Run hack/update-expected.sh

This commit is contained in:
Ciprian Hacman 2022-06-29 17:15:36 +03:00
parent 7fbe0454f2
commit 520bd1e984
8 changed files with 12 additions and 12 deletions

View File

@ -53,8 +53,8 @@ spec:
selector: selector:
k8s-addon: storage-aws.addons.k8s.io k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0 version: 9.99.0
- id: k8s-1.23 - id: k8s-1.22
manifest: networking.projectcalico.org/k8s-1.23.yaml manifest: networking.projectcalico.org/k8s-1.22.yaml
manifestHash: 5bf23f352fc3520fd6737474625969d90eba2794fd5a748f75a71505eda06db3 manifestHash: 5bf23f352fc3520fd6737474625969d90eba2794fd5a748f75a71505eda06db3
name: networking.projectcalico.org name: networking.projectcalico.org
selector: selector:

View File

@ -720,10 +720,10 @@ resource "aws_s3_object" "minimal-ipv6-example-com-addons-limit-range-addons-k8s
server_side_encryption = "AES256" server_side_encryption = "AES256"
} }
resource "aws_s3_object" "minimal-ipv6-example-com-addons-networking-projectcalico-org-k8s-1-23" { resource "aws_s3_object" "minimal-ipv6-example-com-addons-networking-projectcalico-org-k8s-1-22" {
bucket = "testingBucket" bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.projectcalico.org-k8s-1.23_content") content = file("${path.module}/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.projectcalico.org-k8s-1.22_content")
key = "clusters.example.com/minimal-ipv6.example.com/addons/networking.projectcalico.org/k8s-1.23.yaml" key = "clusters.example.com/minimal-ipv6.example.com/addons/networking.projectcalico.org/k8s-1.22.yaml"
provider = aws.files provider = aws.files
server_side_encryption = "AES256" server_side_encryption = "AES256"
} }

View File

@ -53,8 +53,8 @@ spec:
selector: selector:
k8s-addon: storage-aws.addons.k8s.io k8s-addon: storage-aws.addons.k8s.io
version: 9.99.0 version: 9.99.0
- id: k8s-1.23 - id: k8s-1.22
manifest: networking.projectcalico.org/k8s-1.23.yaml manifest: networking.projectcalico.org/k8s-1.22.yaml
manifestHash: 9e337fe40420c5145cd25224a03c69838f945237096820cbe9abfaaa09c8b55a manifestHash: 9e337fe40420c5145cd25224a03c69838f945237096820cbe9abfaaa09c8b55a
name: networking.projectcalico.org name: networking.projectcalico.org
selector: selector:

View File

@ -878,10 +878,10 @@ resource "aws_s3_object" "privatecalico-example-com-addons-limit-range-addons-k8
server_side_encryption = "AES256" server_side_encryption = "AES256"
} }
resource "aws_s3_object" "privatecalico-example-com-addons-networking-projectcalico-org-k8s-1-23" { resource "aws_s3_object" "privatecalico-example-com-addons-networking-projectcalico-org-k8s-1-22" {
bucket = "testingBucket" bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_object_privatecalico.example.com-addons-networking.projectcalico.org-k8s-1.23_content") content = file("${path.module}/data/aws_s3_object_privatecalico.example.com-addons-networking.projectcalico.org-k8s-1.22_content")
key = "clusters.example.com/privatecalico.example.com/addons/networking.projectcalico.org/k8s-1.23.yaml" key = "clusters.example.com/privatecalico.example.com/addons/networking.projectcalico.org/k8s-1.22.yaml"
provider = aws.files provider = aws.files
server_side_encryption = "AES256" server_side_encryption = "AES256"
} }

View File

@ -48,7 +48,7 @@ spec:
version: 9.99.0 version: 9.99.0
- id: k8s-1.22 - id: k8s-1.22
manifest: networking.projectcalico.org.canal/k8s-1.22.yaml manifest: networking.projectcalico.org.canal/k8s-1.22.yaml
manifestHash: ff8bbeaba0ec65a71b29563278683bcfe8130d023a388b5321f347b1ff932136 manifestHash: 29ccdd676c3e714cff126169a51cdc21bf058b59346650d9e32cfd643462529d
name: networking.projectcalico.org.canal name: networking.projectcalico.org.canal
selector: selector:
role.kubernetes.io/networking: "1" role.kubernetes.io/networking: "1"

View File

@ -4739,7 +4739,7 @@ metadata:
--- ---
apiVersion: policy/v1 apiVersion: policy/v1beta1
kind: PodDisruptionBudget kind: PodDisruptionBudget
metadata: metadata:
creationTimestamp: null creationTimestamp: null