x83\xee\x99\x7b\x74\xc9\x75\x9a\x2b\xdd\x87\x63\x9d\x32\x33\x0d\x2e\x23\x4a\xab\x2d\xdb\x2a\xca\x07\x2b\xb2\x94\xfd\xab\xea\xa3\x25\xdc\x75\xcc\xfe\xba\x94\x01\xc6\xd8\x93\x85\xca\x82\x92\xfd\xab\x16\xec\x10\x0f\xab\x70\x6e\xae\x3b\xdd\x3b\xae\xbf\x79\x64\x9c\xc2\x78\x60\x5d\x9c\x7d\xa8\xb8\x73\x4b\x9c\xa3\x6f\xb8\xd3\x15\xe3\x5f\xa2\x1d\x66\x74\xe4\xbc\x59\x8f\x31\xfc\x27\x8d\x6e\x8f\x6a\x58\x51\x78\x57\xa0\x35\x37\x57\xfd\x38\x4c\x52\xda\xd2\x9b\x1e\x72\x33\x43\x3f\x78\x80\xa9\x3b\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xbb\x74\x0e\x0e\x2f\x73\x3e\xfc\xe2\xfd\x65\x03\x22\xb6\x05\x1f\x3e\xe0\xb2\xc3\xb7\x85\x37\x5e\x33\x70\x6e\xd8\x8d\x15\xc3\x1d\x3c\xbe\x7f\x3c\x26\xa0\x6e\xf1\x90\x94\xf1\x1b\x3a\x26\x4c\x3c\x75\xc8\x62\xf3\xc7\x1b\xa6\xd5\x7b\x7c\x7f\xa8\x60\xfc\xdc\x51\x73\x7f\xf7\xe9\xb7\x2f\xbf\x5d\x53\x9f\xe0\xf9\xf1\x20\xaf\x84\x2e\x8f\x11\xe5\x25\xfe\xac\x99\xa3\xc3\x86\x98\x7a\x4a\x00\x26\x73\x80\x13\x99\x10\xb5\x33\xed\x9c\x32\xb5\xb5\x4f\x91\xdf\xc7\x12\xed\x90\x5f\x37\x48\x12\x2a\x9f\x5d\x38\x59\xcc\xbd\x1f\x98\xda\xa7\xab\x95\x3d\x2c\xf5\x75\xd4\x38\x0a\x93\x55\x1b\xbd\xaa\x42\x7f\xfc\xf1\x71\xaf\xb2\x3b\xcd\x7a\x46\x90\x17\x2b\x6c\xab\xb2\x3b\x42\xf7\xbc\xd5\xc7\xde\xad\x5f\xf0\x62\x4d\xcf\x8b\xf6\xf6\xf2\xa3\x7a\x41\xce\x83\xc6\xfd\x22\x63\x47\xd5\xd5\x9a\x36\x51\xe1\xf5\xbd\xba\x3c\xf3\x83\x93\x6c\xfa\x62\xce\x4f\xf4\x7a\xd1\xa2\xab\x7d\xf6\x97\x8d\xf3\xef\x07\xf3\x99\x85\x8f\xab\x0f\xc5\xe4\x94\x3d\x2c\x6d\xac\x76\xe0\xfe\xe8\xa7\x7f\x74\xa7\x34\xc0\xdf\x9a\xca\xb7\xe9\x89\x6e\xe5\x48\xdc\x5b\xd5\xb9\x9c\x90\xfd\xc7\xfa\x76\xb4\x72\x3e\xcb\xae\x16\xe7\x72\x42\xf2\x6e\x45\xb1\x4e\xf3\x27\x56\xd4\x06\x5f\x9a\xcf\x4e\xeb\x11\x1e\xeb\xf1\x77\xfa\x34\xad\x42\x2c\xf4\xa0\x38\xb9\x5f\x52\xfd\x2a\x17\xca\x46\x1f\xa4\xe5\xb7\xaf\xd7\xee\xd0\xf2\x57\xda\xe8\x2b\x54\x2e\x2e\xf7\x6e\xdd\x19\x67\xea\x35\x36\xad\x51\x35\xcc\x27\xda\x5c\x2b\xab\xe6\x41\xab\xd4\xd7\x63\x8c\x95\xb9\x4d\x4b\x4d\xdd\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x8f\x9a\xad\x1d\x42\x57\x9b\x31\x18\xd7\x16\xae\x1c\x68\xb8\x7b\xd0\xcc\x7b\x62\xc2\xed\xa9\x05\x62\xfc\xa3\x06\x78\xc3\x08\xfd\x6c\xf2\x7b\x18\x43\x5e\xc6\x9b\xf3\x02\xf0\x1f\xe0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x37\xe8\x48\xba\xd6\xfd\xe8\x27\x47\x4e\x33\xa2\xfc\xff\xc9\xf3\x12\x7e\x18\xbf\xc8\xfd\x71\xff\xe1\xf2\x99\xea\x6a\x8b\xd6\x6b\xd5\xa6\x9e\x10\xc0\xff\x9a\xf1\xf8\xfe\xca\xd8\x4c\x4f\xa7\x75\xb7\xa4\x32\xb7\xbe\x7d\xc2\x1f\xb7\x5d\x14\xdd\xf6\xcf\x95\xfb\xac\xf2\x5e\x15\x94\xf2\x19\xaf\x49\x7b\xbf\x49\xe6\xa3\x66\xd5\x66\x4f\xf2\x3a\xf3\x64\x45\xed\x69\xfe\x64\x3b\xe7\x38\x1f\xc7\x7d\x61\x2d\x8f\x38\xae\x0e\x16\x15\x2d\xfd\x32\xe3\xed\xa0\x54\x9f\x63\x16\xb7\x7a\xa4\x79\xe1\xb2\x5e\x2b\x51\xc4\x5e\x65\x87\x21\x85\x69\x6e\x97\x63\x7c\x3a\x4a\xdd\x2d\x1b\x37\x34\x39\xab\x75\xb0\x97\x8b\xfc\xb1\xa2\x21\xfd\xee\x9a\xbf\x9d\x72\x20\x7f\x5c\x77\x25\x46\x54\xf6\xb0\xb4\xa1\xda\x8e\x5b\xe7\xa7\xd7\xdd\x29\x0d\xf2\x9f\xb4\x43\x68\xde\x5a\x54\x6d\x7d\xd9\xf2\x78\x53\xd5\x0a\x49\xe7\xdb\xd5\xcc\xd9\xbc\x3a\xaa\x4c\x37\xcd\xc6\xc5\xc1\xf2\xb8\x78\xd6\x8a\x9d\x7b\xda\x75\x4b\x39\x7a\xbb\x06\xf6\xec\x0b\xc6\x6a\xeb\xd0\x1e\x4d\xdf\x36\x9b\xe8\xb5\xc2\x21\xda\xe9\xd1\x6b\x8b\xbe\x61\xd9\x45\xaf\x0d\x37\xd7\xee\xd0\xf2\x57\x99\x6b\xd5\x14\x27\x35\xeb\xee\x69\x47\x53\xaf\xb1\x69\x4d\x4b\xe5\xdd\xbc\xbb\xd5\xd9\xa9\x2c\x78\x5e\x83\x95\x85\xc1\xba\xca\xf0\x21\x4e\xbd\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\x6d\x3b\xd0\xd5\x5e\xb7\xe8\x6d\x06\x63\xa8\xd9\xac\x61\x1a\xf7\xe1\x23\x22\x12\x17\x2e\x3e\xd7\xec\x64\x69\xea\xbe\x00\xfe\x21\xf7\x93\xb2\xeb\x6b\xcd\x3e\xa8\x73\x1e\x17\x95\x5b\x82\x93\xfc\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xae\x29\x61\xcf\x7c\xe6\x1c\x99\x12\x37\xf0\x79\x7a\xc9\x98\x81\x93\x33\x0e\x1d\x65\x1f\x6c\x1e\x5e\x5f\x3f\xc6\xc6\xb6\x3d\xc0\x36\xc9\xff\xc2\x9a\xe1\x63\x3c\x0f\x6e\xbe\x1c\x9f\x70\x60\x94\xd3\x81\x43\x9b\x2f\x6e\x0e\xb6\x1d\xf5\xe8\x60\xfd\x86\xfa\x29\xfc\x77\xee\x8d\x5c\xea\xbb\xe4\xb3\x83\x83\xbc\x12\xbb\x2c\x47\x94\xdf\x9f\xed\x7c\x7c\xf8\x6c\x33\x53\xcf\x08\xde\x18\xba\x2d\x9d\x93\xac\x52\xf7\xf4\xad\xfc\x94\xe9\x63\xf7\xa4\xad\x71\x6d\xea\x75\xc3\x62\x5e\xe5\x4e\xf6\xfc\xc8\xf9\x57\xbc\x6e\x45\xb1\xda\xf6\xb2\x7d\xd8\x8d\xfd\xf3\x85\xc9\x21\x19\xb6\xee\x7b\xc6\x4d\x9a\x73\xa5\x6f\xb7\xee\xd9\x9d\x3c\xcb\xd1\x3c\x4f\x79\xe4\xbc\x71\x4d\x22\x43\x6c\x98\x54\x77\x36\x6a\x35\x97\xc7\x2d\x29\xca\x37\x6a\xae\xa7\x39\x04\xab\x45\x51\xf6\x05\x91\xfa\x65\xc2\x82\x78\x51\xef\xc2\x0b\x7e\x73\x66\x3c\x5d\x21\x99\xdc\x54\xdb\x99\x15\x77\xeb\xd6\x43\xd6\x84\x68\xc9\x64\x41\xed\x58\xdd\xe0\x11\xea\x9a\x6d\xa5\xdd\xfc\xc9\x6d\xca\xf8\xde\x50\x07\x1b\x97\x22\xc7\x99\x4d\x5b\x9d\xce\x34\x96\xe9\xbc\xd7\x27\x85\x05\x6f\x66\xa5\xf6\xf1\x57\x99\xb7\xfa\x6f\x74\x91\x37\x94\x45\xc5\xad\x59\xcb\xd9\xa2\xb4\x4b\x6d\x17\x55\x1a\xd2\xbe\xd1\xfb\x3b\x9d\x49\xab\x10\xdb\x79\x50\x9c\xc2\x39\xb7\xc3\x29\x8e\xfc\x6d\x55\x11\xc5\x29\x74\xb8\xcd\x94\x5a\x87\xda\xdf\x16\x31\x79\x75\x7e\xd9\xe3\x3a\xde\xec\xff\xd5\xbf\xf9\x8e\xee\x0f\xe7\xa7\xf7\x77\x0f\x60\x95\x57\x1a\x22\x9e\x3b\x6f\xec\x95\x0d\x35\x75\x4f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\x6f\x22\xca\x5f\x30\x62\x27\x83\xb1\xf0\x83\xef\x5c\xca\x44\x9b\x76\x95\x7d\x3f\xe8\xbd\x4d\x83\xd5\x0d\xa6\x6e\x0b\x7e\xdb\x9a\x93\x03\xae\x87\x8d\x2b\x3b\x65\xe8\x6e\xe6\x74\xcc\x19\x68\xea\x76\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7e\xfb\x16\x5e\x5c\x67\x3c\xbb\xe6\x0f\xbb\xdf\x3f\xd0\xd5\x5e\x93\x9b\xc0\xbf\x74\xa1\x9b\xf9\x4e\xd4\x00\x4b\x87\x2d\x19\x87\xd2\xb3\xbf\x78\xf1\xd6\xdc\x9d\x1f\xc7\xb8\xbe\x93\xd5\xfb\xee\x7b\xb7\xaf\x99\x5f\x78\x67\xda\xa8\xf6\xec\xeb\x8b\x3d\xdf\xb1\x1c\x6e\x69\xf6\xe9\xb7\x2f\xbf\x5d\x53\x9f\xf0\xc3\xf8\x45\xee\x8f\xfb\x0f\x97\xcf\x54\x57\x5b\xb4\x5e\xab\x36\xf5\x8c\xe0\x57\xcf\x78\xbc\xbf\xb2\x22\xd3\x73\xbe\xc7\xad\x3c\x3b\xb7\x06\x91\xfb\x8a\xbc\x7a\x9f\xf6\xcf\xc6\x84\xa6\x70\xdc\x39\x0e\x19\xd5\x4a\xa1\x28\x44\x1d\x2a\x4b\xe7\xed\xfd\xda\xc5\x63\xe9\x93\x9d\xb5\x31\xfc\xc9\x42\xa7\xa3\x3e\xce\x2c\x56\x8f\x44\x5a\xe5\x10\x7f\xa3\xc5\xdc\xce\x70\x3b\x28\xd5\xe7\x98\x45\xd5\xf7\xb3\xf3\xd4\x32\x0b\x6e\x71\xd4\x7e\x75\xe3\x55\x99\x38\xd6\x2e\xc7\xf8\x74\x94\xba\x5b\x36\x6e\x68\x72\x56\xeb\x60\x2f\x97\xc3\x95\xc2\xbd\x0e\xa7\x17\x6d\x9c\x2f\x0f\xe6\x33\x0f\x57\x3e\xeb\x2b\x17\x95\xdd\x29\x6d\xa8\xb6\xe3\xd6\xf9\xe9\xaf\x75\x97\x06\xf9\x4f\x1a\x13\xa4\xae\x16\x9e\x60\xee\x54\xcc\x16\xa5\x1c\xf3\x2b\x90\xcd\x76\xae\x89\x5a\x2b\x70\xec\xc9\xcb\x9a\x58\xbe\x51\x1c\x15\xb7\x68\x2d\x67\xe4\xeb\x73\x0e\xb8\xaf\xce\x39\xb0\xfe\xdb\x39\x07\x77\xa5\x42\x8a\x23\xef\x7d\x75\xce\x81\x42\xca\x94\x5a\x87\xca\xa5\xec\xe5\xaf\xce\x39\xe8\x7a\xe3\xcf\x39\xf8\xe3\x79\xdb\x57\xe7\x1c\x50\x38\xe7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x4c\x03\x07\x26\xc0\x3f\x0e\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xbb\x5a\x78\x71\x5d\xc5\xd9\x35\x7f\xf0\x7d\x75\x60\xc2\x7b\x9f\x7f\x6a\x1b\x50\x37\xe8\xea\xe8\x0b\x17\x67\xaf\xdf\x54\xdf\xb0\x69\xa2\x78\xf3\x96\x69\x7e\xbb\x86\x1d\xbc\xeb\xb4\x78\xe0\x26\x0d\x63\xd4\xc1\xeb\x07\x4b\x2e\x6f\xf8\x6e\xf8\x57\x5b\x12\x97\x7e\x7c\xe8\x02\x77\xe6\xef\x2c\x93\xde\x9d\xf8\xf4\x48\x54\xd3\xae\x0f\x5a\xb9\x7d\xbe\xd3\xab\xdf\x32\xf5\x8c\xe0\x17\xf2\x3c\xbe\x61\x95\xd3\xdc\x27\xcf\xfa\xd6\x72\x4b\x76\xdc\x92\xf5\x67\x7c\xde\xa3\xdf\x94\xd2\xbd\x27\x7c\x3e\x6b\x4e\xa9\xc7\xad\x80\x30\x7f\x51\x51\x4e\x51\xa7\xee\xa4\x87\x8b\x7c\x4f\xa6\x67\x55\x64\x42\xdd\xe3\x5e\xc1\x9d\xb6\x0a\x71\xb0\x17\x6b\xdf\x56\xe5\x9d\xed\xaa\xe6\x56\x2b\xb9\x5b\xcf\xb9\x17\xbe\x91\xbb\x83\xb4\x86\x1b\x57\x39\x29\xc1\x5d\x25\x0e\x9a\x17\x7d\xcf\x5b\xef\x5a\x35\xea\x9c\x0c\x72\xb3\xab\x07\xef\x16\x9f\x72\xad\x9c\xd9\x17\xe6\xeb\x1f\xb9\x3a\x39\xae\xb7\x8d\xe2\xf8\xee\xe9\x7d\xf4\xd0\xa7\x79\x7b\x53\xc0\x63\x4b\xe6\xce\xdc\x7d\x54\x84\x8f\x30\x37\xe9\x2d\xe1\xbe\x56\x45\xb5\xf5\xe5\x8e\x13\x4d\x55\x2b\x3e\xbb\xdf\x76\x82\xe7\xe7\x74\x86\xc3\xed\xdb\xb1\x3e\xe9\xe1\x25\x7f\xa7\x8a\xf1\x67\x2a\xff\xd4\xd3\xe6\xd6\xdb\xe4\x67\x74\x13\x1b\x66\xf3\xea\x8e\x72\x94\x69\x35\x2a\x97\xc6\x76\x4a\xa1\x72\x09\xdc\xaf\x6d\x54\xb9\x34\x76\x50\xd6\x14\xc7\x9e\xa2\x9c\xf9\xcc\x9d\xb9\x6b\xe3\xd5\xa6\x5e\x64\xd3\x9a\x19\x1c\x36\x55\x36\x5a\xaf\x61\x88\x1e\x86\xb0\x17\x68\x78\xd3\xb4\x5f\x0f\x32\x75\x4f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xa4\xd2\xbc\x75\xe6\x73\x18\x8c\xf1\x6f\xfd\x75\x62\xb3\x8f\xed\xbc\xe6\x2f\x06\x0e\xcb\x3e\xd8\x1f\x60\xea\xb6\xe0\xff\xd3\x2e\xd7\xfc\xaf\x1c\x2c\x36\xaf\x36\x46\x3c\xaf\xec\xfd\xf0\xcd\xfe\xdb\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x6f\xa8\x53\xf5\x67\x62\x3e\x64\x30\xde\x19\xf2\xd5\x7b\xcf\x73\x46\x7d\xf4\xfc\x93\x6f\xbe\x5d\x7f\x35\x7a\xae\xa9\xdb\x82\xff\x0e\x7f\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\x4f\x56\xb7\xd7\x2d\x7a\x9b\xc1\x18\x6a\x36\x6b\x98\xc6\x7d\xf8\x88\x88\xc4\x85\x8b\xcf\x35\x3b\x59\x9a\xba\xad\xdf\x9e\x32\xdb\x86\x23\x1d\x0b\x0e\x2c\xd2\xb7\x5c\xb5\x56\xe0\x98\x7a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xd7\x9a\x12\xf6\xec\xd4\x10\x06\xe3\xdb\x6f\x8e\x0f\xd2\x9d\x1b\x6c\x5e\xbc\x7c\xfc\x4f\x5f\xee\xe2\xbd\x6d\xea\xb6\x7e\x8d\x0e\x78\xe4\xfe\x5e\x11\xc9\x88\xd1\x56\xc4\x30\xf3\x65\x43\x4d\xdd\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x3f\xee\x7d\x87\xd0\xd5\x66\x0c\xc6\xb5\x85\x2b\x07\x1a\xee\x1e\x34\xf3\x9e\x98\x70\x7b\x6a\x81\x78\x88\xa9\xdb\xfa\x85\x08\xfd\x6c\xf2\x7b\x18\x43\x5e\xc6\x9b\xf3\x02\x72\xde\x35\x75\x37\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x2a\x67\xa3\xed\xa7\x0e\x60\x1c\xf6\x9d\x32\xc5\x37\x59\x19\xb5\xf7\xb6\x48\xf2\x7e\xe7\x5b\x0b\x86\xfe\x7a\xcf\xbf\xbf\xf9\x62\x85\xc0\x81\xdd\xe6\x74\xfb\x4c\x7f\x73\x64\xe6\xe8\xd8\x8f\xa4\xc1\xbf\xde\x66\x01\xe0\x97\xb3\x39\xc5\x42\xf2\x62\xe9\x09\xc6\x07\x09\xe6\xff\x11\x00\x00\xff\xff\xc8\xee\xdd\x5b\xe2\xf6\x01\x00") + +func testImagesVolumeIscsiBlockTarGzBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeIscsiBlockTarGz, + "test/images/volume/iscsi/block.tar.gz", + ) +} + +func testImagesVolumeIscsiBlockTarGz() (*asset, error) { + bytes, err := testImagesVolumeIscsiBlockTarGzBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/iscsi/block.tar.gz", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeIscsiCreate_blockSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x93\xdf\x6f\xdb\xb6\x17\xc5\xdf\xf9\x57\x9c\xaf\x94\x87\x04\xdf\x44\xb2\x0d\xec\xa5\x83\x3b\x38\x89\x87\x0a\xad\x1d\xc0\x56\xd7\xf5\x69\xa0\xa5\x2b\x89\x30\x45\x6a\xe4\x95\x7f\x64\xdd\xff\x3e\x50\x72\xda\x66\x7d\x98\x1e\xc5\xc3\x73\x3f\xf7\xf0\xde\xf8\x7f\x69\xef\x5d\xba\x53\x26\x25\x73\xc0\x4e\xfa\x46\x88\x18\x0f\xb6\x3b\x3b\x55\x37\x8c\xd9\x64\xfa\x13\xf2\x86\xf0\xbe\xdf\x91\x33\xc4\xe4\xb1\xe8\xb9\xb1\xce\x27\x22\x16\x31\x3e\xa8\x82\x8c\xa7\x12\xbd\x29\xc9\x81\x1b\xc2\xa2\x93\x45\x43\x2f\x27\xb7\xf8\x8d\x9c\x57\xd6\x60\x96\x4c\x70\x1d\x04\xd1\xe5\x28\xba\xf9\x59\xc4\x38\xdb\x1e\xad\x3c\xc3\x58\x46\xef\x09\xdc\x28\x8f\x4a\x69\x02\x9d\x0a\xea\x18\xca\xa0\xb0\x6d\xa7\x95\x34\x05\xe1\xa8\xb8\x19\xca\x5c\x4c\x12\x11\xe3\xf3\xc5\xc2\xee\x58\x2a\x03\x89\xc2\x76\x67\xd8\xea\x7b\x1d\x24\x0f\xc0\xe1\x6b\x98\xbb\x37\x69\x7a\x3c\x1e\x13\x39\xc0\x26\xd6\xd5\xa9\x1e\x85\x3e\xfd\x90\x3d\x2c\xd7\xdb\xe5\xdd\x2c\x99\x0c\x57\x3e\x1a\x4d\xde\xc3\xd1\x9f\xbd\x72\x54\x62\x77\x86\xec\x3a\xad\x0a\xb9\xd3\x04\x2d\x8f\xb0\x0e\xb2\x76\x44\x25\xd8\x06\xde\xa3\x53\xac\x4c\x7d\x0b\x6f\x2b\x3e\x4a\x47\x22\x46\xa9\x3c\x3b\xb5\xeb\xf9\x55\x58\x2f\x74\xca\xbf\x12\x58\x03\x69\x10\x2d\xb6\xc8\xb6\x11\xee\x17\xdb\x6c\x7b\x2b\x62\x7c\xca\xf2\x77\x4f\x1f\x73\x7c\x5a\x6c\x36\x8b\x75\x9e\x2d\xb7\x78\xda\xe0\xe1\x69\xfd\x98\xe5\xd9\xd3\x7a\x8b\xa7\x5f\xb1\x58\x7f\xc6\xfb\x6c\xfd\x78\x0b\x52\xdc\x90\x03\x9d\x3a\x17\xf8\xad\x83\x0a\x31\x52\x19\x32\xdb\x12\xbd\x02\xa8\xec\x08\xe4\x3b\x2a\x54\xa5\x0a\x68\x69\xea\x5e\xd6\x84\xda\x1e\xc8\x19\x65\x6a\x74\xe4\x5a\xe5\xc3\x63\x7a\x48\x53\x8a\x18\x5a\xb5\x8a\x25\x0f\x7f\x7e\x68\x2a\x09\xb3\xb4\x3c\x29\x0e\xed\x84\xff\x95\x72\x9e\x41\xce\x59\x97\x08\x4f\x8c\x3b\x12\x62\xb5\xce\x1f\xb3\xcd\x3c\xba\xba\x6e\xf7\x4c\x6d\x87\xbb\xf2\x26\x12\xa2\xd0\x24\x4d\xdf\x5d\xdf\x88\xbf\x44\x78\xb3\x18\x2b\xb9\x27\xf8\xde\x11\x8e\x04\x47\xdc\xbb\xd1\x75\x9c\x54\x0a\x75\x0a\x5b\xd2\xa0\xde\x2c\xf3\xf9\xd5\x2f\x97\x8b\x5b\xa5\xc9\xb0\x3e\xc3\x51\x6b\x0f\x04\x3a\x90\x3b\x73\x13\x3a\x92\xa6\x84\xaa\x8d\x75\x34\x62\xf9\xe1\x4a\x40\xfb\xff\x68\x34\xec\x46\xdf\xda\xde\x30\xa2\xab\x91\x35\xc2\xec\x6d\x5a\xd2\x21\x35\xbd\xd6\xdf\x54\xae\x2d\x95\xfb\x6f\x11\x76\xda\x16\xfb\x1f\x4e\x07\xfe\xab\xcd\x32\x17\x7f\x0b\xc1\x4e\x76\xb8\x24\x80\x7c\xb9\x59\x61\xf9\x7b\x96\x0f\xab\xe9\x48\x32\x61\x3a\x9b\xac\xee\x51\xd2\x41\xbd\xac\x04\x9d\x78\x26\x62\x5c\x1f\xac\xee\x5b\xfa\x43\x59\x30\x79\xf6\x30\x61\x2a\x25\x43\x93\xf4\x8c\xe9\x64\xb2\xba\xbf\x11\x65\x09\x55\xcd\x07\x80\x67\x72\x16\xb6\x9a\x8f\x54\x9e\x68\x3f\x9f\xce\x26\x28\x42\xc7\xf3\x29\x76\x7e\x3e\x5d\x89\x76\x5f\xf9\x24\x54\x18\xe1\x03\xc8\x22\x78\x98\x92\x4e\x49\xc3\xad\x1e\xe6\x9e\xc5\x98\xd3\x9d\x85\xb6\xb6\xbb\x34\xfa\x35\x10\x41\x45\x63\x11\xbd\x23\xad\x2d\x2a\x67\x5b\x28\x5f\x78\x15\xe1\xed\x57\x4d\xfa\xcd\x31\x12\xff\x4e\x5d\x88\x97\xf0\x12\x96\x2e\xa9\x9f\xbf\xcf\x10\x5f\xbe\xe0\x8d\x60\xe9\x50\x54\xcf\xaf\x55\x23\xf2\x3f\x01\x00\x00\xff\xff\x2c\xc9\xba\x04\xeb\x04\x00\x00") + +func testImagesVolumeIscsiCreate_blockShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeIscsiCreate_blockSh, + "test/images/volume/iscsi/create_block.sh", + ) +} + +func testImagesVolumeIscsiCreate_blockSh() (*asset, error) { + bytes, err := testImagesVolumeIscsiCreate_blockShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/iscsi/create_block.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeIscsiRun_iscsi_targetSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x56\x5d\x6f\xdb\x36\x17\xbe\xd7\xaf\x78\x5e\xbb\xc0\x9b\x14\xb1\xe4\xf4\x6a\x58\x91\x0b\x2f\xcd\x50\xa3\xa9\x83\xc4\xce\x8a\x5e\x05\xb4\x74\x2c\x1d\x44\x22\x55\xf2\xd0\xae\x37\xec\xbf\x0f\x24\xe5\xd4\x69\xbb\x0e\xcd\x55\xcc\x8f\x73\x9e\xf3\x7c\x10\x1a\xff\xaf\xf0\xce\x16\x6b\xd6\x05\xe9\x2d\xd6\xca\x35\x59\x36\xc6\xa5\xe9\xf7\x96\xeb\x46\xf0\x6a\x7a\xfe\x0b\x56\x0d\xe1\x9d\x5f\x93\xd5\x24\xe4\x30\xf3\xd2\x18\xeb\xf2\x6c\x9c\x8d\x71\xcd\x25\x69\x47\x15\xbc\xae\xc8\x42\x1a\xc2\xac\x57\x65\x43\x87\x9d\x33\xfc\x41\xd6\xb1\xd1\x78\x95\x4f\x71\x12\x0e\x8c\x86\xad\xd1\xe9\xeb\x6c\x8c\xbd\xf1\xe8\xd4\x1e\xda\x08\xbc\x23\x48\xc3\x0e\x1b\x6e\x09\xf4\xb9\xa4\x5e\xc0\x1a\xa5\xe9\xfa\x96\x95\x2e\x09\x3b\x96\x26\xb6\x19\x8a\xe4\xd9\x18\x1f\x87\x12\x66\x2d\x8a\x35\x14\x4a\xd3\xef\x61\x36\xc7\xe7\xa0\x24\x02\x0e\x7f\x8d\x48\xff\x6b\x51\xec\x76\xbb\x5c\x45\xb0\xb9\xb1\x75\xd1\xa6\x83\xae\xb8\x9e\x5f\x5e\x2d\x96\x57\x93\x57\xf9\x34\x5e\xb9\xd7\x2d\x39\x07\x4b\x9f\x3c\x5b\xaa\xb0\xde\x43\xf5\x7d\xcb\xa5\x5a\xb7\x84\x56\xed\x60\x2c\x54\x6d\x89\x2a\x88\x09\x78\x77\x96\x85\x75\x7d\x06\x67\x36\xb2\x53\x96\xb2\x31\x2a\x76\x62\x79\xed\xe5\x19\x59\x07\x74\xec\x9e\x1d\x30\x1a\x4a\x63\x34\x5b\x62\xbe\x1c\xe1\xb7\xd9\x72\xbe\x3c\xcb\xc6\xf8\x30\x5f\xbd\xbd\xb9\x5f\xe1\xc3\xec\xee\x6e\xb6\x58\xcd\xaf\x96\xb8\xb9\xc3\xe5\xcd\xe2\xcd\x7c\x35\xbf\x59\x2c\x71\xf3\x3b\x66\x8b\x8f\x78\x37\x5f\xbc\x39\x03\xb1\x34\x64\x41\x9f\x7b\x1b\xf0\x1b\x0b\x0e\x34\x52\x15\x38\x5b\x12\x3d\x03\xb0\x31\x09\x90\xeb\xa9\xe4\x0d\x97\x68\x95\xae\xbd\xaa\x09\xb5\xd9\x92\xd5\xac\x6b\xf4\x64\x3b\x76\x41\x4c\x07\xa5\xab\x6c\x8c\x96\x3b\x16\x25\x71\xe5\x9b\xa1\xf2\xe0\xa5\x55\x90\xd3\x95\x96\x7b\x41\x65\xc8\x45\x9d\xad\x0f\xf3\xed\x51\x29\xea\x8c\x3e\x03\x0b\x8c\x6e\xf7\x28\x8d\xde\x70\xed\x2d\x39\xf0\xf2\x72\x39\x87\x28\x5b\x93\xe0\xe4\xc2\x91\xdd\x92\x3d\xcd\xc6\x81\xde\xc7\x60\xc5\x36\xc7\x5c\x02\x6f\xbd\x71\x8e\x83\x12\x62\x62\x61\x39\xea\xd8\xf9\x56\xb8\x0f\x7b\xdc\x91\x8b\xb4\xc2\xb1\xae\xdb\xa0\x88\x36\x15\x9d\x81\x54\xd9\xc4\x7b\x3b\x6e\x5b\x94\x96\x94\x10\x58\x1c\xcc\x4e\x63\x7e\xbb\x08\x93\xe2\xfa\x7e\x11\xa7\x39\x8a\x41\xe7\x9d\xa0\xb7\x66\xcb\x15\xc1\x6b\xfe\xe4\x09\x5a\x75\x94\x67\xf3\xdb\xc5\xc5\x8b\xf3\x70\x3c\xc1\x2f\x5b\x86\xdb\xeb\xb2\xb1\x46\xf3\x9f\x01\xc6\x96\x2c\xaa\xb5\x77\x67\x68\xcc\x8e\xc2\x2f\x3e\x62\x67\x67\xec\x23\x58\x67\xe3\xc0\x47\x70\x34\x59\x97\xe3\x3e\x88\xd4\x9a\x32\x6c\x39\x21\x55\x65\xd7\x37\x97\xef\x2e\x0a\x67\xb7\x05\xbb\xd2\x71\xf1\xd4\x2d\x0f\xc7\xb2\x6c\xe3\x75\x19\xa4\x81\x13\x65\xe5\xe4\x34\xfb\x2b\x0b\xee\x3f\x86\xa5\x83\x67\x03\x92\x48\xe6\x21\x86\x81\x0d\xa3\xa3\x94\x8d\x71\x12\x6c\x9c\x6a\x40\xa1\xb7\xbc\x0d\x0c\x19\x4d\xb1\x5a\xf7\x58\xb1\x45\x61\xbd\x2e\x42\x9d\xb8\x16\xfe\x99\x24\x6d\x81\xc9\xc4\xed\x9d\x50\x97\x0d\xcd\x2f\x13\xc3\x9a\x76\x91\xdd\x93\x24\xf4\xad\x57\x2d\x6f\x98\x2a\x2c\x54\x47\xa7\xf1\x6c\x9a\xf6\x45\x18\xf3\x08\x72\x1a\xf6\x20\xd4\xe8\xc5\xfc\x76\x31\x1a\x4a\xdf\x79\x1d\x88\x64\x8d\x8a\x3a\x83\x2e\xea\xcb\x39\xe5\xd0\x06\xca\x4b\x43\x5a\xb8\x8c\x76\xfd\xcf\x06\x45\xaa\x5c\x48\x5f\x9f\xc3\x91\x40\xc9\x90\xce\xaf\x2a\x5d\x4c\x63\xb7\x87\xd0\xed\x21\x04\x9f\x1e\x7a\x6b\x84\x4a\xb9\x98\xa2\x26\x4d\x56\x09\x3d\x04\xaf\x3d\xa8\xb2\x75\x17\xe7\x28\xc3\x93\xf3\x50\xed\xb5\xea\xb8\x1c\x16\xbf\x62\x67\xf0\xd3\x68\x1d\x11\x6e\x4d\xeb\x3b\x1a\xe1\x24\xce\xb2\x69\x95\xc4\x07\xf2\xf4\x20\xd2\xcb\xa0\xd2\xcb\x7c\x28\xf1\x56\x6d\x43\x58\x13\x11\x61\xfb\xc9\x45\x31\x5f\xde\x91\x1b\x12\x84\x8d\x35\x1d\x9c\xe9\x08\x96\x94\x1b\x58\x19\x47\xc7\xb3\xfc\x3f\xb9\x51\x0d\xd1\x4a\x09\xfc\x92\xa8\xeb\xfb\x85\x4b\x05\x2a\xde\x6c\xc8\x92\x96\xe1\xfa\x91\x6b\x87\x95\x2f\x26\x4d\xb1\x59\x13\xd6\xac\xab\x49\x67\xbc\x96\x54\xe4\x60\xb6\x74\xa5\xec\x51\xa4\xd9\x8f\xfc\x3d\x68\x3d\xd4\x7c\xaf\x1e\xd3\x0b\x76\xcc\x11\xd4\x56\x71\x9b\x20\x37\xd6\xf8\xba\x81\xf1\x36\xc5\xd8\x05\xc8\x98\xfe\x48\xf9\xb5\x2a\x1f\x9d\x18\x4b\xae\x08\x04\xb3\x39\xd8\x2c\xf6\x98\x24\x00\xdf\x81\xf4\x33\x66\x2a\x5a\xaf\xdd\xa1\xee\xb7\x1d\x8b\xe3\x56\x69\x56\x2a\x1b\x83\x51\xa2\x6f\x78\x10\x63\x1a\xa9\x1a\x65\x7f\x3f\x8b\xb9\xe9\x9f\x52\x9e\x2e\x85\xa5\x3e\xba\xe1\xe8\xf6\x53\x5c\xa8\x33\x5b\x0a\xe4\xfc\xfc\x00\x05\x2a\x6a\x49\xe8\xc7\x7c\xa6\xae\xc3\xc9\xe7\x51\x4d\xbd\x93\x76\x15\x6d\xb9\x24\x74\x2a\x62\xfd\x39\x81\x86\xe2\xcf\x58\x0b\x05\xe2\x47\x8d\xed\x30\xd9\xfc\x8b\x5e\xdf\x65\xd5\xf4\x7d\x60\x35\xee\x7f\x66\xc1\x34\x10\x9c\x89\x55\x7d\xdc\xc4\xea\xea\xee\x7d\x16\xc9\xcf\xb2\x5d\x13\x3e\x52\xc4\x7a\x7a\x8d\xca\xc4\x3b\xae\x25\xea\x71\x9e\x55\xe1\x75\xfc\x27\x00\x00\xff\xff\x66\xfb\xb9\xf5\x5d\x09\x00\x00") + +func testImagesVolumeIscsiRun_iscsi_targetShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeIscsiRun_iscsi_targetSh, + "test/images/volume/iscsi/run_iscsi_target.sh", + ) +} + +func testImagesVolumeIscsiRun_iscsi_targetSh() (*asset, error) { + bytes, err := testImagesVolumeIscsiRun_iscsi_targetShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/iscsi/run_iscsi_target.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeNfsBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\x4e\xcd\x2b\xc9\x2f\xb6\x32\xe7\x82\x0a\x16\xe5\x9a\x99\xd8\x82\xc9\x32\x0b\x7d\x34\xc9\x82\x82\x64\x33\x93\x9c\x54\x5b\x28\x8d\x90\x06\x04\x00\x00\xff\xff\x95\x2b\xa6\xc1\x51\x00\x00\x00") + +func testImagesVolumeNfsBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeNfsBaseimage, + "test/images/volume/nfs/BASEIMAGE", + ) +} + +func testImagesVolumeNfsBaseimage() (*asset, error) { + bytes, err := testImagesVolumeNfsBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/nfs/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeNfsDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x91\x5f\x8f\xdb\x36\x10\xc4\xdf\xf9\x29\x06\x52\x11\xb4\x80\x2d\xb9\x87\x43\xd0\x3f\x4f\x8a\xad\x24\x42\xce\xd2\x55\xb2\x93\x1e\x8a\xe0\x40\x4b\x6b\x8b\x08\x45\x32\x24\x55\x9f\xbf\x7d\x41\xd9\x89\x7b\x39\xbd\xed\xce\x68\xf6\xb7\xcb\x18\x4b\x6d\x4e\x56\x1c\x7a\x8f\x9b\xc5\xaf\xaf\xb1\xe9\x09\x1f\xc6\x1d\x59\x45\x9e\x1c\xb2\xd1\xf7\xda\xba\x84\xc5\x2c\xc6\x9d\x68\x49\x39\xea\x30\xaa\x8e\x2c\x7c\x4f\xc8\x0c\x6f\x7b\xfa\xa6\xcc\xf0\x91\xac\x13\x5a\xe1\x26\x59\xe0\xe7\x60\x88\x2e\x52\xf4\xcb\x9f\x2c\xc6\x49\x8f\x18\xf8\x09\x4a\x7b\x8c\x8e\xe0\x7b\xe1\xb0\x17\x92\x40\x4f\x2d\x19\x0f\xa1\xd0\xea\xc1\x48\xc1\x55\x4b\x38\x0a\xdf\x4f\x63\x2e\x21\x09\x8b\xf1\x70\x89\xd0\x3b\xcf\x85\x02\x47\xab\xcd\x09\x7a\xff\x7f\x1f\xb8\x9f\x80\xc3\xd7\x7b\x6f\xfe\x48\xd3\xe3\xf1\x98\xf0\x09\x36\xd1\xf6\x90\xca\xb3\xd1\xa5\x77\xc5\x32\x2f\x9b\x7c\x7e\x93\x2c\xa6\x5f\xb6\x4a\x92\x73\xb0\xf4\x75\x14\x96\x3a\xec\x4e\xe0\xc6\x48\xd1\xf2\x9d\x24\x48\x7e\x84\xb6\xe0\x07\x4b\xd4\xc1\xeb\xc0\x7b\xb4\xc2\x0b\x75\x98\xc1\xe9\xbd\x3f\x72\x4b\x2c\x46\x27\x9c\xb7\x62\x37\xfa\x67\xc7\xfa\x46\x27\xdc\x33\x83\x56\xe0\x0a\x51\xd6\xa0\x68\x22\xbc\xc9\x9a\xa2\x99\xb1\x18\x9f\x8a\xcd\xfb\x6a\xbb\xc1\xa7\xac\xae\xb3\x72\x53\xe4\x0d\xaa\x1a\xcb\xaa\x5c\x15\x9b\xa2\x2a\x1b\x54\x6f\x91\x95\x0f\xf8\x50\x94\xab\x19\x48\xf8\x9e\x2c\xe8\xc9\xd8\xc0\xaf\x2d\x44\x38\x23\x75\xe1\x66\x0d\xd1\x33\x80\xbd\x3e\x03\x39\x43\xad\xd8\x8b\x16\x92\xab\xc3\xc8\x0f\x84\x83\xfe\x97\xac\x12\xea\x00\x43\x76\x10\x2e\x3c\xa6\x03\x57\x1d\x8b\x21\xc5\x20\x3c\xf7\x53\xe7\xc5\x52\x09\x63\x59\xfd\x2e\xd0\xe7\xc5\x3a\x7b\x97\xb3\xb7\x75\xb5\xc6\x4f\xd7\x9a\x2d\xeb\xaa\x69\x1e\xdf\x6c\x8b\xbb\xd5\xe3\xb2\xba\x7f\xc0\x57\x1a\xc6\xf9\x5f\xf9\x7a\x9b\xd5\xcb\xf7\x73\x17\xa2\x5b\xa4\xa3\xb3\xe9\x4e\xa8\x94\xd5\xdb\x12\xa7\x71\xc0\xfc\x04\xa1\x9c\xe7\x52\x5e\x45\xe3\xa0\xf6\x6e\x3e\x7a\x21\x1d\x5e\xbd\x9a\x7c\xad\x24\xae\xc0\xa5\x9c\xfe\x1c\xbe\x74\xc2\x62\x6e\x90\xd2\x93\xd1\xd6\x3b\x96\xad\x56\xb0\xa3\x7a\x54\x7b\x97\xb8\xfe\x9c\x25\x75\xcb\xe5\x79\x5c\x90\x85\xea\xe8\x29\xe9\xfd\x20\x91\xfa\xc1\xa4\xd7\x7a\xca\x6c\xfb\x41\x77\x78\x7d\x7b\xfb\x42\x65\x31\x06\x6e\xbf\x7c\x1f\x06\xee\xc0\x31\xe8\x51\x79\x18\x2d\x94\x67\x1f\xab\xbb\xed\x3a\xbf\xd2\xc4\xe1\xa9\xb4\xa3\xb3\xa9\xc3\xcd\x62\x71\xfb\x5b\xea\x5b\x13\x8e\x1d\x96\x0b\xad\xdb\xdf\x43\x87\xe5\x7f\xdf\x57\x4d\xfe\xbd\xbe\x7a\x19\xcb\xcb\x4d\xfd\x70\x5f\x15\xe5\x06\xff\x44\x3f\xac\x74\x5d\x36\xfa\xcc\x96\xeb\x55\x70\x5c\xc6\x47\x33\x44\x69\xf4\x99\xfd\x17\x00\x00\xff\xff\xe0\xaf\x66\x45\xff\x03\x00\x00") + +func testImagesVolumeNfsDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeNfsDockerfile, + "test/images/volume/nfs/Dockerfile", + ) +} + +func testImagesVolumeNfsDockerfile() (*asset, error) { + bytes, err := testImagesVolumeNfsDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/nfs/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeNfsVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe4\x02\x04\x00\x00\xff\xff\x9e\xc5\x88\x7d\x04\x00\x00\x00") + +func testImagesVolumeNfsVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeNfsVersion, + "test/images/volume/nfs/VERSION", + ) +} + +func testImagesVolumeNfsVersion() (*asset, error) { + bytes, err := testImagesVolumeNfsVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/nfs/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeNfsIndexHtml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xf2\x48\xcd\xc9\xc9\x57\x48\x2b\xca\xcf\x55\xf0\x73\x0b\x56\xe4\x02\x04\x00\x00\xff\xff\x3a\x50\xf2\x93\x10\x00\x00\x00") + +func testImagesVolumeNfsIndexHtmlBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeNfsIndexHtml, + "test/images/volume/nfs/index.html", + ) +} + +func testImagesVolumeNfsIndexHtml() (*asset, error) { + bytes, err := testImagesVolumeNfsIndexHtmlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/nfs/index.html", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeNfsRun_nfsSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x55\x51\x6f\xdb\x38\x13\x7c\xd7\xaf\x98\x4f\xf6\x43\x5c\xd8\x96\x92\xb6\x5f\x81\x04\xed\x9d\xaf\x4d\x72\x46\x7b\x76\x11\xb9\x2d\x8a\x43\x51\xd0\xe4\x4a\x22\x2a\x93\x2c\x49\xd9\x31\x8a\xfe\xf7\x03\x29\xc7\xb1\x93\x96\x0f\x89\xc4\x1d\x2e\x67\x67\x56\xeb\xde\xff\xb2\xd6\xd9\x6c\x29\x55\x46\x6a\x8d\x25\x73\x75\x92\xf4\xf0\x5a\x9b\xad\x95\x55\xed\x71\x96\x9f\x3e\xc7\xa2\x26\xbc\x6d\x97\x64\x15\x79\x72\x98\xb4\xbe\xd6\xd6\x8d\x93\x5e\xd2\xc3\x3b\xc9\x49\x39\x12\x68\x95\x20\x0b\x5f\x13\x26\x86\xf1\x9a\xee\x22\x43\x7c\x24\xeb\xa4\x56\x38\x1b\xe7\x38\x09\x80\x74\x17\x4a\x07\x17\x49\x0f\x5b\xdd\x62\xc5\xb6\x50\xda\xa3\x75\x04\x5f\x4b\x87\x52\x36\x04\xba\xe5\x64\x3c\xa4\x02\xd7\x2b\xd3\x48\xa6\x38\x61\x23\x7d\x1d\xaf\xd9\x25\x19\x27\x3d\x7c\xde\xa5\xd0\x4b\xcf\xa4\x02\x03\xd7\x66\x0b\x5d\x1e\xe2\xc0\x7c\x24\x1c\x56\xed\xbd\x39\xcf\xb2\xcd\x66\x33\x66\x91\xec\x58\xdb\x2a\x6b\x3a\xa0\xcb\xde\x4d\x5f\x5f\xce\x8a\xcb\xd1\xd9\x38\x8f\x47\x3e\xa8\x86\x9c\x83\xa5\xef\xad\xb4\x24\xb0\xdc\x82\x19\xd3\x48\xce\x96\x0d\xa1\x61\x1b\x68\x0b\x56\x59\x22\x01\xaf\x03\xdf\x8d\x95\x5e\xaa\x6a\x08\xa7\x4b\xbf\x61\x96\x92\x1e\x84\x74\xde\xca\x65\xeb\x8f\xc4\xba\x63\x27\xdd\x11\x40\x2b\x30\x85\x74\x52\x60\x5a\xa4\xf8\x6b\x52\x4c\x8b\x61\xd2\xc3\xa7\xe9\xe2\xef\xf9\x87\x05\x3e\x4d\x6e\x6e\x26\xb3\xc5\xf4\xb2\xc0\xfc\x06\xaf\xe7\xb3\x37\xd3\xc5\x74\x3e\x2b\x30\xbf\xc2\x64\xf6\x19\x6f\xa7\xb3\x37\x43\x90\xf4\x35\x59\xd0\xad\xb1\x81\xbf\xb6\x90\x41\x46\x12\x41\xb3\x82\xe8\x88\x40\xa9\x3b\x42\xce\x10\x97\xa5\xe4\x68\x98\xaa\x5a\x56\x11\x2a\xbd\x26\xab\xa4\xaa\x60\xc8\xae\xa4\x0b\x66\x3a\x30\x25\x92\x1e\x1a\xb9\x92\x9e\xf9\xb8\xf3\xa8\xa8\x71\x92\x94\xad\xe2\x21\x0a\xe7\x99\xf5\x27\x83\xe4\x47\x92\x04\x07\x5a\xe5\xc8\xa3\x92\x22\xbe\xf5\xc0\x78\xb4\x3a\x1d\x5d\x87\xcd\x14\xda\x84\x53\x31\xb8\xa9\x43\x2f\x54\xe4\xb5\xf1\x0e\xe9\xf5\x79\x8c\x5e\x40\xe8\x18\x0e\x8b\x33\x47\xe8\xff\xd0\xc6\xff\x84\x54\xfb\xed\xb0\xae\x07\x21\xe1\xcb\xfe\x8f\xf9\xfb\xc5\xe4\xe6\xfa\xe7\xc5\xc5\x51\xf8\xc9\xe0\xfc\x60\x87\x1c\xe3\xf1\x45\x68\x45\xf1\xc1\xd5\xb2\xf4\xe8\x9f\x9c\xcc\xdf\x2f\xa6\xb3\x37\x18\xe1\x74\x30\x48\x76\xa4\x8d\x25\xc3\x2c\x21\x23\xcf\x33\xba\x35\xda\x7a\x17\x43\x41\x4b\x19\xfa\x20\xed\xff\x99\x1e\x31\xed\xa1\x74\x52\xbc\xcc\xcf\xa1\x88\x04\x89\x08\x9d\x5d\x15\xeb\x67\xf7\x24\x78\xad\x91\xf6\x25\x9e\x9c\xd8\xcd\xb0\x83\x0f\xa5\x72\xc4\x5b\x4b\x43\xa5\xbf\x5a\xad\xfd\x57\xf7\xbd\x65\xae\x1e\xa4\x78\xf5\xea\xf1\xfd\x61\xc9\x12\xff\x62\xb4\x0e\xd5\xe3\x0b\x2e\x82\x2f\xc7\xca\xf0\x7a\xa5\x05\xf2\x17\x79\xb8\x2c\x7d\x10\xaa\xac\x41\xda\x8f\x56\x1c\x45\x4b\x79\x50\xca\x4a\xaf\x09\x52\x09\xba\x1d\xd7\x7e\xd5\x84\xde\xaf\xc9\xd2\x1e\x11\xe7\x0a\x37\xc8\xfc\xca\x64\x07\xb8\xb4\x2f\xb3\xfb\x94\x1d\x8f\xff\x3f\x7b\x16\xf7\xef\x61\xe9\x03\x45\x0a\xb2\xeb\xd0\x84\x77\x74\xa2\x47\x3b\x27\x62\x77\xc1\x1a\xbe\x94\x4a\x84\xd2\xa5\x0f\x5f\x54\x18\x29\x31\x44\x02\x5b\xf2\x11\x1c\x07\x9e\x0b\xcc\xac\xe1\x52\x95\x1a\xa7\x67\x2f\xc6\xf9\x38\x1f\x9f\xe2\x15\x32\x41\xeb\x4c\xb5\x4d\x73\x01\xf7\xb2\xff\x47\xb2\x57\xb2\xef\x30\x52\x84\x1c\x5f\x8e\xa5\xdc\x71\x0b\x97\x04\x72\x3b\x0a\x7b\xee\x47\xb7\x45\x72\xa3\x4d\xb2\x13\x32\xfe\x5f\xe9\x56\x79\x8c\x3c\x54\xe9\x44\xf7\x27\x33\x56\xf3\xac\x74\x59\x78\xbb\xab\x70\xf4\x11\x4f\xcf\x41\x2a\x8e\x9c\xd0\x30\x4f\x1f\x57\x33\x8e\xc9\x04\x46\x33\x9c\xc5\x03\xc9\x03\x4c\xd7\x23\xa5\xc3\xc8\xde\xa5\xbd\xc6\x69\x1e\x8c\xb3\x24\x5a\x4e\xa8\x2c\xe3\x04\x2f\x57\x14\x36\x4f\x73\x38\xe2\x5a\x09\xd7\x0d\xee\x46\x6f\xc8\x79\xb0\x26\x3c\x88\xc1\x2f\x18\xc4\x02\xba\xa4\xf7\x2c\x1e\xc3\x9c\x67\x81\xe7\x48\xe9\x91\xd2\x5e\x96\xdb\xe4\x5e\xcb\xd9\x55\x71\x67\x5a\x9a\xfc\x3c\x1a\x21\xda\xc4\x09\x72\xa8\xbb\x36\x26\xe8\x3e\xbb\x2a\xd2\x87\xd5\xee\xf9\xe4\xbf\x95\x81\xb5\xbf\x0d\x95\x5d\xba\x6f\xb2\x09\x0d\x7b\x02\x23\x85\x2e\x71\xa0\xf2\xa0\x33\xb9\xed\x1c\x3c\x36\x6d\xcf\xf0\x17\x1f\x27\xdd\x4a\x8f\x3c\x54\x96\x78\xcb\x4c\x2c\x0b\x8b\xcb\x9b\x7f\x92\xa4\x6b\xe3\x30\x34\xc2\xaf\xf0\x87\xaa\xd9\xa2\x66\xfc\x5b\xb0\x42\xe8\xd0\xcd\x75\xa8\x95\x29\x81\x0d\x93\x3e\xce\x8e\x62\x7a\x1d\xcf\x76\x53\xd2\xdb\x96\xf6\xf3\xc6\x35\x44\x06\xcf\x93\xf8\xa1\xfc\x17\x00\x00\xff\xff\xef\x3a\x6f\x36\xea\x07\x00\x00") + +func testImagesVolumeNfsRun_nfsShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeNfsRun_nfsSh, + "test/images/volume/nfs/run_nfs.sh", + ) +} + +func testImagesVolumeNfsRun_nfsSh() (*asset, error) { + bytes, err := testImagesVolumeNfsRun_nfsShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/nfs/run_nfs.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xca\xc9\xcc\x2b\xad\xd0\x4f\xcc\x4d\x31\x33\xb1\x4d\x4b\x4d\xc9\x2f\x4a\xb4\x32\x32\xe3\x82\x8a\x16\xe5\x9a\x99\xd8\x82\xc9\x32\x0b\x7d\x74\xd9\x82\x82\x64\x33\x93\x9c\x54\x5b\x28\x8d\x24\x0f\x08\x00\x00\xff\xff\xdf\x20\xfc\xd2\x54\x00\x00\x00") + +func testImagesVolumeRbdBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdBaseimage, + "test/images/volume/rbd/BASEIMAGE", + ) +} + +func testImagesVolumeRbdBaseimage() (*asset, error) { + bytes, err := testImagesVolumeRbdBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\x5f\x6f\xdb\x36\x14\xc5\xdf\xf9\x29\x0e\xa2\xa1\xd8\x00\x5b\xca\xf2\xd0\xfd\x7b\x99\x62\xab\x89\xd0\xc4\xca\x24\x7b\x5d\x9e\x0a\x8a\xba\x96\x88\x48\x24\x4b\x52\x75\xd5\x4f\x3f\x50\x96\xb1\x66\xf5\x83\x89\x7b\xee\x21\xef\x8f\x87\x8a\xb0\xd1\x66\xb2\xb2\xed\x3c\x6e\xae\x7f\x7e\x8b\x7d\x47\x78\x3f\xd6\x64\x15\x79\x72\x48\x47\xdf\x69\xeb\x62\x16\xb1\x08\x0f\x52\x90\x72\xd4\x60\x54\x0d\x59\xf8\x8e\x90\x1a\x2e\x3a\xba\x74\x56\xf8\x9b\xac\x93\x5a\xe1\x26\xbe\xc6\x8f\xc1\x70\xb5\xb4\xae\x7e\xfa\x83\x45\x98\xf4\x88\x81\x4f\x50\xda\x63\x74\x04\xdf\x49\x87\xa3\xec\x09\xf4\x45\x90\xf1\x90\x0a\x42\x0f\xa6\x97\x5c\x09\xc2\x49\xfa\x6e\x1e\xb3\x1c\x12\xb3\x08\xcf\xcb\x11\xba\xf6\x5c\x2a\x70\x08\x6d\x26\xe8\xe3\xb7\x3e\x70\x3f\x03\x87\x5f\xe7\xbd\xf9\x3d\x49\x4e\xa7\x53\xcc\x67\xd8\x58\xdb\x36\xe9\xcf\x46\x97\x3c\xe4\x9b\x6c\x57\x65\xeb\x9b\xf8\x7a\xde\x72\x50\x3d\x39\x07\x4b\x9f\x46\x69\xa9\x41\x3d\x81\x1b\xd3\x4b\xc1\xeb\x9e\xd0\xf3\x13\xb4\x05\x6f\x2d\x51\x03\xaf\x03\xef\xc9\x4a\x2f\x55\xbb\x82\xd3\x47\x7f\xe2\x96\x58\x84\x46\x3a\x6f\x65\x3d\xfa\x57\x61\x5d\xe8\xa4\x7b\x65\xd0\x0a\x5c\xe1\x2a\xad\x90\x57\x57\xb8\x4d\xab\xbc\x5a\xb1\x08\x1f\xf2\xfd\x7d\x71\xd8\xe3\x43\x5a\x96\xe9\x6e\x9f\x67\x15\x8a\x12\x9b\x62\xb7\xcd\xf7\x79\xb1\xab\x50\xbc\x43\xba\x7b\xc6\xfb\x7c\xb7\x5d\x81\xa4\xef\xc8\x82\xbe\x18\x1b\xf8\xb5\x85\x0c\x31\x52\x13\x32\xab\x88\x5e\x01\x1c\xf5\x19\xc8\x19\x12\xf2\x28\x05\x7a\xae\xda\x91\xb7\x84\x56\x7f\x26\xab\xa4\x6a\x61\xc8\x0e\xd2\x85\xc7\x74\xe0\xaa\x61\x11\x7a\x39\x48\xcf\xfd\xac\x7c\x77\xa9\x98\xb1\x08\x9b\xec\xe9\x1e\xbc\xef\x43\x2c\x5a\x85\x20\x6e\xb9\x3b\xdf\x50\x0e\xe1\xf8\x7a\x42\x29\x05\xb7\x8d\x46\xa9\x45\xc7\x57\xb0\xe7\xf2\x4f\xc1\x3d\xef\x27\xe7\x63\x45\x3e\x56\x5f\x19\x4b\xcb\xbb\x90\x45\x96\x3f\xa6\x77\x19\x7b\x57\x16\x8f\xf8\xe1\xbf\x9a\x6d\xca\xa2\xaa\x3e\xde\x1e\xf2\x87\xed\xc7\x4d\xf1\xf4\x8c\x4f\x34\x8c\xeb\xbf\xb2\xc7\x43\x5a\x6e\xee\xd7\x2e\x80\x0a\x24\xa3\xb3\x49\x2d\x55\xc2\x16\x16\x3c\x71\xf1\xc2\x5b\x72\xac\x3c\xec\x30\x8d\x03\xa4\x72\x3e\x20\xaf\x27\x9c\x5a\xf2\x70\xde\x72\x41\x30\x6e\x90\x4e\xc0\x58\x2d\x8c\x5b\xab\x16\x82\x4c\x37\xff\xad\x8f\xe1\xcb\x7d\xf3\x66\xde\x2d\x7a\xe2\x2a\x5c\x39\x0c\xb8\x23\x0f\xa3\xad\x77\xe1\x19\xb4\xa3\x86\x65\xff\x3c\x15\x55\x86\xb7\xbf\xfc\xfa\x1b\x63\xe9\x76\x8b\x38\xa9\xb5\xf6\x61\x86\x89\x5d\x87\x57\xd5\x62\x18\xb4\x9a\x5b\xe7\xf5\x22\x36\xee\x2c\xce\xeb\x22\x6a\xd7\xcc\xe2\x79\x5d\xc4\x80\x18\x0b\xad\x8e\x73\xeb\xdb\x6a\x31\xbc\xd0\x64\xc3\x03\x27\x9f\xb9\x4d\x7a\x59\xcf\x9e\x30\xed\xd2\xb9\x80\xf6\x5a\xbc\xc4\x9e\xdb\xb8\xfd\x8a\x84\xb1\xcd\xe3\xf6\x7f\xbc\xff\x06\x00\x00\xff\xff\x67\xf6\x5a\x09\x3d\x04\x00\x00") + +func testImagesVolumeRbdDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdDockerfile, + "test/images/volume/rbd/Dockerfile", + ) +} + +func testImagesVolumeRbdDockerfile() (*asset, error) { + bytes, err := testImagesVolumeRbdDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xd0\x33\xe2\x02\x04\x00\x00\xff\xff\xea\xca\x48\xcf\x06\x00\x00\x00") + +func testImagesVolumeRbdVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdVersion, + "test/images/volume/rbd/VERSION", + ) +} + +func testImagesVolumeRbdVersion() (*asset, error) { + bytes, err := testImagesVolumeRbdVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdBlockTarGz = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\xdd\x79\x54\xd3\x57\xda\x07\xf0\x20\xd6\x68\x6d\xc5\x2e\x0e\x75\x5c\x42\x5b\x15\x2d\xa3\xb6\x15\x0c\x6b\xa2\x32\x55\xc1\x91\xb4\x58\x57\x96\x48\xad\x52\x16\x09\x0a\xb2\x84\x25\xa8\xed\xd8\xd1\xb1\x52\x22\xa2\x22\xc4\x56\x30\x65\x50\xa8\xa2\x2c\x09\x24\xa8\x43\x11\x65\xd1\x04\x45\x0c\x10\xea\x06\x91\x4d\x20\x10\x48\x48\xf2\x9e\xe9\x79\xbd\xbf\xf7\x3d\xe7\x9d\x73\xe6\x3d\x67\x66\xd2\x69\xbf\x9f\x3f\x9f\x5f\x9e\xe7\x3e\xf7\xe6\xde\xfb\xfb\x87\x13\x18\x87\x26\xd2\xe4\x43\x9a\xcd\x34\xeb\x6e\x55\xc2\x98\x4e\xe7\x5f\xdd\xdf\xd7\xa7\x93\xee\x38\xe1\x35\x69\xc1\x05\x5d\xda\xab\x4e\x4d\xe1\x4b\x37\x4c\x7a\x73\xc1\x82\x15\x2f\x26\xf4\x5d\x2f\x8d\x09\x08\x6f\x0a\x7d\x7d\xe5\x5b\xb3\x72\xa3\x77\x77\x7a\x1c\xfd\x78\x4a\x56\x74\xe4\x49\xcf\xc7\x89\x07\x3b\xc7\x02\x7f\x7f\x34\xda\x2e\xb8\x6b\xf4\xb7\x5d\x4b\x9b\x73\xaf\x7d\xf2\x38\x49\xde\x37\x5c\x5a\xa0\xee\xd2\x8f\xc9\xa4\xc9\x72\x55\x72\x83\xba\x40\x50\xf0\x9a\xae\xdb\x4d\xc3\xca\xe4\x9c\x6f\xdd\x55\x7b\x7b\x15\x77\x24\xca\xbf\xbb\x63\xdb\x11\x96\x7e\x1b\x8f\x11\xdf\xf8\x75\x75\xdb\xb3\xef\xb6\xf1\xe2\x6a\x2f\x54\x47\xc4\x30\xca\x0c\xc7\xdf\xe6\x5d\x0a\x91\xb2\xab\x18\x4d\x5f\xd4\xbb\x46\x99\x27\x05\x5f\x2a\x76\xd9\xa6\x96\x19\x45\xdd\x46\x53\x51\x07\xcd\xac\x6e\x61\x57\x6c\x0f\x8b\x6a\xbc\xc3\xcc\xb4\xaf\x08\x0d\x1b\xec\x2d\x62\x66\x9e\x3f\xc4\xe6\x31\x7a\x3e\xa2\xf3\x96\x36\x08\x1a\x54\x7d\x5b\x76\xee\x5c\x54\xda\xfe\x55\xdf\x7d\xc9\x33\xe3\x53\x59\x67\xc0\x62\x7e\xeb\x34\x85\x8b\xe6\x87\x10\xb7\x9e\x1c\x7a\x40\xff\xf9\x58\xa9\x3a\x93\xd7\x24\x1a\xbc\x97\x51\xae\xd7\xd2\xfd\x1f\xee\x34\xf7\x5f\x2b\xbd\x62\x52\xf6\xf9\xcd\xda\xf5\xe8\xfc\x11\x97\xa1\x79\x25\x92\xfe\x9d\x7d\xb1\xf7\xcd\x8f\x8a\x9a\xf5\x9f\xda\x70\xc7\xce\x31\xfd\x87\x1e\x37\xc8\xaa\xd2\xb3\xf9\x8f\xc5\xfe\xa6\x20\xa6\xa0\x36\xe0\x69\x96\x8d\xf1\x5e\xd1\x21\xc1\x6c\x73\xe6\x14\xad\xd5\xac\x81\xbc\x91\xba\x76\x79\x88\x3d\xf7\xb4\x54\xb1\x5c\x63\xdd\x94\x78\xef\x8a\x2a\x33\x80\x61\x1e\x7b\xe6\xce\xa1\xe7\x7a\x16\xac\x57\xbf\xc0\x32\x8d\xde\xad\xbb\xd8\x7f\x49\x38\xc5\xa3\xfb\x35\x51\xdf\xa9\x54\xae\x17\x3d\x2b\x32\xa5\x49\x24\x6c\x12\x67\x45\x4d\x79\xa6\x8f\x1a\x74\xd0\x9c\x8e\xb2\x79\xa6\x1f\x1c\xd0\x5f\x8a\x6a\xb3\x0a\x14\x24\x27\xcf\x9d\x15\x6d\xb2\x0a\x14\x09\x8a\x95\x3e\x92\xbf\x36\x31\x64\xe9\x0d\x02\x07\x91\xf9\xae\x15\xcb\x5c\xce\xea\x69\xe9\x4e\xe3\xca\xef\x0c\xba\xf7\x68\xad\xdd\xd9\xf6\x0d\xca\x7a\x17\x7a\x1c\x6b\xc0\xbd\xe7\xcf\xd6\xee\xec\xc5\x0d\xca\xfa\x78\x7a\x1c\x6b\xd0\xbd\x27\xc7\xa1\x3b\xf1\x41\xd4\xdd\x62\xa5\x2f\xe7\xed\x3a\x09\x5b\x63\x5e\xb1\xb7\xc1\x4e\xba\xe5\x69\x48\xce\xe6\x12\xe3\xb5\x77\xa6\x84\xe6\x89\xbf\xde\xd1\x3a\x6c\x93\x5f\xea\xbf\xc6\xe3\xb0\x63\x57\xb1\x60\x53\xd5\x95\x85\x43\x8e\x8a\x73\x2a\x53\xd0\x34\xd1\x9d\x9f\xd2\x7a\x18\x1b\x76\x8d\x1e\xe3\xff\x36\xe4\xee\x4e\xf3\xf7\x07\x3d\x49\x76\xc1\x2d\xf2\xf8\x33\x92\x3d\xcd\xef\xf9\x63\x96\x34\x37\x7b\xe5\xc9\x3d\x2a\xf6\xb9\x07\xde\x54\x49\xe5\xf3\x9c\xfe\x32\x12\xdc\x18\xf1\xbc\x8d\x91\x72\x32\x4e\xfe\xa5\x46\xe5\xea\xa2\x08\xc3\x81\xf5\xfe\x97\x49\xa1\x50\xaa\x90\x9a\x0c\x3e\x44\x72\x16\x7f\x46\x0a\x5d\x25\xc1\x30\x52\x28\xf1\x23\xd2\xa6\x13\x69\xb3\x80\x9a\xe4\xa6\xe7\x8f\x3f\x08\x7b\x5e\xc7\xb9\x9c\x8c\x7d\x88\x4a\x69\x25\x93\x98\x4b\x1a\x6a\x0a\x21\x63\x2b\xa8\x86\x48\xa1\xd2\x08\x32\x76\x46\x09\x99\x59\x21\xa9\xae\x27\x85\xb8\xb7\x49\xf5\x74\x12\x5c\x45\x26\xd1\x72\xfa\x79\xce\x27\xb1\xa4\xe4\xd7\xe4\x83\xcc\x70\xd2\xfa\x5f\x48\xf1\x4e\xd2\xd0\x8c\xcb\xcf\xeb\xcc\x24\xdf\xc4\xae\x70\x52\xe7\x30\x99\x63\x84\x82\x3c\xa6\xb6\xc6\x46\x92\x9d\xb8\x87\x04\x9b\xa8\xd6\x2e\x91\x11\xc3\xa8\x42\x77\x49\xa1\x41\xd2\x86\x1f\xf5\x9d\x04\x90\x42\x0b\xa9\x1c\xea\x3b\xe9\x22\x39\x85\x3c\xb2\x96\x6b\x49\x0e\x93\x1a\xbc\x98\x0c\x3e\x83\x14\x92\xe5\x91\x60\x0c\x59\x22\x75\x0b\xa9\x6e\x20\xd5\x79\xd4\xd7\x77\x97\x04\xdd\xa8\xea\x17\x48\x21\x15\x39\x00\xbd\x8d\xa4\x50\x07\xc9\x91\x52\x53\x4b\x20\x6d\x06\x50\x1d\x9d\x21\x85\xdc\x48\xb0\x97\x5a\x23\x1d\x29\x94\x40\x0a\xcd\x24\x7b\xfd\x36\x49\xf1\x21\x5b\xdd\x99\x6a\x2d\x87\x24\x0b\xa9\x0f\x92\x89\x39\x53\xe7\x28\x9b\x2c\x86\x8e\x5c\x01\xce\xe7\xc9\xe3\x36\xea\x31\xc9\xbe\x47\xed\x17\x3e\x99\x57\x1b\x19\x30\x89\x4a\xd9\x49\xbe\x27\x2e\xf9\xe0\x74\xf2\x38\xb8\xf8\xf9\xb4\xba\xc9\x17\xea\x9c\x4f\x86\xa6\x2e\x27\x19\x75\x7f\x74\x93\x61\x0c\xe4\xec\xb8\x93\x73\xf0\x20\x81\xca\x29\x21\xc1\xbd\x64\x44\x1b\x32\xc5\xb8\x48\xd2\x90\x0b\xf5\x98\x4c\x31\x8e\xba\xc6\x74\x64\xa7\xbb\x9f\x23\x25\x0d\x64\x51\x67\xb7\x91\x33\xfa\x25\xe9\x8d\x41\xbe\x92\xb8\x4f\x49\x21\x1b\x32\xdd\xb1\x0f\xa9\x20\x99\xc5\xd8\x6a\x12\x3c\x42\x7d\x92\x5c\x44\x55\x67\xc8\xd4\x92\xa9\x9b\xe8\x36\xe9\x9d\x4d\xdd\x15\x42\x12\x3c\x42\x6d\xe5\x3c\xd2\x9c\x88\xba\x63\x4f\x50\x41\xf2\x55\x8d\x94\x91\x60\x35\xe9\xc3\xbd\x80\x0c\xd9\x4f\xaa\x73\xa8\x3b\x96\x7a\x29\x90\x36\x76\x51\xd7\xdc\x6b\x64\xb5\xb2\xc9\x39\xe9\x7f\x44\x52\xb8\x54\x9d\x2a\x12\x14\x93\x3d\x3f\xe6\x4b\x0a\xad\x23\x85\x92\xcb\x48\x43\x1b\xa9\x85\xa1\xb6\x75\x08\xd5\x25\xd9\x5b\x71\x2b\x49\xa1\x25\x54\x21\x6a\xaf\x37\x51\x41\xea\x68\x32\xa9\x20\xb5\x35\x37\x93\xea\x72\xea\x05\xe0\x46\x05\x55\x24\x98\x40\x82\x0d\x64\xd9\xe3\x7c\x48\x1f\x51\xd4\xca\x34\x91\x9c\x31\xb2\x08\x83\x64\x6a\x81\xe4\x0d\xdb\x4f\xbd\xcf\x6c\xc9\xd6\x2c\x2f\x25\xbd\xe9\x48\x49\x13\x75\x2e\x6c\x48\x30\x90\xdc\xe6\xfd\xd4\xcb\x29\x83\x2a\x44\xed\xad\x69\xa4\xf5\x42\xf2\x26\x89\x5b\x4f\x5a\xcf\xa7\x4a\x52\x6f\xf2\xfb\xa4\x64\x13\x29\x39\x46\xbd\x6b\xbb\x48\x4e\x1b\x35\x9f\x6a\x32\x0e\x8f\x1a\x67\x1d\xc9\x11\x51\x1b\x21\x84\x0a\x52\xd5\xe3\x49\x90\x4b\x7d\x72\x3b\x15\x24\x9f\xac\xa5\x96\x95\x5a\x22\x09\x99\x6e\x1d\xd5\x06\x75\x6a\x32\x49\x4e\x09\x39\x0b\xe5\xd4\x8e\xe1\x51\xf3\xa1\xae\x81\xaf\x48\x8e\x9c\xbc\xf3\x47\xa8\xd7\x4b\x2c\x75\xb8\x3d\x49\x97\xd4\x5d\x67\xa2\xee\x70\x11\x15\xa4\x76\x3b\x97\x04\xdb\xa8\xad\x97\x4d\xaa\x0b\xc8\x39\x8e\xe3\x91\xea\x06\x2a\x87\xbc\x3f\xfa\xf7\x92\x1c\xea\x62\x4a\xfc\x8e\x8c\x73\x8d\x2c\x07\x83\x2c\x47\xe9\xf3\x0d\xf5\xbb\x87\xcf\xa2\x57\xb8\x32\xb3\xb8\x7f\xab\x59\x7c\xd1\x7c\xbe\x5b\xe0\x60\x50\xbb\xca\xff\x56\x23\x3c\xd8\xac\x6a\x36\xc7\x0c\xcb\x93\x92\x7f\xca\x69\xf7\x75\xed\xf6\x35\x99\x64\xaa\xca\xed\x1d\xfb\x1c\x02\xee\x32\xae\x88\x55\xb9\xc6\xaf\xe8\x22\x97\x45\x5b\xaa\x06\xd5\x83\xc3\xd2\xc0\x46\x71\xd4\xe1\xbe\xf2\xf8\xe4\x7b\x7b\xbc\xe4\xe6\xfa\x1d\x86\x6d\x7d\xeb\x04\x2b\xe3\x0a\xd9\xf3\x9f\x2d\x88\xac\xf7\x1c\xb8\xd6\x1b\x20\x65\xf5\x77\xf1\xc2\x8a\x92\x3a\x73\x0d\xb1\x7d\xf7\x4d\x0d\xea\x03\x37\xef\xc6\x0f\x19\x83\x75\x73\x93\xcc\xcd\x6d\xfe\xc6\x4f\xfa\x74\xb2\x44\x73\xbc\x40\xbf\x4c\xbf\x55\xff\xa1\x3e\x52\xbf\x5a\xb2\xb5\xeb\x6a\xac\x3a\x3c\xb7\xe7\xd2\xa0\x7a\xa4\xcf\xf4\x28\xd1\x78\x87\x71\x65\x91\xa6\x8b\xd7\xf4\xe4\xdb\x12\x45\x81\xf5\xd8\x64\xd3\xe4\x02\xc3\x80\xf0\x08\xfb\x7a\xd3\x5b\xb4\x5f\x15\xb3\x4d\xb8\xd8\x93\xe9\xa7\x5a\x35\x66\x50\xa9\x54\xab\x1e\x95\xae\x68\x93\xdd\x78\x92\xda\xe3\x61\xa8\x6f\x11\x18\xd7\xe9\xb2\x2e\xeb\x1e\xf1\x8b\x9b\xcb\x93\x3b\x52\xcf\x2b\x87\xb3\x13\x6f\x34\xaf\x6a\x09\x33\x6b\x12\x16\x29\x6d\x66\x95\x1e\x0d\xed\xb0\x55\x9b\xa5\xb1\x2c\x89\x60\xeb\x2b\xd2\x45\x5d\x36\xb4\xd2\xda\x7b\xec\x73\x37\x4d\x41\x01\xc3\x36\x5d\x17\x05\x9b\x32\x8c\xd7\x24\xdd\x8c\xbb\xdb\xcd\xdf\x2f\x32\x1c\xd8\xd3\xfc\xd3\x23\x2f\x95\x5f\x66\x5d\xfd\x93\x33\xea\x71\x53\xbc\x33\xd6\xd0\xc5\x0d\xde\x19\x9c\x03\xe1\x8b\xf4\x6e\xe3\x32\xeb\xa6\x29\x83\xc5\x0e\xb9\x0d\x5e\xa2\xcc\x82\x53\x2c\xde\x3a\xc1\xc6\xcf\x8a\xca\x42\x25\x5b\xf4\x63\xd1\x43\xda\x17\x34\x93\x95\x4e\x0a\xdb\xdc\xb0\xb3\x61\xb9\xd7\x7c\xd7\x1c\x10\x2f\xf6\x69\xf2\xe1\xa6\x15\x08\x65\x8e\x49\x9b\x25\x11\xfa\x81\xe8\x8a\x68\xa3\x76\x9a\xc6\x61\x9d\xf1\xce\xe7\x33\x72\x5a\x35\xd7\xa3\xaf\x45\x7f\xec\xea\xda\x3a\x7f\x96\xf0\xab\xb5\x4c\x1f\xa6\x57\x75\x6e\xa1\x37\x37\x4b\x36\xaf\xd5\x31\x69\xa7\x64\xb3\x24\x5e\xf2\x81\x5e\x12\x7d\x33\x3a\x3f\xba\x4b\x3b\xa4\x59\xaa\x99\xa1\xd8\xa9\x64\x9e\xe5\x79\x97\xac\x51\x9f\x8a\x10\xc9\xe6\x26\x85\x49\x3c\x25\xdb\xf4\xc5\xd1\xe2\xe8\x8e\xe8\x0c\x6d\x8f\xa6\x40\xe3\xa6\x88\x3d\x2b\xcd\x95\x8a\x13\x72\x1e\xae\xe3\xd8\xe7\xbc\xa6\xf4\xd2\x3c\x8a\xf6\x76\x75\x6a\x5d\xd2\xea\x90\x75\xac\x37\xab\x57\xf8\xb4\x70\x4b\x56\xf6\xf0\xd9\x24\x8d\x4c\x93\xac\xf9\x73\xf4\x8e\xfb\xa2\x7a\x6f\x75\xba\xcc\x2d\x2b\xab\x57\x34\x3b\x55\x66\x9f\xc4\xe3\x6f\xe5\x7f\xc8\x8f\x74\xb5\xf7\x98\xe3\xe1\x98\xc4\xe5\x6f\xd2\x9b\xb4\xcf\xb4\x5f\x6a\xad\x35\x5f\x6b\xe8\x4a\x9b\x5c\x86\x0f\x3b\x2d\xd9\xd1\xb8\x89\xff\xb1\xbe\x5f\xdb\xa9\x7d\x4d\x63\xaf\xdc\xa6\xe0\xe4\x8a\x7c\xd8\xc2\xe4\xa5\x46\x7f\x7e\x38\xdf\x9f\x9f\xc8\x5f\xa1\x1f\x75\x54\x94\x69\xfe\xa4\xf1\xd2\xd4\x68\x6c\x15\x8b\xcf\x8a\x73\xb8\xde\x9c\xb5\xf2\x53\xc9\x73\x8d\xa1\xfc\x2d\x7c\x3e\x7f\x25\x7f\x87\xfe\xb2\xb6\x4b\xc3\x54\xf0\xce\xaa\xbd\x1b\xbc\xe5\x59\xc9\xf6\xc6\x08\x7d\x85\xb6\x5b\x7b\x4a\xdb\xa2\x2d\xd7\x8e\x45\x07\xf2\x97\xf3\x83\xf8\x1f\xf1\x77\xe9\x8d\x5a\xba\xc6\x46\xb9\x46\xb1\x46\x79\x53\x71\x53\xe9\xa0\x70\x50\xe6\x2b\xf2\x95\x61\x8a\x30\x65\x97\x82\x91\xdb\x24\x66\xe6\xb0\x7d\x78\x7f\xe0\x79\x0b\xd2\x4c\x8e\xc6\xcd\xfa\x41\xad\xad\x66\xb1\x92\x9b\x7b\xa2\x9e\x23\xc8\x6a\x3b\xd5\x96\x66\x9a\x57\xe1\x54\xb1\xd0\xb8\x93\x9f\xc0\x5f\xa5\x97\x6a\x75\x9a\x2c\x0d\x43\x21\x55\xb0\xcf\x0a\xbc\xcd\xa7\x4c\x73\x2b\xdc\x2a\xec\x8d\x61\x7c\x1e\x9f\xcb\xff\x9f\xa7\xd2\x6e\xe7\x45\xc3\xf9\xf3\xfc\x6d\x86\x59\x7e\x0c\x0f\x26\xaf\xbc\xcf\x33\xec\x29\xa3\xa3\xfd\x66\x45\x9e\xcc\xc3\xbf\xb4\x8e\x9f\xfc\x64\x41\x82\x8f\x2a\xe1\x6e\xb3\xb9\xbf\x35\xc5\xec\x59\x7f\x3f\x41\x21\xab\x10\x67\x17\xeb\x8e\x0a\x8f\xb0\xbb\x4a\x93\xec\xdb\x0c\x47\x85\xc3\x0c\xc1\x0f\xbb\x82\x7b\x5a\xa3\xae\xfe\x49\xdc\x5d\xb3\xb8\x97\xdd\x5b\xdb\x9a\x31\x54\x3d\xd1\xd2\x07\x0b\x2c\x21\x71\x47\x59\xdd\x82\x84\xe1\xee\x30\x71\xf6\x85\x3e\x6d\xcc\x01\xbf\x96\x81\xd4\x9b\xfa\x6b\x56\x96\xee\x0b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\xef\x32\x1d\xce\xd2\x6f\x3c\xfc\xd6\xc1\x33\x34\xf7\x22\xa6\xe7\xad\xdf\x8f\x5f\x3e\xf5\xaf\xec\xf8\x09\x33\xdc\xce\x54\xa4\x7f\x31\xf1\x37\x99\xf4\xef\xbf\x5f\x37\xf9\xc4\x8a\x84\x19\x0e\x99\x39\x53\xfb\x5f\x08\x7f\xbd\xe5\xea\x8a\xa9\x97\x2e\x72\x3e\x7c\xdd\x21\x3f\xfa\x2a\xff\xea\xfc\xf0\xd5\x05\x53\xf7\x2d\xba\xae\x5b\x78\xe0\xc7\xb6\x25\xec\xe3\x93\xdd\xac\x2d\x3d\x25\x00\xcb\xa1\xef\x61\x8e\xb6\x2c\xb5\xf5\x71\xaa\x53\xea\x76\x16\x25\x89\x43\xee\x37\x9b\xc6\x52\x57\x1d\xba\x36\x30\x34\x5c\x32\x63\xed\x92\xac\x40\x03\xab\x85\x79\x8e\x2e\xef\x38\x96\xc6\xca\x3f\x54\xf6\x55\x5a\x5a\x0b\x7b\xf8\xf1\x93\x1e\xce\xc6\xea\xc2\xec\x72\x63\x64\x57\x9b\xa6\x50\xa0\x71\xec\x11\xdd\x60\x2e\x66\x65\x27\xea\x06\x6e\xf4\x77\xd8\x67\xcf\x8a\x8f\x1c\xed\x1f\xca\xca\xcc\x10\xec\x29\xea\x18\x09\xb6\x19\x1f\xb5\x61\x80\x1e\xb0\x5a\xf2\xa8\xfa\xc4\x81\x43\x67\x76\x04\xc5\xca\xd3\x58\x9a\xb4\x33\xc1\xb1\xb2\x71\x52\x43\x8c\x53\x5f\x9c\x6f\xda\xe3\xa8\x04\xc3\xc5\x63\x59\x39\x7e\xf9\xb5\xba\x13\x1c\x6f\xee\x09\xf5\x75\x1f\xc5\xce\x8f\x9f\xd8\x9f\xe0\xdc\xc8\x79\x5f\x9e\x9e\x95\xa3\xfa\x4b\x6d\x07\xd3\xdb\xfb\x62\xdf\x98\x77\xe6\x60\x89\x8b\xc0\xcf\x45\xf0\x44\x78\x51\x62\x4e\x74\xf3\x11\x1d\xdd\x95\xdb\xa7\xb4\xcf\x2d\xd4\x76\x69\x84\x17\x03\x35\xf6\x1a\xe1\xfb\x79\xda\x4c\x8d\x30\xed\x77\xe9\x15\x1e\x96\x5e\x64\xcb\xaa\x3d\x39\xfb\x46\x6e\x3c\x9b\x55\x69\x35\xb3\xf7\x10\xdd\x2c\x8c\x97\x1f\xb6\x74\x4b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\x7f\x7a\x26\xcc\x72\xfd\xce\x8a\x46\x0b\xb2\x9b\x67\x65\x0e\xbd\x62\xb5\xf8\xd5\xd5\x9f\x4d\x6b\x09\xc6\x9f\x35\xc0\xaf\x4c\x44\xcd\x86\xf0\x0e\xab\x97\x9e\x32\x6c\x58\xcd\x81\x6f\x5b\xba\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x7f\xba\x2a\x1f\x63\xd1\x86\x97\xab\x82\x68\xac\x32\xf1\x37\x9f\x39\xec\xb3\x9b\xf8\x40\x94\x3c\xc1\x96\x99\x2f\x15\xee\x9f\x38\xa5\x84\x51\x79\x65\xed\xac\x39\xfb\x7b\x17\xf9\x2c\xea\xb1\x7b\x60\x1b\xf9\xd1\xb3\x29\x53\xf6\x9d\x16\x26\x1c\xfa\xd6\xd9\x65\xcf\x6b\x05\xbc\x3f\x5d\x5d\xb8\x73\xfc\x02\xfe\x07\xd9\xf6\xe5\x9f\x9f\x62\xb2\xaf\xef\x9d\x63\xe9\x09\x01\xfc\xbf\x99\x8f\xab\x6a\xaa\xcf\x9e\x72\xfb\xe8\xc6\xc3\x92\xb5\xcd\xb2\xf5\xde\x4b\x54\xa2\x9e\xc1\xad\x17\xe4\x89\x65\xc6\xc7\x5b\x16\x28\x35\xe9\x85\xc6\x24\xe3\x9e\xbe\x8e\x16\x5f\x45\xfa\x96\xfa\x0e\x77\xef\xd0\xdd\xba\xeb\xe2\x2e\x26\xdb\x7f\xb6\x3c\x4e\xab\x6f\x3d\xec\x66\xcf\x36\x7f\xd3\xea\x28\x7f\x87\xeb\x91\x20\x18\xab\x1b\x5c\xb3\x4a\x34\x3b\x61\x77\x67\x5b\xd5\x81\x8d\xb1\x11\x81\xa6\xdb\x75\xbd\x0f\x0b\x3d\xa6\xd6\x6e\xae\x9b\x2c\x49\xbd\x54\x53\xb2\x4e\x67\xbb\x6a\xfb\x4f\xbf\x73\x10\x22\xbc\x26\x8e\x35\x8d\x93\x1a\x76\x38\xa9\xe3\x7c\x85\x8f\x97\x24\x18\x24\xc7\xd2\x73\x02\x66\x1c\xef\x7b\x5f\xd4\x18\xb1\x35\xf9\x6d\x07\x2f\xe9\x7b\xef\xb2\x6b\x12\x7d\xed\xad\x07\xfd\x36\x7b\xdd\x3f\xbf\x77\x74\xe6\x99\x9c\x79\x86\xfa\x42\xc7\x66\x81\xd0\xc8\xb4\x36\x34\x24\xfa\x6e\xd4\x89\x78\x3f\x68\x84\xae\xb3\x3b\xa5\x5a\xaf\x9e\x09\xfa\x21\xad\x57\x00\xa3\xd3\x5e\x23\x74\x9d\xde\xc9\x54\xda\x3b\x6d\xfe\x4b\x42\x82\xa5\x57\xd9\xb2\x8e\x3b\x79\xa4\x4e\x1e\x4c\x4e\x4c\x51\x47\x7e\xcf\x9e\x3d\xc6\x79\x62\x74\x1a\x67\xe9\x9e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x5f\xaa\x32\x36\xe6\xe9\xe9\x09\x34\xda\xe7\x7b\x8f\x8f\x1f\xcb\x7f\x81\x5e\xbe\xda\xee\x9b\xf5\x91\xa2\x97\x2d\xdd\x17\xc0\x3f\xa4\x74\xae\xdf\x85\x2c\xfa\xbb\xdf\x09\xdc\x47\x3e\x4d\xc0\x6f\xf9\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x5d\xaf\xbb\x0d\x35\x6c\x71\x7a\xfd\x80\xd5\xc8\xa3\xec\x3f\x7e\x7b\x7e\xe2\x3e\xbb\x2f\x05\xfa\xe9\xfe\x2d\xe7\x7a\x7d\xa6\xbc\xe5\xdc\x92\x4c\xa3\x33\xf7\xa4\xbe\x24\x91\x3a\x97\x5d\xda\xff\x25\xb7\xf2\x83\x2b\x6e\xce\x13\xf7\xf9\xf4\x2e\x3c\xf8\xe0\x51\xe3\xda\x52\xd9\xdc\x17\x4b\x2e\xbd\x92\xd3\x39\x2d\x3e\xfb\xd9\xab\xbb\xdb\xc6\xec\xe8\x69\x96\x9e\x10\xfc\x7a\x8c\x6d\x8b\xb0\x67\x64\xee\xee\xfd\xfd\x82\x23\xea\xa5\xdb\x0d\x1b\x16\xd4\x85\x0b\x8a\x1b\xf6\x57\x99\x06\x1e\x0f\x67\x84\xe5\xfe\x41\xbc\x51\x36\xac\x1b\x6a\xaa\x10\x45\xad\xf1\xda\x78\x7f\x37\xab\xe3\x23\x5f\xa1\x74\x15\x2b\x40\x3e\xfa\xe3\xc0\x48\xd5\x99\xa6\xbe\x88\x16\x97\xd1\x51\x9b\x9e\xb3\xa3\xeb\x47\x9f\x36\x1b\x1e\xf2\xb2\xb9\xae\x7a\xed\x3d\xa1\xa7\x6e\x11\xab\x5c\x12\x35\x38\x70\x24\x22\x86\x21\xe8\xd9\xbb\xb5\x3e\x34\xf0\xd6\x17\x39\x6b\x65\x59\x12\xb9\xf3\x3b\x93\xa5\x86\x74\xad\x57\xe6\x4c\x56\xc5\xa0\xed\xbd\x56\x66\xfe\xe8\x0f\xc2\x93\xbf\x13\x35\xab\x9a\x2e\x9f\x9b\xd3\x73\xbf\x32\x31\x63\x34\x27\xc6\x7a\x70\xc6\x66\xaf\xfb\x87\xf7\x8e\x7a\x3d\x11\xba\x4e\x3f\xae\xbe\xe1\xad\x88\x78\xb9\xb6\xe3\x8d\xb9\x4e\xcd\xb1\xc9\xb9\x35\xa6\xcc\x6e\xf9\xf4\x7b\x82\x27\x42\x89\xc4\x9c\xb8\xc4\x47\xd4\xd8\xbf\x4c\x9d\xcb\x09\x65\xde\x2a\x14\x73\x9e\xea\x97\xb1\xbd\x44\x8d\x35\xcb\xe4\x27\x58\x79\x35\xbe\xad\xaa\x5f\xf7\xbf\x37\xa9\x3c\xa7\xd9\xeb\x7f\x5c\xf7\xd0\x7a\xec\x8f\xfb\x8d\xfd\xed\x82\xf7\xfb\x0a\x5f\xb1\x74\x4f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\x1f\x42\x56\xb4\x8e\xee\x44\xa3\xd9\xbd\xf4\xd7\x39\xed\xdc\x85\xce\xed\x1f\x8c\x9b\x74\x7e\x9f\x21\xdc\xd2\x6d\xc1\x2f\x5b\xe5\xc2\xe6\x83\x3d\xee\x29\xcb\x8d\x0f\xaf\xd8\xab\xc2\xc6\x5b\xba\x1d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x5f\xbe\xd3\xf7\xf2\x04\x77\xe6\x7f\xeb\xfc\x62\x65\xec\xf0\x8e\x4d\x8e\xaf\x2c\x9f\x3a\xee\x81\xc8\x7d\xff\xe1\xac\xdb\x6d\x37\x56\x8c\x3f\x54\x67\xbd\xe9\x5e\xde\x17\xe1\xdf\x54\x1c\x4e\x5f\xeb\xfb\xe5\xc8\xb8\xa5\x2f\x46\x04\xbd\x39\x71\x4b\xb3\xfd\xfc\x57\x1c\xf2\xa3\xaf\xf2\xaf\xce\x0f\x5f\xbd\x32\xf5\xb4\xc3\x40\xd2\xb5\xa0\xe3\x09\x4f\xe8\x51\x41\x3b\x2c\x3d\x23\xf8\xd9\x33\xbd\x17\x9b\xc6\x59\xeb\x22\xf7\xbf\x21\x8c\x5d\xdb\x5c\x16\xe0\xbd\x44\x25\xea\x1a\x88\xbc\x17\x20\xbb\x3f\xba\xbb\xe2\xa8\x46\xfb\xb4\xa9\x57\xd6\x2b\x19\x8c\x8a\x78\x6f\x7a\x46\x50\x59\xea\xa0\x5d\x5e\x4d\xc5\x36\x15\x33\x22\xa9\xfc\x7d\xfe\xe8\x48\x9d\x21\x33\x96\x93\x64\xf2\x94\x86\x24\xaf\x97\x25\x9b\x7e\x7c\xa4\xb2\xcd\x38\xc2\x76\xeb\xd7\x5e\x37\xae\x39\x52\xd0\xd3\x56\xae\x3d\x93\xd9\x5a\xcd\x4d\xb0\x3b\x5e\x74\xd2\x36\xfa\xcd\x10\x21\x4f\xcc\x78\x89\xbe\x3d\x88\x27\x4f\x63\x85\x08\xcf\x04\xc7\x98\xc7\x25\x18\x76\x38\xa9\xe3\x7c\x85\xb9\x45\x06\x83\xe4\x58\x7a\x4e\x40\xd7\x09\x46\x30\x2b\xef\x61\xf6\xe8\xe1\x73\x73\x7a\x56\x36\x8c\xcd\x19\xf4\xca\xd2\xd6\xf2\xb6\xcf\x0d\x29\xe1\x3f\x89\x7a\x29\xed\xe4\x4c\x67\xb9\xe2\x53\xf3\xda\x61\xb5\xb6\x9b\x3d\xe8\x15\xe0\x11\x27\x9b\x9e\xcb\x79\xfa\x9d\x98\x21\xe6\x3c\x2d\x15\x73\x39\xa2\xc6\xa1\xec\xe4\x34\x56\x9e\x30\x3b\x79\x49\x92\xaf\xb0\x4a\x22\xa7\x5b\x7a\x99\x2d\x2a\x65\xb3\xd2\xb3\xcc\xb9\xaf\x9a\x3e\xf2\xf2\x01\xc3\xc3\x2b\xe6\x4f\xdb\xb8\x6f\x5b\xba\x27\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xb5\x49\x0c\x16\x4f\x09\xa5\xd1\x96\xbd\xf1\xa5\x57\xa5\x7c\x4b\x64\xe5\xa1\xf1\xaf\x6e\x79\x41\xd7\x6c\xe9\xb6\xe0\x67\x29\xc5\xef\xe2\x34\x55\x3c\x6d\xbf\xbe\x7a\x3f\xa7\xb8\x69\xa2\xa5\xdb\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x7f\xd8\xb2\x0b\xeb\xcc\xe7\xd6\x7b\xee\x7a\x23\x85\xd3\x1b\x32\xff\xf2\xb4\xe5\x53\xc7\xf7\x73\xd8\xfb\x0f\x65\xde\x69\xad\x59\x3e\xfe\x80\xca\xa6\xbd\xfd\xec\x94\xb4\xe5\xb1\xb6\xf6\x19\x31\x53\xfb\x27\x97\xce\x8f\xa3\xd3\x97\xdf\xaa\x69\xfd\x76\xbe\x8f\x4f\xeb\xe7\x5d\x7e\xdf\x46\xae\x99\xb1\xfc\x60\xe0\xd7\x1d\x93\x16\xbf\xd9\x51\x67\xb3\xdb\x6e\x92\xa5\x67\x04\xff\x22\x95\xec\x27\x1b\x06\x2e\x2c\x08\x3e\x92\x31\xd0\xb9\x76\x5d\x31\xef\x98\xa2\x76\x38\x58\xdf\xc2\xed\x5e\xcc\x0d\x17\x94\x6d\xb9\x11\xcd\x1f\x0d\x13\x70\x05\xad\x06\x97\x92\x53\xd1\xdb\xf3\x4e\xdd\x8c\x3f\xda\xf8\xa8\xfe\x47\x4e\x53\x44\x62\xa9\x63\xb2\xe9\xd9\x1d\x55\x57\x09\x27\xf1\xbf\x7f\xe9\x20\x51\xdf\x7b\xaf\x2b\xd8\xf6\x88\xbb\x8b\x3e\x4e\xd3\xfb\x05\x7d\x63\x4c\x44\xe0\xe8\xed\xba\xde\x87\x85\x1e\x53\x6b\x37\xd7\x4d\x96\xa4\x5e\xaa\x29\x11\xea\x7e\xb3\x6a\x7b\x50\xac\xfc\x24\x2b\x44\xe8\x29\x8e\x31\x8d\x93\x1a\x76\x2c\x54\xc7\xf9\x0a\xd3\x95\x09\x06\x49\x76\x7a\x4e\x00\xe3\x78\xdf\xfb\xa2\xc6\x88\xad\xc9\x4b\x1c\xbc\xa4\x2e\xef\xb2\x6b\x12\x7d\xed\xad\x07\xfd\x36\x7b\xdd\x3f\xbf\x77\x74\xe6\x99\x9c\x79\x86\xfa\xc2\xa5\xcd\x02\xa1\x91\x69\x6d\x68\x48\xf4\x6d\x1a\x16\xf1\x7e\xd0\x08\x5d\x67\x77\x4a\xb5\x5e\x3d\x13\xf4\x87\xb5\x5e\xad\x6f\x74\xda\x6b\x84\xae\xd3\x3b\xd5\x62\x4e\xe8\x45\x7f\xdd\xb0\xa5\x97\xd9\xb2\xde\x0d\xe3\xdb\x75\x74\x18\x47\x68\xf2\x1f\xb7\x0a\xdc\x47\x44\xb5\x06\xfc\xc3\x0b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\x4f\x95\xd2\xd7\xdd\xb8\xfc\x65\x1a\x6d\xa2\xf5\x7b\x93\x46\x36\x4e\x9e\x12\xf7\xf5\xb2\x15\xf9\xed\xac\x19\x96\xee\x0b\xfe\x99\x22\xd7\x14\x7f\xe2\x66\xb3\xf5\x43\x73\xdc\xb3\x9a\xe1\xdf\x5a\x59\xba\x1d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xf7\x9b\x1f\xf3\xf4\xf4\x04\x1a\xed\xf3\xbd\xc7\xc7\x8f\xe5\xbf\x40\x2f\x5f\x6d\xf7\xcd\xfa\x48\xd1\xcb\x96\x6e\x0b\xfe\xb7\xf6\x63\xe1\x55\x31\xb3\x2b\x4f\x9b\xfa\xdb\x85\x3d\x4e\xe3\x2c\xdd\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xa7\x79\xdd\x6d\xcf\x87\xd6\x34\xda\xd5\x65\x7f\x18\x67\xba\xb3\xcf\x3a\x70\x4e\xea\xad\x77\x4a\x1b\x26\x58\xba\xad\x5f\x9e\xca\x85\xcd\x07\x7b\xdc\x53\x96\x1b\x1f\x5e\xb1\x57\xe1\x67\xea\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\xdf\xeb\x60\x96\xeb\x77\x56\x34\x5a\x90\xdd\x3c\x2b\x73\xe8\x15\xab\xc5\xaf\xae\xfe\x6c\x5a\x4b\xb0\xb5\xa5\xdb\xfa\x39\x4a\xf1\xbb\x38\x4d\x15\x4f\xdb\xaf\xaf\xde\xcf\x29\x6e\x9a\x68\xe9\x76\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\x71\x55\x3e\xb3\x1a\x69\xb4\x94\x77\xa7\x0a\x53\x04\x97\xdb\x53\x6c\x27\xcd\xb9\xf4\x62\x6f\xd1\x2f\xf5\x5f\xd4\x97\x7c\xea\x50\x3c\x48\x9b\x30\x74\x84\x2e\x0a\x2f\x7c\xc5\xd2\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x9b\xa4\x84\x8a\xbe\xf2\xa6\xa5\x04\xbd\xf1\xa2\xf7\xf1\xc7\x2e\xea\x99\xda\x42\xc7\x2f\xdc\xac\x6d\xc6\xfd\x7c\xff\x40\xe0\xfa\x80\xb7\xd8\x4d\xd0\xc5\xba\x95\x67\x68\x8f\x3f\x6b\x7b\x60\xa6\x92\x87\x1f\xeb\x07\xf8\x35\xda\x9a\x61\xe3\x3a\x33\xa0\x8a\xf6\x46\x2a\xfd\xbf\x02\x00\x00\xff\xff\x0b\x13\x25\x27\xf1\xf6\x01\x00") + +func testImagesVolumeRbdBlockTarGzBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdBlockTarGz, + "test/images/volume/rbd/block.tar.gz", + ) +} + +func testImagesVolumeRbdBlockTarGz() (*asset, error) { + bytes, err := testImagesVolumeRbdBlockTarGzBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/block.tar.gz", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdBootstrapSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x55\xdb\x8e\xdb\x36\x10\x7d\xd7\x57\x9c\xb5\x0b\x24\x01\x6c\xc9\xbb\x4d\xd3\x36\x01\x0a\x78\x2f\x45\x8c\xa4\x76\xb0\x76\xba\xc8\x53\x41\x89\x23\x8b\x58\x8a\xa3\xf2\x62\xaf\x5e\xfa\xed\x05\x29\x39\xd9\x4d\xd0\x00\xf5\x83\x61\x92\x73\x39\x73\xe6\xcc\x78\x7a\x56\x04\x67\x8b\x52\x99\x82\xcc\x01\xa5\x70\x4d\x96\x4d\x71\xc5\x5d\x6f\xd5\xbe\xf1\xb8\x58\x9c\xff\x84\x5d\x43\x78\x17\x4a\xb2\x86\x3c\x39\x2c\x83\x6f\xd8\xba\x3c\x9b\x66\x53\xbc\x57\x15\x19\x47\x12\xc1\x48\xb2\xf0\x0d\x61\xd9\x89\xaa\xa1\xd3\xcb\x0c\x7f\x92\x75\x8a\x0d\x2e\xf2\x05\x9e\x47\x83\xc9\xf8\x34\x79\xf1\x26\x9b\xa2\xe7\x80\x56\xf4\x30\xec\x11\x1c\xc1\x37\xca\xa1\x56\x9a\x40\x0f\x15\x75\x1e\xca\xa0\xe2\xb6\xd3\x4a\x98\x8a\x70\x54\xbe\x49\x69\xc6\x20\x79\x36\xc5\xa7\x31\x04\x97\x5e\x28\x03\x81\x8a\xbb\x1e\x5c\x3f\xb6\x83\xf0\x09\x70\xfc\x34\xde\x77\xaf\x8b\xe2\x78\x3c\xe6\x22\x81\xcd\xd9\xee\x0b\x3d\x18\xba\xe2\xfd\xea\xea\x66\xbd\xbd\x99\x5f\xe4\x8b\xe4\xf2\xd1\x68\x72\x0e\x96\xfe\x0e\xca\x92\x44\xd9\x43\x74\x9d\x56\x95\x28\x35\x41\x8b\x23\xd8\x42\xec\x2d\x91\x84\xe7\x88\xf7\x68\x95\x57\x66\x3f\x83\xe3\xda\x1f\x85\xa5\x6c\x0a\xa9\x9c\xb7\xaa\x0c\xfe\x09\x59\x27\x74\xca\x3d\x31\x60\x03\x61\x30\x59\x6e\xb1\xda\x4e\x70\xb9\xdc\xae\xb6\xb3\x6c\x8a\xbb\xd5\xee\xed\xe6\xe3\x0e\x77\xcb\xdb\xdb\xe5\x7a\xb7\xba\xd9\x62\x73\x8b\xab\xcd\xfa\x7a\xb5\x5b\x6d\xd6\x5b\x6c\x7e\xc7\x72\xfd\x09\xef\x56\xeb\xeb\x19\x48\xf9\x86\x2c\xe8\xa1\xb3\x11\x3f\x5b\xa8\x48\x23\xc9\xc8\xd9\x96\xe8\x09\x80\x9a\x07\x40\xae\xa3\x4a\xd5\xaa\x82\x16\x66\x1f\xc4\x9e\xb0\xe7\x03\x59\xa3\xcc\x1e\x1d\xd9\x56\xb9\xd8\x4c\x07\x61\x64\x36\x85\x56\xad\xf2\xc2\xa7\x9b\x6f\x8a\xca\xb3\x44\xdf\x25\xb3\x77\xde\x8a\xce\x41\xe0\xea\xe6\xc3\x5b\x38\xb2\x07\xb2\x11\xc5\xca\xa3\xb2\x24\xa2\xac\xfc\x91\xb1\xd9\x5e\xbb\x58\xbb\xe6\x4a\x68\xb4\xa2\x6a\x94\xa1\xd9\x67\x93\xdb\xcb\x6b\x74\xcc\x3a\x26\x49\x9c\x0a\x23\x63\x4d\x6c\xbd\xc3\xb3\x52\x73\x75\xff\x0c\x92\x0e\xaa\xa2\xc1\x64\xd0\xe8\x1d\xa1\x0d\xee\x94\x09\xb5\x25\xd7\x0c\xa9\xa2\x7f\x94\x9a\xeb\x9d\xa7\x16\xd1\x65\x86\x92\x2a\x11\x85\xe8\x1a\xd5\x75\xb1\x6c\xe5\xb3\x29\x46\x5d\x99\xa8\x30\xb2\x38\x72\xd0\x12\xca\xc4\x98\x6e\x60\x52\xb5\x91\xad\xb2\xc7\x3f\x3f\x2e\x16\x7f\x5c\xc6\xdc\x69\x98\x86\xac\x05\xf9\xaa\xa8\xa8\x6b\xd2\x57\x5e\xb1\xa9\x33\xd7\x20\xff\x72\xcc\x5d\x83\xc9\x0f\xcf\x1b\x76\xde\x88\x96\x30\x57\x2f\x26\xc3\x34\x9a\x5a\xed\x83\xa5\x04\xd7\x79\x61\x3d\xa2\xd3\xbc\x65\x33\x84\x68\xd9\xfc\x1f\xe7\x8b\x87\xc1\x9f\x9d\xcc\xda\x7b\xa9\x2c\xe6\x1d\x8a\x83\xb0\x85\x56\xe5\x80\x91\x9d\x4c\x3f\xe6\x8b\xff\x7a\x38\x1f\x52\xb3\x93\x31\xf5\xe2\xc9\xe9\xfc\x7b\xb0\x6b\x87\x96\xbc\x90\xc2\x8b\x51\x08\x63\x11\xd2\xe5\xc3\xfa\xf9\x60\xa9\x13\xd1\x2f\x35\xfc\xc0\x3a\xb4\x84\x49\xcd\x3c\xc1\x73\x36\xba\x1f\x76\x80\x16\x3d\xd9\xd8\x9e\x9a\x84\x0f\xb1\x71\xb1\x09\x1c\xfb\xee\xe2\x36\xc8\xa6\xa7\x89\x85\xa1\x23\x59\x54\x5a\x91\xf1\xee\x45\xd4\xdd\x7a\xb3\xbb\x79\x8d\x63\x7c\x22\x89\x2b\xea\x1a\xdc\xc7\xfd\xa6\xd1\xb2\x0c\x9a\x92\x0a\x63\xbc\x48\x28\x7c\x23\x3c\x6c\x30\x2e\x5d\x0d\x71\xce\x32\x5b\x9e\xc4\x87\xf9\x3c\x35\x7f\x3e\x42\xf9\x82\x2d\x69\x12\x35\xf3\xd3\xba\x46\x1e\x86\xd2\xb2\x78\x02\x3b\x39\x68\x7b\x54\xe9\x60\xf2\x57\xa2\xe9\xe5\x77\x4d\x3e\xb3\x39\x9a\xd5\x2e\x16\x7c\xca\xf1\xb5\xd1\xa3\xb8\x11\x52\x88\xfb\x55\xd2\x43\xde\xf8\x56\x43\x19\xcf\xa9\xc6\x11\x59\x1a\x50\x2f\xee\x29\x8e\xee\xb1\x89\x4b\x39\x18\xaf\xf4\x23\x9b\x11\x8c\x84\x28\xf9\x90\xf6\x58\xcb\xc1\xf8\xb8\x1a\xe3\xc6\x3a\x87\xa3\x8a\xe3\x98\x3a\x04\x17\x84\xd6\x3d\xc8\x70\xd8\x37\x33\x94\xc1\xc3\xdb\x3e\x01\xa8\x95\x21\xaf\x74\x9f\x67\x4e\x13\x75\x38\xcf\x86\x74\x67\x83\x54\xeb\x38\x90\xf3\xf6\x6b\x89\xbf\x7e\xf5\xf3\x2f\xbf\x4e\x50\xb4\xc6\xbf\x81\xe4\x2c\x2e\x77\xaa\x1a\xc6\xe4\x4e\xa4\x0d\x9c\xd6\xda\xc8\x84\x67\x94\x84\xd0\x4d\x92\xd9\x29\x8d\x64\x43\xd9\xe0\xf3\x96\xb4\xe6\x24\x86\xb3\x09\x7e\x4b\x51\x8b\x2f\xe4\x64\x55\xd3\xb2\xc4\xab\x97\x2f\xbf\x79\x09\xa9\xe4\x74\x9d\x8d\xb1\x92\xa4\x54\xfc\xd3\x10\xb2\x4f\x93\x18\x11\x45\x38\x14\x15\x3f\x14\xe7\x6d\xa0\xcf\xb8\x47\x40\x8b\x01\xd1\xbf\x01\x00\x00\xff\xff\x01\x0a\xa4\xfe\x9a\x07\x00\x00") + +func testImagesVolumeRbdBootstrapShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdBootstrapSh, + "test/images/volume/rbd/bootstrap.sh", + ) +} + +func testImagesVolumeRbdBootstrapSh() (*asset, error) { + bytes, err := testImagesVolumeRbdBootstrapShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/bootstrap.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdCephConfSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x93\x51\x4f\xe3\x38\x14\x85\xdf\xfd\x2b\xce\x36\xfb\xb0\x2b\x75\x93\x52\x01\x5a\xed\xaa\x23\x75\x0a\xa3\x89\x40\xad\x44\xca\x20\x84\x78\x70\x9c\x9b\xc4\xc8\xf1\xcd\xd8\x0e\x69\xe7\xd7\x8f\x92\x52\x31\x0c\xe4\xd1\xe7\xe4\xe6\xcb\x77\xe5\xe8\x8f\xa4\xf3\x2e\xc9\xb5\x4d\xc8\x3e\x23\x97\xbe\x16\x22\xc2\x8a\xdb\xbd\xd3\x55\x1d\x30\x9f\x9d\x9c\x61\x5b\x13\xae\xba\x9c\x9c\xa5\x40\x1e\xcb\x2e\xd4\xec\x7c\x2c\x22\x11\xe1\x5a\x2b\xb2\x9e\x0a\x74\xb6\x20\x87\x50\x13\x96\xad\x54\x35\x1d\x93\x29\xbe\x91\xf3\x9a\x2d\xe6\xf1\x0c\x7f\x0d\x85\xc9\x4b\x34\xf9\xfb\x7f\x11\x61\xcf\x1d\x1a\xb9\x87\xe5\x80\xce\x13\x42\xad\x3d\x4a\x6d\x08\xb4\x53\xd4\x06\x68\x0b\xc5\x4d\x6b\xb4\xb4\x8a\xd0\xeb\x50\x8f\x9f\x79\x19\x12\x8b\x08\xf7\x2f\x23\x38\x0f\x52\x5b\x48\x28\x6e\xf7\xe0\xf2\xd7\x1e\x64\x18\x81\x87\xa7\x0e\xa1\xfd\x2f\x49\xfa\xbe\x8f\xe5\x08\x1b\xb3\xab\x12\x73\x28\xfa\xe4\x3a\x5d\x5d\xae\xb3\xcb\x7f\xe6\xf1\x6c\x7c\xe5\xd6\x1a\xf2\x1e\x8e\xbe\x77\xda\x51\x81\x7c\x0f\xd9\xb6\x46\x2b\x99\x1b\x82\x91\x3d\xd8\x41\x56\x8e\xa8\x40\xe0\x81\xb7\x77\x3a\x68\x5b\x4d\xe1\xb9\x0c\xbd\x74\x24\x22\x14\xda\x07\xa7\xf3\x2e\xbc\x91\x75\xa4\xd3\xfe\x4d\x81\x2d\xa4\xc5\x64\x99\x21\xcd\x26\xf8\xbc\xcc\xd2\x6c\x2a\x22\xdc\xa5\xdb\xaf\x9b\xdb\x2d\xee\x96\x37\x37\xcb\xf5\x36\xbd\xcc\xb0\xb9\xc1\x6a\xb3\xbe\x48\xb7\xe9\x66\x9d\x61\xf3\x05\xcb\xf5\x3d\xae\xd2\xf5\xc5\x14\xa4\x43\x4d\x0e\xb4\x6b\xdd\xc0\xcf\x0e\x7a\xd0\x48\xc5\xe0\x2c\x23\x7a\x03\x50\xf2\x01\xc8\xb7\xa4\x74\xa9\x15\x8c\xb4\x55\x27\x2b\x42\xc5\xcf\xe4\xac\xb6\x15\x5a\x72\x8d\xf6\xc3\x32\x3d\xa4\x2d\x44\x04\xa3\x1b\x1d\x64\x18\x4f\xde\xfd\x54\x2c\x46\x7d\x2b\xb6\xa5\xae\x3a\x47\x1e\x09\x05\x95\x28\x6a\xeb\x58\xb1\x2d\x51\x3a\x6e\x20\x11\xa8\x69\x8d\x0c\xc3\x2a\x85\x20\x55\x33\x26\xe2\xa1\x32\x9c\x4b\xf3\x28\x64\x17\x6a\x28\xd3\xf9\x40\xee\x75\x05\x0b\x58\xb6\x74\x08\x3d\xb9\x67\xad\xe8\xe3\x50\x19\x4d\x36\xbc\xcb\xc4\x43\xc3\x36\x96\x8f\xa2\x66\x1f\xb0\xc0\xc0\x94\xf3\x4e\x34\x83\xf8\xa2\x70\x58\xe0\xcf\x13\x21\x1e\xd8\x17\x8f\x82\x7d\x81\x27\xee\x9c\x95\x06\x5e\xff\x20\x2c\x70\x32\xff\x57\x1c\x8f\x0a\xcd\x58\xa0\x94\xc6\xd3\x70\x79\xa4\x31\xdc\xc3\x75\x76\x54\xc6\x16\xb4\x0b\xa7\xe3\x8c\x46\xee\xc0\xf9\x13\xa9\x00\x2b\x1b\x82\x21\x8b\x05\xe6\x67\xe7\x1f\xa5\xbe\x95\xea\x58\x39\x3f\x3d\xa0\xc4\xb3\x03\xcc\x6f\xd0\x13\x7c\x7a\x35\xfb\xaa\x57\x88\x9f\x01\x00\x00\xff\xff\x07\xbb\xe8\x40\xdf\x03\x00\x00") + +func testImagesVolumeRbdCephConfShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdCephConfSh, + "test/images/volume/rbd/ceph.conf.sh", + ) +} + +func testImagesVolumeRbdCephConfSh() (*asset, error) { + bytes, err := testImagesVolumeRbdCephConfShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/ceph.conf.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdCreate_blockSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x93\x5f\x6f\xdb\x36\x14\xc5\xdf\xf9\x29\x4e\xa5\x00\x4d\xb0\x44\xfe\x03\xec\xa5\x83\x3b\x38\x8d\x87\x0a\xad\x1d\xc0\x56\xd7\xf5\x69\xa0\xa4\x2b\x89\x08\x45\x6a\xe4\x95\x1d\x67\xdd\x77\x1f\x28\xd9\x6d\xb2\x3e\x4c\x8f\xe2\xe1\xe1\xef\x9e\x7b\x6f\xfc\x6a\xd2\x7b\x37\xc9\x95\x99\x90\xd9\x23\x97\xbe\x11\x22\xc6\x3b\xdb\x1d\x9d\xaa\x1b\xc6\x7c\x3a\xfb\x19\x59\x43\xf8\xd0\xe7\xe4\x0c\x31\x79\x2c\x7b\x6e\xac\xf3\x89\x88\x45\x8c\x8f\xaa\x20\xe3\xa9\x44\x6f\x4a\x72\xe0\x86\xb0\xec\x64\xd1\xd0\xf9\xe4\x1a\xbf\x93\xf3\xca\x1a\xcc\x93\x29\x2e\x83\x20\x3a\x1d\x45\x57\xbf\x88\x18\x47\xdb\xa3\x95\x47\x18\xcb\xe8\x3d\x81\x1b\xe5\x51\x29\x4d\xa0\xc7\x82\x3a\x86\x32\x28\x6c\xdb\x69\x25\x4d\x41\x38\x28\x6e\x86\x67\x4e\x26\x89\x88\xf1\xe5\x64\x61\x73\x96\xca\x40\xa2\xb0\xdd\x11\xb6\x7a\xae\x83\xe4\x01\x38\x7c\x0d\x73\xf7\x66\x32\x39\x1c\x0e\x89\x1c\x60\x13\xeb\xea\x89\x1e\x85\x7e\xf2\x31\x7d\xb7\xda\xec\x56\x37\xf3\x64\x3a\x5c\xf9\x64\x34\x79\x0f\x47\x7f\xf5\xca\x51\x89\xfc\x08\xd9\x75\x5a\x15\x32\xd7\x04\x2d\x0f\xb0\x0e\xb2\x76\x44\x25\xd8\x06\xde\x83\x53\xac\x4c\x7d\x0d\x6f\x2b\x3e\x48\x47\x22\x46\xa9\x3c\x3b\x95\xf7\xfc\x22\xac\x33\x9d\xf2\x2f\x04\xd6\x40\x1a\x44\xcb\x1d\xd2\x5d\x84\xdb\xe5\x2e\xdd\x5d\x8b\x18\x9f\xd3\xec\xfd\xfd\xa7\x0c\x9f\x97\xdb\xed\x72\x93\xa5\xab\x1d\xee\xb7\x78\x77\xbf\xb9\x4b\xb3\xf4\x7e\xb3\xc3\xfd\x6f\x58\x6e\xbe\xe0\x43\xba\xb9\xbb\x06\x29\x6e\xc8\x81\x1e\x3b\x17\xf8\xad\x83\x0a\x31\x52\x19\x32\xdb\x11\xbd\x00\xa8\xec\x08\xe4\x3b\x2a\x54\xa5\x0a\x68\x69\xea\x5e\xd6\x84\xda\xee\xc9\x19\x65\x6a\x74\xe4\x5a\xe5\x43\x33\x3d\xa4\x29\x45\x0c\xad\x5a\xc5\x92\x87\x3f\x3f\x14\x95\x0c\xb3\xe4\x48\x32\x21\xd7\xb6\x78\x48\x58\xba\xa4\x7e\x1a\x7b\x28\xe1\x5b\xa9\x35\xe8\x91\xe7\x43\xbf\xfd\xd1\x33\xb5\x81\x2d\x65\xb4\xbd\x67\xe4\x04\xd7\x1b\x48\x0f\x67\x2d\xe3\x92\x2d\x5a\xdb\x1b\x1e\x0d\x5e\xdf\x58\x68\x6b\xbb\xd7\x57\xaf\xc2\x43\xab\x47\xc5\x21\xb7\x00\x50\x29\xe7\x19\xe4\x9c\x75\x89\xf0\xc4\xb8\x21\x21\xd6\x9b\xec\x2e\xdd\x2e\xa2\x8b\xcb\xf6\x81\xa9\xed\x70\x53\x5e\x45\x42\x14\x9a\xa4\xe9\xbb\xcb\x2b\xf1\xb7\x08\xc3\x11\x63\x2d\x1f\x08\xbe\x77\x84\x03\xc1\x11\xf7\x6e\x74\x1d\x57\x82\xc2\x3b\x85\x2d\x69\x50\x6f\x57\xd9\xe2\xe2\xd7\xd3\xc5\x9d\xd2\x64\x58\x1f\xe1\xa8\xb5\x7b\x02\xed\xc9\x1d\xb9\x09\xd1\x49\x53\x42\xd5\xc6\x3a\x1a\xb1\xfc\x70\x25\xa0\xfd\x34\x1a\x0d\x4b\xd8\x8f\xe5\x45\x17\x23\x6b\x84\xf9\xdb\x49\x49\xfb\x89\xe9\xb5\xfe\xae\x72\x6d\xa9\xdc\xff\x8b\xc6\xcc\x7f\x38\x1d\xf8\x2f\xb6\xab\x4c\xfc\x23\x04\x3b\xd9\xe1\x94\x00\xb2\xd5\x76\x8d\xd5\x1f\x69\xf6\xac\x6f\xb3\xf9\x74\x7d\x8b\x92\xf6\xea\xbc\x7b\xa1\x5f\x22\xc6\xe5\xde\xea\xbe\xa5\x3f\x95\x05\x93\x67\x0f\x13\xc6\x5f\x32\x34\x49\xcf\x98\x4d\xa7\xeb\xdb\x2b\x51\x96\x50\xd5\x62\x00\x78\x22\x67\x61\xab\xc5\x48\xe5\x89\x1e\x16\xb3\xf9\x14\x45\xa8\x78\x31\x43\xee\x17\xb3\xb5\x68\x1f\x2a\x9f\x0c\x13\x31\xc8\x02\xc8\x32\x78\x98\x92\x1e\x93\x86\x5b\x3d\x2c\x18\x8b\x31\xa7\xd3\x00\x9c\x0a\xfd\x16\x88\xa0\xa2\xb1\x88\xde\x93\xd6\x16\x95\xb3\x2d\xb6\xb7\x77\x11\xde\x7e\x53\x4c\xbe\xfb\x45\xe2\xbf\x99\x0b\x71\x8e\xee\x3c\xae\xcf\x12\xc4\xd7\xaf\x78\x23\x58\x3a\x14\xd5\xd3\x4b\xd5\x08\xfc\x6f\x00\x00\x00\xff\xff\xfa\xac\xf9\xe3\x52\x05\x00\x00") + +func testImagesVolumeRbdCreate_blockShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdCreate_blockSh, + "test/images/volume/rbd/create_block.sh", + ) +} + +func testImagesVolumeRbdCreate_blockSh() (*asset, error) { + bytes, err := testImagesVolumeRbdCreate_blockShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/create_block.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdKeyring = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8a\xce\xcd\xcf\xd3\x8b\xe5\x52\x80\x82\xec\xd4\x4a\x05\x5b\x05\xc7\x40\x97\xa0\x22\x6f\xbf\x30\xb3\x2a\x93\x50\xe7\x0c\x47\x47\xa7\xaa\x00\xc3\xa8\xca\xca\xe2\x90\x50\x93\x82\xac\xf4\x2c\x3f\xff\x34\xfd\x02\x63\x47\x5b\x5b\xae\xe8\xe4\x9c\xcc\xd4\xbc\x12\xbd\xc4\x94\xdc\xcc\x3c\x5c\xa6\x24\xb9\xa6\x96\x81\x4c\x71\xcd\x0d\x72\xd6\x2e\x08\xd7\xf7\x76\x0a\xf3\xa8\x48\x34\x28\xd7\x0f\xf0\xf7\xf4\x01\x99\x02\xd3\x96\x58\x9a\x99\xa2\x60\xab\x60\x00\x17\x48\x4e\x2c\x28\x56\xc8\x4d\x29\x56\xb0\x55\x50\x4a\xcc\xc9\xc9\x2f\x57\xd0\x52\x42\x93\xcc\xcf\xc3\x2d\x99\x5f\x9c\x82\x22\x09\x08\x00\x00\xff\xff\x71\x6c\x55\x44\xec\x00\x00\x00") + +func testImagesVolumeRbdKeyringBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdKeyring, + "test/images/volume/rbd/keyring", + ) +} + +func testImagesVolumeRbdKeyring() (*asset, error) { + bytes, err := testImagesVolumeRbdKeyringBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/keyring", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdMonSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x94\x5f\x6f\xdb\x36\x14\xc5\xdf\xf9\x29\xce\xac\x02\x4d\x80\xc8\x4a\x03\xec\x5f\xf7\xe4\xa5\x19\x66\xb4\xb3\x81\xd8\x5d\xd1\x47\x8a\xbc\x92\x2e\x22\x91\x1c\x79\x15\x55\x18\xf6\xdd\x07\xc9\x71\x61\x23\x1b\x8a\xf8\x85\x34\xcf\xb9\x87\x3f\x5e\x12\xca\xbe\x2b\xfa\x14\x8b\x92\x5d\x41\xee\x11\xa5\x4e\x8d\x52\x19\x6e\x7d\x18\x23\xd7\x8d\xe0\xe6\xfa\xcd\xf7\xd8\x37\x84\xf7\x7d\x49\xd1\x91\x50\xc2\xaa\x97\xc6\xc7\xb4\x54\x99\xca\xf0\x81\x0d\xb9\x44\x16\xbd\xb3\x14\x21\x0d\x61\x15\xb4\x69\xe8\xa8\x5c\xe1\x4f\x8a\x89\xbd\xc3\xcd\xf2\x1a\x17\x93\x61\xf1\x24\x2d\x2e\x7f\x51\x19\x46\xdf\xa3\xd3\x23\x9c\x17\xf4\x89\x20\x0d\x27\x54\xdc\x12\xe8\x8b\xa1\x20\x60\x07\xe3\xbb\xd0\xb2\x76\x86\x30\xb0\x34\xf3\x36\x4f\x21\x4b\x95\xe1\xf3\x53\x84\x2f\x45\xb3\x83\x86\xf1\x61\x84\xaf\x4e\x7d\xd0\x32\x03\x4f\xbf\x46\x24\xbc\x2d\x8a\x61\x18\x96\x7a\x86\x5d\xfa\x58\x17\xed\xc1\x98\x8a\x0f\xeb\xdb\xbb\xcd\xee\x2e\xbf\x59\x5e\xcf\x25\x1f\x5d\x4b\x29\x21\xd2\x5f\x3d\x47\xb2\x28\x47\xe8\x10\x5a\x36\xba\x6c\x09\xad\x1e\xe0\x23\x74\x1d\x89\x2c\xc4\x4f\xbc\x43\x64\x61\x57\x5f\x21\xf9\x4a\x06\x1d\x49\x65\xb0\x9c\x24\x72\xd9\xcb\x59\xb3\x8e\x74\x9c\xce\x0c\xde\x41\x3b\x2c\x56\x3b\xac\x77\x0b\xfc\xba\xda\xad\x77\x57\x2a\xc3\xa7\xf5\xfe\xf7\xed\xc7\x3d\x3e\xad\xee\xef\x57\x9b\xfd\xfa\x6e\x87\xed\x3d\x6e\xb7\x9b\x77\xeb\xfd\x7a\xbb\xd9\x61\xfb\x1b\x56\x9b\xcf\x78\xbf\xde\xbc\xbb\x02\xb1\x34\x14\x41\x5f\x42\x9c\xf8\x7d\x04\x4f\x6d\x24\x3b\xf5\x6c\x47\x74\x06\x50\xf9\x03\x50\x0a\x64\xb8\x62\x83\x56\xbb\xba\xd7\x35\xa1\xf6\x8f\x14\x1d\xbb\x1a\x81\x62\xc7\x69\xba\xcc\x04\xed\xac\xca\xd0\x72\xc7\xa2\x65\x5e\x79\x76\xa8\xa5\x9a\xdb\x77\xeb\x5d\xc5\x75\x1f\x69\x2e\x42\xab\x7b\x67\x9a\xe9\x0f\x1c\x0d\xf8\x63\xbb\x99\x5e\x92\xca\xd0\x79\xc7\xe2\x23\x12\x49\x1f\x54\xe7\x5d\xa7\x83\x78\xdf\x22\xcf\x4d\x24\x2d\x34\x4d\x5a\x5f\x96\x14\x91\xe7\x55\x62\x8b\xc5\xab\x8b\xbe\x67\x5b\x93\xbb\x5c\x20\xcf\xb5\xb5\xd0\x58\xbc\xfa\xfb\xcd\x3f\x8b\xb7\x3f\xfc\xf8\xd3\xcf\x28\x48\x4c\x61\x28\x34\xc5\x21\x4f\x75\x0f\x96\x23\x8a\x47\x1d\x8b\x96\xcb\xaf\xd2\x3c\xc9\xb5\x9a\x87\xce\x3b\xe4\x0c\x8d\x3c\xef\x1e\xaa\x34\x0d\x73\xf1\xb3\x34\xe4\x0f\xff\x11\xf5\x40\x63\x64\x57\x2b\x13\xfe\x5f\x7c\x01\xc1\x4b\xb6\x3e\x64\x7c\x25\x50\x19\x4c\xcb\xe4\xe4\xd0\x53\x5c\x34\xda\xd9\xf1\xf2\x1b\x64\xc7\x9d\xa6\xf2\xc3\xab\xe0\x04\xa1\x24\x18\x08\x83\x76\x02\xf1\x33\x26\x7c\xb2\xa8\x49\x4c\xec\x53\x33\x33\x79\x14\xd2\x85\x62\x5e\x30\x6a\x1e\x0e\x37\x68\x4f\x85\x73\x9f\x55\xd3\xe7\x23\x67\xbc\x4e\x45\x12\x0a\x30\x8d\xf7\x89\x5a\xd2\x15\x2a\x8e\x49\x1c\xae\x21\x63\x20\x34\x3e\xc9\x37\x2c\x3e\xd9\xe2\xf5\x59\xf8\x09\x84\x39\x15\x9e\xc1\x1e\x0f\x94\x4e\x0f\xc4\x67\x9e\x7f\x03\x00\x00\xff\xff\x24\x3c\x05\xf8\x2f\x05\x00\x00") + +func testImagesVolumeRbdMonShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdMonSh, + "test/images/volume/rbd/mon.sh", + ) +} + +func testImagesVolumeRbdMonSh() (*asset, error) { + bytes, err := testImagesVolumeRbdMonShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/mon.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesVolumeRbdOsdSh = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xcf\x6f\x9b\x4e\x10\xc5\xef\xfc\x15\xef\x0b\x5f\x29\x6d\x65\x43\x12\xa9\x97\x56\x39\xb8\x4e\xaa\xa2\x44\xb6\x14\x9c\x46\x39\x2e\x30\xb0\x23\xaf\x77\xe9\xfe\x08\xb6\xaa\xfe\xef\xd5\x62\x47\x4a\xd4\x1e\xca\x05\x86\x79\x6f\xe6\xc3\x63\xb3\xff\x8a\xe0\x6c\x51\xb3\x2e\x48\x3f\xa3\x16\x4e\x26\x49\x86\xa5\x19\x0e\x96\x7b\xe9\x71\x79\x7e\xf1\x11\x1b\x49\xb8\x0d\x35\x59\x4d\x9e\x1c\x16\xc1\x4b\x63\x5d\x9e\x64\x49\x86\x3b\x6e\x48\x3b\x6a\x11\x74\x4b\x16\x5e\x12\x16\x83\x68\x24\xbd\x74\x66\xf8\x4e\xd6\xb1\xd1\xb8\xcc\xcf\xf1\x2e\x0a\xd2\x53\x2b\x7d\xff\x39\xc9\x70\x30\x01\x3b\x71\x80\x36\x1e\xc1\x11\xbc\x64\x87\x8e\x15\x81\xf6\x0d\x0d\x1e\xac\xd1\x98\xdd\xa0\x58\xe8\x86\x30\xb2\x97\xd3\x9a\xd3\x90\x3c\xc9\xf0\x74\x1a\x61\x6a\x2f\x58\x43\xa0\x31\xc3\x01\xa6\x7b\xad\x83\xf0\x13\x70\xbc\xa4\xf7\xc3\xa7\xa2\x18\xc7\x31\x17\x13\x6c\x6e\x6c\x5f\xa8\xa3\xd0\x15\x77\xe5\xf2\x66\x55\xdd\xcc\x2f\xf3\xf3\xc9\xf2\xa0\x15\x39\x07\x4b\x3f\x02\x5b\x6a\x51\x1f\x20\x86\x41\x71\x23\x6a\x45\x50\x62\x84\xb1\x10\xbd\x25\x6a\xe1\x4d\xe4\x1d\x2d\x7b\xd6\xfd\x0c\xce\x74\x7e\x14\x96\x92\x0c\x2d\x3b\x6f\xb9\x0e\xfe\x4d\x58\x2f\x74\xec\xde\x08\x8c\x86\xd0\x48\x17\x15\xca\x2a\xc5\x97\x45\x55\x56\xb3\x24\xc3\x63\xb9\xf9\xb6\x7e\xd8\xe0\x71\x71\x7f\xbf\x58\x6d\xca\x9b\x0a\xeb\x7b\x2c\xd7\xab\xeb\x72\x53\xae\x57\x15\xd6\x5f\xb1\x58\x3d\xe1\xb6\x5c\x5d\xcf\x40\xec\x25\x59\xd0\x7e\xb0\x91\xdf\x58\x70\x8c\x91\xda\x98\x59\x45\xf4\x06\xa0\x33\x47\x20\x37\x50\xc3\x1d\x37\x50\x42\xf7\x41\xf4\x84\xde\x3c\x93\xd5\xac\x7b\x0c\x64\x77\xec\xe2\xcf\x74\x10\xba\x4d\x32\x28\xde\xb1\x17\x7e\x7a\xf3\xc7\x47\xe5\xc9\x14\xdf\xd2\xe8\x8e\xfb\x60\x69\x32\x41\x89\xa0\x1b\x19\x0b\x68\x1a\xb1\xae\xae\xe3\x49\x4a\x1a\x1a\x24\x8c\x6b\xd1\x58\x12\x9e\xa6\x7a\x1e\xeb\x39\x23\xfd\xff\xe7\xc5\xaf\x14\xf3\xf9\x6e\xdb\xb9\xe9\xb6\xa5\xc3\xd1\x21\x82\x97\x10\x6d\x8b\xd4\xb8\x36\x3f\xea\xa2\xeb\x4c\x28\x65\x46\x7c\x38\xc3\xce\xe8\x97\xca\x8e\xfb\xb3\x69\x5e\xf1\x2c\x6c\xa1\xb8\x2e\xe2\x8c\xc2\xb8\x76\x7a\x98\x47\x7b\xb1\xa5\x83\x65\xdd\xa7\xaf\x89\x82\x3b\x2d\x39\x2e\xb8\x80\x35\xc6\x5f\xb5\xd4\x89\xa0\x3c\xa4\x71\xfe\x2a\xaa\x6b\xb3\xff\x2b\xf7\xf6\x1f\x37\xfe\x0e\x00\x00\xff\xff\x5d\x88\x53\x6c\x8f\x03\x00\x00") + +func testImagesVolumeRbdOsdShBytes() ([]byte, error) { + return bindataRead( + _testImagesVolumeRbdOsdSh, + "test/images/volume/rbd/osd.sh", + ) +} + +func testImagesVolumeRbdOsdSh() (*asset, error) { + bytes, err := testImagesVolumeRbdOsdShBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/volume/rbd/osd.sh", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesWindowsMakefile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xd4\x93\x51\x6f\xa3\x46\x14\x85\x9f\x77\x7e\xc5\x91\xed\x4a\xf1\xca\xe0\xc8\x8f\x5e\x45\x2b\xea\xd0\x35\x8a\x63\x56\x40\x76\x15\xa9\x92\x77\x80\x6b\x18\x65\xcc\xd0\x99\x21\x0e\x5a\xe5\xbf\x57\x80\xb3\xeb\x34\xad\xda\xd7\xf2\x04\x33\xe7\x9e\x39\xf7\x9b\xcb\x18\x2b\x55\xb7\x5a\x14\xa5\xc5\xe2\x72\x71\x89\xa4\x24\xdc\x34\x29\xe9\x8a\x2c\x19\x78\x8d\x2d\x95\x36\x2e\x1b\xb3\x31\x36\x22\xa3\xca\x50\x8e\xa6\xca\x49\xc3\x96\x04\xaf\xe6\x59\x49\x2f\x3b\x33\x7c\x21\x6d\x84\xaa\xb0\x70\x2f\x71\xd1\x09\x46\xa7\xad\xd1\xf4\x03\x1b\xa3\x55\x0d\x0e\xbc\x45\xa5\x2c\x1a\x43\xb0\xa5\x30\xd8\x0b\x49\xa0\xa7\x8c\x6a\x0b\x51\x21\x53\x87\x5a\x0a\x5e\x65\x84\xa3\xb0\x65\x7f\xcc\xc9\xc4\x65\x63\xdc\x9f\x2c\x54\x6a\xb9\xa8\xc0\x91\xa9\xba\x85\xda\x9f\xeb\xc0\x6d\x1f\xb8\x7b\x4a\x6b\xeb\xe5\x7c\x7e\x3c\x1e\x5d\xde\x87\x75\x95\x2e\xe6\x72\x10\x9a\xf9\x26\x58\xf9\xdb\xd8\x77\x16\xee\x65\x5f\x72\x57\x49\x32\x06\x9a\xfe\x68\x84\xa6\x1c\x69\x0b\x5e\xd7\x52\x64\x3c\x95\x04\xc9\x8f\x50\x1a\xbc\xd0\x44\x39\xac\xea\xf2\x1e\xb5\xb0\xa2\x2a\x66\x30\x6a\x6f\x8f\x5c\x13\x1b\x23\x17\xc6\x6a\x91\x36\xf6\x15\xac\x97\x74\xc2\xbc\x12\xa8\x0a\xbc\xc2\xc8\x8b\x11\xc4\x23\xfc\xea\xc5\x41\x3c\x63\x63\x7c\x0d\x92\x75\x78\x97\xe0\xab\x17\x45\xde\x36\x09\xfc\x18\x61\x84\x55\xb8\xbd\x0e\x92\x20\xdc\xc6\x08\x7f\x83\xb7\xbd\xc7\x4d\xb0\xbd\x9e\x81\x84\x2d\x49\x83\x9e\x6a\xdd\xe5\x57\x1a\xa2\xc3\x48\x79\xc7\x2c\x26\x7a\x15\x60\xaf\x86\x40\xa6\xa6\x4c\xec\x45\x06\xc9\xab\xa2\xe1\x05\xa1\x50\x8f\xa4\x2b\x51\x15\xa8\x49\x1f\x84\xe9\x2e\xd3\x80\x57\x39\x1b\x43\x8a\x83\xb0\xdc\xf6\x2b\x6f\x9a\x72\x19\x8b\xfc\x4f\x41\x9c\x44\xf7\xf8\x78\x85\x22\xd3\xae\x50\xf3\x87\x1f\x93\xe4\xd0\x82\x1c\x4b\xc6\x3a\xe2\xc0\x0b\x32\x2c\xf2\x6f\xc3\xc4\xdf\x5d\x87\xab\x1b\x3f\xda\xdd\x45\x1b\x7c\xbc\x62\xa7\xaf\x95\x1f\x25\xbb\xcf\x5e\xb2\xee\xac\x46\x93\x8b\x75\x78\xeb\x4f\xe7\x6e\xae\xb2\x07\xd2\x23\x46\x4f\xb5\xd2\x96\x31\x6f\xb3\xd9\x05\xb7\xde\x27\x3f\xc6\x15\xd2\xc6\xb4\xa9\x7a\x72\x4a\x92\x35\x69\xd4\xea\x48\xda\x94\x24\xe5\x69\x85\x31\xd3\xa4\x4e\xda\x08\x99\x3b\xbf\x2c\xd9\x3b\x71\x28\x76\x8f\xc3\xb4\x5e\x4d\x2e\x7a\x25\x32\x6e\x31\x79\x3f\xff\xe2\x47\x71\x10\x6e\xa7\x1f\xf0\x3b\x7b\x37\x1c\x0a\xc7\xb1\xd2\x3c\x92\x16\xfb\x76\x78\xcf\x78\x46\xda\x76\xe9\xfe\x1a\x7a\x3a\xcf\xb8\x5b\xd3\x61\xd4\x95\xbf\x1b\xc4\xff\x2c\x25\x6d\x07\x71\x2f\x7c\xa0\xf6\xef\x75\x0f\xd4\x9e\x79\xae\x3b\xd1\x1b\x82\xd3\x11\xfa\xfe\xe0\x38\x95\x72\xb2\xfe\xcf\x74\x9c\xba\x91\x12\x8e\x1d\x2a\x86\x1b\x9a\xce\x27\xef\x97\x93\xc9\xf7\x33\x06\xcf\xa3\xae\xf3\x01\x52\xdd\x98\xf2\x0d\xa3\x6f\xaf\xe1\x7c\xfb\x1f\xc2\xe9\xfa\xfa\x57\x0c\x8c\x71\x29\x87\x39\x59\x62\x72\xb1\x57\x9a\x78\x56\xa2\x9f\xda\x19\x26\xdf\x7f\x0e\xdd\xf3\x0c\x3f\x47\xaa\x73\xe1\x05\x3d\x4f\x87\xfa\xee\xa8\x25\x7e\x38\xfd\x27\xa3\x1e\xfb\x99\x8f\xfb\x79\x1d\x6e\xef\xcf\x5d\x5e\x9c\xd9\x9f\x01\x00\x00\xff\xff\xc3\xb7\xba\x1c\xb7\x05\x00\x00") + +func testImagesWindowsMakefileBytes() ([]byte, error) { + return bindataRead( + _testImagesWindowsMakefile, + "test/images/windows/Makefile", + ) +} + +func testImagesWindowsMakefile() (*asset, error) { + bytes, err := testImagesWindowsMakefileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/windows/Makefile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesWindowsBusyboxHelperDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x54\xdf\x73\xda\x38\x10\x7e\xf7\x5f\xb1\x03\x4d\x93\x74\x62\x99\xd0\x5c\x7b\x21\x93\x07\x0a\x64\xca\x34\x85\x0c\x24\xcd\x74\x8e\x9b\x8e\x2c\x2f\xf6\x1e\xb2\xe4\x4a\x72\x80\xfb\xeb\x6f\x24\x43\x4b\xa6\xb9\x29\x0f\x36\xde\x1f\xdf\x7e\xd2\x7e\xbb\x6d\x18\xe8\x6a\x6b\x28\x2f\x1c\x74\x3b\xdd\x0e\xdc\x17\x08\x9f\xea\x14\x8d\x42\x87\x16\xfa\xb5\x2b\xb4\xb1\x2c\x6a\x47\x6d\xb8\x25\x81\xca\x62\x06\xb5\xca\xd0\x80\x2b\x10\xfa\x15\x17\x05\xee\x3d\x67\xf0\x05\x8d\x25\xad\xa0\xcb\x3a\x70\xe2\x03\x5a\x3b\x57\xeb\xf4\x2a\x6a\xc3\x56\xd7\x50\xf2\x2d\x28\xed\xa0\xb6\x08\xae\x20\x0b\x4b\x92\x08\xb8\x11\x58\x39\x20\x05\x42\x97\x95\x24\xae\x04\xc2\x9a\x5c\x11\xca\xec\x40\x58\xd4\x86\xaf\x3b\x08\x9d\x3a\x4e\x0a\x38\x08\x5d\x6d\x41\x2f\x0f\xe3\x80\xbb\x40\xd8\xff\x0a\xe7\xaa\x5e\x92\xac\xd7\x6b\xc6\x03\x59\xa6\x4d\x9e\xc8\x26\xd0\x26\xb7\xe3\xc1\x68\x32\x1f\xc5\x5d\xd6\x09\x29\x0f\x4a\xa2\xb5\x60\xf0\x7b\x4d\x06\x33\x48\xb7\xc0\xab\x4a\x92\xe0\xa9\x44\x90\x7c\x0d\xda\x00\xcf\x0d\x62\x06\x4e\x7b\xbe\x6b\x43\x8e\x54\x7e\x06\x56\x2f\xdd\x9a\x1b\x8c\xda\x90\x91\x75\x86\xd2\xda\x3d\xbb\xac\x3d\x3b\xb2\xcf\x02\xb4\x02\xae\xa0\xd5\x9f\xc3\x78\xde\x82\x0f\xfd\xf9\x78\x7e\x16\xb5\xe1\x71\x7c\xff\x71\xfa\x70\x0f\x8f\xfd\xd9\xac\x3f\xb9\x1f\x8f\xe6\x30\x9d\xc1\x60\x3a\x19\x8e\xef\xc7\xd3\xc9\x1c\xa6\x37\xd0\x9f\x7c\x85\x4f\xe3\xc9\xf0\x0c\x90\x5c\x81\x06\x70\x53\x19\xcf\x5f\x1b\x20\x7f\x8d\x98\xf9\x3b\x9b\x23\x3e\x23\xb0\xd4\x0d\x21\x5b\xa1\xa0\x25\x09\x90\x5c\xe5\x35\xcf\x11\x72\xfd\x84\x46\x91\xca\xa1\x42\x53\x92\xf5\xcd\xb4\xc0\x55\x16\xb5\x41\x52\x49\x8e\xbb\x60\xf9\xe5\x50\x2c\x8a\x6e\x66\xd3\xcf\x50\x0a\xc3\x4a\x12\x46\xfb\xdb\x60\x42\x97\xc9\x9a\x54\xa6\xd7\x36\xb1\x68\x9e\xd0\x08\x6d\xb0\x27\x9d\x15\xdd\xce\xf9\x25\x70\x0b\x95\xc1\x2a\x8a\x46\x93\x2f\x30\x78\x98\xdd\x7e\xfb\x32\x9a\xcd\xc7\xd3\xc9\xf5\x7b\xf6\xc7\x7b\xd6\x89\xa2\xfe\x70\x18\x5a\x68\x7b\x49\x92\x93\x2b\xea\x34\x80\xae\x7e\x48\x34\xb6\x94\xdb\x7d\x91\xd8\xa1\xf5\xcd\x48\x0c\x5f\x27\x25\xb7\x0e\x4d\x42\x25\xcf\xd1\x26\x69\x6d\xb7\xa9\xde\xec\xdf\x0c\x37\x08\x49\x4a\xea\xd0\xf0\xac\x9a\x5d\x71\xe5\x0a\xbe\x62\x85\x2e\xb1\xe2\x39\x32\x17\x6b\x25\x49\x21\xcb\x30\xc9\xf4\x5a\x49\xcd\xb3\x44\xd4\x46\xc6\xaf\x0e\xb9\x33\xc1\x53\x08\xf6\xf0\xf0\x9f\xcf\x80\xd1\xa1\x51\x5c\xca\x6d\xaa\x0d\x66\x41\x8e\x25\x59\x91\x28\x74\x82\xbb\xdd\x2b\x5e\x93\x7a\xdb\x8d\xcf\xd9\x79\x97\xfd\x4b\x15\x3c\xf7\x7a\xd3\x33\xcc\x3d\x1d\xcb\xc8\x8a\x00\xe9\x11\x53\x52\xd9\x65\x72\xc9\xce\x2f\xd8\x79\x27\xf9\x30\x9e\x0c\x77\xff\xd9\xe6\xdd\x45\x03\xeb\x43\x02\x5a\xf4\x30\x1f\xcd\x60\xa0\x95\x1f\x2b\x34\xfd\xac\x24\xe5\x45\xca\x9d\x36\x51\xd4\x86\xc9\xf4\x7e\x74\x22\x24\xaf\x33\xaa\xd3\xd3\x1e\x3c\x22\x14\xfc\x09\xfd\x10\x08\x83\xdc\x21\x18\x94\xdc\xd1\x13\x42\xc5\x5d\x01\x76\x5b\x4a\x52\x2b\x0b\x29\x0a\xee\x67\x3d\xd3\x62\x85\x06\xd2\x9a\x64\xb6\x81\x82\x7b\x59\x01\x59\x5b\x23\xac\x0b\x54\x61\x8e\x49\xe5\x51\x1b\xbc\x06\x7f\xe4\x9f\x01\xb9\x20\x12\x54\x99\x85\xd6\x0d\x49\xb4\x8b\x96\x2f\x1b\x14\xdc\x44\x81\xe3\x26\x47\xc7\xf6\xfe\x41\x6f\x91\x92\x5a\x1c\xb4\xb6\x05\x6b\x5d\xcb\x0c\x52\x04\xae\xa2\x36\x90\x7a\xe2\x92\xb2\xc0\x95\x45\xb3\x87\x09\x88\x0c\x9a\x34\x78\xfd\x1a\x6e\xa6\x33\x48\x96\xd0\x72\x7a\x85\xca\x5e\xbf\x69\xc1\x11\xc1\x78\x02\x27\xc7\x6c\x8f\x0a\x71\x2c\xc9\xba\xe3\x53\x18\x4e\xa1\x5c\x05\x1a\x6c\x71\x44\x41\x59\x87\xa2\x3a\x40\xf7\x7a\x80\xd7\x8b\xc8\x2f\x26\xdc\x54\x5c\x65\x90\xcc\x60\xaf\x12\x48\x6e\x7a\x6f\x80\xed\x03\x32\x94\xfb\x9c\xc5\x8f\x90\x9d\xaf\x81\x6b\xc4\xb0\xb7\x39\x6e\x42\xed\x78\xb3\x84\x9f\x32\x39\x44\xfb\xd5\x6a\xd1\x6d\x20\xf9\x0c\x77\xfd\xfb\x8f\xd0\x6a\xce\x7f\xb5\x2f\x7a\x75\xe4\xcd\x47\x2d\xdf\xfe\xe1\x4e\x60\xe0\x05\xe3\x17\x42\xe8\x09\x37\x08\x1c\x96\x5a\xfa\x6d\xf0\x4f\x6d\x5d\x58\x2d\x19\xe5\xcd\x95\x56\x7a\x8d\xc6\x16\x28\x25\xc4\x03\x5d\x96\x3e\xad\xd5\x14\x06\x18\x85\xf3\xc7\x7d\x23\x0a\x2f\x9a\xf8\xce\xab\xa6\x61\x10\x14\x09\xf1\x30\x0c\x73\xd8\x38\x87\xce\x2b\xd8\x43\xbc\xb2\x70\x0d\x7f\xcd\xb7\xd6\x61\xc9\x86\xc4\x73\xa5\xad\x23\x61\xd9\x9d\xd1\x02\xad\xfd\xbb\xd7\x9b\x3b\x6e\xdc\xc9\xf1\x2e\x75\xf1\x24\x0c\xfa\xdd\xfb\xcd\x0f\x00\x6e\xf0\xf8\x0c\x8e\x93\xef\x35\xa1\x3b\x3e\x3d\xc4\x65\x8f\x9c\xdc\x8d\x36\xa3\x0d\xb9\x93\x03\x4f\xb9\xca\xc8\x78\x22\x19\xe5\x3f\xad\xa2\xda\x73\xf3\xf6\xd0\x84\x26\x64\xf1\x62\x8c\xb2\x52\xeb\x55\x5d\xfd\x36\xf0\x0d\xcb\xa4\xfc\xbf\x88\xc7\x66\xe5\x2d\x9a\xe3\xbf\xed\xfa\xb3\xd5\xca\x51\x89\xe7\x17\x9d\x97\x13\x4d\x79\x78\xc1\x57\xad\xdf\xee\x6c\xc5\x95\x6e\xf6\x76\xef\xfc\xcf\xce\x65\x14\x0d\xa6\x77\x5f\x21\x8e\x97\x46\x97\xd7\x5e\x00\x61\x81\x84\xc7\x0b\xae\xb0\x02\xfb\x9f\x87\xef\x2e\x76\xff\xfd\x96\x64\xb7\xe3\xc1\xee\xf3\x85\x94\x8c\xf2\xf0\x78\xc1\xb5\x13\xfb\xee\x1d\xfd\x17\x00\x00\xff\xff\xff\x17\x37\x5a\xba\x08\x00\x00") + +func testImagesWindowsBusyboxHelperDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesWindowsBusyboxHelperDockerfile, + "test/images/windows/busybox-helper/Dockerfile", + ) +} + +func testImagesWindowsBusyboxHelperDockerfile() (*asset, error) { + bytes, err := testImagesWindowsBusyboxHelperDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/windows/busybox-helper/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesWindowsBusyboxHelperVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xb2\xd4\x33\xe0\x02\x04\x00\x00\xff\xff\x14\xfd\x5c\xf5\x07\x00\x00\x00") + +func testImagesWindowsBusyboxHelperVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesWindowsBusyboxHelperVersion, + "test/images/windows/busybox-helper/VERSION", + ) +} + +func testImagesWindowsBusyboxHelperVersion() (*asset, error) { + bytes, err := testImagesWindowsBusyboxHelperVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/windows/busybox-helper/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesWindowsPowershellHelperDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x94\x55\xe1\x8f\xda\xc6\x13\xfd\xee\xbf\xe2\xfd\x20\xf7\xbb\x3b\xe9\x6c\x2e\xa8\x4d\x1b\xa2\xfb\xe0\x02\x51\x50\x38\xb0\x30\x97\x53\x24\xa4\x6a\xb1\x07\x7b\x75\xeb\x5d\x77\x77\x8d\x21\x55\xfe\xf7\x6a\xcd\x91\x33\x34\x69\x55\x7f\x40\xab\x99\xd9\x37\x33\xef\xcd\x0e\x5d\x0c\x55\xb9\xd7\x3c\xcb\x2d\xfa\xb7\xfd\x5b\x2c\x73\xc2\xc7\x6a\x4d\x5a\x92\x25\x83\xb0\xb2\xb9\xd2\x26\xf0\xba\x5e\x17\x53\x9e\x90\x34\x94\xa2\x92\x29\x69\xd8\x9c\x10\x96\x2c\xc9\xe9\xe8\xb9\xc1\x27\xd2\x86\x2b\x89\x7e\x70\x8b\x2b\x17\xd0\x79\x76\x75\xae\xdf\x79\x5d\xec\x55\x85\x82\xed\x21\x95\x45\x65\x08\x36\xe7\x06\x1b\x2e\x08\xb4\x4b\xa8\xb4\xe0\x12\x89\x2a\x4a\xc1\x99\x4c\x08\x35\xb7\x79\x93\xe6\x19\x24\xf0\xba\xf8\xfc\x0c\xa1\xd6\x96\x71\x09\x86\x44\x95\x7b\xa8\x4d\x3b\x0e\xcc\x36\x05\xbb\x2f\xb7\xb6\x1c\xf4\x7a\x75\x5d\x07\xac\x29\x36\x50\x3a\xeb\x89\x43\xa0\xe9\x4d\x27\xc3\xf1\x2c\x1e\xfb\xfd\xe0\xb6\xb9\xf2\x20\x05\x19\x03\x4d\x7f\x54\x5c\x53\x8a\xf5\x1e\xac\x2c\x05\x4f\xd8\x5a\x10\x04\xab\xa1\x34\x58\xa6\x89\x52\x58\xe5\xea\xad\x35\xb7\x5c\x66\x37\x30\x6a\x63\x6b\xa6\xc9\xeb\x22\xe5\xc6\x6a\xbe\xae\xec\x09\x59\xc7\xea\xb8\x39\x09\x50\x12\x4c\xa2\x13\xc6\x98\xc4\x1d\xfc\x16\xc6\x93\xf8\xc6\xeb\xe2\x71\xb2\xfc\x30\x7f\x58\xe2\x31\x5c\x2c\xc2\xd9\x72\x32\x8e\x31\x5f\x60\x38\x9f\x8d\x26\xcb\xc9\x7c\x16\x63\xfe\x1e\xe1\xec\x33\x3e\x4e\x66\xa3\x1b\x10\xb7\x39\x69\xd0\xae\xd4\xae\x7e\xa5\xc1\x1d\x8d\x94\x3a\xce\x62\xa2\x93\x02\x36\xea\x50\x90\x29\x29\xe1\x1b\x9e\x40\x30\x99\x55\x2c\x23\x64\x6a\x4b\x5a\x72\x99\xa1\x24\x5d\x70\xe3\xc4\x34\x60\x32\xf5\xba\x10\xbc\xe0\x96\xd9\xc6\xf2\xb7\xa6\x02\xcf\x7b\xbf\x98\xdf\xa3\x48\x74\x50\xf0\x44\x2b\xc7\x46\x90\xa8\xa2\x57\x73\x99\xaa\xda\xf4\x0c\xe9\x2d\xe9\x44\x69\x1a\x08\x6b\x92\xfe\xed\xeb\xb7\x60\x06\xa5\xa6\xd2\xf3\xc6\xb3\x4f\x88\xe2\xdf\x3f\x8d\x17\xf1\x64\x3e\xbb\x7b\x13\xf4\x83\x5f\xbc\x70\x34\x6a\xe4\x33\x83\x5e\x2f\xe3\x36\xaf\xd6\x0d\x60\xa4\x6a\xd2\x71\x4e\x42\xb4\x8f\x9a\x04\x31\xa7\x68\xaa\x6a\x29\x14\x4b\x7b\xdb\x57\x2f\x88\xad\x48\xbf\x65\xf6\x6b\x2e\xfd\xdd\x9b\x9f\x82\x2f\xbc\x44\x1b\xad\x74\x47\xe3\x8e\xce\xe5\x79\x8b\x87\x19\x92\x14\xc3\xc1\xea\x25\x08\xff\x5f\x79\x6e\xc2\x2c\xd3\x01\xed\x08\xfe\x6e\x83\xd3\x7b\xc7\x88\x94\xc4\x0f\x3c\xc5\x93\xe0\xf2\xa9\xed\x74\x48\x65\x6d\x72\x77\xf8\x57\x4e\x25\x93\xea\xc0\xeb\xe0\xf5\xaf\xb7\x6f\x3d\x6f\x38\x8f\x3e\xc3\xf7\x37\x5a\x15\x77\x8e\xd9\x76\x53\xed\xb3\xe7\x75\x61\xc8\x82\x61\xc3\x77\x94\x42\xa8\xa4\x51\xf6\xdb\x68\xdc\xab\xb4\x12\x04\x26\x99\xd8\x1b\x6e\x90\xb8\xa7\xd3\xc8\x34\x9d\x0f\xc3\x69\x18\x45\xa3\x70\x19\xde\x75\x86\x83\xd5\x83\x21\x6d\x56\x43\x25\xdd\x83\x24\x1d\xa6\x05\x97\x6e\xbc\x99\x55\x7a\x15\x96\xe5\x88\x59\xb6\x9a\xaa\x84\x89\x0e\x0e\x5d\x47\xf1\x01\x3e\x7c\x46\x1f\x3a\xf0\x88\xd9\xfc\x3f\xe2\xad\xee\x8f\xac\xac\x1e\x0f\x8c\xb4\xe4\x59\xa5\x2a\x79\x22\xbd\xfa\x4e\xaa\x63\x1d\x5d\x44\x6e\x5f\x19\x8b\x8b\x28\x1e\xce\x17\xe3\x0b\xb8\x0e\xb7\x4c\xf3\xe6\xb9\x3b\x32\x2a\x43\x1a\x89\x92\x5b\x92\x9c\x64\x42\xcf\x0d\xb8\xe8\xa6\xda\x56\xc2\xa3\x6c\x1d\xc7\xae\x5b\x6f\xc7\x51\xa4\xb4\xa5\xb0\xf7\x10\x8f\x17\xf8\x7e\x7b\xcd\x9c\x19\xb2\x3b\xf4\xee\x11\x85\xcb\x0f\xf8\x96\xa2\xb9\xbb\x7a\x77\xe1\xac\x17\x4d\x06\x2e\x2d\x67\x82\x7f\xa1\x16\x38\x8a\x83\x6e\x07\xb9\x1c\x5a\xcb\x77\x68\xda\x7d\xfe\x4c\x4d\x55\xa6\x4e\x2d\x91\x56\xcd\x2a\x6e\x19\x87\xaa\x28\x98\x4c\xd1\x69\x19\x81\x57\xc6\xaa\x72\xc9\x0b\xc2\x1d\xae\x32\xb2\x7e\xca\x2c\x5d\x07\x61\x9a\xde\x73\x59\x59\x32\x57\xaf\x7f\xbe\x7e\x77\x7a\x65\xac\xb5\xd2\x61\xe2\x66\x2c\xd2\xb4\x21\xed\xb8\xc4\x1d\x2e\x63\xab\xca\x4b\x9c\x45\x47\x5a\x65\x6e\x8f\x9d\x85\x72\x41\xd2\x8a\xbd\xe3\x8e\xcb\x8a\xce\xaf\xd5\x39\x17\x74\xf5\xbf\xab\x25\x19\xeb\xbb\x71\xc2\xe1\xf7\x15\xc9\xed\xe0\x87\x33\x77\x7d\x8d\x3f\x71\x82\x03\x3c\x6a\x6e\xc9\xff\xa0\x8c\x45\xe7\xf2\x91\x35\x0b\xbe\x99\x86\x7f\x86\xba\xec\x9c\x55\x04\xf0\xcd\xd5\x0b\x45\xf0\x33\xfb\xc2\x9e\xcb\x6b\x73\xad\x6a\x5c\x5a\x5e\xa8\xca\xba\xed\xed\xfe\x74\x2e\xbf\x9e\x81\xc4\x96\x69\xeb\xc7\x82\xa8\x84\x1f\x53\xa2\x64\x6a\xf0\xe6\x2c\xd7\xd7\x8e\xf7\x57\x00\x00\x00\xff\xff\xce\xe0\x6c\xf9\xce\x07\x00\x00") + +func testImagesWindowsPowershellHelperDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesWindowsPowershellHelperDockerfile, + "test/images/windows/powershell-helper/Dockerfile", + ) +} + +func testImagesWindowsPowershellHelperDockerfile() (*asset, error) { + bytes, err := testImagesWindowsPowershellHelperDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/windows/powershell-helper/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesWindowsPowershellHelperVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd3\x33\xd2\x33\xe7\x02\x04\x00\x00\xff\xff\x9c\xc6\x33\x05\x06\x00\x00\x00") + +func testImagesWindowsPowershellHelperVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesWindowsPowershellHelperVersion, + "test/images/windows/powershell-helper/VERSION", + ) +} + +func testImagesWindowsPowershellHelperVersion() (*asset, error) { + bytes, err := testImagesWindowsPowershellHelperVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/windows/powershell-helper/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesWindowsServercoreCacheBaseimage = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\xcd\xd1\x0a\x42\x21\x0c\x80\xe1\xfb\xf3\x30\x67\xd3\x24\x32\xe8\x61\x62\x1a\x08\xce\xc1\x66\xd9\xe3\x87\x97\x76\xe5\xfd\xff\xf1\xd7\xd2\xde\x5f\x78\x72\xba\x06\x70\x37\x8c\x0f\x26\x3d\xb9\x90\x8a\xc9\xab\x9f\x24\x0c\xa3\xb4\x24\xc3\xc0\xb2\x7e\xb2\x92\x68\xbe\xd7\x6e\xe4\xd1\xc5\x63\xe1\x11\x2f\x7b\x7c\x96\xff\x74\xf3\x3c\xcb\x85\x7a\xc4\xb0\x47\x67\x79\xfc\x02\x00\x00\xff\xff\x33\x66\x70\xb2\xf0\x00\x00\x00") + +func testImagesWindowsServercoreCacheBaseimageBytes() ([]byte, error) { + return bindataRead( + _testImagesWindowsServercoreCacheBaseimage, + "test/images/windows-servercore-cache/BASEIMAGE", + ) +} + +func testImagesWindowsServercoreCacheBaseimage() (*asset, error) { + bytes, err := testImagesWindowsServercoreCacheBaseimageBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/windows-servercore-cache/BASEIMAGE", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesWindowsServercoreCacheDockerfile = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x91\x51\x6f\x9b\x3c\x18\x85\xef\xf9\x15\x47\xe1\xbb\xf8\x26\x25\x10\xa5\xd3\x2e\x3a\xf5\x82\xa5\xe9\x86\xda\x85\x29\xa4\xad\x7a\x35\x39\xe6\x05\x5e\xc9\xd8\x9e\x6d\x4a\xf3\xef\x27\xd2\x54\x5d\x35\x6d\x0b\x97\x9c\xe3\x87\x87\xe3\x18\x4b\x63\xf7\x8e\x9b\x36\x60\x31\x5f\xcc\xb1\x6d\x09\xd7\xfd\x8e\x9c\xa6\x40\x1e\x59\x1f\x5a\xe3\x7c\x12\xc5\x51\x8c\x1b\x96\xa4\x3d\x55\xe8\x75\x45\x0e\xa1\x25\x64\x56\xc8\x96\x5e\x92\x29\xee\xc8\x79\x36\x1a\x8b\x64\x8e\xff\xc7\xc2\xe4\x18\x4d\xde\x7d\x8c\x62\xec\x4d\x8f\x4e\xec\xa1\x4d\x40\xef\x09\xa1\x65\x8f\x9a\x15\x81\x9e\x24\xd9\x00\xd6\x90\xa6\xb3\x8a\x85\x96\x84\x81\x43\x7b\xf8\xcc\x11\x92\x44\x31\x1e\x8e\x08\xb3\x0b\x82\x35\x04\xa4\xb1\x7b\x98\xfa\xd7\x1e\x44\x38\x08\x8f\x4f\x1b\x82\x3d\x4f\xd3\x61\x18\x12\x71\x90\x4d\x8c\x6b\x52\xf5\x5c\xf4\xe9\x4d\xbe\x5c\xad\xcb\xd5\x6c\x91\xcc\x0f\x47\x6e\xb5\x22\xef\xe1\xe8\x47\xcf\x8e\x2a\xec\xf6\x10\xd6\x2a\x96\x62\xa7\x08\x4a\x0c\x30\x0e\xa2\x71\x44\x15\x82\x19\x7d\x07\xc7\x81\x75\x33\x85\x37\x75\x18\x84\xa3\x28\x46\xc5\x3e\x38\xde\xf5\xe1\xcd\x58\x2f\x76\xec\xdf\x14\x8c\x86\xd0\x98\x64\x25\xf2\x72\x82\x4f\x59\x99\x97\xd3\x28\xc6\x7d\xbe\xfd\x52\xdc\x6e\x71\x9f\x6d\x36\xd9\x7a\x9b\xaf\x4a\x14\x1b\x2c\x8b\xf5\x65\xbe\xcd\x8b\x75\x89\xe2\x0a\xd9\xfa\x01\xd7\xf9\xfa\x72\x0a\xe2\xd0\x92\x03\x3d\x59\x37\xfa\x1b\x07\x1e\x67\xa4\x6a\xdc\xac\x24\x7a\x23\x50\x9b\x67\x21\x6f\x49\x72\xcd\x12\x4a\xe8\xa6\x17\x0d\xa1\x31\x8f\xe4\x34\xeb\x06\x96\x5c\xc7\x7e\xbc\x4c\x0f\xa1\xab\x28\x86\xe2\x8e\x83\x08\x87\x37\xbf\xfd\x54\x12\x45\xd9\xe6\x33\x8a\xf2\xfb\xdd\x6a\x53\xe6\xc5\x3a\xba\xda\x14\x5f\x31\x9b\x59\x25\x42\x6d\x5c\x77\x31\xb0\xae\xcc\xe0\x53\xd1\x55\x1f\xde\xa3\x93\x2e\xe9\x58\x3a\x33\xae\x96\x48\xd3\xa5\x2f\xb9\x27\xf7\x48\x4e\x1a\x47\xe7\xff\xbd\xe2\x20\x3c\xac\x23\xfb\x8c\xf5\xd2\x89\x20\xdb\x28\x5a\x16\xdf\x1e\x30\x9b\xd5\xce\x74\x17\x63\x8c\xf4\xfe\x88\x29\xf7\x3e\x50\x77\xb6\x48\x49\xcf\x6e\xcb\x54\xab\x40\x3e\x24\xf4\x44\x49\xd7\xf3\x89\xb5\x53\xf0\xaf\x27\xfe\x1a\x9e\x84\xa2\x20\x2c\x9f\x2d\x92\x4a\xa9\x7f\xc4\x27\xe1\x42\xe5\x85\xe5\x3f\xd1\x5e\xd3\xe8\x67\x00\x00\x00\xff\xff\xa4\x35\x20\xbf\x06\x04\x00\x00") + +func testImagesWindowsServercoreCacheDockerfileBytes() ([]byte, error) { + return bindataRead( + _testImagesWindowsServercoreCacheDockerfile, + "test/images/windows-servercore-cache/Dockerfile", + ) +} + +func testImagesWindowsServercoreCacheDockerfile() (*asset, error) { + bytes, err := testImagesWindowsServercoreCacheDockerfileBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/windows-servercore-cache/Dockerfile", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testImagesWindowsServercoreCacheVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x32\xd4\x33\xe0\x02\x04\x00\x00\xff\xff\xdf\xf4\x93\x64\x04\x00\x00\x00") + +func testImagesWindowsServercoreCacheVersionBytes() ([]byte, error) { + return bindataRead( + _testImagesWindowsServercoreCacheVersion, + "test/images/windows-servercore-cache/VERSION", + ) +} + +func testImagesWindowsServercoreCacheVersion() (*asset, error) { + bytes, err := testImagesWindowsServercoreCacheVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/images/windows-servercore-cache/VERSION", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminDaemonYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x8e\x31\x4e\x04\x31\x0c\x45\xfb\x9c\xc2\x17\x18\xed\x52\x6e\x6a\x4a\x0a\x24\x24\x7a\x93\xf9\x62\x22\x26\x71\x64\x9b\x15\xc7\x47\x61\x86\xec\x20\x81\x70\x15\xe5\xdb\xef\x7d\x6e\xf9\x19\x6a\x59\x6a\x24\x6e\xcd\x4e\xd7\xbb\xf0\x96\xeb\x1c\xe9\x9e\x51\xa4\x3e\xc1\x43\x81\xf3\xcc\xce\x31\x10\x55\x2e\x88\xd4\x54\x0a\x7c\xc1\xbb\x4d\x55\x66\x4c\xf8\x68\xa2\x0e\x0d\xd6\x90\xfa\x9a\x61\x45\x72\xd1\xfe\x26\x2a\xec\x69\x79\xe0\x17\xac\xb6\x7d\x10\xcd\x5f\xf4\x8d\x34\x18\x81\xc8\x51\xda\xca\x8e\xfd\xf0\x60\xee\xf3\x8f\x7d\x5b\x5a\x7f\x88\xfe\x56\x11\x7d\xb7\xed\x93\xa4\x3a\xe7\x0a\x1d\x97\xd3\xae\x4b\x83\x94\x0b\xbf\xee\xfe\xd3\xad\xc4\x88\x7b\x8b\x83\x77\xba\x31\x1f\x45\x3d\xd2\xe5\x7c\x39\x8f\x94\x68\x11\xf3\x5f\x83\x4d\x6b\xd0\x2b\xb4\x33\xc3\x67\x00\x00\x00\xff\xff\xb0\x5f\x4e\x5d\xa5\x01\x00\x00") + +func testFixturesDocYamlAdminDaemonYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminDaemonYaml, + "test/fixtures/doc-yaml/admin/daemon.yaml", + ) +} + +func testFixturesDocYamlAdminDaemonYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminDaemonYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/daemon.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminHighAvailabilityEtcdYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x94\x3f\x6f\xdb\x3c\x10\x87\x77\x7d\x0a\x0e\xef\x2a\xc9\xf6\x3b\x24\xe1\x56\x34\x1e\x82\x22\xb6\xd1\x16\x01\x3a\x05\x34\x75\x88\x09\x53\xa4\x70\x3c\xa9\x08\x8a\x7c\xf7\x82\x92\x42\xfd\xb3\x65\xa8\xa3\x78\xfc\x3d\x3c\x1f\x1f\x5a\x14\xea\x05\xd0\x29\x6b\x38\xab\xd6\xd1\x59\x99\x8c\xb3\x83\xcd\xa2\x1c\x48\x64\x82\x04\x8f\x18\x33\x22\x07\xce\x80\x64\x16\x3b\xc0\x0a\x30\x72\x05\x48\x5f\x39\x59\x47\x3b\xa0\xdf\x16\xcf\x9c\x11\x96\x10\x31\x26\xad\x21\xa1\x0c\xa0\xf3\x3b\x62\xa6\x72\xf1\x06\x9c\x9d\xef\x5d\xf2\x26\x31\x51\x36\xf5\x24\xbe\x49\x56\xc9\x43\xc4\xd8\x00\x1f\xb2\x75\x41\xda\x3c\x17\x26\xe3\xf5\x47\xcc\xd2\xd2\x61\xaa\xad\x14\x3a\x3d\x2a\x53\x53\xda\x4a\x1c\x7b\x46\xfb\xf1\xdf\x9f\xdd\xfe\x71\xfb\xba\xfb\xf2\xbc\xfd\x08\x75\x65\x14\x29\xa1\x63\x91\x55\x80\xa4\x1c\xc4\x05\x00\xc6\x25\x6a\xd7\xee\x39\x11\x15\x3c\x4d\xdb\xf4\xd3\xe1\x83\x6f\xfe\xbf\x5f\x05\x80\x56\x8e\xc0\x2c\x4d\x75\xc7\x49\xad\xc0\xd0\xad\xe8\xdd\xc3\xf8\xc0\xab\xb9\xf5\xe6\x2e\x59\x25\xab\x64\x3d\x8c\xf9\x3b\x8b\x33\x85\x9f\x33\xab\x04\xd6\x93\x4a\x7d\xa1\xdb\xa5\x9c\xb4\x15\xe0\x7b\x98\xd9\xe3\xd3\x8f\xaf\xfb\x97\xed\xf7\x5f\xaf\x3f\xf7\xdf\xb6\xbb\x66\x72\x85\x45\x72\x9f\xe3\x0f\x77\x73\xb0\x48\x9c\x85\xdf\xd9\x58\x30\x59\x6c\x6e\xb5\xf1\xc5\x73\xae\x51\xda\xde\x87\x94\xb0\xd8\x50\x9a\x21\x04\x4a\x65\x75\x99\xc3\xb3\x2d\x4d\xd7\x5d\xee\xbf\x0e\x82\x4e\xbc\xfb\xcd\x03\x46\x25\xb0\x67\x4c\x7f\x3b\x90\x4c\x9d\xd3\x83\xdd\x40\xb2\x5b\x42\x10\xd9\xde\xe8\xf7\xa0\xf8\x98\xe0\xc5\x74\x27\x81\x30\xe1\x94\x0e\xeb\xc2\x02\x98\xef\x7e\x8c\xa9\x04\x2e\x6d\xe7\x42\x23\xcb\x08\x5a\x1d\x2f\x51\xb4\x3a\x2e\x05\xd5\x4f\xd6\x16\x60\x2e\xe1\x7c\x71\x58\xbb\x09\xf5\x17\x76\x09\x07\x24\xff\x81\x54\x9c\x55\x4a\xed\xeb\xea\x91\x8a\xb3\xea\x56\x27\xa0\x46\xc1\xf6\x1f\xae\x36\xd7\x03\xdb\xdd\xc5\x50\xc3\xee\xe9\x8d\x4d\xbc\x1a\xed\x2b\x39\x12\xf2\x6a\x66\x2a\xe1\x25\x05\x67\xbb\x1d\x06\x83\x74\xf3\x47\x4e\x0e\xbb\x9d\xe9\xab\x35\x15\x6b\x3e\x3a\x91\xe9\x9a\x4a\xb3\xc3\x9d\x02\x06\xf2\xcc\x66\xfb\xc2\x8c\x75\xf9\x1b\x00\x00\xff\xff\xfe\xad\x78\xd0\x50\x07\x00\x00") + +func testFixturesDocYamlAdminHighAvailabilityEtcdYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminHighAvailabilityEtcdYaml, + "test/fixtures/doc-yaml/admin/high-availability/etcd.yaml", + ) +} + +func testFixturesDocYamlAdminHighAvailabilityEtcdYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminHighAvailabilityEtcdYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/high-availability/etcd.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminHighAvailabilityKubeApiserverYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x95\xcf\x8e\xdb\x36\x10\xc6\xef\x7e\x0a\x9e\x7a\x32\xf5\xc7\x71\xbd\x5e\x01\x5a\xa0\x48\x91\x53\x9a\x6c\x13\xa0\xd7\x82\xa6\x26\x32\x21\x8a\x14\x66\x46\xda\xfa\xed\x0b\xca\x8e\xd6\x96\x64\x1b\xce\x51\x33\xf3\xfd\x38\x1c\x7e\xa4\x54\x63\xfe\x01\x24\xe3\x5d\x26\xba\x74\x51\x19\x57\x64\xe2\xd5\x17\x8b\x1a\x58\x15\x8a\x55\xb6\x10\xc2\xa9\x1a\x32\x51\xb5\x3b\x90\xaa\x31\x04\xd8\x01\x2e\xa8\x01\x1d\x92\x7b\x4f\xfc\x05\xf8\xcd\x63\x95\x09\xc6\x16\x16\x42\x68\xef\x58\x19\x07\x48\xa1\x42\xce\x03\x84\x10\xc2\xd4\xaa\x0c\x99\x2d\x45\xa5\xc6\xc8\xf8\xf8\xb2\x28\x7b\xde\x6c\x13\x78\xda\xae\x20\xd9\xaa\x54\xa5\xfa\x79\xad\x37\xbf\x6f\xd2\xe7\x24\x49\xd3\x5d\x91\xac\x7a\x8a\xf6\x75\xad\x5c\x91\xf5\x1f\x52\xc4\x3b\xe3\x62\xda\x9f\xbe\xa4\xfe\x19\x6e\x09\x63\xeb\xb5\xb2\x7d\xc1\xe5\x42\x42\x4a\x55\x14\x08\x44\x79\xba\x7a\x8a\x92\x28\x89\x52\x21\x25\xb0\x2e\xe4\xb1\x82\xf2\x3d\x73\x93\xc5\xf1\x90\xcf\xd6\x49\x92\xf6\x70\x21\xa4\xd4\xd6\xb7\x85\x6c\xd0\x77\xa6\x00\xcc\x4b\x0d\x7d\x58\x15\xb5\xa1\x30\x5f\x19\x86\x82\xde\xe6\x5f\x54\x0d\xd4\x28\x0d\x9f\xcd\x0f\xd0\x07\x6d\x61\xf9\xd9\xd4\x86\xbf\x29\x57\x02\x2e\xbf\x83\x6e\xd1\xf0\xe1\xa3\x77\x0c\xff\xf1\x9f\xe0\x0e\xcb\xef\x80\x9d\xd1\xf0\x87\xd6\xbe\x75\xbc\xfc\x06\xe4\x5b\xd4\xf0\x77\xeb\x59\x0d\x0d\xd0\xb1\x48\x6a\xdb\x12\x03\x4a\xd3\x48\x0c\xc8\x3c\x4d\xfa\x7e\x93\x38\xdd\xf4\x7d\x1a\x70\x2c\xb5\x92\x3f\x8c\x85\x3c\x26\xec\xfa\x59\xa0\x03\x06\x8a\xb5\x8a\x34\xf2\xd9\xae\x8e\xb0\x70\x82\x39\xac\x40\x32\x10\xcb\xdd\xae\x45\x47\x43\x11\x5b\x92\x1a\x90\xe7\x89\xc7\xf1\x45\xa1\xe0\x54\xdb\xa0\xe9\x14\x83\xac\xe0\x70\x53\x52\xc1\xe1\x6c\x77\xba\x45\x90\x8d\x47\xce\xd7\xeb\x0f\x81\xe4\x2b\x70\x52\xb5\xbc\x9f\x87\x54\xce\xbf\xb9\x7f\xfb\x2a\x8a\x34\x75\x81\xd2\xe5\xab\x81\xa8\xac\xf5\x6f\x7d\x2f\xc6\x42\x09\x45\xfe\x49\x59\x02\x91\xbe\xbc\xc4\x9d\x0a\x4e\x29\x47\x1e\x89\xac\x2f\xc5\xea\xe5\xb7\xe3\x99\x87\x4e\xe8\xa7\xe5\x06\xc3\xbf\x7a\xe4\x4c\xac\xd7\x1f\x4e\xcb\x84\xdb\x31\x8e\x1d\x6f\x43\x70\x13\xcd\xcb\x9f\x92\x6d\x32\xd1\x9f\x05\xdf\x01\xf3\xfa\xed\x9c\x7e\x3b\xd6\xf7\x57\xa1\x8f\x74\xde\xb6\x35\xfc\x15\xbc\x35\xec\xa8\x0e\x5f\xaf\x8a\xf7\x99\x18\x0d\xf6\x02\x42\xd8\x85\xcc\x29\x86\xa0\x8a\xaf\xce\x1e\x86\x87\x60\x4c\xba\x3e\xd8\x51\x6b\x65\x38\xd2\x19\x00\xb0\x8e\x89\xec\x45\x35\xb0\x7e\x0f\xdd\x6d\x21\xbc\x02\xb4\x57\x08\x13\x4e\x4b\xd8\x27\x1e\x80\x85\xfd\x8c\x31\x9d\xc2\x47\xdb\x99\x69\xe4\x31\x82\x35\xbb\x39\x8a\x35\xbb\x47\x41\xfd\xfb\xe8\x1b\x70\x73\xb8\x90\xbc\xcc\xdd\x85\x86\x03\x9b\xc3\x01\xeb\x5f\x20\x35\x95\x89\xd9\xd2\x98\xd4\x54\xe6\x3d\x3a\x01\x1d\xed\x7d\xfa\x15\xf5\x17\x22\x00\x4f\xd5\xcd\x55\x8b\x8f\x0d\x7e\x55\x7b\xd7\xd4\x7c\x68\x20\x13\x9f\x8c\x85\xaf\xf8\x11\x41\x31\x2c\xe6\xbc\x7e\x75\x81\x73\xd3\x8f\x2c\x7f\x55\x33\xb5\xf9\x9c\xc9\x6f\xee\xe9\x52\x38\xd8\xfa\xf6\x92\x93\xc5\xee\x6b\xce\xcd\x3b\xb5\xee\x6d\xe9\xc4\xae\xd7\xcc\x7a\x73\xb8\x53\xc0\x85\x3d\x6f\x6a\xcf\x2d\x39\x36\xe4\xff\x01\x00\x00\xff\xff\x82\x96\x39\xcc\x5e\x09\x00\x00") + +func testFixturesDocYamlAdminHighAvailabilityKubeApiserverYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminHighAvailabilityKubeApiserverYaml, + "test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml", + ) +} + +func testFixturesDocYamlAdminHighAvailabilityKubeApiserverYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminHighAvailabilityKubeApiserverYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminHighAvailabilityKubeControllerManagerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x94\xcd\x6e\xdb\x30\x0c\xc7\xef\x79\x0a\x9d\x76\x93\x1d\x3b\x49\x9b\x19\x48\x2f\x1b\xb6\xd3\xd6\x02\x03\x76\xa7\x25\x36\x11\x22\x4b\x06\x45\x7b\xc8\x9e\x7e\x90\x9b\x36\x71\x6c\xa7\xcd\x8e\xfc\xfa\x91\x32\xff\x34\xd4\xe6\x37\x52\x30\xde\x15\xa2\xcd\x66\x7b\xe3\x74\x21\x9e\xbc\x9e\x55\xc8\xa0\x81\xa1\x98\x09\xe1\xa0\xc2\x42\xec\x9b\x12\xa5\xf2\x8e\xc9\x5b\x8b\x24\x2b\x70\xb0\x45\x9a\x85\x1a\x55\xcc\x8a\x21\x30\x0e\x29\x44\x4b\x0a\xe5\xab\x0a\x9c\x8e\x46\x34\xd3\xd2\xb8\x34\xec\x8e\x96\x54\xaf\xee\x26\x50\x6a\xbd\x02\xdb\x25\x4c\x34\x11\x52\x56\x10\x18\x69\x93\xe5\xf7\xc9\x3c\x99\x27\x59\xb1\x9e\xaf\xe7\x42\x4a\x65\x9b\x18\x90\x71\xc8\x0d\xe6\x28\x19\x03\xcb\xb2\x6c\xc8\x85\xae\x87\x38\x4b\x52\x46\xd3\x26\x9b\x27\xf9\x72\x15\x29\x69\x76\x27\xa4\x04\x1b\xfb\x33\x4a\xe7\x35\x76\x29\x61\xc3\xd4\x60\x57\xe7\x1b\x2d\x6b\xf2\xad\xd1\x48\x9b\xad\xc2\x48\x0b\x48\xad\x51\x28\x41\x29\xdf\x38\x96\x35\x99\x36\xd6\xef\xf1\x20\x9f\x8d\xc5\x4d\x1a\xa8\xed\x9e\x42\x0e\x19\x43\x1a\x0b\x90\x92\x3d\x1e\xde\x26\x6a\x37\xb9\xc8\x1e\x1e\xd2\x16\xe2\xf3\xb7\x53\x0f\x4f\xac\xdf\x0a\x29\x2d\x82\x46\x92\x68\x51\xb1\xc8\x1f\x3e\x65\x1d\xc7\x54\xb0\x8d\x8b\x59\x87\x64\xab\x28\x31\x7e\x8a\x52\x3c\x6b\xc8\x97\x77\x8b\xb5\x5e\x65\xb0\x5c\x97\x00\xd9\x42\x2d\x56\x8b\xc5\xfd\xb3\xd2\xcb\xfb\xcf\x8b\x0e\x67\x4d\x8b\x0e\x43\x78\x22\x5f\x62\x71\x9c\x74\xc7\x5c\x7f\x47\x7e\x35\x85\xa8\x81\x77\x85\x48\x77\x08\x96\x77\x7f\x4f\x6e\x4f\x5c\x88\x6c\x9e\xaf\xf2\xa3\xcf\x38\xc3\x06\xec\x57\xb4\x70\xf8\x85\xca\x3b\x1d\x0a\x91\xad\x8e\x51\x36\x15\xfa\x86\x4f\x81\xce\x7f\x5d\x69\x31\xa3\xf5\xb6\xa9\xf0\x47\xfc\xee\xe1\x55\x5a\x55\xb4\x9e\x5e\xe6\xea\x7f\xf9\x63\xb3\x17\x6c\xa0\x36\x46\x8e\x3e\x42\xd0\x8f\xce\x1e\x0a\x11\x77\x3d\x42\xfa\xc0\x66\x7a\x78\xeb\xb7\x71\xf9\x23\x24\x64\x95\x86\x60\x7b\xd9\xc8\xea\xe4\x7a\x77\x96\x78\x24\x61\x07\x84\x03\x4e\x13\xa8\x0b\xdc\x00\x8b\x0f\xbb\xc4\xb4\x40\xb7\x8e\x33\x32\xc8\x6d\x04\x6b\xca\x31\x8a\x35\xe5\xad\xa0\xee\xf7\xe1\x6b\x74\x63\xb8\x18\xec\xc7\xde\x85\xc6\x85\x8d\xe1\x90\xd5\x7f\x90\xea\xbd\x49\xd9\x86\x4b\x52\xbd\x37\x27\xef\x00\xb4\xf3\x81\x7f\x22\xff\xf1\xb4\x7f\xf3\xbd\x68\xff\xf8\x7b\x8d\x09\x5d\x93\x59\xef\x2e\x47\xf4\x7f\xa9\xfe\xc9\xda\x8f\x2b\x9e\x0f\x35\x16\xe2\x9b\xb1\xf8\x48\x5f\x08\x81\x71\x36\x76\x08\x93\x9d\xce\x2f\xe2\xe2\x1e\x26\x6b\x86\x37\x30\x76\x01\x57\x1f\xd7\x2f\x7c\xd3\xfc\xf5\x96\x83\x66\xef\xd7\x9c\x2b\x7b\xa8\xeb\xeb\xa5\x03\x2d\x4f\x29\xf9\xea\xc7\x1d\x02\x7a\xda\xbd\x5a\x7b\xae\xd7\x4b\xb5\xfe\x0b\x00\x00\xff\xff\x6e\x92\xf3\xcb\x30\x08\x00\x00") + +func testFixturesDocYamlAdminHighAvailabilityKubeControllerManagerYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminHighAvailabilityKubeControllerManagerYaml, + "test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml", + ) +} + +func testFixturesDocYamlAdminHighAvailabilityKubeControllerManagerYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminHighAvailabilityKubeControllerManagerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminHighAvailabilityKubeSchedulerYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x52\xc1\xae\x9b\x30\x10\xbc\xf3\x15\x7b\xea\xcd\x80\x49\xd3\x10\x4b\x2f\x97\x56\xed\xa9\x7d\x91\x2a\xf5\xbe\xd8\x1b\x70\x63\x6c\x64\x2f\x54\xe9\xd7\x57\x10\xd2\x27\xaa\x3e\xbd\x1b\x33\xb3\xcc\x68\xbc\x8b\x83\xfd\x41\x31\xd9\xe0\x15\x4c\x32\xbb\x5a\x6f\x14\x9c\x83\xc9\x7a\x62\x34\xc8\xa8\x32\x00\x8f\x3d\x29\xb8\x8e\x0d\x89\xa4\x3b\x32\xa3\xa3\x98\xa5\x81\xf4\x2c\x76\x21\xf1\x37\xe2\x5f\x21\x5e\x15\x70\x1c\x29\x03\xd0\xc1\x33\x5a\x4f\x31\xcd\x13\xe2\xff\x06\x00\x00\xb6\xc7\x76\x56\xea\x94\xb7\x3a\xe6\x36\x14\xdb\x21\xb5\x7b\x6f\xca\xa6\xbe\xd4\xcd\x4e\x52\x75\x38\xee\x0e\xbb\xea\x70\xfc\x20\xf7\x55\x7d\xd8\x1d\x1b\x7d\x5c\x5c\x74\xe8\x7b\xf4\x46\x2d\x40\x40\xd1\x58\x5f\xa4\x6e\x45\x42\x3f\xe8\x31\xc5\xc2\x05\x8d\x6e\x19\xd8\x06\x81\x10\x3d\x26\xa6\xf8\x24\xab\x43\x5e\xe6\x65\x2e\x55\x5d\xd6\x25\x08\x31\x3d\x55\x20\x84\x23\x34\x14\x05\x39\xd2\x0c\xf2\x74\x2a\x26\x9c\xdd\xda\x7f\x7c\x72\x17\xda\x25\x0f\xa0\x3a\xbd\x93\xcb\xa7\xb3\x13\x79\x4a\xe9\x1c\x43\x43\x6a\x55\x3b\xe6\xe1\x0b\xf1\x03\x02\x0c\xc8\x9d\x82\xa2\x23\x74\xdc\xfd\x7e\xa1\x43\x64\x05\xb2\xac\xf6\x72\xe5\xac\xb7\x6c\xd1\x7d\x22\x87\xb7\xef\xa4\x83\x37\x49\x81\xdc\xaf\x2a\xdb\x9e\xc2\xc8\x2f\xc2\xc2\x4f\xc1\x8d\x3d\x7d\x0d\xa3\xe7\xf4\x78\xa6\x7e\x46\xe7\x7b\xea\x9b\x65\xee\x1b\x74\xa1\xbd\x58\x47\xaf\x18\xc4\xd1\x17\x89\x74\x24\x4e\x8b\x51\xf4\xc4\x94\xe6\xa5\x26\x8a\x93\xd5\x84\x5a\xcf\xbf\x6c\x2c\x0d\x5d\x70\x74\x2c\x38\x5c\xc9\x8b\x54\xd3\x4f\xb3\xea\x91\xd0\x3c\x7b\x77\xfb\x7b\x55\xf7\x12\xeb\x49\xcd\x67\xb7\x64\x67\x9b\xe7\x7b\xb3\x08\xdf\x06\x52\xf0\xd9\x3a\x7a\x8e\x1f\x23\x21\xdf\xdb\x6c\xfb\xfd\x09\x00\x00\xff\xff\xb8\x36\x00\x0a\x16\x03\x00\x00") + +func testFixturesDocYamlAdminHighAvailabilityKubeSchedulerYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminHighAvailabilityKubeSchedulerYaml, + "test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml", + ) +} + +func testFixturesDocYamlAdminHighAvailabilityKubeSchedulerYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminHighAvailabilityKubeSchedulerYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminLimitrangeInvalidPodYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\xcc\x41\x8a\xc3\x30\x0c\x05\xd0\xbd\x4f\x21\xb2\x77\x26\x61\x36\x83\xef\x30\x30\xab\xd9\x16\xd5\x16\xa9\x48\x6c\x19\xc9\x09\xf4\xf6\xc5\xa1\x04\xaa\xdd\xd7\x7f\x7c\xac\xfc\x4f\x6a\x2c\x25\xc0\x31\xbb\x95\x4b\x0a\xf0\x27\xc9\x65\x6a\x98\xb0\x61\x70\x00\x05\x33\x05\xe0\x72\xe0\xc6\xc9\x57\x49\xce\x2a\xc5\xde\x44\x29\x0d\xb9\x90\x5a\x4f\xfe\x2d\xd7\xfd\x4e\x5a\xa8\x91\x79\x23\x3d\xc8\x3f\xc4\x5a\xaf\x1c\x00\x00\x67\x5c\x3a\xfa\xb1\x71\x89\x3a\xb2\x7c\x9d\xe8\xf6\x81\x94\x4c\x76\x8d\x74\xee\xf6\xdb\x38\x73\xbb\x12\x40\xac\x7b\x80\xe1\x7b\xb8\x1e\x99\xb2\xe8\x33\xc0\x3c\x4d\xbf\xec\x5e\x01\x00\x00\xff\xff\x01\x0f\xba\xef\xd8\x00\x00\x00") + +func testFixturesDocYamlAdminLimitrangeInvalidPodYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminLimitrangeInvalidPodYaml, + "test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml", + ) +} + +func testFixturesDocYamlAdminLimitrangeInvalidPodYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminLimitrangeInvalidPodYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminLimitrangeLimitsYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x9c\x8f\x31\x8b\xc3\x30\x0c\x85\x77\xff\x0a\x91\xfd\xc0\x4e\xe0\x06\xaf\x37\xdc\x72\x07\x25\x43\x77\x11\xab\x45\x34\xb2\xdd\xd8\x29\xcd\xbf\x2f\x4e\x42\x21\xcd\x50\xa8\x27\xe9\xf9\x7d\x7a\x3c\x8c\x7c\xa4\x21\x71\xf0\x16\x6e\x46\x5d\xd8\x3b\x0b\x7f\x2c\x9c\x5b\xf4\x67\x52\x42\x19\x1d\x66\xb4\x0a\xc0\xa3\x90\x05\x99\xfa\xf2\x9d\x54\x8a\xd4\x15\x79\x59\xcb\xf4\x05\x82\xf7\x32\x94\xd7\xc5\xd1\x42\x55\x57\xeb\x2a\x24\x61\x98\x2c\x98\x5f\x9e\x15\x61\xbf\x71\xd6\x5a\xcb\x8b\xf5\xfb\x7f\xb1\xe6\x29\x92\x85\x43\x70\x73\x84\xa3\x13\x8e\x7d\xde\xc0\xcd\x1e\xae\xb5\x5e\xf1\x15\x68\xe9\x3a\x52\xca\xef\x42\xcd\x93\xfb\xbc\x8b\xd9\x9f\x6d\x36\x5d\x7e\x82\xcf\xc8\x9e\x06\xf5\x08\x00\x00\xff\xff\xb5\xd3\x47\x59\x80\x01\x00\x00") + +func testFixturesDocYamlAdminLimitrangeLimitsYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminLimitrangeLimitsYaml, + "test/fixtures/doc-yaml/admin/limitrange/limits.yaml", + ) +} + +func testFixturesDocYamlAdminLimitrangeLimitsYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminLimitrangeLimitsYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/limitrange/limits.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminLimitrangeNamespaceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x04\xc0\x31\x0e\x84\x40\x08\x05\xd0\x9e\x53\x70\x81\x2d\xb6\xe5\x10\x96\xf6\x3f\xce\x2f\x88\x03\x12\x87\x18\x8f\xef\x43\xf9\xce\x7b\xf9\x95\xa6\xcf\x5f\x4e\xcf\x61\xba\x21\xb8\x0a\x07\x25\xd8\x18\x68\x98\xa8\x26\x82\xa6\xd3\xc3\xfb\xc7\x17\x51\x93\xf2\x05\x00\x00\xff\xff\xa4\x0d\x06\xa4\x3f\x00\x00\x00") + +func testFixturesDocYamlAdminLimitrangeNamespaceYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminLimitrangeNamespaceYaml, + "test/fixtures/doc-yaml/admin/limitrange/namespace.yaml", + ) +} + +func testFixturesDocYamlAdminLimitrangeNamespaceYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminLimitrangeNamespaceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/limitrange/namespace.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminLimitrangeValidPodYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\xcd\xc1\x4a\xc6\x30\x0c\xc0\xf1\x7b\x9f\x22\x7c\xf7\x4e\x26\x08\xd2\x77\x10\x3c\x79\x95\xac\x0d\x33\xac\x6d\x4a\xd2\x0d\x7c\x7b\xe9\x18\x03\xf9\x8e\xc9\xff\x47\x82\x8d\xbf\x48\x8d\xa5\x06\x38\x66\xb7\x71\x4d\x01\x3e\x25\xb9\x42\x1d\x13\x76\x0c\x0e\xa0\x62\xa1\x00\x07\x66\x4e\xbe\x49\x72\x00\x19\x17\xca\x36\xda\x73\xb5\x46\x71\x94\x28\xb5\x23\x57\xd2\xd3\xf9\xcb\x6d\xfb\x42\x5a\xa9\x93\x79\x23\x3d\xc8\xff\x88\xf5\x91\xce\x5b\x5c\x70\x1d\xe8\xdd\xa6\x35\xea\xc4\xf2\x72\xa2\xef\x7f\x48\xc9\x64\xd7\x48\xd7\x7f\x80\xcc\x85\xfb\x3d\x01\xc4\xb6\x07\x78\xcc\x8f\x7b\x51\xa8\x88\xfe\x06\x78\x9b\x5f\x3f\xd8\xfd\x05\x00\x00\xff\xff\x50\xe8\xe9\x7f\xf4\x00\x00\x00") + +func testFixturesDocYamlAdminLimitrangeValidPodYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminLimitrangeValidPodYaml, + "test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml", + ) +} + +func testFixturesDocYamlAdminLimitrangeValidPodYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminLimitrangeValidPodYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminNamespacesNamespaceDevJson = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\xcb\xa1\x0e\x02\x31\x10\x84\x61\xdf\xa7\x98\xac\xc6\x60\xef\x21\x90\xf8\x81\x8e\x68\x68\xf7\x1a\xda\x9c\x21\xf7\xee\x64\x8f\x04\x77\x62\xcd\xfc\xdf\x7e\x12\x60\xaf\xe2\xd9\x16\xd8\x8d\x4d\xa3\xf3\x29\xbb\xc4\xcc\x5e\xee\x7a\x8f\xb2\x7a\xc4\xed\xfa\x5b\x9b\x26\x33\x27\x6d\x41\x3c\x03\xe6\x6c\x0a\x91\xb5\xa9\xae\xbd\xc9\xe7\x41\x01\xab\x7c\xa8\x8e\x3f\x3d\xc1\x47\xdb\x53\xdc\x9e\xbe\x01\x00\x00\xff\xff\x99\xf7\x0a\x5a\x92\x00\x00\x00") + +func testFixturesDocYamlAdminNamespacesNamespaceDevJsonBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminNamespacesNamespaceDevJson, + "test/fixtures/doc-yaml/admin/namespaces/namespace-dev.json", + ) +} + +func testFixturesDocYamlAdminNamespacesNamespaceDevJson() (*asset, error) { + bytes, err := testFixturesDocYamlAdminNamespacesNamespaceDevJsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/namespaces/namespace-dev.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminNamespacesNamespaceProdJson = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xaa\xe6\x52\x50\x50\xca\xce\xcc\x4b\x51\xb2\x52\x50\xf2\x4b\xcc\x4d\x2d\x2e\x48\x4c\x4e\x55\xd2\x01\x09\x27\x16\x64\x86\xa5\x16\x15\x67\xe6\xe7\x81\x24\xcb\x0c\x21\xa2\xb9\xa9\x25\x89\x29\x89\x25\x89\x4a\x56\x0a\x20\xcd\x0a\x0a\x4a\x79\x89\xb9\xa9\x20\x15\x05\x45\xf9\x29\xa5\xc9\x25\x20\xf5\x3a\x10\x99\x9c\xc4\xa4\xd4\x9c\x62\xb8\x4a\xec\x6a\xc1\x52\xb5\x5c\x20\x5c\xcb\x05\x08\x00\x00\xff\xff\xa0\x41\x9f\x81\x90\x00\x00\x00") + +func testFixturesDocYamlAdminNamespacesNamespaceProdJsonBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminNamespacesNamespaceProdJson, + "test/fixtures/doc-yaml/admin/namespaces/namespace-prod.json", + ) +} + +func testFixturesDocYamlAdminNamespacesNamespaceProdJson() (*asset, error) { + bytes, err := testFixturesDocYamlAdminNamespacesNamespaceProdJsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/namespaces/namespace-prod.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminResourcequotaLimitsYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x8b\x31\x0e\xc2\x30\x0c\x45\xf7\x9c\xc2\x17\x40\x6a\x2b\x95\xc1\x2b\x2b\x2c\x1d\xd8\xad\xd6\x20\x8b\xda\x0d\x89\x83\xd4\xdb\xa3\x40\x16\x84\x27\xbf\xf7\xf5\x28\xca\x95\x53\x96\xcd\x10\x5e\x7d\x78\x88\x2d\x08\x67\x51\xf1\x89\xec\xce\x41\xd9\x69\x21\x27\x0c\x00\x46\xca\x08\x6b\x1d\x73\xc8\x91\xe7\x2a\xbf\x58\xbf\x03\x2c\x7c\xa3\xb2\x7a\x85\x7a\x73\x2c\x08\x43\xd7\x69\x63\x65\xdd\xd2\x8e\x30\xf6\xc3\x45\x3e\xae\x05\x13\x3f\x0b\xe7\xdf\xae\xff\xef\x86\xf1\xd8\x3a\xdf\x23\x23\x9c\x36\x73\x12\xe3\x14\xde\x01\x00\x00\xff\xff\xc1\xba\xa5\x77\xc6\x00\x00\x00") + +func testFixturesDocYamlAdminResourcequotaLimitsYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminResourcequotaLimitsYaml, + "test/fixtures/doc-yaml/admin/resourcequota/limits.yaml", + ) +} + +func testFixturesDocYamlAdminResourcequotaLimitsYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminResourcequotaLimitsYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/resourcequota/limits.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminResourcequotaNamespaceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x04\xc0\xb1\x11\x84\x40\x08\x05\xd0\x9c\x2a\x68\xe0\x82\x4b\x29\xc2\xd0\xfc\x8f\xfb\x83\x1d\x85\x45\x17\x1d\xcb\xf7\x21\xfb\xca\x6b\xf6\x11\xa6\xcf\x5f\xf6\x1e\xcd\x74\x81\x73\x26\x36\x8a\xb3\xd0\x50\x30\x51\x0d\x38\x4d\xcf\x7b\x14\x7e\x7c\xe1\x79\x50\xbe\x00\x00\x00\xff\xff\x4d\x03\x2d\x13\x3f\x00\x00\x00") + +func testFixturesDocYamlAdminResourcequotaNamespaceYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminResourcequotaNamespaceYaml, + "test/fixtures/doc-yaml/admin/resourcequota/namespace.yaml", + ) +} + +func testFixturesDocYamlAdminResourcequotaNamespaceYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminResourcequotaNamespaceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/resourcequota/namespace.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlAdminResourcequotaQuotaYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4c\x8e\x31\x6a\x05\x31\x0c\x44\xfb\x3d\x85\xf0\x09\xb2\x81\x34\xbe\x40\xea\xa4\x48\x2f\x64\x41\x44\x6c\xcb\x91\xe4\x85\xdc\x3e\xd8\xff\x17\x5b\x89\xf7\x60\x34\x83\x43\xbe\xd8\x5c\xb4\x67\xb8\xce\xe3\x47\x7a\xc9\xf0\xc9\xae\xd3\x88\x3f\xa6\x06\x1e\x8d\x03\x0b\x06\xe6\x03\xa0\x63\xe3\x0c\xbf\xdb\xfb\x60\x5a\xee\x1b\xad\xac\x0b\x40\x63\x66\x48\xaf\x2f\x69\x53\xe3\xa6\xf6\x97\xe1\x7c\x97\xcd\x63\xf5\x78\x70\x8f\x4b\xeb\x6c\x4c\x15\xa5\x79\x86\x74\x3e\x03\x43\xcb\x1d\x8d\x47\x15\xc2\x10\xed\xa4\x3d\x4c\x6b\x65\xf3\x5b\x81\x3d\x67\xee\x39\x3b\xf9\xf0\xce\x64\x1c\xf7\x57\xce\x76\x09\xf1\x52\x6f\xe9\xf8\x0f\x00\x00\xff\xff\x9d\x63\xab\x79\xf4\x00\x00\x00") + +func testFixturesDocYamlAdminResourcequotaQuotaYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlAdminResourcequotaQuotaYaml, + "test/fixtures/doc-yaml/admin/resourcequota/quota.yaml", + ) +} + +func testFixturesDocYamlAdminResourcequotaQuotaYaml() (*asset, error) { + bytes, err := testFixturesDocYamlAdminResourcequotaQuotaYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/admin/resourcequota/quota.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideConfigmapConfigmapYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\xc8\x0c\x4b\x2d\x2a\xce\xcc\xcf\xb3\x52\x28\x33\xe4\xca\xce\xcc\x4b\xb1\x52\x70\xce\xcf\x4b\xcb\x4c\xf7\x4d\x2c\xe0\xca\x4d\x2d\x49\x4c\x49\x2c\x49\xb4\xe2\x52\x50\xc8\x4b\xcc\x4d\xb5\x52\x28\x49\x2d\x2e\xd1\x4d\x06\x2b\xc8\x4d\x2c\xe0\x82\x49\x82\x68\x5d\x43\x2b\x85\xb2\xc4\x9c\xd2\x54\x5d\x43\x98\x88\x11\x4c\xc4\x88\x0b\x10\x00\x00\xff\xff\x21\xcc\x3c\xb6\x6a\x00\x00\x00") + +func testFixturesDocYamlUserGuideConfigmapConfigmapYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideConfigmapConfigmapYaml, + "test/fixtures/doc-yaml/user-guide/configmap/configmap.yaml", + ) +} + +func testFixturesDocYamlUserGuideConfigmapConfigmapYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideConfigmapConfigmapYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/configmap/configmap.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideDeploymentYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\xce\xbd\x6e\xc3\x30\x0c\x04\xe0\x5d\x4f\x71\x2f\x60\xb4\x45\x97\x42\x73\xc7\x0e\x9d\xb2\x33\x32\xe1\x08\x91\x28\x42\x22\x82\xe4\xed\x03\x21\x3f\xb6\x63\xe4\x46\xe1\xbb\x13\x49\xe3\x8e\x6b\x8b\x45\x3c\x48\xb5\x7d\x9c\xbe\xdc\x31\xca\xe8\xf1\xcb\x9a\xca\x25\xb3\x98\xcb\x6c\x34\x92\x91\x77\x80\x50\x66\x0f\x99\xa2\x9c\x87\x71\x26\x40\xa2\x3d\xa7\xd6\xc9\x5b\xd4\x94\x43\x07\x95\x35\xc5\x40\xcd\xe3\xdb\x01\x8d\x13\x07\x2b\xf5\x56\xcd\x64\xe1\xf0\xb7\xd8\x5a\xad\x39\xc0\x38\x6b\x22\xe3\x3b\x5f\x9c\xd6\x93\x56\xcd\xd7\x2e\xf0\x38\xa1\x27\x14\x31\x8a\xc2\xf5\xe9\x87\x8d\xef\x89\x99\xa6\xcd\xa3\x96\x6a\x8b\x7f\x86\x79\xed\xbf\x54\xf3\xf8\xf9\x74\xd7\x00\x00\x00\xff\xff\x93\x04\x6f\x26\x5c\x01\x00\x00") + +func testFixturesDocYamlUserGuideDeploymentYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideDeploymentYaml, + "test/fixtures/doc-yaml/user-guide/deployment.yaml", + ) +} + +func testFixturesDocYamlUserGuideDeploymentYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideDeploymentYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/deployment.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideDownwardApiDapiPodYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x90\x4d\x4b\xf3\x40\x14\x85\xf7\xf9\x15\x97\xac\xdf\xb4\xbc\xdb\xd9\xb5\x7e\x60\x17\x6d\x07\x2b\x82\x88\x94\xeb\xcc\xad\x19\xcc\x7c\x30\x73\x13\x2c\xa5\xff\x5d\x26\xc4\x1a\x41\xdd\xa8\x9b\x90\x39\xcf\xe1\x3c\xc3\x60\x30\xb7\x14\x93\xf1\x4e\x40\xf7\xbf\x78\x36\x4e\x0b\x90\x5e\x17\x96\x18\x35\x32\x8a\x02\xc0\xa1\x25\x01\x1a\x83\xa9\x98\x12\x57\xc1\xeb\x22\x05\x52\x99\x29\xef\x18\x8d\xa3\x98\xf2\x09\xa0\x1a\xda\x7d\xf1\x04\x7b\x04\x60\x2c\x3e\x91\x80\xc3\x61\x32\x6f\xd3\x7e\xee\x5f\x16\x39\x38\x1e\x07\xac\xbc\xb5\x98\x2f\x70\x0f\xe5\xf4\xd1\xb8\x69\xaa\xcb\x7f\x50\x56\x2a\x7f\xc9\x75\x25\x3c\x0c\x4d\x72\x9d\x18\x7e\xdf\x95\xcb\xbb\xad\x5c\x9f\x6f\x57\xb3\xe5\xc5\x89\x01\x74\xd8\xb4\x74\x19\xbd\x15\xa3\x10\x60\x67\xa8\xd1\xd7\xb4\xfb\x98\x0e\xb9\x44\xae\x05\xbc\x3d\xc1\x24\xcf\x7f\x67\xdb\xc8\xd9\xd9\x1f\x28\x53\x40\xf5\xa5\x77\x21\x7f\x45\x98\x18\xb9\x4d\x93\xe0\xf5\x68\x70\xa4\xba\x5a\x6f\x6e\x7e\xe4\xfa\x44\x56\xfb\xc4\xfd\x64\xa4\xc4\x18\x59\xfa\xc6\xa8\xbd\x80\x15\x75\x14\x8b\xd7\x00\x00\x00\xff\xff\x17\xac\xa1\x83\x92\x02\x00\x00") + +func testFixturesDocYamlUserGuideDownwardApiDapiPodYamlInBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideDownwardApiDapiPodYamlIn, + "test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml.in", + ) +} + +func testFixturesDocYamlUserGuideDownwardApiDapiPodYamlIn() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideDownwardApiDapiPodYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideJobYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\x8e\xcf\x6a\xc3\x30\x0c\x87\xef\x7e\x0a\xe1\xd3\x06\x09\xcb\x76\x34\xec\x05\x06\x1b\x3b\xed\x32\x7a\x90\x1d\x91\x8a\xfa\x1f\xb6\x9a\xd2\xb7\x2f\x82\x26\xb4\xbf\x8b\xa4\x8f\x4f\x42\x58\xf9\x8f\x5a\xe7\x92\x1d\x78\x94\x70\x7c\x5b\xdf\xcd\x89\xf3\xec\xe0\xab\x78\x93\x48\x70\x46\x41\x67\x00\x32\x26\x72\x50\xd9\xf4\x4a\x41\x81\x50\xaa\x11\x85\xb4\x07\x78\x54\x35\xbb\xae\xc3\xb6\xa2\x09\x25\x0b\x72\xa6\xd6\x37\x32\x3e\xcb\x1a\x4e\xb8\x28\xa1\x16\x77\x16\x4a\x4a\xa8\x9f\xfd\x5b\xe5\x76\x00\xb0\xe3\xb7\xe7\x25\x9f\xd3\xa7\xaf\x6c\x07\xb0\xe3\x25\x92\xd6\xda\x38\x0b\xf8\xca\x2f\x1f\xd3\x34\xbd\xda\xc3\xfd\x4a\xa3\x2e\xd8\xe4\xb7\x44\x0e\x57\x07\x3f\xb4\x52\x33\xe6\x16\x00\x00\xff\xff\x88\x8f\xaf\xe9\x06\x01\x00\x00") + +func testFixturesDocYamlUserGuideJobYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideJobYaml, + "test/fixtures/doc-yaml/user-guide/job.yaml", + ) +} + +func testFixturesDocYamlUserGuideJobYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideJobYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/job.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideLivenessExecLivenessYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x90\xbf\x6e\xc2\x30\x10\xc6\xf7\x3c\xc5\xf7\x02\x6e\x92\xa1\x1d\x8c\xd4\x01\x75\xe9\x86\x54\xa9\xfb\xc5\xb9\x92\x13\xfe\x13\xd9\x07\x02\x21\xde\xbd\x4a\x08\x0a\x03\xdb\x77\xbf\xcf\x3e\xff\x64\x1a\xe5\x97\x73\x91\x14\x2d\x4e\x6d\x75\x90\xd8\x5b\xec\x52\x5f\x05\x56\xea\x49\xc9\x56\x80\xa7\x8e\x7d\x99\x12\xa0\x5c\xd4\xc2\xcb\x89\x23\x97\x52\x01\x91\x02\xaf\xc0\xf0\x99\x5d\x55\x46\x76\xd3\x71\x97\xa2\x92\x44\xce\xf3\x65\x03\xca\xfb\x65\x8d\x41\xdd\x49\xac\xcb\xb0\x4c\xc6\x2d\x81\xdd\x90\x90\x0e\xf8\x44\xad\x61\xac\x07\x26\xaf\xc3\x06\xc5\x33\x8f\x68\x9b\x0d\x72\x80\xc9\x7f\xaf\xda\x8f\xa6\x99\x97\x48\xa0\x3d\x5b\x5c\xaf\x6f\xdb\x63\xb9\x6c\xd3\xf9\x7b\x02\xb7\xdb\x5c\x3e\x44\x77\x39\x75\x7c\x77\x01\x26\xe9\x47\x9e\xac\x43\xa0\xd8\xaf\xc0\xc0\x91\x3e\x4d\x4f\x6f\x2f\x54\xa2\xa8\x90\xff\x62\x4f\x97\x1f\x76\x29\xf6\xc5\xa2\x7d\x5f\x5a\x95\xc0\xe9\xa8\x6b\x31\xf3\x57\x1f\xf7\x1f\x00\x00\xff\xff\x27\xa4\xbd\xd0\x8f\x01\x00\x00") + +func testFixturesDocYamlUserGuideLivenessExecLivenessYamlInBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideLivenessExecLivenessYamlIn, + "test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml.in", + ) +} + +func testFixturesDocYamlUserGuideLivenessExecLivenessYamlIn() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideLivenessExecLivenessYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideLivenessHttpLivenessYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x90\xbd\x4e\xc3\x30\x14\x85\xf7\x3c\xc5\x79\x01\x43\x3b\x20\x55\xde\x2a\x90\x80\xad\x12\x12\x62\xbd\x6d\x8e\x12\x0b\xff\x44\xf1\x4d\x10\x54\x7d\x77\x94\xd4\x21\x1d\xf0\x64\x7f\xe7\xc7\xf6\x95\xce\xbd\xb3\xcf\x2e\x45\x8b\x71\x5b\x7d\xba\x58\x5b\x1c\x52\x5d\x05\xaa\xd4\xa2\x62\x2b\xc0\xcb\x91\x3e\x4f\x3b\x40\x99\xd5\xc2\xbb\x91\x91\x39\x57\x40\x94\xc0\x15\x98\x56\xb5\xab\x72\xc7\xd3\x64\x3f\xa5\xa8\xe2\x22\xfb\x39\x6c\x20\x7d\x53\x6a\xcc\x6d\x05\xe0\x82\x34\xb4\x38\x9f\xef\xf6\x4d\x6c\x53\xd6\xd7\x09\x5c\x2e\xb3\xb8\x38\x0f\x7d\x3a\xf2\x1a\x07\xa6\x7b\x9e\xa9\xcb\x11\xe8\x44\x5b\x8b\xfb\x96\xe2\xb5\xfd\x59\x71\xea\xd5\x62\xb7\xd9\x6d\xfe\xd0\x14\x7d\xa1\xd4\xe5\x59\xcb\x32\xe5\x2b\x1f\xe6\x71\xc8\x9a\x82\xb9\x7a\x6e\x1c\xc0\x28\x7e\xa0\xc5\xfe\x8b\x39\x05\x16\xc9\x45\xa7\x4e\xfc\x13\xbd\x7c\xbf\xf1\x94\x62\x9d\x2d\xb6\x0f\x45\x55\x17\x98\x06\x5d\x85\x99\xff\x37\xb5\xdf\x00\x00\x00\xff\xff\xc9\xfd\x2a\x58\x8c\x01\x00\x00") + +func testFixturesDocYamlUserGuideLivenessHttpLivenessYamlInBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideLivenessHttpLivenessYamlIn, + "test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml.in", + ) +} + +func testFixturesDocYamlUserGuideLivenessHttpLivenessYamlIn() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideLivenessHttpLivenessYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideMultiPodYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xb4\x52\x4d\x6b\xc2\x40\x10\xbd\xef\xaf\x18\x72\x5f\x35\x16\x5b\xba\xb7\x42\x3d\x14\xaa\x48\x95\xde\xd7\x64\xd0\xc5\xfd\x08\xbb\x93\x80\x94\xfe\xf7\x92\x4f\x37\xd6\x43\x4b\x69\x4e\x9b\x37\xf3\xe6\xe3\xcd\xe3\x9c\x33\x59\xa8\x77\xf4\x41\x39\x2b\xa0\x4a\xd9\x49\xd9\x5c\xc0\xc6\xe5\xcc\x20\xc9\x5c\x92\x14\x0c\x40\xcb\x3d\xea\x50\xbf\x00\xac\x34\x28\xc0\x63\xae\x42\xf3\xdf\xbc\x78\x40\x4b\xca\xa2\x16\x90\x90\x2f\x31\x69\x43\x4e\xa3\x00\x23\x03\xa1\x67\x23\x26\xef\xc0\x50\x60\x56\x97\xcd\x9c\x25\xa9\x2c\xfa\xae\x09\xef\x92\x07\x6e\xfd\x29\x23\x0f\x28\xe0\x90\xf9\x89\x72\xd3\x53\xb9\x47\x6f\x91\x30\x70\x9c\x23\x27\x0c\xc4\x9b\x8c\x30\x6d\x5a\x88\x74\x32\xeb\x88\x68\x2b\xd1\x3d\x2f\xa5\x57\x4f\xdb\xdd\xf2\x6d\x80\x01\x2a\xa9\x4b\x1c\xcd\x0f\x50\x38\x4f\x21\xe6\x0e\x83\x6e\x9c\x27\x01\xf7\x77\x0f\x8f\x5d\xd4\x63\x70\xa5\xcf\x30\x4a\xd7\xca\xa8\x98\x0e\x90\x15\xa5\x80\x64\x36\x59\xf4\x0d\x2a\xa7\x4b\x83\x2b\x57\xda\x71\x1f\x53\x23\x1b\x49\x47\x01\xd3\x58\x31\x5e\x9f\x24\x2a\xd8\xee\x32\x80\xfd\x72\xfd\x39\xfe\x45\xb9\xed\x72\xbd\x7b\x59\x2f\x5f\xff\xa8\xdd\xbc\x13\xaf\x95\xe0\xea\xf0\xd1\x9a\x68\x0a\x3a\x3f\x2b\x2f\xe0\xe3\x93\xfd\xd8\xb2\x6d\x99\x4a\x6a\x95\xf3\xc2\xe5\x37\x4d\x7c\x89\xde\xf6\x61\x3f\x4c\x24\x58\x40\x5f\x21\x3f\xba\x40\x75\x88\xfd\x4a\xdc\x31\x77\x50\xf9\x9b\x71\xae\x6d\xd3\x9a\x26\x4d\x06\xc0\xa0\x71\xfe\x2c\x60\x91\xce\x57\x8a\x7d\x05\x00\x00\xff\xff\x49\x13\x6b\xed\xc6\x03\x00\x00") + +func testFixturesDocYamlUserGuideMultiPodYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideMultiPodYaml, + "test/fixtures/doc-yaml/user-guide/multi-pod.yaml", + ) +} + +func testFixturesDocYamlUserGuideMultiPodYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideMultiPodYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/multi-pod.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim01Yaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x34\xca\xb1\x0a\x02\x31\x10\x84\xe1\x3e\x4f\x31\x2f\x70\xc5\x61\x97\xd6\xc2\x4a\x14\x8b\xb3\x5e\x92\x41\x82\x97\xe4\xdc\xdd\x13\x7c\x7b\x09\x68\xf9\xcf\x7c\xcf\xd2\x72\xc4\x95\x6a\xc5\x9c\xcd\x97\xbe\xee\x95\xc7\x55\x4a\x0d\xb2\x95\x65\x1c\xbd\x45\xbc\xe7\x50\xe9\x92\xc5\x25\x06\xa0\x49\x65\x44\xfd\xa4\x01\xa7\x39\xd8\xc6\x34\x76\x49\x89\x66\xe7\x9e\x69\x23\x81\x09\x37\x4a\xbe\x6b\x71\x5e\x5a\x62\x00\x94\xd6\x77\x4d\x7f\xa0\x7c\xed\x34\xff\x15\x60\xde\x55\x1e\x8c\x38\x9c\x4a\xf8\x06\x00\x00\xff\xff\x87\xb5\xc5\xba\x9e\x00\x00\x00") + +func testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim01YamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim01Yaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-01.yaml", + ) +} + +func testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim01Yaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim01YamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-01.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim02Yaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x34\xca\xb1\x0a\x02\x31\x10\x84\xe1\x3e\x4f\x31\x2f\x70\x85\x56\x92\xd6\xc2\x4a\x14\x8b\xb3\x5e\x92\x41\x82\x97\xe4\xdc\xdd\x13\x7c\x7b\x09\x68\xf9\xcf\x7c\xcf\xd2\x72\xc4\x95\x6a\xc5\x9c\xcd\xe7\xbe\x6c\x95\xc7\x45\x4a\x0d\xb2\x96\x79\x1c\xbd\x45\xbc\x77\xa1\xd2\x25\x8b\x4b\x0c\x40\x93\xca\x88\xfa\x49\x03\x4e\xfb\x60\x2b\xd3\xd8\x25\x25\x9a\x9d\x7b\xa6\x8d\x04\x26\xdc\x28\xf9\xae\xc5\x79\x69\x89\x01\x50\x5a\xdf\x34\xfd\x81\xf2\xb5\xd1\xfc\x57\x80\x79\x57\x79\x30\xe2\x70\x2a\xe1\x1b\x00\x00\xff\xff\x1e\x84\x80\xc1\x9e\x00\x00\x00") + +func testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim02YamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim02Yaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-02.yaml", + ) +} + +func testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim02Yaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim02YamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-02.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim03Json = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x8f\x31\x4b\xc6\x30\x10\x86\xf7\xfc\x8a\xe3\xe6\x0a\x16\xb7\xae\x0e\x4e\xa5\xe2\x50\x07\x71\x38\x92\x43\x82\x4d\x52\x73\xa9\x50\x4a\xfe\xbb\x24\xd5\x4a\xf8\xb6\xe3\x7d\x9e\x7b\x8f\x3b\x14\x00\x00\x7e\x5a\x6f\x70\x00\x7c\xe6\x28\x56\x12\xfb\x34\x87\x65\x73\xfc\xb8\x90\x75\xd8\x9d\x12\xad\x76\x2e\x3c\xf8\xa2\x7e\xf7\x7f\xb9\xe3\x44\x86\x12\xe1\x00\x67\x5d\x4d\x3d\x39\x2e\x9e\xdb\x75\x29\xb9\x7b\xc0\xca\x72\x07\x28\x2b\xeb\x56\x26\xad\x59\x64\x0c\x86\x05\x07\x78\xbb\x40\x85\x2f\x4c\xe6\x35\xda\xc4\x93\xd7\xfc\x7b\xb4\x81\x93\x5f\xf6\x91\xfc\x8e\x17\x7a\xff\xb7\x30\xb2\x84\x2d\xea\xda\x7c\xb4\xcb\x91\xbf\x36\x96\x74\x4b\x2a\x95\x14\x22\x7d\xd4\x27\xfa\xfb\x27\x6c\x84\xac\xda\x29\xab\xac\x7e\x02\x00\x00\xff\xff\xfa\x56\x3a\xe5\x4c\x01\x00\x00") + +func testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim03JsonBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim03Json, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-03.json", + ) +} + +func testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim03Json() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim03JsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-03.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuidePersistentVolumesVolumesGceYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4c\xce\xb1\x6a\xc4\x30\x0c\xc6\xf1\xdd\x4f\x21\xb2\x17\x9c\xa6\x93\xe7\x42\xa7\x34\xa5\x94\x74\xd6\xc9\xba\x60\x92\xd8\x26\xd2\x85\xf3\xdb\x1f\x4e\x86\xbb\x4d\xfc\xd0\x07\xff\x39\x44\xef\xe0\x87\x37\x09\xa2\x1c\x75\x4c\xcb\x6d\x65\x83\x39\x8c\xd5\x52\x74\xb0\xb7\x66\x65\x45\x8f\x8a\xce\x00\x44\x5c\xd9\x41\xde\xad\xb5\x9d\x91\xcc\x54\x91\x30\x23\x05\x2d\xf5\x06\x10\x4d\x1b\x4e\xec\xa0\xb5\x5f\xc1\x00\x20\x11\x8b\xf4\xc9\xb3\x9c\x0f\x6f\xf0\xcb\xe8\xff\xb7\xa0\x3c\x44\xe2\x17\x1b\xe2\x52\x7a\x8c\xc5\x00\x4c\xc4\xcf\xae\xcf\x20\xf3\xb9\xcd\xfe\xfb\x28\x68\xf0\x42\xed\x7b\xd7\x1c\x78\x95\xbf\x92\x2b\xf2\x5d\x3f\x1a\xf3\x08\x00\x00\xff\xff\x23\x32\x13\xb0\xd6\x00\x00\x00") + +func testFixturesDocYamlUserGuidePersistentVolumesVolumesGceYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuidePersistentVolumesVolumesGceYaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/gce.yaml", + ) +} + +func testFixturesDocYamlUserGuidePersistentVolumesVolumesGceYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuidePersistentVolumesVolumesGceYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/gce.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal01Yaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x2c\x8e\x3d\x6a\xc0\x30\x0c\x46\x77\x9d\xe2\x23\x7b\x89\xbd\xfa\x02\x9d\x4a\x43\x87\x74\x56\x6d\xd1\x98\xfa\x8f\x48\x0d\xe4\xf6\xc5\xa4\xdb\xe3\x3d\x21\xbe\x9f\xdc\x52\xc0\x26\xa7\x66\x35\x69\xb6\xf7\xf2\x5b\x85\x78\xe4\x7d\xba\xde\x02\x2e\x4f\x55\x8c\x13\x1b\x07\x02\x1a\x57\x09\x18\x97\x73\xce\x13\x50\xf8\x4b\x8a\xce\x00\xd8\x3d\x24\xa0\xf4\xc8\x85\x74\x48\x9c\x36\xf2\xe0\x98\xed\x7e\x2e\xd4\xfa\xc9\xdf\x12\xe0\xdd\x6b\x26\x80\x63\x14\xd5\xb7\x9e\xe4\xff\xc5\x0b\x3e\x84\xd3\xe7\x99\x4d\xde\x5b\x14\x02\x8e\xae\xb6\xb1\x1d\x4f\x1f\x93\xb0\xac\xda\xab\x4c\x5e\xe7\x2c\xe7\x17\xfa\x0b\x00\x00\xff\xff\xd4\x69\x2f\xa0\xc9\x00\x00\x00") + +func testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal01YamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal01Yaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-01.yaml", + ) +} + +func testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal01Yaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal01YamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-01.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal02Yaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x8f\x31\x6a\x03\x41\x0c\x45\x7b\x9d\xe2\xe3\x3e\x78\xe3\x2a\xcc\x05\x52\x85\x2c\x5b\x38\xb5\xa2\xfd\xc4\x43\x66\x67\x86\x95\x62\xd8\xdb\x87\xc1\xa9\xd2\x3d\xde\x13\x42\xfa\xce\x75\x4d\x98\xb9\x7b\xf6\x60\x8d\x6b\x2b\x3f\x1b\x45\x7b\xbe\x0e\xd7\x6a\xc2\xfd\x59\x36\x86\xae\x1a\x9a\x04\xa8\xba\x31\xa1\xdf\xa7\x69\xba\x08\x50\xf4\x93\xc5\x47\x00\xe2\xe8\x4c\x28\xcd\xb4\x88\x77\xda\xb0\xa6\x5d\x2d\xc7\xf1\x98\xf0\x68\xbb\x7e\x31\xe1\xe5\x35\x0b\xa0\x66\x74\x7f\x6b\x2b\xff\x36\x3c\x61\xa1\xae\x1f\x7b\x0e\xbe\x57\xa3\x00\xb7\xe6\x31\x6b\xdc\x1e\xbd\x0f\xc2\xe9\xec\x6d\xe3\xe0\xf3\xb8\x6a\xba\x9c\x04\xe8\xff\x7e\x58\x68\x45\xf3\x36\xb7\x92\xed\x48\x58\x68\x87\x15\xca\x6f\x00\x00\x00\xff\xff\x1e\x18\x48\xf3\xf1\x00\x00\x00") + +func testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal02YamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal02Yaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-02.yaml", + ) +} + +func testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal02Yaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal02YamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-02.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuidePersistentVolumesVolumesNfsYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x2c\x8c\x4d\xaa\x02\x31\x10\x06\xf7\x39\x45\x5f\xe0\xcd\xcb\x8c\xc8\x40\x2e\xe0\x4a\x14\x17\xe3\xba\x49\x3e\x35\x68\x7e\x48\xb7\x03\xde\x5e\xc2\xb8\x2b\xaa\xa0\xb8\xc6\x05\x4d\x62\xc9\x8e\xd6\xd1\x3c\x63\x0e\x8e\xce\xdd\x88\x22\xeb\x52\x5e\xef\x04\x93\xa0\x1c\x58\xd9\x19\xa2\xcc\x09\x8e\xea\x6a\xad\xdd\x19\xa9\xf0\x5d\x7a\xae\xec\xa3\x7e\x3a\x13\x89\x96\xc6\x77\x38\xda\x1f\xa2\x21\x62\xef\x21\x72\x2c\x01\xb2\xf5\x3f\xba\x80\xc3\xb5\x45\xc5\x29\x7b\xf4\xe9\xed\x97\x2a\xeb\xc3\xd1\xbf\x94\x84\x8e\xdb\x0e\x6d\x45\x73\x34\xce\xd3\x30\xce\x83\x1d\x26\xf3\x0d\x00\x00\xff\xff\xe0\xa5\xa0\x46\xb7\x00\x00\x00") + +func testFixturesDocYamlUserGuidePersistentVolumesVolumesNfsYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuidePersistentVolumesVolumesNfsYaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/nfs.yaml", + ) +} + +func testFixturesDocYamlUserGuidePersistentVolumesVolumesNfsYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuidePersistentVolumesVolumesNfsYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/nfs.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuidePodYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\xcc\x41\x0a\xc2\x40\x0c\x85\xe1\xfd\x9c\xe2\x5d\xa0\xa0\x3b\xc9\x29\xba\x72\x1f\x3b\xa1\x04\x3b\x49\x98\x09\xe2\xf1\xa5\xa2\x88\xdd\x7e\xc9\xff\x38\xf4\x2a\x7d\xa8\x1b\xe1\x71\x2e\x77\xb5\x4a\x98\xbd\x96\x26\xc9\x95\x93\xa9\x00\xc6\x4d\x08\xb6\xaa\x3d\x0b\xb0\xf1\x4d\xb6\xb1\x3b\xc0\x11\xdf\xc3\x08\x59\x76\x5c\xdc\x92\xd5\xa4\xbf\x5f\xa6\x43\x0c\x68\xe3\xf5\x0f\xc2\x7b\x7e\xe6\xa6\x5f\x3d\x7b\x4f\xc2\xe5\x54\x5e\x01\x00\x00\xff\xff\x76\xb9\xf1\x84\xa2\x00\x00\x00") + +func testFixturesDocYamlUserGuidePodYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuidePodYaml, + "test/fixtures/doc-yaml/user-guide/pod.yaml", + ) +} + +func testFixturesDocYamlUserGuidePodYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuidePodYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/pod.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideReplicasetRedisSlaveYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x53\x4f\x6f\xdb\x3e\x0c\xbd\xe7\x53\x10\xe9\xa1\x97\x24\x4e\xff\x24\xf9\xc5\xf7\xdf\xfe\x00\x2b\x3a\xb4\xc5\x76\x18\x86\x82\x92\xe8\x84\x88\x24\x7a\x92\xec\x2d\xdf\x7e\x90\xe3\x24\xce\x5a\xdf\x44\xf2\x3d\x3e\xf3\x91\x58\xf3\x37\x0a\x91\xc5\x97\x80\x75\x1d\x8b\xf6\x66\xb4\x63\x6f\x4a\x78\xa2\xda\xb2\xc6\x67\x4a\x23\x47\x09\x0d\x26\x2c\x47\x00\x1e\x1d\x95\x10\xc8\x70\x9c\x46\x8b\x2d\x8d\x00\x2c\x2a\xb2\x31\x67\x21\x93\xf4\xe9\xee\x19\xc4\x52\x09\xc7\x42\x80\xc4\x14\x4a\x50\xa8\x77\xe4\xcd\x28\xd6\xa4\x33\xec\x0a\xd2\x96\x23\x84\x43\xcb\x08\x2d\xda\x86\x80\x23\x18\xaa\xb0\xb1\xa9\x2b\x71\x62\xb8\xda\x03\x27\x40\xad\x25\x18\xf6\x1b\x48\x02\x7b\x69\x02\x68\x8c\x99\xff\x48\x50\xc2\xed\x08\x20\x92\x25\x9d\x24\x1c\x84\x39\x4c\x7a\xfb\x65\xa0\xf4\x8d\xd6\xb7\x6a\xff\xd5\x0b\x90\xc8\xd5\x16\x13\xf5\x9c\x83\xc1\xe4\xcf\x5e\xd0\xbf\xd3\xe0\xbd\x16\x6f\x9b\x00\x1c\x07\x93\x3f\x2d\x3e\x21\x7b\x0a\x27\xe2\x69\xef\xc2\x25\x0b\x3b\xdc\x50\x09\x46\xf4\x8e\xc2\x8c\xa5\xb0\xac\x02\x86\x7d\xd1\x09\x28\x17\xb3\xf9\x6c\x31\x45\x5b\xb3\x3f\x63\xae\xe0\x3b\x01\x06\x02\xf1\x76\x0f\xec\x6a\x4b\x8e\x7c\xea\x46\xbb\x25\x30\x3e\x82\xd4\x89\xc5\x83\x54\xe5\x00\xb5\x4d\xa9\x8e\x65\x51\x6c\x38\x6d\x1b\x35\xd3\xe2\x8a\x5d\xa3\x28\x78\x4a\x14\x0b\xfa\x83\x99\x29\x16\xca\x8a\x2a\xd6\x2b\xbd\x22\x33\x27\xb5\x5c\x2c\x16\x78\xaf\x96\xcb\x95\xb9\xfd\x6f\xb5\xaa\xd6\xcb\x85\xb9\x5b\xdf\xd2\x7c\x8e\x4a\xdf\x2f\x8a\x4d\x43\x31\x29\x91\x5d\x31\x58\xaf\x22\x34\x7e\x16\xb7\xa7\xde\x5a\x9c\xc3\xbc\x9f\x3f\x60\xdc\x97\x51\x68\x29\x8c\x27\x30\x9e\x1e\x20\x52\xe5\xc7\x21\xe9\x30\xa6\x43\x72\x79\xb7\x5a\x8f\xe1\xe7\xd9\x08\x8a\xd2\x04\x4d\x03\xbb\x72\xf0\x57\x16\x71\x11\x03\xd0\x75\x53\xc2\xcd\x7c\xee\x2e\xa2\x8e\x9c\x84\x7d\x97\x78\xe0\x53\x86\x7c\x7b\x06\x1f\x8d\xfa\xf8\xff\xcb\xeb\xa7\xc7\xe7\x97\xe7\xd7\x0f\x4f\x8f\x0f\x03\x96\x6e\xd1\xcb\x3c\xe7\x41\xf0\x0a\x3e\x57\xfd\x5a\xdb\x26\xcb\xcf\x2b\x50\xf1\x06\x8c\x50\x04\x2f\x09\xd8\x6b\xdb\x18\x02\xec\x1c\xca\x03\x60\x4d\x93\x6c\x99\x87\x24\x17\x54\xec\x63\x22\x34\xf9\x66\x28\x46\x40\x9f\x15\x72\x10\x9f\x7d\x86\x16\x03\xa3\xb2\x94\x0f\xa9\x62\x6f\x3a\xd7\x0f\x33\xbb\x60\xe9\x5b\x5c\x47\xd8\x4a\x4c\x93\xce\x85\x8c\x97\x26\x75\x90\xeb\xf3\x8f\x5c\x83\x65\x4f\x80\x4a\x5a\x9a\x00\xf6\x0b\x7d\x24\x6a\xfc\x11\x9a\x61\x5d\xa5\x22\x2b\xbf\x67\x17\x55\x3d\x1b\xf9\xf6\x14\xae\x25\x0c\x6d\x99\x9e\xcf\xe2\xab\x84\x54\x42\xb6\x77\xf4\x37\x00\x00\xff\xff\x7c\x90\xda\x81\xce\x04\x00\x00") + +func testFixturesDocYamlUserGuideReplicasetRedisSlaveYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideReplicasetRedisSlaveYaml, + "test/fixtures/doc-yaml/user-guide/replicaset/redis-slave.yaml", + ) +} + +func testFixturesDocYamlUserGuideReplicasetRedisSlaveYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideReplicasetRedisSlaveYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/replicaset/redis-slave.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideReplicationYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x8d\x31\x6a\x04\x31\x0c\x45\x7b\x9f\xe2\x5f\x60\x20\x21\x4d\x70\x9b\x0b\x84\x14\xe9\x15\x8f\x18\x44\x6c\xc9\xc8\x22\xe4\xf8\x8b\x19\x66\x77\xd8\x5d\x95\xff\x7d\xbd\x4f\x5d\xbe\xd9\x87\x98\x66\xfc\xbd\xa6\x5f\xd1\x35\xe3\x8b\x7b\x95\x42\x21\xa6\x1f\xa6\xe1\x56\x2b\x7b\x6a\x1c\xb4\x52\x50\x4e\x80\x52\xe3\x0c\xdd\x44\xff\xd3\xe8\x5c\x66\xe6\xfb\xd7\xc8\x78\x4b\xc0\xe0\xca\x25\xcc\x27\x01\xa8\xf7\xa3\x0e\x04\xb7\x5e\x29\x78\x47\x67\xed\xbc\xb3\x7a\x4f\x2a\xfd\x70\x1d\x07\xbf\x93\x01\xc7\xfe\xbc\x62\x1a\x24\xca\x7e\xad\x2f\x4f\x84\x80\x34\xda\x1e\xc2\x6e\x1e\xa7\x99\xe5\x66\xfb\x34\x8f\x8c\xf7\x97\x74\x09\x00\x00\xff\xff\x61\x99\x01\xcd\x2f\x01\x00\x00") + +func testFixturesDocYamlUserGuideReplicationYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideReplicationYaml, + "test/fixtures/doc-yaml/user-guide/replication.yaml", + ) +} + +func testFixturesDocYamlUserGuideReplicationYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideReplicationYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/replication.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideSecretsSecretEnvPodYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x5c\x90\x41\x4b\x03\x31\x10\x85\xef\xf9\x15\x8f\x3d\x1b\x4a\xaf\xb9\x15\xad\x17\x51\x4a\x2d\x82\x88\x94\xd9\xec\x53\x43\x9b\x64\x49\xd2\xe0\xfe\x7b\x59\x0d\xb5\x7a\x19\x66\xde\xf7\xe0\xcd\x8c\x8c\xee\x89\x29\xbb\x18\x0c\xea\x52\x1d\x5c\x18\x0c\x36\x71\x50\x9e\x45\x06\x29\x62\x14\x10\xc4\xd3\x20\xd3\x26\x16\xcd\x50\xf5\x18\x07\x95\x47\xda\x19\xda\x18\x8a\xb8\xc0\x94\xe7\x09\xd0\xcd\x5e\x98\x8b\x3e\xc3\x6f\x04\x38\x2f\xef\x34\xe8\x4f\x79\xea\xe3\x67\x13\x6d\xf4\x5e\xe6\xdc\x17\x74\x8b\xde\x85\x45\xfe\xe8\xae\xd0\x69\x3b\x57\x86\xda\xe1\xb5\x39\x19\xaa\x69\xed\x6f\xd0\xfd\xf3\xfe\x71\x7d\xbd\x5d\xef\xf6\x37\xab\xdd\xea\x8c\x81\x2a\xc7\x13\x6f\x53\xf4\xe6\x42\x44\xbb\xe3\x8e\xd3\x96\x6f\x7f\x09\x2e\x57\xff\xb1\xfd\xe3\x07\x4e\x06\xf3\x5b\xf4\x52\x01\x89\xb9\x48\x2a\x9b\x78\x74\x76\x32\x78\x60\x65\x52\x5f\x01\x00\x00\xff\xff\xab\xfe\x4b\x14\x52\x01\x00\x00") + +func testFixturesDocYamlUserGuideSecretsSecretEnvPodYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideSecretsSecretEnvPodYaml, + "test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml", + ) +} + +func testFixturesDocYamlUserGuideSecretsSecretEnvPodYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideSecretsSecretEnvPodYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideSecretsSecretPodYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x90\xb1\x4e\xc4\x30\x10\x44\x7b\x7f\xc5\x28\xb4\x98\xe8\x5a\x4b\x14\x94\x14\x9c\x52\xd1\x20\x84\x8c\xb3\x24\x16\xb1\x1d\xd9\x9b\x20\x74\xba\x7f\x47\x8e\x0d\x77\xc0\xb9\xdb\x99\xf1\xe8\xed\xea\xd9\x3e\x52\x4c\x36\x78\x85\x75\x27\xde\xad\xef\x15\xba\xd0\x0b\x47\xac\x7b\xcd\x5a\x09\xc0\x6b\x47\x0a\x89\x4c\x24\x96\x4c\x89\xe5\x1c\x7a\x91\x66\x32\xd9\x35\xc1\xb3\xb6\x9e\x62\xca\x13\x20\x6b\x7e\x0b\xfe\x98\x9b\x05\x58\xa7\x07\x52\x38\x1c\x6e\xee\x06\x3f\x86\xc4\xf7\x59\x38\x1e\xab\xad\xe3\x90\x14\x9e\xd0\xb8\xb0\x78\xce\x0d\xcd\x35\x1a\x29\xdf\xec\x44\x2f\xb9\x8b\x3c\xdf\xb6\xc4\xa6\xad\x34\x6b\x98\x16\x47\x6d\x26\x95\xbb\x06\xcf\xb5\xa7\xc8\x0f\xb9\xa4\x52\x95\x77\xb5\xb1\xc1\x2d\x89\xe1\x34\x9b\x11\x3c\x52\x4d\x17\xeb\x95\xa6\xf0\x71\xf6\x43\xfe\xde\xbe\x44\xcf\x7c\x60\x43\xed\x34\x8f\x0a\xff\xc9\xc4\x37\xcb\x9f\xe3\x5c\xaa\x2b\xda\x09\xb7\xcc\xfb\xd3\x31\x8b\x20\x80\x48\x89\x75\xe4\x2e\x4c\xd6\x7c\x2a\xec\x69\xa5\x28\xbe\x02\x00\x00\xff\xff\x36\x60\xeb\x69\xcb\x01\x00\x00") + +func testFixturesDocYamlUserGuideSecretsSecretPodYamlInBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideSecretsSecretPodYamlIn, + "test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml.in", + ) +} + +func testFixturesDocYamlUserGuideSecretsSecretPodYamlIn() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideSecretsSecretPodYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideSecretsSecretYaml = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x4a\x2c\xc8\x0c\x4b\x2d\x2a\xce\xcc\xcf\xb3\x52\x28\x33\xe4\xca\xce\xcc\x4b\xb1\x52\x08\x4e\x4d\x2e\x4a\x2d\xe1\xca\x4d\x2d\x49\x4c\x49\x2c\x49\xb4\xe2\x52\x50\xc8\x4b\xcc\x4d\xb5\x52\x28\x49\x2d\x2e\xd1\x2d\x86\xc8\xc2\x64\x40\xb4\xae\xa1\x95\x42\x4a\xae\x5b\x71\x4a\x78\x68\x89\x6f\xa0\x81\x37\x4c\xd8\x08\x49\x38\xdd\xc0\xdb\x25\x30\xdf\x96\x0b\x10\x00\x00\xff\xff\x5d\x68\x23\xda\x72\x00\x00\x00") + +func testFixturesDocYamlUserGuideSecretsSecretYamlBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideSecretsSecretYaml, + "test/fixtures/doc-yaml/user-guide/secrets/secret.yaml", + ) +} + +func testFixturesDocYamlUserGuideSecretsSecretYaml() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideSecretsSecretYamlBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/secrets/secret.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideUpdateDemoImagesKittenHtmlDataJson = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xaa\xe6\x52\x50\x50\xca\xcc\x4d\x4c\x4f\x55\xb2\x52\x50\xca\xce\x2c\x29\x49\xcd\xd3\xcb\x2a\x48\x57\xe2\xaa\xe5\x02\x04\x00\x00\xff\xff\x27\x07\xd0\xf9\x1c\x00\x00\x00") + +func testFixturesDocYamlUserGuideUpdateDemoImagesKittenHtmlDataJsonBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideUpdateDemoImagesKittenHtmlDataJson, + "test/fixtures/doc-yaml/user-guide/update-demo/images/kitten/html/data.json", + ) +} + +func testFixturesDocYamlUserGuideUpdateDemoImagesKittenHtmlDataJson() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideUpdateDemoImagesKittenHtmlDataJsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/update-demo/images/kitten/html/data.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideUpdateDemoImagesNautilusHtmlDataJson = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xaa\xe6\x52\x50\x50\xca\xcc\x4d\x4c\x4f\x55\xb2\x52\x50\xca\x4b\x2c\x2d\xc9\xcc\x29\x2d\xd6\xcb\x2a\x48\x57\xe2\xaa\xe5\x02\x04\x00\x00\xff\xff\xbe\x2a\xe3\xd9\x1e\x00\x00\x00") + +func testFixturesDocYamlUserGuideUpdateDemoImagesNautilusHtmlDataJsonBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideUpdateDemoImagesNautilusHtmlDataJson, + "test/fixtures/doc-yaml/user-guide/update-demo/images/nautilus/html/data.json", + ) +} + +func testFixturesDocYamlUserGuideUpdateDemoImagesNautilusHtmlDataJson() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideUpdateDemoImagesNautilusHtmlDataJsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/update-demo/images/nautilus/html/data.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideUpdateDemoKittenRcYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x8e\x31\x4f\x03\x31\x0c\x85\xf7\xfc\x0a\xff\x81\x43\xb0\xa1\xac\x9d\x10\x4b\x85\x10\xbb\xc9\x3d\xa1\xa8\x8e\x1d\xf9\x4c\x97\xaa\xff\x1d\xa5\x70\xa5\xc3\x21\xe1\x29\x8e\xdf\xfb\xde\xe3\x5e\xdf\xe0\x4b\x35\xcd\x74\x7c\x48\x87\xaa\x73\xa6\x17\x74\xa9\x85\xa3\x9a\xee\x4c\xc3\x4d\x04\x9e\x1a\x82\x67\x0e\xce\x89\x48\xb9\x21\xd3\x67\x9f\x39\x30\xcd\x68\x36\x1d\x6a\x04\x34\x2d\x1d\x65\x08\x16\x08\x4a\x98\x8f\xf7\x86\xfc\xf2\x7b\x5c\x83\x7f\xbc\x44\x81\xd6\x85\x03\xdf\xae\xdb\xc0\x31\xc2\xef\x90\x65\xdd\xfe\xa2\x6e\x93\x89\xd6\x66\x63\x8a\x69\x70\x55\xf8\x95\x36\x51\x6d\xfc\x81\x4c\xa7\xd3\xdd\xf3\xc5\xf4\x34\xf6\xf3\xf9\x1f\x69\xdd\x3c\x6e\x6a\x4d\xbf\xf8\xbd\x79\x64\x7a\xbc\xbf\xde\x88\xba\x5b\x58\x31\xc9\xf4\xba\xdb\xa7\xaf\x00\x00\x00\xff\xff\x67\x96\xe2\x98\x7f\x01\x00\x00") + +func testFixturesDocYamlUserGuideUpdateDemoKittenRcYamlInBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideUpdateDemoKittenRcYamlIn, + "test/fixtures/doc-yaml/user-guide/update-demo/kitten-rc.yaml.in", + ) +} + +func testFixturesDocYamlUserGuideUpdateDemoKittenRcYamlIn() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideUpdateDemoKittenRcYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/update-demo/kitten-rc.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideUpdateDemoNautilusRcYamlIn = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x8e\xb1\x4e\x03\x31\x0c\x86\xf7\x3c\xc5\xff\x02\x87\x80\x09\x65\xed\xc4\x82\x2a\x84\xd8\x4d\xce\x42\x11\x4e\x1c\x39\xbe\x2e\x55\xdf\x1d\x85\x72\x47\x07\x2a\xd5\x5b\xec\xfc\xdf\xff\x51\xcb\xef\x6c\x3d\x6b\x8d\x38\x3c\x84\xaf\x5c\xe7\x88\x57\x6e\x92\x13\x79\xd6\xba\xd3\xea\xa6\x22\x6c\xa1\xb0\xd3\x4c\x4e\x31\x00\x95\x0a\x47\x2c\x6d\x26\xe7\x69\xe6\xa2\x53\xa5\xc5\xb3\x2c\x3d\xf4\xc6\x69\x7c\xb1\x33\xa4\x47\x3c\x06\xa0\xb3\x70\x72\xb5\x71\xf9\x27\xfe\xb3\x3d\xac\x22\x1b\x0b\x70\x2e\x4d\xc8\xf9\x9c\xbb\x54\x18\x23\xf4\xc1\xd2\xd7\xd7\x35\xee\x35\x36\xb0\xba\x8e\x49\x5a\x9d\x72\x65\xdb\x78\x13\x72\xa1\x4f\x8e\x38\x1e\xef\x5e\x7e\x63\xcf\x63\x73\x3a\xdd\xd0\xd8\xd4\xfc\x42\x6d\xfa\x2b\xd8\xab\x79\xc4\xd3\xfd\x76\x03\x9a\xa9\x6b\x52\x89\x78\xdb\xed\xc3\x77\x00\x00\x00\xff\xff\x95\x67\x7a\xc0\x95\x01\x00\x00") + +func testFixturesDocYamlUserGuideUpdateDemoNautilusRcYamlInBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideUpdateDemoNautilusRcYamlIn, + "test/fixtures/doc-yaml/user-guide/update-demo/nautilus-rc.yaml.in", + ) +} + +func testFixturesDocYamlUserGuideUpdateDemoNautilusRcYamlIn() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideUpdateDemoNautilusRcYamlInBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/update-demo/nautilus-rc.yaml.in", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesDocYamlUserGuideWalkthroughPodtemplateJson = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x8d\x3d\x8a\xc3\x30\x10\x85\x7b\x9f\x62\x98\xda\x0b\xbb\xdd\xe2\x43\x2c\x2e\x96\x34\x21\xc5\xc4\x1e\x8c\x88\x35\x12\xf2\x10\x02\x41\x77\x0f\xfe\x91\x2d\x07\xa7\x11\xe2\xbd\x6f\xbe\x07\xf0\x2c\x00\x00\x90\xbc\x39\x71\x18\x8c\x13\xac\x00\xef\x3f\x58\xce\xf9\xcd\x48\x3b\x26\xb5\x6b\xff\xd9\xfa\x9e\x94\x53\x65\x59\xa9\x25\x25\xac\x16\x09\x00\x0a\x59\x1e\x71\xe9\x8c\x3c\x70\x4a\xe3\x82\x6b\x3a\xcf\xf0\x03\x05\x00\xf6\x74\xe5\x7e\xd8\x65\xc7\xea\x4c\x3f\x21\x1d\x0b\x07\x52\xfe\xcb\xd1\xaf\xc4\xae\x24\x0e\x9e\x9b\xbd\x1e\x1b\x27\x4a\x46\x38\x8c\xbb\xe7\x7c\xf8\x7d\xb9\xdc\x75\xc6\x52\xf7\xb1\xf4\x2e\xe8\xec\xdb\xfc\xb5\x0b\x8a\x15\xfc\x7e\xc7\xcb\xc6\xae\xff\x58\xa4\x37\x16\xaf\x00\x00\x00\xff\xff\x18\xd3\xb9\x9c\x9c\x01\x00\x00") + +func testFixturesDocYamlUserGuideWalkthroughPodtemplateJsonBytes() ([]byte, error) { + return bindataRead( + _testFixturesDocYamlUserGuideWalkthroughPodtemplateJson, + "test/fixtures/doc-yaml/user-guide/walkthrough/podtemplate.json", + ) +} + +func testFixturesDocYamlUserGuideWalkthroughPodtemplateJson() (*asset, error) { + bytes, err := testFixturesDocYamlUserGuideWalkthroughPodtemplateJsonBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/doc-yaml/user-guide/walkthrough/podtemplate.json", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesPkgKubectlOwners = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\xca\xb1\x0a\x02\x31\x0c\x00\xd0\x3d\x5f\x11\x70\xee\x75\x95\xdb\x5d\x15\xbc\xc1\x39\xd4\xd0\x06\xb5\x29\x49\x68\x7f\x5f\x70\x73\x7f\x27\x3c\x98\x31\x1a\xe3\xed\x71\xbd\xdc\x0f\x7c\x6a\x71\xa4\xc0\x16\x31\x7c\xcf\xb9\xea\xf6\x3a\xfb\x26\x9a\x75\x75\x36\x07\xa0\x31\x4c\x27\x9b\xef\x90\xd0\xa5\xa6\xf2\x96\xf4\x21\xe9\x41\xf2\x13\xc6\x53\x78\xfd\x03\xf8\x06\x00\x00\xff\xff\xf3\x7b\xef\xed\x69\x00\x00\x00") + +func testFixturesPkgKubectlOwnersBytes() ([]byte, error) { + return bindataRead( + _testFixturesPkgKubectlOwners, + "test/fixtures/pkg/kubectl/OWNERS", + ) +} + +func testFixturesPkgKubectlOwners() (*asset, error) { + bytes, err := testFixturesPkgKubectlOwnersBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/pkg/kubectl/OWNERS", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesPkgKubectlPluginsBarKubectlBar = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x52\x56\xd4\x4f\xca\xcc\xd3\x4f\x4a\x2c\xce\xe0\xe2\x4a\x4d\xce\xc8\x57\x50\xf2\x54\x48\xcc\x55\x28\xc8\x29\x4d\xcf\xcc\x53\x48\x4a\x2c\x52\x48\x4e\xcc\xc9\x49\x4d\x51\x28\xcf\x2c\xc9\x50\x48\x2c\x4a\x2f\x56\x50\x31\x50\x50\x71\x50\xe2\x02\x04\x00\x00\xff\xff\xb1\x1b\x02\xcf\x3b\x00\x00\x00") + +func testFixturesPkgKubectlPluginsBarKubectlBarBytes() ([]byte, error) { + return bindataRead( + _testFixturesPkgKubectlPluginsBarKubectlBar, + "test/fixtures/pkg/kubectl/plugins/bar/kubectl-bar", + ) +} + +func testFixturesPkgKubectlPluginsBarKubectlBar() (*asset, error) { + bytes, err := testFixturesPkgKubectlPluginsBarKubectlBarBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/pkg/kubectl/plugins/bar/kubectl-bar", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesPkgKubectlPluginsFooKubectlFoo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x52\x56\xd4\x4f\xca\xcc\xd3\x4f\x4a\x2c\xce\xe0\xe2\x4a\x4d\xce\xc8\x57\x50\xf2\x54\x48\xcc\x55\x28\xc8\x29\x4d\xcf\xcc\x53\x48\xcb\xcf\x57\xe2\x02\x04\x00\x00\xff\xff\xb5\x26\x01\x36\x24\x00\x00\x00") + +func testFixturesPkgKubectlPluginsFooKubectlFooBytes() ([]byte, error) { + return bindataRead( + _testFixturesPkgKubectlPluginsFooKubectlFoo, + "test/fixtures/pkg/kubectl/plugins/foo/kubectl-foo", + ) +} + +func testFixturesPkgKubectlPluginsFooKubectlFoo() (*asset, error) { + bytes, err := testFixturesPkgKubectlPluginsFooKubectlFooBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/pkg/kubectl/plugins/foo/kubectl-foo", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesPkgKubectlPluginsKubectlFoo = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x52\x56\xd4\x4f\xca\xcc\xd3\x4f\x4a\x2c\xce\xe0\xe2\x4a\x4d\xce\xc8\x57\x50\xf2\x54\x48\xcc\x55\x28\xc8\x29\x4d\xcf\xcc\x53\x48\xcb\xcf\x57\xe2\x02\x04\x00\x00\xff\xff\xb5\x26\x01\x36\x24\x00\x00\x00") + +func testFixturesPkgKubectlPluginsKubectlFooBytes() ([]byte, error) { + return bindataRead( + _testFixturesPkgKubectlPluginsKubectlFoo, + "test/fixtures/pkg/kubectl/plugins/kubectl-foo", + ) +} + +func testFixturesPkgKubectlPluginsKubectlFoo() (*asset, error) { + bytes, err := testFixturesPkgKubectlPluginsKubectlFooBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/pkg/kubectl/plugins/kubectl-foo", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +var _testFixturesPkgKubectlPluginsVersionKubectlVersion = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x34\xca\xc1\x09\x02\x41\x0c\x05\xd0\x7b\xaa\xf8\x32\x67\xd9\x66\x6c\x20\xcb\x84\x4d\x40\x92\xc5\x9f\x51\xcb\x17\x41\x8f\x0f\xde\xb8\x6c\x7b\xe4\xb6\x2b\x5d\x64\xe0\xe6\x41\x9c\xf7\x75\x44\x22\x08\x45\xd6\xb5\x4e\x68\xce\x2f\x17\x6d\xa2\x0b\x6d\x6c\x19\xd0\xff\x6c\xd7\x46\x3d\xed\x41\xd7\x59\x2f\x42\x13\xf6\x0e\x76\xe4\xf1\x3b\xf2\x09\x00\x00\xff\xff\xa4\x70\x55\x31\x69\x00\x00\x00") + +func testFixturesPkgKubectlPluginsVersionKubectlVersionBytes() ([]byte, error) { + return bindataRead( + _testFixturesPkgKubectlPluginsVersionKubectlVersion, + "test/fixtures/pkg/kubectl/plugins/version/kubectl-version", + ) +} + +func testFixturesPkgKubectlPluginsVersionKubectlVersion() (*asset, error) { + bytes, err := testFixturesPkgKubectlPluginsVersionKubectlVersionBytes() + if err != nil { + return nil, err + } + + info := bindataFileInfo{name: "test/fixtures/pkg/kubectl/plugins/version/kubectl-version", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)} + a := &asset{bytes: bytes, info: info} + return a, nil +} + +// Asset loads and returns the asset for the given name. +// It returns an error if the asset could not be found or +// could not be loaded. +func Asset(name string) ([]byte, error) { + cannonicalName := strings.Replace(name, "\\", "/", -1) + if f, ok := _bindata[cannonicalName]; ok { + a, err := f() + if err != nil { + return nil, fmt.Errorf("Asset %s can't read by error: %v", name, err) + } + return a.bytes, nil + } + return nil, fmt.Errorf("Asset %s not found", name) +} + +// MustAsset is like Asset but panics when Asset would return an error. +// It simplifies safe initialization of global variables. +func MustAsset(name string) []byte { + a, err := Asset(name) + if err != nil { + panic("asset: Asset(" + name + "): " + err.Error()) + } + + return a +} + +// AssetInfo loads and returns the asset info for the given name. +// It returns an error if the asset could not be found or +// could not be loaded. +func AssetInfo(name string) (os.FileInfo, error) { + cannonicalName := strings.Replace(name, "\\", "/", -1) + if f, ok := _bindata[cannonicalName]; ok { + a, err := f() + if err != nil { + return nil, fmt.Errorf("AssetInfo %s can't read by error: %v", name, err) + } + return a.info, nil + } + return nil, fmt.Errorf("AssetInfo %s not found", name) +} + +// AssetNames returns the names of the assets. +func AssetNames() []string { + names := make([]string, 0, len(_bindata)) + for name := range _bindata { + names = append(names, name) + } + return names +} + +// _bindata is a table, holding each asset generator, mapped to its name. +var _bindata = map[string]func() (*asset, error){ + "test/conformance/testdata/OWNERS": testConformanceTestdataOwners, + "test/conformance/testdata/conformance.yaml": testConformanceTestdataConformanceYaml, + "test/e2e/testing-manifests/flexvolume/attachable-with-long-mount": testE2eTestingManifestsFlexvolumeAttachableWithLongMount, + "test/e2e/testing-manifests/flexvolume/dummy": testE2eTestingManifestsFlexvolumeDummy, + "test/e2e/testing-manifests/flexvolume/dummy-attachable": testE2eTestingManifestsFlexvolumeDummyAttachable, + "test/e2e/testing-manifests/guestbook/agnhost-primary-deployment.yaml.in": testE2eTestingManifestsGuestbookAgnhostPrimaryDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/agnhost-primary-service.yaml": testE2eTestingManifestsGuestbookAgnhostPrimaryServiceYaml, + "test/e2e/testing-manifests/guestbook/agnhost-replica-deployment.yaml.in": testE2eTestingManifestsGuestbookAgnhostReplicaDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/agnhost-replica-service.yaml": testE2eTestingManifestsGuestbookAgnhostReplicaServiceYaml, + "test/e2e/testing-manifests/guestbook/frontend-deployment.yaml.in": testE2eTestingManifestsGuestbookFrontendDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/frontend-service.yaml": testE2eTestingManifestsGuestbookFrontendServiceYaml, + "test/e2e/testing-manifests/guestbook/legacy/frontend-controller.yaml": testE2eTestingManifestsGuestbookLegacyFrontendControllerYaml, + "test/e2e/testing-manifests/guestbook/legacy/redis-master-controller.yaml": testE2eTestingManifestsGuestbookLegacyRedisMasterControllerYaml, + "test/e2e/testing-manifests/guestbook/legacy/redis-slave-controller.yaml": testE2eTestingManifestsGuestbookLegacyRedisSlaveControllerYaml, + "test/e2e/testing-manifests/guestbook/redis-master-deployment.yaml.in": testE2eTestingManifestsGuestbookRedisMasterDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/redis-master-service.yaml": testE2eTestingManifestsGuestbookRedisMasterServiceYaml, + "test/e2e/testing-manifests/guestbook/redis-slave-deployment.yaml.in": testE2eTestingManifestsGuestbookRedisSlaveDeploymentYamlIn, + "test/e2e/testing-manifests/guestbook/redis-slave-service.yaml": testE2eTestingManifestsGuestbookRedisSlaveServiceYaml, + "test/e2e/testing-manifests/ingress/gce/static-ip-2/ing.yaml": testE2eTestingManifestsIngressGceStaticIp2IngYaml, + "test/e2e/testing-manifests/ingress/gce/static-ip-2/rc.yaml": testE2eTestingManifestsIngressGceStaticIp2RcYaml, + "test/e2e/testing-manifests/ingress/gce/static-ip-2/svc.yaml": testE2eTestingManifestsIngressGceStaticIp2SvcYaml, + "test/e2e/testing-manifests/ingress/http/ing.yaml": testE2eTestingManifestsIngressHttpIngYaml, + "test/e2e/testing-manifests/ingress/http/rc.yaml": testE2eTestingManifestsIngressHttpRcYaml, + "test/e2e/testing-manifests/ingress/http/svc.yaml": testE2eTestingManifestsIngressHttpSvcYaml, + "test/e2e/testing-manifests/ingress/http2/ing.yaml": testE2eTestingManifestsIngressHttp2IngYaml, + "test/e2e/testing-manifests/ingress/http2/rc.yaml": testE2eTestingManifestsIngressHttp2RcYaml, + "test/e2e/testing-manifests/ingress/http2/svc.yaml": testE2eTestingManifestsIngressHttp2SvcYaml, + "test/e2e/testing-manifests/ingress/multiple-certs/ing.yaml": testE2eTestingManifestsIngressMultipleCertsIngYaml, + "test/e2e/testing-manifests/ingress/multiple-certs/rc.yaml": testE2eTestingManifestsIngressMultipleCertsRcYaml, + "test/e2e/testing-manifests/ingress/multiple-certs/svc.yaml": testE2eTestingManifestsIngressMultipleCertsSvcYaml, + "test/e2e/testing-manifests/ingress/neg/ing.yaml": testE2eTestingManifestsIngressNegIngYaml, + "test/e2e/testing-manifests/ingress/neg/rc.yaml": testE2eTestingManifestsIngressNegRcYaml, + "test/e2e/testing-manifests/ingress/neg/svc.yaml": testE2eTestingManifestsIngressNegSvcYaml, + "test/e2e/testing-manifests/ingress/neg-clusterip/ing.yaml": testE2eTestingManifestsIngressNegClusteripIngYaml, + "test/e2e/testing-manifests/ingress/neg-clusterip/rc.yaml": testE2eTestingManifestsIngressNegClusteripRcYaml, + "test/e2e/testing-manifests/ingress/neg-clusterip/svc.yaml": testE2eTestingManifestsIngressNegClusteripSvcYaml, + "test/e2e/testing-manifests/ingress/neg-exposed/ing.yaml": testE2eTestingManifestsIngressNegExposedIngYaml, + "test/e2e/testing-manifests/ingress/neg-exposed/rc.yaml": testE2eTestingManifestsIngressNegExposedRcYaml, + "test/e2e/testing-manifests/ingress/neg-exposed/svc.yaml": testE2eTestingManifestsIngressNegExposedSvcYaml, + "test/e2e/testing-manifests/ingress/nginx/rc.yaml": testE2eTestingManifestsIngressNginxRcYaml, + "test/e2e/testing-manifests/ingress/pre-shared-cert/ing.yaml": testE2eTestingManifestsIngressPreSharedCertIngYaml, + "test/e2e/testing-manifests/ingress/pre-shared-cert/rc.yaml": testE2eTestingManifestsIngressPreSharedCertRcYaml, + "test/e2e/testing-manifests/ingress/pre-shared-cert/svc.yaml": testE2eTestingManifestsIngressPreSharedCertSvcYaml, + "test/e2e/testing-manifests/ingress/static-ip/ing.yaml": testE2eTestingManifestsIngressStaticIpIngYaml, + "test/e2e/testing-manifests/ingress/static-ip/rc.yaml": testE2eTestingManifestsIngressStaticIpRcYaml, + "test/e2e/testing-manifests/ingress/static-ip/secret.yaml": testE2eTestingManifestsIngressStaticIpSecretYaml, + "test/e2e/testing-manifests/ingress/static-ip/svc.yaml": testE2eTestingManifestsIngressStaticIpSvcYaml, + "test/e2e/testing-manifests/kubectl/agnhost-primary-controller.json.in": testE2eTestingManifestsKubectlAgnhostPrimaryControllerJsonIn, + "test/e2e/testing-manifests/kubectl/agnhost-primary-pod.yaml": testE2eTestingManifestsKubectlAgnhostPrimaryPodYaml, + "test/e2e/testing-manifests/kubectl/agnhost-primary-service.json": testE2eTestingManifestsKubectlAgnhostPrimaryServiceJson, + "test/e2e/testing-manifests/kubectl/busybox-cronjob.yaml.in": testE2eTestingManifestsKubectlBusyboxCronjobYamlIn, + "test/e2e/testing-manifests/kubectl/busybox-pod.yaml.in": testE2eTestingManifestsKubectlBusyboxPodYamlIn, + "test/e2e/testing-manifests/kubectl/httpd-deployment1.yaml.in": testE2eTestingManifestsKubectlHttpdDeployment1YamlIn, + "test/e2e/testing-manifests/kubectl/httpd-deployment2.yaml.in": testE2eTestingManifestsKubectlHttpdDeployment2YamlIn, + "test/e2e/testing-manifests/kubectl/httpd-deployment3.yaml.in": testE2eTestingManifestsKubectlHttpdDeployment3YamlIn, + "test/e2e/testing-manifests/kubectl/httpd-rc.yaml.in": testE2eTestingManifestsKubectlHttpdRcYamlIn, + "test/e2e/testing-manifests/kubectl/pause-pod.yaml.in": testE2eTestingManifestsKubectlPausePodYamlIn, + "test/e2e/testing-manifests/kubectl/pod-with-readiness-probe.yaml.in": testE2eTestingManifestsKubectlPodWithReadinessProbeYamlIn, + "test/e2e/testing-manifests/pod": testE2eTestingManifestsPod, + "test/e2e/testing-manifests/rbd-storage-class.yaml": testE2eTestingManifestsRbdStorageClassYaml, + "test/e2e/testing-manifests/sample-device-plugin.yaml": testE2eTestingManifestsSampleDevicePluginYaml, + "test/e2e/testing-manifests/scheduling/nvidia-driver-installer.yaml": testE2eTestingManifestsSchedulingNvidiaDriverInstallerYaml, + "test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml": testE2eTestingManifestsServiceloadbalancerHaproxyrcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml": testE2eTestingManifestsServiceloadbalancerNetexecrcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/netexecsvc.yaml": testE2eTestingManifestsServiceloadbalancerNetexecsvcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/nginxrc.yaml": testE2eTestingManifestsServiceloadbalancerNginxrcYaml, + "test/e2e/testing-manifests/serviceloadbalancer/nginxsvc.yaml": testE2eTestingManifestsServiceloadbalancerNginxsvcYaml, + "test/e2e/testing-manifests/statefulset/cassandra/controller.yaml": testE2eTestingManifestsStatefulsetCassandraControllerYaml, + "test/e2e/testing-manifests/statefulset/cassandra/pdb.yaml": testE2eTestingManifestsStatefulsetCassandraPdbYaml, + "test/e2e/testing-manifests/statefulset/cassandra/service.yaml": testE2eTestingManifestsStatefulsetCassandraServiceYaml, + "test/e2e/testing-manifests/statefulset/cassandra/statefulset.yaml": testE2eTestingManifestsStatefulsetCassandraStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/cassandra/tester.yaml": testE2eTestingManifestsStatefulsetCassandraTesterYaml, + "test/e2e/testing-manifests/statefulset/cockroachdb/service.yaml": testE2eTestingManifestsStatefulsetCockroachdbServiceYaml, + "test/e2e/testing-manifests/statefulset/cockroachdb/statefulset.yaml": testE2eTestingManifestsStatefulsetCockroachdbStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/etcd/pdb.yaml": testE2eTestingManifestsStatefulsetEtcdPdbYaml, + "test/e2e/testing-manifests/statefulset/etcd/service.yaml": testE2eTestingManifestsStatefulsetEtcdServiceYaml, + "test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml": testE2eTestingManifestsStatefulsetEtcdStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/etcd/tester.yaml": testE2eTestingManifestsStatefulsetEtcdTesterYaml, + "test/e2e/testing-manifests/statefulset/mysql-galera/service.yaml": testE2eTestingManifestsStatefulsetMysqlGaleraServiceYaml, + "test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml": testE2eTestingManifestsStatefulsetMysqlGaleraStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/mysql-upgrade/configmap.yaml": testE2eTestingManifestsStatefulsetMysqlUpgradeConfigmapYaml, + "test/e2e/testing-manifests/statefulset/mysql-upgrade/service.yaml": testE2eTestingManifestsStatefulsetMysqlUpgradeServiceYaml, + "test/e2e/testing-manifests/statefulset/mysql-upgrade/statefulset.yaml": testE2eTestingManifestsStatefulsetMysqlUpgradeStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml": testE2eTestingManifestsStatefulsetMysqlUpgradeTesterYaml, + "test/e2e/testing-manifests/statefulset/nginx/service.yaml": testE2eTestingManifestsStatefulsetNginxServiceYaml, + "test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml": testE2eTestingManifestsStatefulsetNginxStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/redis/service.yaml": testE2eTestingManifestsStatefulsetRedisServiceYaml, + "test/e2e/testing-manifests/statefulset/redis/statefulset.yaml": testE2eTestingManifestsStatefulsetRedisStatefulsetYaml, + "test/e2e/testing-manifests/statefulset/zookeeper/service.yaml": testE2eTestingManifestsStatefulsetZookeeperServiceYaml, + "test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml": testE2eTestingManifestsStatefulsetZookeeperStatefulsetYaml, + "test/e2e/testing-manifests/storage-csi/OWNERS": testE2eTestingManifestsStorageCsiOwners, + "test/e2e/testing-manifests/storage-csi/controller-role.yaml": testE2eTestingManifestsStorageCsiControllerRoleYaml, + "test/e2e/testing-manifests/storage-csi/external-attacher/rbac.yaml": testE2eTestingManifestsStorageCsiExternalAttacherRbacYaml, + "test/e2e/testing-manifests/storage-csi/external-provisioner/rbac.yaml": testE2eTestingManifestsStorageCsiExternalProvisionerRbacYaml, + "test/e2e/testing-manifests/storage-csi/external-resizer/rbac.yaml": testE2eTestingManifestsStorageCsiExternalResizerRbacYaml, + "test/e2e/testing-manifests/storage-csi/external-snapshotter/rbac.yaml": testE2eTestingManifestsStorageCsiExternalSnapshotterRbacYaml, + "test/e2e/testing-manifests/storage-csi/gce-pd/controller_ss.yaml": testE2eTestingManifestsStorageCsiGcePdController_ssYaml, + "test/e2e/testing-manifests/storage-csi/gce-pd/csi-controller-rbac.yaml": testE2eTestingManifestsStorageCsiGcePdCsiControllerRbacYaml, + "test/e2e/testing-manifests/storage-csi/gce-pd/node_ds.yaml": testE2eTestingManifestsStorageCsiGcePdNode_dsYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-attacher.yaml": testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathAttacherYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-driverinfo.yaml": testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathDriverinfoYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-plugin.yaml": testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathPluginYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-provisioner.yaml": testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathProvisionerYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-resizer.yaml": testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathResizerYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/csi-hostpath-snapshotter.yaml": testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathSnapshotterYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/hostpath/e2e-test-rbac.yaml": testE2eTestingManifestsStorageCsiHostpathHostpathE2eTestRbacYaml, + "test/e2e/testing-manifests/storage-csi/hostpath/usage/csi-storageclass.yaml": testE2eTestingManifestsStorageCsiHostpathUsageCsiStorageclassYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-attacher.yaml": testE2eTestingManifestsStorageCsiMockCsiMockDriverAttacherYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-resizer.yaml": testE2eTestingManifestsStorageCsiMockCsiMockDriverResizerYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver-snapshotter.yaml": testE2eTestingManifestsStorageCsiMockCsiMockDriverSnapshotterYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driver.yaml": testE2eTestingManifestsStorageCsiMockCsiMockDriverYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-driverinfo.yaml": testE2eTestingManifestsStorageCsiMockCsiMockDriverinfoYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-mock-rbac.yaml": testE2eTestingManifestsStorageCsiMockCsiMockRbacYaml, + "test/e2e/testing-manifests/storage-csi/mock/csi-storageclass.yaml": testE2eTestingManifestsStorageCsiMockCsiStorageclassYaml, + "test/e2e_node/testing-manifests/sriovdp-cm.yaml": testE2e_nodeTestingManifestsSriovdpCmYaml, + "test/e2e_node/testing-manifests/sriovdp-ds.yaml": testE2e_nodeTestingManifestsSriovdpDsYaml, + "test/e2e_node/testing-manifests/sriovdp-sa.yaml": testE2e_nodeTestingManifestsSriovdpSaYaml, + "test/images/Makefile": testImagesMakefile, + "test/images/OWNERS": testImagesOwners, + "test/images/agnhost/.gitignore": testImagesAgnhostGitignore, + "test/images/agnhost/BASEIMAGE": testImagesAgnhostBaseimage, + "test/images/agnhost/Dockerfile": testImagesAgnhostDockerfile, + "test/images/agnhost/Dockerfile_windows": testImagesAgnhostDockerfile_windows, + "test/images/agnhost/Makefile": testImagesAgnhostMakefile, + "test/images/agnhost/OWNERS": testImagesAgnhostOwners, + "test/images/agnhost/VERSION": testImagesAgnhostVersion, + "test/images/agnhost/agnhost.go": testImagesAgnhostAgnhostGo, + "test/images/agnhost/audit-proxy/main.go": testImagesAgnhostAuditProxyMainGo, + "test/images/agnhost/connect/connect.go": testImagesAgnhostConnectConnectGo, + "test/images/agnhost/crd-conversion-webhook/config.go": testImagesAgnhostCrdConversionWebhookConfigGo, + "test/images/agnhost/crd-conversion-webhook/converter/converter_test.go": testImagesAgnhostCrdConversionWebhookConverterConverter_testGo, + "test/images/agnhost/crd-conversion-webhook/converter/example_converter.go": testImagesAgnhostCrdConversionWebhookConverterExample_converterGo, + "test/images/agnhost/crd-conversion-webhook/converter/framework.go": testImagesAgnhostCrdConversionWebhookConverterFrameworkGo, + "test/images/agnhost/crd-conversion-webhook/main.go": testImagesAgnhostCrdConversionWebhookMainGo, + "test/images/agnhost/dns/common.go": testImagesAgnhostDnsCommonGo, + "test/images/agnhost/dns/dns.go": testImagesAgnhostDnsDnsGo, + "test/images/agnhost/dns/dns_windows.go": testImagesAgnhostDnsDns_windowsGo, + "test/images/agnhost/entrypoint-tester/ep.go": testImagesAgnhostEntrypointTesterEpGo, + "test/images/agnhost/fakegitserver/gitserver.go": testImagesAgnhostFakegitserverGitserverGo, + "test/images/agnhost/guestbook/guestbook.go": testImagesAgnhostGuestbookGuestbookGo, + "test/images/agnhost/inclusterclient/main.go": testImagesAgnhostInclusterclientMainGo, + "test/images/agnhost/liveness/server.go": testImagesAgnhostLivenessServerGo, + "test/images/agnhost/logs-generator/logs_generator.go": testImagesAgnhostLogsGeneratorLogs_generatorGo, + "test/images/agnhost/mounttest/filePermissions.ps1": testImagesAgnhostMounttestFilepermissionsPs1, + "test/images/agnhost/mounttest/mt.go": testImagesAgnhostMounttestMtGo, + "test/images/agnhost/mounttest/mt_utils.go": testImagesAgnhostMounttestMt_utilsGo, + "test/images/agnhost/mounttest/mt_utils_windows.go": testImagesAgnhostMounttestMt_utils_windowsGo, + "test/images/agnhost/net/common/common.go": testImagesAgnhostNetCommonCommonGo, + "test/images/agnhost/net/main.go": testImagesAgnhostNetMainGo, + "test/images/agnhost/net/nat/closewait.go": testImagesAgnhostNetNatClosewaitGo, + "test/images/agnhost/netexec/netexec.go": testImagesAgnhostNetexecNetexecGo, + "test/images/agnhost/nettest/nettest.go": testImagesAgnhostNettestNettestGo, + "test/images/agnhost/no-snat-test/main.go": testImagesAgnhostNoSnatTestMainGo, + "test/images/agnhost/no-snat-test-proxy/main.go": testImagesAgnhostNoSnatTestProxyMainGo, + "test/images/agnhost/openidmetadata/openidmetadata.go": testImagesAgnhostOpenidmetadataOpenidmetadataGo, + "test/images/agnhost/pause/pause.go": testImagesAgnhostPausePauseGo, + "test/images/agnhost/port-forward-tester/portforwardtester.go": testImagesAgnhostPortForwardTesterPortforwardtesterGo, + "test/images/agnhost/porter/localhost.crt": testImagesAgnhostPorterLocalhostCrt, + "test/images/agnhost/porter/localhost.key": testImagesAgnhostPorterLocalhostKey, + "test/images/agnhost/porter/porter.go": testImagesAgnhostPorterPorterGo, + "test/images/agnhost/resource-consumer-controller/controller.go": testImagesAgnhostResourceConsumerControllerControllerGo, + "test/images/agnhost/serve-hostname/serve_hostname.go": testImagesAgnhostServeHostnameServe_hostnameGo, + "test/images/agnhost/test-webserver/test-webserver.go": testImagesAgnhostTestWebserverTestWebserverGo, + "test/images/agnhost/webhook/addlabel.go": testImagesAgnhostWebhookAddlabelGo, + "test/images/agnhost/webhook/addlabel_test.go": testImagesAgnhostWebhookAddlabel_testGo, + "test/images/agnhost/webhook/alwaysallow.go": testImagesAgnhostWebhookAlwaysallowGo, + "test/images/agnhost/webhook/alwaysdeny.go": testImagesAgnhostWebhookAlwaysdenyGo, + "test/images/agnhost/webhook/config.go": testImagesAgnhostWebhookConfigGo, + "test/images/agnhost/webhook/configmap.go": testImagesAgnhostWebhookConfigmapGo, + "test/images/agnhost/webhook/convert.go": testImagesAgnhostWebhookConvertGo, + "test/images/agnhost/webhook/convert_test.go": testImagesAgnhostWebhookConvert_testGo, + "test/images/agnhost/webhook/crd.go": testImagesAgnhostWebhookCrdGo, + "test/images/agnhost/webhook/customresource.go": testImagesAgnhostWebhookCustomresourceGo, + "test/images/agnhost/webhook/main.go": testImagesAgnhostWebhookMainGo, + "test/images/agnhost/webhook/patch_test.go": testImagesAgnhostWebhookPatch_testGo, + "test/images/agnhost/webhook/pods.go": testImagesAgnhostWebhookPodsGo, + "test/images/agnhost/webhook/scheme.go": testImagesAgnhostWebhookSchemeGo, + "test/images/apparmor-loader/BASEIMAGE": testImagesApparmorLoaderBaseimage, + "test/images/apparmor-loader/Dockerfile": testImagesApparmorLoaderDockerfile, + "test/images/apparmor-loader/Makefile": testImagesApparmorLoaderMakefile, + "test/images/apparmor-loader/OWNERS": testImagesApparmorLoaderOwners, + "test/images/apparmor-loader/VERSION": testImagesApparmorLoaderVersion, + "test/images/apparmor-loader/example-configmap.yaml": testImagesApparmorLoaderExampleConfigmapYaml, + "test/images/apparmor-loader/example-daemon.yaml": testImagesApparmorLoaderExampleDaemonYaml, + "test/images/apparmor-loader/example-namespace.yaml": testImagesApparmorLoaderExampleNamespaceYaml, + "test/images/apparmor-loader/example-pod.yaml": testImagesApparmorLoaderExamplePodYaml, + "test/images/apparmor-loader/loader.go": testImagesApparmorLoaderLoaderGo, + "test/images/busybox/BASEIMAGE": testImagesBusyboxBaseimage, + "test/images/busybox/Dockerfile_windows": testImagesBusyboxDockerfile_windows, + "test/images/busybox/Makefile": testImagesBusyboxMakefile, + "test/images/busybox/OWNERS": testImagesBusyboxOwners, + "test/images/busybox/VERSION": testImagesBusyboxVersion, + "test/images/busybox/hostname.go": testImagesBusyboxHostnameGo, + "test/images/cloudbuild.yaml": testImagesCloudbuildYaml, + "test/images/cuda-vector-add/BASEIMAGE": testImagesCudaVectorAddBaseimage, + "test/images/cuda-vector-add/Dockerfile": testImagesCudaVectorAddDockerfile, + "test/images/cuda-vector-add/OWNERS": testImagesCudaVectorAddOwners, + "test/images/cuda-vector-add/VERSION": testImagesCudaVectorAddVersion, + "test/images/echoserver/BASEIMAGE": testImagesEchoserverBaseimage, + "test/images/echoserver/Dockerfile": testImagesEchoserverDockerfile, + "test/images/echoserver/Dockerfile_windows": testImagesEchoserverDockerfile_windows, + "test/images/echoserver/OWNERS": testImagesEchoserverOwners, + "test/images/echoserver/VERSION": testImagesEchoserverVersion, + "test/images/echoserver/install-deps.sh": testImagesEchoserverInstallDepsSh, + "test/images/echoserver/nginx.conf": testImagesEchoserverNginxConf, + "test/images/echoserver/run.sh": testImagesEchoserverRunSh, + "test/images/echoserver/template.lua": testImagesEchoserverTemplateLua, + "test/images/image-util.sh": testImagesImageUtilSh, + "test/images/ipc-utils/BASEIMAGE": testImagesIpcUtilsBaseimage, + "test/images/ipc-utils/Dockerfile": testImagesIpcUtilsDockerfile, + "test/images/ipc-utils/VERSION": testImagesIpcUtilsVersion, + "test/images/jessie-dnsutils/BASEIMAGE": testImagesJessieDnsutilsBaseimage, + "test/images/jessie-dnsutils/Dockerfile": testImagesJessieDnsutilsDockerfile, + "test/images/jessie-dnsutils/Dockerfile_windows": testImagesJessieDnsutilsDockerfile_windows, + "test/images/jessie-dnsutils/OWNERS": testImagesJessieDnsutilsOwners, + "test/images/jessie-dnsutils/VERSION": testImagesJessieDnsutilsVersion, + "test/images/jessie-dnsutils/fixup-apt-list.sh": testImagesJessieDnsutilsFixupAptListSh, + "test/images/kitten/BASEIMAGE": testImagesKittenBaseimage, + "test/images/kitten/Dockerfile": testImagesKittenDockerfile, + "test/images/kitten/OWNERS": testImagesKittenOwners, + "test/images/kitten/VERSION": testImagesKittenVersion, + "test/images/kitten/html/data.json": testImagesKittenHtmlDataJson, + "test/images/metadata-concealment/Dockerfile": testImagesMetadataConcealmentDockerfile, + "test/images/metadata-concealment/Makefile": testImagesMetadataConcealmentMakefile, + "test/images/metadata-concealment/OWNERS": testImagesMetadataConcealmentOwners, + "test/images/metadata-concealment/VERSION": testImagesMetadataConcealmentVersion, + "test/images/metadata-concealment/check_metadata_concealment.go": testImagesMetadataConcealmentCheck_metadata_concealmentGo, + "test/images/nautilus/BASEIMAGE": testImagesNautilusBaseimage, + "test/images/nautilus/Dockerfile": testImagesNautilusDockerfile, + "test/images/nautilus/OWNERS": testImagesNautilusOwners, + "test/images/nautilus/VERSION": testImagesNautilusVersion, + "test/images/nautilus/html/data.json": testImagesNautilusHtmlDataJson, + "test/images/node-perf/npb-ep/BASEIMAGE": testImagesNodePerfNpbEpBaseimage, + "test/images/node-perf/npb-ep/Dockerfile": testImagesNodePerfNpbEpDockerfile, + "test/images/node-perf/npb-ep/VERSION": testImagesNodePerfNpbEpVersion, + "test/images/node-perf/npb-is/BASEIMAGE": testImagesNodePerfNpbIsBaseimage, + "test/images/node-perf/npb-is/Dockerfile": testImagesNodePerfNpbIsDockerfile, + "test/images/node-perf/npb-is/VERSION": testImagesNodePerfNpbIsVersion, + "test/images/node-perf/tf-wide-deep/BASEIMAGE": testImagesNodePerfTfWideDeepBaseimage, + "test/images/node-perf/tf-wide-deep/Dockerfile": testImagesNodePerfTfWideDeepDockerfile, + "test/images/node-perf/tf-wide-deep/VERSION": testImagesNodePerfTfWideDeepVersion, + "test/images/nonewprivs/.gitignore": testImagesNonewprivsGitignore, + "test/images/nonewprivs/BASEIMAGE": testImagesNonewprivsBaseimage, + "test/images/nonewprivs/Dockerfile": testImagesNonewprivsDockerfile, + "test/images/nonewprivs/Makefile": testImagesNonewprivsMakefile, + "test/images/nonewprivs/OWNERS": testImagesNonewprivsOwners, + "test/images/nonewprivs/VERSION": testImagesNonewprivsVersion, + "test/images/nonewprivs/nnp.go": testImagesNonewprivsNnpGo, + "test/images/nonroot/BASEIMAGE": testImagesNonrootBaseimage, + "test/images/nonroot/Dockerfile": testImagesNonrootDockerfile, + "test/images/nonroot/Dockerfile_windows": testImagesNonrootDockerfile_windows, + "test/images/nonroot/OWNERS": testImagesNonrootOwners, + "test/images/nonroot/VERSION": testImagesNonrootVersion, + "test/images/pets/peer-finder/BASEIMAGE": testImagesPetsPeerFinderBaseimage, + "test/images/pets/peer-finder/Dockerfile": testImagesPetsPeerFinderDockerfile, + "test/images/pets/peer-finder/Makefile": testImagesPetsPeerFinderMakefile, + "test/images/pets/peer-finder/VERSION": testImagesPetsPeerFinderVersion, + "test/images/pets/peer-finder/peer-finder.go": testImagesPetsPeerFinderPeerFinderGo, + "test/images/pets/redis-installer/BASEIMAGE": testImagesPetsRedisInstallerBaseimage, + "test/images/pets/redis-installer/Dockerfile": testImagesPetsRedisInstallerDockerfile, + "test/images/pets/redis-installer/Makefile": testImagesPetsRedisInstallerMakefile, + "test/images/pets/redis-installer/VERSION": testImagesPetsRedisInstallerVersion, + "test/images/pets/redis-installer/install.sh": testImagesPetsRedisInstallerInstallSh, + "test/images/pets/redis-installer/on-start.sh": testImagesPetsRedisInstallerOnStartSh, + "test/images/pets/zookeeper-installer/BASEIMAGE": testImagesPetsZookeeperInstallerBaseimage, + "test/images/pets/zookeeper-installer/Dockerfile": testImagesPetsZookeeperInstallerDockerfile, + "test/images/pets/zookeeper-installer/Makefile": testImagesPetsZookeeperInstallerMakefile, + "test/images/pets/zookeeper-installer/VERSION": testImagesPetsZookeeperInstallerVersion, + "test/images/pets/zookeeper-installer/install.sh": testImagesPetsZookeeperInstallerInstallSh, + "test/images/pets/zookeeper-installer/on-start.sh": testImagesPetsZookeeperInstallerOnStartSh, + "test/images/redis/BASEIMAGE": testImagesRedisBaseimage, + "test/images/redis/Dockerfile": testImagesRedisDockerfile, + "test/images/redis/Dockerfile_windows": testImagesRedisDockerfile_windows, + "test/images/redis/OWNERS": testImagesRedisOwners, + "test/images/redis/VERSION": testImagesRedisVersion, + "test/images/redis/redis.conf": testImagesRedisRedisConf, + "test/images/regression-issue-74839/.gitignore": testImagesRegressionIssue74839Gitignore, + "test/images/regression-issue-74839/Dockerfile": testImagesRegressionIssue74839Dockerfile, + "test/images/regression-issue-74839/Makefile": testImagesRegressionIssue74839Makefile, + "test/images/regression-issue-74839/OWNERS": testImagesRegressionIssue74839Owners, + "test/images/regression-issue-74839/VERSION": testImagesRegressionIssue74839Version, + "test/images/regression-issue-74839/main.go": testImagesRegressionIssue74839MainGo, + "test/images/regression-issue-74839/tcp.go": testImagesRegressionIssue74839TcpGo, + "test/images/regression-issue-74839/tcp_test.go": testImagesRegressionIssue74839Tcp_testGo, + "test/images/resource-consumer/.gitignore": testImagesResourceConsumerGitignore, + "test/images/resource-consumer/BASEIMAGE": testImagesResourceConsumerBaseimage, + "test/images/resource-consumer/Dockerfile": testImagesResourceConsumerDockerfile, + "test/images/resource-consumer/Makefile": testImagesResourceConsumerMakefile, + "test/images/resource-consumer/VERSION": testImagesResourceConsumerVersion, + "test/images/resource-consumer/common/common.go": testImagesResourceConsumerCommonCommonGo, + "test/images/resource-consumer/consume-cpu/consume_cpu.go": testImagesResourceConsumerConsumeCpuConsume_cpuGo, + "test/images/resource-consumer/resource_consumer.go": testImagesResourceConsumerResource_consumerGo, + "test/images/resource-consumer/resource_consumer_handler.go": testImagesResourceConsumerResource_consumer_handlerGo, + "test/images/resource-consumer/utils.go": testImagesResourceConsumerUtilsGo, + "test/images/sample-apiserver/BASEIMAGE": testImagesSampleApiserverBaseimage, + "test/images/sample-apiserver/Dockerfile": testImagesSampleApiserverDockerfile, + "test/images/sample-apiserver/Dockerfile_windows": testImagesSampleApiserverDockerfile_windows, + "test/images/sample-apiserver/Makefile": testImagesSampleApiserverMakefile, + "test/images/sample-apiserver/OWNERS": testImagesSampleApiserverOwners, + "test/images/sample-apiserver/VERSION": testImagesSampleApiserverVersion, + "test/images/sample-device-plugin/BASEIMAGE": testImagesSampleDevicePluginBaseimage, + "test/images/sample-device-plugin/Dockerfile": testImagesSampleDevicePluginDockerfile, + "test/images/sample-device-plugin/Makefile": testImagesSampleDevicePluginMakefile, + "test/images/sample-device-plugin/VERSION": testImagesSampleDevicePluginVersion, + "test/images/sample-device-plugin/sampledeviceplugin.go": testImagesSampleDevicePluginSampledevicepluginGo, + "test/images/volume/OWNERS": testImagesVolumeOwners, + "test/images/volume/gluster/BASEIMAGE": testImagesVolumeGlusterBaseimage, + "test/images/volume/gluster/Dockerfile": testImagesVolumeGlusterDockerfile, + "test/images/volume/gluster/VERSION": testImagesVolumeGlusterVersion, + "test/images/volume/gluster/glusterd.vol": testImagesVolumeGlusterGlusterdVol, + "test/images/volume/gluster/index.html": testImagesVolumeGlusterIndexHtml, + "test/images/volume/gluster/run_gluster.sh": testImagesVolumeGlusterRun_glusterSh, + "test/images/volume/iscsi/BASEIMAGE": testImagesVolumeIscsiBaseimage, + "test/images/volume/iscsi/Dockerfile": testImagesVolumeIscsiDockerfile, + "test/images/volume/iscsi/VERSION": testImagesVolumeIscsiVersion, + "test/images/volume/iscsi/block.tar.gz": testImagesVolumeIscsiBlockTarGz, + "test/images/volume/iscsi/create_block.sh": testImagesVolumeIscsiCreate_blockSh, + "test/images/volume/iscsi/run_iscsi_target.sh": testImagesVolumeIscsiRun_iscsi_targetSh, + "test/images/volume/nfs/BASEIMAGE": testImagesVolumeNfsBaseimage, + "test/images/volume/nfs/Dockerfile": testImagesVolumeNfsDockerfile, + "test/images/volume/nfs/VERSION": testImagesVolumeNfsVersion, + "test/images/volume/nfs/index.html": testImagesVolumeNfsIndexHtml, + "test/images/volume/nfs/run_nfs.sh": testImagesVolumeNfsRun_nfsSh, + "test/images/volume/rbd/BASEIMAGE": testImagesVolumeRbdBaseimage, + "test/images/volume/rbd/Dockerfile": testImagesVolumeRbdDockerfile, + "test/images/volume/rbd/VERSION": testImagesVolumeRbdVersion, + "test/images/volume/rbd/block.tar.gz": testImagesVolumeRbdBlockTarGz, + "test/images/volume/rbd/bootstrap.sh": testImagesVolumeRbdBootstrapSh, + "test/images/volume/rbd/ceph.conf.sh": testImagesVolumeRbdCephConfSh, + "test/images/volume/rbd/create_block.sh": testImagesVolumeRbdCreate_blockSh, + "test/images/volume/rbd/keyring": testImagesVolumeRbdKeyring, + "test/images/volume/rbd/mon.sh": testImagesVolumeRbdMonSh, + "test/images/volume/rbd/osd.sh": testImagesVolumeRbdOsdSh, + "test/images/windows/Makefile": testImagesWindowsMakefile, + "test/images/windows/busybox-helper/Dockerfile": testImagesWindowsBusyboxHelperDockerfile, + "test/images/windows/busybox-helper/VERSION": testImagesWindowsBusyboxHelperVersion, + "test/images/windows/powershell-helper/Dockerfile": testImagesWindowsPowershellHelperDockerfile, + "test/images/windows/powershell-helper/VERSION": testImagesWindowsPowershellHelperVersion, + "test/images/windows-servercore-cache/BASEIMAGE": testImagesWindowsServercoreCacheBaseimage, + "test/images/windows-servercore-cache/Dockerfile": testImagesWindowsServercoreCacheDockerfile, + "test/images/windows-servercore-cache/VERSION": testImagesWindowsServercoreCacheVersion, + "test/fixtures/doc-yaml/admin/daemon.yaml": testFixturesDocYamlAdminDaemonYaml, + "test/fixtures/doc-yaml/admin/high-availability/etcd.yaml": testFixturesDocYamlAdminHighAvailabilityEtcdYaml, + "test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml": testFixturesDocYamlAdminHighAvailabilityKubeApiserverYaml, + "test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml": testFixturesDocYamlAdminHighAvailabilityKubeControllerManagerYaml, + "test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml": testFixturesDocYamlAdminHighAvailabilityKubeSchedulerYaml, + "test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml": testFixturesDocYamlAdminLimitrangeInvalidPodYaml, + "test/fixtures/doc-yaml/admin/limitrange/limits.yaml": testFixturesDocYamlAdminLimitrangeLimitsYaml, + "test/fixtures/doc-yaml/admin/limitrange/namespace.yaml": testFixturesDocYamlAdminLimitrangeNamespaceYaml, + "test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml": testFixturesDocYamlAdminLimitrangeValidPodYaml, + "test/fixtures/doc-yaml/admin/namespaces/namespace-dev.json": testFixturesDocYamlAdminNamespacesNamespaceDevJson, + "test/fixtures/doc-yaml/admin/namespaces/namespace-prod.json": testFixturesDocYamlAdminNamespacesNamespaceProdJson, + "test/fixtures/doc-yaml/admin/resourcequota/limits.yaml": testFixturesDocYamlAdminResourcequotaLimitsYaml, + "test/fixtures/doc-yaml/admin/resourcequota/namespace.yaml": testFixturesDocYamlAdminResourcequotaNamespaceYaml, + "test/fixtures/doc-yaml/admin/resourcequota/quota.yaml": testFixturesDocYamlAdminResourcequotaQuotaYaml, + "test/fixtures/doc-yaml/user-guide/configmap/configmap.yaml": testFixturesDocYamlUserGuideConfigmapConfigmapYaml, + "test/fixtures/doc-yaml/user-guide/deployment.yaml": testFixturesDocYamlUserGuideDeploymentYaml, + "test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml.in": testFixturesDocYamlUserGuideDownwardApiDapiPodYamlIn, + "test/fixtures/doc-yaml/user-guide/job.yaml": testFixturesDocYamlUserGuideJobYaml, + "test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml.in": testFixturesDocYamlUserGuideLivenessExecLivenessYamlIn, + "test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml.in": testFixturesDocYamlUserGuideLivenessHttpLivenessYamlIn, + "test/fixtures/doc-yaml/user-guide/multi-pod.yaml": testFixturesDocYamlUserGuideMultiPodYaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-01.yaml": testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim01Yaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-02.yaml": testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim02Yaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-03.json": testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim03Json, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/gce.yaml": testFixturesDocYamlUserGuidePersistentVolumesVolumesGceYaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-01.yaml": testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal01Yaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-02.yaml": testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal02Yaml, + "test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/nfs.yaml": testFixturesDocYamlUserGuidePersistentVolumesVolumesNfsYaml, + "test/fixtures/doc-yaml/user-guide/pod.yaml": testFixturesDocYamlUserGuidePodYaml, + "test/fixtures/doc-yaml/user-guide/replicaset/redis-slave.yaml": testFixturesDocYamlUserGuideReplicasetRedisSlaveYaml, + "test/fixtures/doc-yaml/user-guide/replication.yaml": testFixturesDocYamlUserGuideReplicationYaml, + "test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml": testFixturesDocYamlUserGuideSecretsSecretEnvPodYaml, + "test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml.in": testFixturesDocYamlUserGuideSecretsSecretPodYamlIn, + "test/fixtures/doc-yaml/user-guide/secrets/secret.yaml": testFixturesDocYamlUserGuideSecretsSecretYaml, + "test/fixtures/doc-yaml/user-guide/update-demo/images/kitten/html/data.json": testFixturesDocYamlUserGuideUpdateDemoImagesKittenHtmlDataJson, + "test/fixtures/doc-yaml/user-guide/update-demo/images/nautilus/html/data.json": testFixturesDocYamlUserGuideUpdateDemoImagesNautilusHtmlDataJson, + "test/fixtures/doc-yaml/user-guide/update-demo/kitten-rc.yaml.in": testFixturesDocYamlUserGuideUpdateDemoKittenRcYamlIn, + "test/fixtures/doc-yaml/user-guide/update-demo/nautilus-rc.yaml.in": testFixturesDocYamlUserGuideUpdateDemoNautilusRcYamlIn, + "test/fixtures/doc-yaml/user-guide/walkthrough/podtemplate.json": testFixturesDocYamlUserGuideWalkthroughPodtemplateJson, + "test/fixtures/pkg/kubectl/OWNERS": testFixturesPkgKubectlOwners, + "test/fixtures/pkg/kubectl/plugins/bar/kubectl-bar": testFixturesPkgKubectlPluginsBarKubectlBar, + "test/fixtures/pkg/kubectl/plugins/foo/kubectl-foo": testFixturesPkgKubectlPluginsFooKubectlFoo, + "test/fixtures/pkg/kubectl/plugins/kubectl-foo": testFixturesPkgKubectlPluginsKubectlFoo, + "test/fixtures/pkg/kubectl/plugins/version/kubectl-version": testFixturesPkgKubectlPluginsVersionKubectlVersion, +} + +// AssetDir returns the file names below a certain +// directory embedded in the file by go-bindata. +// For example if you run go-bindata on data/... and data contains the +// following hierarchy: +// data/ +// foo.txt +// img/ +// a.png +// b.png +// then AssetDir("data") would return []string{"foo.txt", "img"} +// AssetDir("data/img") would return []string{"a.png", "b.png"} +// AssetDir("foo.txt") and AssetDir("notexist") would return an error +// AssetDir("") will return []string{"data"}. +func AssetDir(name string) ([]string, error) { + node := _bintree + if len(name) != 0 { + cannonicalName := strings.Replace(name, "\\", "/", -1) + pathList := strings.Split(cannonicalName, "/") + for _, p := range pathList { + node = node.Children[p] + if node == nil { + return nil, fmt.Errorf("Asset %s not found", name) + } + } + } + if node.Func != nil { + return nil, fmt.Errorf("Asset %s not found", name) + } + rv := make([]string, 0, len(node.Children)) + for childName := range node.Children { + rv = append(rv, childName) + } + return rv, nil +} + +type bintree struct { + Func func() (*asset, error) + Children map[string]*bintree +} + +var _bintree = &bintree{nil, map[string]*bintree{ + "test": {nil, map[string]*bintree{ + "conformance": {nil, map[string]*bintree{ + "testdata": {nil, map[string]*bintree{ + "OWNERS": {testConformanceTestdataOwners, map[string]*bintree{}}, + "conformance.yaml": {testConformanceTestdataConformanceYaml, map[string]*bintree{}}, + }}, + }}, + "e2e": {nil, map[string]*bintree{ + "testing-manifests": {nil, map[string]*bintree{ + "flexvolume": {nil, map[string]*bintree{ + "attachable-with-long-mount": {testE2eTestingManifestsFlexvolumeAttachableWithLongMount, map[string]*bintree{}}, + "dummy": {testE2eTestingManifestsFlexvolumeDummy, map[string]*bintree{}}, + "dummy-attachable": {testE2eTestingManifestsFlexvolumeDummyAttachable, map[string]*bintree{}}, + }}, + "guestbook": {nil, map[string]*bintree{ + "agnhost-primary-deployment.yaml.in": {testE2eTestingManifestsGuestbookAgnhostPrimaryDeploymentYamlIn, map[string]*bintree{}}, + "agnhost-primary-service.yaml": {testE2eTestingManifestsGuestbookAgnhostPrimaryServiceYaml, map[string]*bintree{}}, + "agnhost-replica-deployment.yaml.in": {testE2eTestingManifestsGuestbookAgnhostReplicaDeploymentYamlIn, map[string]*bintree{}}, + "agnhost-replica-service.yaml": {testE2eTestingManifestsGuestbookAgnhostReplicaServiceYaml, map[string]*bintree{}}, + "frontend-deployment.yaml.in": {testE2eTestingManifestsGuestbookFrontendDeploymentYamlIn, map[string]*bintree{}}, + "frontend-service.yaml": {testE2eTestingManifestsGuestbookFrontendServiceYaml, map[string]*bintree{}}, + "legacy": {nil, map[string]*bintree{ + "frontend-controller.yaml": {testE2eTestingManifestsGuestbookLegacyFrontendControllerYaml, map[string]*bintree{}}, + "redis-master-controller.yaml": {testE2eTestingManifestsGuestbookLegacyRedisMasterControllerYaml, map[string]*bintree{}}, + "redis-slave-controller.yaml": {testE2eTestingManifestsGuestbookLegacyRedisSlaveControllerYaml, map[string]*bintree{}}, + }}, + "redis-master-deployment.yaml.in": {testE2eTestingManifestsGuestbookRedisMasterDeploymentYamlIn, map[string]*bintree{}}, + "redis-master-service.yaml": {testE2eTestingManifestsGuestbookRedisMasterServiceYaml, map[string]*bintree{}}, + "redis-slave-deployment.yaml.in": {testE2eTestingManifestsGuestbookRedisSlaveDeploymentYamlIn, map[string]*bintree{}}, + "redis-slave-service.yaml": {testE2eTestingManifestsGuestbookRedisSlaveServiceYaml, map[string]*bintree{}}, + }}, + "ingress": {nil, map[string]*bintree{ + "gce": {nil, map[string]*bintree{ + "static-ip-2": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressGceStaticIp2IngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressGceStaticIp2RcYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressGceStaticIp2SvcYaml, map[string]*bintree{}}, + }}, + }}, + "http": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressHttpIngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressHttpRcYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressHttpSvcYaml, map[string]*bintree{}}, + }}, + "http2": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressHttp2IngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressHttp2RcYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressHttp2SvcYaml, map[string]*bintree{}}, + }}, + "multiple-certs": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressMultipleCertsIngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressMultipleCertsRcYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressMultipleCertsSvcYaml, map[string]*bintree{}}, + }}, + "neg": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressNegIngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressNegRcYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressNegSvcYaml, map[string]*bintree{}}, + }}, + "neg-clusterip": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressNegClusteripIngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressNegClusteripRcYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressNegClusteripSvcYaml, map[string]*bintree{}}, + }}, + "neg-exposed": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressNegExposedIngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressNegExposedRcYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressNegExposedSvcYaml, map[string]*bintree{}}, + }}, + "nginx": {nil, map[string]*bintree{ + "rc.yaml": {testE2eTestingManifestsIngressNginxRcYaml, map[string]*bintree{}}, + }}, + "pre-shared-cert": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressPreSharedCertIngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressPreSharedCertRcYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressPreSharedCertSvcYaml, map[string]*bintree{}}, + }}, + "static-ip": {nil, map[string]*bintree{ + "ing.yaml": {testE2eTestingManifestsIngressStaticIpIngYaml, map[string]*bintree{}}, + "rc.yaml": {testE2eTestingManifestsIngressStaticIpRcYaml, map[string]*bintree{}}, + "secret.yaml": {testE2eTestingManifestsIngressStaticIpSecretYaml, map[string]*bintree{}}, + "svc.yaml": {testE2eTestingManifestsIngressStaticIpSvcYaml, map[string]*bintree{}}, + }}, + }}, + "kubectl": {nil, map[string]*bintree{ + "agnhost-primary-controller.json.in": {testE2eTestingManifestsKubectlAgnhostPrimaryControllerJsonIn, map[string]*bintree{}}, + "agnhost-primary-pod.yaml": {testE2eTestingManifestsKubectlAgnhostPrimaryPodYaml, map[string]*bintree{}}, + "agnhost-primary-service.json": {testE2eTestingManifestsKubectlAgnhostPrimaryServiceJson, map[string]*bintree{}}, + "busybox-cronjob.yaml.in": {testE2eTestingManifestsKubectlBusyboxCronjobYamlIn, map[string]*bintree{}}, + "busybox-pod.yaml.in": {testE2eTestingManifestsKubectlBusyboxPodYamlIn, map[string]*bintree{}}, + "httpd-deployment1.yaml.in": {testE2eTestingManifestsKubectlHttpdDeployment1YamlIn, map[string]*bintree{}}, + "httpd-deployment2.yaml.in": {testE2eTestingManifestsKubectlHttpdDeployment2YamlIn, map[string]*bintree{}}, + "httpd-deployment3.yaml.in": {testE2eTestingManifestsKubectlHttpdDeployment3YamlIn, map[string]*bintree{}}, + "httpd-rc.yaml.in": {testE2eTestingManifestsKubectlHttpdRcYamlIn, map[string]*bintree{}}, + "pause-pod.yaml.in": {testE2eTestingManifestsKubectlPausePodYamlIn, map[string]*bintree{}}, + "pod-with-readiness-probe.yaml.in": {testE2eTestingManifestsKubectlPodWithReadinessProbeYamlIn, map[string]*bintree{}}, + }}, + "pod": {testE2eTestingManifestsPod, map[string]*bintree{}}, + "rbd-storage-class.yaml": {testE2eTestingManifestsRbdStorageClassYaml, map[string]*bintree{}}, + "sample-device-plugin.yaml": {testE2eTestingManifestsSampleDevicePluginYaml, map[string]*bintree{}}, + "scheduling": {nil, map[string]*bintree{ + "nvidia-driver-installer.yaml": {testE2eTestingManifestsSchedulingNvidiaDriverInstallerYaml, map[string]*bintree{}}, + }}, + "serviceloadbalancer": {nil, map[string]*bintree{ + "haproxyrc.yaml": {testE2eTestingManifestsServiceloadbalancerHaproxyrcYaml, map[string]*bintree{}}, + "netexecrc.yaml": {testE2eTestingManifestsServiceloadbalancerNetexecrcYaml, map[string]*bintree{}}, + "netexecsvc.yaml": {testE2eTestingManifestsServiceloadbalancerNetexecsvcYaml, map[string]*bintree{}}, + "nginxrc.yaml": {testE2eTestingManifestsServiceloadbalancerNginxrcYaml, map[string]*bintree{}}, + "nginxsvc.yaml": {testE2eTestingManifestsServiceloadbalancerNginxsvcYaml, map[string]*bintree{}}, + }}, + "statefulset": {nil, map[string]*bintree{ + "cassandra": {nil, map[string]*bintree{ + "controller.yaml": {testE2eTestingManifestsStatefulsetCassandraControllerYaml, map[string]*bintree{}}, + "pdb.yaml": {testE2eTestingManifestsStatefulsetCassandraPdbYaml, map[string]*bintree{}}, + "service.yaml": {testE2eTestingManifestsStatefulsetCassandraServiceYaml, map[string]*bintree{}}, + "statefulset.yaml": {testE2eTestingManifestsStatefulsetCassandraStatefulsetYaml, map[string]*bintree{}}, + "tester.yaml": {testE2eTestingManifestsStatefulsetCassandraTesterYaml, map[string]*bintree{}}, + }}, + "cockroachdb": {nil, map[string]*bintree{ + "service.yaml": {testE2eTestingManifestsStatefulsetCockroachdbServiceYaml, map[string]*bintree{}}, + "statefulset.yaml": {testE2eTestingManifestsStatefulsetCockroachdbStatefulsetYaml, map[string]*bintree{}}, + }}, + "etcd": {nil, map[string]*bintree{ + "pdb.yaml": {testE2eTestingManifestsStatefulsetEtcdPdbYaml, map[string]*bintree{}}, + "service.yaml": {testE2eTestingManifestsStatefulsetEtcdServiceYaml, map[string]*bintree{}}, + "statefulset.yaml": {testE2eTestingManifestsStatefulsetEtcdStatefulsetYaml, map[string]*bintree{}}, + "tester.yaml": {testE2eTestingManifestsStatefulsetEtcdTesterYaml, map[string]*bintree{}}, + }}, + "mysql-galera": {nil, map[string]*bintree{ + "service.yaml": {testE2eTestingManifestsStatefulsetMysqlGaleraServiceYaml, map[string]*bintree{}}, + "statefulset.yaml": {testE2eTestingManifestsStatefulsetMysqlGaleraStatefulsetYaml, map[string]*bintree{}}, + }}, + "mysql-upgrade": {nil, map[string]*bintree{ + "configmap.yaml": {testE2eTestingManifestsStatefulsetMysqlUpgradeConfigmapYaml, map[string]*bintree{}}, + "service.yaml": {testE2eTestingManifestsStatefulsetMysqlUpgradeServiceYaml, map[string]*bintree{}}, + "statefulset.yaml": {testE2eTestingManifestsStatefulsetMysqlUpgradeStatefulsetYaml, map[string]*bintree{}}, + "tester.yaml": {testE2eTestingManifestsStatefulsetMysqlUpgradeTesterYaml, map[string]*bintree{}}, + }}, + "nginx": {nil, map[string]*bintree{ + "service.yaml": {testE2eTestingManifestsStatefulsetNginxServiceYaml, map[string]*bintree{}}, + "statefulset.yaml": {testE2eTestingManifestsStatefulsetNginxStatefulsetYaml, map[string]*bintree{}}, + }}, + "redis": {nil, map[string]*bintree{ + "service.yaml": {testE2eTestingManifestsStatefulsetRedisServiceYaml, map[string]*bintree{}}, + "statefulset.yaml": {testE2eTestingManifestsStatefulsetRedisStatefulsetYaml, map[string]*bintree{}}, + }}, + "zookeeper": {nil, map[string]*bintree{ + "service.yaml": {testE2eTestingManifestsStatefulsetZookeeperServiceYaml, map[string]*bintree{}}, + "statefulset.yaml": {testE2eTestingManifestsStatefulsetZookeeperStatefulsetYaml, map[string]*bintree{}}, + }}, + }}, + "storage-csi": {nil, map[string]*bintree{ + "OWNERS": {testE2eTestingManifestsStorageCsiOwners, map[string]*bintree{}}, + "controller-role.yaml": {testE2eTestingManifestsStorageCsiControllerRoleYaml, map[string]*bintree{}}, + "external-attacher": {nil, map[string]*bintree{ + "rbac.yaml": {testE2eTestingManifestsStorageCsiExternalAttacherRbacYaml, map[string]*bintree{}}, + }}, + "external-provisioner": {nil, map[string]*bintree{ + "rbac.yaml": {testE2eTestingManifestsStorageCsiExternalProvisionerRbacYaml, map[string]*bintree{}}, + }}, + "external-resizer": {nil, map[string]*bintree{ + "rbac.yaml": {testE2eTestingManifestsStorageCsiExternalResizerRbacYaml, map[string]*bintree{}}, + }}, + "external-snapshotter": {nil, map[string]*bintree{ + "rbac.yaml": {testE2eTestingManifestsStorageCsiExternalSnapshotterRbacYaml, map[string]*bintree{}}, + }}, + "gce-pd": {nil, map[string]*bintree{ + "controller_ss.yaml": {testE2eTestingManifestsStorageCsiGcePdController_ssYaml, map[string]*bintree{}}, + "csi-controller-rbac.yaml": {testE2eTestingManifestsStorageCsiGcePdCsiControllerRbacYaml, map[string]*bintree{}}, + "node_ds.yaml": {testE2eTestingManifestsStorageCsiGcePdNode_dsYaml, map[string]*bintree{}}, + }}, + "hostpath": {nil, map[string]*bintree{ + "hostpath": {nil, map[string]*bintree{ + "csi-hostpath-attacher.yaml": {testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathAttacherYaml, map[string]*bintree{}}, + "csi-hostpath-driverinfo.yaml": {testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathDriverinfoYaml, map[string]*bintree{}}, + "csi-hostpath-plugin.yaml": {testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathPluginYaml, map[string]*bintree{}}, + "csi-hostpath-provisioner.yaml": {testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathProvisionerYaml, map[string]*bintree{}}, + "csi-hostpath-resizer.yaml": {testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathResizerYaml, map[string]*bintree{}}, + "csi-hostpath-snapshotter.yaml": {testE2eTestingManifestsStorageCsiHostpathHostpathCsiHostpathSnapshotterYaml, map[string]*bintree{}}, + "e2e-test-rbac.yaml": {testE2eTestingManifestsStorageCsiHostpathHostpathE2eTestRbacYaml, map[string]*bintree{}}, + }}, + "usage": {nil, map[string]*bintree{ + "csi-storageclass.yaml": {testE2eTestingManifestsStorageCsiHostpathUsageCsiStorageclassYaml, map[string]*bintree{}}, + }}, + }}, + "mock": {nil, map[string]*bintree{ + "csi-mock-driver-attacher.yaml": {testE2eTestingManifestsStorageCsiMockCsiMockDriverAttacherYaml, map[string]*bintree{}}, + "csi-mock-driver-resizer.yaml": {testE2eTestingManifestsStorageCsiMockCsiMockDriverResizerYaml, map[string]*bintree{}}, + "csi-mock-driver-snapshotter.yaml": {testE2eTestingManifestsStorageCsiMockCsiMockDriverSnapshotterYaml, map[string]*bintree{}}, + "csi-mock-driver.yaml": {testE2eTestingManifestsStorageCsiMockCsiMockDriverYaml, map[string]*bintree{}}, + "csi-mock-driverinfo.yaml": {testE2eTestingManifestsStorageCsiMockCsiMockDriverinfoYaml, map[string]*bintree{}}, + "csi-mock-rbac.yaml": {testE2eTestingManifestsStorageCsiMockCsiMockRbacYaml, map[string]*bintree{}}, + "csi-storageclass.yaml": {testE2eTestingManifestsStorageCsiMockCsiStorageclassYaml, map[string]*bintree{}}, + }}, + }}, + }}, + }}, + "e2e_node": {nil, map[string]*bintree{ + "testing-manifests": {nil, map[string]*bintree{ + "sriovdp-cm.yaml": {testE2e_nodeTestingManifestsSriovdpCmYaml, map[string]*bintree{}}, + "sriovdp-ds.yaml": {testE2e_nodeTestingManifestsSriovdpDsYaml, map[string]*bintree{}}, + "sriovdp-sa.yaml": {testE2e_nodeTestingManifestsSriovdpSaYaml, map[string]*bintree{}}, + }}, + }}, + "fixtures": {nil, map[string]*bintree{ + "doc-yaml": {nil, map[string]*bintree{ + "admin": {nil, map[string]*bintree{ + "daemon.yaml": {testFixturesDocYamlAdminDaemonYaml, map[string]*bintree{}}, + "high-availability": {nil, map[string]*bintree{ + "etcd.yaml": {testFixturesDocYamlAdminHighAvailabilityEtcdYaml, map[string]*bintree{}}, + "kube-apiserver.yaml": {testFixturesDocYamlAdminHighAvailabilityKubeApiserverYaml, map[string]*bintree{}}, + "kube-controller-manager.yaml": {testFixturesDocYamlAdminHighAvailabilityKubeControllerManagerYaml, map[string]*bintree{}}, + "kube-scheduler.yaml": {testFixturesDocYamlAdminHighAvailabilityKubeSchedulerYaml, map[string]*bintree{}}, + }}, + "limitrange": {nil, map[string]*bintree{ + "invalid-pod.yaml": {testFixturesDocYamlAdminLimitrangeInvalidPodYaml, map[string]*bintree{}}, + "limits.yaml": {testFixturesDocYamlAdminLimitrangeLimitsYaml, map[string]*bintree{}}, + "namespace.yaml": {testFixturesDocYamlAdminLimitrangeNamespaceYaml, map[string]*bintree{}}, + "valid-pod.yaml": {testFixturesDocYamlAdminLimitrangeValidPodYaml, map[string]*bintree{}}, + }}, + "namespaces": {nil, map[string]*bintree{ + "namespace-dev.json": {testFixturesDocYamlAdminNamespacesNamespaceDevJson, map[string]*bintree{}}, + "namespace-prod.json": {testFixturesDocYamlAdminNamespacesNamespaceProdJson, map[string]*bintree{}}, + }}, + "resourcequota": {nil, map[string]*bintree{ + "limits.yaml": {testFixturesDocYamlAdminResourcequotaLimitsYaml, map[string]*bintree{}}, + "namespace.yaml": {testFixturesDocYamlAdminResourcequotaNamespaceYaml, map[string]*bintree{}}, + "quota.yaml": {testFixturesDocYamlAdminResourcequotaQuotaYaml, map[string]*bintree{}}, + }}, + }}, + "user-guide": {nil, map[string]*bintree{ + "configmap": {nil, map[string]*bintree{ + "configmap.yaml": {testFixturesDocYamlUserGuideConfigmapConfigmapYaml, map[string]*bintree{}}, + }}, + "deployment.yaml": {testFixturesDocYamlUserGuideDeploymentYaml, map[string]*bintree{}}, + "downward-api": {nil, map[string]*bintree{ + "dapi-pod.yaml.in": {testFixturesDocYamlUserGuideDownwardApiDapiPodYamlIn, map[string]*bintree{}}, + }}, + "job.yaml": {testFixturesDocYamlUserGuideJobYaml, map[string]*bintree{}}, + "liveness": {nil, map[string]*bintree{ + "exec-liveness.yaml.in": {testFixturesDocYamlUserGuideLivenessExecLivenessYamlIn, map[string]*bintree{}}, + "http-liveness.yaml.in": {testFixturesDocYamlUserGuideLivenessHttpLivenessYamlIn, map[string]*bintree{}}, + }}, + "multi-pod.yaml": {testFixturesDocYamlUserGuideMultiPodYaml, map[string]*bintree{}}, + "persistent-volumes": {nil, map[string]*bintree{ + "claims": {nil, map[string]*bintree{ + "claim-01.yaml": {testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim01Yaml, map[string]*bintree{}}, + "claim-02.yaml": {testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim02Yaml, map[string]*bintree{}}, + "claim-03.json": {testFixturesDocYamlUserGuidePersistentVolumesClaimsClaim03Json, map[string]*bintree{}}, + }}, + "volumes": {nil, map[string]*bintree{ + "gce.yaml": {testFixturesDocYamlUserGuidePersistentVolumesVolumesGceYaml, map[string]*bintree{}}, + "local-01.yaml": {testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal01Yaml, map[string]*bintree{}}, + "local-02.yaml": {testFixturesDocYamlUserGuidePersistentVolumesVolumesLocal02Yaml, map[string]*bintree{}}, + "nfs.yaml": {testFixturesDocYamlUserGuidePersistentVolumesVolumesNfsYaml, map[string]*bintree{}}, + }}, + }}, + "pod.yaml": {testFixturesDocYamlUserGuidePodYaml, map[string]*bintree{}}, + "replicaset": {nil, map[string]*bintree{ + "redis-slave.yaml": {testFixturesDocYamlUserGuideReplicasetRedisSlaveYaml, map[string]*bintree{}}, + }}, + "replication.yaml": {testFixturesDocYamlUserGuideReplicationYaml, map[string]*bintree{}}, + "secrets": {nil, map[string]*bintree{ + "secret-env-pod.yaml": {testFixturesDocYamlUserGuideSecretsSecretEnvPodYaml, map[string]*bintree{}}, + "secret-pod.yaml.in": {testFixturesDocYamlUserGuideSecretsSecretPodYamlIn, map[string]*bintree{}}, + "secret.yaml": {testFixturesDocYamlUserGuideSecretsSecretYaml, map[string]*bintree{}}, + }}, + "update-demo": {nil, map[string]*bintree{ + "images": {nil, map[string]*bintree{ + "kitten": {nil, map[string]*bintree{ + "html": {nil, map[string]*bintree{ + "data.json": {testFixturesDocYamlUserGuideUpdateDemoImagesKittenHtmlDataJson, map[string]*bintree{}}, + }}, + }}, + "nautilus": {nil, map[string]*bintree{ + "html": {nil, map[string]*bintree{ + "data.json": {testFixturesDocYamlUserGuideUpdateDemoImagesNautilusHtmlDataJson, map[string]*bintree{}}, + }}, + }}, + }}, + "kitten-rc.yaml.in": {testFixturesDocYamlUserGuideUpdateDemoKittenRcYamlIn, map[string]*bintree{}}, + "nautilus-rc.yaml.in": {testFixturesDocYamlUserGuideUpdateDemoNautilusRcYamlIn, map[string]*bintree{}}, + }}, + "walkthrough": {nil, map[string]*bintree{ + "podtemplate.json": {testFixturesDocYamlUserGuideWalkthroughPodtemplateJson, map[string]*bintree{}}, + }}, + }}, + }}, + "pkg": {nil, map[string]*bintree{ + "kubectl": {nil, map[string]*bintree{ + "OWNERS": {testFixturesPkgKubectlOwners, map[string]*bintree{}}, + "plugins": {nil, map[string]*bintree{ + "bar": {nil, map[string]*bintree{ + "kubectl-bar": {testFixturesPkgKubectlPluginsBarKubectlBar, map[string]*bintree{}}, + }}, + "foo": {nil, map[string]*bintree{ + "kubectl-foo": {testFixturesPkgKubectlPluginsFooKubectlFoo, map[string]*bintree{}}, + }}, + "kubectl-foo": {testFixturesPkgKubectlPluginsKubectlFoo, map[string]*bintree{}}, + "version": {nil, map[string]*bintree{ + "kubectl-version": {testFixturesPkgKubectlPluginsVersionKubectlVersion, map[string]*bintree{}}, + }}, + }}, + }}, + }}, + }}, + "images": {nil, map[string]*bintree{ + "Makefile": {testImagesMakefile, map[string]*bintree{}}, + "OWNERS": {testImagesOwners, map[string]*bintree{}}, + "agnhost": {nil, map[string]*bintree{ + ".gitignore": {testImagesAgnhostGitignore, map[string]*bintree{}}, + "BASEIMAGE": {testImagesAgnhostBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesAgnhostDockerfile, map[string]*bintree{}}, + "Dockerfile_windows": {testImagesAgnhostDockerfile_windows, map[string]*bintree{}}, + "Makefile": {testImagesAgnhostMakefile, map[string]*bintree{}}, + "OWNERS": {testImagesAgnhostOwners, map[string]*bintree{}}, + "VERSION": {testImagesAgnhostVersion, map[string]*bintree{}}, + "agnhost.go": {testImagesAgnhostAgnhostGo, map[string]*bintree{}}, + "audit-proxy": {nil, map[string]*bintree{ + "main.go": {testImagesAgnhostAuditProxyMainGo, map[string]*bintree{}}, + }}, + "connect": {nil, map[string]*bintree{ + "connect.go": {testImagesAgnhostConnectConnectGo, map[string]*bintree{}}, + }}, + "crd-conversion-webhook": {nil, map[string]*bintree{ + "config.go": {testImagesAgnhostCrdConversionWebhookConfigGo, map[string]*bintree{}}, + "converter": {nil, map[string]*bintree{ + "converter_test.go": {testImagesAgnhostCrdConversionWebhookConverterConverter_testGo, map[string]*bintree{}}, + "example_converter.go": {testImagesAgnhostCrdConversionWebhookConverterExample_converterGo, map[string]*bintree{}}, + "framework.go": {testImagesAgnhostCrdConversionWebhookConverterFrameworkGo, map[string]*bintree{}}, + }}, + "main.go": {testImagesAgnhostCrdConversionWebhookMainGo, map[string]*bintree{}}, + }}, + "dns": {nil, map[string]*bintree{ + "common.go": {testImagesAgnhostDnsCommonGo, map[string]*bintree{}}, + "dns.go": {testImagesAgnhostDnsDnsGo, map[string]*bintree{}}, + "dns_windows.go": {testImagesAgnhostDnsDns_windowsGo, map[string]*bintree{}}, + }}, + "entrypoint-tester": {nil, map[string]*bintree{ + "ep.go": {testImagesAgnhostEntrypointTesterEpGo, map[string]*bintree{}}, + }}, + "fakegitserver": {nil, map[string]*bintree{ + "gitserver.go": {testImagesAgnhostFakegitserverGitserverGo, map[string]*bintree{}}, + }}, + "guestbook": {nil, map[string]*bintree{ + "guestbook.go": {testImagesAgnhostGuestbookGuestbookGo, map[string]*bintree{}}, + }}, + "inclusterclient": {nil, map[string]*bintree{ + "main.go": {testImagesAgnhostInclusterclientMainGo, map[string]*bintree{}}, + }}, + "liveness": {nil, map[string]*bintree{ + "server.go": {testImagesAgnhostLivenessServerGo, map[string]*bintree{}}, + }}, + "logs-generator": {nil, map[string]*bintree{ + "logs_generator.go": {testImagesAgnhostLogsGeneratorLogs_generatorGo, map[string]*bintree{}}, + }}, + "mounttest": {nil, map[string]*bintree{ + "filePermissions.ps1": {testImagesAgnhostMounttestFilepermissionsPs1, map[string]*bintree{}}, + "mt.go": {testImagesAgnhostMounttestMtGo, map[string]*bintree{}}, + "mt_utils.go": {testImagesAgnhostMounttestMt_utilsGo, map[string]*bintree{}}, + "mt_utils_windows.go": {testImagesAgnhostMounttestMt_utils_windowsGo, map[string]*bintree{}}, + }}, + "net": {nil, map[string]*bintree{ + "common": {nil, map[string]*bintree{ + "common.go": {testImagesAgnhostNetCommonCommonGo, map[string]*bintree{}}, + }}, + "main.go": {testImagesAgnhostNetMainGo, map[string]*bintree{}}, + "nat": {nil, map[string]*bintree{ + "closewait.go": {testImagesAgnhostNetNatClosewaitGo, map[string]*bintree{}}, + }}, + }}, + "netexec": {nil, map[string]*bintree{ + "netexec.go": {testImagesAgnhostNetexecNetexecGo, map[string]*bintree{}}, + }}, + "nettest": {nil, map[string]*bintree{ + "nettest.go": {testImagesAgnhostNettestNettestGo, map[string]*bintree{}}, + }}, + "no-snat-test": {nil, map[string]*bintree{ + "main.go": {testImagesAgnhostNoSnatTestMainGo, map[string]*bintree{}}, + }}, + "no-snat-test-proxy": {nil, map[string]*bintree{ + "main.go": {testImagesAgnhostNoSnatTestProxyMainGo, map[string]*bintree{}}, + }}, + "openidmetadata": {nil, map[string]*bintree{ + "openidmetadata.go": {testImagesAgnhostOpenidmetadataOpenidmetadataGo, map[string]*bintree{}}, + }}, + "pause": {nil, map[string]*bintree{ + "pause.go": {testImagesAgnhostPausePauseGo, map[string]*bintree{}}, + }}, + "port-forward-tester": {nil, map[string]*bintree{ + "portforwardtester.go": {testImagesAgnhostPortForwardTesterPortforwardtesterGo, map[string]*bintree{}}, + }}, + "porter": {nil, map[string]*bintree{ + "localhost.crt": {testImagesAgnhostPorterLocalhostCrt, map[string]*bintree{}}, + "localhost.key": {testImagesAgnhostPorterLocalhostKey, map[string]*bintree{}}, + "porter.go": {testImagesAgnhostPorterPorterGo, map[string]*bintree{}}, + }}, + "resource-consumer-controller": {nil, map[string]*bintree{ + "controller.go": {testImagesAgnhostResourceConsumerControllerControllerGo, map[string]*bintree{}}, + }}, + "serve-hostname": {nil, map[string]*bintree{ + "serve_hostname.go": {testImagesAgnhostServeHostnameServe_hostnameGo, map[string]*bintree{}}, + }}, + "test-webserver": {nil, map[string]*bintree{ + "test-webserver.go": {testImagesAgnhostTestWebserverTestWebserverGo, map[string]*bintree{}}, + }}, + "webhook": {nil, map[string]*bintree{ + "addlabel.go": {testImagesAgnhostWebhookAddlabelGo, map[string]*bintree{}}, + "addlabel_test.go": {testImagesAgnhostWebhookAddlabel_testGo, map[string]*bintree{}}, + "alwaysallow.go": {testImagesAgnhostWebhookAlwaysallowGo, map[string]*bintree{}}, + "alwaysdeny.go": {testImagesAgnhostWebhookAlwaysdenyGo, map[string]*bintree{}}, + "config.go": {testImagesAgnhostWebhookConfigGo, map[string]*bintree{}}, + "configmap.go": {testImagesAgnhostWebhookConfigmapGo, map[string]*bintree{}}, + "convert.go": {testImagesAgnhostWebhookConvertGo, map[string]*bintree{}}, + "convert_test.go": {testImagesAgnhostWebhookConvert_testGo, map[string]*bintree{}}, + "crd.go": {testImagesAgnhostWebhookCrdGo, map[string]*bintree{}}, + "customresource.go": {testImagesAgnhostWebhookCustomresourceGo, map[string]*bintree{}}, + "main.go": {testImagesAgnhostWebhookMainGo, map[string]*bintree{}}, + "patch_test.go": {testImagesAgnhostWebhookPatch_testGo, map[string]*bintree{}}, + "pods.go": {testImagesAgnhostWebhookPodsGo, map[string]*bintree{}}, + "scheme.go": {testImagesAgnhostWebhookSchemeGo, map[string]*bintree{}}, + }}, + }}, + "apparmor-loader": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesApparmorLoaderBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesApparmorLoaderDockerfile, map[string]*bintree{}}, + "Makefile": {testImagesApparmorLoaderMakefile, map[string]*bintree{}}, + "OWNERS": {testImagesApparmorLoaderOwners, map[string]*bintree{}}, + "VERSION": {testImagesApparmorLoaderVersion, map[string]*bintree{}}, + "example-configmap.yaml": {testImagesApparmorLoaderExampleConfigmapYaml, map[string]*bintree{}}, + "example-daemon.yaml": {testImagesApparmorLoaderExampleDaemonYaml, map[string]*bintree{}}, + "example-namespace.yaml": {testImagesApparmorLoaderExampleNamespaceYaml, map[string]*bintree{}}, + "example-pod.yaml": {testImagesApparmorLoaderExamplePodYaml, map[string]*bintree{}}, + "loader.go": {testImagesApparmorLoaderLoaderGo, map[string]*bintree{}}, + }}, + "busybox": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesBusyboxBaseimage, map[string]*bintree{}}, + "Dockerfile_windows": {testImagesBusyboxDockerfile_windows, map[string]*bintree{}}, + "Makefile": {testImagesBusyboxMakefile, map[string]*bintree{}}, + "OWNERS": {testImagesBusyboxOwners, map[string]*bintree{}}, + "VERSION": {testImagesBusyboxVersion, map[string]*bintree{}}, + "hostname.go": {testImagesBusyboxHostnameGo, map[string]*bintree{}}, + }}, + "cloudbuild.yaml": {testImagesCloudbuildYaml, map[string]*bintree{}}, + "cuda-vector-add": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesCudaVectorAddBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesCudaVectorAddDockerfile, map[string]*bintree{}}, + "OWNERS": {testImagesCudaVectorAddOwners, map[string]*bintree{}}, + "VERSION": {testImagesCudaVectorAddVersion, map[string]*bintree{}}, + }}, + "echoserver": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesEchoserverBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesEchoserverDockerfile, map[string]*bintree{}}, + "Dockerfile_windows": {testImagesEchoserverDockerfile_windows, map[string]*bintree{}}, + "OWNERS": {testImagesEchoserverOwners, map[string]*bintree{}}, + "VERSION": {testImagesEchoserverVersion, map[string]*bintree{}}, + "install-deps.sh": {testImagesEchoserverInstallDepsSh, map[string]*bintree{}}, + "nginx.conf": {testImagesEchoserverNginxConf, map[string]*bintree{}}, + "run.sh": {testImagesEchoserverRunSh, map[string]*bintree{}}, + "template.lua": {testImagesEchoserverTemplateLua, map[string]*bintree{}}, + }}, + "image-util.sh": {testImagesImageUtilSh, map[string]*bintree{}}, + "ipc-utils": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesIpcUtilsBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesIpcUtilsDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesIpcUtilsVersion, map[string]*bintree{}}, + }}, + "jessie-dnsutils": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesJessieDnsutilsBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesJessieDnsutilsDockerfile, map[string]*bintree{}}, + "Dockerfile_windows": {testImagesJessieDnsutilsDockerfile_windows, map[string]*bintree{}}, + "OWNERS": {testImagesJessieDnsutilsOwners, map[string]*bintree{}}, + "VERSION": {testImagesJessieDnsutilsVersion, map[string]*bintree{}}, + "fixup-apt-list.sh": {testImagesJessieDnsutilsFixupAptListSh, map[string]*bintree{}}, + }}, + "kitten": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesKittenBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesKittenDockerfile, map[string]*bintree{}}, + "OWNERS": {testImagesKittenOwners, map[string]*bintree{}}, + "VERSION": {testImagesKittenVersion, map[string]*bintree{}}, + "html": {nil, map[string]*bintree{ + "data.json": {testImagesKittenHtmlDataJson, map[string]*bintree{}}, + }}, + }}, + "metadata-concealment": {nil, map[string]*bintree{ + "Dockerfile": {testImagesMetadataConcealmentDockerfile, map[string]*bintree{}}, + "Makefile": {testImagesMetadataConcealmentMakefile, map[string]*bintree{}}, + "OWNERS": {testImagesMetadataConcealmentOwners, map[string]*bintree{}}, + "VERSION": {testImagesMetadataConcealmentVersion, map[string]*bintree{}}, + "check_metadata_concealment.go": {testImagesMetadataConcealmentCheck_metadata_concealmentGo, map[string]*bintree{}}, + }}, + "nautilus": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesNautilusBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesNautilusDockerfile, map[string]*bintree{}}, + "OWNERS": {testImagesNautilusOwners, map[string]*bintree{}}, + "VERSION": {testImagesNautilusVersion, map[string]*bintree{}}, + "html": {nil, map[string]*bintree{ + "data.json": {testImagesNautilusHtmlDataJson, map[string]*bintree{}}, + }}, + }}, + "node-perf": {nil, map[string]*bintree{ + "npb-ep": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesNodePerfNpbEpBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesNodePerfNpbEpDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesNodePerfNpbEpVersion, map[string]*bintree{}}, + }}, + "npb-is": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesNodePerfNpbIsBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesNodePerfNpbIsDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesNodePerfNpbIsVersion, map[string]*bintree{}}, + }}, + "tf-wide-deep": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesNodePerfTfWideDeepBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesNodePerfTfWideDeepDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesNodePerfTfWideDeepVersion, map[string]*bintree{}}, + }}, + }}, + "nonewprivs": {nil, map[string]*bintree{ + ".gitignore": {testImagesNonewprivsGitignore, map[string]*bintree{}}, + "BASEIMAGE": {testImagesNonewprivsBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesNonewprivsDockerfile, map[string]*bintree{}}, + "Makefile": {testImagesNonewprivsMakefile, map[string]*bintree{}}, + "OWNERS": {testImagesNonewprivsOwners, map[string]*bintree{}}, + "VERSION": {testImagesNonewprivsVersion, map[string]*bintree{}}, + "nnp.go": {testImagesNonewprivsNnpGo, map[string]*bintree{}}, + }}, + "nonroot": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesNonrootBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesNonrootDockerfile, map[string]*bintree{}}, + "Dockerfile_windows": {testImagesNonrootDockerfile_windows, map[string]*bintree{}}, + "OWNERS": {testImagesNonrootOwners, map[string]*bintree{}}, + "VERSION": {testImagesNonrootVersion, map[string]*bintree{}}, + }}, + "pets": {nil, map[string]*bintree{ + "peer-finder": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesPetsPeerFinderBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesPetsPeerFinderDockerfile, map[string]*bintree{}}, + "Makefile": {testImagesPetsPeerFinderMakefile, map[string]*bintree{}}, + "VERSION": {testImagesPetsPeerFinderVersion, map[string]*bintree{}}, + "peer-finder.go": {testImagesPetsPeerFinderPeerFinderGo, map[string]*bintree{}}, + }}, + "redis-installer": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesPetsRedisInstallerBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesPetsRedisInstallerDockerfile, map[string]*bintree{}}, + "Makefile": {testImagesPetsRedisInstallerMakefile, map[string]*bintree{}}, + "VERSION": {testImagesPetsRedisInstallerVersion, map[string]*bintree{}}, + "install.sh": {testImagesPetsRedisInstallerInstallSh, map[string]*bintree{}}, + "on-start.sh": {testImagesPetsRedisInstallerOnStartSh, map[string]*bintree{}}, + }}, + "zookeeper-installer": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesPetsZookeeperInstallerBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesPetsZookeeperInstallerDockerfile, map[string]*bintree{}}, + "Makefile": {testImagesPetsZookeeperInstallerMakefile, map[string]*bintree{}}, + "VERSION": {testImagesPetsZookeeperInstallerVersion, map[string]*bintree{}}, + "install.sh": {testImagesPetsZookeeperInstallerInstallSh, map[string]*bintree{}}, + "on-start.sh": {testImagesPetsZookeeperInstallerOnStartSh, map[string]*bintree{}}, + }}, + }}, + "redis": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesRedisBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesRedisDockerfile, map[string]*bintree{}}, + "Dockerfile_windows": {testImagesRedisDockerfile_windows, map[string]*bintree{}}, + "OWNERS": {testImagesRedisOwners, map[string]*bintree{}}, + "VERSION": {testImagesRedisVersion, map[string]*bintree{}}, + "redis.conf": {testImagesRedisRedisConf, map[string]*bintree{}}, + }}, + "regression-issue-74839": {nil, map[string]*bintree{ + ".gitignore": {testImagesRegressionIssue74839Gitignore, map[string]*bintree{}}, + "Dockerfile": {testImagesRegressionIssue74839Dockerfile, map[string]*bintree{}}, + "Makefile": {testImagesRegressionIssue74839Makefile, map[string]*bintree{}}, + "OWNERS": {testImagesRegressionIssue74839Owners, map[string]*bintree{}}, + "VERSION": {testImagesRegressionIssue74839Version, map[string]*bintree{}}, + "main.go": {testImagesRegressionIssue74839MainGo, map[string]*bintree{}}, + "tcp.go": {testImagesRegressionIssue74839TcpGo, map[string]*bintree{}}, + "tcp_test.go": {testImagesRegressionIssue74839Tcp_testGo, map[string]*bintree{}}, + }}, + "resource-consumer": {nil, map[string]*bintree{ + ".gitignore": {testImagesResourceConsumerGitignore, map[string]*bintree{}}, + "BASEIMAGE": {testImagesResourceConsumerBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesResourceConsumerDockerfile, map[string]*bintree{}}, + "Makefile": {testImagesResourceConsumerMakefile, map[string]*bintree{}}, + "VERSION": {testImagesResourceConsumerVersion, map[string]*bintree{}}, + "common": {nil, map[string]*bintree{ + "common.go": {testImagesResourceConsumerCommonCommonGo, map[string]*bintree{}}, + }}, + "consume-cpu": {nil, map[string]*bintree{ + "consume_cpu.go": {testImagesResourceConsumerConsumeCpuConsume_cpuGo, map[string]*bintree{}}, + }}, + "resource_consumer.go": {testImagesResourceConsumerResource_consumerGo, map[string]*bintree{}}, + "resource_consumer_handler.go": {testImagesResourceConsumerResource_consumer_handlerGo, map[string]*bintree{}}, + "utils.go": {testImagesResourceConsumerUtilsGo, map[string]*bintree{}}, + }}, + "sample-apiserver": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesSampleApiserverBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesSampleApiserverDockerfile, map[string]*bintree{}}, + "Dockerfile_windows": {testImagesSampleApiserverDockerfile_windows, map[string]*bintree{}}, + "Makefile": {testImagesSampleApiserverMakefile, map[string]*bintree{}}, + "OWNERS": {testImagesSampleApiserverOwners, map[string]*bintree{}}, + "VERSION": {testImagesSampleApiserverVersion, map[string]*bintree{}}, + }}, + "sample-device-plugin": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesSampleDevicePluginBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesSampleDevicePluginDockerfile, map[string]*bintree{}}, + "Makefile": {testImagesSampleDevicePluginMakefile, map[string]*bintree{}}, + "VERSION": {testImagesSampleDevicePluginVersion, map[string]*bintree{}}, + "sampledeviceplugin.go": {testImagesSampleDevicePluginSampledevicepluginGo, map[string]*bintree{}}, + }}, + "volume": {nil, map[string]*bintree{ + "OWNERS": {testImagesVolumeOwners, map[string]*bintree{}}, + "gluster": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesVolumeGlusterBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesVolumeGlusterDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesVolumeGlusterVersion, map[string]*bintree{}}, + "glusterd.vol": {testImagesVolumeGlusterGlusterdVol, map[string]*bintree{}}, + "index.html": {testImagesVolumeGlusterIndexHtml, map[string]*bintree{}}, + "run_gluster.sh": {testImagesVolumeGlusterRun_glusterSh, map[string]*bintree{}}, + }}, + "iscsi": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesVolumeIscsiBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesVolumeIscsiDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesVolumeIscsiVersion, map[string]*bintree{}}, + "block.tar.gz": {testImagesVolumeIscsiBlockTarGz, map[string]*bintree{}}, + "create_block.sh": {testImagesVolumeIscsiCreate_blockSh, map[string]*bintree{}}, + "run_iscsi_target.sh": {testImagesVolumeIscsiRun_iscsi_targetSh, map[string]*bintree{}}, + }}, + "nfs": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesVolumeNfsBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesVolumeNfsDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesVolumeNfsVersion, map[string]*bintree{}}, + "index.html": {testImagesVolumeNfsIndexHtml, map[string]*bintree{}}, + "run_nfs.sh": {testImagesVolumeNfsRun_nfsSh, map[string]*bintree{}}, + }}, + "rbd": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesVolumeRbdBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesVolumeRbdDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesVolumeRbdVersion, map[string]*bintree{}}, + "block.tar.gz": {testImagesVolumeRbdBlockTarGz, map[string]*bintree{}}, + "bootstrap.sh": {testImagesVolumeRbdBootstrapSh, map[string]*bintree{}}, + "ceph.conf.sh": {testImagesVolumeRbdCephConfSh, map[string]*bintree{}}, + "create_block.sh": {testImagesVolumeRbdCreate_blockSh, map[string]*bintree{}}, + "keyring": {testImagesVolumeRbdKeyring, map[string]*bintree{}}, + "mon.sh": {testImagesVolumeRbdMonSh, map[string]*bintree{}}, + "osd.sh": {testImagesVolumeRbdOsdSh, map[string]*bintree{}}, + }}, + }}, + "windows": {nil, map[string]*bintree{ + "Makefile": {testImagesWindowsMakefile, map[string]*bintree{}}, + "busybox-helper": {nil, map[string]*bintree{ + "Dockerfile": {testImagesWindowsBusyboxHelperDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesWindowsBusyboxHelperVersion, map[string]*bintree{}}, + }}, + "powershell-helper": {nil, map[string]*bintree{ + "Dockerfile": {testImagesWindowsPowershellHelperDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesWindowsPowershellHelperVersion, map[string]*bintree{}}, + }}, + }}, + "windows-servercore-cache": {nil, map[string]*bintree{ + "BASEIMAGE": {testImagesWindowsServercoreCacheBaseimage, map[string]*bintree{}}, + "Dockerfile": {testImagesWindowsServercoreCacheDockerfile, map[string]*bintree{}}, + "VERSION": {testImagesWindowsServercoreCacheVersion, map[string]*bintree{}}, + }}, + }}, + }}, +}} + +// RestoreAsset restores an asset under the given directory +func RestoreAsset(dir, name string) error { + data, err := Asset(name) + if err != nil { + return err + } + info, err := AssetInfo(name) + if err != nil { + return err + } + err = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755)) + if err != nil { + return err + } + err = ioutil.WriteFile(_filePath(dir, name), data, info.Mode()) + if err != nil { + return err + } + err = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime()) + if err != nil { + return err + } + return nil +} + +// RestoreAssets restores an asset under the given directory recursively +func RestoreAssets(dir, name string) error { + children, err := AssetDir(name) + // File + if err != nil { + return RestoreAsset(dir, name) + } + // Dir + for _, child := range children { + err = RestoreAssets(dir, filepath.Join(name, child)) + if err != nil { + return err + } + } + return nil +} + +func _filePath(dir, name string) string { + cannonicalName := strings.Replace(name, "\\", "/", -1) + return filepath.Join(append([]string{dir}, strings.Split(cannonicalName, "/")...)...) +}