Skip to content

Commit

Permalink
Run hack/update-expected.sh
Browse files Browse the repository at this point in the history
  • Loading branch information
hakman committed Aug 2, 2022
1 parent 16fa47a commit 322bb7d
Show file tree
Hide file tree
Showing 372 changed files with 2,283 additions and 615 deletions.
8 changes: 4 additions & 4 deletions pkg/model/components/etcdmanager/tests/interval/tasks.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -128,8 +128,8 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/events.yaml
Name: manifests-etcdmanager-events
Location: manifests/etcd/events-master-us-test-1a.yaml
Name: manifests-etcdmanager-events-master-us-test-1a
Public: null
---
Base: null
Expand Down Expand Up @@ -197,6 +197,6 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/main.yaml
Name: manifests-etcdmanager-main
Location: manifests/etcd/main-master-us-test-1a.yaml
Name: manifests-etcdmanager-main-master-us-test-1a
Public: null
8 changes: 4 additions & 4 deletions pkg/model/components/etcdmanager/tests/minimal/tasks.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -127,8 +127,8 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/events.yaml
Name: manifests-etcdmanager-events
Location: manifests/etcd/events-master-us-test-1a.yaml
Name: manifests-etcdmanager-events-master-us-test-1a
Public: null
---
Base: null
Expand Down Expand Up @@ -195,6 +195,6 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/main.yaml
Name: manifests-etcdmanager-main
Location: manifests/etcd/main-master-us-test-1a.yaml
Name: manifests-etcdmanager-main-master-us-test-1a
Public: null
Original file line number Diff line number Diff line change
Expand Up @@ -130,8 +130,8 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/events.yaml
Name: manifests-etcdmanager-events
Location: manifests/etcd/events-master-us-test-1a.yaml
Name: manifests-etcdmanager-events-master-us-test-1a
Public: null
---
Base: null
Expand Down Expand Up @@ -201,6 +201,6 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/main.yaml
Name: manifests-etcdmanager-main
Location: manifests/etcd/main-master-us-test-1a.yaml
Name: manifests-etcdmanager-main-master-us-test-1a
Public: null
8 changes: 4 additions & 4 deletions pkg/model/components/etcdmanager/tests/proxy/tasks.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -136,8 +136,8 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/events.yaml
Name: manifests-etcdmanager-events
Location: manifests/etcd/events-master-us-test-1a.yaml
Name: manifests-etcdmanager-events-master-us-test-1a
Public: null
---
Base: null
Expand Down Expand Up @@ -213,6 +213,6 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/main.yaml
Name: manifests-etcdmanager-main
Location: manifests/etcd/main-master-us-test-1a.yaml
Name: manifests-etcdmanager-main-master-us-test-1a
Public: null
Original file line number Diff line number Diff line change
Expand Up @@ -439,7 +439,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amastersminimalexamplecom.Properties.
ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: 3qdPx3oiEVN1GYvNvnqegPn5HfCT20qnIKcMOu2SUUk=
NodeupConfigHash: AyfQUSU3pU4Y3sxv654JYBDiSYYB8tzFt/l5u3IaG/A=
__EOF_KUBE_ENV
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -262,7 +262,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: 3qdPx3oiEVN1GYvNvnqegPn5HfCT20qnIKcMOu2SUUk=
NodeupConfigHash: AyfQUSU3pU4Y3sxv654JYBDiSYYB8tzFt/l5u3IaG/A=
__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -268,8 +268,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/apiservernodes/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -698,18 +698,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -244,7 +244,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: M0ExiycRdbTLCRkTX6AW9JLM7pzSA6UViGzDd/fW9A0=
NodeupConfigHash: 7tYJ8eQDhzVM78NRdWfNPKZ4cOkWJXk6mXZnAGX8YWI=
__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -260,8 +260,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/aws-lb-controller/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -612,18 +612,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -244,7 +244,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/bastionuserdata.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: 8C9/e/L3ChpoTk1s7hH/kSi5SZ48BrQxCfzAMbVpSio=
NodeupConfigHash: 2peKS73CtFUTXEuCFx9ZBqDMjI10ZvjaIE+dDXzv9U0=
__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -260,8 +260,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/bastionuserdata.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/bastionuserdata.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/bastionuserdata.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/bastionuserdata.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -862,18 +862,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -276,7 +276,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amasterscomplexexamplecom.Properties.
ConfigBase: memfs://clusters.example.com/complex.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: /kzT+UsXGjhR1gYHcSZeQvy9456yLuzeKFyG7m6xfiM=
NodeupConfigHash: zKAziGeNI03FEJJKZK/mwm9dABFb7D9LGHQR0p5KuIM=
__EOF_KUBE_ENV
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -275,7 +275,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/complex.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: /kzT+UsXGjhR1gYHcSZeQvy9456yLuzeKFyG7m6xfiM=
NodeupConfigHash: zKAziGeNI03FEJJKZK/mwm9dABFb7D9LGHQR0p5KuIM=

__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -272,8 +272,8 @@ containerdConfig:
logLevel: info
version: 1.6.6
etcdManifests:
- memfs://clusters.example.com/complex.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/complex.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/complex.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/complex.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
Expand Down
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/complex/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -786,18 +786,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ ensure-install-dir

echo "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" | base64 -d | gzip -d > conf/cluster_spec.yaml

echo "H4sIAAAAAAAA/1TOQUvEMBAF4Ht+Re5LtyqoEPCwrq0WsUhFUW9DOmlLk07MJLX666XuqdfH9x7vaCm1z4HmocWgJHyzONJkhu4WGJV06AyrPNc2ccTAe1zAeYt7TS7X5HxA3oSimjjCpPE+UPI1uHUE1m6WOIvIMTuHLWrIopJP/0jU1GLypwsPwL2S5vHzoti599dyvKyWgszd1c+8HH4pldcNj33xdXjblS8fZ9DdiD8AAAD//wEAAP//ijOvJc8AAAA=" | base64 -d | gzip -d > conf/kube_env.yaml
echo "H4sIAAAAAAAA/1TOwWrDMBAE0Lu+Qj/giJRCQdCDk0AS2ho1h/a8kde2QNKqWsn15xc3J1+HN8McPdXeZJpdj1lL+GVxpDi48QCMWgYMA2ulrK9cMPMOFwjJ485SUJZCysibUFwjF4gWz5lq6iCsI7B2m8pNQS7NHrboRh61/PhHoqMea3pcuABPWraTvfDsDuYtPo/D91d3Mu3L+X4zP/z+dLqSu9cl7ZX/hPZV/AEAAP//AQAA//+4UoR7zwAAAA==" | base64 -d | gzip -d > conf/kube_env.yaml

download-release
echo "== nodeup node config done =="
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -260,8 +260,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/compress.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/compress.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/compress.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/compress.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/compress/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -565,18 +565,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -253,7 +253,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amasterscontainerdexamplecom.Properti
ConfigBase: memfs://clusters.example.com/containerd.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: hzTvph7znsVtrWF8kMVzd9KkRVVxAkIh8iwI1opkpOc=
NodeupConfigHash: IbWnsylBkuns1O0FeCv6hqFZZr8GssLWnQ2s1wC20mc=
__EOF_KUBE_ENV
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -245,7 +245,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amasterscontainerdexamplecom.Properti
ConfigBase: memfs://clusters.example.com/containerd.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: 86k3hZ7252xFKlmh7jHcb+lNqyKuksz7gVCnr1GDSfc=
NodeupConfigHash: Mhycic2EaD0gmrEvMSamFE4YZhi6tRjy5hj7PKhdX9E=
__EOF_KUBE_ENV
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -240,7 +240,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/123.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: h8bP1p/uU9tjiG2m0gLnKantTlos4uy8RcrYQ1KlsYY=
NodeupConfigHash: /Vg3DqqQYlfgGZpWkVHv5lF1On1cz2w8JqkO8fd7jac=
__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -258,8 +258,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/123.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/123.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/123.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/123.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/digit/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -611,18 +611,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/123.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/123.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/123.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/123.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -261,7 +261,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amastersdockerexamplecom.Properties.L
ConfigBase: memfs://clusters.example.com/docker.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: X63Erwp16OybmfuTwCiDMDCIVoJXKa9cdUobNbuE77E=
NodeupConfigHash: /4aEDhd6ZvrR0+LJLuiuSVBMAkZtuMLSH2LNS13M26A=
__EOF_KUBE_ENV
Expand Down
Loading

0 comments on commit 322bb7d

Please sign in to comment.