diff --git a/.bazelrc b/.bazelrc index f2febd90ee..1d211660f2 100644 --- a/.bazelrc +++ b/.bazelrc @@ -1,6 +1,9 @@ -build --workspace_status_command=./hack/print-workspace-status.sh build --verbose_failures +build --define=MANAGER_IMAGE_NAME=cluster-api-aws-controller +build --define=MANAGER_IMAGE_TAG=0.0.3 +build --define=REGISTRY_STABLE=gcr.io/cluster-api-provider-aws +build --workspace_status_command=./hack/print-workspace-status.sh run --workspace_status_command=./hack/print-workspace-status.sh test --features=race --test_output=errors diff --git a/.gitignore b/.gitignore index 1bd1209816..7e14ea155b 100644 --- a/.gitignore +++ b/.gitignore @@ -27,6 +27,9 @@ kind.kubeconfig minikube.kubeconfig kubeconfig +# vscode debugging bits +hack/scratch + # binaries /manager /clusterctl diff --git a/BUILD.bazel b/BUILD.bazel index 3296ec612f..cbde8a3caa 100644 --- a/BUILD.bazel +++ b/BUILD.bazel @@ -37,9 +37,9 @@ package(default_visibility = ["//visibility:public"]) # gazelle:exclude vendor/github.com/golang/dep/cmd/dep/testdata gazelle( name = "gazelle", + build_tags = ["integration"], command = "fix", external = "vendored", - build_tags = ["integration"], ) filegroup( @@ -54,6 +54,15 @@ workspace_binary( cmd = "@com_github_golang_dep//cmd/dep", ) +filegroup( + name = "mocks", + srcs = [ + "//pkg/cloud/aws/services/ec2/mock_ec2iface:go_default_library", + "//pkg/cloud/aws/services/elb/mock_elbiface:go_default_library", + "//pkg/cloud/aws/services/mocks:go_mock_interfaces", + ], +) + workspace_binary( name = "generate", args = [ @@ -76,22 +85,27 @@ workspace_binary( cmd = "@com_github_golangci_golangci-lint//cmd/golangci-lint", ) +workspace_binary( + name = "kind-reset", + args = ["delete cluster --name=clusterapi"], + cmd = "@io_k8s_sigs_kind//:kind", + ignore_error = True, +) + filegroup( name = "all-srcs", srcs = glob(["**"]), ) filegroup( - name = "cluster-api-kustomize-yaml", + name = "kubebuilder-api", srcs = glob([ - "vendor/sigs.k8s.io/cluster-api/config/crds/*.yaml", - "vendor/sigs.k8s.io/cluster-api/config/rbac/*.yaml", - "vendor/sigs.k8s.io/cluster-api/config/manager/*.yaml", - "vendor/sigs.k8s.io/cluster-api/config/default/*.yaml", + "pkg/apis:go_default_library", + "pkg/controller:go_default_library", ]), - visibility = ["//visibility:public"], ) exports_files(glob([ "WORKSPACE", + "PROJECT", ])) diff --git a/Gopkg.lock b/Gopkg.lock index 2e74732b77..72fa9fc312 100644 --- a/Gopkg.lock +++ b/Gopkg.lock @@ -474,6 +474,14 @@ revision = "0ca9ea5df5451ffdf184b4428c902747c2c11cd7" version = "v1.0.0" +[[projects]] + branch = "master" + digest = "1:68cecd4c1137f77dfa2db1f13a0ceef2b5606d6b69d66fa69f7df1b2f2fe9afc" + name = "github.com/shurcool/httpfs" + packages = ["vfsutil"] + pruneopts = "UT" + revision = "74dc9339e414ad069a8d04bba7e7aafd08043a25" + [[projects]] digest = "1:d707dbc1330c0ed177d4642d6ae102d5e2c847ebd0eb84562d0dc4f024531cfc" name = "github.com/spf13/afero" @@ -1068,6 +1076,7 @@ "github.com/onsi/gomega/gstruct", "github.com/onsi/gomega/types", "github.com/pkg/errors", + "github.com/shurcool/httpfs/vfsutil", "github.com/spf13/cobra", "github.com/spf13/pflag", "golang.org/x/net/context", diff --git a/Makefile b/Makefile index 0dccdd73d9..458ab79241 100644 --- a/Makefile +++ b/Makefile @@ -20,15 +20,10 @@ FASTBUILD ?= n ## Set FASTBUILD=y (case-sensitive) to skip some slow tasks ## Image URL to use all building/pushing image targets -STABLE_DOCKER_REPO ?= gcr.io/cluster-api-provider-aws -MANAGER_IMAGE_NAME ?= cluster-api-aws-controller -MANAGER_IMAGE_TAG ?= 0.0.3 -MANAGER_IMAGE ?= $(STABLE_DOCKER_REPO)/$(MANAGER_IMAGE_NAME):$(MANAGER_IMAGE_TAG) -DEV_DOCKER_REPO ?= gcr.io/$(shell gcloud config get-value project) -DEV_MANAGER_IMAGE ?= $(DEV_DOCKER_REPO)/$(MANAGER_IMAGE_NAME):$(MANAGER_IMAGE_TAG) - +REGISTRY_DEV ?= gcr.io/$(shell gcloud config get-value project) DEPCACHEAGE ?= 24h # Enables caching for Dep BAZEL_ARGS ?= +BAZEL_DOCKER_ARGS := --define=REGISTRY_DEV=$(REGISTRY_DEV) $(BAZEL_ARGS) # Bazel variables BAZEL_VERSION := $(shell command -v bazel 2> /dev/null) @@ -37,8 +32,11 @@ DEP ?= bazel run dep # determine the OS HOSTOS := $(shell go env GOHOSTOS) HOSTARCH := $(shell go env GOARCH) +GOPATH := $(shell go env GOPATH) BINARYPATHPATTERN :=${HOSTOS}_${HOSTARCH}_* +export GOPATH + ifndef BAZEL_VERSION $(error "Bazel is not available. \ Installation instructions can be found at \ @@ -70,25 +68,9 @@ gazelle: ## Run Bazel Gazelle check-install: ## Checks that you've installed this repository correctly @./scripts/check-install.sh -.PHONY: manager -manager: generate ## Build manager binary. - bazel build //cmd/manager $(BAZEL_ARGS) - install bazel-bin/cmd/manager/${BINARYPATHPATTERN}/manager $(shell go env GOPATH)/bin/aws-manager - -.PHONY: clusterctl -clusterctl: generate ## Build clusterctl binary. - bazel build --workspace_status_command=./hack/print-workspace-status.sh //cmd/clusterctl $(BAZEL_ARGS) - install bazel-bin/cmd/clusterctl/${BINARYPATHPATTERN}/clusterctl $(shell go env GOPATH)/bin/clusterctl - -.PHONY: clusterawsadm -clusterawsadm: dep-ensure ## Build clusterawsadm binary. - bazel build --workspace_status_command=./hack/print-workspace-status.sh //cmd/clusterawsadm $(BAZEL_ARGS) - install bazel-bin/cmd/clusterawsadm/${BINARYPATHPATTERN}/clusterawsadm $(shell go env GOPATH)/bin/clusterawsadm - .PHONY: release-binaries release-binaries: ## Build release binaries - bazel build --platforms=@io_bazel_rules_go//go/toolchain:linux_amd64 //cmd/clusterctl //cmd/clusterawsadm - bazel build --platforms=@io_bazel_rules_go//go/toolchain:darwin_amd64 //cmd/clusterctl //cmd/clusterawsadm + bazel build --platforms=@io_bazel_rules_go//go/toolchain:linux_amd64,@io_bazel_rules_go//go/toolchain:darwin_amd64 --build_tag_filters=cli //... mkdir -p out install bazel-bin/cmd/clusterawsadm/darwin_amd64_pure_stripped/clusterawsadm out/clusterawsadm-darwin-amd64 install bazel-bin/cmd/clusterawsadm/linux_amd64_pure_stripped/clusterawsadm out/clusterawsadm-linux-amd64 @@ -97,34 +79,27 @@ release-binaries: ## Build release binaries .PHONY: test verify test: generate verify ## Run tests - bazel test --nosandbox_debug //pkg/... //cmd/... $(BAZEL_ARGS) + bazel test //pkg/... //cmd/... $(BAZEL_ARGS) verify: ./hack/verify_boilerplate.py -.PHONY: copy-genmocks -copy-genmocks: ## Copies generated mocks into the repository - cp -Rf bazel-genfiles/pkg/* pkg/ - -BAZEL_DOCKER_ARGS_COMMON := --define=MANAGER_IMAGE_NAME=$(MANAGER_IMAGE_NAME) --define=MANAGER_IMAGE_TAG=$(MANAGER_IMAGE_TAG) $(BAZEL_ARGS) -BAZEL_DOCKER_ARGS := --define=DOCKER_REPO=$(STABLE_DOCKER_REPO) $(BAZEL_DOCKER_ARGS_COMMON) -BAZEL_DOCKER_ARGS_DEV := --define=DOCKER_REPO=$(DEV_DOCKER_REPO) $(BAZEL_DOCKER_ARGS_COMMON) - .PHONY: docker-build -docker-build: generate ## Build the production docker image +docker-build: generate provider-components ## Build the production docker image bazel run //cmd/manager:manager-image $(BAZEL_DOCKER_ARGS) -.PHONY: docker-build-dev -docker-build-dev: generate ## Build the development docker image - bazel run //cmd/manager:manager-image $(BAZEL_DOCKER_ARGS_DEV) - .PHONY: docker-push -docker-push: generate ## Push production docker image +docker-push: generate provider-components ## Push production docker image bazel run //cmd/manager:manager-push $(BAZEL_DOCKER_ARGS) .PHONY: docker-push-dev -docker-push-dev: generate ## Push development image - bazel run //cmd/manager:manager-push $(BAZEL_DOCKER_ARGS_DEV) +docker-push-dev: generate provider-components-dev ## Push development image + bazel run //cmd/manager:manager-push-dev $(BAZEL_DOCKER_ARGS) + +.PHONY: provider-components-dev +provider-components-dev: provider-components ## Generate Kustomize version patch for the Docker image + bazel build //cmd/manager:manager-version-patch-dev $(BAZEL_DOCKER_ARGS) + install bazel-genfiles/cmd/manager/manager-version-patch-dev.yaml cmd/manager .PHONY: clean clean: ## Remove all generated files @@ -138,55 +113,24 @@ clean: ## Remove all generated files reset-bazel: ## Deep cleaning for bazel bazel clean --expunge -cmd/clusterctl/examples/aws/out: - ./cmd/clusterctl/examples/aws/generate-yaml.sh - -cmd/clusterctl/examples/aws/out/credentials: cmd/clusterctl/examples/aws/out ## Generate k8s secret for AWS credentials - clusterawsadm alpha bootstrap generate-aws-default-profile > cmd/clusterctl/examples/aws/out/credentials - -.PHONY: examples -examples: ## Generate example output - $(MAKE) cmd/clusterctl/examples/aws/out MANAGER_IMAGE=${MANAGER_IMAGE} - -.PHONY: examples-dev -examples-dev: ## Generate example output with developer image - $(MAKE) cmd/clusterctl/examples/aws/out MANAGER_IMAGE=${DEV_MANAGER_IMAGE} - -.PHONY: manifests -manifests: cmd/clusterctl/examples/aws/out/credentials ## Generate manifests for clusterctl - go run vendor/sigs.k8s.io/controller-tools/cmd/controller-gen/main.go crd - kustomize build config/default/ > cmd/clusterctl/examples/aws/out/provider-components.yaml - echo "---" >> cmd/clusterctl/examples/aws/out/provider-components.yaml - kustomize build vendor/sigs.k8s.io/cluster-api/config/default/ >> cmd/clusterctl/examples/aws/out/provider-components.yaml - -.PHONY: manifests-dev -manifests-dev: dep-ensure dep-install binaries-dev ## Builds development manifests - MANAGER_IMAGE=$(DEV_MANAGER_IMAGE) MANAGER_IMAGE_PULL_POLICY="Always" $(MAKE) manifests - -# TODO(vincepri): This should move to rebuild Bazel binaries once every -# make target uses Bazel bins to run operations. -.PHONY: binaries-dev -binaries-dev: ## Builds and installs the binaries on the local GOPATH - go get -v ./... - go install -v ./... - -.PHONY: create-cluster -create-cluster: ## Create a Kubernetes cluster on AWS using examples - clusterctl create cluster -v 3 \ - --provider aws \ - --bootstrap-type kind \ - -m ./cmd/clusterctl/examples/aws/out/machines.yaml \ - -c ./cmd/clusterctl/examples/aws/out/cluster.yaml \ - -p ./cmd/clusterctl/examples/aws/out/provider-components.yaml \ - -a ./cmd/clusterctl/examples/aws/out/addons.yaml +.PHONY: cli-dev +cli-dev: ## Builds and installs the binaries on the local GOPATH + bazel build --build_tag_filters=cli //... $(BAZEL_ARGS) + install bazel-bin/cmd/clusterawsadm/${BINARYPATHPATTERN}/clusterawsadm $(GOPATH)/bin/clusterawsadm + install bazel-bin/cmd/clusterctl/${BINARYPATHPATTERN}/clusterctl $(GOPATH)/bin/clusterctl + +.PHONY: lint-full lint-full: dep-ensure ## Run slower linters to detect possible issues bazel run //:lint-full $(BAZEL_ARGS) -## Define kind dependencies here. - kind-reset: ## Destroys the "clusterapi" kind cluster. - kind delete cluster --name=clusterapi || true + bazel run //:kind-reset $(BAZEL_ARGS) + +.PHONY: config +config: ## Create Kubernetes API components + bazel build //config + cp -Rf bazel-genfiles/config/* config/ ifneq ($(FASTBUILD),y) @@ -194,12 +138,7 @@ ifneq ($(FASTBUILD),y) .PHONY: generate generate: gazelle dep-ensure ## Run go generate - GOPATH=$(shell go env GOPATH) bazel run //:generate $(BAZEL_ARGS) - $(MAKE) dep-ensure - bazel build $(BAZEL_ARGS) //pkg/cloud/aws/services/mocks:go_mock_interfaces \ - //pkg/cloud/aws/services/ec2/mock_ec2iface:go_default_library \ - //pkg/cloud/aws/services/elb/mock_elbiface:go_default_library - cp -Rf bazel-genfiles/pkg/* pkg/ + bazel build --build_tag_filters=generated //... $(BAZEL_ARGS) .PHONY: lint lint: dep-ensure ## Lint codebase diff --git a/WORKSPACE b/WORKSPACE index 5b2e6d68bf..100718e9ec 100644 --- a/WORKSPACE +++ b/WORKSPACE @@ -41,6 +41,16 @@ http_archive( urls = ["https://github.com/kubernetes/repo-infra/archive/e8f2f7c3decf03e1fde9f30d249e39b8328aa8b0.tar.gz"], ) +git_repository( + name = "bazel_skylib", + commit = "4b67f5ff384d1d2b0925299e0c1919d36b4ecaab", + remote = "https://github.com/bazelbuild/bazel-skylib.git", +) + +load("@bazel_skylib//:workspace.bzl", "bazel_skylib_workspace") + +bazel_skylib_workspace() + load("@io_bazel_rules_go//go:def.bzl", "go_register_toolchains", "go_rules_dependencies") go_rules_dependencies() @@ -80,8 +90,8 @@ go_repository( name = "com_github_golang_dep", build_file_generation = "on", importpath = "github.com/golang/dep", - strip_prefix = "dep-22125cfaa6ddc71e145b1535d4b7ee9744fefff2", - urls = ["https://github.com/golang/dep/archive/22125cfaa6ddc71e145b1535d4b7ee9744fefff2.zip"], + strip_prefix = "dep-73b3afefe4973c8d023870b691e9227a13569870", + urls = ["https://github.com/golang/dep/archive/73b3afefe4973c8d023870b691e9227a13569870.zip"], ) go_repository( @@ -119,9 +129,15 @@ go_repository( ) go_repository( - name = "com_github_a8m_envsubst", - commit = "41dec2456c86b2a9fa51a22a808b7084b8d52c64", # v1.1.0 - importpath = "github.com/a8m/envsubst", + name = "com_github_shurcool_vfsgen", + commit = "a97a25d856cadfe6481325baeb35a70d6723ca0c", + importpath = "github.com/shurcool/vfsgen", +) + +go_repository( + name = "com_github_shurcool_httpfs", + commit = "809beceb23714880abc4a382a00c05f89d13b1cc", + importpath = "github.com/shurcooL/httpfs", ) # for @io_k8s_kubernetes diff --git a/build/BUILD b/build/BUILD index e69de29bb2..cf3bca475d 100644 --- a/build/BUILD +++ b/build/BUILD @@ -0,0 +1,3 @@ +exports_files([ + "stateful_set_patch.yaml", +]) diff --git a/build/add_file.bzl b/build/add_file.bzl new file mode 100644 index 0000000000..ac8cee5beb --- /dev/null +++ b/build/add_file.bzl @@ -0,0 +1,35 @@ +# Copyright 2018 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# This is a modified version of the same rule from kubernetes/repo-infra +# modified to add the GO SDK to the PATH environment variable. + +# Writes out a script which saves the runfiles directory, +# changes to the workspace root, and then runs a command. + +def add_file(in_file, output, path = None): + output_path = output + input_path = in_file.path + + if path and in_file.short_path.startswith(path): + output_path += in_file.short_path[len(path):] + + return [ + "mkdir -p $(dirname %s)" % output_path, + "test -L %s || ln -s $(pwd)/%s %s" % (output_path, input_path, output_path), + ] + +def add_files(in_files, path = None): + cmds = [add_file(in_file, in_file.path.build_output, path) for in_file in in_files] + return cmds.join(" && ") diff --git a/build/cluster_api_binary_image.bzl b/build/cluster_api_binary_image.bzl deleted file mode 100644 index 362b22b040..0000000000 --- a/build/cluster_api_binary_image.bzl +++ /dev/null @@ -1,61 +0,0 @@ -# Copyright 2018 The Kubernetes Authors. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -# This is a modified version of the same rule from kubernetes/repo-infra -# modified to add the GO SDK to the PATH environment variable. - -# Writes out a script which saves the runfiles directory, -# changes to the workspace root, and then runs a command. - -load("@io_bazel_rules_docker//go:image.bzl", "go_image") -load("@io_bazel_rules_docker//container:push.bzl", "container_push") -load("@io_bazel_rules_docker//contrib:push-all.bzl", "docker_push") -load("@io_bazel_rules_docker//container:container.bzl", "container_bundle") - -def cluster_api_binary_image(name): - go_image( - name = name + "-amd64", - base = "@golang-image//image", - embed = [":go_default_library"], - goarch = "amd64", - goos = "linux", - pure = "on", - visibility = ["//visibility:public"], - ) - - tags = [ - "{GIT_VERSION}", - "$(MANAGER_IMAGE_TAG)", - ] - - container_bundle( - name = name + "-image", - images = { - "{registry}/{name}:{tag}".format( - registry = "$(DOCKER_REPO)", - name = "$(MANAGER_IMAGE_NAME)", - tag = tag, - ): ":{name}-amd64".format(name = name) - for tag in tags - }, - stamp = True, - tags = ["manual"], - visibility = ["//visibility:public"], - ) - - docker_push( - name = name + "-push", - bundle = ":{name}-image".format(name = name), - tags = ["manual"], - ) diff --git a/build/controller_gen.bzl b/build/controller_gen.bzl new file mode 100644 index 0000000000..4695befe72 --- /dev/null +++ b/build/controller_gen.bzl @@ -0,0 +1,78 @@ +# Copyright 2018 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# TODO: Move this to Kubebuilder repository + +load("@io_bazel_rules_go//go:def.bzl", "go_library") +load("@io_kubernetes_build//defs:go.bzl", "go_genrule") +load("//build:install.bzl", "install") + +CONTROLLER_GEN = "//vendor/sigs.k8s.io/controller-tools/cmd/controller-gen" + +def _qualified_genfile(label): + return "$$GO_GENRULE_EXECROOT/$(location %s)" % label + +def controller_gen(name, importpath, api, visibility, deps = []): + outs = [ + "rbac/rbac_role.yaml", + "rbac/rbac_role_binding.yaml", + ] + + real_deps = [ + "//pkg/apis:go_default_library", + "//pkg/cloud/aws/actuators/cluster:go_default_library", + "//pkg/cloud/aws/actuators/machine:go_default_library", + ] + deps + + for g in api: + group = g["group"] + version = g["version"].lower() + types = g["types"] + prefix = group.split(".")[0].lower() + real_deps += [ "//pkg/apis/%s:go_default_library" % prefix] + for t in types: + basename = t.lower() + out = "crds/%s_%s_%s.yaml" % (prefix, version, basename) + outs += [out] + + cmd = """mkdir -p {source_package} && \\ + cd {source_package} && \\ + cp -f {project} {source_package} && \\ + GENDIR=$$(dirname {gendir})/../.. && \\ + {controller_gen} all && \\ + cp -fR config $$GENDIR + """.format( + controller_gen = _qualified_genfile(CONTROLLER_GEN), + project = _qualified_genfile("//:PROJECT"), + gendir = _qualified_genfile(outs[0]), + source_package = "$$GOPATH/src/%s" % importpath + ) + + go_genrule( + name = name, + outs = outs, + srcs = ["//:PROJECT"], + cmd = cmd, + go_deps = real_deps, + visibility = visibility, + tools = [CONTROLLER_GEN], + tags = [ "generated" ], + ) + + install( + name = name + "_install", + srcs = outs, + tags = [ "generated" ], + visibility = visibility, + ) \ No newline at end of file diff --git a/build/genfile.bzl b/build/genfile.bzl new file mode 100644 index 0000000000..e98d514ffc --- /dev/null +++ b/build/genfile.bzl @@ -0,0 +1,49 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +""" +Create a manager stateful set patch file for use with Kustomize +""" + +# Label of the template file to use. +_TEMPLATE = "//build:stateful_set_patch.yaml" + +def _genfile_impl(ctx): + ctx.actions.expand_template( + template = ctx.file._template, + output = ctx.outputs.source_file, + substitutions = { + "": ctx.var[ctx.attr.docker_repo_var], + "": ctx.var["MANAGER_IMAGE_NAME"], + "": ctx.var["MANAGER_IMAGE_TAG"] + }, + ) + + return [ + OutputGroupInfo( + compilation_outputs = [ctx.outputs.source_file], + ), + DefaultInfo( + files = depset([ctx.outputs.source_file]), + runfiles = ctx.runfiles(files = [ctx.outputs.source_file]), + )] + +genfile = rule( + attrs = { + "srcs": attr.label(mandatory = True), + }, + output_to_genfiles = True, + outputs = {"source_file": "%{name}.yaml"}, + implementation = _genfile, +) diff --git a/build/go_mock.bzl b/build/go_mock.bzl index beb9429d89..18d9a0295a 100644 --- a/build/go_mock.bzl +++ b/build/go_mock.bzl @@ -14,17 +14,25 @@ load("@io_bazel_rules_go//go:def.bzl", "go_library") load("@io_kubernetes_build//defs:go.bzl", "go_genrule") +load("//build:install.bzl", "install") MOCKGEN = "@com_github_golang_mock//mockgen" + MOCKGEN_LIBS = [ - "@com_github_golang_mock//mockgen/model:go_default_library", - "//vendor/github.com/golang/mock/gomock:go_default_library", + "@com_github_golang_mock//mockgen/model:go_default_library", + "//vendor/github.com/golang/mock/gomock:go_default_library", ] + ASM_SHIM = "//build/asm_shim" + ASM_SHIM_LIB = "%s:go_default_library" % ASM_SHIM + TEXTFLAG_SHIM = "%s:textflag.h" % ASM_SHIM + SDK_INCLUDE_DIR = "$$GOROOT/pkg/include" + BOILERPLATE = "//hack:boilerplate/boilerplate.go.txt" + GO_FLAGS = "CGO_ENABLED=0" def _qualified_genfile(label): @@ -40,6 +48,7 @@ def go_mock(name, importpath, visibility, mocks, deps): importpath = importpath, deps = deps + MOCKGEN_LIBS , visibility = visibility, + tags = [ "generated" ] ) for m in mocks: @@ -88,4 +97,11 @@ echo "\n\n" >> {qualified_out} && \\ cmd = cmd, go_deps = full_deps, tools = [MOCKGEN], + tags = [ "generated" ] + ) + + install( + name = out_basename + "_install", + srcs = [ out_basename ], + tags = [ "generated" ] ) diff --git a/build/install.bzl b/build/install.bzl new file mode 100644 index 0000000000..689d66be0a --- /dev/null +++ b/build/install.bzl @@ -0,0 +1,63 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +""" +Create a manager stateful set patch file for use with Kustomize +""" + +load("@bazel_skylib//lib:paths.bzl", "paths") + +def _install_impl(ctx): + + cmd = "" + + for s in ctx.attr.srcs: + files = s.files.to_list() + file = files[0].path + root_file = paths.relativize(file,"bazel-out/k8-fastbuild/genfiles/") + if cmd == "": + sep = "" + else: + sep = " &&" + cmd = cmd + "%s cp -f %s %s" % (sep, file, root_file) + + cmd = cmd + " && touch %s" % ctx.outputs.record.path + + ctx.actions.run_shell( + inputs = ctx.files.srcs, + outputs = [ctx.outputs.record], + command = cmd, + use_default_shell_env = True, + execution_requirements = { + "no-sandbox": "1", + "no-cache": "1", + "no-remote": "1", + "local": "1", + }, + ) + +install = rule( + attrs = { + "srcs": attr.label_list( + mandatory = True, + allow_files = True, + ), + }, + output_to_genfiles = True, + outputs = { + # "script": "%{name}.install.sh", + "record": ".install.%{name}.record", + }, + implementation = _install_impl, +) diff --git a/build/merge_yaml.bzl b/build/merge_yaml.bzl new file mode 100644 index 0000000000..4c4c82bf9f --- /dev/null +++ b/build/merge_yaml.bzl @@ -0,0 +1,53 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +""" +Create a manager stateful set patch file for use with Kustomize +""" + +def _merge_yaml_impl(ctx): + + out = ctx.outputs.manifest.path + + cmd = "echo --- > %s" % out + + for s in ctx.attr.srcs: + files = s.files.to_list() + file = files[0].path + + cmd = cmd + " && cat {file} >> {out} && echo --- >> {out}".format(file = file, out = out) + + ctx.actions.run_shell( + inputs = ctx.files.srcs, + outputs = [ctx.outputs.manifest], + progress_message = "Merging to YAML file: %s" % ctx.outputs.manifest.path, + command = cmd + ) + +merge_yaml = rule( + attrs = { + "srcs": attr.label_list( + mandatory = True, + allow_files = [ + ".yml", + ".yaml", + ".json", + ], + ), + "out": attr.string(mandatory = True), + }, + output_to_genfiles = True, + outputs = {"manifest": "%{out}"}, + implementation = _merge_yaml_impl, +) diff --git a/build/run_in_workspace_with_goroot.bzl b/build/run_in_workspace_with_goroot.bzl index 5280630f5c..12136576b2 100644 --- a/build/run_in_workspace_with_goroot.bzl +++ b/build/run_in_workspace_with_goroot.bzl @@ -1,4 +1,4 @@ -# Copyright 2018 The Kubernetes Authors. +# Copyright 2019 The Kubernetes Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -19,6 +19,11 @@ # changes to the workspace root, and then runs a command. def _workspace_binary_script_impl(ctx): + if ctx.attr.ignore_error: + bash_ignore_error = "true" + else: + bash_ignore_error = "false" + content = """#!/usr/bin/env bash set -o errexit set -o nounset @@ -27,11 +32,12 @@ GOBINDIR=$(dirname $(readlink {go_bin})) export PATH=$GOBINDIR:$PATH BASE=$(pwd) cd $(dirname $(readlink {root_file})) -"$BASE/{cmd}" $@ +"$BASE/{cmd}" $@ || {ignore_error} """.format( cmd = ctx.file.cmd.short_path, root_file = ctx.file.root_file.short_path, go_bin = ctx.file.go_bin.short_path, + ignore_error = bash_ignore_error, ) ctx.actions.write( output = ctx.outputs.executable, @@ -64,6 +70,9 @@ _workspace_binary_script = rule( allow_files = True, single_file = True, ), + "ignore_error": attr.bool( + mandatory = True, + ), }, executable = True, implementation = _workspace_binary_script_impl, @@ -85,6 +94,9 @@ def workspace_binary( args = None, visibility = None, go_bin = "@go_sdk//:bin/go", + srcs = [], + data = [], + ignore_error = False, root_file = "//:WORKSPACE"): script_name = name + "_script" _workspace_binary_script( @@ -92,12 +104,14 @@ def workspace_binary( cmd = cmd, root_file = root_file, go_bin = go_bin, + ignore_error = ignore_error, tags = ["manual"], ) native.sh_binary( name = name, - srcs = [":" + script_name], + srcs = [":" + script_name] + srcs, args = args, visibility = visibility, + data = data, tags = ["manual"], ) diff --git a/build/stateful_set_patch.bzl b/build/stateful_set_patch.bzl new file mode 100644 index 0000000000..0ca5e45a2e --- /dev/null +++ b/build/stateful_set_patch.bzl @@ -0,0 +1,53 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +""" +Create a manager stateful set patch file for use with Kustomize +""" + +# Label of the template file to use. +_TEMPLATE = "//build:stateful_set_patch.yaml" + +def _stateful_set_patch_impl(ctx): + ctx.actions.expand_template( + template = ctx.file._template, + output = ctx.outputs.source_file, + substitutions = { + "": ctx.var[ctx.attr.docker_repo_var], + "": ctx.var["MANAGER_IMAGE_NAME"], + "": ctx.var["MANAGER_IMAGE_TAG"] + }, + ) + + return [ + OutputGroupInfo( + compilation_outputs = [ctx.outputs.source_file], + ), + DefaultInfo( + files = depset([ctx.outputs.source_file]), + runfiles = ctx.runfiles(files = [ctx.outputs.source_file]), + )] + +stateful_set_patch = rule( + attrs = { + "docker_repo_var": attr.string(mandatory = True), + "_template": attr.label( + default = Label(_TEMPLATE), + allow_single_file = True, + ), + }, + output_to_genfiles = True, + outputs = {"source_file": "%{name}.yaml"}, + implementation = _stateful_set_patch_impl, +) diff --git a/cmd/clusterctl/examples/aws/aws_manager_image_patch.yaml.template b/build/stateful_set_patch.yaml similarity index 56% rename from cmd/clusterctl/examples/aws/aws_manager_image_patch.yaml.template rename to build/stateful_set_patch.yaml index 33ce3d7d76..d343ad5964 100644 --- a/cmd/clusterctl/examples/aws/aws_manager_image_patch.yaml.template +++ b/build/stateful_set_patch.yaml @@ -7,6 +7,5 @@ spec: template: spec: containers: - - image: ${MANAGER_IMAGE} - imagePullPolicy: ${MANAGER_IMAGE_PULL_POLICY} - name: manager + - image: /: + name: manager diff --git a/build/vfs_dir.bzl b/build/vfs_dir.bzl new file mode 100644 index 0000000000..567914868a --- /dev/null +++ b/build/vfs_dir.bzl @@ -0,0 +1,80 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +load("@io_bazel_rules_go//go:def.bzl", "go_library") +load("@io_kubernetes_build//defs:go.bzl", "go_genrule") +load("//build:install.bzl", "install") + +VFSGEN = "@com_github_shurcool_vfsgen//:go_default_library" + +GO = "@go_sdk//:bin/go" + +def _asset_template(importpath): + package = importpath.split("/")[-1] + return """ +package main + +import ( + "github.com/shurcool/vfsgen" + "log" + "net/http" + "path/filepath" +) + +func main() {{ + dir := filepath.Dir("./unpacked/") + fs := http.Dir(dir) + err := vfsgen.Generate(fs, vfsgen.Options{{ + PackageName: "{package}", + }}) + if err != nil {{ + log.Fatalln(err) + }} +}} + +""".format(package = package) + +def vfs_dir(name, importpath, src, visibility = ["//visibility:public"]): + + go_library( + name = name, + srcs = ["assets_vfsdata.go"], + importpath = importpath, + visibility = visibility, + ) + + go_genrule( + name = "%s_bindata" % name, + srcs = [src], + outs = ["assets_vfsdata.go"], + cmd = """mkdir -p unpacked && tar xfv {tar_file} -C unpacked && cat << EOF > tmp.go && {go} run tmp.go && cp assets_vfsdata.go $@ +{template} +EOF + """.format( + template = _asset_template(importpath), + tar_file = "$(location %s)" % src, + go = "$(location %s)" % GO, + ), + go_deps = [VFSGEN], + tools = [GO], + visibility = visibility, + tags = [ "generated" ] +) + + + install( + name = "%s_bindata_install" % name, + srcs = ["assets_vfsdata.go"], + tags = [ "generated" ] + ) diff --git a/cmd/clusterawsadm/BUILD b/cmd/clusterawsadm/BUILD index fe3eecc69e..1763f526c8 100644 --- a/cmd/clusterawsadm/BUILD +++ b/cmd/clusterawsadm/BUILD @@ -12,6 +12,7 @@ go_binary( name = "clusterawsadm", embed = [":go_default_library"], pure = "on", + tags = ["cli"], visibility = ["//visibility:public"], x_defs = { "sigs.k8s.io/cluster-api-provider-aws/cmd/versioninfo.GitBranch": "{GIT_BRANCH}", diff --git a/cmd/clusterawsadm/cmd/alpha/BUILD b/cmd/clusterawsadm/cmd/alpha/BUILD index bd8b9c66e4..41965ea425 100644 --- a/cmd/clusterawsadm/cmd/alpha/BUILD +++ b/cmd/clusterawsadm/cmd/alpha/BUILD @@ -7,6 +7,7 @@ go_library( visibility = ["//visibility:public"], deps = [ "//cmd/clusterawsadm/cmd/alpha/bootstrap:go_default_library", + "//cmd/clusterawsadm/cmd/alpha/config:go_default_library", "//vendor/github.com/spf13/cobra:go_default_library", ], ) diff --git a/cmd/clusterawsadm/cmd/alpha/alpha.go b/cmd/clusterawsadm/cmd/alpha/alpha.go index 8e843fe40d..beebb80f7d 100644 --- a/cmd/clusterawsadm/cmd/alpha/alpha.go +++ b/cmd/clusterawsadm/cmd/alpha/alpha.go @@ -19,18 +19,20 @@ package alpha import ( "github.com/spf13/cobra" "sigs.k8s.io/cluster-api-provider-aws/cmd/clusterawsadm/cmd/alpha/bootstrap" + "sigs.k8s.io/cluster-api-provider-aws/cmd/clusterawsadm/cmd/alpha/config" ) // AlphaCmd is the top-level alpha set of commands func AlphaCmd() *cobra.Command { // nolint newCmd := &cobra.Command{ Use: "alpha", - Short: "alpha commands", - Long: `Alpha commands may not be supported in future releases`, + Short: "Alpha/Experimental features", + Long: `Alpha/Experimental features (may not be supported in future releases)`, Run: func(cmd *cobra.Command, args []string) { cmd.Help() }, } newCmd.AddCommand(bootstrap.RootCmd()) + newCmd.AddCommand(config.RootCmd()) return newCmd } diff --git a/cmd/clusterawsadm/cmd/alpha/config/BUILD b/cmd/clusterawsadm/cmd/alpha/config/BUILD new file mode 100644 index 0000000000..4204c01c1e --- /dev/null +++ b/cmd/clusterawsadm/cmd/alpha/config/BUILD @@ -0,0 +1,24 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") +load("//build:vfs_dir.bzl", "vfs_dir") + +go_library( + name = "go_default_library", + srcs = [ + "assets_vfsdata.go", + "config.go", + ], + importpath = "sigs.k8s.io/cluster-api-provider-aws/cmd/clusterawsadm/cmd/alpha/config", + visibility = ["//visibility:public"], + deps = [ + "//pkg/template:go_default_library", + "//vendor/github.com/pkg/errors:go_default_library", + "//vendor/github.com/shurcool/httpfs/vfsutil:go_default_library", + "//vendor/github.com/spf13/cobra:go_default_library", + ], +) + +vfs_dir( + name = "assets", + src = "//cmd/clusterctl/examples/aws:package", + importpath = "github.com/sigs.k8s.io/cluster-api-provider-aws/cmd/clusterawsadm/cmd/alpha/config", +) diff --git a/cmd/clusterawsadm/cmd/alpha/config/assets_vfsdata.go b/cmd/clusterawsadm/cmd/alpha/config/assets_vfsdata.go new file mode 100755 index 0000000000..29523dabac --- /dev/null +++ b/cmd/clusterawsadm/cmd/alpha/config/assets_vfsdata.go @@ -0,0 +1,375 @@ +// Code generated by vfsgen; DO NOT EDIT. + +package config + +import ( + "bytes" + "compress/gzip" + "fmt" + "io" + "io/ioutil" + "net/http" + "os" + pathpkg "path" + "time" +) + +// assets statically implements the virtual filesystem provided to vfsgen. +var assets = func() http.FileSystem { + fs := vfsgen۰FS{ + "/": &vfsgen۰DirInfo{ + name: "/", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/README.md": &vfsgen۰CompressedFileInfo{ + name: "README.md", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 661, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x52\x3d\x8f\xd4\x30\x10\xed\xfd\x2b\x9e\x14\x2a\x74\x67\x44\x4b\x87\x80\x43\x14\xd7\x40\x81\xe8\x76\xd6\x99\x6c\x46\x38\xe3\xc8\x63\x6f\x2e\xff\x1e\x39\x97\x0d\x87\xb8\xd6\x2f\xf3\x3e\xd3\xe1\xe3\xcf\x1f\xf8\xf2\x44\xd3\x1c\x19\x0f\x12\xd9\x9c\xeb\x3a\x7c\x4a\x5a\x58\x8b\x39\xf7\xd6\xaf\x34\x45\x0c\x0d\xc2\x3d\x42\xd2\x90\xb9\x30\x78\xbf\x79\x06\xca\x48\x05\x81\x14\x67\x46\x35\xee\x41\x06\x31\xbf\x5f\xfb\xc2\xd3\x1c\xa9\xf0\x41\x73\x3c\xbc\x42\xa3\xcc\x3d\xae\x14\x2b\x5b\x7b\x8e\xdc\x43\x1a\xf1\x90\xf2\x46\xee\x37\x87\x5f\x59\x39\x53\x91\xa4\xce\x3d\xa4\xdc\x8c\x5d\x59\x85\x35\xf0\x1d\x08\x97\x03\x86\x85\x2c\x73\xc1\x32\x4a\x18\x31\xa7\xb9\x36\x61\x3b\x2c\x18\xce\xd4\x1c\x27\x05\x2d\xd6\x78\x06\xb9\xd4\xfd\x56\x0c\x73\x4e\x57\xe9\xb9\xf7\xce\xbd\xf7\xf8\x5e\x15\x65\xe4\xff\xf9\xbd\x73\xa7\xd3\x09\x36\x72\x8c\xce\xbf\xdb\x71\xbe\xdf\xf2\xdb\xd8\x40\xe7\xbe\x0d\x38\xda\x04\xc5\xcc\xd4\xaf\xe0\x27\xb1\x62\x77\x58\x53\xc5\x22\x31\xc2\x98\x41\x0a\xce\x39\x65\x44\xf9\xcd\x9b\x62\x52\xc6\x99\x63\x5a\x3e\xbc\x54\x7a\x83\x57\xb4\xda\x8e\x37\xdf\xf9\x3e\xa4\x69\x4e\xda\xd6\x7c\x9e\xf2\x5f\x5d\x8f\xcf\x1c\xdb\xa0\x52\x30\x91\x56\x8a\x71\xbd\x95\x9d\xab\xaa\xe8\x05\x65\x14\x3b\x62\x6e\x41\xba\x0e\x8f\xdb\xc7\x78\x4c\xbd\x0c\x12\xf6\x25\x7e\xa5\x8a\x89\x56\x50\x5c\x68\xb5\xbf\x84\xa1\x15\x7a\x5b\xf9\xe8\xbb\xc5\xda\x7f\x80\x97\x3d\xff\x09\x00\x00\xff\xff\xb3\xd8\x08\x1f\x95\x02\x00\x00"), + }, + "/base": &vfsgen۰DirInfo{ + name: "base", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/base/addons": &vfsgen۰DirInfo{ + name: "addons", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/base/addons/aws-config.yaml": &vfsgen۰CompressedFileInfo{ + name: "aws-config.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 774, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\x4f\x4f\xdb\x40\x10\xc5\xef\xfb\x29\x9e\xec\x4b\x2b\x25\xce\x1f\x55\x08\xdc\x93\x1b\xa8\x6a\x01\x09\xc2\xa1\x88\x13\xda\xac\x27\xf6\x08\x7b\x77\xbb\xbb\x8e\xc9\xb7\xaf\x6c\x82\xd4\xa8\x3e\xce\xbc\x19\xff\xf6\xcd\x8b\xb1\x32\xf6\xe8\xb8\xaa\x03\x96\xf3\xc5\x15\xb6\x35\xe1\xb6\xdb\x91\xd3\x14\xc8\x23\xeb\x42\x6d\x9c\x4f\x44\x2c\x62\xdc\xb1\x22\xed\xa9\x44\xa7\x4b\x72\x08\x35\x21\xb3\x52\xd5\xf4\xd9\x99\xe0\x37\x39\xcf\x46\x63\x99\xcc\xf1\x65\x10\x44\xa7\x56\xf4\xf5\xbb\x88\x71\x34\x1d\x5a\x79\x84\x36\x01\x9d\x27\x84\x9a\x3d\xf6\xdc\x10\xe8\x5d\x91\x0d\x60\x0d\x65\x5a\xdb\xb0\xd4\x8a\xd0\x73\xa8\xc7\xdf\x9c\x96\x24\x22\xc6\xcb\x69\x85\xd9\x05\xc9\x1a\x12\xca\xd8\x23\xcc\xfe\x5f\x1d\x64\x18\x81\x87\xaf\x0e\xc1\xa6\xb3\x59\xdf\xf7\x89\x1c\x61\x13\xe3\xaa\x59\xf3\x21\xf4\xb3\xbb\x7c\x75\xb3\x2e\x6e\xa6\xcb\x64\x3e\x8e\x3c\xe9\x86\xbc\x87\xa3\x3f\x1d\x3b\x2a\xb1\x3b\x42\x5a\xdb\xb0\x92\xbb\x86\xd0\xc8\x1e\xc6\x41\x56\x8e\xa8\x44\x30\x03\x6f\xef\x38\xb0\xae\x26\xf0\x66\x1f\x7a\xe9\x48\xc4\x28\xd9\x07\xc7\xbb\x2e\x9c\x99\xf5\x49\xc7\xfe\x4c\x60\x34\xa4\x46\x94\x15\xc8\x8b\x08\x3f\xb2\x22\x2f\x26\x22\xc6\x73\xbe\xfd\xb5\x79\xda\xe2\x39\x7b\x7c\xcc\xd6\xdb\xfc\xa6\xc0\xe6\x11\xab\xcd\xfa\x3a\xdf\xe6\x9b\x75\x81\xcd\x4f\x64\xeb\x17\xdc\xe6\xeb\xeb\x09\x88\x43\x4d\x0e\xf4\x6e\xdd\xc0\x6f\x1c\x78\xb0\x91\xca\xc1\xb3\x82\xe8\x0c\x60\x6f\x3e\x80\xbc\x25\xc5\x7b\x56\x68\xa4\xae\x3a\x59\x11\x2a\x73\x20\xa7\x59\x57\xb0\xe4\x5a\xf6\xc3\x31\x3d\xa4\x2e\x45\x8c\x86\x5b\x0e\x32\x8c\x95\xff\x1e\x35\x24\x44\x48\xcb\xa7\x00\xa4\x38\x2c\xc4\x1b\xeb\x32\xc5\xca\xe8\x3d\x57\xf7\xd2\x8a\x96\x82\x2c\x65\x90\xa9\x00\xb4\x6c\x29\x85\x92\x0d\x2b\x33\x55\xa3\xe4\x54\xf5\x56\x2a\x4a\xf1\xd6\xed\x68\xea\x8f\x3e\x50\x2b\x3e\x87\x62\xac\xc6\x01\xdc\x6f\x9f\x3e\xc2\x91\x3f\x4c\x59\x4f\xf3\x87\xe1\x10\xd9\x73\x21\x80\x03\x85\xfa\xb5\x0d\x5d\x8a\xe8\xf2\xea\x72\x11\x09\x80\xed\xe1\xdb\xab\x35\xa6\x79\x55\x5c\xba\x14\xd1\xe2\x6a\x99\x2c\x2e\x2e\x93\x79\x32\x9f\x2d\x2e\x22\xf1\x37\x00\x00\xff\xff\x78\x79\x4e\x41\x06\x03\x00\x00"), + }, + "/base/addons/aws-daemonset.yaml": &vfsgen۰CompressedFileInfo{ + name: "aws-daemonset.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 956, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x92\xcf\x4e\xdb\x40\x10\x87\xef\x7e\x8a\x9f\xe2\x4b\x2b\xe5\x0f\x20\x2e\x75\x4f\x6e\x02\xaa\x45\x1a\xa3\x38\x80\x38\x45\x13\x7b\x62\x8f\xb0\x77\xb7\xbb\xeb\x04\xbf\x7d\xe5\x90\xa8\x04\x98\x53\x32\xf3\xcd\xee\xb7\xe3\x09\x31\xd5\xa6\xb3\x52\x56\x1e\x57\x17\x97\x3f\xb0\xaa\x18\x77\xed\x86\xad\x62\xcf\x0e\x71\xeb\x2b\x6d\xdd\x38\x08\x83\x10\x73\xc9\x59\x39\x2e\xd0\xaa\x82\x2d\x7c\xc5\x88\x0d\xe5\x15\x9f\x2a\x43\x3c\xb2\x75\xa2\x15\xae\xc6\x17\xf8\xd6\x03\x83\x63\x69\xf0\xfd\x67\x10\xa2\xd3\x2d\x1a\xea\xa0\xb4\x47\xeb\x18\xbe\x12\x87\xad\xd4\x0c\x7e\xcd\xd9\x78\x88\x42\xae\x1b\x53\x0b\xa9\x9c\xb1\x17\x5f\x1d\xae\x39\x1e\x32\x0e\x42\x3c\x1f\x8f\xd0\x1b\x4f\xa2\x40\xc8\xb5\xe9\xa0\xb7\xef\x39\x90\x3f\x08\xf7\x51\x79\x6f\xa2\xc9\x64\xbf\xdf\x8f\xe9\x20\x3b\xd6\xb6\x9c\xd4\x6f\xa0\x9b\xcc\x93\xe9\xcd\x22\xbb\x19\x5d\x8d\x2f\x0e\x2d\x0f\xaa\x66\xe7\x60\xf9\x6f\x2b\x96\x0b\x6c\x3a\x90\x31\xb5\xe4\xb4\xa9\x19\x35\xed\xa1\x2d\xa8\xb4\xcc\x05\xbc\xee\x7d\xf7\x56\xbc\xa8\x72\x08\xa7\xb7\x7e\x4f\x96\x83\x10\x85\x38\x6f\x65\xd3\xfa\xb3\x61\x9d\xec\xc4\x9d\x01\x5a\x81\x14\x06\x71\x86\x24\x1b\xe0\x57\x9c\x25\xd9\x30\x08\xf1\x94\xac\x7e\xa7\x0f\x2b\x3c\xc5\xcb\x65\xbc\x58\x25\x37\x19\xd2\x25\xa6\xe9\x62\x96\xac\x92\x74\x91\x21\xbd\x45\xbc\x78\xc6\x5d\xb2\x98\x0d\xc1\xe2\x2b\xb6\xe0\x57\x63\x7b\x7f\x6d\x21\xfd\x18\xb9\xe8\x67\x96\x31\x9f\x09\x6c\xf5\x9b\x90\x33\x9c\xcb\x56\x72\xd4\xa4\xca\x96\x4a\x46\xa9\x77\x6c\x95\xa8\x12\x86\x6d\x23\xae\xff\x98\x0e\xa4\x8a\x20\x44\x2d\x8d\x78\xf2\x87\xcc\xa7\x47\xf5\x1b\x12\x90\x91\xe3\x02\x44\xe0\x57\xcf\xea\xd0\x3e\xd9\x5d\x6e\xd8\xd3\x65\xf0\x22\xaa\x88\x30\x23\x6e\xb4\xca\xd8\x07\x0d\x7b\x2a\xc8\x53\x14\x00\x8a\x1a\x8e\x90\x53\x2d\xb9\x1e\x29\x5d\xf0\x31\xe7\x0c\xe5\x1c\xe1\xa5\xdd\xf0\xc8\x75\xce\x73\x13\xf4\xd6\x7d\x8b\xe7\xc6\xd4\xe4\xb9\xff\x0d\x9c\xb2\x7d\xe4\x5a\xf5\xcb\xc1\xd6\x9d\x32\xc0\xe8\xcb\x2b\x4e\xc1\x6a\x17\xbd\xfb\xfb\x1f\x9f\xc6\xf3\x64\x9a\xae\x93\xfb\xc7\xeb\xfb\x34\x9d\xaf\xa7\xc9\x6c\x79\x06\x02\x3b\xaa\x5b\xbe\xb5\xba\x89\x3e\x14\x0e\x22\x5b\x29\xff\x90\xb9\xe3\x6e\xc9\xdb\xcf\xc0\x87\x87\xbf\xf1\x5f\x50\x2f\xdc\x45\x10\xb3\xbb\x5e\x1b\xad\xeb\x75\x2e\x85\x0d\xfe\x05\x00\x00\xff\xff\xd5\x01\x00\x53\xbc\x03\x00\x00"), + }, + "/base/addons/calico.yaml": &vfsgen۰CompressedFileInfo{ + name: "calico.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 13516, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xcc\x5a\x5f\x73\xdb\x38\x92\x7f\xd7\xa7\xe8\x92\x5f\x4d\xc9\x99\x9d\x4d\x65\x78\x4f\x8a\xac\x38\xaa\xd8\x92\xca\x92\x67\x6e\x6b\x6a\x4b\x03\x91\x2d\x09\x67\x10\xe0\x02\xa0\x62\xcd\xdd\x7d\xf7\xab\x06\x48\x8a\xa4\x48\x39\x99\xb9\x64\x56\x0f\xa9\x98\x00\xfa\xcf\xaf\xff\xa0\x1b\xc0\x15\x8c\x99\xe0\x91\x82\x9f\x51\x1b\xae\x24\x1c\xfe\x36\xf8\xfb\xe0\xa6\x77\x05\x7b\x6b\x53\x13\x0e\x87\xb1\x8a\xcc\x20\xd5\xea\xbf\x30\xb2\x91\x9b\x3b\x50\x7a\x37\xa4\x79\x43\x8d\x02\x99\x41\x73\x55\xae\x5a\xed\xb9\x81\x84\x49\xbe\x45\x63\x81\xcb\x48\x64\x31\x1a\xb0\x7b\x84\xad\x12\x42\x7d\xe6\x72\x07\x91\x4a\x52\x25\x51\x5a\x38\x78\xae\x26\xec\x5d\x01\x80\x27\x3f\x94\x2a\xc6\xb0\xa4\x58\x7e\x8e\x24\x2f\xbe\x16\x8c\xc6\x4a\x6e\xf9\xee\x81\xa5\xc0\x0d\x64\x06\x63\xb0\x0a\x22\xf7\x31\xd3\x08\x0c\x0c\x8a\x6d\xb0\x57\xc6\x62\x5c\x28\xca\xa5\xb1\x4c\x08\x66\xb9\x92\x83\xde\x33\x97\x71\x78\xa2\xd3\x63\x29\xcf\x91\x08\xe1\xf0\xa6\x97\xa0\x65\x31\xb3\x2c\xec\x01\x48\x96\x60\x98\x0b\x13\x78\x26\xf9\x57\x93\xb2\x08\x43\x78\xce\x36\x18\x98\xa3\xb1\x98\xf4\x8a\x45\x57\xb0\x3a\xa6\x7b\x46\xf2\xc5\xdc\xb0\x8d\xc0\x78\xd0\x03\xb0\xf4\x71\x6d\x50\x1f\x78\x84\x6b\x4f\xb9\x2f\x95\xc4\xbe\x5b\x33\x2e\x55\x20\xe0\x72\xc1\x37\x2c\x7a\x46\xe9\x54\xcc\x0c\x12\x15\x2f\xcb\x3a\x1f\x08\xa1\xbf\xe1\x3a\xee\xf7\x5a\x48\x3c\xac\x9e\xf2\x75\x3d\x80\x03\xda\xfd\x3a\xb1\x59\x08\xfd\x37\x3f\xfe\x78\x93\x2f\x58\x11\xa7\xd9\x14\x24\xda\xcf\x4a\x3f\x97\x30\x3a\xa0\x68\x71\x0e\x1c\x28\x09\xc8\xa2\x3d\x90\x99\x06\xe0\xd6\x99\x14\x23\xce\x84\xa3\x73\x60\x22\x43\x03\x5c\x82\x25\x13\x79\x32\xf0\x99\x0b\x01\x1b\x04\x96\x59\x95\x30\xcb\x23\x26\xc4\x11\x52\x95\x66\x82\x59\x8f\x49\x24\xf9\x3a\x67\xbe\xf6\xab\x42\xf8\x9f\xa0\x07\x00\xf0\xdf\xee\x5f\x80\x3e\x21\xd5\x0f\xa1\xff\xfc\xce\x04\xa9\x8a\x83\x7c\x7e\xff\xba\x98\x10\xc9\xc2\x7e\x34\xed\x66\xf0\xb7\xc1\xcd\x69\x30\x15\xd9\x8e\x4b\xd3\x0f\xe1\xd7\xfc\xd3\x89\xb4\x9b\x60\x8f\xa9\x23\xef\x81\x2d\x17\xba\x31\xa1\x76\x6b\x81\x07\x14\x34\x81\xcb\x6d\x63\x98\x0c\x6e\xac\xd2\xb8\x2e\x88\x90\x3b\x68\x89\x16\x4d\x7d\x26\xe1\x56\xe8\xb1\x5e\x7f\x7a\x7a\x3f\x79\x9c\x4d\x56\x93\xe5\x7a\x36\xbf\x9d\xac\x67\xa3\x87\xc9\x7a\x5d\x5f\x91\xd8\xac\x1f\xc2\x7a\x3d\x9e\x4d\xd7\x0f\xab\xa7\xf5\xba\x36\xca\x53\x96\xf4\xc3\x9a\x22\x15\x55\xc8\xf9\x03\xa1\x22\x26\x6a\x34\x01\xfa\x26\xdb\x48\xb4\x34\x27\x33\xb8\x50\xf1\x98\xc7\xba\x5f\x99\xf2\xbf\x35\x2e\xa9\x12\x3c\x3a\x9e\xf1\xa9\x70\x7a\x7e\x67\xba\x97\x57\xc0\x68\x21\x41\xa3\xde\xe4\x27\x50\xc6\xf3\xd9\x87\xe9\xdd\xfa\xc3\xf4\x7e\xb2\x18\xad\x3e\xae\xd7\x35\xe2\xbd\x16\x36\xad\xa6\x4c\x95\xb6\x09\x4b\xeb\x80\x1a\xc9\x48\x71\xab\x33\xac\x7d\x8f\x58\xca\x36\x5c\x70\xcb\xbd\x9c\x6e\xf5\x03\x4b\x53\x2e\x77\x26\x5f\x50\x61\x9d\xff\xef\x9f\x3d\xff\x57\x2f\x08\x82\x96\x14\xe8\xa2\xc6\xa7\xc0\x4a\x82\xa3\xc0\xb0\x8c\x4b\xd4\xd7\xc0\x0c\x7c\x46\x21\x7a\x57\xf4\xbf\x4a\xc4\x53\x38\xe6\x3e\x0b\x4c\xc6\x8d\xd0\x04\x25\x7b\x57\x3e\x14\x13\x66\x2c\x6a\x37\x87\x26\xa0\x76\xc1\x49\x31\xc8\xe0\x53\x89\x3c\x44\x22\xa3\x79\x45\xd6\xbb\x65\x98\x28\xb9\x44\x5b\xcb\x7a\xf8\x62\x51\xba\xa4\x3c\x3c\xbc\xd9\xa0\x65\x17\xb2\x20\x71\xe9\xce\x81\x00\x82\x6d\x50\x98\xd0\xe1\x43\x21\xcb\xd2\xb4\xbe\x96\x12\x07\x0d\x1b\x14\x18\x59\xa5\xfd\xd4\x84\xd9\x68\x7f\x5f\x59\xdb\xb1\x1a\x20\x4b\x63\x66\x71\x69\x35\xb3\xb8\x3b\xfa\xc9\x64\xf9\x10\x1e\x95\x10\x5c\xee\x9e\xdc\x04\xf7\x5d\x57\xbf\x14\x74\x13\xf6\xf2\x24\xd9\x81\x71\x41\xb9\x39\x84\x37\x94\x9c\x31\x49\x45\x39\xa7\xaa\x3c\xfd\x44\x4d\xae\x4e\xc9\xe8\xc7\xa4\x54\xd6\xe5\xcf\xca\x7c\xef\x20\xd7\xc0\x84\x92\x94\x17\xed\xde\x9b\x5c\x73\x97\x15\x47\x71\xac\xa4\x99\x4b\x71\x04\xab\x04\xe6\xe9\x77\x83\x42\x7d\xbe\xae\xd0\x48\x98\x7e\xf6\xbe\x92\xaa\x98\xdc\x86\x41\x94\x53\x00\x16\xc7\x81\x92\xd7\x80\xd2\x64\x9a\xf6\x5b\x6e\x61\x87\xd6\x54\x96\xa7\x9a\x2b\xcd\xed\x11\x4c\xb4\xc7\x38\x23\x5c\x9c\xf7\xd8\x3d\xb3\xc0\xad\x01\x8d\x46\x65\x3a\x42\x03\x4c\x23\xfd\x85\xfa\x80\x71\x85\x02\xdf\x12\x59\x3c\xa0\x76\xb4\x01\x0f\x3c\xca\x13\xb9\xff\xe5\x94\x51\x0f\x98\x48\xf7\x6c\x70\xca\x00\x03\xae\x86\x85\xb0\x94\xc5\x43\xe8\xfb\xd8\x2e\xbc\x81\x7e\x04\xe3\xb2\xe6\x15\xf4\x23\x7f\x6c\x50\x52\x26\x04\xc1\x65\xf6\x92\x4f\xa2\x84\x37\xf3\x81\xe2\x03\x36\xff\x7e\x42\xb3\x66\x8c\x07\xf6\x8c\x60\x68\x9f\xac\xd8\xcf\xab\x54\x68\x10\xd3\x96\x47\x3b\x1f\x0d\x99\x93\x86\x01\xe0\x76\x8b\x91\x0d\x61\xa6\x96\xf9\xdc\x4a\x36\x51\x29\xf1\x53\x3a\x84\xc9\x0b\x37\x35\xf8\x1f\x98\x7e\xbe\x68\x3c\xd8\x2a\x4d\xa8\x97\xd6\xa9\x72\x7d\xc6\x63\xd8\xe2\x2f\x5f\xc2\xba\x2a\xf2\xe4\x05\xa3\xcc\x7e\x81\xc4\x79\x99\x32\x8a\x22\x95\x49\x3b\x6b\x49\x00\xb9\x56\x5c\xf2\x84\xff\x8e\x10\xab\xcf\xd2\xf2\x04\x21\xf6\xfe\xc7\x8a\xd8\x83\x2c\xdd\x69\x16\x23\x28\x0d\x31\x0a\x24\x6b\xfc\x07\x58\x14\xa2\x9a\xa6\xac\x82\x58\x01\x83\xfe\x56\xe9\xe8\x44\xbe\x58\xd0\x0f\xcb\xda\xb4\xee\x09\x54\xa9\x0e\x23\x25\x23\x4c\xad\x19\x92\x03\x08\xc5\x62\x33\x4c\x95\xff\x67\x78\x65\x51\x27\x5c\x3a\x27\x08\xd4\x96\x7c\xaf\x34\x67\x65\xe8\x4e\xb3\x08\x17\xa8\xb9\x8a\x97\xb4\x2d\xc5\x26\x84\x9b\x7c\x1a\x97\xdc\x8e\x8b\xcc\x7d\x16\xd5\xa7\xa4\x5e\xcf\xfb\x95\x7c\xbe\xe1\x92\x69\x8e\x55\x6f\xa0\xc0\x3b\xaf\xbc\x60\xcb\x05\xd6\x8b\xad\x8a\x19\x7d\x1a\xce\x99\x04\x91\xe4\x15\x33\xf2\x84\xed\x30\x84\x7f\x65\xec\xe8\x42\xed\xac\x7c\x3e\x4d\x8d\x54\x92\x30\xda\x0b\x7e\xed\x0f\x2b\xc4\x06\x66\xdf\xff\x67\x65\x1a\xca\x43\x58\xdb\xb3\xaf\x80\xdc\x00\xd4\xd6\xab\x37\x9b\xd6\x84\xa6\x22\x5c\x23\xb3\x15\x89\xab\x52\x53\x19\x43\xbb\xbb\xab\x75\x1a\xa5\x80\xab\x1e\xa9\x30\xbd\x09\xf2\x66\x83\x08\x0b\x6e\x6c\xbf\x21\x40\x7b\xbd\xda\x59\xa8\x76\x4a\x32\x9b\xac\x7e\x99\x3f\x7e\x5a\xfb\x7a\xa3\x4d\x9c\x0f\x5a\x25\x61\x63\x00\x72\x7e\x0f\x2c\xfd\x84\xc7\x47\xdc\x9e\x4f\xe8\xea\x18\x9a\x3f\x17\xce\xe7\xc5\x6f\x43\xdd\x25\x5a\x87\x35\xa5\x37\xa2\x0b\x1b\x66\x7c\x66\xa2\xaf\xcf\xef\x8c\xdf\xf2\x69\xa8\x5d\xd7\xb6\x42\xf3\xcb\xb5\xdd\x72\x14\x71\x87\x9a\x6e\x6c\xc1\xec\x3e\x74\x19\x7c\x40\x82\x90\x7b\x34\x34\x20\x63\x51\x1f\xe2\x3b\x13\x38\x30\xcd\x69\xcf\xed\x34\xcc\xc3\xea\xe9\xaf\xb2\x46\xd1\x21\x35\x34\x58\x68\x3c\xa0\xb4\x79\x2d\x57\x86\xfa\x56\xab\x04\x8c\x40\xa4\x32\x91\x32\x37\xed\x8a\xed\x46\x58\xde\x4f\x26\x8b\x0e\x97\xdf\x32\x61\xb0\xea\xe5\x07\x25\xb2\x04\x1f\x28\xe9\x9a\xb0\x41\x2e\xa1\xaf\x1e\xf3\x21\xb9\xc4\x50\xa5\x96\x42\x7c\xb8\xe1\xb2\xd7\xaa\xb7\xe4\xc1\x86\xcb\x20\xe6\xfa\x35\x52\x68\x23\x47\x4a\xa2\x1d\xc4\x9d\xc4\x24\xda\x0a\xb1\xa8\x35\x27\x3e\x66\xd2\xb4\x17\xbd\x65\x70\x56\xf2\x7e\xd9\x50\xf2\x6a\x76\x3c\x2d\x49\xb5\xda\x69\x96\x98\x32\xe4\x7d\x4f\xe2\xf2\xa7\x56\x19\x91\xc8\xa9\x56\x96\x93\x46\xe7\x89\xf3\x7c\xfb\x82\xce\xc4\x59\x3d\x8e\x38\xcd\x6d\x49\x89\x4f\x06\xab\xea\x8c\x16\xd3\xa2\x9e\xa7\x0e\x9d\x7c\xa3\x6c\x12\xdb\xbd\xe3\x76\xb4\x1a\x2d\x57\xf3\xc7\xc9\x7a\xf5\x8f\x45\x57\x66\xac\x74\x52\x0d\xfe\xbf\x30\x6e\x5d\xe1\x40\x2c\x5f\x61\xf5\xcb\x68\xba\x5a\x7f\x98\x3f\xae\x4b\x9e\x1d\xec\xa8\x82\x6a\x32\xa2\x5c\xf4\xb5\xe9\x87\x72\xce\xf7\x4f\x39\x7b\xa5\x0c\x96\x26\xa8\x9f\x9e\x9c\xcb\x38\x1e\xdd\x4f\xc7\xf3\x62\x47\x98\xce\xee\xd6\xef\x47\xe3\x4f\x93\xd9\xed\x5f\xb6\x2b\xd4\x0e\x78\x9a\xca\xf9\x6e\xce\xf5\x3b\x6e\xdb\x8b\x51\x5a\xbe\x3d\x7a\xf3\x63\x2a\xd4\x31\x41\x69\xdd\x78\xbb\xba\xf7\x4f\xcb\xd5\xe4\xf1\xa2\xb3\xbd\x33\xd7\x9b\x5d\xda\x74\x80\x51\x66\x55\x10\xa3\xc5\xc8\x6f\x4a\xef\xef\x16\x30\x5d\x50\xed\xaa\xd1\x98\x76\x70\xa7\x5d\x79\x8f\x65\x56\x79\x5a\x4d\x36\x13\x49\x1b\x04\x4c\x17\x8d\xb5\x0d\x7b\x4d\x17\x3f\xff\xb8\x98\xcf\xef\xd7\x67\x13\x4f\x4c\x46\xe2\x33\x3b\x9e\x45\x0c\x39\x32\x6d\x49\x2e\x68\x32\x29\x51\x40\x4c\x8d\x0c\xfa\xc3\x44\xea\x71\x52\xee\x0e\x17\xd1\x89\x12\xb7\x8a\xf1\x61\x72\x3f\xfd\x4f\x62\x3e\x9b\x2e\xfe\xfd\x36\xad\x95\xf3\x86\x2d\xcb\x84\x85\xe9\xe2\xf0\x23\xa4\x4a\x89\x53\x89\x46\x21\x6c\x2c\xd3\x36\x4b\x49\x5f\xa9\x24\x02\xba\xea\x7f\x00\x0b\x15\xc3\x74\x61\x8a\xc3\xbb\x06\xe1\x68\xaf\x0c\x4a\xbf\xfb\xb9\xa3\x3e\xcd\xe4\x0e\x07\x30\xde\x33\xb9\xa3\x6c\xe7\x3e\x3a\xf5\x81\x6d\xed\xa9\x26\xf6\x2d\xad\x23\xba\x67\x87\x26\x59\xa9\xf2\x1e\x65\xe0\x4b\x6a\xb3\x57\x99\x88\x61\x4b\x15\x1d\x75\xcb\x5c\xc2\x6f\x41\x90\x1f\x65\x04\x11\x8f\xf5\x6f\x17\xa3\xb9\xf4\x8e\xf1\xf4\xf6\xb1\xab\xda\xfc\xe9\x87\xc1\x9b\xb7\xef\x06\x37\x83\x9b\xe1\x9b\xb7\x4d\x2f\xb9\xf5\x07\xb7\xbe\xb6\x15\x6a\xe7\x94\x33\x0a\x7e\x73\xc7\x56\x56\xd0\x37\xf3\x9b\x3b\x79\xe9\xf0\xfd\x5c\x94\xdb\xe9\x72\xf4\xfe\x7e\xe2\xce\xb4\xd6\xf7\xf3\xbb\xbb\xe9\xac\xb5\xe0\xbc\x90\x76\x3f\xa0\xe0\x2f\x80\x32\x4e\x15\xa7\xd8\x56\x6e\x83\x2b\x0d\xcc\xa2\xe2\xb4\x76\x34\x1e\x4f\x16\xab\x76\x71\xbc\xc3\xde\x4e\x3e\x8c\x9e\xee\x57\x93\xd9\xed\x62\x3e\x9d\xad\x56\xf3\x8f\xf3\xe5\x6a\x34\x5e\x4d\xe7\xb3\xae\x20\x72\x34\xbb\xe0\x99\x2e\x0e\x6f\xc9\x9b\x4e\x5b\xe0\x25\xee\xd3\xc5\xcf\x6f\x97\x4f\x8b\xc5\xfc\x71\xf5\xa5\xf5\x50\x1d\x83\xc2\x10\x56\xe5\xc7\xb1\x17\x98\xdd\xcf\xef\x96\x93\x9f\x27\x8f\xd3\xd5\x3f\x96\xe3\xc7\xc9\xa4\x4b\xc1\xd7\xe8\x7c\x9c\x8c\xee\x57\x1f\x27\x33\xb2\x62\xeb\xa6\xd0\x62\x39\x83\x51\xa6\xb9\x3d\x52\xd7\x88\x2f\xb6\x1e\xe4\xa9\xe6\x07\x2e\x70\x87\x71\xed\xac\x82\x7e\xe5\x09\x4c\x7d\x85\xc6\x7f\x65\x68\x9a\x05\x21\x40\x94\x66\x21\xfc\xf0\xf7\x9b\xa4\xf2\x5d\xf0\x03\x4a\x34\x66\xa1\xd5\x06\xeb\x0b\xa8\x83\xbe\x43\xdb\xa4\x92\xfa\x32\xb0\x58\xd8\x1c\x55\xda\x86\xf0\xd3\xcd\x4f\x3f\x35\x06\xc8\x07\x43\x70\xa7\xcc\xf4\xdf\xba\x8a\xf5\x46\xfa\xcd\x4d\x6d\x94\xfa\x69\xce\xc4\x2d\x0a\x76\xec\x9a\xb3\x65\x5c\x64\x1a\x57\x7b\x8d\x66\xaf\x44\x1c\xc2\xdb\x1a\x4e\x2c\xe6\x1d\x5a\xe2\xcb\xe9\x40\xa9\x04\x2a\x6f\x79\xcf\xd2\x68\x00\x54\x3c\x0f\xdb\x4b\xc3\x62\x4a\xb0\xe1\x3a\x0e\x88\xe7\xb1\x6d\x74\x4b\xae\xd9\x32\x7c\x09\x84\x2f\x2d\xf3\x05\xdf\x0c\x13\x15\x67\x02\x9b\x76\xf1\x2e\x2a\xf8\x26\x68\x1f\x27\x79\xe6\x52\x1c\xcf\x7c\xac\xc9\x42\x67\x72\xf8\x62\x29\x9a\xcd\x40\xa8\xe8\xb9\x95\x4f\x3e\x21\x68\x99\x70\x62\xe4\x82\xf7\x02\xa7\x03\xd3\x8e\x9b\x47\xbb\x95\xcf\x81\xe9\x40\x67\x32\x68\x9d\xf2\x75\x9c\x08\xba\x57\x38\x11\x7a\x5f\xc1\xc9\x1b\xad\xd6\xec\x3c\x51\xc9\xb0\x39\x56\xfb\x9d\xf3\xc6\xa3\xdd\x48\x14\x34\x4e\xdc\xba\xd3\x74\xdb\x3d\x78\x0d\xa3\x8b\x14\x3b\xc0\x0f\x5e\x83\xe3\x55\xa2\x2d\x38\x07\x97\xbd\xe6\x22\xc9\x8b\xee\xe8\x8f\xf9\x3f\x70\x81\x73\x3d\x76\xa5\x4c\xd3\x16\x95\xa3\xa0\xf1\x6c\xda\xd2\x04\xb6\xb6\xc4\x17\x25\x6a\xeb\xb2\x83\xce\xa6\xf8\x55\x72\xf5\x4e\x3b\x08\x82\xe6\xfd\xb3\xbf\xa8\x59\xd6\x0e\x60\xff\xe8\x75\x4c\x7e\x3d\xe5\xb1\x72\xe7\xd9\xee\xec\x2e\x33\x56\x25\x8f\xf9\x66\x73\x8b\x5b\x97\x91\x95\xa4\x2e\x1b\x63\x8c\xa9\x36\xee\x95\xaf\x04\x2a\x1d\x77\xde\x84\xd3\x16\x9c\x38\x57\xaf\xc9\xce\x52\x7e\xba\x48\x1a\x3c\xbf\x73\x07\xb4\xc5\x7d\x52\x7e\xe9\xde\xc1\xb9\x45\x3f\x97\x56\x6b\x17\xd2\x66\x10\xe9\xf8\xfc\x59\xc2\xe9\x42\x29\x52\xe4\x1e\x79\x8f\xd4\x03\xd8\x69\x95\xa5\x21\xb4\xaf\x82\xe2\x21\x82\x03\x3d\x47\x30\xbf\xb6\x72\xb2\xba\x92\x63\x5c\x15\xc0\x0d\xa6\x22\xd3\x4c\xb4\xca\xe7\xc6\x0d\x97\xbb\x4c\x30\xdd\x36\xe3\xcc\xdc\xff\xbf\x90\x6d\x76\x69\x8a\xa8\xbf\x33\x4e\xef\xef\x16\x0b\x44\x5d\x03\xa7\x90\xa4\x81\x48\xfe\xb9\xf7\xed\x71\xf8\x2b\x1d\xe7\xfd\xdd\xa2\xdb\x6d\xce\x64\x3b\x87\xa8\xee\x32\xdf\x18\x2b\x9e\x52\x6f\xf8\x9d\x11\x9a\x2e\x16\x4a\x89\x1a\x2e\xb9\x1c\x0d\x34\xfc\xd7\x6f\x8d\x81\x7b\x2c\x94\xb7\x57\xdf\x19\x89\x8f\xca\xd8\x49\xce\xba\x86\x47\x4d\xa6\x06\x2a\xd5\xb1\x6f\x8d\x4d\xde\x74\x53\x97\xa4\x93\xbf\x22\x9a\x72\x3a\xd3\x93\x00\x35\x9c\x5a\xe4\x6b\xa0\x75\x3e\xe3\x5b\x63\xb6\x13\x6a\xc3\x44\xbe\x59\xba\xed\x93\xe3\x77\x46\xed\xce\x89\x90\xdf\x89\x2f\xdc\x0e\x5e\x83\xad\x55\xc4\x06\x70\xe7\x73\x8e\xdf\x15\x39\x83\xdf\x3b\x1a\x6b\xa8\x2d\xd1\x76\x43\x66\xf0\x2c\x2a\x9b\xe3\xdf\x1a\xab\x3f\xe4\x5f\xb3\xa2\x4e\x8c\xff\x34\x58\xdd\xce\x75\xd9\xad\xea\x0e\xe5\x0b\xd4\xa9\x7f\x34\x0a\xac\x88\x56\xad\x04\x96\xf7\x1a\xd5\x57\x1a\xe5\x03\xa6\xeb\x9e\xbf\x45\xdf\x70\x19\x03\x77\xc7\x62\xcd\xb9\xf9\x23\x06\xe6\x6b\xe8\xf2\xe1\xa7\xe7\xf0\xa8\x04\xd6\xac\xa3\x37\x2c\x1a\xb0\xcc\xee\x95\xe6\xbf\xfb\xa7\xa2\x0d\x13\x5d\x2e\xc2\x35\x75\x6b\x61\xed\x5d\xa5\x7f\xc8\xe5\xaa\x6a\xf7\xc4\x61\x87\x16\x52\x15\x9b\x6b\xff\xac\xe4\xda\x17\xd5\x85\x49\xdc\xd9\x59\x40\x5e\x72\x47\x86\x31\x21\xfc\xda\xcf\xaf\xe4\xcf\x0e\x86\x02\x47\xa7\xfc\xc3\x91\xeb\x55\x7b\x13\x4f\xd1\x7d\x3a\xa0\xde\x54\x16\xee\x9c\x5f\x7f\x31\x9f\xfa\x26\x44\x5f\x72\x58\x5b\x88\x9f\x9a\xb0\x98\x9b\x48\x1d\x50\x17\x93\xdd\x99\x32\xd9\x93\xc5\x07\xd4\x96\x1b\x4c\x50\x96\x97\x74\x01\x7c\x66\xb6\xbc\xc2\x0b\x40\xf0\xf2\x40\xa9\x85\xa4\x7b\x5d\x6b\x06\x7f\x54\x21\x87\xd5\xd0\x58\x66\xb3\x56\x15\x66\x65\x0f\x04\x91\x40\xe6\x5e\xb3\xcc\x54\x8c\xb9\xbf\x57\x9e\x8e\xc1\x56\xb0\xdd\x49\x8e\xb4\xa2\x43\xd9\x3d\xb9\xfb\x38\x03\x46\x25\xd8\x78\x5e\x5b\xd9\x90\x80\x9c\x84\x3c\xb6\xf2\x7a\xec\x44\x37\x2b\xde\xb3\x5d\xc1\x2f\xc4\xc2\x8b\xb6\x67\x72\xe7\x1f\xce\x54\xee\x1f\xab\x31\xc9\x5b\x1d\xea\xd4\xc2\xe5\xde\x7d\x01\xa8\x96\x30\x6e\xf8\x52\xab\xd9\x4e\xc7\x22\x39\x06\x24\x6f\xde\x45\x56\x94\xfe\x13\xde\x5e\xf7\xef\x8a\x4f\xe6\xa1\xde\x2a\x6b\xc5\xa9\x4e\x82\x9f\xc5\xaa\x33\x22\x1a\xc7\x30\x77\x92\xaf\x16\xb4\xd3\xb9\x4e\x3e\x52\xfa\x47\xa2\x24\xb7\x4a\x1b\xf7\x36\x42\x65\x06\xc6\x8f\xb7\x3e\x52\xbc\xb7\xb4\x30\x6f\xcd\xd7\xdd\x12\xf9\x7d\xa9\xd2\x8c\x9e\x50\xeb\xea\x61\x69\xac\xd6\xc2\x9d\xe8\x94\xfd\x49\x6d\x66\x07\x8d\x6a\x51\x7f\x22\xd1\xe6\x57\x67\xa3\x06\x2b\x19\xa7\x6b\x45\x57\xf1\x47\x63\xe7\x05\x74\x6b\x1e\xbc\xe8\x1b\x85\x8d\x32\x63\x8b\xab\x33\xca\xd8\x3e\x20\x7d\x4c\x3b\x73\x9d\xee\xd3\xfe\xbc\xb9\x9a\x98\x5d\xb2\x51\x97\xfe\x0d\x4d\xa3\xea\x51\x59\x2d\x9f\x7c\x55\x92\xca\x2f\xfe\x8b\x43\xce\xaf\x4b\xb8\x7f\xd0\x02\xab\x3d\x1a\x84\x14\x75\xc2\x8d\x2b\x9b\xdc\xdb\x54\x25\xc5\xd1\xdd\x8a\x68\x9e\x67\xea\xe2\x91\xa1\xbb\x99\x3c\xfc\x30\x78\xeb\xf7\xd6\x88\x49\x47\x66\x83\xa0\x31\x51\x07\x8c\xf3\x6b\xc9\xca\xa3\x44\x25\x61\xab\xd1\xec\x6b\x57\x95\x6d\x41\xff\x95\x86\xec\x0e\x8b\x5a\x68\x7d\x91\xad\x9a\x95\xe4\xeb\xb5\xca\x59\xad\xf3\x9e\xcb\x98\xcb\xdd\x6b\x45\x8c\x12\x98\x5f\x4b\x17\xba\x5f\xe0\xd6\x6b\x34\x69\xae\xa6\x6a\x23\x6b\xb2\x0d\xc1\xe6\xf4\x0c\xa0\xf5\x84\x13\x9a\x37\xdf\xe5\x6d\x4c\xc7\xd9\x26\x61\xd2\xfb\xbf\x00\x00\x00\xff\xff\x73\x79\xe4\x99\xcc\x34\x00\x00"), + }, + "/base/addons/kustomization.yaml": &vfsgen۰CompressedFileInfo{ + name: "kustomization.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 749, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\xcf\x6e\xdb\x3c\x10\xc4\xef\x7c\x8a\x81\x75\xf9\x3e\xc0\x7f\x92\xdc\xea\x9e\xdc\x24\x45\x85\xa4\x36\x10\x39\x0d\x72\x5c\x51\x6b\x69\x11\x89\x64\xc9\x55\x14\xf5\xe9\x0b\xd9\x4e\xd1\xa0\x3c\xee\xce\x2c\x7f\x1c\x6e\x86\x6b\x1f\xc6\x28\x75\xa3\xb8\xba\xb8\xfc\x84\x7d\xc3\xb8\xeb\x4b\x8e\x8e\x95\x13\x36\xbd\x36\x3e\xa6\xa5\xc9\x4c\x86\x7b\xb1\xec\x12\x57\xe8\x5d\xc5\x11\xda\x30\x36\x81\x6c\xc3\xef\x9d\x39\x7e\x70\x4c\xe2\x1d\xae\x96\x17\xf8\x6f\x12\xcc\xce\xad\xd9\xff\x9f\x4d\x86\xd1\xf7\xe8\x68\x84\xf3\x8a\x3e\x31\xb4\x91\x84\x83\xb4\x0c\x7e\xb3\x1c\x14\xe2\x60\x7d\x17\x5a\x21\x67\x19\x83\x68\x73\xbc\xe6\x3c\x64\x69\x32\x3c\x9f\x47\xf8\x52\x49\x1c\x08\xd6\x87\x11\xfe\xf0\xb7\x0e\xa4\x47\xe0\xe9\x34\xaa\x61\xbd\x5a\x0d\xc3\xb0\xa4\x23\xec\xd2\xc7\x7a\xd5\x9e\x84\x69\x75\x9f\x5f\xdf\x6e\x8b\xdb\xc5\xd5\xf2\xe2\x68\x79\x74\x2d\xa7\x84\xc8\x3f\x7b\x89\x5c\xa1\x1c\x41\x21\xb4\x62\xa9\x6c\x19\x2d\x0d\xf0\x11\x54\x47\xe6\x0a\xea\x27\xde\x21\x8a\x8a\xab\xe7\x48\xfe\xa0\x03\x45\x36\x19\x2a\x49\x1a\xa5\xec\xf5\x43\x58\xef\x74\x92\x3e\x08\xbc\x03\x39\xcc\x36\x05\xf2\x62\x86\x2f\x9b\x22\x2f\xe6\x26\xc3\x53\xbe\xff\xb6\x7b\xdc\xe3\x69\xf3\xf0\xb0\xd9\xee\xf3\xdb\x02\xbb\x07\x5c\xef\xb6\x37\xf9\x3e\xdf\x6d\x0b\xec\xbe\x62\xb3\x7d\xc6\x5d\xbe\xbd\x99\x83\x45\x1b\x8e\xe0\xb7\x10\x27\x7e\x1f\x21\x53\x8c\x5c\x4d\x99\x15\xcc\x1f\x00\x0e\xfe\x04\x94\x02\x5b\x39\x88\x45\x4b\xae\xee\xa9\x66\xd4\xfe\x95\xa3\x13\x57\x23\x70\xec\x24\x4d\x9f\x99\x40\xae\x32\x19\x5a\xe9\x44\x49\x8f\x95\x7f\x1e\x35\x6d\x88\xa1\x20\xe7\x05\x58\xe3\xf5\xb2\x64\xa5\x4b\xf3\x22\xae\x5a\xe3\xae\x4f\xea\x3b\xf9\x75\xb4\x1b\xe3\xa8\xe3\x14\xc8\xf2\x1a\x2f\x7d\xc9\x8b\x34\x26\xe5\xce\x98\x40\x6a\x1b\x4e\x85\x46\x52\xae\xc5\x7e\xe7\x58\xf3\xda\x00\x0b\xd0\x90\x16\xd6\xbb\x83\xd4\xcb\x91\xba\xf6\x4f\xad\x22\xee\xbc\x4b\xac\xa7\xb2\x89\x9c\x7c\x1f\x2d\xa7\x93\xcd\x52\x2b\xd6\x9f\x7a\xbf\x03\x00\x00\xff\xff\x0e\xc2\x0f\x31\xed\x02\x00\x00"), + }, + "/base/clusters": &vfsgen۰DirInfo{ + name: "clusters", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/base/clusters/cluster.yaml": &vfsgen۰CompressedFileInfo{ + name: "cluster.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 1004, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x84\x92\xcf\x6e\xe2\x3c\x14\xc5\xf7\x79\x8a\xa3\xe4\x5b\xb4\x12\x84\x3f\x8b\xaa\xe5\x5b\xa5\x94\x51\x23\x3a\x61\xd4\xd0\xa9\xba\xaa\x4c\x72\x49\xae\x30\x76\xc6\x76\x48\x79\xfb\x51\x42\x18\x81\x66\x31\xec\x38\xf7\xdc\xe3\x9f\x4f\x1c\x60\xae\xab\xa3\xe1\xa2\x74\x98\x8e\x27\x0f\x58\x97\x84\x65\xbd\x21\xa3\xc8\x91\x45\x54\xbb\x52\x1b\x1b\x7a\x81\x17\xe0\x85\x33\x52\x96\x72\xd4\x2a\x27\x03\x57\x12\xa2\x4a\x64\x25\x9d\x27\x03\xfc\x24\x63\x59\x2b\x4c\xc3\x31\x6e\x5a\x83\xdf\x8f\xfc\xdb\xff\xbd\x00\x47\x5d\x63\x2f\x8e\x50\xda\xa1\xb6\x04\x57\xb2\xc5\x96\x25\x81\xbe\x32\xaa\x1c\x58\x21\xd3\xfb\x4a\xb2\x50\x19\xa1\x61\x57\x76\xc7\xf4\x21\xa1\x17\xe0\xa3\x8f\xd0\x1b\x27\x58\x41\x20\xd3\xd5\x11\x7a\x7b\xe9\x83\x70\x1d\x70\xfb\x2b\x9d\xab\x66\xa3\x51\xd3\x34\xa1\xe8\x60\x43\x6d\x8a\x91\x3c\x19\xed\xe8\x25\x9e\x2f\x92\x74\x31\x9c\x86\xe3\x6e\xe5\x4d\x49\xb2\x16\x86\x7e\xd5\x6c\x28\xc7\xe6\x08\x51\x55\x92\x33\xb1\x91\x04\x29\x1a\x68\x03\x51\x18\xa2\x1c\x4e\xb7\xbc\x8d\x61\xc7\xaa\x18\xc0\xea\xad\x6b\x84\x21\x2f\x40\xce\xd6\x19\xde\xd4\xee\xaa\xac\x33\x1d\xdb\x2b\x83\x56\x10\x0a\x7e\x94\x22\x4e\x7d\x3c\x46\x69\x9c\x0e\xbc\x00\xef\xf1\xfa\x79\xf5\xb6\xc6\x7b\xf4\xfa\x1a\x25\xeb\x78\x91\x62\xf5\x8a\xf9\x2a\x79\x8a\xd7\xf1\x2a\x49\xb1\xfa\x86\x28\xf9\xc0\x32\x4e\x9e\x06\x20\x76\x25\x19\xd0\x57\x65\x5a\x7e\x6d\xc0\x6d\x8d\x94\xb7\x9d\xa5\x44\x57\x00\x5b\x7d\x02\xb2\x15\x65\xbc\xe5\x0c\x52\xa8\xa2\x16\x05\xa1\xd0\x07\x32\x8a\x55\x81\x8a\xcc\x9e\x6d\xfb\x31\x2d\x84\xca\xbd\x00\x92\xf7\xec\x84\xeb\x94\xbf\x2e\xd5\xbe\x10\x4f\x54\xdc\x3f\x80\x19\xfc\x4c\xd6\xd6\x91\x09\x77\xf7\x36\x64\x3d\x3a\x4c\x84\xac\x4a\x31\xf1\xbd\x1d\xab\x7c\x86\xf9\x69\xec\xed\xc9\x89\x5c\x38\x31\xf3\x00\x25\xf6\x34\x43\x4e\x5b\x51\x4b\xe7\xb5\x74\xad\xda\x07\x25\xe4\x1a\x6d\x76\xad\x02\x58\x32\x07\xce\xc8\x9e\xfe\x01\x19\xe7\xe6\x51\xea\x6c\xf7\x47\x01\x86\xf0\x27\xe3\xf0\xe1\x2e\x1c\x87\xe3\xd1\x64\xea\x77\x83\x4a\xe7\xff\x5c\x7a\x98\x86\x93\xbb\xfb\xd3\xda\x9d\x7f\x79\xde\x93\xde\x0b\xbe\xbc\x9c\xd4\x99\x90\xad\xa5\x32\xfa\xc0\x39\x99\xb4\x87\x06\x0e\x42\xd6\x74\x0e\xbe\x6a\x46\x34\xf6\x6c\xbf\xa8\xe5\x64\x3c\x95\xe3\x47\xef\x69\x5f\xd0\x8f\x8b\xe0\xb3\xc9\x50\xd1\x25\xd5\x76\x48\xc2\xba\xe1\xa4\xd7\xad\x2d\x97\x74\x4c\xba\x16\xfd\xff\x6e\xd2\xf4\xf9\x73\xb9\xf8\xf8\x4c\xa2\xef\x8b\x5b\xdf\xfb\x1d\x00\x00\xff\xff\xb6\xec\xf3\x8f\xec\x03\x00\x00"), + }, + "/base/clusters/controlplane.yaml": &vfsgen۰CompressedFileInfo{ + name: "controlplane.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 1037, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x93\x41\x6f\xea\x38\x14\x85\xf7\xf9\x15\x47\xe1\x2d\xfa\xa4\x12\xa0\xb3\x99\x61\x56\x19\x1e\xa3\x46\x6d\x03\x6a\xf2\xa6\xea\x0a\x99\xe4\x92\x5c\xd5\xd8\x1e\xdb\x21\xe5\xdf\x8f\x1c\xc2\xa8\xe8\xb1\x42\xbe\xdf\xbd\x3e\xe7\xf8\x66\x82\x95\x36\x67\xcb\x4d\xeb\xf1\x30\x5f\xfc\x81\xb2\x25\x3c\x75\x7b\xb2\x8a\x3c\x39\xa4\x9d\x6f\xb5\x75\x49\x34\x89\x26\x78\xe6\x8a\x94\xa3\x1a\x9d\xaa\xc9\xc2\xb7\x84\xd4\x88\xaa\xa5\x6b\xe5\x1e\xff\x90\x75\xac\x15\x1e\x92\x39\xee\x02\x10\x8f\xa5\xf8\xfb\x9f\xd1\x04\x67\xdd\xe1\x28\xce\x50\xda\xa3\x73\x04\xdf\xb2\xc3\x81\x25\x81\x3e\x2b\x32\x1e\xac\x50\xe9\xa3\x91\x2c\x54\x45\xe8\xd9\xb7\xc3\x35\xe3\x90\x24\x9a\xe0\x7d\x1c\xa1\xf7\x5e\xb0\x82\x40\xa5\xcd\x19\xfa\xf0\x95\x83\xf0\x83\xe0\xf0\x6b\xbd\x37\xcb\xd9\xac\xef\xfb\x44\x0c\x62\x13\x6d\x9b\x99\xbc\x80\x6e\xf6\x9c\xad\xd6\x79\xb1\x9e\x3e\x24\xf3\xa1\xe5\xa7\x92\xe4\x1c\x2c\xfd\xdb\xb1\xa5\x1a\xfb\x33\x84\x31\x92\x2b\xb1\x97\x04\x29\x7a\x68\x0b\xd1\x58\xa2\x1a\x5e\x07\xbd\xbd\x65\xcf\xaa\xb9\x87\xd3\x07\xdf\x0b\x4b\xd1\x04\x35\x3b\x6f\x79\xdf\xf9\x9b\xb0\xae\xea\xd8\xdd\x00\x5a\x41\x28\xc4\x69\x81\xac\x88\xf1\x57\x5a\x64\xc5\x7d\x34\xc1\x5b\x56\x3e\x6e\x7e\x96\x78\x4b\x5f\x5f\xd3\xbc\xcc\xd6\x05\x36\xaf\x58\x6d\xf2\x1f\x59\x99\x6d\xf2\x02\x9b\xbf\x91\xe6\xef\x78\xca\xf2\x1f\xf7\x20\xf6\x2d\x59\xd0\xa7\xb1\x41\xbf\xb6\xe0\x10\x23\xd5\x21\xb3\x82\xe8\x46\xc0\x41\x5f\x04\x39\x43\x15\x1f\xb8\x82\x14\xaa\xe9\x44\x43\x68\xf4\x89\xac\x62\xd5\xc0\x90\x3d\xb2\x0b\x8f\xe9\x20\x54\x1d\x4d\x20\xf9\xc8\x5e\xf8\xe1\xe4\x17\x53\x61\x43\x22\x61\x78\x5c\x80\x25\xe2\x4a\x76\xce\x93\x4d\x3e\x7e\x77\x09\xeb\xd9\x69\x21\xa4\x69\xc5\x22\x8e\x3e\x58\xd5\x4b\xbc\x88\xaa\x65\x45\xd1\x91\xbc\xa8\x85\x17\xcb\x08\x50\xe2\x48\x4b\x54\x5a\x79\xab\xa5\x91\x42\xd1\x74\x1e\x01\x52\xec\x49\xba\x00\x00\x8e\xfc\x2d\x11\x05\x13\xa1\x76\xba\xdc\x3c\x72\x1f\xdd\x9e\x64\x60\x4f\x8b\x64\xf1\x5b\x32\x1f\x0e\xc7\xbe\x6d\xe8\xfb\x5a\x31\x56\x9f\xb8\x26\x5b\x8c\xa3\x80\x93\x90\x1d\x5d\xfe\x02\x5f\x6d\x89\xde\x5d\xe9\xff\x2d\x8d\xd8\xc5\x57\xfa\x56\x8c\xd6\xb6\x5f\xa6\x8e\x08\x2b\xe7\xc3\x66\x97\x67\x43\x4b\xc4\xdf\xee\x56\x9b\xbc\x7c\xdd\x3c\xef\xb6\xcf\x69\xbe\xde\xbd\xa4\xab\xc7\x2c\x5f\xef\xca\xf7\xed\xfa\x7b\x7c\xed\x11\xc7\x6c\x6c\xdb\x5a\x1d\x3e\x96\x10\xee\xc5\xc9\x74\x88\x20\x19\xa3\x9e\x0a\xc3\xd3\xab\xba\xa9\xe8\x5d\xe2\xb8\x71\xe3\x03\x5c\xc7\x7d\xd0\x39\x1f\x62\x8e\xbf\xdd\x15\xc5\xe3\xee\x69\xfd\xbe\xcb\xd3\x97\x70\xdf\x7f\x01\x00\x00\xff\xff\xc1\xc7\x22\x89\x0d\x04\x00\x00"), + }, + "/base/clusters/kustomization.yaml": &vfsgen۰CompressedFileInfo{ + name: "kustomization.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 695, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\xc1\x6e\xdb\x3c\x10\x84\xef\x7c\x8a\x81\x75\xf9\x7f\xc0\x91\x93\xdc\xea\x9e\xd4\x24\x45\x85\x04\x32\x60\x39\x0d\x72\xa4\xa4\xb5\xb4\x28\x45\xb2\xe4\x2a\x8a\xfa\xf4\x85\x64\x07\xad\x51\xdd\x34\x3b\xbb\xfc\x38\xdc\x04\x77\xce\x4f\x81\xdb\x4e\x70\x7b\x7d\xf3\x09\x87\x8e\xf0\x38\x54\x14\x2c\x09\x45\x64\x83\x74\x2e\xc4\x54\x25\x2a\xc1\x13\xd7\x64\x23\x35\x18\x6c\x43\x01\xd2\x11\x32\xaf\xeb\x8e\x3e\x2a\x6b\x7c\xa7\x10\xd9\x59\xdc\xa6\xd7\xf8\x6f\x36\xac\xce\xa5\xd5\xff\x9f\x55\x82\xc9\x0d\xe8\xf5\x04\xeb\x04\x43\x24\x48\xc7\x11\x47\x36\x04\x7a\xaf\xc9\x0b\xd8\xa2\x76\xbd\x37\xac\x6d\x4d\x18\x59\xba\xe5\x98\xf3\x90\x54\x25\x78\x3d\x8f\x70\x95\x68\xb6\xd0\xa8\x9d\x9f\xe0\x8e\x7f\xfb\xa0\x65\x01\x9e\xbf\x4e\xc4\x6f\x37\x9b\x71\x1c\x53\xbd\xc0\xa6\x2e\xb4\x1b\x73\x32\xc6\xcd\x53\x7e\xf7\x50\x94\x0f\x57\xb7\xe9\xf5\xd2\xf2\x6c\x0d\xc5\x88\x40\x3f\x07\x0e\xd4\xa0\x9a\xa0\xbd\x37\x5c\xeb\xca\x10\x8c\x1e\xe1\x02\x74\x1b\x88\x1a\x88\x9b\x79\xc7\xc0\xc2\xb6\x5d\x23\xba\xa3\x8c\x3a\x90\x4a\xd0\x70\x94\xc0\xd5\x20\x17\x61\x7d\xd0\x71\xbc\x30\x38\x0b\x6d\xb1\xca\x4a\xe4\xe5\x0a\x5f\xb2\x32\x2f\xd7\x2a\xc1\x4b\x7e\xf8\xb6\x7b\x3e\xe0\x25\xdb\xef\xb3\xe2\x90\x3f\x94\xd8\xed\x71\xb7\x2b\xee\xf3\x43\xbe\x2b\x4a\xec\xbe\x22\x2b\x5e\xf1\x98\x17\xf7\x6b\x10\x4b\x47\x01\xf4\xee\xc3\xcc\xef\x02\x78\x8e\x91\x9a\x39\xb3\x92\xe8\x02\xe0\xe8\x4e\x40\xd1\x53\xcd\x47\xae\x61\xb4\x6d\x07\xdd\x12\x5a\xf7\x46\xc1\xb2\x6d\xe1\x29\xf4\x1c\xe7\xc7\x8c\xd0\xb6\x51\x09\x0c\xf7\x2c\x5a\x16\xe5\x9f\x4b\xcd\x1b\xa2\xb4\xe7\xf3\x02\x6c\xf1\x76\x53\x91\xe8\x1b\xf5\x83\x6d\xb3\xc5\xe3\x10\xc5\xf5\xfc\x6b\x69\x57\x2a\x50\x74\x43\xa8\x29\x6e\x15\x70\x85\xda\x0c\x51\x28\xa4\x93\xee\xcd\x49\x70\x56\x82\x33\xde\x68\x4b\x7f\x54\xeb\x9a\xf3\xdf\xef\x00\x00\x00\xff\xff\x10\x92\x52\x86\xb7\x02\x00\x00"), + }, + "/base/clusters/node.yaml": &vfsgen۰CompressedFileInfo{ + name: "node.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 974, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\x41\x6f\xbb\x38\x14\xc4\xef\x7c\x8a\x11\xec\xa1\x95\x12\xd2\xa4\x97\xdd\xec\x89\x6d\xb3\x2a\x6a\x4b\xaa\x92\x6e\xd5\x53\xf5\x02\x2f\xf0\x14\xb0\xbd\xb6\x09\xcd\xb7\x5f\x91\x90\x55\xab\x3f\x27\xe4\x19\x3f\xff\x3c\x9e\x08\x77\xda\x1c\xad\x54\xb5\xc7\xe2\x66\xfe\x07\x36\x35\xe3\xb1\xdb\xb2\x55\xec\xd9\x21\xe9\x7c\xad\xad\x8b\x83\x28\x88\xf0\x24\x05\x2b\xc7\x25\x3a\x55\xb2\x85\xaf\x19\x89\xa1\xa2\xe6\x8b\x32\xc1\x3f\x6c\x9d\x68\x85\x45\x7c\x83\xab\xc1\x10\x8e\x52\x78\xfd\x67\x10\xe1\xa8\x3b\xb4\x74\x84\xd2\x1e\x9d\x63\xf8\x5a\x1c\x76\xd2\x30\xf8\xab\x60\xe3\x21\x0a\x85\x6e\x4d\x23\xa4\x0a\x46\x2f\xbe\x3e\x1d\x33\x0e\x89\x83\x08\x1f\xe3\x08\xbd\xf5\x24\x0a\x84\x42\x9b\x23\xf4\xee\xbb\x0f\xe4\x4f\xc0\xc3\x57\x7b\x6f\x96\xb3\x59\xdf\xf7\x31\x9d\x60\x63\x6d\xab\x59\x73\x36\xba\xd9\x53\x7a\xb7\xca\xf2\xd5\x74\x11\xdf\x9c\xb6\xbc\xa9\x86\x9d\x83\xe5\x7f\x3b\xb1\x5c\x62\x7b\x04\x19\xd3\x48\x41\xdb\x86\xd1\x50\x0f\x6d\x41\x95\x65\x2e\xe1\xf5\xc0\xdb\x5b\xf1\xa2\xaa\x09\x9c\xde\xf9\x9e\x2c\x07\x11\x4a\x71\xde\xca\xb6\xf3\x3f\xc2\xba\xd0\x89\xfb\x61\xd0\x0a\xa4\x10\x26\x39\xd2\x3c\xc4\x5f\x49\x9e\xe6\x93\x20\xc2\x7b\xba\x79\x58\xbf\x6d\xf0\x9e\xbc\xbe\x26\xd9\x26\x5d\xe5\x58\xbf\xe2\x6e\x9d\xdd\xa7\x9b\x74\x9d\xe5\x58\xff\x8d\x24\xfb\xc0\x63\x9a\xdd\x4f\xc0\xe2\x6b\xb6\xe0\x2f\x63\x07\x7e\x6d\x21\x43\x8c\x5c\x0e\x99\xe5\xcc\x3f\x00\x76\xfa\x0c\xe4\x0c\x17\xb2\x93\x02\x0d\xa9\xaa\xa3\x8a\x51\xe9\x03\x5b\x25\xaa\x82\x61\xdb\x8a\x1b\x1e\xd3\x81\x54\x19\x44\x68\xa4\x15\x4f\xfe\xb4\xf2\xcb\xa5\x86\x86\x04\x64\x64\x2c\xc0\x12\x61\xd1\x74\xce\xb3\x8d\xf7\xbf\xbb\x58\xf4\xec\x30\xa7\xc6\xd4\x34\x0f\x83\xbd\xa8\x72\x89\x67\x2a\x6a\x51\x1c\xb4\xec\xa9\x24\x4f\xcb\x00\xa8\x58\xb1\x25\xcf\x19\xb5\xbc\x84\xd2\x25\x4f\x03\xa0\xa1\x2d\x37\x6e\xd0\x01\xc7\xfe\x2c\x04\x03\xfb\xb0\x76\x38\x1f\x38\xea\xfb\x6e\xcb\xcd\xe0\x39\xcc\xe3\xf9\x6d\xbc\x08\x00\x63\xf5\x41\x4a\xb6\xf9\xb8\x01\x38\x50\xd3\xf1\xf9\x17\xf8\xce\x4c\xbd\xbb\xb8\xff\xe7\x1d\x6d\x67\xe8\xe4\x3d\x1f\xb9\x5f\xbe\x4d\x1d\x2d\xa2\x9c\x1f\x6a\xbb\x39\x1a\x5e\x22\xf4\xb7\x71\xcb\xa5\x74\x6d\x78\xd1\xa9\x4d\x47\xcb\x8b\xd5\x43\xeb\x97\x08\x87\xbb\xb8\x78\xcc\x6a\x4a\x46\xa6\x17\x82\x29\xf5\x2e\x76\x52\xb9\x31\xc1\xcb\x98\x3d\x1f\xcf\xf9\x84\xbf\x5d\xe5\xf9\xc3\xe7\xe3\xea\xe3\x33\x4b\x9e\x57\xd7\x61\xf0\x5f\x00\x00\x00\xff\xff\x19\xe0\xcd\x94\xce\x03\x00\x00"), + }, + "/base/provider-components": &vfsgen۰DirInfo{ + name: "provider-components", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/base/provider-components/aws-provider-components.yaml": &vfsgen۰CompressedFileInfo{ + name: "aws-provider-components.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 23393, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x3c\xdf\x6f\xe3\x36\x93\xef\xf9\x2b\x06\xbd\x87\xde\x01\x6b\xbb\xe9\x2e\x3e\x1c\x0c\xf4\xc1\x9b\xa4\xad\xb1\x4d\xd6\x58\xa7\x5b\xdc\x1d\x0e\xc5\x58\x1a\x5b\xbc\x50\xa4\x3e\x92\xb2\xd7\xfd\xeb\x0f\x24\x25\x59\x3f\x28\x59\xc9\x6e\xda\x2d\xbe\xf8\xc9\x26\x87\xc3\xe1\x70\x38\xbf\x38\xf4\x64\x32\xb9\xc0\x8c\x7d\x24\xa5\x99\x14\x73\xc0\x8c\xd1\x27\x43\xc2\xfe\xd2\xd3\x87\xff\xd4\x53\x26\x67\xfb\xcb\x0d\x19\xbc\xbc\x78\x60\x22\x9e\xc3\x55\xae\x8d\x4c\x3f\x90\x96\xb9\x8a\xe8\x9a\xb6\x4c\x30\xc3\xa4\xb8\x48\xc9\x60\x8c\x06\xe7\x17\x00\x91\x22\xb4\x8d\xf7\x2c\x25\x6d\x30\xcd\xe6\x20\x72\xce\x2f\x00\x38\x6e\x88\x6b\x0b\x03\x10\x49\x61\x94\xe4\x9c\xd4\xc4\x48\xc9\xcb\x09\xe7\xf0\xcd\xe5\xf4\xbb\x6f\x2e\x00\x04\xa6\x34\x07\x3c\xe8\x88\xe7\xda\x90\xca\x94\xdc\xb3\x98\x94\xce\x28\xd2\x53\x3c\xe8\xb2\xa1\x18\x79\x61\x3b\x2c\xee\x9d\x92\x79\xe6\x46\xb6\x21\x3c\xd2\x82\x00\xbf\xa2\xc5\x6f\xeb\x2b\x8f\x7f\x55\x00\xaf\x33\x8a\x1c\x40\xc6\x73\x85\xbc\x97\x84\x0b\x00\x1d\xc9\x8c\xe6\x70\x67\x91\x66\x18\x51\x7c\x01\xb0\x47\xce\x62\xb7\x7e\x3f\x8d\xcc\x48\x2c\x56\xcb\x8f\xaf\xd7\x51\x42\x29\xfa\x46\x80\x4c\xc9\x8c\x94\x61\x25\x35\xf6\x53\xdb\x8c\xaa\x0d\x20\x26\x1d\x29\x96\x39\x8c\xf0\xad\x45\xe5\x61\x20\xb6\xec\x27\x0d\x26\x21\xd8\xfb\x36\x8a\x41\xbb\x69\x40\x6e\xc1\x24\x4c\x83\xa2\x4c\x91\x26\x61\x1c\x49\x35\xb4\x60\x41\x50\x80\xdc\xfc\x1f\x45\x66\x0a\x6b\x52\x16\x09\xe8\x44\xe6\x3c\xb6\xdb\xb3\x27\x65\x40\x51\x24\x77\x82\xfd\x51\x61\xd6\x60\xa4\x9b\x92\xa3\x21\x6d\x1a\x18\x99\x30\xa4\x04\x72\xcb\x84\x9c\x5e\x01\x8a\x18\x52\x3c\x82\x22\x3b\x07\xe4\xa2\x86\xcd\x81\xe8\x29\xdc\x4a\x45\xc0\xc4\x56\xce\x21\x31\x26\xd3\xf3\xd9\x6c\xc7\x4c\x29\x7e\x91\x4c\xd3\x5c\x30\x73\x9c\x39\x79\x61\x9b\xdc\x48\xa5\x67\x31\xed\x89\xcf\x30\x63\x13\x47\xa7\x30\x4e\x64\xd3\xf8\xdf\x54\x21\x9a\xfa\xdb\x1a\x61\xe6\x68\x77\x49\x1b\xc5\xc4\xae\x6a\x8e\xf0\xca\xf2\x7f\xcb\x22\x34\xd4\xcb\xef\xab\x45\x0d\x0a\x98\x06\x84\xd5\xcd\x2d\x90\x88\x64\x4c\x31\x5c\x2d\xa0\xde\xbf\x95\xca\xb1\xa6\x90\xed\x06\x6f\x32\x8e\x82\x40\xc8\x98\xf4\xb4\xd6\xb1\x95\x2a\x45\x33\x87\xcd\xd1\xd0\x79\x92\xdf\xd1\x71\x80\xd4\x95\x62\x7b\x34\xf4\x8e\x8e\x5d\x4a\x57\xef\xae\xd6\x97\x96\xde\x1a\xd0\x33\x93\xeb\x0e\x58\xaf\x20\xbf\x63\x22\xf6\x64\xfa\x61\x5e\x20\x4e\xf2\x6a\x9b\x2c\x71\x1f\x6e\xd6\xf7\x50\x6e\xab\x93\xe9\xa6\x10\x3b\xf1\x3d\x0d\xd3\x27\x49\xb6\x92\xc7\xc4\x96\x94\x3f\x09\x5b\x25\x53\x87\x91\x44\x9c\x49\x26\x8c\x5f\x3b\x67\x24\x9a\x52\xac\xf3\x4d\xca\x8c\x3d\x3a\xff\xcc\x49\x1b\x2b\xf0\x53\xb8\x42\x21\xa4\x81\x0d\x41\x9e\xc5\x68\x28\x9e\xc2\x52\xc0\x15\xa6\xc4\xaf\x50\xd3\x97\x96\x63\xcb\x50\x3d\xb1\x1c\x3c\x2f\xc9\x75\xdd\xdb\x04\xf4\xcc\xa9\x9a\x15\xed\x86\x74\xcb\x7d\x42\x56\x1d\xc2\x07\x07\x56\x70\xc7\xe9\x3d\xe0\x6c\x4f\x1a\x98\x98\x9e\xa3\x45\xeb\xe4\x1d\x1d\xad\x42\xec\x9d\x66\xbd\xfe\xb9\x00\xb1\xdb\x6f\x67\xb1\x4a\xd9\x2b\x2c\xb2\x08\xe0\x81\x8e\x56\xc9\xa0\x31\x18\x25\xa5\xba\xd9\xa0\xee\x68\xb0\x44\x6a\x33\x40\xd2\xbe\xb4\x6c\xfb\x4b\xe4\x59\x82\x97\x17\xda\xa0\xc9\x9d\xc6\xc5\x28\xa2\xcc\x50\x7c\xd7\x36\x08\xdf\x7c\xd3\x50\xfe\xee\x67\x24\x45\xec\xec\x9c\x9e\xc3\xff\xfc\xaf\x55\xfc\x46\x2a\x8a\x0b\x45\xec\x1b\xff\xae\xd6\xd4\x71\x84\x9e\xd5\xa0\xba\x29\xce\x99\xd4\x82\x8e\x17\xab\xfa\xb7\xb6\xaa\xc5\x29\xad\x73\x3a\xb4\x27\xf6\x43\x1b\xfd\x3e\x33\x2c\xb5\x74\x37\x7b\x5a\xbb\xb3\x14\xb1\x33\xaf\x1a\x0e\x09\x99\x84\xbc\xd1\x62\x42\x1b\x14\x91\x53\x22\xb2\xc4\xe3\x4c\xda\x22\xc5\x3f\x5a\x9b\x62\x3f\x37\x6f\xd7\xb0\x9c\xbd\x9f\xb6\x3a\xfc\x32\x36\x52\x72\xc2\xe6\x20\x12\xb8\xce\xb3\x4c\x2a\x33\x48\x9e\xf5\x17\xd9\x96\xd5\xc8\x23\x91\x58\xca\x62\x10\x64\x0e\x52\x3d\x58\x53\x76\x60\x26\x81\x9b\xbb\x85\x25\x97\x04\x6e\x38\xc5\xe3\x29\x61\x98\xae\x94\xdc\x32\x4e\x83\x94\xdc\xb7\x74\xe9\x72\x71\x7b\x62\x53\xe6\x11\x00\x6a\x2d\x23\x66\x2d\x98\xa7\xc9\x24\xd4\x61\x55\x39\xe8\x15\xb0\x2d\x60\x96\x71\x16\x59\x8a\xc3\x04\xb7\x24\xc0\x8d\xef\x6c\x68\x3f\x68\x8a\x3b\x5a\x0e\x0b\x80\x5d\xd7\xf2\xba\x5c\xd5\xe2\x76\x09\xb9\xa6\xd8\x9e\x18\x8e\xb9\x88\x92\x86\x3c\x8c\x27\xb2\x18\x60\xd5\xd3\x79\xbe\x46\xb9\x52\x24\x0c\x58\x3d\x55\x31\xf8\xd1\x73\x3e\x74\x6d\xe3\xd9\x5d\x5c\xaf\x7f\x76\x16\x31\x43\xa6\x46\x4f\x94\x79\x2f\x6f\x99\x9d\x9d\xaa\x80\x84\xe5\x6a\xff\x06\x30\x8e\x15\x69\x6d\x85\x84\xed\x84\xe7\xf1\x93\x16\x9a\xe5\x1b\xce\xa2\x31\xd3\x3b\xc0\x71\xb3\x3f\x55\x1c\x35\x45\xb9\x62\xe6\xf8\x93\xb5\x63\xcb\x58\x0f\x1f\xe7\x06\xf0\xb5\x06\x54\x04\x52\x10\x48\x05\xa9\xd5\xaa\x25\x36\x6f\x16\xc1\x82\x74\xbc\x52\xa8\xc9\x17\x6c\x88\x4b\xb1\x73\x6e\x64\x0b\x88\x19\x4a\x3b\xd4\x0c\x2c\xa4\xec\x42\xa5\xf0\xd8\xf6\x59\x05\x99\x47\x9d\x23\x3f\xe4\xc9\xa2\x6c\x70\x37\xcc\x48\x3b\x9b\x05\x0a\x69\x9c\x33\xd3\xb5\xfc\xd6\xaa\xe3\xdc\x74\x15\xcb\x2d\xf4\xe8\x95\xe4\x9a\xd4\x75\xcb\x7f\xee\xa0\xff\xb5\x00\x2a\x7d\x56\x85\x07\xb0\x2e\x1a\x78\x18\xc8\x50\xeb\xae\xc4\x76\xb6\xf6\x90\xb0\x28\xb1\x38\x54\x2e\x20\xcf\xa4\xb0\xfa\xde\x68\xa3\x30\x9b\xc2\xbd\x0b\x53\x18\xf1\x18\xd2\x5c\x1b\x28\x02\x8e\x0d\x6a\xfa\xc7\x9b\x32\x92\xeb\xa0\xb4\xee\x40\xe1\x5e\x48\xc1\x8f\x2e\x44\xb1\xa4\x1c\x12\x12\x76\x1a\x61\xcd\x0f\x82\xa0\xc3\x63\x37\xd9\x06\x40\x4c\x35\xad\xf3\x04\x58\x7c\x2e\xce\x78\x09\xfc\xbe\xb2\xc0\xaf\xf0\x43\xc6\x78\x65\x98\x31\xcf\xc6\x1b\xbe\x19\x3c\x10\x8b\xd5\xb2\x00\xfc\xe5\x6d\x79\x28\xde\xe5\x1b\x52\x82\xac\xab\x86\x19\x03\xed\xfa\x21\xe2\x56\xa1\x47\xc0\x25\x76\xa5\x77\x83\xdc\x4a\x64\xc7\xb2\xf5\xd1\xe7\x68\x34\x9e\x91\xa1\xbe\x36\x95\x15\x68\xe5\xd8\xd3\x27\xa3\xb0\x86\xa3\xad\x9f\x02\x28\xc1\xbb\xe6\x12\xe3\x5e\x7a\xcf\xd1\x0c\xce\x2d\xe2\x64\xc3\x38\x99\x77\x3c\xca\x20\xf1\xcb\x13\xbc\xe3\x30\x4b\xed\x39\x40\x53\x26\x6d\x04\x45\x16\xd0\x1d\x26\xce\xe5\x21\xa0\x1c\x2a\xfa\xa5\x95\x60\x4b\x00\xfc\xbb\x90\x5e\x73\x25\xa8\x61\x43\x24\xc0\x1e\x1f\x90\x7b\x52\x2d\xc4\xff\x01\x1b\xda\x4a\xd5\xd5\x62\xd5\x82\x1c\x5d\x11\x97\x56\xdf\x6c\x8e\xe3\xb8\x04\xb5\x34\x12\x13\xe6\x1f\x6f\x7a\x60\xbc\x24\xdb\xe0\x67\x47\x2a\x00\xd3\x6b\x2a\x1c\x1f\x85\x0e\x39\x5a\x1d\x16\x5f\xdf\xad\xeb\x99\x88\x58\xe8\x86\xef\x75\x76\x31\x03\xa6\x1a\x20\x21\xe4\x26\xb9\x4a\x28\x7a\x38\x2f\xa9\x3f\x9f\x80\x4b\x6a\xca\x83\x43\x7c\x53\xe0\x82\xc8\xf5\x9f\x24\x36\xc8\xbb\xca\xca\x7e\xb6\xc4\xfa\x59\x8f\xf7\x89\x22\x9d\x48\xde\x71\x2f\xca\xcf\x97\xd8\xcf\x22\xd0\xdd\x23\x7f\xde\x59\x0c\xaa\x1d\xf5\x1e\xc0\xc1\x0d\x75\x00\xc3\x07\xf8\xcb\xd0\x98\x8b\x3f\x93\xf3\x21\x3b\x5f\x7e\x26\x05\xbf\x82\x5d\xe5\x86\x85\xc7\x79\x46\x05\xfb\xda\xab\x0b\x02\x75\x99\xf0\x58\x2d\xc0\x99\x36\x24\x48\x9d\x3f\x7d\xbf\x94\x90\x4e\x99\x0a\xef\x61\x5b\x2d\x50\x3f\x83\x15\xba\x27\x1e\x40\xeb\xa3\x2a\xf2\xbe\xdd\x86\x00\x0d\x70\x42\x6d\x6c\x74\x11\x3a\x9c\x3d\xd1\x01\x8c\x38\xb7\xa7\xe8\x63\x15\x48\x5f\x9c\x3e\x63\xa4\x67\x8c\xbc\xd6\xe6\x53\xd2\xc8\x48\xf6\x9e\xe1\x11\x27\x0c\x20\x94\x73\x79\x0e\xa2\xb3\xcf\x27\x76\xe8\xec\x58\x21\x2e\xa7\xe8\xeb\x96\x2a\x74\x42\xfc\xe1\x6a\x72\xf4\x1c\x58\x1f\xa6\xc1\x13\xd2\x1f\x51\xda\x8f\x18\x63\x42\xdb\xf9\x8a\x96\xcc\x2f\x4d\x25\xf0\xb9\x60\xff\xcc\xc9\x9d\x0e\xd6\xcd\xcf\x41\xe1\x66\x69\x1f\x94\x36\xd0\x94\xde\x5b\x0c\xcc\x5f\x4c\xf8\xab\x0c\x87\x1d\xb9\x96\xde\xd5\xec\xc6\xe0\xf6\x83\x1a\x58\x6c\x3d\xec\x2d\x7b\x82\x0d\x77\xe9\xd9\xf3\x4c\x70\x69\xe8\xca\x8d\x68\xd0\x5e\xa0\x78\x05\xc4\x5c\x76\xd0\xa7\x73\xc9\x4c\xb6\x18\xf5\x49\x95\x54\x65\x5e\xe6\xf1\x04\x9f\x49\x76\x74\x49\x6f\x27\x3c\x5a\x1a\xb0\x99\xef\x38\x65\x67\xc2\x1b\x28\xc7\x39\x1e\x03\xba\xed\xcc\x91\x1b\x92\xd7\x32\x0b\x32\x62\xd1\x1e\x32\xb0\x5a\xd7\xa1\x4b\x39\xfb\xb8\xba\x2a\xee\xa1\xbe\xca\x05\x87\x92\x30\x9d\xb5\xde\xe3\xce\x2f\x13\x52\xcc\xdc\x29\xed\xcb\xca\x8c\x74\x77\x83\xba\xa4\xb7\xab\x94\xf7\x9f\xd0\xd0\x01\x8f\x67\x72\x54\xcb\x16\xf4\x75\x79\xa6\x58\x7c\x4a\x55\x79\x10\xd8\x79\x98\x21\x6b\x5c\x2d\xed\xe3\xea\xea\x69\xf9\xc2\x47\x64\x0b\x6b\x5c\xae\x72\x0e\x4a\x72\x9a\xd9\x70\xbe\x4a\xbb\x15\x23\x3a\xa4\xfa\x74\xa2\x91\xc0\x8c\x2e\x55\xa5\xd5\xab\x3e\xeb\x29\x8e\xa3\x53\x65\x85\x08\x0f\xd3\x5d\x89\x79\xc4\xf3\x98\x5c\x00\x59\xcb\x0a\xd6\xf5\xad\x66\x31\xf5\xb1\xb0\x47\xaa\x87\xdd\x13\xdc\x23\xe3\xb8\x61\x9c\x99\xe3\x7f\x4b\x11\x54\xae\x67\x4f\x45\xc4\x62\xf5\x96\xcb\xe8\xe1\x49\xa3\xbb\x17\x14\xa3\x86\x09\xec\x97\xe2\x51\x08\x7c\xb6\x7b\x68\x68\xe8\xfa\xc7\x7f\x94\xcc\x0d\xdd\xe3\x86\x07\xae\x4b\x46\x4d\xde\xa7\x2c\xce\xba\x08\xfb\x2c\x7a\xd2\x94\xfd\xbe\x51\x2b\x8b\x58\x36\xba\x89\x02\xed\x6d\x89\x09\x80\x54\xf2\x10\xe8\xf3\x5c\x0f\x74\xd4\x59\x1a\xe8\xae\x6f\x77\x57\xf5\x9e\x53\x85\x5d\x8d\xbd\xcf\x3a\x5b\xdf\x38\x94\xd6\xd8\xd4\xaf\x9f\xcb\xea\x8b\x7d\x16\x3d\x26\x3d\x36\x78\x34\x06\x37\x2c\x7c\x2c\x06\x87\xf4\x09\xd5\x00\x7b\xfa\xc4\x22\x20\x14\xfd\xfb\xda\x83\xbf\xd5\xfc\x52\x01\x12\xa8\x00\x49\x31\x4a\x98\xa0\x67\xab\xa7\xbc\xf5\xf8\x87\xea\x29\x43\x24\x3c\x43\xe5\x47\xec\xf7\x0c\xf9\xba\xd7\xa2\x37\xb3\xc5\x3d\x03\xda\x4e\xa2\xa2\x2d\x29\x12\x11\xb9\xb2\x8d\xa0\x45\x2f\x9c\x65\x97\xae\x2d\x6e\x67\x6c\xc8\x9f\x65\x9c\x05\xae\x55\x6d\x10\xa5\xdb\x57\x8b\x1a\x0e\x76\x5c\x03\xed\xc6\xc7\x47\x4c\x54\x8b\x73\x95\x52\xe2\xd8\x19\x5b\x1a\xf0\x32\x5d\x5c\x56\x72\xd1\x9e\x9a\xa1\xa4\x54\xa5\xb3\x8b\x91\xc9\xd1\xc8\x86\xe7\x17\xb0\xf0\xfd\xba\x07\x95\xe8\xea\x82\x26\x87\x3f\xdc\x79\x06\x7a\x89\xef\xd1\xaa\x41\x5d\xb3\x65\xdc\x04\x53\x39\xcd\xeb\xa5\x1f\x3d\x58\x71\xc3\xe4\x63\xc9\x07\x3a\xce\xfc\x2d\x53\x86\x4c\xe9\xaa\x7c\xa0\x88\x0b\xbb\xbe\x18\x00\x9e\xae\x9e\xee\x13\x3a\xba\x5b\xe0\x72\xf7\x30\x8a\xa4\x8a\xdd\x3d\x95\xdf\x47\x95\x73\x3a\x71\xdc\x27\xc2\x03\x38\x17\xbf\xad\x61\xb1\x5a\x9e\xee\x89\x62\xe9\x4f\xde\x14\x5d\xc9\xca\x34\x92\xe9\x6c\xf1\xdb\xfa\xe6\xea\xfb\x99\xaf\x03\x9a\xfd\xaa\x49\xfd\x94\xb3\x98\x66\xbf\x6a\x26\x76\xbf\xfb\xd5\x31\xb1\x9b\x26\x26\xe5\xdf\x76\x35\x78\x5f\x98\x71\x2e\x63\xd4\x17\xea\x77\x18\x7c\x57\x0b\xf5\xfd\x96\x4c\xc1\x53\xe5\x95\x81\xe3\x54\x84\x9a\x26\xda\xaa\x3e\xc3\xf6\xc1\x18\x16\xc6\x24\x57\x7c\x35\xd3\x28\xb2\x3e\x3a\xd0\x93\x3f\x5b\xbf\xb1\xf7\x64\x56\xb5\x51\x9e\xda\xde\x94\x8f\x07\x7b\xc4\x32\x06\x42\xbb\x51\xab\x1c\x0e\xf1\xce\xa5\x67\x2d\xd3\x83\x1d\x7e\x1d\x8f\x33\xcd\x43\xa4\x84\x9c\x83\x66\xe8\x76\xfd\xb4\xa3\x3d\x68\xca\x9b\x94\x9c\x34\xfa\x7d\xcb\xef\xe8\xd1\xe3\x65\xec\x5b\x4b\x2c\xb9\xe8\xd7\x2a\xcd\x38\xf6\xba\xb3\x5e\x5f\xd2\x74\xbc\xeb\x3a\xd6\x62\x90\xd6\x33\xc3\x38\xf6\x87\x3c\xa6\x2d\xe6\xdc\x94\x17\x5f\x95\xf6\x2c\x94\xb9\x8f\xb2\x5b\xb7\x67\x1e\xe3\xde\x6b\xfc\x6a\x08\x1c\x18\xe7\x40\x42\xe7\xca\x85\x5a\xb5\xd1\x50\x5c\x6f\xbf\x82\x4d\x6e\x3c\x9c\x90\xcd\x6d\x53\x94\xca\x3d\x39\x23\x20\x7d\x79\x9c\x5b\xa1\xb5\x3c\x29\x1e\x81\x3e\x31\x97\x63\xee\xad\xbb\x08\xf2\x1f\x53\xd6\xcf\xde\xdb\x65\x55\x06\x51\x5a\xc2\x92\x45\xb6\xcf\x05\xbf\xbe\xd2\xc1\x48\xef\xbe\xf8\x08\xb2\x30\xfb\xad\xf4\x40\x97\xa2\xde\xcb\xe9\xae\x7d\x79\x84\x75\xe9\x15\xc0\x1e\xcb\xf2\xf9\x76\x05\x30\x10\x13\x7d\x96\x55\xb1\x36\xa4\x83\xf3\x59\x6d\xca\x93\x42\xfc\x7e\x6b\xf2\x3c\xb6\xe4\x8c\x8e\x1d\xb2\x23\xcf\x62\x45\x1e\x69\x43\x06\x2d\xc8\xf9\x1b\xc9\x01\xeb\x31\x14\x82\x07\x2d\x47\xaf\xdd\x78\x42\xbc\xdb\xb5\x18\xe3\xed\x45\xcf\xaa\xc3\xba\xea\xa5\xc2\xfb\xcf\xab\xf0\x66\x98\x2e\x4f\x37\x53\xed\x9a\xe4\xe6\x06\x2f\x6e\x5b\xa0\x5e\x7b\x96\xb7\x45\x28\xc2\x25\xca\x46\x36\xb5\xbe\xbb\x70\x18\x28\xad\x0b\xd3\x59\xc0\xdd\xb7\x0a\x07\x9b\x62\xb1\xac\x41\x95\x36\xcd\xa2\xb3\xe4\x9d\xaa\x09\x4b\x23\x36\x85\x9b\x4f\x98\x66\x9c\xe6\x90\xbe\x99\x7e\xe2\xa8\x76\x74\x96\x61\x81\x9a\xdf\x06\x0d\x03\x8f\x61\xca\xd2\x5f\x6b\x52\x2c\x31\x9c\x9f\xb7\xe3\x2f\x8f\xb0\xbe\xee\x5a\xbc\xa2\x32\x7a\xd5\xbf\x29\xab\x02\x02\x74\xe7\x65\x41\xe3\xe1\x43\xa1\x71\x76\x64\x00\x43\x39\xce\xe5\x6a\x0a\x2b\x45\x11\xc5\xce\x41\xf3\xaf\xfd\x98\xb6\xce\x8b\xdb\x58\xbb\xef\x1a\xb6\x92\x73\x79\xd0\x73\xb8\x6c\x14\xa0\xb2\xad\x73\x72\xbe\x6f\x1a\xac\xe2\x65\xcf\x6c\xcb\x71\x2f\x55\x85\xe9\xf5\xb4\xb8\x50\x28\x7d\xe2\x2e\xbb\xda\x79\x6d\x7f\xcf\xd0\xff\x48\xcc\xa3\x73\xa2\xd9\xf1\x31\x8b\xca\x65\x23\xad\xc3\x75\x5a\x57\xb8\xba\x75\xb9\x75\x75\xb4\x25\x2f\xe3\x57\x8d\x74\x48\x81\xca\xf9\xd5\x45\xe1\xec\x8b\x23\xfa\xe2\x88\xbe\x38\xa2\x8f\x5f\xdb\xbf\xb4\x23\xfa\x72\xd1\x30\xe2\xa2\xe1\x19\x9e\x9a\xb6\xef\x1a\x82\x4f\x4d\x7b\xe8\x78\x79\x6a\xfa\xb7\x0e\x44\x6a\x27\xa5\x8f\xd9\x57\x15\x48\xc3\x5a\x9e\x46\x06\xab\x60\x6e\x03\x59\x2a\xe7\x81\xfb\x67\xa8\x40\x4a\x49\xa5\xad\x3a\xf6\xe9\x36\x7d\x12\xba\x82\x8b\x8f\xb9\x33\xe1\xa8\xcd\x4a\xc9\x8d\xab\xf4\x3f\x93\x61\xfd\xa5\x0e\x5b\x15\x9b\xa1\x36\xfe\x6d\xc0\xc1\x85\x50\x1b\x6b\xfa\x7d\x1d\xbf\x5f\x65\x57\xd5\x97\x15\x94\xd6\x87\x9e\xd8\xa1\xe3\x93\xb5\x9e\xe0\x7b\x85\xce\x8e\x78\x5d\x31\x82\xea\xe6\x80\x2e\xe9\x0d\x82\xc1\x54\xd0\xc1\xaa\x2b\x17\x44\x58\x8b\xe8\x39\xef\xb3\xb8\x6e\x2f\xbe\xf0\x52\x53\xd2\x1a\x77\xe7\xd6\x77\xeb\xa1\xbc\x88\x25\x79\x8a\x62\xa2\x08\x63\xdc\x70\x2a\x31\x94\xc2\x63\x9d\xaa\x98\x0c\x32\x1e\x4a\xcc\xe3\x46\xe6\xa6\x60\x4a\xc5\x81\xee\x92\x06\x08\x56\x84\x5a\x9e\xbb\x83\xfb\xe0\x80\x3c\xb9\xbe\xce\xe8\x95\xe5\xe6\xe4\x20\x55\xfc\xea\x14\x4d\x15\xc8\xca\x7f\x09\x09\xd0\x5b\x6d\xd8\xb7\xfa\xb3\xa8\x3e\x99\xca\x01\xaa\xbd\x6a\xaf\x72\xf9\xfe\x57\xe1\xb2\x0d\x88\xfa\xb9\xb7\x94\xc3\x93\x86\xd2\x02\x4f\x9d\x30\xec\x01\x4d\xdc\x80\x56\x53\x47\xa3\xd8\xc6\x86\xa2\x08\xf4\x35\x8f\x58\x0b\xc0\xef\x65\xab\xb1\x10\xce\x8b\x2e\xf9\xa3\x2e\x63\xca\x78\x6b\x79\xdd\x9f\x01\xaa\x40\xaa\x32\xbe\x32\x7a\x3d\x3d\x44\x2d\xcc\x73\x91\x63\x71\x25\xbe\xcd\xe0\x62\x30\xbf\xd3\x79\xbe\x1d\x24\xc0\x41\xd5\x85\xa7\xda\xca\xc5\x6f\xeb\x13\x51\x55\x2c\xd9\xbd\xa9\x78\xc9\xae\x7c\xdd\xd9\x95\xbf\xd4\x03\x57\x1b\x8c\xa6\x98\x9b\x44\x2a\xf6\x87\x73\xd4\x4e\x6e\x78\xe9\x81\xfb\x8c\xc3\x07\xc9\x69\xa4\xd3\xed\xfd\xe8\x22\x53\x31\xb1\x1c\x2c\x3d\xd8\x09\x1e\xf4\x24\x45\x81\x3b\x52\x13\x65\x31\xba\x10\x7d\x7e\x31\xb1\x2e\xe8\xa9\xc8\x65\x12\x76\xa4\x2b\x1f\xab\x82\x69\xfd\x19\x4b\x24\xc5\x96\xed\x74\x4f\x6f\xcd\x7f\xde\x93\xda\x14\x58\xfc\x1b\xa1\x89\x7b\x24\xe3\xbe\x1c\xd0\x44\x89\xfb\xe6\x0f\xb6\xfb\xea\x25\xcb\x7d\xcd\xaa\xfe\x98\x38\x19\xea\x12\x5f\xcc\xdb\x4b\x78\xd1\xaf\x1b\x3f\x66\x95\xf2\x7c\x5e\xe2\x46\x72\xb6\x15\x7b\xb4\x38\xdb\x1f\x99\xfc\xb5\x9c\x2d\xe8\xd2\x8d\x1f\x27\xce\x56\x6d\x31\x65\x5c\x1e\x53\xab\x94\x7a\x9a\x03\x83\x34\x99\xce\xef\x3f\x6b\xd7\xf6\x97\xdd\xc5\xba\x3f\x39\x73\xdf\x68\x5f\xac\xe4\xcb\x12\xf1\x59\xca\xe2\xad\x75\x1d\xc5\xee\xcb\xeb\x8c\x4d\x81\xd8\x7e\xff\x40\x5b\xa7\x27\x0b\x66\x0d\xd0\x78\x51\xaa\xce\xba\x3e\x7b\x9c\xae\xd2\xb9\xd3\xd9\x4e\x5d\x79\x5c\xd6\x9c\xb1\x88\x16\x51\x24\x73\x67\xa9\x3c\xba\x22\x99\x5c\x86\xfe\x36\x40\x1f\x98\x43\x1f\xb5\xa1\xb4\xc3\xed\x8a\xa7\xc5\x24\x0d\x46\x06\xf2\x1a\x13\xf7\xcf\x77\xf3\x7a\x9a\xa3\xa0\xfe\x31\xd9\x8f\x5e\x2a\xbb\x68\x27\xba\x20\xec\x51\xcb\x2c\x13\x26\x99\x54\xa6\x90\x54\xf7\x6a\x0e\xde\xbc\x79\x6d\x6d\x16\x71\x8a\x8c\x54\x5f\x70\x69\xdd\xac\x53\xa6\x4f\x12\xeb\x1c\xac\x6d\xce\xd7\x64\xbe\x3a\x0e\x3f\x8d\xb3\x4d\x16\xa6\xf6\x54\xff\x52\x5b\xcc\xd8\xe5\x8c\x58\x50\x21\x00\x77\x9f\x21\x39\x86\xd2\x8c\x57\x8e\x70\xdb\x5d\xe2\x0d\xba\xc7\x53\x3e\x82\x76\x80\x92\x5f\x25\x38\xb2\xfa\x8b\xdb\x09\xa0\xaa\x57\x6a\x4d\x60\xb2\xff\xe1\x75\xfd\x27\x97\x3b\x23\xb5\x89\x49\xa9\x1f\x8c\xca\xa9\xde\xe7\x9b\x4d\xf9\xfe\xf7\x87\xe5\xdd\x8f\xef\xab\x7e\x12\xfb\x3a\x5e\x2f\x16\x77\xef\xaf\x6f\x7e\xbf\x5b\xdc\xde\xd4\x3c\x45\xe7\x76\xff\xa8\x64\x3a\x6f\xdd\xb6\x10\x8f\x0b\xcd\xd7\x69\x5f\xa1\x49\xe6\x6e\x6d\x53\x6b\x1f\xee\xea\x29\x6a\xf7\x9f\x55\x73\x58\xdf\xdc\xff\xfe\xf6\xbf\x7e\x5f\x2d\xee\xaf\x7e\x6e\xf6\xad\x72\xce\x57\x92\xb3\xe8\x38\x87\x05\x3f\xe0\xf1\xe4\xd0\x7b\x2a\xdb\x6c\x6e\x58\xa4\xf2\xc3\x99\xf5\xd1\x9b\xd4\x45\x59\x3e\x87\xcb\xef\xbe\x4b\x1b\xad\x29\xa5\x52\x1d\xe7\xf0\xfa\xbb\x5b\x56\xeb\x28\xbd\xfb\xc7\xa0\xf8\xbe\x8e\x62\x2f\x79\x9e\xd2\xad\x55\xca\x8d\x2d\x4c\x6d\x8b\xe7\xd0\x8c\x4c\x34\x7b\xa8\xfe\xf7\xa3\x86\xb3\x38\xa6\xce\xe1\x19\x18\xab\x35\x9f\x45\xa4\x4c\x60\x68\xa3\xb5\x39\x52\x49\x69\x66\x53\x3c\x04\x46\x29\x72\x97\x5e\x58\xa5\x58\x0c\xa9\x94\x09\x67\xc4\x7e\x52\x18\xd1\x8a\x14\x93\xf1\x9a\xac\xa3\xaf\x2d\x2b\x4a\x38\xc9\x49\x61\x23\xa3\x38\x01\xda\x6e\x29\x32\x73\xb8\x93\xeb\x28\xa1\x38\xe7\x27\x31\x78\xa0\xe3\xdc\x39\x0f\xce\xac\x4d\x4f\x4c\xb0\xa6\x3c\x45\x7d\xba\x95\x99\x78\xd8\x2b\xc5\x0c\x8b\x90\x2f\xe2\x58\x0a\xfd\x5e\xf0\x53\x2c\x2d\x33\x3b\xb5\x54\x73\xb8\xf9\xc4\x74\xb5\xec\xfa\xfc\x37\x9f\x28\xca\x4d\x60\xfa\xa9\x8b\x77\x5a\xf3\x0b\x69\x3e\x10\xc6\xcf\x38\x43\x2e\x14\x61\x94\xe0\xa6\xc6\x92\x9e\x49\xbc\x1c\xd5\xb8\x9a\x48\xed\x77\xb2\xb6\x7d\xd9\xa0\x3c\x05\xa4\xe9\x2c\x9a\xae\x68\x75\x05\x6b\xd2\x2b\x36\xee\x1d\xa0\x6a\xde\x51\xfb\x96\xbb\xfa\x19\x9e\x54\x7f\xe0\x34\xa9\xe3\xb0\xd6\xf2\xff\x03\x00\x00\xff\xff\x9e\xf0\x44\xd5\x61\x5b\x00\x00"), + }, + "/base/provider-components/aws-provider-version-patch.yaml": &vfsgen۰CompressedFileInfo{ + name: "aws-provider-version-patch.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 255, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x54\x8f\x4d\x6a\x04\x41\x08\x85\xf7\x75\x0a\x2f\x60\xcf\x84\xec\xea\x1a\x03\xd9\x4b\xb5\x69\x24\xf5\x23\xea\x74\x93\xdb\x87\x82\x54\xc2\xb8\xd2\xf7\xf0\xf1\x3d\x44\x4c\xa4\xf2\xc1\xe6\x32\x7a\x06\x52\xf5\xdb\xf9\x96\xbe\xa4\xef\x19\x1e\x41\xc1\x9f\xcf\xfa\xe0\x48\x8d\x83\x76\x0a\xca\x09\xa0\x53\xe3\x0c\x65\xf4\xb0\x51\x2b\x1b\x36\xea\x74\xb0\xfd\x5a\xae\x54\x38\x83\x7f\x7b\x70\x4b\xae\x5c\xe6\x53\x70\xd3\x4a\xc1\x73\x07\x58\xea\x9c\x19\x44\xd2\xd9\x7c\x29\x00\x08\xd2\xe8\xe0\x0c\x47\xb1\x4d\xc6\xad\xd4\xa7\x07\x1b\x92\x0a\xaa\x8d\x53\xf6\x79\x5c\xfe\x62\xd0\xe5\xf8\x4f\x95\xef\xdb\x7d\x7b\xff\x4b\x5c\xd8\x8b\x75\x56\xff\x09\x00\x00\xff\xff\x77\x13\xb5\x9a\xff\x00\x00\x00"), + }, + "/base/provider-components/cluster-api-provider-components.yaml": &vfsgen۰CompressedFileInfo{ + name: "cluster-api-provider-components.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 43086, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x7d\x5f\x93\xdb\xb8\x91\xf8\xfb\x7c\x0a\x94\x53\x5b\xb3\xae\x92\x34\xe3\x38\xbf\xfc\x52\x53\x75\x0f\x8e\xed\xe4\x5c\x59\x7b\xe7\x3c\xce\xbe\x5c\xdd\x03\x44\xb6\x24\xdc\x90\x00\x03\x80\x23\x2b\x57\xf7\xdd\xaf\xba\x01\x90\x20\x09\x52\xd4\xcc\x78\xe3\xcb\x49\x2f\x1e\x53\x60\xa3\xd1\x68\xf4\x7f\xb4\x96\xcb\xe5\x05\xaf\xc4\x2f\xa0\x8d\x50\xf2\x86\x3d\xbc\xba\xb8\x17\x32\xbf\x61\x9f\x78\x09\xa6\xe2\x19\x5c\x94\x60\x79\xce\x2d\xbf\xb9\x60\xac\xe0\x6b\x28\x0c\xfe\xc5\x58\xa6\xa4\xd5\xaa\x28\x40\x2f\xad\x52\x85\x59\xdd\xff\xc1\xac\x84\xba\x61\x2f\x5e\xad\xae\x5f\x5c\x30\x26\x79\x09\x37\x2c\x2b\x6a\x63\x41\x2f\x79\x25\x96\xe6\x60\x2c\x94\x17\xfd\x49\x79\x25\xe0\xab\x05\x89\xff\x0b\x60\xae\x1e\x5e\xad\xc1\xf2\x80\xce\xdb\xda\x58\x55\x7e\x06\xa3\x6a\x9d\xc1\x3b\xd8\x08\x29\xac\x50\xb2\x83\x5d\xa6\x81\xe3\xc3\x2f\xa2\x04\x63\x79\x59\xdd\x30\x59\x17\xc5\x93\xf0\x36\x2b\xff\x87\x1f\x76\x61\x2a\xc8\x10\xd0\x56\xab\xba\x6a\x86\x85\x6f\xdd\xdb\x7e\x26\x8f\xba\x1b\x41\x4f\xaa\xa2\xd6\xbc\x68\x81\x5f\x30\x66\x32\x55\x41\x44\xef\x1c\x9f\xd5\x6b\xed\x97\xea\x41\x19\xcb\x6d\x6d\x6e\xd8\x7f\xfd\xf7\x05\x63\x0f\xbc\x10\x39\xad\xd4\x7d\xa9\x2a\x90\x6f\x6e\x3f\xfc\xf2\xfa\x2e\xdb\x41\xc9\xdd\x43\xc6\x2a\xad\x2a\xd0\x56\x04\x18\xf8\x89\xc8\xde\x3c\x63\x2c\x07\x93\x69\x51\x11\x44\x76\x89\xa0\xdc\x18\x96\x23\xa1\xc1\x30\xbb\x03\xf6\xe0\x9e\x41\xce\x0c\x4d\xc3\xd4\x86\xd9\x9d\x30\x4c\x43\xa5\xc1\x80\xb4\x84\x52\x04\x96\xe1\x10\x2e\x99\x5a\xff\x27\x64\x76\xc5\xee\x40\x23\x10\x66\x76\xaa\x2e\x72\xdc\x88\x07\xd0\x96\x69\xc8\xd4\x56\x8a\xbf\x37\x90\x0d\xb3\x8a\xa6\x2c\xb8\x05\x63\x3b\x10\x85\xb4\xa0\x25\x2f\x90\x08\x35\x2c\x18\x97\x39\x2b\xf9\x81\x69\xc0\x39\x58\x2d\x23\x68\x34\xc4\xac\xd8\x47\xa5\x81\x09\xb9\x51\x37\x6c\x67\x6d\x65\x6e\xae\xae\xb6\xc2\x06\x46\xcb\x54\x59\xd6\x52\xd8\xc3\x15\x71\x86\x58\xd7\x56\x69\x73\x95\xc3\x03\x14\x57\xc8\xb5\x84\xa7\xb4\xc4\x9c\x65\xfe\x9b\x66\x67\x2e\x23\xc4\xec\x01\x37\xd1\x58\x2d\xe4\xb6\x79\x4c\xfb\x3f\x4a\xe6\xbf\x08\x99\x33\x61\x18\xf7\xaf\x39\x74\x5b\x6a\xe2\x23\x24\xc2\xe7\xf7\x77\x5f\x58\x98\x94\x28\xde\x25\x31\x11\xb7\x7d\xcd\xb4\x74\x46\xba\x08\xb9\x01\xed\xf6\x69\xa3\x55\x49\x10\x41\xe6\x95\x12\xd2\xd2\x7f\xb2\x42\x80\xec\xd2\xd8\xd4\xeb\x52\x58\xdc\xd8\xbf\xd5\x60\x2c\x6e\xc7\x8a\xbd\xe5\x52\x2a\xcb\xd6\xc0\xea\x2a\xe7\x16\xf2\x15\xfb\x20\xd9\x5b\x5e\x42\xf1\x96\x1b\x78\x6e\x2a\x23\x41\xcd\x12\x29\x78\x9c\xce\xb1\x0c\xe8\x0e\x74\xc4\x69\x1e\x87\xb3\x1b\x3e\xa9\x13\x42\x22\xc2\x1d\xcf\x4f\x60\xf7\x4a\xdf\x77\xbf\xeb\x6d\xa3\x3f\xdd\x4c\xba\xb1\xc8\xd4\x1b\xb1\xad\xf5\xf0\x2c\x8c\x4f\x47\xdf\xa9\x3c\xf1\xb4\x37\xd9\x97\x1d\x34\x13\x69\x2e\xb7\xe0\x37\x75\xbf\x13\xd9\x8e\xdd\xaa\x3c\x7c\x6b\x18\xd7\xc0\x78\x51\xa8\x8c\xb6\x2a\x01\x78\x0a\x19\xa2\x81\xc8\xf5\x1f\x0b\x95\xdd\x8f\x7c\xcf\x98\xb0\x50\x8e\x7e\x39\xb2\x55\xa9\x21\x5c\x6b\x7e\x48\x8c\x40\xf6\x13\x1a\xf2\xd4\x14\xcb\x08\xbf\xc4\xd7\xc9\xdd\x0f\x1f\x03\xfa\x41\x64\xf0\x4e\x95\x5c\xc8\xa3\x34\x77\xc3\x48\xac\xb3\x8d\xd2\xe1\x6d\x93\xa2\xe9\xe4\x92\xc3\x8b\x4f\xdc\x65\x0f\x86\xfd\xf2\xe1\xf6\xbc\xcb\xa3\xbb\x3c\x06\x75\xd9\x6c\xc3\xe0\x0b\x3c\x81\x63\xa3\x1d\x13\x5c\xcc\x9c\xbe\xd2\xea\x41\xe4\xa0\xef\x7a\xe2\x86\xf5\x77\xfa\xd6\x0f\x5c\xa2\x60\x12\x1b\x91\xe1\x7c\x82\x17\xa4\xbd\x3a\x92\x04\x35\x62\x6d\x80\xe5\x75\x92\xd0\x5e\x60\x35\x16\xd0\x8a\x7d\xb0\x8c\x54\x33\xca\x5d\x90\x39\xe4\xcc\xee\xb8\x6d\x50\x43\xe5\x20\xa4\x45\xce\xb6\x3b\x10\x7a\x00\x51\xed\x65\xa4\xf1\xdf\xdc\x7e\xa0\xe5\x1a\x07\xc5\x2b\xf0\x35\x44\xf8\x5e\xe5\x10\x21\x8f\x0c\x3b\x80\xe9\xb4\x90\x80\x62\xc0\xaa\x53\x6c\x4a\x6a\xf1\xe8\xa1\xf9\x85\x94\x27\xaa\x53\xc9\x84\x2c\x84\x84\x7c\x11\x53\xb3\x6b\xa4\x38\xdb\x05\x92\x0c\xdb\xa8\xda\xce\x06\x9c\x40\xd1\x24\x54\xa2\xf2\x13\xa9\x9a\x04\xec\xb5\x7a\xa0\xec\x82\xf1\x7b\x41\xec\x92\xa9\xb2\x52\x12\xa4\xf5\x0b\x19\x17\x58\x23\x72\x92\x08\xff\x27\xad\xca\xa3\xc4\xbf\x73\x04\x43\xf1\x88\x26\x45\x20\x49\x9f\x82\x91\x09\x61\x46\x56\x23\x36\xde\x0c\x12\x86\xe1\x58\x28\x2b\x7b\x78\x8c\x60\x2b\x79\xb6\x13\x12\xde\x16\xdc\x8c\x4a\xaf\x81\xd4\xf5\x2f\xb1\x0c\xdf\x8a\x85\x6e\x62\x55\xa3\x12\x31\xda\x46\x22\x4b\x52\x2e\xcf\x59\x02\x8b\x44\xc9\xf8\x88\x11\x91\x82\x04\x44\xac\x49\x6f\x39\x6e\x67\x59\xa1\xea\x7c\x19\x40\x4e\x40\x64\x7e\xd9\x1f\x23\x22\x22\x40\x34\xbe\x89\xf3\x37\x4a\x8f\xad\x8a\x9d\xa2\x14\x46\x38\x6f\xf2\xeb\x91\xaf\x52\x12\x7f\xd9\xb3\xe4\x8e\xda\x87\xce\xcb\x9a\x61\x21\xf2\x4a\xbc\xf7\x56\xf4\x60\xf7\x3a\xfb\xf1\xe6\xf6\x43\x18\x18\xd9\xe8\x3d\x33\x9c\x0e\x2b\x9a\xc7\xa8\xc7\xd9\x5e\xd8\x5d\x42\x76\x02\xfb\x70\xdb\x27\xfa\x88\x72\x9e\xe6\xac\x9d\x32\x36\xcd\x4f\x83\x03\x81\x43\x1d\x07\xc9\xe8\x24\xa0\xdc\x32\xe4\x63\x20\x53\x90\x8a\x94\x49\xf1\x72\x94\x13\x2a\xa5\xe7\xa2\x82\x43\x1f\x8d\xc6\x46\xe9\x92\xdb\x1b\x64\xe0\xdf\xff\x6e\x02\x51\x64\xf0\x6d\xe2\x68\x8c\x1b\x29\x4b\xa2\x51\xe2\x31\xe2\x3b\xdc\xc5\x63\x6c\x3d\xb4\x92\x40\x6b\xa5\x3f\x82\x31\x7c\x3b\xd0\x82\x1d\x22\x7d\xd8\x30\x03\x76\xc1\x84\xcc\x89\x8f\xbc\x56\xb1\x3b\xd0\x4e\x31\x22\x5b\xac\x0b\x28\x49\x87\xc9\x4c\x14\xde\xc3\x1c\x5a\xaa\x96\x5b\xef\x5a\xef\x45\x51\x38\x8d\x44\x6c\xca\xdb\x29\x1f\xc0\xa1\xc6\x4a\x87\x5b\x9f\xf0\xa3\x3b\x4f\x6f\x7d\x06\x6e\xd4\xc0\xf8\xfe\x07\xac\xc7\xaa\x7b\x90\x5e\xe7\x98\x5a\x58\xbe\x2e\x9c\x22\xab\xb4\xda\x6a\x5e\x96\xdc\x8a\x6c\x00\x91\xa2\x10\x95\x06\x67\x4d\xcc\x5e\x7a\x63\x18\x0e\xe4\xcc\x60\xf5\x09\xd3\x90\x5e\x3a\x6e\x87\x0c\x90\xed\x5a\x7a\xcf\x6d\x83\xf4\xec\x8f\x34\x2d\x06\x1c\xdf\x7b\xfc\xd0\xc6\x1f\x79\x51\xed\xf8\xab\x8b\x56\x14\xf3\x2c\x83\xca\x42\xfe\xa9\x1f\x58\x7b\xf1\xa2\x13\x53\xa3\xff\x66\x4a\xe6\x14\x18\x34\x37\xec\xdf\xff\xe3\x02\xf7\x5e\x69\xc8\x7d\x3c\xcb\x3d\xfc\x5f\x11\x7e\xf4\xa6\x08\x59\x22\xf0\xf4\x20\x64\xac\xc9\x3b\x54\xeb\xce\x33\x12\x8f\x3c\x07\x1c\xcf\x01\xc7\x96\xc4\xe7\x80\xe3\xec\x80\xe3\x58\x24\xe0\x88\xa8\x9f\x70\xfd\x99\x54\x39\xb4\x7e\xfe\x34\x02\x7d\xb3\x65\xd9\x41\xe8\x2c\x77\xc7\xe5\x6e\x0e\x55\xa1\x0e\x25\xb1\xf7\x33\xc9\xde\x77\x0d\xc8\x94\x00\x8e\x26\x9c\x9f\x14\xca\x78\xd1\xd8\x84\xb4\xd6\x3b\x28\x20\xb3\x4a\xdf\x72\xbb\xbb\x61\x2b\x6f\x32\x74\xbe\xf2\xc3\x71\x15\x9f\xa1\x2a\x44\xc6\x4d\x18\x5d\x41\xb6\xd2\xfe\x59\x18\x46\x10\xfa\x03\x1d\xd8\xce\xd0\x73\x82\xca\x7f\xce\xfa\xe2\xac\x2f\xbe\x79\x82\xaa\x14\xf2\x33\xf0\xfc\x70\x87\x9e\xcf\x30\x71\xd4\xd9\xc7\x8f\x42\x8a\xb2\x2e\x99\xac\xcb\x35\x68\xe4\x78\xe3\xde\x22\x37\xc7\xb9\xd3\x9c\x49\xd8\x17\x07\x27\x4a\x21\x0f\x42\x69\xe8\x49\x35\xee\x81\xc6\xe9\x57\xec\x1d\x6c\x78\x5d\xd0\x0e\xb0\x6b\xf6\x63\x08\xa0\x05\x37\x2b\x53\xd2\xa0\xba\x81\x9c\xf1\x07\x2e\x0a\xf4\xae\x06\x40\xb9\x61\x46\x29\x89\xff\x0a\xef\xdb\xf0\xfc\xf0\xb2\x37\x2e\x72\xe1\x5f\xff\x36\xe9\x64\xa4\x9c\xf7\x8a\xd7\x66\xe8\xb6\x77\xfd\xcc\x81\x7f\xc9\x5a\x61\x8c\xe8\x38\x18\x69\xc7\x66\xad\x54\x01\x5c\xf6\xbd\xbc\xad\x06\x63\xde\x01\xcf\x0b\x21\x61\xce\x26\xb9\xe8\xe3\x57\xda\x28\x2b\x4a\xe4\xd3\xce\x36\xf1\x18\x27\xab\x58\xc9\xef\xa1\x99\x68\x40\xd1\x35\x6c\x88\xd7\x09\xfd\x68\x0f\xac\xc2\x4d\xd9\x70\x51\xe0\xe9\xf8\xd2\x5d\x69\xab\x20\x69\xfb\x86\x39\x06\x85\x47\xbe\x06\x84\x52\x69\x95\x81\x31\x1e\x54\x04\xc5\x90\xbc\xe3\xad\x3d\x40\xd1\x2c\xc6\xd1\xc8\xe9\x10\xe5\xfd\xd7\x0c\x20\x4f\xf8\x93\x9a\x22\x03\xad\xa3\x5e\xeb\x0d\x2a\x40\xe6\xfc\xd7\x18\xe1\xe0\x10\x7f\x52\x16\x1a\x1f\x38\x4d\x10\x82\xe6\xa5\x03\x18\x2b\x4a\xe2\x72\x6f\x51\x21\x58\xa2\x39\x4f\x6f\x7c\xc3\xe4\xc3\x70\x8e\x62\xbf\xbf\xbe\x1e\xa4\x02\x1f\xc7\xaa\x41\x9d\x4e\xf2\xc9\xa7\xe6\x10\xe7\x60\xd0\xb4\x0b\x47\xd5\x74\xcf\xe2\x2b\xdc\x5e\x61\x7c\x9c\x44\x91\x52\x4a\xa1\x9f\x0b\x83\x72\xbc\x16\x66\xc7\xd6\x60\xf7\x00\x92\xc1\x57\x44\x44\x58\xf6\x77\xd0\x8a\xf6\x13\x29\xe7\x8d\xd3\xe1\x41\x78\xec\x6a\x1f\x04\x6a\xeb\x7f\x15\x68\x29\x1e\x7e\x12\xa5\x18\x44\x02\x87\x59\xd1\x66\xf5\xaa\xc8\x83\x5d\x75\x07\x6e\xc9\x1a\x5c\x90\x43\x51\x46\x74\xcf\x90\x97\xd7\x3c\xbb\x1f\x46\x04\x07\x94\x79\x26\x4a\xb0\xde\x16\x3c\x0b\xa1\x8c\xb7\xdb\x26\x89\xf3\x13\x5a\x78\xcd\x50\x92\x18\x2d\x5f\xbc\xff\xea\x96\xd6\x21\xd8\x7e\xa7\xcc\x50\x14\x87\x97\x28\xb1\xec\xc0\x41\xce\xd6\x07\xa7\x9f\xc3\x99\xc4\x03\xa3\x68\xd4\x66\xd3\x1d\xd1\x9e\x9f\x21\x6d\x3e\x58\x56\xd6\xc6\xb2\x92\x5b\x1f\xc0\x0d\xda\xc2\x42\x59\xa1\x25\x75\x69\xbc\xc5\x3e\x33\x88\x84\x56\xa7\xe6\x16\xb6\x87\xa3\x9c\xd3\x11\x1b\xee\x9d\xe0\x57\x11\xeb\x54\x05\xcf\x80\x41\xa0\x54\xa0\x43\x42\x90\xd8\x1d\xea\x4a\x5a\xff\x29\x59\x4c\xe4\x46\x21\xb7\x7f\x25\xd3\xe4\x68\x42\xed\xb3\x1b\xed\x2d\x19\xef\x0f\xb2\x8a\x6b\x5e\x9a\x15\xbb\x75\x86\x14\x53\xb2\x38\x30\xb1\x19\x3a\x18\x77\x7e\x89\x5f\x0e\x55\x3a\xc7\xf9\x2f\x61\x06\x87\xcf\xe3\x12\x6c\x5f\xef\x6a\x3d\x8c\x49\x27\xd7\x73\x19\xeb\xb7\xf6\x14\x37\xec\x46\xd2\x3b\xe3\x92\x24\x7e\xb6\x83\xbc\x2e\x46\x12\x84\xf8\xe1\x6b\xf5\x00\x5e\x1b\x38\x21\x38\x04\xb9\xf2\x19\x61\x0f\x94\x4b\xc6\xd7\x46\x15\xb5\x4d\x13\x04\x3f\x1e\xc8\x8f\xf0\xf5\x86\xfd\xbf\x97\x8c\xb4\x6e\x05\x3a\x43\xc7\x61\x0b\x29\x99\xeb\xc6\xbe\xba\xfe\xe1\xe5\x78\x36\x8c\x84\x0d\x62\xe1\xd5\xcf\xb5\xdb\xb1\xaf\x7f\x95\x8d\x45\x84\xb2\xe8\x7a\xc5\xde\x78\x04\x3d\x22\xa3\x10\x09\x5e\x91\xd5\x05\x29\x31\x32\x9a\x23\x34\xd7\x07\xa6\x55\x2d\x73\xc7\x3e\x1d\xad\x30\x0a\xf1\x15\x0a\x09\x5e\x56\x05\xdc\xb0\xfd\x0e\xa4\x3b\xcc\x94\x54\x21\x6b\xe3\xf5\xf5\x0f\x0b\x97\x4d\x84\x7d\x24\x45\x70\x59\xa3\x30\x69\x27\x39\x5a\x07\x75\xc5\x44\x59\x42\x2e\xb8\x85\xe2\x10\x26\x80\x70\x24\x02\x93\x1b\xcb\xb5\x35\x0b\x66\xea\x6c\x98\xfe\x0a\x9f\xc6\x44\xb3\xca\xf2\xa2\xa7\x10\x48\x40\xc3\xbe\xdd\x9e\x5c\xb9\x24\x32\xd9\x1a\xe3\xab\x7f\x7d\xfd\x43\x5a\xa3\xfe\x2c\x33\x20\xc8\x0d\xc4\x1d\x7f\x00\xb6\x46\xdd\x70\x2f\x8a\x02\xf2\xc5\x38\x37\x0d\x48\xd5\x25\xc9\xa6\xd6\x76\x07\x7a\xc1\x40\x9a\x60\x87\xe0\xda\x70\x5d\xc7\x58\x34\x3e\x3a\xba\x96\x12\xdf\xe6\x96\x71\x79\x70\x86\x4c\x64\xd8\x78\xe2\x8a\x54\xfd\x8c\xfb\x70\xcb\x4a\x65\xec\x38\x19\x2e\x47\x5e\x55\x12\x7e\xde\x8c\x1d\xff\xe5\x9c\x24\xf0\xf2\x48\xda\x8d\x39\x39\x13\x1d\x95\x67\x97\x36\xb5\x1c\x77\x4c\x1a\xe0\x7d\x72\x8e\x0b\x97\x9e\x10\x19\x05\x79\x9a\x70\xf9\x06\xa2\x21\x57\x7b\xb9\xea\x08\xa7\xa9\x93\x1c\x84\x16\x49\x7c\x2f\xae\x3a\xae\xdf\x88\x00\x19\x85\xd9\x17\x2c\x5d\x7b\xae\x77\x5a\x10\x57\x1c\xfd\xff\x89\x41\xc7\xb7\xa9\x4f\xc0\xf9\x52\x67\x5c\x7c\x93\x08\xe8\x08\x15\x34\x8d\xc8\x43\x5d\x4c\x62\x3d\x8e\x26\xae\xa6\x39\xfd\x1b\x85\xc6\xaa\x33\xa1\xf0\x45\x87\x5a\x42\xd8\xb6\x82\xe2\x74\xe1\xd8\xe2\xde\xa8\x1c\x14\x17\x45\x41\xe2\xc2\x8c\x55\x95\xb5\x70\x23\x39\x82\x6f\x16\xc0\x8d\xf5\xdb\xf1\x7d\xc9\x8b\xc9\xb2\x12\xfa\xf2\x98\xe9\x85\x36\x93\x5b\x56\x63\xca\xb2\xb7\xb5\xd6\x20\x6d\x71\xf0\xa6\x6f\x71\x60\xa6\xae\x2a\xa5\xf1\x94\x05\x7b\x32\x89\xb3\x30\xec\x45\xc7\xd4\x7a\xd1\x1c\x1c\xfc\xee\xa8\x15\x36\x41\x94\xd1\xa5\x06\x73\x7a\xda\x28\xf6\x83\xfc\xd3\xb5\x8f\xa1\x76\x65\x64\x13\xc6\x71\x61\xa1\x53\xec\xdd\x54\xc8\x2b\x89\xc8\xe5\x9d\xe5\x32\xe7\x3a\xf7\x4b\xb9\xbc\x34\xcd\xcb\xcf\x1d\xb3\x0b\x70\x53\x1c\x3a\x5d\x32\x9c\xa8\xe4\x4c\xac\xc4\xe7\x6f\xe2\x12\xc3\xe6\x78\xac\x61\xc7\x1f\x84\xd2\xe1\xb9\xa7\x74\x5a\xf2\x3c\xef\xb2\x11\xfb\x25\x97\xf9\xd2\x45\x4c\x52\xab\x3f\x5a\x27\x4c\x1e\x88\xab\xf3\x9b\xa5\x83\xdf\x46\x2f\x20\xa7\xd7\xc6\xc5\x9f\x2a\x55\x91\x76\x0a\xf1\x1c\x6e\x8c\xca\x50\x46\x8f\x0b\xcc\x4f\x2a\x77\x25\x19\xf9\x41\xf2\x52\x64\xec\xbe\x5e\x43\x01\x4d\x5d\xa3\xd3\x62\x54\x7d\xc0\x78\x41\xa2\xd9\x79\x72\xe3\xea\x47\x48\x82\xba\x60\x46\x91\xd5\xe4\xa4\x1b\xa9\x32\x61\x03\x6a\x5e\xf6\xd2\xe6\x87\xa3\x30\x6e\x45\xd5\x56\x51\xad\x08\x2f\x8a\x03\xcb\x54\x25\xdc\x7a\x29\x4b\x20\xe4\x3d\xe4\x34\xe3\x67\xd8\xb4\x61\x6e\x1f\xc0\x9a\x70\x1d\x50\xd3\x18\x4b\xe2\x28\xb9\xf6\x20\x86\x42\x60\xd6\xa2\x96\xeb\x55\xba\xf5\xf0\x34\x4b\x31\x3a\xe5\x91\xa2\xbc\xe9\x53\xcd\xfa\x2c\xf0\x33\xc1\xf9\x08\x96\x3b\xea\x21\x89\x9a\xed\xc7\xf5\x7f\x6a\x52\x99\xe3\x45\x92\x8c\xfd\xd5\xb8\xa4\x02\x6d\x8e\x8f\xd5\xb2\x3d\x8a\x27\x17\x2c\x58\x30\x0a\xfc\xd3\xa1\x33\x0b\x57\xf0\x58\x69\xd8\x88\xaf\xe3\xc6\x39\xd8\x6c\xb5\x88\xa2\xd9\xc4\x9d\x64\x22\xb8\x64\xa2\xb7\xf6\x10\xc1\x47\xd3\x6a\xaa\x0a\x3c\x49\xaf\xdb\xe8\x05\x96\x83\xe5\xa2\x30\xc7\x92\xc3\xe3\x3a\x7b\x5e\xd2\xb8\x87\xf0\xd1\x7a\xd4\xd1\x62\xec\xe4\x8a\x4e\x2b\xca\x9e\x80\xca\x82\xd4\x3c\xad\x38\x7b\x12\xe2\x58\x29\xfc\x64\x81\xd4\x24\xc4\x79\x65\xf1\x83\x62\xed\x49\x98\x33\x0b\xb9\x9b\xe1\xc7\xb8\x92\x1d\x2b\xec\x0e\x9f\xc7\x17\x78\x4f\xae\x27\x1c\xb6\xd9\x85\xde\xe1\x33\x87\x3b\xd9\xcc\xc2\xef\xe4\x1a\x67\x17\x80\x1f\x01\xca\x1a\xd9\x3c\xb7\x10\xfc\xd4\x25\xb2\x99\x85\xe1\xc9\x65\x3e\x53\x81\x78\xf8\x3c\xad\x50\x3c\x7c\x66\xd8\xfe\xdd\xa1\x47\x38\x7c\xd6\xb0\xa3\x43\x50\x26\x0c\xcb\xbb\xc3\xa7\xcb\x3c\x34\x34\xd0\x74\x53\x17\xc5\x02\xf5\xdd\x4e\x69\x81\xc2\xed\x01\x8d\x00\xa7\xc8\x1d\xd0\x29\xb9\xcd\xab\xaa\x38\x04\xdb\x21\x53\x5a\x83\xa9\x94\xf3\xda\x49\x21\x39\x7b\x87\xe0\x91\x5e\x55\x0f\xa0\xf7\x5a\x4c\x44\x36\xd1\xc4\x29\x55\xde\xd8\xa6\x28\xf2\x72\x08\x53\x90\x1a\x56\x92\x0a\x21\xe4\x56\xe1\x3c\x6b\x6e\xc6\xad\x84\x59\x37\xc2\x66\x50\x7e\xec\x46\x58\x53\x96\x34\x8f\xf4\xa1\xc6\x08\x89\x7b\x0f\x07\x66\xd4\xc6\xee\xd1\x49\x77\x2a\xb0\x63\x1e\x4e\x44\x24\x14\x81\xe3\x05\xfa\xb7\xfd\xeb\x54\xe4\x26\xbb\x52\x0e\x55\x0a\xdb\xd8\x07\x04\x74\xc2\xc8\x1c\x24\x96\x03\x60\x21\x8d\xe5\x45\x11\xea\xbb\x54\x11\x84\x85\xcb\xb9\x4c\x84\x38\x7c\xcc\x25\x48\xe2\xda\x80\xa6\x4c\x2e\xea\xfa\xf0\x65\xc9\x0f\x2c\x17\x9b\x0d\x68\xdc\x48\xc8\xd9\x94\x9d\x30\xc4\x0a\xf4\x82\xad\xeb\x10\x49\x68\x71\xeb\xd8\x6e\xae\x74\x65\x7c\xed\x16\x51\x33\xce\xa6\xaa\x70\x87\x3a\x29\x28\xcf\x1e\x66\xc5\xde\x74\xcd\xec\x52\x18\x33\x1d\x8a\x68\x4d\x7d\xcb\x74\x2d\x5d\xb2\x1c\x25\x0e\x15\x1d\x3d\xc5\xb6\xf1\x09\xf0\xdb\x82\xcb\xf9\x26\xce\xdb\xe8\xa5\x70\xfc\x0d\x94\x5c\x5a\x91\x05\x3e\x9e\xba\x6d\x16\x3e\x7f\xa9\xd7\xa0\x25\x20\xb7\x78\x3c\x58\x45\x30\xad\xc2\x65\x7a\x2e\xf6\x3b\x41\x11\x88\x35\x34\x3b\x32\xce\x83\x8c\x44\xb4\x0f\x7d\x05\xed\x46\xa9\xcf\xce\x2c\x4f\xbc\xcc\xc3\x82\x5b\x32\x9b\x6c\x7f\xf1\x6e\xcc\x04\xc5\x3c\xc8\x63\xd6\x91\xae\xa7\x0c\xa8\x19\xc8\x4f\x5d\x40\x65\x14\x74\x9a\xc6\xe4\x88\xbc\x9b\xbe\xdf\xda\xab\xc7\x3c\x01\xf6\x49\xd7\xa0\x4c\xb7\xf8\xcf\x3d\x0c\x71\xa2\x8b\x23\x40\x4f\xb8\x15\x15\xc2\x8b\x9f\xe7\xd4\x32\x7c\xe9\x45\x29\xdb\xe0\x64\x1b\x02\x77\xde\x3c\x55\xc0\xf8\xb0\xe3\x30\xd2\xd4\xad\x85\x7a\xc9\x2c\xd7\x5b\x98\x97\x95\x7e\x5c\x4a\x5e\xad\xe9\xda\x51\xfe\x67\x90\xa0\xa3\x32\xc7\xb1\x75\xee\x80\x6d\x9b\xa1\xcd\xdb\x0e\xbd\x91\x12\x9c\x09\x44\x07\x17\x98\xa6\x8a\x2c\x78\x7e\x78\xd4\x5e\x38\xba\xb7\xd1\xc0\x6f\x4d\xd2\x59\xc5\x2f\x7d\x24\xa5\x92\x4b\x0b\xba\x14\x32\x2e\x5a\x1b\x62\x3b\x60\x99\x88\xe4\x3f\x3a\x9f\xcf\x85\x12\xa2\xda\x84\x70\x62\x06\x99\xdd\xc7\xad\x2f\x4a\x33\x3d\x6a\x3f\xa2\xf7\x1f\xb5\x2b\x6d\xd1\xcb\x64\x7e\x80\x0c\x15\xaa\xfd\xb0\x68\x59\x06\x61\x12\xcc\x8d\x29\x42\x5a\xe5\x92\xa3\xaf\xae\xaf\x7f\x88\x8e\x72\xc6\x2b\x9e\x09\x7b\x20\x23\xe5\x40\xa6\x09\x08\xbb\x43\xd3\x04\xc6\xcb\x2c\x1a\x3c\x42\x76\x13\xed\x11\x74\x13\x0f\x60\x23\xe0\x51\x99\x8b\xbf\xbe\x44\x68\x23\x1e\x03\x90\x2e\xfd\x1e\x22\x3c\xcf\x55\xc6\xe4\x4b\x4d\x1f\xb5\xa7\xcf\xc1\xbe\xb4\x6a\xa2\x7b\x1c\x6b\x0e\x92\x9d\x6c\xaa\xe7\x58\xe8\xf9\xba\xd6\xbc\x6b\x03\xcf\x76\x59\xa0\x43\xaa\xe8\x98\x9c\xbb\x45\x9d\x8b\xf1\xcf\xc5\xf8\xdf\x57\x31\xfe\x54\x6e\xec\x89\x39\x31\x8a\xcd\x0c\xe4\xff\xa3\x72\x61\x71\xce\x6b\x00\xf1\xa4\x1c\x58\x32\xd7\x35\x54\xe1\xb3\x72\x5f\x53\x39\xae\x01\xc8\x23\x39\xaf\x74\x6e\x6b\xd4\x85\x1a\xcb\x65\x3d\x21\x87\xd5\xe4\xaa\x52\xd4\x38\x31\x77\xd5\xcf\x51\x0d\x40\x9e\x90\xb3\x7a\xbe\x4e\x45\xa7\xe4\xa6\x52\x15\x87\x73\x73\x52\xe7\x86\x40\xe7\x86\x40\xf4\x39\x37\x04\x1a\x8c\x39\x37\x04\x9a\xf9\x55\x3a\x7f\xf3\xa4\xbc\x4d\x93\x9f\x19\xd3\x77\xa7\xe4\x6b\x86\x79\x99\x61\x70\xeb\x11\x79\x9a\x91\xfc\xcc\x23\x7a\xcf\x8c\xe5\x61\x9e\x90\x7f\x69\xf2\x2c\x43\x1b\xe4\xc4\xbc\x4b\x22\xbf\x32\xb4\x18\xe6\xe5\x5b\x26\xf3\x2a\x09\xf7\x7b\x3c\xcf\x72\x42\x3e\x65\x00\x37\x91\x5f\x79\x44\x1e\x65\x00\x36\xce\xab\x9c\x9c\x3f\x99\x12\x49\xc7\xf2\x25\x8f\xcd\x93\x44\xb9\x90\xa4\xac\x78\x44\x7e\x64\x90\x03\x49\xeb\x9a\x59\x79\x91\x49\x59\x36\x91\x07\x79\x64\xfe\x63\x3c\xc7\x31\x81\xc8\x78\xfb\xcb\xb4\x6d\x7d\x52\x32\x61\x24\x67\xf1\xd4\xdc\x41\x9e\x6b\x30\x66\xc8\x68\xdd\x76\x6a\x61\x94\xdb\xac\x20\x9c\x9b\x97\xd1\x77\x12\x5b\xd9\xd6\xde\x8d\x96\x59\xfe\x5b\x0d\x5a\x84\x92\x1c\x52\x84\xcd\xc2\x16\x68\x75\x34\x51\xc6\x6f\x27\x5e\xa3\xe8\xd7\xd4\x9a\x2f\xdf\x36\xe3\x68\xc1\xc6\x2b\x9a\xe6\xa1\x39\xc8\xac\x2d\x2e\x02\x6f\x59\x37\xdf\x0f\x50\x0d\xda\xbf\xa3\xaa\xf0\xa5\x65\x88\xbd\x78\x59\xb2\x8c\xee\x04\x93\xa9\x8b\xa3\x8d\x48\xdd\x95\x40\xc1\x79\x0f\x50\x21\xa8\x08\xb5\xba\x5a\x5a\xb5\x74\x77\x26\xe2\x4a\xf9\xee\x5d\x63\xba\x54\x88\x66\xea\xf0\x40\x59\x4a\x6d\x47\x10\x39\xc5\x40\xc4\x56\xf2\x82\xae\x6d\x42\x26\x72\xc0\x0d\x8b\xb2\x9b\x3b\xe0\x85\xdd\x1d\x98\xd2\x4c\x02\x0c\xda\xba\x32\x7f\x11\xda\x5f\xfb\xcb\x57\xec\x33\x6c\x40\xb7\x91\x88\xfb\x46\x00\xad\x84\xba\xca\x55\x66\xae\x32\x25\x33\xa8\xac\xb9\xe2\x3a\xdb\x09\x0b\x99\xad\x35\x5c\x21\xd1\xcc\xd5\x6f\x1a\xf4\xfa\xa5\xb5\xcf\xc7\x2b\xb3\xdb\xc0\xbd\x8f\x06\x76\xda\x9d\x79\x8f\x1e\x1e\x9a\xb8\x71\xd4\x4a\xcd\xc7\xa1\x87\x5a\x79\xa4\xc7\x5a\xa3\x80\x9a\xa6\x6a\xb8\xa5\x5c\x48\xc6\x59\xa9\x34\xc5\xff\xd6\xca\xc0\x68\x33\xe4\xb8\xd5\x5a\xa1\xb6\x5b\xba\xc2\x24\x73\xb6\xab\x4b\x2e\xe9\xce\x7a\x5d\x56\xce\x4b\x88\x0d\x08\x2f\xe0\x53\x55\x66\x7e\x99\xa4\xc1\x35\x97\x46\xb4\x3d\xea\x42\x62\x23\xe6\xbb\x0d\xcf\xe2\x84\x07\x7c\xad\xe8\x2a\xeb\x08\xab\x6c\xc4\x57\xc8\x7b\x81\x0f\xb4\xe3\xdc\x7d\xab\x1f\x0b\x71\x0f\x4d\x67\x66\x55\x5b\xbe\x05\xf3\xd2\x69\x7d\x34\x02\x80\x0f\xe1\x36\xe1\x00\xe7\xea\xa9\x12\xec\x0e\x89\x80\x4b\xad\x65\xce\x4b\x74\x4d\x71\x9a\xbd\x56\x72\xeb\x2e\x9e\x46\x84\xbf\x1c\x32\x35\x29\x7a\x6f\xbf\x74\x1d\xf1\xe6\xc0\x87\xd5\x3b\x9b\x8a\x66\x2e\xb9\xac\x79\xe1\x22\xa5\x3e\xa4\x36\xc4\xd5\x34\xaa\xa0\xb9\xe8\x43\xf6\x5e\x60\x9b\x40\xe6\x7d\xf0\x74\xbc\x39\x81\x3e\xe7\x5a\xc8\x11\xe3\x96\x5a\x51\x90\x55\x67\x02\x77\xe2\x1a\x16\xc1\xf8\x69\x36\xa7\x96\xed\x75\x0b\x9f\x35\x8d\xd6\x32\x84\xab\x43\xad\x68\x10\x57\xf1\xc6\x0b\x6b\xa0\xd8\xb0\x35\x90\xa8\xd2\x22\x6c\x67\x29\x4c\xa0\x1a\x2e\x93\xbd\x91\x09\x23\x9f\x18\x0b\x0f\x50\xcc\x57\x2a\xcb\x6a\x1d\xdf\x12\x6b\x0e\x4b\x43\xfe\x8f\x63\x99\xae\x70\x85\x2c\x47\x2f\x8a\x1b\x77\x3c\x9b\x90\x76\xd7\xcc\xc3\x4d\xbb\xf2\xe7\xa5\xe9\x88\x30\x66\x96\x15\xa0\x2f\x0d\xf2\x62\x55\x0f\xb2\x81\x4f\xee\xcd\xf8\xbe\x1d\xf7\x8f\x91\x31\xa6\xce\x32\x21\x33\xeb\x58\x65\x5a\xbc\x34\x8a\xa1\xdb\xb4\x71\x44\xae\xf8\xa5\x24\x15\xdc\x13\xe4\x4a\x2a\x18\x76\x96\x2b\x67\xb9\xe2\x3e\xff\xec\x72\xa5\xe0\xc6\xfe\x5c\xcd\x29\x96\xf9\x29\x1e\xd9\xbb\x9c\x86\x50\x96\xaa\xf9\xb2\x02\xbd\x51\xba\xa4\xbd\x4b\xd9\x8d\xe1\xe0\x47\x56\xac\x77\x13\xa9\x73\x70\x7c\xf9\x63\x53\x17\xce\xb0\xdc\xb9\x76\x24\x2c\x11\xb4\x45\x9e\x34\x81\xe5\x5d\xae\x91\xa5\x90\x51\x2d\xc7\x51\x4c\x3c\x78\x20\xec\x43\xe2\x5e\x99\x43\x82\x17\x46\xb9\x04\xe7\xa1\x49\x8e\x40\x77\xaa\x68\xdd\x28\x89\xc0\x1d\x16\x26\x86\xd7\x61\x5d\xd7\x1f\x57\x09\xa1\xe4\x92\x02\x45\x8b\xd0\xa9\x47\x69\x0a\x03\x17\x54\x5f\x80\x42\x14\x8c\xd9\xd4\x45\x31\x08\xa9\x4e\x39\xfe\xf1\x86\x1d\x73\x74\xdf\xb5\xff\x09\xce\x2e\x99\x78\x4b\x0d\x3c\x27\x11\x1d\x0d\x9f\x8a\xc2\xe3\xe6\xb7\xf4\x3e\xd9\x31\xc7\xd7\xdd\x35\xcb\x64\x25\xde\x80\x07\xfd\xd8\xa6\x62\x26\x14\x09\x30\x6e\x7d\x2c\xb4\xc3\xa9\x49\x94\x91\xcd\xf6\xdc\x38\xbe\x0d\x79\xd0\xc4\xc8\x50\x91\x81\x03\x96\x38\xd3\xa9\x8b\x23\x7e\x39\x1e\x94\xb7\xfe\x06\x2f\xc9\x39\x77\xa5\xd5\x3b\xe8\x2d\xaf\x19\x1b\xb3\xf2\x14\xb9\x19\x7b\xbf\xda\xae\xd8\xad\x6b\x05\x45\x4c\xf6\x27\x62\xb2\x05\xbb\x6b\x18\x8b\x81\x1d\xaf\x6b\x1c\x59\xcd\xfc\x6b\xba\x61\x73\xfc\x95\xdd\xf6\x88\xb8\x1d\x0a\xb4\x6f\x57\x34\xb1\x8e\xb7\x94\xc3\x5b\xb0\x77\x80\x87\x63\xc1\x1c\x03\x9c\x8e\xff\xa8\x6f\x37\xc1\x81\xe3\xdc\x97\xa3\xe6\xdc\x88\x10\x01\xa4\xf0\x9d\xdf\xb2\x66\x75\xa1\xa0\x70\xac\xd0\x67\x8c\xad\x46\x17\x21\x5d\xb2\x76\xba\x11\x95\x4f\xe8\x92\x5d\xd6\xb4\xb1\x4f\x47\xc0\xd1\x3b\x17\xd6\xe7\xa1\xe7\xe7\x26\x77\xdc\x4c\xbb\xba\xb7\x38\xa2\xdf\x55\x3f\x30\x36\xbd\x1e\x15\xb7\x31\x9e\xd9\x7a\x84\x99\x1d\x23\x03\x61\xbc\x60\x9f\x5d\xcd\xd9\x82\x7d\xf1\xc5\x59\x11\x6f\x53\x56\x76\x2e\x1d\x1f\xd1\xee\xdb\x0d\x6d\x32\xac\xfc\x58\x1f\xf0\xc1\x52\x66\xff\xe2\xcb\x58\xea\x31\xa1\x49\x67\xff\xe2\xcb\xe9\x7d\xc0\x67\xe6\x18\x2e\x9b\x24\x43\x68\xbe\xd5\xdd\xec\x87\x28\x07\xd1\xe4\x1f\x12\x52\x79\x84\x3f\x7f\x8c\x19\xf4\x65\xdb\x3a\xcd\xd3\x2e\xf7\x2d\xf8\x36\xb0\x4f\xd0\x1b\x9d\x20\x73\xc3\xd8\xab\x97\x3e\x23\x4c\xf1\x0f\x57\xa0\x22\xbc\x1f\x24\x59\xb6\x83\xec\x3e\xce\xd1\x7f\x86\xcd\x02\xed\x3e\x42\x3d\x21\x05\x05\x1d\x28\x8f\xb3\x2b\xdc\x40\xdb\x7a\x23\x1c\xde\x54\x27\x52\xa1\x96\xd6\x02\xe5\x54\x48\x89\xb8\x94\x93\x63\xa3\x15\xfe\xfd\x41\x6e\x08\xcc\x8f\x24\x13\x07\xd3\x50\x76\xc1\x25\x31\x10\x57\x07\x86\xaa\xd2\xdc\x74\x24\x43\xf0\x04\xbc\x5c\xb1\xdf\xd2\x0a\x35\x94\xea\x01\x0c\xb9\x16\xa9\x76\x1c\xbe\xa6\x19\x59\x50\x66\x87\xc6\x1c\xb2\xba\xa6\x98\x59\x50\x35\x6e\x49\xa8\xbc\x94\x63\x31\xb1\xe9\x0e\x4c\x99\xf5\xc9\xc5\x65\x3b\xfa\x91\xac\x85\x0b\xfb\xb7\xa9\xde\xc8\x62\x35\x14\x07\x1c\x89\xed\x78\xcd\xbc\x60\x9a\x53\x61\x2a\xed\x17\x3c\x80\x3e\xf8\x72\x27\xd6\xc6\x4c\x83\xbd\x8d\xe7\x65\xc5\x5e\x0f\x1b\xbc\x7c\x09\xfe\xae\x54\x4c\x11\x38\x23\xc8\x52\xdb\x73\xba\xd3\x45\x7c\x10\x7b\x1a\x3e\x8d\xd1\x9e\x84\xa1\x78\x7a\x13\xf0\x70\x6e\x90\x2b\xf7\x24\x83\x51\x52\xf2\x4a\x68\xc8\x6c\x7b\x65\x8c\x57\xc2\xff\x2c\x06\xf2\xa7\x13\x66\x43\x62\xba\x6d\x71\xb5\xa6\x2e\x62\x2c\x24\x53\x3a\x77\xdd\xf0\x90\xcd\xd0\xc8\x47\xaf\xa6\x41\xac\x1f\xdd\x3c\x27\x87\x06\x9f\xff\x43\xc9\xa1\x73\x4d\xf0\xcc\x9a\x60\x78\xbe\x1e\xe2\x77\x90\x6c\x1e\x8e\x53\x9c\xbb\x86\x9f\x0b\x95\xcf\x85\xca\xe7\x42\xe5\xe7\xeb\x1a\x1e\x8f\x0d\xba\xa8\x3c\xde\x4c\x7c\xa0\x8c\x46\x9a\x8b\x9f\xd4\x4c\x3c\x15\x3b\x4f\x35\x17\xff\xa6\xcd\xc4\x67\x5d\x52\x0b\x52\xaf\xa9\xb7\x1b\x74\x6c\x0e\x60\x9e\xb5\x45\x73\x2d\xdb\xb6\xc4\x93\x3d\x3f\x7f\xcd\xb6\xc4\x97\x41\x7d\xf8\x6a\x0d\xea\x52\xfc\xb7\x1a\x2d\x6b\x4a\x72\xf4\x2e\x6f\x39\x7e\xa0\x3b\x78\x49\xaf\xc2\x13\x8e\x65\xaa\x96\x76\xe5\x9b\x1e\xdf\xc3\xc1\xb9\x2a\x71\x70\x3f\x6a\x34\x1c\xac\xda\x11\xe3\xbf\xd1\xe5\xed\x2d\xba\x56\xd7\xae\xe6\x34\x2d\x4e\x64\x4c\x7c\x17\xe3\x94\xec\x98\x2a\x2d\x40\x9a\x3c\x08\xd8\x5f\xed\x95\x46\x5f\x71\xb9\x17\x76\xe7\x6b\x32\xcc\x95\x03\x7a\xf5\x1b\xfa\x77\x19\xe8\x3f\xe8\xe6\xf5\x4c\x6d\xe1\x3c\xf7\x7a\x31\x4c\x44\x4d\x76\x8a\x4b\x77\xc5\xe9\x35\x8e\xa3\x00\x90\x34\xf5\x66\x23\x32\x72\x64\xc2\x11\xa0\x2c\x4c\x0e\x96\x52\x64\xe7\xf6\x72\x47\x56\x72\x6e\x2f\x77\x6e\x2f\x77\x6e\x2f\x77\x6e\x2f\x47\x9f\x73\x7b\xb9\x73\x7b\xb9\x73\x7b\xb9\xfe\xe7\xdc\x5e\xee\xe9\x4b\x64\xe7\xf6\x72\xe7\xf6\x72\xe7\xf6\x72\xe7\xf6\x72\xe7\xf6\x72\xe7\xf6\x72\xe7\xf6\x72\xe7\xf6\x72\x17\xd3\xd3\x25\xdb\xcb\xfd\xba\x9d\xe4\x3a\x71\xd6\x36\x18\xdc\x84\x99\x12\x7d\xe4\x06\x7d\xe3\x06\xf4\x71\x42\xb0\x1b\x10\x7c\x96\xd8\xe9\xd4\x5d\x9e\x27\x97\xe6\x7f\x98\x53\x82\x9f\x2a\xb9\x9f\x0a\xb9\x9a\x05\x5b\x2b\xbb\xeb\xd4\xfd\xa3\xba\x1a\xbb\x6c\xb4\x8a\x47\x8e\x46\x07\xa3\x0c\xbc\xfb\x91\xc8\x6e\x55\xff\x9c\x2a\xfe\xa1\x0f\xbe\xdf\x89\x02\x12\x88\x4d\xde\x4f\xea\x4c\x35\x0c\xe7\x1e\xbd\x9f\x84\xfa\x91\xd4\x86\x19\xde\x24\x48\x82\x7c\xda\x4d\x82\x54\xa4\xe8\xbb\xbb\x49\xf0\xa5\xf9\x55\xbf\x64\xbc\x73\xf2\x46\xc1\xb0\x82\x67\x70\xb3\x20\x81\x6e\x7b\xd3\xe0\xf1\x37\x0b\x06\x60\xe3\x9b\x06\x8f\xba\x59\x30\x4c\x5d\x1d\x46\xd7\x98\xb8\x61\x30\x1c\xe6\x6f\x1a\x24\x52\x62\xc7\x6f\x1e\xcc\xb8\x69\x30\x22\x07\xc6\x6e\x1e\xcc\xbb\x69\x70\x97\xd0\x6f\x13\x97\x0f\x9e\x74\xd9\x80\xea\xd9\x29\x39\x34\xb7\x31\x5f\x47\x7d\x34\x4a\xa3\xed\xad\x17\x77\x87\x0c\xc6\xb9\x7b\x36\x5c\xd4\x26\x99\x25\xea\xd5\x8f\x3d\x9b\x2a\x39\xb1\x15\xe9\xcf\x83\xe1\x4c\xc3\x06\x95\xb7\x33\x94\xe2\x36\xa5\x7e\x21\x2a\xd1\x72\x55\x43\xe6\x7e\x0e\xa9\xe9\x65\x3a\x6b\x5d\xdf\xa6\x73\x69\x6f\xf3\x50\xcf\x37\x5b\x98\x52\xe1\xec\xcd\x68\x9d\x57\xf7\xd7\x92\x1d\xac\xc6\xbc\xa5\x20\xe7\x8e\x9b\x4e\x17\x49\x92\x4a\xf4\x23\x4f\x38\xf8\xc5\xaf\xd8\x0c\xb5\x9f\x67\xa6\xdf\xf0\x1b\x6e\xcc\x90\xaf\x9f\x03\xc7\xb4\x19\xd8\xab\x02\x62\xdf\x59\x91\x98\x5e\xf3\x6c\xe5\xa3\x26\x7f\x77\x21\xc5\xa6\x52\x2c\x14\x89\x39\x57\xf5\xb3\x2a\x60\x66\x5d\x98\x2b\xf5\xf2\x2e\xee\x92\x57\x62\x59\x72\xc9\xb7\xa0\x97\x1a\x81\xe8\xba\xc0\xc5\x2c\x19\xaf\xc4\x9f\xb5\xaa\x2b\x5a\xd9\x72\x58\xf1\xd5\x29\xd2\x6a\xbe\x37\x8e\x66\x6b\xff\x74\x4b\x52\x74\x49\xc1\x19\xfa\x63\xef\x73\xe5\x4b\xcf\x8f\xf4\xa7\xcb\x36\xd1\x9f\x55\xf3\x7d\x4e\xd7\x1a\x4e\x47\x24\xea\x3d\xf9\x5d\x20\x12\xfd\xd4\xf8\xf7\x82\x92\xaf\xbe\xfb\x3e\x70\xf9\xe6\x88\xd0\xf1\xeb\x4d\x4e\x6d\x10\xfe\x79\x49\xf0\x24\x39\xf2\x47\x57\xb0\xff\x2c\xe2\x64\xed\x61\xe1\xdf\xfe\x82\x4e\xa0\xd1\x04\x5a\x17\x41\x90\xc6\xd2\xed\xa8\xe4\x32\xb5\x8b\xa1\xa1\xf0\x72\xaf\xdf\x39\xef\xe1\x4d\x46\xf5\x37\x0d\x04\x1f\x17\x0c\x55\xab\x15\xcf\x7a\x60\xcd\xc1\x58\x28\x07\x64\x6c\x88\xe5\xe1\x76\x28\x94\x28\xb7\x5d\x52\x28\xe9\x26\xae\xbe\xf5\x08\xc7\xa3\x8e\x15\xe5\xc6\x88\x0d\x21\x2d\xbd\x87\x74\x74\x31\xa1\x62\x03\x4d\x7c\xcf\x68\xf8\xe7\x0d\xfb\xdd\xef\x5e\x5f\xf4\xab\xa3\x9e\x65\x01\xc3\x92\xe7\xca\xb4\x0c\x47\x77\xfb\x36\x75\x81\x76\xf6\x77\x40\xc7\xd9\xf4\xeb\x12\x8a\x0c\xec\x9f\x22\x94\xe7\x22\x3d\x03\x6d\xbf\xb3\x9f\x4e\xe3\x82\x6e\xd1\x54\xbf\x3e\xa1\xe8\xa0\x3a\x1f\xd9\x19\xe8\x76\x8b\x82\x7c\xf0\x02\x74\x33\xd9\x12\x1d\xd3\x92\xc7\x95\xb8\x4b\x76\xd5\x9f\x46\x94\x7c\x0b\x37\x6c\x9b\x69\x14\x4f\xf7\x7f\x30\xcb\x68\xe5\x57\x69\x2a\xdc\xf4\xca\x93\x43\x31\x7b\x17\x72\xaf\xa8\xdc\xd3\x43\x94\xa2\x9f\xd1\xca\xaa\xfa\x86\xbd\xba\xbe\x2e\x3b\x4f\x4b\x28\x95\x3e\xdc\xb0\xd7\xd7\x1f\x45\xcf\xae\x04\x73\x1a\x88\xdf\xb6\x20\x42\x37\x75\xa1\xe4\x9f\x35\xcf\xe0\x16\xb4\x50\x79\x28\x77\x65\xaf\xae\xc3\x38\x55\x78\x37\x27\xa2\x27\x6c\x36\x90\xd9\x1b\xf6\x49\xdd\xf9\x5f\xa0\x6f\xa6\xbb\x87\xc3\x8d\x6b\x90\x84\xa2\x71\xd5\xad\xe1\x2b\xb9\x69\x2b\x37\x97\x6e\xec\x5b\xef\x84\xbf\xc9\x73\x25\xcd\xcf\x32\xea\x17\xe8\x2e\xa9\x2a\x7d\xc3\xde\xc7\x45\x44\xf1\xfc\xef\xbf\x42\x16\xff\x50\x7d\x33\xfd\x8a\x8c\xe6\xde\xfc\x52\x59\x72\x3e\xbe\xdd\x0c\xb5\xd4\xc0\xb3\x5d\xe7\x37\xb2\x07\x93\xa0\x7c\xfa\x9f\x00\x00\x00\xff\xff\xaa\x64\xdf\xb8\x4e\xa8\x00\x00"), + }, + "/base/provider-components/kustomization.yaml": &vfsgen۰CompressedFileInfo{ + name: "kustomization.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 841, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x74\x92\x4f\x6f\xdb\x38\x10\xc5\xef\xfa\x14\x0f\xd2\x65\x17\xb0\xec\x6c\x6e\xeb\x3d\x79\x93\xb4\x15\x12\xd8\x40\xe4\x34\xc8\x71\x2c\x8d\xa5\x01\x24\x92\x19\x8e\xa2\xf8\xdb\x17\x92\x9d\xa2\x41\x51\xde\xc8\x79\x7c\xf3\x9b\x3f\x19\x6e\x7c\x38\xa9\x34\xad\xe1\xfa\xea\x9f\x7f\xb1\x6f\x19\xf7\xc3\x81\xd5\xb1\x71\xc4\x66\xb0\xd6\x6b\x5c\x26\x59\x92\xe1\x41\x2a\x76\x91\x6b\x0c\xae\x66\x85\xb5\x8c\x4d\xa0\xaa\xe5\x8f\xc8\x02\xdf\x59\xa3\x78\x87\xeb\xe5\x15\xfe\x9a\x04\xe9\x25\x94\xfe\xfd\x5f\x92\xe1\xe4\x07\xf4\x74\x82\xf3\x86\x21\x32\xac\x95\x88\xa3\x74\x0c\x7e\xaf\x38\x18\xc4\xa1\xf2\x7d\xe8\x84\x5c\xc5\x18\xc5\xda\x39\xcd\xc5\x64\x99\x64\x78\xb9\x58\xf8\x83\x91\x38\x10\x2a\x1f\x4e\xf0\xc7\x5f\x75\x20\x9b\x81\xa7\xd3\x9a\x85\xf5\x6a\x35\x8e\xe3\x92\x66\xd8\xa5\xd7\x66\xd5\x9d\x85\x71\xf5\x50\xdc\xdc\x6d\xcb\xbb\xfc\x7a\x79\x35\x7f\x79\x72\x1d\xc7\x08\xe5\xd7\x41\x94\x6b\x1c\x4e\xa0\x10\x3a\xa9\xe8\xd0\x31\x3a\x1a\xe1\x15\xd4\x28\x73\x0d\xf3\x13\xef\xa8\x62\xe2\x9a\x05\xa2\x3f\xda\x48\xca\x49\x86\x5a\xa2\xa9\x1c\x06\xfb\xd4\xac\x0f\x3a\x89\x9f\x04\xde\x81\x1c\xd2\x4d\x89\xa2\x4c\xf1\xff\xa6\x2c\xca\x45\x92\xe1\xb9\xd8\x7f\xdb\x3d\xed\xf1\xbc\x79\x7c\xdc\x6c\xf7\xc5\x5d\x89\xdd\x23\x6e\x76\xdb\xdb\x62\x5f\xec\xb6\x25\x76\x5f\xb0\xd9\xbe\xe0\xbe\xd8\xde\x2e\xc0\x62\x2d\x2b\xf8\x3d\xe8\xc4\xef\x15\x32\xb5\x91\xeb\xa9\x67\x25\xf3\x27\x80\xa3\x3f\x03\xc5\xc0\x95\x1c\xa5\x42\x47\xae\x19\xa8\x61\x34\xfe\x8d\xd5\x89\x6b\x10\x58\x7b\x89\xd3\x30\x23\xc8\xd5\x49\x86\x4e\x7a\x31\xb2\xf9\xe5\xb7\xa2\xa6\x0d\x49\x94\xa3\x1f\xb4\xe2\xb8\x4e\x80\x1c\x34\xc6\x3c\xa8\x7f\x93\x9a\x35\x9f\xc6\xea\x1d\x3b\x8b\xcb\x13\xf5\xdd\x2c\xa8\xba\x21\x1a\x6b\x4e\x41\xfe\x2c\x4c\x22\x57\xca\xf6\x95\x1d\x2b\x99\xd7\xb3\xb7\xa3\x9e\xd7\xe8\xc9\x51\xc3\x9a\x1f\xbc\xb7\x68\x4a\x21\xaf\x94\x6b\x76\x26\xd4\xc5\x64\x1a\x7f\xe5\xfb\x9e\x5c\x3d\x13\x9d\xef\xee\x28\xcd\x1a\xe9\x25\x37\x8d\x91\xea\x1e\xd4\x85\x96\xf0\xd3\x06\xcd\x39\x1b\xe7\x53\x0d\x35\x1f\x69\xe8\x6c\x42\x9c\x76\x35\x9d\xad\xec\x14\x78\x8d\x74\x17\xe8\x75\xe0\x34\xf9\x11\x00\x00\xff\xff\xbc\x08\x57\x3f\x49\x03\x00\x00"), + }, + "/overlays": &vfsgen۰DirInfo{ + name: "overlays", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/overlays/template": &vfsgen۰DirInfo{ + name: "template", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/overlays/template/addons": &vfsgen۰DirInfo{ + name: "addons", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/overlays/template/addons/kustomization.yaml": &vfsgen۰CompressedFileInfo{ + name: "kustomization.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 758, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\x41\x6f\x9c\x30\x10\x85\xef\xfe\x15\x4f\xcb\xa5\x95\x76\xd9\x24\xb7\x6e\x4f\x34\x49\x55\x94\x68\x57\x0a\x9b\x46\x39\x1a\x33\xc0\x28\x60\xbb\xf6\x10\x42\x7f\x7d\x05\xbb\x91\x12\x15\x71\xf1\xcc\x9b\x99\xcf\xcf\x93\xe0\xda\xf9\x29\x70\xd3\x0a\xae\x2e\x2e\xbf\xe1\xd8\x12\xee\x86\x92\x82\x25\xa1\x88\x6c\x90\xd6\x85\x98\xaa\x44\x25\xb8\x67\x43\x36\x52\x85\xc1\x56\x14\x20\x2d\x21\xf3\xda\xb4\xf4\x9e\x59\xe3\x37\x85\xc8\xce\xe2\x2a\xbd\xc0\x97\x59\xb0\x3a\xa7\x56\x5f\xbf\xab\x04\x93\x1b\xd0\xeb\x09\xd6\x09\x86\x48\x90\x96\x23\x6a\xee\x08\xf4\x66\xc8\x0b\xd8\xc2\xb8\xde\x77\xac\xad\x21\x8c\x2c\xed\x32\xe6\xdc\x24\x55\x09\x9e\xcf\x2d\x5c\x29\x9a\x2d\x34\x8c\xf3\x13\x5c\xfd\x51\x07\x2d\x0b\xf0\xfc\xb5\x22\x7e\xb7\xdd\x8e\xe3\x98\xea\x05\x36\x75\xa1\xd9\x76\x27\x61\xdc\xde\xe7\xd7\xb7\xfb\xe2\x76\x73\x95\x5e\x2c\x25\x8f\xb6\xa3\x18\x11\xe8\xcf\xc0\x81\x2a\x94\x13\xb4\xf7\x1d\x1b\x5d\x76\x84\x4e\x8f\x70\x01\xba\x09\x44\x15\xc4\xcd\xbc\x63\x60\x61\xdb\xac\x11\x5d\x2d\xa3\x0e\xa4\x12\x54\x1c\x25\x70\x39\xc8\x27\xb3\xde\xe9\x38\x7e\x12\x38\x0b\x6d\xb1\xca\x0a\xe4\xc5\x0a\x3f\xb2\x22\x2f\xd6\x2a\xc1\x53\x7e\xfc\x75\x78\x3c\xe2\x29\x7b\x78\xc8\xf6\xc7\xfc\xb6\xc0\xe1\x01\xd7\x87\xfd\x4d\x7e\xcc\x0f\xfb\x02\x87\x9f\xc8\xf6\xcf\xb8\xcb\xf7\x37\x6b\x10\x4b\x4b\x01\xf4\xe6\xc3\xcc\xef\x02\x78\xb6\x91\xaa\xd9\xb3\x82\xe8\x13\x40\xed\x4e\x40\xd1\x93\xe1\x9a\x0d\x3a\x6d\x9b\x41\x37\x84\xc6\xbd\x52\xb0\x6c\x1b\x78\x0a\x3d\xc7\xf9\x31\x23\xb4\xad\x54\x82\x8e\x7b\x16\x2d\x4b\xe4\xbf\x4b\xcd\x1b\xa2\xb4\xe7\xf3\x02\xec\xf0\x7a\x59\x92\xe8\x4b\xf5\xc2\xb6\xda\xe1\x6e\x88\xe2\x7a\xfe\xbb\x94\x2b\x65\x75\x4f\xd1\x6b\x43\x3b\xbc\x0c\x25\x6d\xe2\x14\x85\x7a\xa5\xbc\x16\xd3\x52\xdc\x29\x60\x83\xe5\x90\x4e\xba\xef\x94\x2a\x75\x7c\x0f\xa7\xe9\xf6\xf4\xcf\xb1\xad\xae\x2a\x67\xa3\x52\x81\xa2\x1b\x82\xf9\x20\xb2\x24\xa3\x0b\x2f\x1b\xe3\x6c\xcd\xcd\x10\x96\xd1\xa7\x76\xff\x02\x00\x00\xff\xff\xdb\xa6\xba\x7e\xf6\x02\x00\x00"), + }, + "/overlays/template/clusters": &vfsgen۰DirInfo{ + name: "clusters", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/overlays/template/clusters/kustomization.yaml": &vfsgen۰CompressedFileInfo{ + name: "kustomization.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 1028, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x6c\x52\x4d\x6f\xe3\x36\x10\xbd\xf3\x57\x3c\xd8\x97\x16\x88\xe5\x38\xa7\xd6\x3d\xb9\x59\x17\x6b\x78\x57\x06\x22\x6f\x17\x39\x2d\x46\xd4\x48\x9a\x46\x22\x59\x92\xb2\xd6\x5d\xe4\xbf\x17\xfa\x08\xe0\xa0\x15\x74\x20\x67\xde\x9b\x79\x7c\x33\x4b\x3c\x5a\x77\xf5\x52\xd5\x11\x0f\xf7\x9b\x5f\x71\xae\x19\xc7\x2e\x67\x6f\x38\x72\xc0\xae\x8b\xb5\xf5\x21\x51\x4b\xb5\xc4\x27\xd1\x6c\x02\x17\xe8\x4c\xc1\x1e\xb1\x66\xec\x1c\xe9\x9a\xdf\x32\x77\xf8\x93\x7d\x10\x6b\xf0\x90\xdc\xe3\xa7\x01\xb0\x98\x53\x8b\x9f\x7f\x53\x4b\x5c\x6d\x87\x96\xae\x30\x36\xa2\x0b\x8c\x58\x4b\x40\x29\x0d\x83\xbf\x6b\x76\x11\x62\xa0\x6d\xeb\x1a\x21\xa3\x19\xbd\xc4\x7a\x6c\x33\x17\x49\xd4\x12\xcf\x73\x09\x9b\x47\x12\x03\x82\xb6\xee\x0a\x5b\xde\xe2\x40\x71\x14\x3c\x7c\x75\x8c\x6e\xbb\x5e\xf7\x7d\x9f\xd0\x28\x36\xb1\xbe\x5a\x37\x13\x30\xac\x3f\x1d\x1e\xf7\x69\xb6\x5f\x3d\x24\xf7\x23\xe5\x8b\x69\x38\x04\x78\xfe\xbb\x13\xcf\x05\xf2\x2b\xc8\xb9\x46\x34\xe5\x0d\xa3\xa1\x1e\xd6\x83\x2a\xcf\x5c\x20\xda\x41\x6f\xef\x25\x8a\xa9\xee\x10\x6c\x19\x7b\xf2\xac\x96\x28\x24\x44\x2f\x79\x17\xdf\x99\xf5\xa6\x4e\xc2\x3b\x80\x35\x20\x83\xc5\x2e\xc3\x21\x5b\xe0\xf7\x5d\x76\xc8\xee\xd4\x12\x5f\x0f\xe7\x8f\xa7\x2f\x67\x7c\xdd\x3d\x3d\xed\xd2\xf3\x61\x9f\xe1\xf4\x84\xc7\x53\xfa\xe1\x70\x3e\x9c\xd2\x0c\xa7\x3f\xb0\x4b\x9f\x71\x3c\xa4\x1f\xee\xc0\x12\x6b\xf6\xe0\xef\xce\x0f\xfa\xad\x87\x0c\x36\x72\x31\x78\x96\x31\xbf\x13\x50\xda\x49\x50\x70\xac\xa5\x14\x8d\x86\x4c\xd5\x51\xc5\xa8\xec\x85\xbd\x11\x53\xc1\xb1\x6f\x25\x0c\xc3\x0c\x20\x53\xa8\x25\x1a\x69\x25\x52\x1c\x23\xff\x79\xd4\xb0\x21\x8a\x9c\xcc\x0b\xb0\xc5\x65\x93\x73\xa4\x8d\x7a\x11\x53\x6c\x71\xec\x42\xb4\xad\xfc\x33\xd2\x95\x32\xd4\x72\x70\xa4\x79\x8b\x85\x6e\xba\x10\xd9\xaf\xa8\x0f\xab\x1f\x3f\x90\xec\xcd\x25\xa5\x96\xf1\xfa\xba\x50\x2a\xa7\xc0\x61\xab\x80\x15\x92\x64\x3d\xfd\x43\x6c\x3d\xb3\x82\x52\x9e\x83\xed\xbc\xbe\x81\x19\x8e\xbd\xf5\x2f\x2b\x6d\x4d\x29\x55\xe7\xc7\xa6\xc9\x95\xda\x46\x29\x47\x51\xd7\x1c\xb2\xe8\x29\x72\x25\xfa\x33\xfb\x8a\x27\xe6\x9b\x10\x7d\xab\x75\xa2\x0d\xe9\x96\x74\x2d\x86\xff\x2f\xad\xd4\x85\xfc\xdc\x7f\x78\xda\x16\x59\xf6\xf1\xdb\x71\xff\xfc\x2d\xdd\x7d\xde\xab\x61\x0d\x6d\xfe\x97\xe7\x72\x3b\x9e\x81\xc9\x94\xc7\xa9\xe1\x1c\x9b\x88\x05\x97\xd4\x35\x71\x8e\xdd\x1a\x3a\xcb\x4b\x5e\x7e\x09\x89\xd8\xf5\x65\x43\x8d\xab\x69\x33\x22\x4b\xe1\xa6\xb8\xa9\x3f\xde\x1d\xc5\x7a\x3b\xce\x38\x71\xde\x5e\xa4\x60\x9f\x0d\x97\x0b\x35\x1d\x27\x21\xd4\x47\xbe\x0e\x4e\xff\x1b\x00\x00\xff\xff\x38\x27\x1d\x39\x04\x04\x00\x00"), + }, + "/overlays/template/network-configuration.yaml": &vfsgen۰CompressedFileInfo{ + name: "network-configuration.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 718, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\xcf\x6e\xdb\x3c\x10\xc4\xef\x7c\x8a\x81\x75\xf9\x3e\xc0\x96\xff\x1c\x82\xc6\x3d\x29\x4e\x8a\x0a\x49\x6d\x20\x72\x1a\xe4\x54\xac\xa9\xb5\xb4\x88\x44\xb2\x24\x15\xc5\x6f\x5f\x48\x71\x80\x1a\xe5\x91\x3b\xb3\xfb\xe3\x70\x13\x6c\xac\x3b\x79\xa9\xea\x88\xd5\x62\x79\x8d\x7d\xcd\xb8\xef\x0e\xec\x0d\x47\x0e\xc8\xba\x58\x5b\x1f\x52\x95\xa8\x04\x0f\xa2\xd9\x04\x2e\xd1\x99\x92\x3d\x62\xcd\xc8\x1c\xe9\x9a\x3f\x2b\x53\xfc\x64\x1f\xc4\x1a\xac\xd2\x05\xfe\x1b\x04\x93\x73\x69\xf2\xff\x57\x95\xe0\x64\x3b\xb4\x74\x82\xb1\x11\x5d\x60\xc4\x5a\x02\x8e\xd2\x30\xf8\x5d\xb3\x8b\x10\x03\x6d\x5b\xd7\x08\x19\xcd\xe8\x25\xd6\xe3\x98\x73\x93\x54\x25\x78\x39\xb7\xb0\x87\x48\x62\x40\xd0\xd6\x9d\x60\x8f\x7f\xeb\x40\x71\x04\x1e\x4e\x1d\xa3\x5b\xcf\xe7\x7d\xdf\xa7\x34\xc2\xa6\xd6\x57\xf3\xe6\x43\x18\xe6\x0f\xf9\xe6\x6e\x5b\xdc\xcd\x56\xe9\x62\xb4\x3c\x99\x86\x43\x80\xe7\xdf\x9d\x78\x2e\x71\x38\x81\x9c\x6b\x44\xd3\xa1\x61\x34\xd4\xc3\x7a\x50\xe5\x99\x4b\x44\x3b\xf0\xf6\x5e\xa2\x98\x6a\x8a\x60\x8f\xb1\x27\xcf\x2a\x41\x29\x21\x7a\x39\x74\xf1\x22\xac\x4f\x3a\x09\x17\x02\x6b\x40\x06\x93\xac\x40\x5e\x4c\x70\x93\x15\x79\x31\x55\x09\x9e\xf3\xfd\xf7\xdd\xd3\x1e\xcf\xd9\xe3\x63\xb6\xdd\xe7\x77\x05\x76\x8f\xd8\xec\xb6\xb7\xf9\x3e\xdf\x6d\x0b\xec\xbe\x21\xdb\xbe\xe0\x3e\xdf\xde\x4e\xc1\x12\x6b\xf6\xe0\x77\xe7\x07\x7e\xeb\x21\x43\x8c\x5c\x0e\x99\x15\xcc\x17\x00\x47\xfb\x01\x14\x1c\x6b\x39\x8a\x46\x43\xa6\xea\xa8\x62\x54\xf6\x8d\xbd\x11\x53\xc1\xb1\x6f\x25\x0c\x9f\x19\x40\xa6\x54\x09\x1a\x69\x25\x52\x1c\x6f\xfe\x79\xd4\xb0\x21\x8a\x9c\x9c\x17\x60\x8d\xb7\xa5\x7a\x15\x53\xae\xb1\xb1\xe6\x28\xd5\x0f\x72\xaa\xe5\x48\x25\x45\x5a\x2b\xc0\x50\xcb\x6b\xe8\xa6\x0b\x91\xfd\x8c\x9c\xcc\xa8\x0f\x33\xc3\xb1\xb7\xfe\x75\xa6\x47\x4f\xe7\xc7\x69\xea\xd3\xe3\x6c\x19\x7e\x69\x29\xfd\x4d\x63\xf5\xeb\x1a\x93\xe5\xf5\x2a\x5d\x5e\x7d\x49\x17\xe9\x62\xbe\xbc\x9a\xa8\x3f\x01\x00\x00\xff\xff\xb0\xd3\x6c\x08\xce\x02\x00\x00"), + }, + "/overlays/template/provider-components": &vfsgen۰DirInfo{ + name: "provider-components", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + }, + "/overlays/template/provider-components/kustomization.yaml": &vfsgen۰CompressedFileInfo{ + name: "kustomization.yaml", + modTime: time.Date(1970, 1, 1, 0, 0, 0, 0, time.UTC), + uncompressedSize: 720, + + compressedContent: []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x64\x92\x41\x6f\xdb\x3e\x0c\xc5\xef\xfa\x14\x0f\xf1\xe5\xff\x07\x12\xa7\xed\x6d\xd9\xc9\x6b\x3b\xcc\x68\x91\x00\x75\xba\xa2\x47\xd9\x66\x6c\x62\xb6\xa4\x89\x74\x5d\xef\xd3\x0f\x76\xd3\x61\xc5\x04\x5d\x44\x3e\x52\x3f\x51\x2f\xc1\xb5\x0f\x53\xe4\xa6\x55\x5c\x5d\x5c\x7e\xc2\xb1\x25\xdc\x0d\x25\x45\x47\x4a\x82\x6c\xd0\xd6\x47\x49\x4d\x62\x12\xdc\x73\x45\x4e\xa8\xc6\xe0\x6a\x8a\xd0\x96\x90\x05\x5b\xb5\xf4\x9e\x59\xe3\x3b\x45\x61\xef\x70\x95\x5e\xe0\xbf\x59\xb0\x3a\xa7\x56\xff\x7f\x36\x09\x26\x3f\xa0\xb7\x13\x9c\x57\x0c\x42\xd0\x96\x05\x27\xee\x08\xf4\x5a\x51\x50\xb0\x43\xe5\xfb\xd0\xb1\x75\x15\x61\x64\x6d\x97\x6b\xce\x4d\x52\x93\xe0\xf9\xdc\xc2\x97\x6a\xd9\xc1\xa2\xf2\x61\x82\x3f\xfd\xad\x83\xd5\x05\x78\x5e\xad\x6a\xd8\x6d\xb7\xe3\x38\xa6\x76\x81\x4d\x7d\x6c\xb6\xdd\x9b\x50\xb6\xf7\xf9\xf5\xed\xbe\xb8\xdd\x5c\xa5\x17\x4b\xc9\xa3\xeb\x48\x04\x91\x7e\x0e\x1c\xa9\x46\x39\xc1\x86\xd0\x71\x65\xcb\x8e\xd0\xd9\x11\x3e\xc2\x36\x91\xa8\x86\xfa\x99\x77\x8c\xac\xec\x9a\x35\xc4\x9f\x74\xb4\x91\x4c\x82\x9a\x45\x23\x97\x83\x7e\x18\xd6\x3b\x1d\xcb\x07\x81\x77\xb0\x0e\xab\xac\x40\x5e\xac\xf0\x25\x2b\xf2\x62\x6d\x12\x3c\xe5\xc7\x6f\x87\xc7\x23\x9e\xb2\x87\x87\x6c\x7f\xcc\x6f\x0b\x1c\x1e\x70\x7d\xd8\xdf\xe4\xc7\xfc\xb0\x2f\x70\xf8\x8a\x6c\xff\x8c\xbb\x7c\x7f\xb3\x06\xb1\xb6\x14\x41\xaf\x21\xce\xfc\x3e\x82\xe7\x31\x52\x3d\xcf\xac\x20\xfa\x00\x70\xf2\x6f\x40\x12\xa8\xe2\x13\x57\xe8\xac\x6b\x06\xdb\x10\x1a\xff\x42\xd1\xb1\x6b\x10\x28\xf6\x2c\xf3\x67\x0a\xac\xab\x4d\x82\x8e\x7b\x56\xab\x4b\xe4\x9f\x47\xcd\x0e\x31\x36\xf0\xd9\x00\x3b\xbc\x5c\x96\xa4\xf6\xd2\xfc\x60\x57\xef\x70\x37\x88\xfa\x9e\x7f\x2d\xe5\xc6\x38\xdb\x93\x04\x5b\xd1\x0e\x55\x37\x88\x52\xdc\xd8\xc0\x9b\x10\xfd\x0b\xd7\xf3\x61\x94\x8d\x4c\xa2\xd4\x1b\x53\x5a\x21\xd9\x19\x60\x83\x34\xdd\xbe\xed\x39\xb6\xfd\xa3\x9e\x1d\xe3\x1d\x39\x15\xf3\x3b\x00\x00\xff\xff\xac\xf6\x46\x94\xd0\x02\x00\x00"), + }, + } + fs["/"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/README.md"].(os.FileInfo), + fs["/base"].(os.FileInfo), + fs["/overlays"].(os.FileInfo), + } + fs["/base"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/base/addons"].(os.FileInfo), + fs["/base/clusters"].(os.FileInfo), + fs["/base/provider-components"].(os.FileInfo), + } + fs["/base/addons"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/base/addons/aws-config.yaml"].(os.FileInfo), + fs["/base/addons/aws-daemonset.yaml"].(os.FileInfo), + fs["/base/addons/calico.yaml"].(os.FileInfo), + fs["/base/addons/kustomization.yaml"].(os.FileInfo), + } + fs["/base/clusters"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/base/clusters/cluster.yaml"].(os.FileInfo), + fs["/base/clusters/controlplane.yaml"].(os.FileInfo), + fs["/base/clusters/kustomization.yaml"].(os.FileInfo), + fs["/base/clusters/node.yaml"].(os.FileInfo), + } + fs["/base/provider-components"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/base/provider-components/aws-provider-components.yaml"].(os.FileInfo), + fs["/base/provider-components/aws-provider-version-patch.yaml"].(os.FileInfo), + fs["/base/provider-components/cluster-api-provider-components.yaml"].(os.FileInfo), + fs["/base/provider-components/kustomization.yaml"].(os.FileInfo), + } + fs["/overlays"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/overlays/template"].(os.FileInfo), + } + fs["/overlays/template"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/overlays/template/addons"].(os.FileInfo), + fs["/overlays/template/clusters"].(os.FileInfo), + fs["/overlays/template/network-configuration.yaml"].(os.FileInfo), + fs["/overlays/template/provider-components"].(os.FileInfo), + } + fs["/overlays/template/addons"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/overlays/template/addons/kustomization.yaml"].(os.FileInfo), + } + fs["/overlays/template/clusters"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/overlays/template/clusters/kustomization.yaml"].(os.FileInfo), + } + fs["/overlays/template/provider-components"].(*vfsgen۰DirInfo).entries = []os.FileInfo{ + fs["/overlays/template/provider-components/kustomization.yaml"].(os.FileInfo), + } + + return fs +}() + +type vfsgen۰FS map[string]interface{} + +func (fs vfsgen۰FS) Open(path string) (http.File, error) { + path = pathpkg.Clean("/" + path) + f, ok := fs[path] + if !ok { + return nil, &os.PathError{Op: "open", Path: path, Err: os.ErrNotExist} + } + + switch f := f.(type) { + case *vfsgen۰CompressedFileInfo: + gr, err := gzip.NewReader(bytes.NewReader(f.compressedContent)) + if err != nil { + // This should never happen because we generate the gzip bytes such that they are always valid. + panic("unexpected error reading own gzip compressed bytes: " + err.Error()) + } + return &vfsgen۰CompressedFile{ + vfsgen۰CompressedFileInfo: f, + gr: gr, + }, nil + case *vfsgen۰DirInfo: + return &vfsgen۰Dir{ + vfsgen۰DirInfo: f, + }, nil + default: + // This should never happen because we generate only the above types. + panic(fmt.Sprintf("unexpected type %T", f)) + } +} + +// vfsgen۰CompressedFileInfo is a static definition of a gzip compressed file. +type vfsgen۰CompressedFileInfo struct { + name string + modTime time.Time + compressedContent []byte + uncompressedSize int64 +} + +func (f *vfsgen۰CompressedFileInfo) Readdir(count int) ([]os.FileInfo, error) { + return nil, fmt.Errorf("cannot Readdir from file %s", f.name) +} +func (f *vfsgen۰CompressedFileInfo) Stat() (os.FileInfo, error) { return f, nil } + +func (f *vfsgen۰CompressedFileInfo) GzipBytes() []byte { + return f.compressedContent +} + +func (f *vfsgen۰CompressedFileInfo) Name() string { return f.name } +func (f *vfsgen۰CompressedFileInfo) Size() int64 { return f.uncompressedSize } +func (f *vfsgen۰CompressedFileInfo) Mode() os.FileMode { return 0444 } +func (f *vfsgen۰CompressedFileInfo) ModTime() time.Time { return f.modTime } +func (f *vfsgen۰CompressedFileInfo) IsDir() bool { return false } +func (f *vfsgen۰CompressedFileInfo) Sys() interface{} { return nil } + +// vfsgen۰CompressedFile is an opened compressedFile instance. +type vfsgen۰CompressedFile struct { + *vfsgen۰CompressedFileInfo + gr *gzip.Reader + grPos int64 // Actual gr uncompressed position. + seekPos int64 // Seek uncompressed position. +} + +func (f *vfsgen۰CompressedFile) Read(p []byte) (n int, err error) { + if f.grPos > f.seekPos { + // Rewind to beginning. + err = f.gr.Reset(bytes.NewReader(f.compressedContent)) + if err != nil { + return 0, err + } + f.grPos = 0 + } + if f.grPos < f.seekPos { + // Fast-forward. + _, err = io.CopyN(ioutil.Discard, f.gr, f.seekPos-f.grPos) + if err != nil { + return 0, err + } + f.grPos = f.seekPos + } + n, err = f.gr.Read(p) + f.grPos += int64(n) + f.seekPos = f.grPos + return n, err +} +func (f *vfsgen۰CompressedFile) Seek(offset int64, whence int) (int64, error) { + switch whence { + case io.SeekStart: + f.seekPos = 0 + offset + case io.SeekCurrent: + f.seekPos += offset + case io.SeekEnd: + f.seekPos = f.uncompressedSize + offset + default: + panic(fmt.Errorf("invalid whence value: %v", whence)) + } + return f.seekPos, nil +} +func (f *vfsgen۰CompressedFile) Close() error { + return f.gr.Close() +} + +// vfsgen۰DirInfo is a static definition of a directory. +type vfsgen۰DirInfo struct { + name string + modTime time.Time + entries []os.FileInfo +} + +func (d *vfsgen۰DirInfo) Read([]byte) (int, error) { + return 0, fmt.Errorf("cannot Read from directory %s", d.name) +} +func (d *vfsgen۰DirInfo) Close() error { return nil } +func (d *vfsgen۰DirInfo) Stat() (os.FileInfo, error) { return d, nil } + +func (d *vfsgen۰DirInfo) Name() string { return d.name } +func (d *vfsgen۰DirInfo) Size() int64 { return 0 } +func (d *vfsgen۰DirInfo) Mode() os.FileMode { return 0755 | os.ModeDir } +func (d *vfsgen۰DirInfo) ModTime() time.Time { return d.modTime } +func (d *vfsgen۰DirInfo) IsDir() bool { return true } +func (d *vfsgen۰DirInfo) Sys() interface{} { return nil } + +// vfsgen۰Dir is an opened dir instance. +type vfsgen۰Dir struct { + *vfsgen۰DirInfo + pos int // Position within entries for Seek and Readdir. +} + +func (d *vfsgen۰Dir) Seek(offset int64, whence int) (int64, error) { + if offset == 0 && whence == io.SeekStart { + d.pos = 0 + return 0, nil + } + return 0, fmt.Errorf("unsupported Seek in directory %s", d.name) +} + +func (d *vfsgen۰Dir) Readdir(count int) ([]os.FileInfo, error) { + if d.pos >= len(d.entries) && count > 0 { + return nil, io.EOF + } + if count <= 0 || count > len(d.entries)-d.pos { + count = len(d.entries) - d.pos + } + e := d.entries[d.pos : d.pos+count] + d.pos += count + return e, nil +} diff --git a/cmd/clusterawsadm/cmd/alpha/config/config.go b/cmd/clusterawsadm/cmd/alpha/config/config.go new file mode 100644 index 0000000000..25c864bdc8 --- /dev/null +++ b/cmd/clusterawsadm/cmd/alpha/config/config.go @@ -0,0 +1,458 @@ +// Copyright © 2018 The Kubernetes Authors. +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package config + +import ( + "bytes" + "fmt" + "github.com/pkg/errors" + "github.com/shurcool/httpfs/vfsutil" + "github.com/spf13/cobra" + "io/ioutil" + "net/http" + "os" + "os/exec" + "path/filepath" + "sigs.k8s.io/cluster-api-provider-aws/pkg/template" + "strings" +) + +// RootCmd is the root of the `alpha bootstrap command` +func RootCmd() *cobra.Command { + + force := false + + newCmd := &cobra.Command{ + Use: "config", + Short: "configure a cluster", + Long: `Cluster configuration commands`, + RunE: func(cmd *cobra.Command, args []string) error { + if err := cmd.Help(); err != nil { + return err + } + return nil + }, + } + + newCmd.PersistentFlags().BoolVarP(&force, "force", "f", force, "Overwrite if files already exist") + + newCmd.AddCommand(InitCmd(&force)) + newCmd.AddCommand(NewOverlayCmd()) + newCmd.AddCommand(RenderCmd()) + newCmd.AddCommand(CreateCmd()) + + return newCmd +} + +// InitCmd is the root of the `alpha bootstrap command` +func InitCmd(force *bool) *cobra.Command { + newCmd := &cobra.Command{ + Use: "init", + Short: "initialize new cluster", + Long: `Create directory with editable manifests`, + RunE: func(cmd *cobra.Command, args []string) error { + + empty, err := currentDirisEmpty() + if err != nil { + fmt.Println("Error checking directory.") + return errors.WithStack(err) + } + + if !empty && !*force { + fmt.Println("cannot write to empty directory without --force flag") + return errors.WithStack(err) + } + + fmt.Println("Initializing this directory for cluster-api-provider-aws configuration using kustomize") + + fmt.Println("\nWriting ./clusterawsadm") + ioutil.WriteFile(rootIdentifier, []byte{}, os.ModePerm) + c, err := newConfiguration("") + if err != nil { + return errors.WithStack(err) + } + err = c.walk(c.hfs, "", "", false) + if err != nil { + return errors.Wrap(err, "cannot walk asset hierarchy and initialize directory") + } + + fmt.Println("\nDirectory initialized for kustomize. Run the following to create a new overlay called test:") + fmt.Println("\nclusterawsadm alpha config new-overlay test") + + return nil + }, + } + + return newCmd +} + +// NewOverlayCmd is the root of the `alpha bootstrap command` +func NewOverlayCmd() *cobra.Command { + newCmd := &cobra.Command{ + Use: "new-overlay", + Short: "create a new configuration overlay", + Long: `Create a new configuration overlay`, + RunE: func(cmd *cobra.Command, args []string) error { + if len(args) != 1 { + fmt.Printf("Error: requires overlay name as an argument\n\n") + if err := cmd.Help(); err != nil { + return err + } + os.Exit(200) + } + + c, err := newConfiguration(args[0]) + if err != nil { + return errors.WithStack(err) + } + fmt.Printf("Creating new overlay %s:\n\n", args[0]) + err = c.walk(c.templateFS, "/", c.envDir, true) + if err != nil { + return errors.Wrap(err, "cannot walk asset hierarchy and create overlay") + } + + fmt.Println("\nNew overlay created. Edit cluster-configuration.yaml to customize your cluster.") + fmt.Println("To render component configuration for clusterctl, run:") + fmt.Printf("\nclusterawsadm alpha config render %s\n\n", args[0]) + + return nil + }, + } + + return newCmd +} + +// RenderCmd is the root of the `alpha bootstrap command` +func RenderCmd() *cobra.Command { + newCmd := &cobra.Command{ + Use: "render", + Short: "render cluster files", + Long: `Render cluster files`, + RunE: func(cmd *cobra.Command, args []string) error { + if len(args) != 1 { + fmt.Printf("Error: requires environment as an argument\n\n") + if err := cmd.Help(); err != nil { + return err + } + os.Exit(200) + } + + c, err := newConfiguration(args[0]) + if err != nil { + return errors.WithStack(err) + } + + err = c.kustomizeBuild("provider-components", false) + if err != nil { + return errors.Wrap(err, "Could not generate provider components") + } + + err = c.kustomizeBuild("clusters", true) + if err != nil { + return errors.Wrap(err, "Could not generate cluster configuration") + } + + err = c.kustomizeBuild("machines", true) + if err != nil { + return errors.Wrap(err, "Could not generate machines configuration") + } + + err = c.kustomizeBuild("addons", false) + if err != nil { + return errors.Wrap(err, "Could not generate addons configuration") + } + + fmt.Println("\nYou can now run the following to create the cluster:") + + fmt.Printf( + "\nclusterctl create --provider-components %s --cluster %s --machines %s --addons %s\n\n", + c.componentPath("provider-components"), + c.componentPath("clusters"), + c.componentPath("machines"), + c.componentPath("addons"), + ) + + return nil + }, + } + + return newCmd +} + +// CreateCmd is the root of the `alpha bootstrap command` +func CreateCmd() *cobra.Command { + newCmd := &cobra.Command{ + Use: "create", + Short: "render cluster files", + Long: `Render cluster files`, + RunE: func(cmd *cobra.Command, args []string) error { + if len(args) < 1 { + fmt.Printf("Error: requires environment as an argument\n\n") + if err := cmd.Help(); err != nil { + return err + } + os.Exit(200) + } + c, err := newConfiguration(args[0]) + if err != nil { + return errors.WithStack(err) + } + + c.createCluster(args[1:]) + + return nil + }, + } + + return newCmd +} + +type configuration struct { + // EnvName exposes the environment name + EnvName string + hfs http.FileSystem + rootDir string + envDir string + kustomizeDir string + envOutDir string + templateDir string + templateFS http.FileSystem +} + +const ( + overlaysDir = "/overlays" + overlaysTemplatesDir = "/overlays/template" + kustomizeConfigDir = "kustomize-config" + rootIdentifier = ".clusterawsadm" +) + +func newConfiguration(env string) (*configuration, error) { + rootDir, err := findCLIFile(".") + if err != nil { + return nil, errors.Wrap(err, "cannot find .clusterawsadm in this or any parent directory") + } + envDir := filepath.Join(rootDir, overlaysDir, env) + envOutDir := filepath.Join(envDir, "out") + kustomizeDir := filepath.Join(rootDir, kustomizeConfigDir) + templateDir := filepath.Join(rootDir, overlaysTemplatesDir) + templateFS := http.Dir(templateDir) + + return &configuration{ + EnvName: env, + hfs: assets, + rootDir: rootDir, + envDir: envDir, + kustomizeDir: kustomizeDir, + envOutDir: envOutDir, + templateDir: templateDir, + templateFS: templateFS, + }, nil +} + +func (c configuration) ensureOverlay() { + os.MkdirAll(c.envDir, os.ModePerm) +} + +func (c configuration) walk(hfs http.FileSystem, stripDir string, replaceDir string, templated bool) error { + + w := walkConfiguration{ + hfs: hfs, + stripDir: stripDir, + replaceDir: replaceDir, + templated: templated, + c: c, + } + + err := vfsutil.Walk(w.hfs, "/", w.walkFn()) + if err != nil { + return errors.WithStack(err) + } + + return nil +} + +type walkConfiguration struct { + // EnvName exposes the environment name + hfs http.FileSystem + stripDir string + replaceDir string + templated bool + c configuration +} + +func (w walkConfiguration) walkFn() filepath.WalkFunc { + return func(path string, info os.FileInfo, err error) error { + if err != nil { + return nil + } + newPath := path + if w.stripDir != "" { + newPath = strings.Replace(path, w.stripDir, w.replaceDir+"/", 1) + } + err = w.writeFile(newPath, path, info) + if err != nil { + return errors.WithStack(err) + } + return nil + } +} + +func (w walkConfiguration) writeFile(dst string, src string, info os.FileInfo) error { + if info.IsDir() { + return nil + } + fmt.Printf("Writing %s\n", dst) + dir := filepath.Dir(dst) + os.MkdirAll(filepath.Join(w.c.rootDir, dir), os.ModePerm) + bytes, err := vfsutil.ReadFile(w.hfs, src) + if err != nil { + return errors.Wrapf(err, "cannot read asset: %s", src) + } + + rendered := bytes + + if w.templated { + renderedStr, err := template.Generate(src, string(bytes), w.c) + if err != nil { + return errors.Wrapf(err, "cannot render template %s", src) + } + rendered = []byte(renderedStr) + } + + err = ioutil.WriteFile(filepath.Join(w.c.rootDir, dst), rendered, os.ModePerm) + if err != nil { + return errors.Wrapf(err, "cannot write file: %s", dst) + } + return nil +} + +func (c configuration) createCluster(args []string) error { + + componentArgs := []string{"create", + "cluster", + "--provider", + "aws", + "-a", + c.componentPath("addons"), + "-c", + c.componentPath("clusters"), + "-m", + c.componentPath("machines"), + "-p", + c.componentPath("provider-components")} + + runCommandWithWait("clusterctl", append(componentArgs, args...)...) + return nil +} + +func runCommandWithWait(cmd string, args ...string) bool { + command := runCommand(cmd, args...) + if err := command.Wait(); err != nil { + fmt.Println(err) + } + return command.ProcessState.Success() +} + +func runShell(cmd string) *exec.Cmd { + return runCommand("sh", "-c", cmd) +} + +func runCommand(cmd string, args ...string) *exec.Cmd { + command := exec.Command(cmd, args...) + command.Stdout = os.Stdout + command.Stderr = os.Stderr + if err := command.Start(); err != nil { + fmt.Println(err) + } + return command +} + +func (c configuration) componentPath(component string) string { + return filepath.Join(c.envOutDir, fmt.Sprintf("%s.yaml", component)) +} + +func (c configuration) kustomizeBuild(component string, filter bool) error { + componentDir := filepath.Join(c.envDir, component) + cmd := exec.Command("kustomize", "build", "-t", c.kustomizeDir, componentDir) + var stdout, stderr bytes.Buffer + cmd.Stdout = &stdout + cmd.Stderr = &stderr + err := cmd.Run() + if err != nil { + fmt.Println(string(stdout.Bytes())) + fmt.Println(string(stderr.Bytes())) + return errors.Wrap(err, "running Kustomize failed") + } + os.MkdirAll(c.envOutDir, os.ModePerm) + outFile := c.componentPath(component) + + var outStr string + + if filter { + outStr = filterYAML(string(stdout.Bytes())) + } else { + outStr = string(stdout.Bytes()) + } + + fmt.Printf("Writing %s\n", outFile) + err = ioutil.WriteFile(outFile, []byte(outStr), os.ModePerm) + if err != nil { + fmt.Printf("cannot write file: %s\n", outFile) + return errors.Wrapf(err, "cannot write file: %s", outFile) + } + + return nil +} + +func currentDirisEmpty() (bool, error) { + cwd, err := os.Open(".") + + if err != nil { + errors.WithStack(err) + } + + entries, err := cwd.Readdir(1) + + if err != nil { + errors.WithStack(err) + } + + if len(entries) == 1 { + return false, nil + } + return true, nil +} + +func findCLIFile(path string) (string, error) { + absPath, err := filepath.Abs(path) + + if err != nil { + return "", errors.WithStack(err) + } + + if absPath == "/" { + return "", errors.New("Reached / root of file system") + } + _, err = os.Stat(fmt.Sprintf("%s/.clusterawsadm", absPath)) + if err != nil { + newPath := filepath.Clean(filepath.Join(absPath, "..")) + return findCLIFile(newPath) + } + + return path, nil +} + +func filterYAML(docs string) string { + return strings.Split(docs, "---\n")[1] +} diff --git a/cmd/clusterctl/BUILD b/cmd/clusterctl/BUILD index d443bb9b1f..bdaf973b8f 100644 --- a/cmd/clusterctl/BUILD +++ b/cmd/clusterctl/BUILD @@ -17,6 +17,7 @@ go_binary( name = "clusterctl", embed = [":go_default_library"], pure = "on", + tags = ["cli"], visibility = ["//visibility:public"], x_defs = { "sigs.k8s.io/cluster-api-provider-aws/cmd/versioninfo.GitBranch": "{GIT_BRANCH}", diff --git a/cmd/clusterctl/examples/aws/BUILD b/cmd/clusterctl/examples/aws/BUILD deleted file mode 100644 index f66dcb51ea..0000000000 --- a/cmd/clusterctl/examples/aws/BUILD +++ /dev/null @@ -1,29 +0,0 @@ -genrule( - name = "example-out", - srcs = glob(["*.yaml.template"]) + - [ - "addons.yaml", - "//cmd/manager:manager-amd64.digest", - ], - outs = [ - "out/addons.yaml", - "out/cluster.yaml", - "out/machines.yaml", - "out/aws_manager_image_patch.yaml", - ], - cmd = " ".join([ - "ENVSUBST=$(location @com_github_a8m_envsubst//cmd/envsubst:envsubst)", - # "MANAGER_IMAGE=$$(cat $(location //cmd/manager:manager-amd64.digest))", - # TODO(EKF): This is a hack. Figure out why the above digest line doesn't work. - "MANAGER_IMAGE_PULL_POLICY=Never", - "MANAGER_IMAGE=bazel/cmd/manager:manager-amd64", - "OUTPUT_DIR=$(@D)/out", - "DIR=.", - "$(location :generate-yaml.sh) -f", - ]), - tools = [ - ":generate-yaml.sh", - "@com_github_a8m_envsubst//cmd/envsubst:envsubst", - ], - visibility = ["//visibility:public"], -) diff --git a/cmd/clusterctl/examples/aws/BUILD.bazel b/cmd/clusterctl/examples/aws/BUILD.bazel new file mode 100644 index 0000000000..c14eaf9866 --- /dev/null +++ b/cmd/clusterctl/examples/aws/BUILD.bazel @@ -0,0 +1,16 @@ +load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar") + +pkg_tar( + name = "package", + srcs = [ + "README.md", + ], + package_dir = "/", + visibility = ["//visibility:public"], + deps = [ + "//cmd/clusterctl/examples/aws/base/addons:addons.tar", + "//cmd/clusterctl/examples/aws/base/clusters:clusters.tar", + "//cmd/clusterctl/examples/aws/base/provider-components:provider-components.tar", + "//cmd/clusterctl/examples/aws/overlays/template:template.tar", + ], +) diff --git a/cmd/clusterctl/examples/aws/base/addons/BUILD.bazel b/cmd/clusterctl/examples/aws/base/addons/BUILD.bazel new file mode 100644 index 0000000000..193d3a8b7b --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/addons/BUILD.bazel @@ -0,0 +1,27 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar") + +pkg_tar( + name = "addons", + srcs = [ + "aws-config.yaml", + "aws-daemonset.yaml", + "calico.yaml", + "kustomization.yaml", + ], + package_dir = "base/addons", + visibility = ["//visibility:public"], +) diff --git a/cmd/clusterctl/examples/aws/base/addons/aws-config.yaml b/cmd/clusterctl/examples/aws/base/addons/aws-config.yaml new file mode 100644 index 0000000000..bf33e7a498 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/addons/aws-config.yaml @@ -0,0 +1,24 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: v1 +kind: ConfigMap +metadata: + name: calico-config + namespace: kube-system +data: + # Calico MTU with IP-in-IP in AWS + veth_mtu: "8981" + ipv4_pool_cidr: "192.168.0.0/16" diff --git a/cmd/clusterctl/examples/aws/base/addons/aws-daemonset.yaml b/cmd/clusterctl/examples/aws/base/addons/aws-daemonset.yaml new file mode 100644 index 0000000000..cc193c7df1 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/addons/aws-daemonset.yaml @@ -0,0 +1,31 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: extensions/v1beta1 +kind: DaemonSet +metadata: + name: calico-node + namespace: kube-system +spec: + template: + spec: + containers: + - name: calico-node + env: + - name: CALICO_IPV4POOL_CIDR + valueFrom: + configMapKeyRef: + name: calico-config + key: ipv4_pool_cidr diff --git a/cmd/clusterctl/examples/aws/addons.yaml b/cmd/clusterctl/examples/aws/base/addons/calico.yaml similarity index 72% rename from cmd/clusterctl/examples/aws/addons.yaml rename to cmd/clusterctl/examples/aws/base/addons/calico.yaml index 21965c5727..8c2d67e364 100644 --- a/cmd/clusterctl/examples/aws/addons.yaml +++ b/cmd/clusterctl/examples/aws/base/addons/calico.yaml @@ -1,97 +1,9 @@ -# Calico Version v3.2.3 -# https://docs.projectcalico.org/v3.2/releases#v3.2.3 ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1beta1 -metadata: - name: calico-node -rules: - - apiGroups: [""] - resources: - - namespaces - - serviceaccounts - verbs: - - get - - list - - watch - - apiGroups: [""] - resources: - - pods/status - verbs: - - update - - apiGroups: [""] - resources: - - pods - verbs: - - get - - list - - watch - - patch - - apiGroups: [""] - resources: - - services - verbs: - - get - - apiGroups: [""] - resources: - - endpoints - verbs: - - get - - apiGroups: [""] - resources: - - nodes - verbs: - - get - - list - - update - - watch - - apiGroups: ["extensions"] - resources: - - networkpolicies - verbs: - - get - - list - - watch - - apiGroups: ["networking.k8s.io"] - resources: - - networkpolicies - verbs: - - watch - - list - - apiGroups: ["crd.projectcalico.org"] - resources: - - globalfelixconfigs - - felixconfigurations - - bgppeers - - globalbgpconfigs - - bgpconfigurations - - ippools - - globalnetworkpolicies - - globalnetworksets - - networkpolicies - - clusterinformations - - hostendpoints - verbs: - - create - - get - - list - - update - - watch +# Calico Version v3.5.0 +# https://docs.projectcalico.org/v3.5/releases#v3.5.0 +# This manifest includes the following component versions: +# calico/node:v3.5.0 +# calico/cni:v3.5.0 ---- -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - name: calico-node -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: calico-node -subjects: - - kind: ServiceAccount - name: calico-node - namespace: kube-system ---- # This ConfigMap is used to configure a self-hosted Calico installation. kind: ConfigMap apiVersion: v1 @@ -99,9 +11,7 @@ metadata: name: calico-config namespace: kube-system data: - # To enable Typha, set this to "calico-typha" *and* set a non-zero value for Typha replicas - # below. We recommend using Typha if you have more than 50 nodes. Above 100 nodes it is - # essential. + # Typha is disabled. typha_service_name: "none" # Configure the Calico backend to use. calico_backend: "bird" @@ -141,111 +51,6 @@ data: ] } ---- -# This manifest creates a Service, which will be backed by Calico's Typha daemon. -# Typha sits in between Felix and the API server, reducing Calico's load on the API server. - -apiVersion: v1 -kind: Service -metadata: - name: calico-typha - namespace: kube-system - labels: - k8s-app: calico-typha -spec: - ports: - - port: 5473 - protocol: TCP - targetPort: calico-typha - name: calico-typha - selector: - k8s-app: calico-typha - ---- -# This manifest creates a Deployment of Typha to back the above service. - -apiVersion: apps/v1beta1 -kind: Deployment -metadata: - name: calico-typha - namespace: kube-system - labels: - k8s-app: calico-typha -spec: - # Number of Typha replicas. To enable Typha, set this to a non-zero value *and* set the - # typha_service_name variable in the calico-config ConfigMap above. - # - # We recommend using Typha if you have more than 50 nodes. Above 100 nodes it is essential - # (when using the Kubernetes datastore). Use one replica for every 100-200 nodes. In - # production, we recommend running at least 3 replicas to reduce the impact of rolling upgrade. - replicas: 0 - revisionHistoryLimit: 2 - template: - metadata: - labels: - k8s-app: calico-typha - annotations: - # This, along with the CriticalAddonsOnly toleration below, marks the pod as a critical - # add-on, ensuring it gets priority scheduling and that its resources are reserved - # if it ever gets evicted. - scheduler.alpha.kubernetes.io/critical-pod: "" - spec: - nodeSelector: - beta.kubernetes.io/os: linux - hostNetwork: true - tolerations: - # Mark the pod as a critical add-on for rescheduling. - - key: CriticalAddonsOnly - operator: Exists - # Since Calico can't network a pod until Typha is up, we need to run Typha itself - # as a host-networked pod. - serviceAccountName: calico-node - containers: - - image: quay.io/calico/typha:v3.2.3 - name: calico-typha - ports: - - containerPort: 5473 - name: calico-typha - protocol: TCP - env: - # Enable "info" logging by default. Can be set to "debug" to increase verbosity. - - name: TYPHA_LOGSEVERITYSCREEN - value: "info" - # Disable logging to file and syslog since those don't make sense in Kubernetes. - - name: TYPHA_LOGFILEPATH - value: "none" - - name: TYPHA_LOGSEVERITYSYS - value: "none" - # Monitor the Kubernetes API to find the number of running instances and rebalance - # connections. - - name: TYPHA_CONNECTIONREBALANCINGMODE - value: "kubernetes" - - name: TYPHA_DATASTORETYPE - value: "kubernetes" - - name: TYPHA_HEALTHENABLED - value: "true" - # Uncomment these lines to enable prometheus metrics. Since Typha is host-networked, - # this opens a port on the host, which may need to be secured. - #- name: TYPHA_PROMETHEUSMETRICSENABLED - # value: "true" - #- name: TYPHA_PROMETHEUSMETRICSPORT - # value: "9093" - livenessProbe: - exec: - command: - - calico-typha - - check - - liveness - periodSeconds: 30 - initialDelaySeconds: 30 - readinessProbe: - exec: - command: - - calico-typha - - check - - readiness - periodSeconds: 10 - --- # This manifest installs the calico/node container, as well # as the Calico CNI plugins and network config on @@ -292,22 +97,51 @@ spec: # Minimize downtime during a rolling upgrade or deletion; tell Kubernetes to do a "force # deletion": https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods. terminationGracePeriodSeconds: 0 + initContainers: + # This container installs the Calico CNI binaries + # and CNI network config file on each node. + - name: install-cni + image: quay.io/calico/cni:v3.5.0 + command: ["/install-cni.sh"] + env: + # Name of the CNI config file to create. + - name: CNI_CONF_NAME + value: "10-calico.conflist" + # The CNI network config to install on each node. + - name: CNI_NETWORK_CONFIG + valueFrom: + configMapKeyRef: + name: calico-config + key: cni_network_config + # Set the hostname based on the k8s node name. + - name: KUBERNETES_NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + # CNI MTU Config variable + - name: CNI_MTU + valueFrom: + configMapKeyRef: + name: calico-config + key: veth_mtu + # Prevents the container from sleeping forever. + - name: SLEEP + value: "false" + volumeMounts: + - mountPath: /host/opt/cni/bin + name: cni-bin-dir + - mountPath: /host/etc/cni/net.d + name: cni-net-dir containers: # Runs calico/node container on each Kubernetes node. This # container programs network policy and routes on each # host. - name: calico-node - image: quay.io/calico/node:v3.2.3 + image: quay.io/calico/node:v3.5.0 env: # Use Kubernetes API as the backing datastore. - name: DATASTORE_TYPE value: "kubernetes" - # Typha support: controlled by the ConfigMap. - - name: FELIX_TYPHAK8SSERVICENAME - valueFrom: - configMapKeyRef: - name: calico-config - key: typha_service_name # Wait for the datastore. - name: WAIT_FOR_DATASTORE value: "true" @@ -331,9 +165,6 @@ spec: # Enable IPIP - name: CALICO_IPV4POOL_IPIP value: "Always" - # Enable IP-in-IP within Felix. - - name: FELIX_IPINIPENABLED - value: "true" # Set MTU for tunnel device used if ipip is enabled - name: FELIX_IPINIPMTU valueFrom: @@ -383,43 +214,15 @@ spec: - mountPath: /lib/modules name: lib-modules readOnly: true + - mountPath: /run/xtables.lock + name: xtables-lock + readOnly: false - mountPath: /var/run/calico name: var-run-calico readOnly: false - mountPath: /var/lib/calico name: var-lib-calico readOnly: false - # This container installs the Calico CNI binaries - # and CNI network config file on each node. - - name: install-cni - image: quay.io/calico/cni:v3.2.3 - command: ["/install-cni.sh"] - env: - # Name of the CNI config file to create. - - name: CNI_CONF_NAME - value: "10-calico.conflist" - # Set the hostname based on the k8s node name. - - name: KUBERNETES_NODE_NAME - valueFrom: - fieldRef: - fieldPath: spec.nodeName - # The CNI network config to install on each node. - - name: CNI_NETWORK_CONFIG - valueFrom: - configMapKeyRef: - name: calico-config - key: cni_network_config - # CNI MTU Config variable - - name: CNI_MTU - valueFrom: - configMapKeyRef: - name: calico-config - key: veth_mtu - volumeMounts: - - mountPath: /host/opt/cni/bin - name: cni-bin-dir - - mountPath: /host/etc/cni/net.d - name: cni-net-dir volumes: # Used by calico/node. - name: lib-modules @@ -431,6 +234,10 @@ spec: - name: var-lib-calico hostPath: path: /var/lib/calico + - name: xtables-lock + hostPath: + path: /run/xtables.lock + type: FileOrCreate # Used to install CNI. - name: cni-bin-dir hostPath: @@ -572,3 +379,118 @@ spec: kind: NetworkPolicy plural: networkpolicies singular: networkpolicy +--- +# Include a clusterrole for the calico-node DaemonSet, +# and bind it to the calico-node serviceaccount. +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1beta1 +metadata: + name: calico-node +rules: + # The CNI plugin needs to get pods, nodes, and namespaces. + - apiGroups: [""] + resources: + - pods + - nodes + - namespaces + verbs: + - get + - apiGroups: [""] + resources: + - endpoints + - services + verbs: + # Used to discover service IPs for advertisement. + - watch + - list + # Used to discover Typhas. + - get + - apiGroups: [""] + resources: + - nodes/status + verbs: + # Needed for clearing NodeNetworkUnavailable flag. + - patch + # Calico stores some configuration information in node annotations. + - update + # Watch for changes to Kubernetes NetworkPolicies. + - apiGroups: ["networking.k8s.io"] + resources: + - networkpolicies + verbs: + - watch + - list + # Used by Calico for policy information. + - apiGroups: [""] + resources: + - pods + - namespaces + - serviceaccounts + verbs: + - list + - watch + # The CNI plugin patches pods/status. + - apiGroups: [""] + resources: + - pods/status + verbs: + - patch + # Calico monitors various CRDs for config. + - apiGroups: ["crd.projectcalico.org"] + resources: + - globalfelixconfigs + - felixconfigurations + - bgppeers + - globalbgpconfigs + - bgpconfigurations + - ippools + - globalnetworkpolicies + - globalnetworksets + - networkpolicies + - clusterinformations + - hostendpoints + verbs: + - get + - list + - watch + # Calico must create and update some CRDs on startup. + - apiGroups: ["crd.projectcalico.org"] + resources: + - ippools + - felixconfigurations + - clusterinformations + verbs: + - create + - update + # Calico stores some configuration information on the node. + - apiGroups: [""] + resources: + - nodes + verbs: + - get + - list + - watch + # These permissions are only requried for upgrade from v2.6, and can + # be removed after upgrade or on fresh installations. + - apiGroups: ["crd.projectcalico.org"] + resources: + - bgpconfigurations + - bgppeers + verbs: + - create + - update +--- +apiVersion: rbac.authorization.k8s.io/v1beta1 +kind: ClusterRoleBinding +metadata: + name: calico-node +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: calico-node +subjects: + - kind: ServiceAccount + name: calico-node + namespace: kube-system +--- + diff --git a/cmd/clusterctl/examples/aws/base/addons/kustomization.yaml b/cmd/clusterctl/examples/aws/base/addons/kustomization.yaml new file mode 100644 index 0000000000..87a7ec5da1 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/addons/kustomization.yaml @@ -0,0 +1,26 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: v1beta1 +kind: Kustomization + +namespace: kube-system + +patchesStrategicMerge: + - aws-config.yaml + - aws-daemonset.yaml + +resources: + - calico.yaml diff --git a/cmd/clusterctl/examples/aws/base/clusters/BUILD.bazel b/cmd/clusterctl/examples/aws/base/clusters/BUILD.bazel new file mode 100644 index 0000000000..b2b5e2e9b4 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/clusters/BUILD.bazel @@ -0,0 +1,27 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar") + +pkg_tar( + name = "clusters", + srcs = [ + "cluster.yaml", + "controlplane.yaml", + "kustomization.yaml", + "node.yaml", + ], + package_dir = "base/clusters", + visibility = ["//visibility:public"], +) diff --git a/cmd/clusterctl/examples/aws/base/clusters/cluster.yaml b/cmd/clusterctl/examples/aws/base/clusters/cluster.yaml new file mode 100644 index 0000000000..55ab32b263 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/clusters/cluster.yaml @@ -0,0 +1,34 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: "cluster.k8s.io/v1alpha1" +kind: Cluster +metadata: + name: default +spec: + clusterNetwork: + services: + cidrBlocks: + - "10.96.0.0/12" + pods: + cidrBlocks: + - "192.168.0.0/16" + serviceDomain: "cluster.local" + providerSpec: + value: + apiVersion: "awsprovider/v1alpha1" + kind: "AWSClusterProviderSpec" + region: us-east-1 + sshKeyName: "$(SSH_KEY_NAME)" diff --git a/cmd/clusterctl/examples/aws/base/clusters/controlplane.yaml b/cmd/clusterctl/examples/aws/base/clusters/controlplane.yaml new file mode 100644 index 0000000000..178d729635 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/clusters/controlplane.yaml @@ -0,0 +1,32 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: "cluster.k8s.io/v1alpha1" +kind: Machine +metadata: + name: controlplane-0 + labels: + set: controlplane +spec: + versions: + kubelet: v1.13.0 + controlPlane: v1.13.0 + providerSpec: + value: + apiVersion: awsprovider/v1alpha1 + kind: AWSMachineProviderSpec + instanceType: "$(CONTROL_PLANE_MACHINE_TYPE)" + iamInstanceProfile: "control-plane.cluster-api-provider-aws.sigs.k8s.io" + keyName: "$(SSH_KEY_NAME)" diff --git a/cmd/clusterctl/examples/aws/base/clusters/kustomization.yaml b/cmd/clusterctl/examples/aws/base/clusters/kustomization.yaml new file mode 100644 index 0000000000..45c61fd66b --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/clusters/kustomization.yaml @@ -0,0 +1,22 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: v1beta1 +kind: Kustomization + +resources: + - cluster.yaml + - controlplane.yaml + - node.yaml diff --git a/cmd/clusterctl/examples/aws/base/clusters/node.yaml b/cmd/clusterctl/examples/aws/base/clusters/node.yaml new file mode 100644 index 0000000000..e01956a75d --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/clusters/node.yaml @@ -0,0 +1,31 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: "cluster.k8s.io/v1alpha1" +kind: Machine +metadata: + generateName: node- + labels: + set: node +spec: + versions: + kubelet: v1.13.2 + providerSpec: + value: + apiVersion: awsprovider/v1alpha1 + kind: AWSMachineProviderSpec + instanceType: "t3.medium" + iamInstanceProfile: "nodes.cluster-api-provider-aws.sigs.k8s.io" + keyName: "$(SSH_KEY_NAME)" diff --git a/cmd/clusterctl/examples/aws/base/provider-components/BUILD.bazel b/cmd/clusterctl/examples/aws/base/provider-components/BUILD.bazel new file mode 100644 index 0000000000..908cefc229 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/provider-components/BUILD.bazel @@ -0,0 +1,61 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar") +load("//build:merge_yaml.bzl", "merge_yaml") +load("//build:install.bzl", "install") + +pkg_tar( + name = "provider-components", + srcs = [ + "aws-provider-components.yaml", + "aws-provider-version-patch.yaml", + "cluster-api-provider-components.yaml", + "kustomization.yaml", + ], + package_dir = "base/provider-components", + visibility = ["//visibility:public"], +) + +merge_yaml( + name = "aws-provider-components", + srcs = [ + "//config", + ], + out = "aws-provider-components.yaml", + tags = ["generated"], +) + +install( + name = "provider-components-install", + srcs = [ + "aws-provider-components", + "aws-provider-version-patch", + "cluster-api-provider-components", + ], + tags = ["generated"], +) + +merge_yaml( + name = "cluster-api-provider-components", + srcs = ["//vendor/sigs.k8s.io/cluster-api/config:cluster-api-yaml"], + out = "cluster-api-provider-components.yaml", +) + +merge_yaml( + name = "aws-provider-version-patch", + srcs = ["//cmd/manager:manager-version-patch.yaml"], + out = "aws-provider-version-patch.yaml", + tags = ["generated"], +) diff --git a/cmd/clusterctl/examples/aws/base/provider-components/aws-provider-components.yaml b/cmd/clusterctl/examples/aws/base/provider-components/aws-provider-components.yaml new file mode 100755 index 0000000000..aadebac156 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/provider-components/aws-provider-components.yaml @@ -0,0 +1,695 @@ +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: awsclusterproviderspecs.awsprovider.k8s.io +spec: + group: awsprovider.k8s.io + names: + kind: AWSClusterProviderSpec + plural: awsclusterproviderspecs + scope: Namespaced + validation: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + caCertificate: + description: CACertificate is a PEM encoded CA Certificate for the control + plane nodes. + format: byte + type: string + caKey: + description: CAPrivateKey is a PEM encoded PKCS1 CA PrivateKey for the control + plane nodes. + format: byte + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + region: + description: The AWS Region the cluster lives in. + type: string + sshKeyName: + description: SSHKeyName is the name of the ssh key to attach to the bastion + host. + type: string + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: awsclusterproviderstatuses.awsprovider.k8s.io +spec: + group: awsprovider.k8s.io + names: + kind: AWSClusterProviderStatus + plural: awsclusterproviderstatuses + scope: Namespaced + validation: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + bastion: + properties: + ebsOptimized: + description: Indicates whether the instance is optimized for Amazon + EBS I/O. + type: boolean + enaSupport: + description: Specifies whether enhanced networking with ENA is enabled. + type: boolean + iamProfile: + description: The name of the IAM instance profile associated with the + instance, if applicable. + type: string + id: + type: string + imageId: + description: The ID of the AMI used to launch the instance. + type: string + instanceState: + description: The current state of the instance. + type: string + keyName: + description: The name of the SSH key pair. + type: string + privateIp: + description: The private IPv4 address assigned to the instance. + type: string + publicIp: + description: The public IPv4 address assigned to the instance, if applicable. + type: string + securityGroupIds: + description: SecurityGroupIDs are one or more security group IDs this + instance belongs to. + items: + type: string + type: array + subnetId: + description: The ID of the subnet of the instance. + type: string + tags: + description: The tags associated with the instance. + type: object + type: + description: The instance type. + type: string + userData: + description: UserData is the raw data script passed to the instance + which is run upon bootstrap. This field must not be base64 encoded + and should only be used when running a new instance. + type: string + required: + - id + type: object + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + network: + properties: + apiServerElb: + description: APIServerELB is the Kubernetes api server classic load + balancer. + properties: + attributes: + description: Attributes defines extra attributes associated with + the load balancer. + properties: + idleTimeout: + description: IdleTimeout is time that the connection is allowed + to be idle (no data has been sent over the connection) before + it is closed by the load balancer. + format: int64 + type: integer + type: object + dnsName: + description: DNSName is the dns name of the load balancer. + type: string + healthChecks: + description: HealthCheck is the classic elb health check associated + with the load balancer. + properties: + healthyThreshold: + format: int64 + type: integer + interval: + format: int64 + type: integer + target: + type: string + timeout: + format: int64 + type: integer + unhealthyThreshold: + format: int64 + type: integer + required: + - target + - interval + - timeout + - healthyThreshold + - unhealthyThreshold + type: object + listeners: + description: Listeners is an array of classic elb listeners associated + with the load balancer. There must be at least one. + items: + properties: + instancePort: + format: int64 + type: integer + instanceProtocol: + type: string + port: + format: int64 + type: integer + protocol: + type: string + required: + - protocol + - port + - instanceProtocol + - instancePort + type: object + type: array + name: + description: The name of the load balancer. It must be unique within + the set of load balancers defined in the region. It also serves + as identifier. + type: string + scheme: + description: Scheme is the load balancer scheme, either internet-facing + or private. + type: string + securityGroupIds: + description: SecurityGroupIDs is an array of security groups assigned + to the load balancer. + items: + type: string + type: array + subnetIds: + description: SubnetIDs is an array of subnets in the VPC attached + to the load balancer. + items: + type: string + type: array + tags: + description: Tags is a map of tags associated with the load balancer. + type: object + type: object + internetGatewayId: + description: InternetGatewayID is the id of the internet gateway associated + with the VPC. + type: string + securityGroups: + description: SecurityGroups is a map from the role/kind of the security + group to its unique name, if any. + type: object + subnets: + description: Subnets includes all the subnets defined inside the VPC. + items: + properties: + availabilityZone: + type: string + cidrBlock: + type: string + id: + type: string + natGatewayId: + type: string + public: + type: boolean + routeTableId: + type: string + tags: + type: object + vpcId: + type: string + required: + - id + - vpcId + - availabilityZone + - cidrBlock + - public + - routeTableId + - natGatewayId + type: object + type: array + vpc: + description: VPC defines the cluster vpc. + properties: + cidrBlock: + type: string + id: + type: string + tags: + type: object + required: + - id + - cidrBlock + type: object + type: object + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: awsmachineproviderspecs.awsprovider.k8s.io +spec: + group: awsprovider.k8s.io + names: + kind: AWSMachineProviderSpec + plural: awsmachineproviderspecs + scope: Namespaced + validation: + openAPIV3Schema: + properties: + additionalSecurityGroups: + description: AdditionalSecurityGroups is an array of references to security + groups that should be applied to the instance. These security groups would + be set in addition to any security groups defined at the cluster level + or in the actuator. + items: + properties: + arn: + description: ARN of resource + type: string + filters: + description: 'Filters is a set of key/value pairs used to identify + a resource They are applied according to the rules defined by the + AWS API: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Filtering.html' + items: + properties: + name: + description: Name of the filter. Filter names are case-sensitive. + type: string + values: + description: Values includes one or more filter values. Filter + values are case-sensitive. + items: + type: string + type: array + required: + - name + - values + type: object + type: array + id: + description: ID of resource + type: string + type: object + type: array + additionalTags: + description: AdditionalTags is the set of tags to add to an instance, in + addition to the ones added by default by the actuator. These tags are + additive. The actuator will ensure these tags are present, but will not + remove any other tags that may exist on the instance. + type: object + ami: + description: AMI is the reference to the AMI from which to create the machine + instance. + properties: + arn: + description: ARN of resource + type: string + filters: + description: 'Filters is a set of key/value pairs used to identify a + resource They are applied according to the rules defined by the AWS + API: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Filtering.html' + items: + properties: + name: + description: Name of the filter. Filter names are case-sensitive. + type: string + values: + description: Values includes one or more filter values. Filter + values are case-sensitive. + items: + type: string + type: array + required: + - name + - values + type: object + type: array + id: + description: ID of resource + type: string + type: object + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + iamInstanceProfile: + description: IAMInstanceProfile is a name of an IAM instance profile to + assign to the instance + type: string + instanceType: + description: 'InstanceType is the type of instance to create. Example: m4.xlarge' + type: string + keyName: + description: KeyName is the name of the SSH key to install on the instance. + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + publicIP: + description: 'PublicIP specifies whether the instance should get a public + IP. Precedence for this setting is as follows: 1. This field if set 2. + Cluster/flavor setting 3. Subnet default' + type: boolean + subnet: + description: Subnet is a reference to the subnet to use for this instance. + If not specified, the cluster subnet will be used. + properties: + arn: + description: ARN of resource + type: string + filters: + description: 'Filters is a set of key/value pairs used to identify a + resource They are applied according to the rules defined by the AWS + API: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Filtering.html' + items: + properties: + name: + description: Name of the filter. Filter names are case-sensitive. + type: string + values: + description: Values includes one or more filter values. Filter + values are case-sensitive. + items: + type: string + type: array + required: + - name + - values + type: object + type: array + id: + description: ID of resource + type: string + type: object + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: awsmachineproviderstatuses.awsprovider.k8s.io +spec: + group: awsprovider.k8s.io + names: + kind: AWSMachineProviderStatus + plural: awsmachineproviderstatuses + scope: Namespaced + validation: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + conditions: + description: Conditions is a set of conditions associated with the Machine + to indicate errors or other status + items: + properties: + lastProbeTime: + description: LastProbeTime is the last time we probed the condition. + format: date-time + type: string + lastTransitionTime: + description: LastTransitionTime is the last time the condition transitioned + from one status to another. + format: date-time + type: string + message: + description: Message is a human-readable message indicating details + about last transition. + type: string + reason: + description: Reason is a unique, one-word, CamelCase reason for the + condition's last transition. + type: string + status: + description: Status is the status of the condition. + type: string + type: + description: Type is the type of the condition. + type: string + required: + - type + - status + - lastProbeTime + - lastTransitionTime + - reason + - message + type: object + type: array + instanceID: + description: InstanceID is the instance ID of the machine created in AWS + type: string + instanceState: + description: InstanceState is the state of the AWS instance for this machine + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + creationTimestamp: null + name: cluster-api-provider-aws-manager-role +rules: +- apiGroups: + - awsprovider.k8s.io + resources: + - awsclusterproviderconfigs + - awsclusterproviderstatuses + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - cluster.k8s.io + resources: + - clusters + - clusters/status + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - awsprovider.k8s.io + resources: + - awsmachineproviderconfigs + - awsmachineproviderstatuses + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - cluster.k8s.io + resources: + - machines + - machines/status + - machinedeployments + - machinedeployments/status + - machinesets + - machinesets/status + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - v1 + resources: + - nodes + - events + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + creationTimestamp: null + name: cluster-api-provider-aws-manager-rolebinding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: cluster-api-provider-aws-manager-role +subjects: +- kind: ServiceAccount + name: default + namespace: cluster-api-provider-aws-system +--- +apiVersion: v1 +kind: Service +metadata: + labels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + name: cluster-api-provider-aws-controller-manager-service + namespace: cluster-api-provider-aws-system +spec: + ports: + - port: 443 + selector: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" +--- +apiVersion: apps/v1 +kind: StatefulSet +metadata: + labels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + name: cluster-api-provider-aws-controller-manager + namespace: cluster-api-provider-aws-system +spec: + selector: + matchLabels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + serviceName: cluster-api-provider-aws-controller-manager-service + template: + metadata: + labels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + spec: + containers: + - args: + - -v=3 + - -logtostderr=true + - -stderrthreshold=INFO + env: + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + image: SET_BY_PATCH + imagePullPolicy: Always + name: manager + resources: + limits: + cpu: 100m + memory: 30Mi + requests: + cpu: 100m + memory: 20Mi + volumeMounts: + - mountPath: /etc/kubernetes + name: config + - mountPath: /etc/ssl/certs + name: certs + - mountPath: /root/.aws + name: credentials + terminationGracePeriodSeconds: 10 + tolerations: + - effect: NoSchedule + key: node-role.kubernetes.io/master + - key: CriticalAddonsOnly + operator: Exists + - effect: NoExecute + key: node.alpha.kubernetes.io/notReady + operator: Exists + - effect: NoExecute + key: node.alpha.kubernetes.io/unreachable + operator: Exists + volumes: + - hostPath: + path: /etc/kubernetes + name: config + - hostPath: + path: /etc/ssl/certs + name: certs + - name: credentials + secret: + secretName: manager-bootstrap-credentials +--- diff --git a/cmd/clusterctl/examples/aws/base/provider-components/aws-provider-version-patch.yaml b/cmd/clusterctl/examples/aws/base/provider-components/aws-provider-version-patch.yaml new file mode 100755 index 0000000000..c97df3f97e --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/provider-components/aws-provider-version-patch.yaml @@ -0,0 +1,13 @@ +--- +apiVersion: apps/v1 +kind: StatefulSet +metadata: + name: controller-manager + namespace: system +spec: + template: + spec: + containers: + - image: gcr.io/cluster-api-provider-aws/cluster-api-aws-controller:0.0.3 + name: manager +--- diff --git a/cmd/clusterctl/examples/aws/base/provider-components/cluster-api-provider-components.yaml b/cmd/clusterctl/examples/aws/base/provider-components/cluster-api-provider-components.yaml new file mode 100755 index 0000000000..d20e41cd92 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/provider-components/cluster-api-provider-components.yaml @@ -0,0 +1,1005 @@ +--- +apiVersion: v1 +kind: Namespace +metadata: + labels: + controller-tools.k8s.io: "1.0" + name: cluster-api-system +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: clusters.cluster.k8s.io +spec: + group: cluster.k8s.io + names: + kind: Cluster + plural: clusters + scope: Namespaced + subresources: + status: {} + validation: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + clusterNetwork: + description: Cluster network configuration + properties: + pods: + description: The network ranges from which Pod networks are allocated. + properties: + cidrBlocks: + items: + type: string + type: array + required: + - cidrBlocks + type: object + serviceDomain: + description: Domain name for services. + type: string + services: + description: The network ranges from which service VIPs are allocated. + properties: + cidrBlocks: + items: + type: string + type: array + required: + - cidrBlocks + type: object + required: + - services + - pods + - serviceDomain + type: object + providerSpec: + description: Provider-specific serialized configuration to use during + cluster creation. It is recommended that providers maintain their + own versioned API types that should be serialized/deserialized from + this field. + properties: + value: + description: Value is an inlined, serialized representation of the + resource configuration. It is recommended that providers maintain + their own versioned API types that should be serialized/deserialized + from this field, akin to component config. + type: object + valueFrom: + description: Source for the provider configuration. Cannot be used + if value is not empty. + properties: + machineClass: + description: The machine class from which the provider config + should be sourced. + properties: + provider: + description: Provider is the name of the cloud-provider + which MachineClass is intended for. + type: string + type: object + type: object + type: object + required: + - clusterNetwork + type: object + status: + properties: + apiEndpoints: + description: APIEndpoint represents the endpoint to communicate with + the IP. + items: + properties: + host: + description: The hostname on which the API server is serving. + type: string + port: + description: The port on which the API server is serving. + format: int64 + type: integer + required: + - host + - port + type: object + type: array + errorMessage: + description: If set, indicates that there is a problem reconciling the + state, and will be set to a descriptive error message. + type: string + errorReason: + description: If set, indicates that there is a problem reconciling the + state, and will be set to a token value suitable for programmatic + interpretation. + type: string + providerStatus: + description: Provider-specific status. It is recommended that providers + maintain their own versioned API types that should be serialized/deserialized + from this field. + type: object + type: object + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: machineclasses.cluster.k8s.io +spec: + group: cluster.k8s.io + names: + kind: MachineClass + plural: machineclasses + scope: Namespaced + validation: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + providerSpec: + description: Provider-specific configuration to use during node creation. + type: object + required: + - providerSpec + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: machinedeployments.cluster.k8s.io +spec: + group: cluster.k8s.io + names: + kind: MachineDeployment + plural: machinedeployments + scope: Namespaced + subresources: + scale: + labelSelectorPath: .status.labelSelector + specReplicasPath: .spec.replicas + statusReplicasPath: .status.replicas + status: {} + validation: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + minReadySeconds: + description: Minimum number of seconds for which a newly created machine + should be ready. Defaults to 0 (machine will be considered available + as soon as it is ready) + format: int32 + type: integer + paused: + description: Indicates that the deployment is paused. + type: boolean + progressDeadlineSeconds: + description: The maximum time in seconds for a deployment to make progress + before it is considered to be failed. The deployment controller will + continue to process failed deployments and a condition with a ProgressDeadlineExceeded + reason will be surfaced in the deployment status. Note that progress + will not be estimated during the time a deployment is paused. Defaults + to 600s. + format: int32 + type: integer + replicas: + description: Number of desired machines. Defaults to 1. This is a pointer + to distinguish between explicit zero and not specified. + format: int32 + type: integer + revisionHistoryLimit: + description: The number of old MachineSets to retain to allow rollback. + This is a pointer to distinguish between explicit zero and not specified. + Defaults to 1. + format: int32 + type: integer + selector: + description: Label selector for machines. Existing MachineSets whose + machines are selected by this will be the ones affected by this deployment. + It must match the machine template's labels. + type: object + strategy: + description: The deployment strategy to use to replace existing machines + with new ones. + properties: + rollingUpdate: + description: Rolling update config params. Present only if MachineDeploymentStrategyType + = RollingUpdate. + properties: + maxSurge: + description: 'The maximum number of machines that can be scheduled + above the desired number of machines. Value can be an absolute + number (ex: 5) or a percentage of desired machines (ex: 10%). + This can not be 0 if MaxUnavailable is 0. Absolute number + is calculated from percentage by rounding up. Defaults to + 1. Example: when this is set to 30%, the new MachineSet can + be scaled up immediately when the rolling update starts, such + that the total number of old and new machines do not exceed + 130% of desired machines. Once old machines have been killed, + new MachineSet can be scaled up further, ensuring that total + number of machines running at any time during the update is + at most 130% of desired machines.' + oneOf: + - type: string + - type: integer + maxUnavailable: + description: 'The maximum number of machines that can be unavailable + during the update. Value can be an absolute number (ex: 5) + or a percentage of desired machines (ex: 10%). Absolute number + is calculated from percentage by rounding down. This can not + be 0 if MaxSurge is 0. Defaults to 0. Example: when this is + set to 30%, the old MachineSet can be scaled down to 70% of + desired machines immediately when the rolling update starts. + Once new machines are ready, old MachineSet can be scaled + down further, followed by scaling up the new MachineSet, ensuring + that the total number of machines available at all times during + the update is at least 70% of desired machines.' + oneOf: + - type: string + - type: integer + type: object + type: + description: Type of deployment. Currently the only supported strategy + is "RollingUpdate". Default is RollingUpdate. + type: string + type: object + template: + description: Template describes the machines that will be created. + properties: + metadata: + description: 'Standard object''s metadata. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata' + type: object + spec: + description: 'Specification of the desired behavior of the machine. + More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#spec-and-status' + properties: + configSource: + description: ConfigSource is used to populate in the associated + Node for dynamic kubelet config. This field already exists + in Node, so any updates to it in the Machine spec will be + automatically copied to the linked NodeRef from the status. + The rest of dynamic kubelet config support should then work + as-is. + type: object + metadata: + description: ObjectMeta will autopopulate the Node created. + Use this to indicate what labels, annotations, name prefix, + etc., should be used when creating the Node. + type: object + providerSpec: + description: ProviderSpec details Provider-specific configuration + to use during node creation. + properties: + value: + description: Value is an inlined, serialized representation + of the resource configuration. It is recommended that + providers maintain their own versioned API types that + should be serialized/deserialized from this field, akin + to component config. + type: object + valueFrom: + description: Source for the provider configuration. Cannot + be used if value is not empty. + properties: + machineClass: + description: The machine class from which the provider + config should be sourced. + properties: + provider: + description: Provider is the name of the cloud-provider + which MachineClass is intended for. + type: string + type: object + type: object + type: object + taints: + description: Taints is the full, authoritative list of taints + to apply to the corresponding Node. This list will overwrite + any modifications made to the Node on an ongoing basis. + items: + type: object + type: array + versions: + description: Versions of key software to use. This field is + optional at cluster creation time, and omitting the field + indicates that the cluster installation tool should select + defaults for the user. These defaults may differ based on + the cluster installer, but the tool should populate the values + it uses when persisting Machine objects. A Machine spec missing + this field at runtime is invalid. + properties: + controlPlane: + description: ControlPlane is the semantic version of the + Kubernetes control plane to run. This should only be populated + when the machine is a control plane. + type: string + kubelet: + description: Kubelet is the semantic version of kubelet + to run + type: string + required: + - kubelet + type: object + required: + - providerSpec + type: object + type: object + required: + - selector + - template + type: object + status: + properties: + availableReplicas: + description: Total number of available machines (ready for at least + minReadySeconds) targeted by this deployment. + format: int32 + type: integer + observedGeneration: + description: The generation observed by the deployment controller. + format: int64 + type: integer + readyReplicas: + description: Total number of ready machines targeted by this deployment. + format: int32 + type: integer + replicas: + description: Total number of non-terminated machines targeted by this + deployment (their labels match the selector). + format: int32 + type: integer + unavailableReplicas: + description: Total number of unavailable machines targeted by this deployment. + This is the total number of machines that are still required for the + deployment to have 100% available capacity. They may either be machines + that are running but not yet available or machines that still have + not been created. + format: int32 + type: integer + updatedReplicas: + description: Total number of non-terminated machines targeted by this + deployment that have the desired template spec. + format: int32 + type: integer + type: object + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: machines.cluster.k8s.io +spec: + group: cluster.k8s.io + names: + kind: Machine + plural: machines + scope: Namespaced + subresources: + status: {} + validation: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + configSource: + description: ConfigSource is used to populate in the associated Node + for dynamic kubelet config. This field already exists in Node, so + any updates to it in the Machine spec will be automatically copied + to the linked NodeRef from the status. The rest of dynamic kubelet + config support should then work as-is. + type: object + metadata: + description: ObjectMeta will autopopulate the Node created. Use this + to indicate what labels, annotations, name prefix, etc., should be + used when creating the Node. + type: object + providerSpec: + description: ProviderSpec details Provider-specific configuration to + use during node creation. + properties: + value: + description: Value is an inlined, serialized representation of the + resource configuration. It is recommended that providers maintain + their own versioned API types that should be serialized/deserialized + from this field, akin to component config. + type: object + valueFrom: + description: Source for the provider configuration. Cannot be used + if value is not empty. + properties: + machineClass: + description: The machine class from which the provider config + should be sourced. + properties: + provider: + description: Provider is the name of the cloud-provider + which MachineClass is intended for. + type: string + type: object + type: object + type: object + taints: + description: Taints is the full, authoritative list of taints to apply + to the corresponding Node. This list will overwrite any modifications + made to the Node on an ongoing basis. + items: + type: object + type: array + versions: + description: Versions of key software to use. This field is optional + at cluster creation time, and omitting the field indicates that the + cluster installation tool should select defaults for the user. These + defaults may differ based on the cluster installer, but the tool should + populate the values it uses when persisting Machine objects. A Machine + spec missing this field at runtime is invalid. + properties: + controlPlane: + description: ControlPlane is the semantic version of the Kubernetes + control plane to run. This should only be populated when the machine + is a control plane. + type: string + kubelet: + description: Kubelet is the semantic version of kubelet to run + type: string + required: + - kubelet + type: object + required: + - providerSpec + type: object + status: + properties: + addresses: + description: Addresses is a list of addresses assigned to the machine. + Queried from cloud provider, if available. + items: + type: object + type: array + conditions: + description: 'Conditions lists the conditions synced from the node conditions + of the corresponding node-object. Machine-controller is responsible + for keeping conditions up-to-date. MachineSet controller will be taking + these conditions as a signal to decide if machine is healthy or needs + to be replaced. Refer: https://kubernetes.io/docs/concepts/architecture/nodes/#condition' + items: + type: object + type: array + errorMessage: + description: ErrorMessage will be set in the event that there is a terminal + problem reconciling the Machine and will contain a more verbose string + suitable for logging and human consumption. This field should not + be set for transitive errors that a controller faces that are expected + to be fixed automatically over time (like service outages), but instead + indicate that something is fundamentally wrong with the Machine's + spec or the configuration of the controller, and that manual intervention + is required. Examples of terminal errors would be invalid combinations + of settings in the spec, values that are unsupported by the controller, + or the responsible controller itself being critically misconfigured. Any + transient errors that occur during the reconciliation of Machines + can be added as events to the Machine object and/or logged in the + controller's output. + type: string + errorReason: + description: ErrorReason will be set in the event that there is a terminal + problem reconciling the Machine and will contain a succinct value + suitable for machine interpretation. This field should not be set + for transitive errors that a controller faces that are expected to + be fixed automatically over time (like service outages), but instead + indicate that something is fundamentally wrong with the Machine's + spec or the configuration of the controller, and that manual intervention + is required. Examples of terminal errors would be invalid combinations + of settings in the spec, values that are unsupported by the controller, + or the responsible controller itself being critically misconfigured. Any + transient errors that occur during the reconciliation of Machines + can be added as events to the Machine object and/or logged in the + controller's output. + type: string + lastOperation: + description: LastOperation describes the last-operation performed by + the machine-controller. This API should be useful as a history in + terms of the latest operation performed on the specific machine. It + should also convey the state of the latest-operation for example if + it is still on-going, failed or completed successfully. + properties: + description: + description: Description is the human-readable description of the + last operation. + type: string + lastUpdated: + description: LastUpdated is the timestamp at which LastOperation + API was last-updated. + format: date-time + type: string + state: + description: State is the current status of the last performed operation. + E.g. Processing, Failed, Successful etc + type: string + type: + description: Type is the type of operation which was last performed. + E.g. Create, Delete, Update etc + type: string + type: object + lastUpdated: + description: LastUpdated identifies when this status was last observed. + format: date-time + type: string + nodeRef: + description: NodeRef will point to the corresponding Node if it exists. + type: object + phase: + description: Phase represents the current phase of machine actuation. + E.g. Pending, Running, Terminating, Failed etc. + type: string + providerStatus: + description: ProviderStatus details a Provider-specific status. It is + recommended that providers maintain their own versioned API types + that should be serialized/deserialized from this field. + type: object + versions: + description: 'Versions specifies the current versions of software on + the corresponding Node (if it exists). This is provided for a few + reasons: 1) It is more convenient than checking the NodeRef, traversing + it to the Node, and finding the appropriate field in Node.Status.NodeInfo (which + uses different field names and formatting). 2) It removes some of + the dependency on the structure of the Node, so that if the structure + of Node.Status.NodeInfo changes, only machine controllers need + to be updated, rather than every client of the Machines API. 3) + There is no other simple way to check the control plane version. + A client would have to connect directly to the apiserver running + on the target node in order to find out its version.' + properties: + controlPlane: + description: ControlPlane is the semantic version of the Kubernetes + control plane to run. This should only be populated when the machine + is a control plane. + type: string + kubelet: + description: Kubelet is the semantic version of kubelet to run + type: string + required: + - kubelet + type: object + type: object + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition +metadata: + creationTimestamp: null + labels: + controller-tools.k8s.io: "1.0" + name: machinesets.cluster.k8s.io +spec: + group: cluster.k8s.io + names: + kind: MachineSet + plural: machinesets + scope: Namespaced + subresources: + scale: + labelSelectorPath: .status.labelSelector + specReplicasPath: .spec.replicas + statusReplicasPath: .status.replicas + status: {} + validation: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + minReadySeconds: + description: MinReadySeconds is the minimum number of seconds for which + a newly created machine should be ready. Defaults to 0 (machine will + be considered available as soon as it is ready) + format: int32 + type: integer + replicas: + description: Replicas is the number of desired replicas. This is a pointer + to distinguish between explicit zero and unspecified. Defaults to + 1. + format: int32 + type: integer + selector: + description: 'Selector is a label query over machines that should match + the replica count. Label keys and values that must match in order + to be controlled by this MachineSet. It must match the machine template''s + labels. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors' + type: object + template: + description: Template is the object that describes the machine that + will be created if insufficient replicas are detected. + properties: + metadata: + description: 'Standard object''s metadata. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata' + type: object + spec: + description: 'Specification of the desired behavior of the machine. + More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#spec-and-status' + properties: + configSource: + description: ConfigSource is used to populate in the associated + Node for dynamic kubelet config. This field already exists + in Node, so any updates to it in the Machine spec will be + automatically copied to the linked NodeRef from the status. + The rest of dynamic kubelet config support should then work + as-is. + type: object + metadata: + description: ObjectMeta will autopopulate the Node created. + Use this to indicate what labels, annotations, name prefix, + etc., should be used when creating the Node. + type: object + providerSpec: + description: ProviderSpec details Provider-specific configuration + to use during node creation. + properties: + value: + description: Value is an inlined, serialized representation + of the resource configuration. It is recommended that + providers maintain their own versioned API types that + should be serialized/deserialized from this field, akin + to component config. + type: object + valueFrom: + description: Source for the provider configuration. Cannot + be used if value is not empty. + properties: + machineClass: + description: The machine class from which the provider + config should be sourced. + properties: + provider: + description: Provider is the name of the cloud-provider + which MachineClass is intended for. + type: string + type: object + type: object + type: object + taints: + description: Taints is the full, authoritative list of taints + to apply to the corresponding Node. This list will overwrite + any modifications made to the Node on an ongoing basis. + items: + type: object + type: array + versions: + description: Versions of key software to use. This field is + optional at cluster creation time, and omitting the field + indicates that the cluster installation tool should select + defaults for the user. These defaults may differ based on + the cluster installer, but the tool should populate the values + it uses when persisting Machine objects. A Machine spec missing + this field at runtime is invalid. + properties: + controlPlane: + description: ControlPlane is the semantic version of the + Kubernetes control plane to run. This should only be populated + when the machine is a control plane. + type: string + kubelet: + description: Kubelet is the semantic version of kubelet + to run + type: string + required: + - kubelet + type: object + required: + - providerSpec + type: object + type: object + required: + - selector + type: object + status: + properties: + availableReplicas: + description: The number of available replicas (ready for at least minReadySeconds) + for this MachineSet. + format: int32 + type: integer + errorMessage: + type: string + errorReason: + description: In the event that there is a terminal problem reconciling + the replicas, both ErrorReason and ErrorMessage will be set. ErrorReason + will be populated with a succinct value suitable for machine interpretation, + while ErrorMessage will contain a more verbose string suitable for + logging and human consumption. These fields should not be set for + transitive errors that a controller faces that are expected to be + fixed automatically over time (like service outages), but instead + indicate that something is fundamentally wrong with the MachineTemplate's + spec or the configuration of the machine controller, and that manual + intervention is required. Examples of terminal errors would be invalid + combinations of settings in the spec, values that are unsupported + by the machine controller, or the responsible machine controller itself + being critically misconfigured. Any transient errors that occur during + the reconciliation of Machines can be added as events to the MachineSet + object and/or logged in the controller's output. + type: string + fullyLabeledReplicas: + description: The number of replicas that have labels matching the labels + of the machine template of the MachineSet. + format: int32 + type: integer + observedGeneration: + description: ObservedGeneration reflects the generation of the most + recently observed MachineSet. + format: int64 + type: integer + readyReplicas: + description: The number of ready replicas for this MachineSet. A machine + is considered ready when the node has been created and is "Ready". + format: int32 + type: integer + replicas: + description: Replicas is the most recently observed number of replicas. + format: int32 + type: integer + required: + - replicas + type: object + version: v1alpha1 +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + creationTimestamp: null + name: cluster-api-manager-role +rules: +- apiGroups: + - cluster.k8s.io + resources: + - clusters + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - cluster.k8s.io + resources: + - machines + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - cluster.k8s.io + resources: + - machinedeployments + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - cluster.k8s.io + resources: + - machinesets + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - cluster.k8s.io + resources: + - machines + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - "" + resources: + - nodes + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - cluster.k8s.io + resources: + - machines + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + creationTimestamp: null + name: cluster-api-manager-rolebinding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: cluster-api-manager-role +subjects: +- kind: ServiceAccount + name: default + namespace: cluster-api-system +--- +apiVersion: v1 +kind: Service +metadata: + labels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + name: cluster-api-controller-manager-service + namespace: cluster-api-system +spec: + ports: + - port: 443 + selector: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" +--- +apiVersion: apps/v1 +kind: StatefulSet +metadata: + labels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + name: cluster-api-controller-manager + namespace: cluster-api-system +spec: + selector: + matchLabels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + serviceName: cluster-api-controller-manager-service + template: + metadata: + labels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + spec: + containers: + - command: + - /manager + image: gcr.io/k8s-cluster-api/cluster-api-controller:latest + name: manager + resources: + limits: + cpu: 100m + memory: 30Mi + requests: + cpu: 100m + memory: 20Mi + terminationGracePeriodSeconds: 10 + tolerations: + - effect: NoSchedule + key: node-role.kubernetes.io/master + - key: CriticalAddonsOnly + operator: Exists + - effect: NoExecute + key: node.alpha.kubernetes.io/notReady + operator: Exists + - effect: NoExecute + key: node.alpha.kubernetes.io/unreachable + operator: Exists +--- diff --git a/cmd/clusterctl/examples/aws/base/provider-components/kustomization.yaml b/cmd/clusterctl/examples/aws/base/provider-components/kustomization.yaml new file mode 100644 index 0000000000..bf4b1627e2 --- /dev/null +++ b/cmd/clusterctl/examples/aws/base/provider-components/kustomization.yaml @@ -0,0 +1,24 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +resources: + - aws-provider-components.yaml + - cluster-api-provider-components.yaml + +secretGenerator: + - name: manager-bootstrap-credentials + commands: + config: "clusterawsadm alpha bootstrap generate-aws-default-profile" + type: "Opaque" diff --git a/cmd/clusterctl/examples/aws/bootstrap-cloudformation.yaml b/cmd/clusterctl/examples/aws/bootstrap-cloudformation.yaml deleted file mode 100644 index 4de2d84ceb..0000000000 --- a/cmd/clusterctl/examples/aws/bootstrap-cloudformation.yaml +++ /dev/null @@ -1,252 +0,0 @@ -AWSTemplateFormatVersion: "2010-09-09" -Resources: - AWSIAMGroupBootstrapper: - Properties: - GroupName: bootstrapper.cluster-api-provider-aws.sigs.k8s.io - Type: AWS::IAM::Group - AWSIAMInstanceProfileClusterController: - Properties: - InstanceProfileName: cluster-controller.cluster-api-provider-aws.sigs.k8s.io - Roles: - - Ref: AWSIAMRoleClusterController - Type: AWS::IAM::InstanceProfile - AWSIAMInstanceProfileControlPlane: - Properties: - InstanceProfileName: control-plane.cluster-api-provider-aws.sigs.k8s.io - Roles: - - Ref: AWSIAMRoleControlPlane - Type: AWS::IAM::InstanceProfile - AWSIAMInstanceProfileMachineController: - Properties: - InstanceProfileName: machine-controller.cluster-api-provider-aws.sigs.k8s.io - Roles: - - Ref: AWSIAMRoleMachineController - Type: AWS::IAM::InstanceProfile - AWSIAMInstanceProfileNodes: - Properties: - InstanceProfileName: nodes.cluster-api-provider-aws.sigs.k8s.io - Roles: - - Ref: AWSIAMRoleNodes - Type: AWS::IAM::InstanceProfile - AWSIAMManagedPolicyCloudProviderControlPlane: - Properties: - Description: For the Kubernetes Cloud Provider AWS Control Plane - ManagedPolicyName: control-plane-cloud-provider-aws.k8s.io - PolicyDocument: - Statement: - - Action: - - autoscaling:DescribeAutoScalingGroups - - autoscaling:DescribeLaunchConfigurations - - autoscaling:DescribeTags - - ec2:DescribeInstances - - ec2:DescribeRegions - - ec2:DescribeRouteTables - - ec2:DescribeSecurityGroups - - ec2:DescribeSubnets - - ec2:DescribeVolumes - - ec2:CreateSecurityGroup - - ec2:CreateTags - - ec2:CreateVolume - - ec2:ModifyInstanceAttribute - - ec2:ModifyVolume - - ec2:AttachVolume - - ec2:AuthorizeSecurityGroupIngress - - ec2:CreateRoute - - ec2:DeleteRoute - - ec2:DeleteSecurityGroup - - ec2:DeleteVolume - - ec2:DetachVolume - - ec2:RevokeSecurityGroupIngress - - ec2:DescribeVpcs - - elasticloadbalancing:AddTags - - elasticloadbalancing:AttachLoadBalancerToSubnets - - elasticloadbalancing:ApplySecurityGroupsToLoadBalancer - - elasticloadbalancing:CreateLoadBalancer - - elasticloadbalancing:CreateLoadBalancerPolicy - - elasticloadbalancing:CreateLoadBalancerListeners - - elasticloadbalancing:ConfigureHealthCheck - - elasticloadbalancing:DeleteLoadBalancer - - elasticloadbalancing:DeleteLoadBalancerListeners - - elasticloadbalancing:DescribeLoadBalancers - - elasticloadbalancing:DescribeLoadBalancerAttributes - - elasticloadbalancing:DetachLoadBalancerFromSubnets - - elasticloadbalancing:DeregisterInstancesFromLoadBalancer - - elasticloadbalancing:ModifyLoadBalancerAttributes - - elasticloadbalancing:RegisterInstancesWithLoadBalancer - - elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer - - elasticloadbalancing:AddTags - - elasticloadbalancing:CreateListener - - elasticloadbalancing:CreateTargetGroup - - elasticloadbalancing:DeleteListener - - elasticloadbalancing:DeleteTargetGroup - - elasticloadbalancing:DescribeListeners - - elasticloadbalancing:DescribeLoadBalancerPolicies - - elasticloadbalancing:DescribeTargetGroups - - elasticloadbalancing:DescribeTargetHealth - - elasticloadbalancing:ModifyListener - - elasticloadbalancing:ModifyTargetGroup - - elasticloadbalancing:RegisterTargets - - elasticloadbalancing:SetLoadBalancerPoliciesOfListener - - iam:CreateServiceLinkedRole - - kms:DescribeKey - Effect: Allow - Resource: - - '*' - Version: "2012-10-17" - Roles: - - Ref: AWSIAMRoleControlPlane - Type: AWS::IAM::ManagedPolicy - AWSIAMManagedPolicyCloudProviderNodes: - Properties: - Description: For the Kubernetes Cloud Provider AWS nodes - ManagedPolicyName: nodes.cloud-provider-aws.k8s.io - PolicyDocument: - Statement: - - Action: - - ec2:DescribeInstances - - ec2:DescribeRegions - - ecr:GetAuthorizationToken - - ecr:BatchCheckLayerAvailability - - ecr:GetDownloadUrlForLayer - - ecr:GetRepositoryPolicy - - ecr:DescribeRepositories - - ecr:ListImages - - ecr:BatchGetImage - Effect: Allow - Resource: - - '*' - Version: "2012-10-17" - Roles: - - Ref: AWSIAMRoleControlPlane - - Ref: AWSIAMRoleNodes - Type: AWS::IAM::ManagedPolicy - AWSIAMManagedPolicyClusterController: - Properties: - Description: For the Kubernetes Cluster API Provider AWS Cluster Controller - Groups: - - Ref: AWSIAMGroupBootstrapper - ManagedPolicyName: cluster-controller.cluster-api-provider-aws.sigs.k8s.io - PolicyDocument: - Statement: - - Action: - - ec2:AllocateAddress - - ec2:AssociateRouteTable - - ec2:AttachInternetGateway - - ec2:AuthorizeSecurityGroupIngress - - ec2:CreateInternetGateway - - ec2:CreateNatGateway - - ec2:CreateRoute - - ec2:CreateRouteTable - - ec2:CreateSecurityGroup - - ec2:CreateSubnet - - ec2:CreateTags - - ec2:CreateVpc - - ec2:DeleteInternetGateway - - ec2:DeleteNatGateway - - ec2:DeleteRouteTable - - ec2:DeleteSecurityGroup - - ec2:DeleteSubnet - - ec2:DeleteVpc - - ec2:DescribeAddresses - - ec2:DescribeAvailabilityZones - - ec2:DescribeInternetGateways - - ec2:DescribeNatGateways - - ec2:DescribeRouteTables - - ec2:DescribeSecurityGroups - - ec2:DescribeSubnets - - ec2:DescribeVpcs - - ec2:DetachInternetGateway - - ec2:DisassociateRouteTable - - ec2:ModifySubnetAttribute - - ec2:ReleaseAddress - - ec2:RevokeSecurityGroupIngress - - elasticloadbalancing:CreateLoadBalancer - - elasticloadbalancing:ConfigureHealthCheck - - elasticloadbalancing:DescribeLoadBalancers - Effect: Allow - Resource: - - '*' - Version: "2012-10-17" - Roles: - - Ref: AWSIAMRoleClusterController - - Ref: AWSIAMRoleControlPlane - Type: AWS::IAM::ManagedPolicy - AWSIAMManagedPolicyMachineController: - Properties: - Description: For the Kubernetes Cluster API Provider AWS Machine Controller - Groups: - - Ref: AWSIAMGroupBootstrapper - ManagedPolicyName: machine-controller.cluster-api-provider-aws.sigs.k8s.io - PolicyDocument: - Statement: - - Action: - - ec2:CreateTags - - ec2:DescribeInstances - - ec2:RunInstances - - ec2:TerminateInstances - Effect: Allow - Resource: - - '*' - Version: "2012-10-17" - Roles: - - Ref: AWSIAMRoleMachineController - - Ref: AWSIAMRoleControlPlane - Type: AWS::IAM::ManagedPolicy - AWSIAMRoleClusterController: - Properties: - AssumeRolePolicyDocument: - Statement: - - Action: - - sts:AssumeRole - Effect: Allow - Principal: - Service: - - ec2.amazonaws.com - Version: "2012-10-17" - RoleName: cluster-controller.cluster-api-provider-aws.sigs.k8s.io - Type: AWS::IAM::Role - AWSIAMRoleControlPlane: - Properties: - AssumeRolePolicyDocument: - Statement: - - Action: - - sts:AssumeRole - Effect: Allow - Principal: - Service: - - ec2.amazonaws.com - Version: "2012-10-17" - RoleName: control-plane.cluster-api-provider-aws.sigs.k8s.io - Type: AWS::IAM::Role - AWSIAMRoleMachineController: - Properties: - AssumeRolePolicyDocument: - Statement: - - Action: - - sts:AssumeRole - Effect: Allow - Principal: - Service: - - ec2.amazonaws.com - Version: "2012-10-17" - RoleName: machine-controller.cluster-api-provider-aws.sigs.k8s.io - Type: AWS::IAM::Role - AWSIAMRoleNodes: - Properties: - AssumeRolePolicyDocument: - Statement: - - Action: - - sts:AssumeRole - Effect: Allow - Principal: - Service: - - ec2.amazonaws.com - Version: "2012-10-17" - RoleName: nodes.cluster-api-provider-aws.sigs.k8s.io - Type: AWS::IAM::Role - AWSIAMUserBootstrapper: - Properties: - Groups: - - Ref: AWSIAMGroupBootstrapper - UserName: bootstrapper.cluster-api-provider-aws.sigs.k8s.io - Type: AWS::IAM::User diff --git a/cmd/clusterctl/examples/aws/cluster.yaml.template b/cmd/clusterctl/examples/aws/cluster.yaml.template deleted file mode 100644 index 6b124eb03c..0000000000 --- a/cmd/clusterctl/examples/aws/cluster.yaml.template +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: "cluster.k8s.io/v1alpha1" -kind: Cluster -metadata: - name: ${CLUSTER_NAME} -spec: - clusterNetwork: - services: - cidrBlocks: ["10.96.0.0/12"] - pods: - cidrBlocks: ["192.168.0.0/16"] - serviceDomain: "cluster.local" - providerSpec: - value: - apiVersion: "awsprovider/v1alpha1" - kind: "AWSClusterProviderSpec" - region: "${AWS_REGION}" - sshKeyName: "${SSH_KEY_NAME}" diff --git a/cmd/clusterctl/examples/aws/generate-yaml.sh b/cmd/clusterctl/examples/aws/generate-yaml.sh deleted file mode 100755 index 8e9fedaf81..0000000000 --- a/cmd/clusterctl/examples/aws/generate-yaml.sh +++ /dev/null @@ -1,97 +0,0 @@ -#!/bin/bash -# Copyright 2018 The Kubernetes Authors. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -set -o errexit -set -o nounset - -# Directories. -DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null && pwd )" -OUTPUT_DIR=${OUTPUT_DIR:-${DIR}/out} -ENVSUBST=${ENVSUBST:-envsubst} - -# Cluster name. -export CLUSTER_NAME="test1" - -# Manager image. -export MANAGER_IMAGE="${MANAGER_IMAGE:-gcr.io/cluster-api-provider-aws/cluster-api-aws-controller:0.0.3}" -export MANAGER_IMAGE_PULL_POLICY=${MANAGER_IMAGE_PULL_POLICY:-IfNotPresent} - -# Machine settings. -export CONTROL_PLANE_MACHINE_TYPE="${CONTROL_PLANE_MACHINE_TYPE:-t2.medium}" -export NODE_MACHINE_TYPE="${CONTROL_PLANE_MACHINE_TYPE:-t2.medium}" -export SSH_KEY_NAME="${SSH_KEY_NAME:-default}" - -# Templates. -CLUSTER_TEMPLATE_FILE=${DIR}/cluster.yaml.template -CLUSTER_GENERATED_FILE=${OUTPUT_DIR}/cluster.yaml -MACHINES_TEMPLATE_FILE=${DIR}/machines.yaml.template -MACHINES_GENERATED_FILE=${OUTPUT_DIR}/machines.yaml -MANAGER_PATCH_TEMPLATE_FILE=${DIR}/aws_manager_image_patch.yaml.template -MANAGER_PATCH_GENERATED_FILE=${OUTPUT_DIR}/aws_manager_image_patch.yaml -ADDONS_FILE=${OUTPUT_DIR}/addons.yaml - -# Overwrite flag. -OVERWRITE=0 - -SCRIPT=$(basename $0) -while test $# -gt 0; do - case "$1" in - -h|--help) - echo "$SCRIPT - generates input yaml files for Cluster API on aws" - echo " " - echo "$SCRIPT [options]" - echo " " - echo "options:" - echo "-h, --help show brief help" - echo "-f, --force-overwrite if file to be generated already exists, force script to overwrite it" - exit 0 - ;; - -f) - OVERWRITE=1 - shift - ;; - --force-overwrite) - OVERWRITE=1 - shift - ;; - *) - break - ;; - esac -done - -if [ $OVERWRITE -ne 1 ] && [ -f $MACHINES_GENERATED_FILE ]; then - echo File $MACHINES_GENERATED_FILE already exists. Delete it manually before running this script. - exit 1 -fi - -if [ $OVERWRITE -ne 1 ] && [ -f $CLUSTER_GENERATED_FILE ]; then - echo File $CLUSTER_GENERATED_FILE already exists. Delete it manually before running this script. - exit 1 -fi - -mkdir -p ${OUTPUT_DIR} - -$ENVSUBST < $CLUSTER_TEMPLATE_FILE > "${CLUSTER_GENERATED_FILE}" -echo "Done generating ${CLUSTER_GENERATED_FILE}" - -$ENVSUBST < $MACHINES_TEMPLATE_FILE > "${MACHINES_GENERATED_FILE}" -echo "Done generating ${MACHINES_GENERATED_FILE}" - -$ENVSUBST < $MANAGER_PATCH_TEMPLATE_FILE > "${MANAGER_PATCH_GENERATED_FILE}" -echo "Done generating ${MANAGER_PATCH_GENERATED_FILE}" - -cp ${DIR}/addons.yaml ${ADDONS_FILE} -echo "Done copying ${ADDONS_FILE}" diff --git a/cmd/clusterctl/examples/aws/kustomize-config.yaml b/cmd/clusterctl/examples/aws/kustomize-config.yaml new file mode 100644 index 0000000000..d7d0b66930 --- /dev/null +++ b/cmd/clusterctl/examples/aws/kustomize-config.yaml @@ -0,0 +1,581 @@ +commonAnnotations: +- path: metadata/annotations + create: true + +- path: spec/template/metadata/annotations + create: true + version: v1 + kind: ReplicationController + +- path: spec/template/metadata/annotations + create: true + kind: Deployment + +- path: spec/template/metadata/annotations + create: true + kind: ReplicaSet + +- path: spec/template/metadata/annotations + create: true + kind: DaemonSet + +- path: spec/template/metadata/annotations + create: true + kind: StatefulSet + +- path: spec/template/metadata/annotations + create: true + group: batch + kind: Job + +- path: spec/jobTemplate/metadata/annotations + create: true + group: batch + kind: CronJob + +- path: spec/jobTemplate/spec/template/metadata/annotations + create: true + group: batch + kind: CronJob + + +commonLabels: +- path: metadata/labels + create: true + +- path: spec/selector + create: true + version: v1 + kind: Service + +- path: spec/selector + create: true + version: v1 + kind: ReplicationController + +- path: spec/template/metadata/labels + create: true + version: v1 + kind: ReplicationController + +- path: spec/selector/matchLabels + create: true + kind: Deployment + +- path: spec/template/metadata/labels + create: true + kind: Deployment + +- path: spec/template/spec/affinity/podAffinity/preferredDuringSchedulingIgnoredDuringExecution/podAffinityTerm/labelSelector/matchLabels + create: false + group: apps + kind: Deployment + +- path: spec/template/spec/affinity/podAffinity/requiredDuringSchedulingIgnoredDuringExecution/labelSelector/matchLabels + create: false + group: apps + kind: Deployment + +- path: spec/template/spec/affinity/podAntiAffinity/preferredDuringSchedulingIgnoredDuringExecution/podAffinityTerm/labelSelector/matchLabels + create: false + group: apps + kind: Deployment + +- path: spec/template/spec/affinity/podAntiAffinity/requiredDuringSchedulingIgnoredDuringExecution/labelSelector/matchLabels + create: false + group: apps + kind: Deployment + +- path: spec/selector/matchLabels + create: true + kind: ReplicaSet + +- path: spec/template/metadata/labels + create: true + kind: ReplicaSet + +- path: spec/selector/matchLabels + create: true + kind: DaemonSet + +- path: spec/template/metadata/labels + create: true + kind: DaemonSet + +- path: spec/selector/matchLabels + create: true + group: apps + kind: StatefulSet + +- path: spec/template/metadata/labels + create: true + group: apps + kind: StatefulSet + +- path: spec/template/spec/affinity/podAffinity/preferredDuringSchedulingIgnoredDuringExecution/podAffinityTerm/labelSelector/matchLabels + create: false + group: apps + kind: StatefulSet + +- path: spec/template/spec/affinity/podAffinity/requiredDuringSchedulingIgnoredDuringExecution/labelSelector/matchLabels + create: false + group: apps + kind: StatefulSet + +- path: spec/template/spec/affinity/podAntiAffinity/preferredDuringSchedulingIgnoredDuringExecution/podAffinityTerm/labelSelector/matchLabels + create: false + group: apps + kind: StatefulSet + +- path: spec/template/spec/affinity/podAntiAffinity/requiredDuringSchedulingIgnoredDuringExecution/labelSelector/matchLabels + create: false + group: apps + kind: StatefulSet + +- path: spec/volumeClaimTemplates/metadata/labels + create: true + group: apps + kind: StatefulSet + +- path: spec/selector/matchLabels + create: false + group: batch + kind: Job + +- path: spec/template/metadata/labels + create: true + group: batch + kind: Job + +- path: spec/jobTemplate/spec/selector/matchLabels + create: false + group: batch + kind: CronJob + +- path: spec/jobTemplate/spec/template/metadata/labels + create: true + group: batch + kind: CronJob + +- path: spec/selector/matchLabels + create: false + group: policy + kind: PodDisruptionBudget + +- path: spec/podSelector/matchLabels + create: false + group: networking.k8s.io + kind: NetworkPolicy + +- path: spec/ingress/from/podSelector/matchLabels + create: false + group: networking.k8s.io + kind: NetworkPolicy + +- path: spec/egress/to/podSelector/matchLabels + create: false + group: networking.k8s.io + kind: NetworkPolicy + +namePrefix: +- path: metadata/name + +nameReference: +- kind: Deployment + fieldSpecs: + - path: spec/scaleTargetRef/name + kind: HorizontalPodAutoscaler + +- kind: ReplicationController + fieldSpecs: + - path: spec/scaleTargetRef/name + kind: HorizontalPodAutoscaler + +- kind: ReplicaSet + fieldSpecs: + - path: spec/scaleTargetRef/name + kind: HorizontalPodAutoscaler + +- kind: ConfigMap + version: v1 + fieldSpecs: + - path: spec/volumes/configMap/name + version: v1 + kind: Pod + - path: spec/containers/env/valueFrom/configMapKeyRef/name + version: v1 + kind: Pod + - path: spec/initContainers/env/valueFrom/configMapKeyRef/name + version: v1 + kind: Pod + - path: spec/containers/envFrom/configMapRef/name + version: v1 + kind: Pod + - path: spec/initContainers/envFrom/configMapRef/name + version: v1 + kind: Pod + - path: spec/template/spec/volumes/configMap/name + kind: Deployment + - path: spec/template/spec/containers/env/valueFrom/configMapKeyRef/name + kind: Deployment + - path: spec/template/spec/initContainers/env/valueFrom/configMapKeyRef/name + kind: Deployment + - path: spec/template/spec/containers/envFrom/configMapRef/name + kind: Deployment + - path: spec/template/spec/initContainers/envFrom/configMapRef/name + kind: Deployment + - path: spec/template/spec/volumes/projected/sources/configMap/name + kind: Deployment + - path: spec/template/spec/volumes/configMap/name + kind: ReplicaSet + - path: spec/template/spec/containers/env/valueFrom/configMapKeyRef/name + kind: ReplicaSet + - path: spec/template/spec/initContainers/env/valueFrom/configMapKeyRef/name + kind: ReplicaSet + - path: spec/template/spec/containers/envFrom/configMapRef/name + kind: ReplicaSet + - path: spec/template/spec/initContainers/envFrom/configMapRef/name + kind: ReplicaSet + - path: spec/template/spec/volumes/configMap/name + kind: DaemonSet + - path: spec/template/spec/containers/env/valueFrom/configMapKeyRef/name + kind: DaemonSet + - path: spec/template/spec/initContainers/env/valueFrom/configMapKeyRef/name + kind: DaemonSet + - path: spec/template/spec/containers/envFrom/configMapRef/name + kind: DaemonSet + - path: spec/template/spec/initContainers/envFrom/configMapRef/name + kind: DaemonSet + - path: spec/template/spec/volumes/configMap/name + kind: StatefulSet + - path: spec/template/spec/containers/env/valueFrom/configMapKeyRef/name + kind: StatefulSet + - path: spec/template/spec/initContainers/env/valueFrom/configMapKeyRef/name + kind: StatefulSet + - path: spec/template/spec/containers/envFrom/configMapRef/name + kind: StatefulSet + - path: spec/template/spec/initContainers/envFrom/configMapRef/name + kind: StatefulSet + - path: spec/template/spec/volumes/projected/sources/configMap/name + kind: StatefulSet + - path: spec/template/spec/volumes/configMap/name + kind: Job + - path: spec/template/spec/containers/env/valueFrom/configMapKeyRef/name + kind: Job + - path: spec/template/spec/initContainers/env/valueFrom/configMapKeyRef/name + kind: Job + - path: spec/template/spec/containers/envFrom/configMapRef/name + kind: Job + - path: spec/template/spec/initContainers/envFrom/configMapRef/name + kind: Job + - path: spec/jobTemplate/spec/template/spec/volumes/configMap/name + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/containers/env/valueFrom/configmapKeyRef/name + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/initContainers/env/valueFrom/configMapKeyRef/name + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/containers/envFrom/configMapRef/name + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/initContainers/envFrom/configmapRef/name + kind: CronJob + +- kind: Secret + version: v1 + fieldSpecs: + - path: spec/volumes/secret/secretName + version: v1 + kind: Pod + - path: spec/containers/env/valueFrom/secretKeyRef/name + version: v1 + kind: Pod + - path: spec/initContainers/env/valueFrom/secretKeyRef/name + version: v1 + kind: Pod + - path: spec/containers/envFrom/secretRef/name + version: v1 + kind: Pod + - path: spec/initContainers/envFrom/secretRef/name + version: v1 + kind: Pod + - path: spec/imagePullSecrets/name + version: v1 + kind: Pod + - path: spec/template/spec/volumes/secret/secretName + kind: Deployment + - path: spec/template/spec/containers/env/valueFrom/secretKeyRef/name + kind: Deployment + - path: spec/template/spec/initContainers/env/valueFrom/secretKeyRef/name + kind: Deployment + - path: spec/template/spec/containers/envFrom/secretRef/name + kind: Deployment + - path: spec/template/spec/initContainers/envFrom/secretRef/name + kind: Deployment + - path: spec/template/spec/imagePullSecrets/name + kind: Deployment + - path: spec/template/spec/volumes/secret/secretName + kind: ReplicaSet + - path: spec/template/spec/containers/env/valueFrom/secretKeyRef/name + kind: ReplicaSet + - path: spec/template/spec/initContainers/env/valueFrom/secretKeyRef/name + kind: ReplicaSet + - path: spec/template/spec/containers/envFrom/secretRef/name + kind: ReplicaSet + - path: spec/template/spec/initContainers/envFrom/secretRef/name + kind: ReplicaSet + - path: spec/template/spec/imagePullSecrets/name + kind: ReplicaSet + - path: spec/template/spec/volumes/secret/secretName + kind: DaemonSet + - path: spec/template/spec/containers/env/valueFrom/secretKeyRef/name + kind: DaemonSet + - path: spec/template/spec/initContainers/env/valueFrom/secretKeyRef/name + kind: DaemonSet + - path: spec/template/spec/containers/envFrom/secretRef/name + kind: DaemonSet + - path: spec/template/spec/initContainers/envFrom/secretRef/name + kind: DaemonSet + - path: spec/template/spec/imagePullSecrets/name + kind: DaemonSet + - path: spec/template/spec/volumes/secret/secretName + kind: StatefulSet + - path: spec/template/spec/containers/env/valueFrom/secretKeyRef/name + kind: StatefulSet + - path: spec/template/spec/initContainers/env/valueFrom/secretKeyRef/name + kind: StatefulSet + - path: spec/template/spec/containers/envFrom/secretRef/name + kind: StatefulSet + - path: spec/template/spec/initContainers/envFrom/secretRef/name + kind: StatefulSet + - path: spec/template/spec/imagePullSecrets/name + kind: StatefulSet + - path: spec/template/spec/volumes/secret/secretName + kind: Job + - path: spec/template/spec/containers/env/valueFrom/secretKeyRef/name + kind: Job + - path: spec/template/spec/initContainers/env/valueFrom/secretKeyRef/name + kind: Job + - path: spec/template/spec/containers/envFrom/secretRef/name + kind: Job + - path: spec/template/spec/initContainers/envFrom/secretRef/name + kind: Job + - path: spec/template/spec/imagePullSecrets/name + kind: Job + - path: spec/jobTemplate/spec/template/sepc/volumes/secret/secretName + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/containers/env/valueFrom/secretKeyRef/name + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/initContainers/env/valueFrom/secretKeyRef/name + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/containers/envFrom/secretRef/name + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/initContainers/envFrom/secretRef/name + kind: CronJob + - path: spec/jobTemplate/spec/template/spec/imagePullSecrets/name + kind: CronJob + - path: spec/tls/secretName + kind: Ingress + - path: metadata/annotations/ingress.kubernetes.io\/auth-secret + kind: Ingress + - path: metadata/annotations/nginx.ingress.kubernetes.io\/auth-secret + kind: Ingress + - path: imagePullSecrets/name + kind: ServiceAccount + - path: parameters/secretName + kind: StorageClass + - path: parameters/adminSecretName + kind: StorageClass + - path: parameters/userSecretName + kind: StorageClass + - path: parameters/secretRef + kind: StorageClass + +- kind: Service + version: v1 + fieldSpecs: + - path: spec/serviceName + kind: StatefulSet + group: apps + - path: spec/rules/http/paths/backend/serviceName + kind: Ingress + - path: spec/backend/serviceName + kind: Ingress + +- kind: Role + group: rbac.authorization.k8s.io + fieldSpecs: + - path: roleRef/name + kind: RoleBinding + group: rbac.authorization.k8s.io + +- kind: ClusterRole + group: rbac.authorization.k8s.io + fieldSpecs: + - path: roleRef/name + kind: RoleBinding + group: rbac.authorization.k8s.io + - path: roleRef/name + kind: ClusterRoleBinding + group: rbac.authorization.k8s.io + +- kind: ServiceAccount + version: v1 + fieldSpecs: + - path: subjects/name + kind: RoleBinding + group: rbac.authorization.k8s.io + - path: subjects/name + kind: ClusterRoleBinding + group: rbac.authorization.k8s.io + - path: spec/serviceAccountName + kind: Pod + - path: spec/template/spec/serviceAccountName + kind: StatefulSet + - path: spec/template/spec/serviceAccountName + kind: Deployment + - path: spec/template/spec/serviceAccountName + kind: ReplicationController + - path: spec/jobTemplate/spec/template/spec/serviceAccountName + kind: CronJob + - path: spec/template/spec/serviceAccountName + kind: job + - path: spec/template/spec/serviceAccountName + kind: DaemonSet + +- kind: PersistentVolumeClaim + version: v1 + fieldSpecs: + - path: spec/volumes/persistentVolumeClaim/claimName + kind: Pod + - path: spec/template/spec/volumes/persistentVolumeClaim/claimName + kind: StatefulSet + - path: spec/template/spec/volumes/persistentVolumeClaim/claimName + kind: Deployment + - path: spec/template/spec/volumes/persistentVolumeClaim/claimName + kind: ReplicationController + - path: spec/jobTemplate/spec/template/spec/volumes/persistentVolumeClaim/claimName + kind: CronJob + - path: spec/template/spec/volumes/persistentVolumeClaim/claimName + kind: Job + - path: spec/template/spec/volumes/persistentVolumeClaim/claimName + kind: DaemonSet + +- kind: PersistentVolume + version: v1 + fieldSpecs: + - path: spec/volumeName + kind: PersistentVolumeClaim + +namespace: +- path: metadata/namespace + create: true +varReference: + - path: spec/template/spec/initContainers/command + kind: StatefulSet + + - path: spec/template/spec/containers/command + kind: StatefulSet + + - path: spec/template/spec/initContainers/command + kind: Deployment + + - path: spec/template/spec/containers/command + kind: Deployment + + - path: spec/template/spec/containers/command + kind: Job + + - path: spec/jobTemplate/spec/template/spec/containers/command + kind: CronJob + + - path: spec/template/spec/initContainers/args + kind: StatefulSet + + - path: spec/template/spec/containers/args + kind: StatefulSet + + - path: spec/template/spec/initContainers/args + kind: Deployment + + - path: spec/template/spec/containers/args + kind: Deployment + + - path: spec/template/spec/containers/args + kind: Job + + - path: spec/jobTemplate/spec/template/spec/containers/args + kind: CronJob + + - path: spec/template/spec/initContainers/env/value + kind: StatefulSet + + - path: spec/template/spec/containers/env/value + kind: StatefulSet + + - path: spec/template/spec/initContainers/env/value + kind: Deployment + + - path: spec/template/spec/containers/env/value + kind: Deployment + + - path: spec/template/spec/containers/env/value + kind: Job + + - path: spec/jobTemplate/spec/template/spec/containers/env/value + kind: CronJob + + - path: spec/containers/command + kind: Pod + + - path: spec/containers/args + kind: Pod + + - path: spec/containers/env/value + kind: Pod + + - path: spec/template/spec/containers/env/value + kind: DaemonSet + + - path: spec/clusterNetwork/services/cidrBlocks + kind: Cluster + + - path: spec/clusterNetwork/pods/cidrBlocks + kind: Cluster + + - path: spec/clusterNetwork/serviceDomain + kind: Cluster + + - path: spec/providerSpec/value/region + kind: Cluster + + - path: spec/providerSpec/value/sshKeyName + kind: Cluster + + - path: metadata/name + kind: Cluster + + - path: metadata/generateName + kind: MachineList + + - path: items/spec/providerSpec/value/keyName + kind: MachineList + + - path: items/spec/providerSpec/value/instanceType + kind: MachineList + + - path: items/spec/providerSpec/value/iamInstanceProfile + kind: MachineList + + - path: metadata/generateName + kind: Machine + + - path: spec/providerSpec/value/keyName + kind: Machine + + - path: spec/providerSpec/value/instanceType + kind: Machine + + - path: spec/providerSpec/value/iamInstanceProfile + kind: Machine + + - path: data/* + kind: ConfigMap diff --git a/cmd/clusterctl/examples/aws/machines.yaml.template b/cmd/clusterctl/examples/aws/machines.yaml.template deleted file mode 100644 index d43e289ea6..0000000000 --- a/cmd/clusterctl/examples/aws/machines.yaml.template +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: "cluster.k8s.io/v1alpha1" -kind: MachineList -items: - - apiVersion: "cluster.k8s.io/v1alpha1" - kind: Machine - metadata: - name: controlplane-0 - labels: - set: controlplane - spec: - versions: - kubelet: v1.13.0 - controlPlane: v1.13.0 - providerSpec: - value: - apiVersion: awsprovider/v1alpha1 - kind: AWSMachineProviderSpec - instanceType: "${CONTROL_PLANE_MACHINE_TYPE}" - iamInstanceProfile: "control-plane.cluster-api-provider-aws.sigs.k8s.io" - keyName: "${SSH_KEY_NAME}" - - apiVersion: "cluster.k8s.io/v1alpha1" - kind: Machine - metadata: - generateName: node- - labels: - set: node - spec: - versions: - kubelet: v1.13.0 - providerSpec: - value: - apiVersion: awsprovider/v1alpha1 - kind: AWSMachineProviderSpec - instanceType: "${NODE_MACHINE_TYPE}" - iamInstanceProfile: "nodes.cluster-api-provider-aws.sigs.k8s.io" - keyName: "${SSH_KEY_NAME}" diff --git a/cmd/clusterctl/examples/aws/overlays/template/BUILD.bazel b/cmd/clusterctl/examples/aws/overlays/template/BUILD.bazel new file mode 100644 index 0000000000..52055d8165 --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/BUILD.bazel @@ -0,0 +1,15 @@ +load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar") + +pkg_tar( + name = "template", + srcs = [ + "network-configuration.yaml", + ], + package_dir = "overlays/template", + visibility = ["//visibility:public"], + deps = [ + "//cmd/clusterctl/examples/aws/overlays/template/addons:addons.tar", + "//cmd/clusterctl/examples/aws/overlays/template/clusters:clusters.tar", + "//cmd/clusterctl/examples/aws/overlays/template/provider-components:provider-components.tar", + ], +) diff --git a/cmd/clusterctl/examples/aws/overlays/template/addons/BUILD.bazel b/cmd/clusterctl/examples/aws/overlays/template/addons/BUILD.bazel new file mode 100644 index 0000000000..aa1c0a822c --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/addons/BUILD.bazel @@ -0,0 +1,10 @@ +load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar") + +pkg_tar( + name = "addons", + srcs = [ + "kustomization.yaml", + ], + package_dir = "addons", + visibility = ["//visibility:public"], +) diff --git a/cmd/clusterctl/examples/aws/overlays/template/addons/kustomization.yaml b/cmd/clusterctl/examples/aws/overlays/template/addons/kustomization.yaml new file mode 100644 index 0000000000..74cd948ff3 --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/addons/kustomization.yaml @@ -0,0 +1,28 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: v1beta1 +kind: Kustomization + +namespace: kube-system + +patches: + - patch.yaml + +bases: + - ../../../base/addons + +resources: + - ../network-configuration.yaml diff --git a/cmd/clusterctl/examples/aws/overlays/template/addons/patch.yaml b/cmd/clusterctl/examples/aws/overlays/template/addons/patch.yaml new file mode 100644 index 0000000000..a8884da062 --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/addons/patch.yaml @@ -0,0 +1,33 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: v1beta1 +kind: Kustomization + +apiVersion: extensions/v1beta1 +kind: DaemonSet +metadata: + name: calico-node +spec: + template: + spec: + containers: + - name: calico-node + env: + - name: CALICO_IPV4POOL_CIDR + valueFrom: + configMapKeyRef: + name: cluster-api-aws-network-configuration + key: pods_cidrBlock diff --git a/cmd/clusterctl/examples/aws/overlays/template/clusters/BUILD.bazel b/cmd/clusterctl/examples/aws/overlays/template/clusters/BUILD.bazel new file mode 100644 index 0000000000..f18fb1a808 --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/clusters/BUILD.bazel @@ -0,0 +1,10 @@ +load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar") + +pkg_tar( + name = "clusters", + srcs = [ + "kustomization.yaml", + ], + package_dir = "clusters", + visibility = ["//visibility:public"], +) diff --git a/cmd/clusterctl/examples/aws/overlays/template/clusters/cluster-customization.yaml b/cmd/clusterctl/examples/aws/overlays/template/clusters/cluster-customization.yaml new file mode 100644 index 0000000000..8234b4f011 --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/clusters/cluster-customization.yaml @@ -0,0 +1,28 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +--- +apiVersion: "cluster.k8s.io/v1alpha1" +kind: Cluster +metadata: + name: default +spec: + clusterNetwork: + pods: + cidrBlocks: + - "192.168.0.0/16" + providerSpec: + value: + region: us-east-1 + sshKeyName: fdfsd diff --git a/cmd/clusterctl/examples/aws/overlays/template/clusters/kustomization.yaml b/cmd/clusterctl/examples/aws/overlays/template/clusters/kustomization.yaml new file mode 100644 index 0000000000..86c4df039c --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/clusters/kustomization.yaml @@ -0,0 +1,39 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: v1beta1 +kind: Kustomization + +namespace: "cluster-aws-{{ .EnvName }}" + +bases: + - ../../../base/clusters + +resources: + - ../network-configuration.yaml + +patchesStrategicMerge: + - cluster-customization.yaml + - machine-customization.yaml + + +vars: + - name: SSH_KEY_NAME + objref: + kind: Cluster + name: default + apiVersion: cluster.k8s.io/v1alpha1 + fieldref: + fieldpath: spec.providerSpec.value.sshKeyName \ No newline at end of file diff --git a/cmd/clusterctl/examples/aws/overlays/template/clusters/machine-customization.yaml b/cmd/clusterctl/examples/aws/overlays/template/clusters/machine-customization.yaml new file mode 100644 index 0000000000..4c4576b811 --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/clusters/machine-customization.yaml @@ -0,0 +1,21 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: "cluster.k8s.io/v1alpha1" +kind: Machine +spec: + providerSpec: + value: + keyName: "$(SSH_KEY_NAME)" diff --git a/cmd/clusterctl/examples/aws/overlays/template/clusters/machine-patch.yaml b/cmd/clusterctl/examples/aws/overlays/template/clusters/machine-patch.yaml new file mode 100644 index 0000000000..2f1355942d --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/clusters/machine-patch.yaml @@ -0,0 +1,18 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +- op: replace + path: /spec/providerSpec/value/keyName + value: "$(SSH_KEY_NAME)" diff --git a/cmd/clusterctl/examples/aws/overlays/template/network-configuration.yaml b/cmd/clusterctl/examples/aws/overlays/template/network-configuration.yaml new file mode 100644 index 0000000000..beeefb8321 --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/network-configuration.yaml @@ -0,0 +1,21 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: v1 +kind: ConfigMap +metadata: + name: cluster-api-aws-network-configuration +data: + pods_cidrBlock: "192.168.0.0/16" diff --git a/cmd/clusterctl/examples/aws/overlays/template/provider-components/BUILD.bazel b/cmd/clusterctl/examples/aws/overlays/template/provider-components/BUILD.bazel new file mode 100644 index 0000000000..f597747d4a --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/provider-components/BUILD.bazel @@ -0,0 +1,10 @@ +load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar") + +pkg_tar( + name = "provider-components", + srcs = [ + "kustomization.yaml", + ], + package_dir = "provider-components", + visibility = ["//visibility:public"], +) diff --git a/cmd/clusterctl/examples/aws/overlays/template/provider-components/kustomization.yaml b/cmd/clusterctl/examples/aws/overlays/template/provider-components/kustomization.yaml new file mode 100644 index 0000000000..e2fef84a6f --- /dev/null +++ b/cmd/clusterctl/examples/aws/overlays/template/provider-components/kustomization.yaml @@ -0,0 +1,22 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +apiVersion: v1beta1 +kind: Kustomization + +namespace: cluster-api-provider-aws-system + +bases: + - ../../../base/provider-components diff --git a/cmd/manager/BUILD b/cmd/manager/BUILD index 595e922dc7..83bc6fbaed 100644 --- a/cmd/manager/BUILD +++ b/cmd/manager/BUILD @@ -1,5 +1,22 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + load("@io_bazel_rules_go//go:def.bzl", "go_binary", "go_library") -load("//build:cluster_api_binary_image.bzl", "cluster_api_binary_image") +load("@io_bazel_rules_docker//go:image.bzl", "go_image") +load("@io_bazel_rules_docker//contrib:push-all.bzl", "docker_push") +load("@io_bazel_rules_docker//container:container.bzl", "container_bundle") +load("//build:stateful_set_patch.bzl", "stateful_set_patch") go_library( name = "go_default_library", @@ -26,8 +43,78 @@ go_library( go_binary( name = "manager", embed = [":go_default_library"], + pure = "on", visibility = ["//visibility:public"], +) + +go_image( + name = "manager-amd64", + base = "@golang-image//image", + embed = [":go_default_library"], + goarch = "amd64", + goos = "linux", pure = "on", + visibility = ["//visibility:public"], +) + +tags = [ + "{GIT_VERSION}", + "$(MANAGER_IMAGE_TAG)", +] + +images = { + "{registry}/manager:{tag}".format( + registry = "$(REGISTRY_STABLE)", + name = "$(MANAGER_IMAGE_NAME)", + tag = tag, + ): ":manager-amd64" + for tag in tags +} + +images_dev = { + "{registry}/manager:{tag}".format( + registry = "$(REGISTRY_DEV)", + name = "$(MANAGER_IMAGE_NAME)", + tag = tag, + ): ":manager-amd64" + for tag in tags +} + +container_bundle( + name = "manager-image", + images = images, + tags = ["manual"], + visibility = ["//visibility:public"], ) -cluster_api_binary_image(name = "manager") +container_bundle( + name = "manager-image-dev", + images = images_dev, + tags = ["manual"], + visibility = ["//visibility:public"], +) + +docker_push( + name = "manager-push", + bundle = "manager-image", + tags = ["manual"], +) + +docker_push( + name = "manager-push-dev", + bundle = "manager-image-dev", + tags = ["manual"], +) + +stateful_set_patch( + name = "manager-version-patch", + docker_repo_var = "REGISTRY_STABLE", + tags = ["generated"], + visibility = ["//visibility:public"], +) + +stateful_set_patch( + name = "manager-version-patch-dev", + docker_repo_var = "REGISTRY_DEV", + visibility = ["//visibility:public"], +) diff --git a/cmd/manager/manager-version-patch-dev.yaml b/cmd/manager/manager-version-patch-dev.yaml new file mode 100755 index 0000000000..cd296a4255 --- /dev/null +++ b/cmd/manager/manager-version-patch-dev.yaml @@ -0,0 +1,11 @@ + apiVersion: apps/v1 + kind: StatefulSet + metadata: + name: cluster-api-provider-aws-controller-manager + namespace: system + spec: + template: + spec: + containers: + - image: gcr.io/cluster-provider-ssh-rv/cluster-api-aws-controller:0.0.2 + name: manager diff --git a/cmd/manager/manager-version-patch.yaml b/cmd/manager/manager-version-patch.yaml new file mode 100755 index 0000000000..023b641e05 --- /dev/null +++ b/cmd/manager/manager-version-patch.yaml @@ -0,0 +1,11 @@ + apiVersion: apps/v1 + kind: StatefulSet + metadata: + name: controller-manager + namespace: system + spec: + template: + spec: + containers: + - image: gcr.io/cluster-api-provider-aws/cluster-api-aws-controller:0.0.2 + name: manager diff --git a/config/BUILD b/config/BUILD deleted file mode 100644 index a5918160e4..0000000000 --- a/config/BUILD +++ /dev/null @@ -1,20 +0,0 @@ -genrule( - name = "aws-provider-yaml", - cmd = " ".join([ - "touch credentials &&", # TODO(EKF) actual credentials? - "install -D credentials cmd/clusterctl/examples/aws/out/credentials &&", - "install -D $(location //cmd/clusterctl/examples/aws:out/aws_manager_image_patch.yaml)", - "cmd/clusterctl/examples/aws/out/aws_manager_image_patch.yaml &&", - "$(location @io_k8s_sigs_kustomize//:kustomize) build config/default > $@", - ]), - srcs = [ - ":default/kustomization.yaml", - "//cmd/clusterctl/examples/aws:out/aws_manager_image_patch.yaml", - ] + - glob(["crds/*.yaml"]) + - glob(["rbac/*.yaml"]) + - glob(["manager/*.yaml"]), - tools = ["@io_k8s_sigs_kustomize//:kustomize"], - outs = ["aws_provider.yaml"], - visibility = ["//visibility:public"], -) diff --git a/config/BUILD.bazel b/config/BUILD.bazel new file mode 100644 index 0000000000..bc7b2c4923 --- /dev/null +++ b/config/BUILD.bazel @@ -0,0 +1,57 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +load("//build:controller_gen.bzl", "controller_gen") + +controller_gen( + name = "crds", + api = [ + { + "group": "awsprovider.k8s.io", + "version": "v1alpha1", + "types": [ + "AWSClusterProviderSpec", + "AWSClusterProviderStatus", + "AWSMachineProviderSpec", + "AWSMachineProviderStatus", + ], + }, + ], + importpath = "sigs.k8s.io/cluster-api-provider-aws", + visibility = ["//visibility:public"], +) + +genrule( + name = "config", + srcs = [ + "//config/default:kustomization.yaml", + "//config/manager:namespace.yaml", + "//config/manager:service.yaml", + "//config/manager:stateful_set.yaml", + "crds", + "//:WORKSPACE", + ], + outs = ["cluster-api-provider-aws.yaml"], + cmd = """CONFIG_SRCDIR={root_dir}/config && \\ + cp -R $$CONFIG_SRCDIR/default $(@D)/default && \\ + cp -R $$CONFIG_SRCDIR/manager $(@D)/manager && \\ + {kustomize} build $(@D)/default > $@ + """.format( + kustomize = "$(location @io_k8s_sigs_kustomize//:kustomize)", + root_dir = "$$(dirname $(location //:WORKSPACE))", + ), + tags = ["generated"], + tools = ["@io_k8s_sigs_kustomize//:kustomize"], + visibility = ["//visibility:public"], +) diff --git a/config/default/BUILD b/config/default/BUILD new file mode 100644 index 0000000000..90b90fb566 --- /dev/null +++ b/config/default/BUILD @@ -0,0 +1,18 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +exports_files( + ["kustomization.yaml"], + visibility = ["//visibility:public"], +) diff --git a/config/default/kustomization.yaml b/config/default/kustomization.yaml index b1fe6a146d..6621699068 100644 --- a/config/default/kustomization.yaml +++ b/config/default/kustomization.yaml @@ -1,6 +1,5 @@ -namespace: aws-provider-system -namePrefix: aws-provider- - +namespace: cluster-api-provider-aws-system +namePrefix: cluster-api-provider-aws- resources: - ../crds/awsprovider_v1alpha1_awsclusterproviderspec.yaml - ../crds/awsprovider_v1alpha1_awsclusterproviderstatus.yaml @@ -8,13 +7,5 @@ resources: - ../crds/awsprovider_v1alpha1_awsmachineproviderstatus.yaml - ../rbac/rbac_role.yaml - ../rbac/rbac_role_binding.yaml - - ../manager/manager.yaml - -patches: - - ../../cmd/clusterctl/examples/aws/out/aws_manager_image_patch.yaml - -secretGenerator: - - name: manager-bootstrap-credentials - type: Opaque - commands: - credentials: "cat ../../cmd/clusterctl/examples/aws/out/credentials" + - ../manager/service.yaml + - ../manager/stateful_set.yaml diff --git a/config/manager/BUILD b/config/manager/BUILD new file mode 100644 index 0000000000..fd45ce31c6 --- /dev/null +++ b/config/manager/BUILD @@ -0,0 +1,22 @@ +# Copyright 2019 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +exports_files( + [ + "namespace.yaml", + "service.yaml", + "stateful_set.yaml", + ], + visibility = ["//visibility:public"], +) diff --git a/config/manager/namespace.yaml b/config/manager/namespace.yaml new file mode 100644 index 0000000000..0c2012104c --- /dev/null +++ b/config/manager/namespace.yaml @@ -0,0 +1,6 @@ +apiVersion: v1 +kind: Namespace +metadata: + labels: + controller-tools.k8s.io: "1.0" + name: cluster-api-provider-aws-system diff --git a/config/manager/service.yaml b/config/manager/service.yaml new file mode 100644 index 0000000000..469943fbd4 --- /dev/null +++ b/config/manager/service.yaml @@ -0,0 +1,14 @@ +apiVersion: v1 +kind: Service +metadata: + name: controller-manager-service + namespace: system + labels: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" +spec: + selector: + control-plane: controller-manager + controller-tools.k8s.io: "1.0" + ports: + - port: 443 diff --git a/config/manager/manager.yaml b/config/manager/stateful_set.yaml similarity index 77% rename from config/manager/manager.yaml rename to config/manager/stateful_set.yaml index 0e116d5b0e..5915d10601 100644 --- a/config/manager/manager.yaml +++ b/config/manager/stateful_set.yaml @@ -1,25 +1,3 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - controller-tools.k8s.io: "1.0" - name: system #TODO: add the prefix here manually, next version of kustomize won't prefix namespaces. ---- -apiVersion: v1 -kind: Service -metadata: - name: controller-manager-service - namespace: system - labels: - control-plane: controller-manager - controller-tools.k8s.io: "1.0" -spec: - selector: - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - ports: - - port: 443 ---- apiVersion: apps/v1 kind: StatefulSet metadata: @@ -54,7 +32,7 @@ spec: containers: - name: manager image: SET_BY_PATCH - imagePullPolicy: SET_BY_PATCH + imagePullPolicy: Always args: - "-v=3" - "-logtostderr=true" diff --git a/config/rbac/rbac_role.yaml b/config/rbac/rbac_role.yaml old mode 100644 new mode 100755 index 43acf52ac0..dc9e16c345 --- a/config/rbac/rbac_role.yaml +++ b/config/rbac/rbac_role.yaml @@ -1,6 +1,7 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: + creationTimestamp: null name: manager-role rules: - apiGroups: @@ -8,8 +9,6 @@ rules: resources: - awsclusterproviderconfigs - awsclusterproviderstatuses - - awsmachineproviderconfigs - - awsmachineproviderstatuses verbs: - get - list @@ -23,6 +22,30 @@ rules: resources: - clusters - clusters/status + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - awsprovider.k8s.io + resources: + - awsmachineproviderconfigs + - awsmachineproviderstatuses + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +- apiGroups: + - cluster.k8s.io + resources: - machines - machines/status - machinedeployments @@ -38,7 +61,7 @@ rules: - patch - delete - apiGroups: - - "" + - v1 resources: - nodes - events @@ -49,4 +72,4 @@ rules: - create - update - patch - - delete \ No newline at end of file + - delete diff --git a/config/rbac/rbac_role_binding.yaml b/config/rbac/rbac_role_binding.yaml old mode 100644 new mode 100755 index fbc768e467..c1033e23fb --- a/config/rbac/rbac_role_binding.yaml +++ b/config/rbac/rbac_role_binding.yaml @@ -10,4 +10,4 @@ roleRef: subjects: - kind: ServiceAccount name: default - namespace: aws-provider-system + namespace: system diff --git a/pkg/cloud/aws/actuators/cluster/actuator.go b/pkg/cloud/aws/actuators/cluster/actuator.go index 7d065f5a47..0ff9173c2c 100644 --- a/pkg/cloud/aws/actuators/cluster/actuator.go +++ b/pkg/cloud/aws/actuators/cluster/actuator.go @@ -29,6 +29,9 @@ import ( controllerError "sigs.k8s.io/cluster-api/pkg/controller/error" ) +//+kubebuilder:rbac:groups=awsprovider.k8s.io,resources=awsclusterproviderconfigs;awsclusterproviderstatuses,verbs=get;list;watch;create;update;patch;delete +//+kubebuilder:rbac:groups=cluster.k8s.io,resources=clusters;clusters/status,verbs=get;list;watch;create;update;patch;delete + // Actuator is responsible for performing cluster reconciliation type Actuator struct { *deployer.Deployer diff --git a/pkg/cloud/aws/actuators/machine/actuator.go b/pkg/cloud/aws/actuators/machine/actuator.go index 3dd53a946f..e6370ebb62 100644 --- a/pkg/cloud/aws/actuators/machine/actuator.go +++ b/pkg/cloud/aws/actuators/machine/actuator.go @@ -41,6 +41,10 @@ import ( controllerError "sigs.k8s.io/cluster-api/pkg/controller/error" ) +//+kubebuilder:rbac:groups=awsprovider.k8s.io,resources=awsmachineproviderconfigs;awsmachineproviderstatuses,verbs=get;list;watch;create;update;patch;delete +//+kubebuilder:rbac:groups=cluster.k8s.io,resources=machines;machines/status;machinedeployments;machinedeployments/status;machinesets;machinesets/status,verbs=get;list;watch;create;update;patch;delete +//+kubebuilder:rbac:groups=v1,resources=nodes;events,verbs=get;list;watch;create;update;patch;delete + // Actuator is responsible for performing machine reconciliation. type Actuator struct { *deployer.Deployer diff --git a/pkg/template/BUILD.bazel b/pkg/template/BUILD.bazel new file mode 100644 index 0000000000..d90b64d2ad --- /dev/null +++ b/pkg/template/BUILD.bazel @@ -0,0 +1,9 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "go_default_library", + srcs = ["template.go"], + importpath = "sigs.k8s.io/cluster-api-provider-aws/pkg/template", + visibility = ["//visibility:public"], + deps = ["//vendor/github.com/pkg/errors:go_default_library"], +) diff --git a/pkg/template/template.go b/pkg/template/template.go new file mode 100644 index 0000000000..c5622f01ef --- /dev/null +++ b/pkg/template/template.go @@ -0,0 +1,39 @@ +/* +Copyright 2018 The Kubernetes authors. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package template + +import ( + "bytes" + txtTemplate "text/template" + + "github.com/pkg/errors" +) + +// Generate will produce a rendered template as string +func Generate(kind string, tpl string, data interface{}) (string, error) { + t, err := txtTemplate.New(kind).Parse(tpl) + if err != nil { + return "", errors.Wrapf(err, "failed to parse %s template", kind) + } + + var out bytes.Buffer + if err := t.Execute(&out, data); err != nil { + return "", errors.Wrapf(err, "failed to generate %s template", kind) + } + + return out.String(), nil +} diff --git a/vendor/github.com/shurcool/httpfs/LICENSE b/vendor/github.com/shurcool/httpfs/LICENSE new file mode 100644 index 0000000000..c35c17af98 --- /dev/null +++ b/vendor/github.com/shurcool/httpfs/LICENSE @@ -0,0 +1,21 @@ +MIT License + +Copyright (c) 2015 Dmitri Shuralyov + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/vendor/github.com/shurcool/httpfs/vfsutil/BUILD.bazel b/vendor/github.com/shurcool/httpfs/vfsutil/BUILD.bazel new file mode 100644 index 0000000000..35dad3554d --- /dev/null +++ b/vendor/github.com/shurcool/httpfs/vfsutil/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "go_default_library", + srcs = [ + "file.go", + "vfsutil.go", + "walk.go", + ], + importmap = "sigs.k8s.io/cluster-api-provider-aws/vendor/github.com/shurcool/httpfs/vfsutil", + importpath = "github.com/shurcool/httpfs/vfsutil", + visibility = ["//visibility:public"], +) diff --git a/vendor/github.com/shurcool/httpfs/vfsutil/file.go b/vendor/github.com/shurcool/httpfs/vfsutil/file.go new file mode 100644 index 0000000000..4cb0dadadb --- /dev/null +++ b/vendor/github.com/shurcool/httpfs/vfsutil/file.go @@ -0,0 +1,21 @@ +package vfsutil + +import ( + "net/http" + "os" +) + +// File implements http.FileSystem using the native file system restricted to a +// specific file served at root. +// +// While the FileSystem.Open method takes '/'-separated paths, a File's string +// value is a filename on the native file system, not a URL, so it is separated +// by filepath.Separator, which isn't necessarily '/'. +type File string + +func (f File) Open(name string) (http.File, error) { + if name != "/" { + return nil, &os.PathError{Op: "open", Path: name, Err: os.ErrNotExist} + } + return os.Open(string(f)) +} diff --git a/vendor/github.com/shurcool/httpfs/vfsutil/vfsutil.go b/vendor/github.com/shurcool/httpfs/vfsutil/vfsutil.go new file mode 100644 index 0000000000..df071d112c --- /dev/null +++ b/vendor/github.com/shurcool/httpfs/vfsutil/vfsutil.go @@ -0,0 +1,39 @@ +// Package vfsutil implements some I/O utility functions for http.FileSystem. +package vfsutil + +import ( + "io/ioutil" + "net/http" + "os" +) + +// ReadDir reads the contents of the directory associated with file and +// returns a slice of FileInfo values in directory order. +func ReadDir(fs http.FileSystem, name string) ([]os.FileInfo, error) { + f, err := fs.Open(name) + if err != nil { + return nil, err + } + defer f.Close() + return f.Readdir(0) +} + +// Stat returns the FileInfo structure describing file. +func Stat(fs http.FileSystem, name string) (os.FileInfo, error) { + f, err := fs.Open(name) + if err != nil { + return nil, err + } + defer f.Close() + return f.Stat() +} + +// ReadFile reads the file named by path from fs and returns the contents. +func ReadFile(fs http.FileSystem, path string) ([]byte, error) { + rc, err := fs.Open(path) + if err != nil { + return nil, err + } + defer rc.Close() + return ioutil.ReadAll(rc) +} diff --git a/vendor/github.com/shurcool/httpfs/vfsutil/walk.go b/vendor/github.com/shurcool/httpfs/vfsutil/walk.go new file mode 100644 index 0000000000..f256bbec26 --- /dev/null +++ b/vendor/github.com/shurcool/httpfs/vfsutil/walk.go @@ -0,0 +1,146 @@ +package vfsutil + +import ( + "io" + "net/http" + "os" + pathpkg "path" + "path/filepath" + "sort" +) + +// Walk walks the filesystem rooted at root, calling walkFn for each file or +// directory in the filesystem, including root. All errors that arise visiting files +// and directories are filtered by walkFn. The files are walked in lexical +// order. +func Walk(fs http.FileSystem, root string, walkFn filepath.WalkFunc) error { + info, err := Stat(fs, root) + if err != nil { + return walkFn(root, nil, err) + } + return walk(fs, root, info, walkFn) +} + +// readDirNames reads the directory named by dirname and returns +// a sorted list of directory entries. +func readDirNames(fs http.FileSystem, dirname string) ([]string, error) { + fis, err := ReadDir(fs, dirname) + if err != nil { + return nil, err + } + names := make([]string, len(fis)) + for i := range fis { + names[i] = fis[i].Name() + } + sort.Strings(names) + return names, nil +} + +// walk recursively descends path, calling walkFn. +func walk(fs http.FileSystem, path string, info os.FileInfo, walkFn filepath.WalkFunc) error { + err := walkFn(path, info, nil) + if err != nil { + if info.IsDir() && err == filepath.SkipDir { + return nil + } + return err + } + + if !info.IsDir() { + return nil + } + + names, err := readDirNames(fs, path) + if err != nil { + return walkFn(path, info, err) + } + + for _, name := range names { + filename := pathpkg.Join(path, name) + fileInfo, err := Stat(fs, filename) + if err != nil { + if err := walkFn(filename, fileInfo, err); err != nil && err != filepath.SkipDir { + return err + } + } else { + err = walk(fs, filename, fileInfo, walkFn) + if err != nil { + if !fileInfo.IsDir() || err != filepath.SkipDir { + return err + } + } + } + } + return nil +} + +// WalkFilesFunc is the type of the function called for each file or directory visited by WalkFiles. +// It's like filepath.WalkFunc, except it provides an additional ReadSeeker parameter for file being visited. +type WalkFilesFunc func(path string, info os.FileInfo, rs io.ReadSeeker, err error) error + +// WalkFiles walks the filesystem rooted at root, calling walkFn for each file or +// directory in the filesystem, including root. In addition to FileInfo, it passes an +// ReadSeeker to walkFn for each file it visits. +func WalkFiles(fs http.FileSystem, root string, walkFn WalkFilesFunc) error { + file, info, err := openStat(fs, root) + if err != nil { + return walkFn(root, nil, nil, err) + } + return walkFiles(fs, root, info, file, walkFn) +} + +// walkFiles recursively descends path, calling walkFn. +// It closes the input file after it's done with it, so the caller shouldn't. +func walkFiles(fs http.FileSystem, path string, info os.FileInfo, file http.File, walkFn WalkFilesFunc) error { + err := walkFn(path, info, file, nil) + file.Close() + if err != nil { + if info.IsDir() && err == filepath.SkipDir { + return nil + } + return err + } + + if !info.IsDir() { + return nil + } + + names, err := readDirNames(fs, path) + if err != nil { + return walkFn(path, info, nil, err) + } + + for _, name := range names { + filename := pathpkg.Join(path, name) + file, fileInfo, err := openStat(fs, filename) + if err != nil { + if err := walkFn(filename, nil, nil, err); err != nil && err != filepath.SkipDir { + return err + } + } else { + err = walkFiles(fs, filename, fileInfo, file, walkFn) + // file is closed by walkFiles, so we don't need to close it here. + if err != nil { + if !fileInfo.IsDir() || err != filepath.SkipDir { + return err + } + } + } + } + return nil +} + +// openStat performs Open and Stat and returns results, or first error encountered. +// The caller is responsible for closing the returned file when done. +func openStat(fs http.FileSystem, name string) (http.File, os.FileInfo, error) { + f, err := fs.Open(name) + if err != nil { + return nil, nil, err + } + fi, err := f.Stat() + if err != nil { + f.Close() + return nil, nil, err + } + return f, fi, nil +}