-
Notifications
You must be signed in to change notification settings - Fork 15
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Upgrade v1beta1 -> v1 and client-go to rel 18
Ref: ff49b6cd5d3109a84ec854d39250342c0b1043c7
1 parent
af8c779
commit 94fd137
Showing
89 changed files
with
3,984 additions
and
2,760 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
// +k8s:deepcopy-gen=package | ||
|
||
// Package v1 is the v1 version of the API. | ||
// +groupName=enroute.saaras.io | ||
package v1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,295 @@ | ||
package v1 | ||
|
||
import ( | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
) | ||
|
||
// GatewayHostSpec defines the spec of the CRD | ||
type GatewayHostSpec struct { | ||
// Virtualhost appears at most once. If it is present, the object is considered | ||
// to be a "root". | ||
VirtualHost *VirtualHost `json:"virtualhost,omitempty"` | ||
// Routes are the ingress routes. If TCPProxy is present, Routes is ignored. | ||
Routes []Route `json:"routes"` | ||
// TCPProxy holds TCP proxy information. | ||
TCPProxy *TCPProxy `json:"tcpproxy,omitempty"` | ||
} | ||
|
||
type RouteAttachedFilter struct { | ||
// Name of the filter attached to this route | ||
Name string `json:"name,omitempty"` | ||
// Type of the filter attached to this route | ||
Type string `json:"type,omitempty"` | ||
} | ||
|
||
type HostAttachedFilter struct { | ||
// Name of the filter attached to this VirtualHost | ||
Name string `json:"name,omitempty"` | ||
// Type of the filter attached to this VirtualHost | ||
Type string `json:"type,omitempty"` | ||
} | ||
|
||
// VirtualHost appears at most once. If it is present, the object is considered | ||
// to be a "root". | ||
type VirtualHost struct { | ||
// The fully qualified domain name of the root of the ingress tree | ||
// all leaves of the DAG rooted at this object relate to the fqdn | ||
Fqdn string `json:"fqdn"` | ||
// If present describes tls properties. The CNI names that will be matched on | ||
// are described in fqdn, the tls.secretName secret must contain a | ||
// matching certificate | ||
TLS *TLS `json:"tls,omitempty"` | ||
|
||
// Filters attached to this VirtualHost | ||
Filters []HostAttachedFilter `json:"filters,omitempty"` | ||
} | ||
|
||
// TLS describes tls properties. The CNI names that will be matched on | ||
// are described in fqdn, the tls.secretName secret must contain a | ||
// matching certificate unless tls.passthrough is set to true. | ||
type TLS struct { | ||
// required, the name of a secret in the current namespace | ||
SecretName string `json:"secretName,omitempty"` | ||
// Minimum TLS version this vhost should negotiate | ||
MinimumProtocolVersion string `json:"minimumProtocolVersion,omitempty"` | ||
// If Passthrough is set to true, the SecretName will be ignored | ||
// and the encrypted handshake will be passed through to the | ||
// backing cluster. | ||
Passthrough bool `json:"passthrough,omitempty"` | ||
} | ||
|
||
// HeaderCondition specifies the header condition to match. | ||
// Name is required. Only one of Present or Contains must | ||
// be provided. | ||
type HeaderCondition struct { | ||
|
||
// Name is the name of the header to match on. Name is required. | ||
// Header names are case insensitive. | ||
Name string `json:"name"` | ||
|
||
// Present is true if the Header is present in the request. | ||
// +optional | ||
Present bool `json:"present,omitempty"` | ||
|
||
// Contains is true if the Header containing this string is present | ||
// in the request. | ||
// +optional | ||
Contains string `json:"contains,omitempty"` | ||
|
||
// NotContains is true if the Header containing this string is not present | ||
// in the request. | ||
// +optional | ||
NotContains string `json:"notcontains,omitempty"` | ||
|
||
// Exact is true if the Header containing this string matches exactly | ||
// in the request. | ||
// +optional | ||
Exact string `json:"exact,omitempty"` | ||
|
||
// NotExact is true if the Header containing this string doesn't match exactly | ||
// in the request. | ||
// +optional | ||
NotExact string `json:"notexact,omitempty"` | ||
} | ||
|
||
// Condition are policies that are applied on top of GatewayHost. | ||
// One of Prefix or Header must be provided. | ||
type Condition struct { | ||
// Prefix defines a prefix match for a request. | ||
// +optional | ||
Prefix string `json:"prefix,omitempty"` | ||
|
||
// Header specifies the header condition to match. | ||
// +optional | ||
Header *HeaderCondition `json:"header,omitempty"` | ||
} | ||
|
||
// Route contains the set of routes for a virtual host | ||
type Route struct { | ||
// Conditions are a set of routing properties that is applied to an GatewayHost in a namespace. | ||
// +optional | ||
Conditions []Condition `json:"conditions,omitempty"` | ||
// Services are the services to proxy traffic | ||
Services []Service `json:"services,omitempty"` | ||
// Delegate specifies that this route should be delegated to another GatewayHost | ||
Delegate *Delegate `json:"delegate,omitempty"` | ||
// Enables websocket support for the route | ||
EnableWebsockets bool `json:"enableWebsockets,omitempty"` | ||
// Allow this path to respond to insecure requests over HTTP which are normally | ||
// not permitted when a `virtualhost.tls` block is present. | ||
PermitInsecure bool `json:"permitInsecure,omitempty"` | ||
// Indicates that during forwarding, the matched prefix (or path) should be swapped with this value | ||
PrefixRewrite string `json:"prefixRewrite,omitempty"` | ||
// The timeout policy for this route | ||
TimeoutPolicy *TimeoutPolicy `json:"timeoutPolicy,omitempty"` | ||
// // The retry policy for this route | ||
RetryPolicy *RetryPolicy `json:"retryPolicy,omitempty"` | ||
// The policy for rewriting the path of the request URL | ||
// after the request has been routed to a Service. | ||
// | ||
// +kubebuilder:validation:Optional | ||
PathRewrite *PathRewritePolicy `json:"pathRewritePolicy,omitempty"` | ||
|
||
// Filters attached to this route | ||
Filters []RouteAttachedFilter `json:"filters,omitempty"` | ||
} | ||
|
||
// PathRewritePolicy specifies how a request URL path should be | ||
// rewritten. This rewriting takes place after a request is routed | ||
// and has no subsequent effects on the proxy's routing decision. | ||
// No HTTP headers or body content is rewritten. | ||
// | ||
// Exactly one field in this struct may be specified. | ||
type PathRewritePolicy struct { | ||
// ReplacePrefix describes how the path prefix should be replaced. | ||
// +kubebuilder:validation:Optional | ||
ReplacePrefix []ReplacePrefix `json:"replacePrefix,omitempty"` | ||
} | ||
|
||
// ReplacePrefix describes a path prefix replacement. | ||
type ReplacePrefix struct { | ||
// Prefix specifies the URL path prefix to be replaced. | ||
// | ||
// If Prefix is specified, it must exactly match the Condition | ||
// prefix that is rendered by the chain of including HTTPProxies | ||
// and only that path prefix will be replaced by Replacement. | ||
// This allows HTTPProxies that are included through multiple | ||
// roots to only replace specific path prefixes, leaving others | ||
// unmodified. | ||
// | ||
// If Prefix is not specified, all routing prefixes rendered | ||
// by the include chain will be replaced. | ||
// | ||
// +kubebuilder:validation:Optional | ||
// +kubebuilder:validation:MinLength=1 | ||
Prefix string `json:"prefix,omitempty"` | ||
|
||
// Replacement is the string that the routing path prefix | ||
// will be replaced with. This must not be empty. | ||
// | ||
// +kubebuilder:validation:Required | ||
// +kubebuilder:validation:MinLength=1 | ||
Replacement string `json:"replacement"` | ||
} | ||
|
||
// TCPProxy contains the set of services to proxy TCP connections. | ||
type TCPProxy struct { | ||
// Services are the services to proxy traffic | ||
Services []Service `json:"services,omitempty"` | ||
// Delegate specifies that this tcpproxy should be delegated to another GatewayHost | ||
Delegate *Delegate `json:"delegate,omitempty"` | ||
} | ||
|
||
// Service defines an upstream to proxy traffic to | ||
type Service struct { | ||
// Name is the name of Kubernetes service to proxy traffic. | ||
// Names defined here will be used to look up corresponding endpoints which contain the ips to route. | ||
Name string `json:"name"` | ||
// Port (defined as Integer) to proxy traffic to since a service can have multiple defined | ||
// | ||
// +required | ||
// +kubebuilder:validation:Minimum=1 | ||
// +kubebuilder:validation:Maximum=65536 | ||
// +kubebuilder:validation:ExclusiveMinimum=false | ||
// +kubebuilder:validation:ExclusiveMaximum=true | ||
Port int `json:"port"` | ||
// Protocol may be used to specify (or override) the protocol used to reach this Service. | ||
// Values may be tls, h2, h2c. If omitted, protocol-selection falls back on Service annotations. | ||
// +kubebuilder:validation:Enum=h2;h2c;tls | ||
// +optional | ||
Protocol string `json:"protocol,omitempty"` | ||
// Weight defines percentage of traffic to balance traffic | ||
// +optional | ||
Weight uint32 `json:"weight,omitempty"` | ||
// HealthCheck defines optional healthchecks on the upstream service | ||
// +optional | ||
HealthCheck *HealthCheck `json:"healthCheck,omitempty"` | ||
// LB Algorithm to apply (see https://github.com/saarasio/enroute/enroute-dp/blob/master/design/gatewayhost-design.md#load-balancing) | ||
// +optional | ||
Strategy string `json:"strategy,omitempty"` | ||
// UpstreamValidation defines how to verify the backend service's certificate | ||
// +optional | ||
UpstreamValidation *UpstreamValidation `json:"validation,omitempty"` | ||
// ClientValidation defines a way to provide client's identity encoded in SAN in a certificate. | ||
// The certificate to send to backend service that it'll verify | ||
// +optional | ||
ClientValidation *UpstreamValidation `json:"clientvalidation,omitempty"` | ||
} | ||
|
||
// Delegate allows for delegating VHosts to other GatewayHosts | ||
type Delegate struct { | ||
// Name of the GatewayHost | ||
Name string `json:"name"` | ||
// Namespace of the GatewayHost | ||
Namespace string `json:"namespace,omitempty"` | ||
} | ||
|
||
// HealthCheck defines optional healthchecks on the upstream service | ||
type HealthCheck struct { | ||
// HTTP endpoint used to perform health checks on upstream service | ||
Path string `json:"path"` | ||
// The value of the host header in the HTTP health check request. | ||
// If left empty (default value), the name "contour-envoy-healthcheck" | ||
// will be used. | ||
Host string `json:"host,omitempty"` | ||
// The interval (seconds) between health checks | ||
IntervalSeconds int64 `json:"intervalSeconds"` | ||
// The time to wait (seconds) for a health check response | ||
TimeoutSeconds int64 `json:"timeoutSeconds"` | ||
// The number of unhealthy health checks required before a host is marked unhealthy | ||
UnhealthyThresholdCount uint32 `json:"unhealthyThresholdCount"` | ||
// The number of healthy health checks required before a host is marked healthy | ||
HealthyThresholdCount uint32 `json:"healthyThresholdCount"` | ||
} | ||
|
||
// TimeoutPolicy define the attributes associated with timeout | ||
type TimeoutPolicy struct { | ||
// Timeout for receiving a response from the server after processing a request from client. | ||
// If not supplied the timeout duration is undefined. | ||
Request string `json:"request"` | ||
} | ||
|
||
// RetryPolicy define the attributes associated with retrying policy | ||
type RetryPolicy struct { | ||
// NumRetries is maximum allowed number of retries. | ||
// If not supplied, the number of retries is zero. | ||
NumRetries uint32 `json:"count"` | ||
// PerTryTimeout specifies the timeout per retry attempt. | ||
// Ignored if NumRetries is not supplied. | ||
PerTryTimeout string `json:"perTryTimeout,omitempty"` | ||
} | ||
|
||
// UpstreamValidation defines how to verify the backend service's certificate | ||
type UpstreamValidation struct { | ||
// Name of the Kubernetes secret be used to validate the certificate presented by the backend | ||
CACertificate string `json:"caSecret"` | ||
// Key which is expected to be present in the 'subjectAltName' of the presented certificate | ||
SubjectName string `json:"subjectName"` | ||
} | ||
|
||
// Status reports the current state of the GatewayHost | ||
type Status struct { | ||
CurrentStatus string `json:"currentStatus"` | ||
Description string `json:"description"` | ||
} | ||
|
||
// +genclient | ||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// GatewayHost is an Ingress CRD specificiation | ||
type GatewayHost struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ObjectMeta `json:"metadata"` | ||
|
||
Spec GatewayHostSpec `json:"spec"` | ||
Status `json:"status"` | ||
} | ||
|
||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// GatewayHostList is a list of GatewayHosts | ||
type GatewayHostList struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ListMeta `json:"metadata"` | ||
Items []GatewayHost `json:"items"` | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
package v1 | ||
|
||
import ( | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
) | ||
|
||
// GlobalConfigSpec defines the spec of the CRD | ||
type GlobalConfigSpec struct { | ||
Name string `json:"name,omitempty"` | ||
Type string `json:"type,omitempty"` | ||
Config string `json:"config,omitempty"` | ||
} | ||
|
||
// +genclient | ||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// GlobalConfig is an Ingress CRD specificiation | ||
type GlobalConfig struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ObjectMeta `json:"metadata"` | ||
|
||
Spec GlobalConfigSpec `json:"spec"` | ||
Status `json:"status"` | ||
} | ||
|
||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// GlobalConfigList is a list of GlobalConfig | ||
type GlobalConfigList struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ListMeta `json:"metadata"` | ||
Items []GlobalConfig `json:"items"` | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
package v1 | ||
|
||
import ( | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
) | ||
|
||
type GenericHttpFilterConfig struct { | ||
Config string `json:"config,omitempty"` | ||
} | ||
|
||
// HttpFilterSpec defines the spec of the CRD | ||
type HttpFilterSpec struct { | ||
Name string `json:"name,omitempty"` | ||
Type string `json:"type,omitempty"` | ||
HttpFilterConfig GenericHttpFilterConfig `json:"httpFilterConfig,omitempty"` | ||
// Service that the filter communicates with to provide the filter functionality | ||
// Eg: jwt server that hosts external JWKS | ||
Service Service `json:"services,omitempty"` | ||
} | ||
|
||
// +genclient | ||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// HttpFilter is an Ingress CRD specificiation | ||
type HttpFilter struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ObjectMeta `json:"metadata"` | ||
|
||
Spec HttpFilterSpec `json:"spec"` | ||
Status `json:"status"` | ||
} | ||
|
||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// HttpFilterList is a list of HttpFilter | ||
type HttpFilterList struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ListMeta `json:"metadata"` | ||
Items []HttpFilter `json:"items"` | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
package v1 | ||
|
||
import ( | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
"k8s.io/apimachinery/pkg/runtime" | ||
"k8s.io/apimachinery/pkg/runtime/schema" | ||
) | ||
|
||
const ( | ||
// GroupName is the group name for the Contour API | ||
GroupName = "enroute.saaras.io" | ||
) | ||
|
||
var ( | ||
// SchemeBuilder collects the scheme builder functions for the Enroute API | ||
SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes) | ||
|
||
// AddToScheme applies the SchemeBuilder functions to a specified scheme | ||
AddToScheme = SchemeBuilder.AddToScheme | ||
) | ||
|
||
// SchemeGroupVersion is the GroupVersion for the Contour API | ||
var SchemeGroupVersion = schema.GroupVersion{Group: GroupName, Version: "v1"} | ||
|
||
// Resource gets an Contour GroupResource for a specified resource | ||
func Resource(resource string) schema.GroupResource { | ||
return SchemeGroupVersion.WithResource(resource).GroupResource() | ||
} | ||
|
||
func addKnownTypes(scheme *runtime.Scheme) error { | ||
scheme.AddKnownTypes(SchemeGroupVersion, | ||
&GatewayHost{}, | ||
&GatewayHostList{}, | ||
&GlobalConfig{}, | ||
&GlobalConfigList{}, | ||
&HttpFilter{}, | ||
&HttpFilterList{}, | ||
&RouteFilter{}, | ||
&RouteFilterList{}, | ||
&TLSCertificateDelegation{}, | ||
&TLSCertificateDelegationList{}, | ||
) | ||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion) | ||
return nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
package v1 | ||
|
||
import ( | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
) | ||
|
||
type GenericRouteFilterConfig struct { | ||
Config string `json:"config,omitempty"` | ||
} | ||
|
||
// RouteFilterSpec defines the spec of the CRD | ||
type RouteFilterSpec struct { | ||
Name string `json:"name,omitempty"` | ||
Type string `json:"type,omitempty"` | ||
RouteFilterConfig GenericRouteFilterConfig `json:"routeFilterConfig,omitempty"` | ||
// Service that the filter may need to communicate with to provide the filter functionality | ||
// Eg: jwt server that hosts external JWKS | ||
Service Service `json:"services,omitempty"` | ||
} | ||
|
||
// +genclient | ||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// RouteFilter is an Ingress CRD specificiation | ||
type RouteFilter struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ObjectMeta `json:"metadata"` | ||
|
||
Spec RouteFilterSpec `json:"spec"` | ||
Status `json:"status"` | ||
} | ||
|
||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// RouteFilterList is a list of RouteFilter | ||
type RouteFilterList struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ListMeta `json:"metadata"` | ||
Items []RouteFilter `json:"items"` | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
package v1 | ||
|
||
import ( | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
) | ||
|
||
// TLSCertificateDelegationSpec defines the spec of the CRD | ||
type TLSCertificateDelegationSpec struct { | ||
Delegations []CertificateDelegation `json:"delegations"` | ||
} | ||
|
||
// CertificateDelegation maps the authority to reference a secret | ||
// in the current namespace to a set of namespaces. | ||
type CertificateDelegation struct { | ||
|
||
// required, the name of a secret in the current namespace. | ||
SecretName string `json:"secretName"` | ||
|
||
// required, the namespaces the authority to reference the | ||
// the secret will be delegated to. | ||
// If TargetNamespaces is nil or empty, the CertificateDelegation' | ||
// is ignored. If the TargetNamespace list contains the character, "*" | ||
// the secret will be delegated to all namespaces. | ||
TargetNamespaces []string `json:"targetNamespaces"` | ||
} | ||
|
||
// +genclient | ||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// TLSCertificateDelegation is an TLS Certificate Delegation CRD specificiation. | ||
// See design/tls-certificate-delegation.md for details. | ||
type TLSCertificateDelegation struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ObjectMeta `json:"metadata"` | ||
|
||
Spec TLSCertificateDelegationSpec `json:"spec"` | ||
} | ||
|
||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||
|
||
// TLSCertificateDelegationList is a list of TLSCertificateDelegations. | ||
type TLSCertificateDelegationList struct { | ||
metav1.TypeMeta `json:",inline"` | ||
metav1.ListMeta `json:"metadata"` | ||
Items []TLSCertificateDelegation `json:"items"` | ||
} |
Large diffs are not rendered by default.
Oops, something went wrong.
34 changes: 9 additions & 25 deletions
34
enroute-dp/apis/generated/clientset/versioned/clientset.go
Oops, something went wrong.
Oops, something went wrong.
26 changes: 5 additions & 21 deletions
26
enroute-dp/apis/generated/clientset/versioned/fake/clientset_generated.go
Oops, something went wrong.
Oops, something went wrong.
20 changes: 2 additions & 18 deletions
20
enroute-dp/apis/generated/clientset/versioned/fake/register.go
Oops, something went wrong.
16 changes: 0 additions & 16 deletions
16
enroute-dp/apis/generated/clientset/versioned/scheme/doc.go
Oops, something went wrong.
20 changes: 2 additions & 18 deletions
20
enroute-dp/apis/generated/clientset/versioned/scheme/register.go
Oops, something went wrong.
7 changes: 7 additions & 0 deletions
7
enroute-dp/apis/generated/clientset/versioned/typed/enroute/v1/doc.go
Oops, something went wrong.
96 changes: 96 additions & 0 deletions
96
enroute-dp/apis/generated/clientset/versioned/typed/enroute/v1/enroute_client.go
Oops, something went wrong.
7 changes: 7 additions & 0 deletions
7
enroute-dp/apis/generated/clientset/versioned/typed/enroute/v1/fake/doc.go
Oops, something went wrong.
43 changes: 43 additions & 0 deletions
43
enroute-dp/apis/generated/clientset/versioned/typed/enroute/v1/fake/fake_enroute_client.go
Oops, something went wrong.
66 changes: 25 additions & 41 deletions
66
.../enroute/v1beta1/fake/fake_gatewayhost.go → ...typed/enroute/v1/fake/fake_gatewayhost.go
Oops, something went wrong.
66 changes: 25 additions & 41 deletions
66
...enroute/v1beta1/fake/fake_globalconfig.go → ...yped/enroute/v1/fake/fake_globalconfig.go
Oops, something went wrong.
66 changes: 25 additions & 41 deletions
66
...d/enroute/v1beta1/fake/fake_httpfilter.go → .../typed/enroute/v1/fake/fake_httpfilter.go
Oops, something went wrong.
66 changes: 25 additions & 41 deletions
66
.../enroute/v1beta1/fake/fake_routefilter.go → ...typed/enroute/v1/fake/fake_routefilter.go
Oops, something went wrong.
60 changes: 22 additions & 38 deletions
60
...ta1/fake/fake_tlscertificatedelegation.go → .../v1/fake/fake_tlscertificatedelegation.go
Oops, something went wrong.
72 changes: 28 additions & 44 deletions
72
...oned/typed/enroute/v1beta1/gatewayhost.go → ...versioned/typed/enroute/v1/gatewayhost.go
Oops, something went wrong.
16 changes: 16 additions & 0 deletions
16
enroute-dp/apis/generated/clientset/versioned/typed/enroute/v1/generated_expansion.go
Oops, something went wrong.
72 changes: 28 additions & 44 deletions
72
...ned/typed/enroute/v1beta1/globalconfig.go → ...ersioned/typed/enroute/v1/globalconfig.go
Oops, something went wrong.
72 changes: 28 additions & 44 deletions
72
...ioned/typed/enroute/v1beta1/httpfilter.go → .../versioned/typed/enroute/v1/httpfilter.go
Oops, something went wrong.
72 changes: 28 additions & 44 deletions
72
...oned/typed/enroute/v1beta1/routefilter.go → ...versioned/typed/enroute/v1/routefilter.go
Oops, something went wrong.
Oops, something went wrong.