Skip to content

Commit

Permalink
Run hack/update-expected.sh
Browse files Browse the repository at this point in the history
  • Loading branch information
hakman committed Aug 4, 2022
1 parent 00cfcf7 commit 9c39b19
Show file tree
Hide file tree
Showing 377 changed files with 2,292 additions and 624 deletions.
8 changes: 4 additions & 4 deletions pkg/model/components/etcdmanager/tests/interval/tasks.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -128,8 +128,8 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/events.yaml
Name: manifests-etcdmanager-events
Location: manifests/etcd/events-master-us-test-1a.yaml
Name: manifests-etcdmanager-events-master-us-test-1a
Public: null
---
Base: null
Expand Down Expand Up @@ -197,6 +197,6 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/main.yaml
Name: manifests-etcdmanager-main
Location: manifests/etcd/main-master-us-test-1a.yaml
Name: manifests-etcdmanager-main-master-us-test-1a
Public: null
8 changes: 4 additions & 4 deletions pkg/model/components/etcdmanager/tests/minimal/tasks.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -127,8 +127,8 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/events.yaml
Name: manifests-etcdmanager-events
Location: manifests/etcd/events-master-us-test-1a.yaml
Name: manifests-etcdmanager-events-master-us-test-1a
Public: null
---
Base: null
Expand Down Expand Up @@ -195,6 +195,6 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/main.yaml
Name: manifests-etcdmanager-main
Location: manifests/etcd/main-master-us-test-1a.yaml
Name: manifests-etcdmanager-main-master-us-test-1a
Public: null
Original file line number Diff line number Diff line change
Expand Up @@ -130,8 +130,8 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/events.yaml
Name: manifests-etcdmanager-events
Location: manifests/etcd/events-master-us-test-1a.yaml
Name: manifests-etcdmanager-events-master-us-test-1a
Public: null
---
Base: null
Expand Down Expand Up @@ -201,6 +201,6 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/main.yaml
Name: manifests-etcdmanager-main
Location: manifests/etcd/main-master-us-test-1a.yaml
Name: manifests-etcdmanager-main-master-us-test-1a
Public: null
8 changes: 4 additions & 4 deletions pkg/model/components/etcdmanager/tests/proxy/tasks.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -136,8 +136,8 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/events.yaml
Name: manifests-etcdmanager-events
Location: manifests/etcd/events-master-us-test-1a.yaml
Name: manifests-etcdmanager-events-master-us-test-1a
Public: null
---
Base: null
Expand Down Expand Up @@ -213,6 +213,6 @@ Contents: |
name: varlogetcd
status: {}
Lifecycle: ""
Location: manifests/etcd/main.yaml
Name: manifests-etcdmanager-main
Location: manifests/etcd/main-master-us-test-1a.yaml
Name: manifests-etcdmanager-main-master-us-test-1a
Public: null
Original file line number Diff line number Diff line change
Expand Up @@ -269,7 +269,7 @@ CloudProvider: aws
ConfigBase: memfs://tests/additionalobjects.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: +uuCKl4ntHHm5kkGrVdmHnLQCbg3Trwq1qKznkWda94=
NodeupConfigHash: RmsVGv/V5YQCNSmcuksfSFXXzqyGQhCh+iJIcLkNFnw=
__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -281,8 +281,8 @@ containerdConfig:
version: 1.1.3
version: 1.6.6
etcdManifests:
- memfs://tests/additionalobjects.example.com/manifests/etcd/main.yaml
- memfs://tests/additionalobjects.example.com/manifests/etcd/events.yaml
- memfs://tests/additionalobjects.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://tests/additionalobjects.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/additionalobjects/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -609,18 +609,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "tests/additionalobjects.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "tests/additionalobjects.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "tests/additionalobjects.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "tests/additionalobjects.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -439,7 +439,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amastersminimalexamplecom.Properties.
ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: fQk0XYnSl+mPW9dF85gn2ny0ga76H9fyudV6BhJUkl4=
NodeupConfigHash: o14f+FINvjAsuxKdAZ0TjAfBMvJ2DDjSLodwewNgm2w=
__EOF_KUBE_ENV
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -262,7 +262,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: fQk0XYnSl+mPW9dF85gn2ny0ga76H9fyudV6BhJUkl4=
NodeupConfigHash: o14f+FINvjAsuxKdAZ0TjAfBMvJ2DDjSLodwewNgm2w=
__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -275,8 +275,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/apiservernodes/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -698,18 +698,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -244,7 +244,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: pqJn3OPb3BOn0/zySTUOO9Ohmxs7XHR6+NnA93T1/Wc=
NodeupConfigHash: F56oipBerHI/IM58aPmR1lXYLb5nkwRq2LaknRGeeNQ=
__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -267,8 +267,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/minimal.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/aws-lb-controller/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -612,18 +612,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -244,7 +244,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/bastionuserdata.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: E+5eXSXOWJB4JVbmF015qXc8xA6ST6eqrnawd0g3bQw=
NodeupConfigHash: Yieg04ujnxQRIa+INE/cglnO0ggsDndm1PGNXvi2ejw=
__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -267,8 +267,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/bastionuserdata.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/bastionuserdata.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/bastionuserdata.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/bastionuserdata.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -862,18 +862,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -278,7 +278,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amasterscomplexexamplecom.Properties.
ConfigBase: memfs://clusters.example.com/complex.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: GNQRMg24fic+gsLSoOg73WKoCwABoHzgDD7cq+8ncWY=
NodeupConfigHash: 3b9RffHamFXtMtfyQ2tOx4yHr3EknTcwhu7rjAqHWYg=
__EOF_KUBE_ENV
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -277,7 +277,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/complex.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: GNQRMg24fic+gsLSoOg73WKoCwABoHzgDD7cq+8ncWY=
NodeupConfigHash: 3b9RffHamFXtMtfyQ2tOx4yHr3EknTcwhu7rjAqHWYg=

__EOF_KUBE_ENV

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -281,8 +281,8 @@ containerdConfig:
version: 1.1.3
version: 1.6.6
etcdManifests:
- memfs://clusters.example.com/complex.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/complex.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/complex.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/complex.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
Expand Down
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/complex/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -786,18 +786,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ ensure-install-dir

echo "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" | base64 -d | gzip -d > conf/cluster_spec.yaml

echo "H4sIAAAAAAAA/1TOTUvGMBAE4Ht+Re7StwriKwEPbRWr1PqB9L6k288kG7NJ9edL9dTr8MwwlaHUvwXa5h6DkvDNoiI3zGMJjEpatAOrPNcmccTAJ/wB6w2eNNlck/UB+RCKJ8cRnMbHQMm3YPcR2LtZ4iwix+wKjuiDDCr58odESz0m/3+hBp6UvF268oxj/Ozuh618aC+vX13zvFJzYVL4qteiGG+65fw+2fVO/AIAAP//AQAA///8NHNlzwAAAA==" | base64 -d | gzip -d > conf/kube_env.yaml
echo "H4sIAAAAAAAA/1TOQUsDMRAF4Ht+Re6yDQUVDHjQgLVql1YhnqfZWTeQZGImcf35sva018f3Hs8EasOx0I8fsGgJMwtDafRfj8CoZcQ4slbKhcYVC2/wF2IOuHEUlaOYC/IqFPvEFZLDXaGWe4jLCCzdrnFXkWu3hTV6p4BaHv6R6GnAli8XnoEnLdPdi4Xz/vjwZLzabU/2w1uoN6a3hzdfbr+vPu0cXs8nmq7vxR8AAAD//wEAAP//fxgFn88AAAA=" | base64 -d | gzip -d > conf/kube_env.yaml

download-release
echo "== nodeup node config done =="
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -267,8 +267,8 @@ containerdConfig:
logLevel: info
version: 1.4.13
etcdManifests:
- memfs://clusters.example.com/compress.example.com/manifests/etcd/main.yaml
- memfs://clusters.example.com/compress.example.com/manifests/etcd/events.yaml
- memfs://clusters.example.com/compress.example.com/manifests/etcd/main-master-us-test-1a.yaml
- memfs://clusters.example.com/compress.example.com/manifests/etcd/events-master-us-test-1a.yaml
staticManifests:
- key: kube-apiserver-healthcheck
path: manifests/static/kube-apiserver-healthcheck.yaml
12 changes: 6 additions & 6 deletions tests/integration/update_cluster/compress/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -565,18 +565,18 @@ resource "aws_s3_object" "kops-version-txt" {
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/events.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/events-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}

resource "aws_s3_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/main.yaml"
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/main-master-us-test-1a.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -253,7 +253,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amasterscontainerdexamplecom.Properti
ConfigBase: memfs://clusters.example.com/containerd.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: iGcSYZuJ7UsVWNg4X8FYZNV8JesxvakCq1azR5m7/FY=
NodeupConfigHash: PD5ABTQNteUF40+8ZSuwAgnwb6CYB6GGEHbEOuWIvH8=
__EOF_KUBE_ENV
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -245,7 +245,7 @@ Resources.AWSEC2LaunchTemplatemasterustest1amasterscontainerdexamplecom.Properti
ConfigBase: memfs://clusters.example.com/containerd.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: kc/gEJX+eTiSpdpDvadkfEtjS+tZZVPlvfW8Ir87YQo=
NodeupConfigHash: QM9QDAsAwaR0deQVZYZ7xgBlzVgDxplgKun0yxdWMe4=
__EOF_KUBE_ENV
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -240,7 +240,7 @@ CloudProvider: aws
ConfigBase: memfs://clusters.example.com/123.example.com
InstanceGroupName: master-us-test-1a
InstanceGroupRole: Master
NodeupConfigHash: tHzi7pEvay/m4yh5XjhhPvd4u53Mggg29WRXfu57s5I=
NodeupConfigHash: aSESxiNkzlEteRXSMSUwAliHhnaD+t1LL/hwlA+tiO8=
__EOF_KUBE_ENV

Expand Down
Loading

0 comments on commit 9c39b19

Please sign in to comment.