Skip to content

Commit abec21d

Browse files
committed
Bump bundle to version '0.34.0'
1 parent 11e9b43 commit abec21d

11 files changed

+463
-1957
lines changed

Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
VERSION ?= 0.33.0
1+
VERSION ?= 0.34.0
22

33
CHANNELS ?= alpha
44
BUNDLE_CHANNELS := --channels=$(CHANNELS)
@@ -251,7 +251,7 @@ $(LOCALBIN):
251251

252252
.PHONY: kind
253253
KIND = ./bin/kind
254-
KIND_VERSION ?= 0.33.0
254+
KIND_VERSION ?= 0.34.0
255255
kind: ## Download kind locally if necessary.
256256
ifeq (,$(wildcard $(KIND)))
257257
ifeq (,$(shell which kind 2>/dev/null))

bundle/manifests/k8s.mariadb.com_backups.yaml

Lines changed: 15 additions & 121 deletions
Original file line numberDiff line numberDiff line change
@@ -209,6 +209,13 @@ spec:
209209
successfully take a Backup.
210210
format: int32
211211
type: integer
212+
compression:
213+
description: Compression algorithm to be used in the Backup.
214+
enum:
215+
- none
216+
- bzip2
217+
- gzip
218+
type: string
212219
databases:
213220
description: Databases defines the logical databases to be backed
214221
up. If not provided, all databases are backed up.
@@ -300,9 +307,8 @@ spec:
300307
common container settings.
301308
properties:
302309
appArmorProfile:
303-
description: |-
304-
appArmorProfile is the AppArmor options to use by the containers in this pod.
305-
Note that this field cannot be set when spec.os.name is windows.
310+
description: AppArmorProfile defines a pod or container's AppArmor
311+
settings.
306312
properties:
307313
localhostProfile:
308314
description: |-
@@ -323,66 +329,24 @@ spec:
323329
- type
324330
type: object
325331
fsGroup:
326-
description: |-
327-
A special supplemental group that applies to all containers in a pod.
328-
Some volume types allow the Kubelet to change the ownership of that volume
329-
to be owned by the pod:
330-
331-
1. The owning GID will be the FSGroup
332-
2. The setgid bit is set (new files created in the volume will be owned by FSGroup)
333-
3. The permission bits are OR'd with rw-rw----
334-
335-
If unset, the Kubelet will not modify the ownership and permissions of any volume.
336-
Note that this field cannot be set when spec.os.name is windows.
337332
format: int64
338333
type: integer
339334
fsGroupChangePolicy:
340335
description: |-
341-
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
342-
before being exposed inside Pod. This field will only apply to
343-
volume types which support fsGroup based ownership(and permissions).
344-
It will have no effect on ephemeral volume types such as: secret, configmaps
345-
and emptydir.
346-
Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used.
347-
Note that this field cannot be set when spec.os.name is windows.
336+
PodFSGroupChangePolicy holds policies that will be used for applying fsGroup to a volume
337+
when volume is mounted.
348338
type: string
349339
runAsGroup:
350-
description: |-
351-
The GID to run the entrypoint of the container process.
352-
Uses runtime default if unset.
353-
May also be set in SecurityContext. If set in both SecurityContext and
354-
PodSecurityContext, the value specified in SecurityContext takes precedence
355-
for that container.
356-
Note that this field cannot be set when spec.os.name is windows.
357340
format: int64
358341
type: integer
359342
runAsNonRoot:
360-
description: |-
361-
Indicates that the container must run as a non-root user.
362-
If true, the Kubelet will validate the image at runtime to ensure that it
363-
does not run as UID 0 (root) and fail to start the container if it does.
364-
If unset or false, no such validation will be performed.
365-
May also be set in SecurityContext. If set in both SecurityContext and
366-
PodSecurityContext, the value specified in SecurityContext takes precedence.
367343
type: boolean
368344
runAsUser:
369-
description: |-
370-
The UID to run the entrypoint of the container process.
371-
Defaults to user specified in image metadata if unspecified.
372-
May also be set in SecurityContext. If set in both SecurityContext and
373-
PodSecurityContext, the value specified in SecurityContext takes precedence
374-
for that container.
375-
Note that this field cannot be set when spec.os.name is windows.
376345
format: int64
377346
type: integer
378347
seLinuxOptions:
379-
description: |-
380-
The SELinux context to be applied to all containers.
381-
If unspecified, the container runtime will allocate a random SELinux context for each
382-
container. May also be set in SecurityContext. If set in
383-
both SecurityContext and PodSecurityContext, the value specified in SecurityContext
384-
takes precedence for that container.
385-
Note that this field cannot be set when spec.os.name is windows.
348+
description: SELinuxOptions are the labels to be applied to the
349+
container
386350
properties:
387351
level:
388352
description: Level is SELinux level label that applies to
@@ -403,8 +367,8 @@ spec:
403367
type: object
404368
seccompProfile:
405369
description: |-
406-
The seccomp options to use by the containers in this pod.
407-
Note that this field cannot be set when spec.os.name is windows.
370+
SeccompProfile defines a pod/container's seccomp profile settings.
371+
Only one profile source may be set.
408372
properties:
409373
localhostProfile:
410374
description: |-
@@ -426,81 +390,11 @@ spec:
426390
- type
427391
type: object
428392
supplementalGroups:
429-
description: |-
430-
A list of groups applied to the first process run in each container, in
431-
addition to the container's primary GID and fsGroup (if specified). If
432-
the SupplementalGroupsPolicy feature is enabled, the
433-
supplementalGroupsPolicy field determines whether these are in addition
434-
to or instead of any group memberships defined in the container image.
435-
If unspecified, no additional groups are added, though group memberships
436-
defined in the container image may still be used, depending on the
437-
supplementalGroupsPolicy field.
438-
Note that this field cannot be set when spec.os.name is windows.
439393
items:
440394
format: int64
441395
type: integer
442396
type: array
443397
x-kubernetes-list-type: atomic
444-
supplementalGroupsPolicy:
445-
description: |-
446-
Defines how supplemental groups of the first container processes are calculated.
447-
Valid values are "Merge" and "Strict". If not specified, "Merge" is used.
448-
(Alpha) Using the field requires the SupplementalGroupsPolicy feature gate to be enabled
449-
and the container runtime must implement support for this feature.
450-
Note that this field cannot be set when spec.os.name is windows.
451-
type: string
452-
sysctls:
453-
description: |-
454-
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported
455-
sysctls (by the container runtime) might fail to launch.
456-
Note that this field cannot be set when spec.os.name is windows.
457-
items:
458-
description: Sysctl defines a kernel parameter to be set
459-
properties:
460-
name:
461-
description: Name of a property to set
462-
type: string
463-
value:
464-
description: Value of a property to set
465-
type: string
466-
required:
467-
- name
468-
- value
469-
type: object
470-
type: array
471-
x-kubernetes-list-type: atomic
472-
windowsOptions:
473-
description: |-
474-
The Windows specific settings applied to all containers.
475-
If unspecified, the options within a container's SecurityContext will be used.
476-
If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
477-
Note that this field cannot be set when spec.os.name is linux.
478-
properties:
479-
gmsaCredentialSpec:
480-
description: |-
481-
GMSACredentialSpec is where the GMSA admission webhook
482-
(https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the
483-
GMSA credential spec named by the GMSACredentialSpecName field.
484-
type: string
485-
gmsaCredentialSpecName:
486-
description: GMSACredentialSpecName is the name of the GMSA
487-
credential spec to use.
488-
type: string
489-
hostProcess:
490-
description: |-
491-
HostProcess determines if a container should be run as a 'Host Process' container.
492-
All of a Pod's containers must have the same effective HostProcess value
493-
(it is not allowed to have a mix of HostProcess containers and non-HostProcess containers).
494-
In addition, if HostProcess is true then HostNetwork must also be set to true.
495-
type: boolean
496-
runAsUserName:
497-
description: |-
498-
The UserName in Windows to run the entrypoint of the container process.
499-
Defaults to the user specified in image metadata if unspecified.
500-
May also be set in PodSecurityContext. If set in both SecurityContext and
501-
PodSecurityContext, the value specified in SecurityContext takes precedence.
502-
type: string
503-
type: object
504398
type: object
505399
priorityClassName:
506400
description: PriorityClassName to be used in the Pod.

0 commit comments

Comments
 (0)