doc/tutorial/kubernetes: update to minimize diffs down the line

Change-Id: I1b257ac34b842e1e7c84015957d90f0f40df4b73
Reviewed-on: https://cue-review.googlesource.com/c/cue/+/5641
Reviewed-by: Marcel van Lohuizen <mpvl@golang.org>
diff --git a/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/api/core/v1/types_go_gen.cue b/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/api/core/v1/types_go_gen.cue
index edec7d8..9dc5eab 100644
--- a/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/api/core/v1/types_go_gen.cue
+++ b/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/api/core/v1/types_go_gen.cue
@@ -368,7 +368,6 @@
 
 	// volumeMode defines if a volume is intended to be used with a formatted filesystem
 	// or to remain in raw block state. Value of Filesystem is implied when not included in spec.
-	// This is a beta feature.
 	// +optional
 	volumeMode?: null | PersistentVolumeMode @go(VolumeMode,*PersistentVolumeMode) @protobuf(8,bytes,opt,casttype=PersistentVolumeMode)
 
@@ -511,15 +510,18 @@
 
 	// volumeMode defines what type of volume is required by the claim.
 	// Value of Filesystem is implied when not included in claim spec.
-	// This is a beta feature.
 	// +optional
 	volumeMode?: null | PersistentVolumeMode @go(VolumeMode,*PersistentVolumeMode) @protobuf(6,bytes,opt,casttype=PersistentVolumeMode)
 
-	// This field requires the VolumeSnapshotDataSource alpha feature gate to be
-	// enabled and currently VolumeSnapshot is the only supported data source.
-	// If the provisioner can support VolumeSnapshot data source, it will create
-	// a new volume and data will be restored to the volume at the same time.
-	// If the provisioner does not support VolumeSnapshot data source, volume will
+	// This field can be used to specify either:
+	// * An existing VolumeSnapshot object (snapshot.storage.k8s.io/VolumeSnapshot - Beta)
+	// * An existing PVC (PersistentVolumeClaim)
+	// * An existing custom resource/object that implements data population (Alpha)
+	// In order to use VolumeSnapshot object types, the appropriate feature gate
+	// must be enabled (VolumeSnapshotDataSource or AnyVolumeDataSource)
+	// If the provisioner or an external controller can support the specified data source,
+	// it will create a new volume based on the contents of the specified data source.
+	// If the specified data source is not supported, the volume will
 	// not be created and the failure will be reported as an event.
 	// In the future, we plan to support more data source types and the behavior
 	// of the provisioner may change.
@@ -1019,11 +1021,13 @@
 enumStorageMedium ::
 	StorageMediumDefault |
 	StorageMediumMemory |
-	StorageMediumHugePages
+	StorageMediumHugePages |
+	StorageMediumHugePagesPrefix
 
-StorageMediumDefault ::   StorageMedium & ""
-StorageMediumMemory ::    StorageMedium & "Memory"
-StorageMediumHugePages :: StorageMedium & "HugePages"
+StorageMediumDefault ::         StorageMedium & ""
+StorageMediumMemory ::          StorageMedium & "Memory"
+StorageMediumHugePages ::       StorageMedium & "HugePages"
+StorageMediumHugePagesPrefix :: StorageMedium & "HugePages-"
 
 // Protocol defines network protocols supported for things like container ports.
 Protocol :: string // enumProtocol
@@ -2475,7 +2479,6 @@
 	volumeMounts?: [...VolumeMount] @go(VolumeMounts,[]VolumeMount) @protobuf(9,bytes,rep)
 
 	// volumeDevices is the list of block devices to be used by the container.
-	// This is a beta feature.
 	// +patchMergeKey=devicePath
 	// +patchStrategy=merge
 	// +optional
@@ -2501,7 +2504,7 @@
 	// This can be used to provide different probe parameters at the beginning of a Pod's lifecycle,
 	// when it might take a long time to load data or warm a cache, than during steady-state operation.
 	// This cannot be updated.
-	// This is an alpha feature enabled by the StartupProbe feature flag.
+	// This is a beta feature enabled by the StartupProbe feature flag.
 	// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
 	// +optional
 	startupProbe?: null | Probe @go(StartupProbe,*Probe) @protobuf(22,bytes,opt)
@@ -3081,7 +3084,7 @@
 	// Required. The taint key to be applied to a node.
 	key: string @go(Key) @protobuf(1,bytes,opt)
 
-	// Required. The taint value corresponding to the taint key.
+	// The taint value corresponding to the taint key.
 	// +optional
 	value?: string @go(Value) @protobuf(2,bytes,opt)
 
@@ -3407,8 +3410,7 @@
 
 	// TopologySpreadConstraints describes how a group of pods ought to spread across topology
 	// domains. Scheduler will schedule pods in a way which abides by the constraints.
-	// This field is alpha-level and is only honored by clusters that enables the EvenPodsSpread
-	// feature.
+	// This field is only honored by clusters that enable the EvenPodsSpread feature.
 	// All topologySpreadConstraints are ANDed.
 	// +optional
 	// +patchMergeKey=topologyKey
@@ -3499,6 +3501,25 @@
 	hostnames?: [...string] @go(Hostnames,[]string) @protobuf(2,bytes,rep)
 }
 
+// PodFSGroupChangePolicy holds policies that will be used for applying fsGroup to a volume
+// when volume is mounted.
+PodFSGroupChangePolicy :: string // enumPodFSGroupChangePolicy
+
+enumPodFSGroupChangePolicy ::
+	FSGroupChangeOnRootMismatch |
+	FSGroupChangeAlways
+
+// FSGroupChangeOnRootMismatch indicates that volume's ownership and permissions will be changed
+// only when permission and ownership of root directory does not match with expected
+// permissions on the volume. This can help shorten the time it takes to change
+// ownership and permissions of a volume.
+FSGroupChangeOnRootMismatch :: PodFSGroupChangePolicy & "OnRootMismatch"
+
+// FSGroupChangeAlways indicates that volume's ownership and permissions
+// should always be changed whenever volume is mounted inside a Pod. This the default
+// behavior.
+FSGroupChangeAlways :: PodFSGroupChangePolicy & "Always"
+
 // PodSecurityContext holds pod-level security attributes and common container settings.
 // Some fields are also present in container.securityContext.  Field values of
 // container.securityContext take precedence over field values of PodSecurityContext.
@@ -3564,6 +3585,15 @@
 	// sysctls (by the container runtime) might fail to launch.
 	// +optional
 	sysctls?: [...Sysctl] @go(Sysctls,[]Sysctl) @protobuf(7,bytes,rep)
+
+	// fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
+	// before being exposed inside Pod. This field will only apply to
+	// volume types which support fsGroup based ownership(and permissions).
+	// It will have no effect on ephemeral volume types such as: secret, configmaps
+	// and emptydir.
+	// Valid values are "OnRootMismatch" and "Always". If not specified defaults to "Always".
+	// +optional
+	fsGroupChangePolicy?: null | PodFSGroupChangePolicy @go(FSGroupChangePolicy,*PodFSGroupChangePolicy) @protobuf(9,bytes,opt)
 }
 
 // PodQOSClass defines the supported qos classes of Pods.
@@ -3697,7 +3727,6 @@
 	volumeMounts?: [...VolumeMount] @go(VolumeMounts,[]VolumeMount) @protobuf(9,bytes,rep)
 
 	// volumeDevices is the list of block devices to be used by the container.
-	// This is a beta feature.
 	// +patchMergeKey=devicePath
 	// +patchStrategy=merge
 	// +optional
@@ -4392,6 +4421,16 @@
 	// +optional
 	protocol?: Protocol @go(Protocol) @protobuf(2,bytes,opt,casttype=Protocol)
 
+	// The application protocol for this port.
+	// This field follows standard Kubernetes label syntax.
+	// Un-prefixed names are reserved for IANA standard service names (as per
+	// RFC-6335 and http://www.iana.org/assignments/service-names).
+	// Non-standard protocols should use prefixed names such as
+	// mycompany.com/my-custom-protocol.
+	// Field can be enabled with ServiceAppProtocol feature gate.
+	// +optional
+	appProtocol?: null | string @go(AppProtocol,*string) @protobuf(6,bytes,opt)
+
 	// The port that will be exposed by this service.
 	port: int32 @go(Port) @protobuf(3,varint,opt)
 
@@ -4600,6 +4639,16 @@
 	// Default is TCP.
 	// +optional
 	protocol?: Protocol @go(Protocol) @protobuf(3,bytes,opt,casttype=Protocol)
+
+	// The application protocol for this port.
+	// This field follows standard Kubernetes label syntax.
+	// Un-prefixed names are reserved for IANA standard service names (as per
+	// RFC-6335 and http://www.iana.org/assignments/service-names).
+	// Non-standard protocols should use prefixed names such as
+	// mycompany.com/my-custom-protocol.
+	// Field can be enabled with ServiceAppProtocol feature gate.
+	// +optional
+	appProtocol?: null | string @go(AppProtocol,*string) @protobuf(4,bytes,opt)
 }
 
 // EndpointsList is a list of endpoints.
@@ -5412,6 +5461,20 @@
 }
 
 // ObjectReference contains enough information to let you inspect or modify the referred object.
+// ---
+// New uses of this type are discouraged because of difficulty describing its usage when embedded in APIs.
+//  1. Ignored fields.  It includes many fields which are not generally honored.  For instance, ResourceVersion and FieldPath are both very rarely valid in actual usage.
+//  2. Invalid usage help.  It is impossible to add specific help for individual usage.  In most embedded usages, there are particular
+//     restrictions like, "must refer only to types A and B" or "UID not honored" or "name must be restricted".
+//     Those cannot be well described when embedded.
+//  3. Inconsistent validation.  Because the usages are different, the validation rules are different by usage, which makes it hard for users to predict what will happen.
+//  4. The fields are both imprecise and overly precise.  Kind is not a precise mapping to a URL. This can produce ambiguity
+//     during interpretation and require a REST mapping.  In most cases, the dependency is on the group,resource tuple
+//     and the version of the actual struct is irrelevant.
+//  5. We cannot easily change it.  Because this type is embedded in many locations, updates to this type
+//     will affect numerous schemas.  Don't make new APIs embed an underspecified API type they do not control.
+// Instead of using this type, create a locally provided and used type that is well-focused on your reference.
+// For example, ServiceReferences for admission registration: https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 .
 // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
 ObjectReference :: {
 	// Kind of the referent.
@@ -5635,8 +5698,7 @@
 // LimitRangeItem defines a min/max usage limit for any resource that matches on kind.
 LimitRangeItem :: {
 	// Type of resource that this limit applies to.
-	// +optional
-	type?: LimitType @go(Type) @protobuf(1,bytes,opt,casttype=LimitType)
+	type: LimitType @go(Type) @protobuf(1,bytes,opt,casttype=LimitType)
 
 	// Max usage constraints on this kind by resource name.
 	// +optional
@@ -5890,6 +5952,14 @@
 	// +optional
 	metadata?: metav1.ObjectMeta @go(ObjectMeta) @protobuf(1,bytes,opt)
 
+	// Immutable, if set to true, ensures that data stored in the Secret cannot
+	// be updated (only object metadata can be modified).
+	// If not set to true, the field can be modified at any time.
+	// Defaulted to nil.
+	// This is an alpha field enabled by ImmutableEphemeralVolumes feature gate.
+	// +optional
+	immutable?: null | bool @go(Immutable,*bool) @protobuf(5,varint,opt)
+
 	// Data contains the secret data. Each key must consist of alphanumeric
 	// characters, '-', '_' or '.'. The serialized form of the secret data is a
 	// base64 encoded string, representing the arbitrary (possibly non-string)
@@ -6037,6 +6107,14 @@
 	// +optional
 	metadata?: metav1.ObjectMeta @go(ObjectMeta) @protobuf(1,bytes,opt)
 
+	// Immutable, if set to true, ensures that data stored in the ConfigMap cannot
+	// be updated (only object metadata can be modified).
+	// If not set to true, the field can be modified at any time.
+	// Defaulted to nil.
+	// This is an alpha field enabled by ImmutableEphemeralVolumes feature gate.
+	// +optional
+	immutable?: null | bool @go(Immutable,*bool) @protobuf(4,varint,opt)
+
 	// Data contains the configuration data.
 	// Each key must consist of alphanumeric characters, '-', '_' or '.'.
 	// Values with non-UTF-8 byte sequences must use the BinaryData field.
@@ -6286,14 +6364,12 @@
 // WindowsSecurityContextOptions contain Windows-specific options and credentials.
 WindowsSecurityContextOptions :: {
 	// GMSACredentialSpecName is the name of the GMSA credential spec to use.
-	// This field is alpha-level and is only honored by servers that enable the WindowsGMSA feature flag.
 	// +optional
 	gmsaCredentialSpecName?: null | string @go(GMSACredentialSpecName,*string) @protobuf(1,bytes,opt)
 
 	// GMSACredentialSpec is where the GMSA admission webhook
 	// (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the
 	// GMSA credential spec named by the GMSACredentialSpecName field.
-	// This field is alpha-level and is only honored by servers that enable the WindowsGMSA feature flag.
 	// +optional
 	gmsaCredentialSpec?: null | string @go(GMSACredentialSpec,*string) @protobuf(2,bytes,opt)
 
@@ -6301,7 +6377,6 @@
 	// Defaults to the user specified in image metadata if unspecified.
 	// May also be set in PodSecurityContext. If set in both SecurityContext and
 	// PodSecurityContext, the value specified in SecurityContext takes precedence.
-	// This field is beta-level and may be disabled with the WindowsRunAsUserName feature flag.
 	// +optional
 	runAsUserName?: null | string @go(RunAsUserName,*string) @protobuf(3,bytes,opt)
 }
diff --git a/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/api/core/v1/well_known_taints_go_gen.cue b/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/api/core/v1/well_known_taints_go_gen.cue
index c6f06b6..7f835d1 100644
--- a/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/api/core/v1/well_known_taints_go_gen.cue
+++ b/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/api/core/v1/well_known_taints_go_gen.cue
@@ -5,37 +5,30 @@
 package v1
 
 // TaintNodeNotReady will be added when node is not ready
-// and feature-gate for TaintBasedEvictions flag is enabled,
 // and removed when node becomes ready.
 TaintNodeNotReady :: "node.kubernetes.io/not-ready"
 
 // TaintNodeUnreachable will be added when node becomes unreachable
 // (corresponding to NodeReady status ConditionUnknown)
-// and feature-gate for TaintBasedEvictions flag is enabled,
 // and removed when node becomes reachable (NodeReady status ConditionTrue).
 TaintNodeUnreachable :: "node.kubernetes.io/unreachable"
 
 // TaintNodeUnschedulable will be added when node becomes unschedulable
-// and feature-gate for TaintNodesByCondition flag is enabled,
 // and removed when node becomes scheduable.
 TaintNodeUnschedulable :: "node.kubernetes.io/unschedulable"
 
 // TaintNodeMemoryPressure will be added when node has memory pressure
-// and feature-gate for TaintNodesByCondition flag is enabled,
 // and removed when node has enough memory.
 TaintNodeMemoryPressure :: "node.kubernetes.io/memory-pressure"
 
 // TaintNodeDiskPressure will be added when node has disk pressure
-// and feature-gate for TaintNodesByCondition flag is enabled,
 // and removed when node has enough disk.
 TaintNodeDiskPressure :: "node.kubernetes.io/disk-pressure"
 
 // TaintNodeNetworkUnavailable will be added when node's network is unavailable
-// and feature-gate for TaintNodesByCondition flag is enabled,
 // and removed when network becomes ready.
 TaintNodeNetworkUnavailable :: "node.kubernetes.io/network-unavailable"
 
 // TaintNodePIDPressure will be added when node has pid pressure
-// and feature-gate for TaintNodesByCondition flag is enabled,
 // and removed when node has enough disk.
 TaintNodePIDPressure :: "node.kubernetes.io/pid-pressure"
diff --git a/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/apimachinery/pkg/watch/watch_go_gen.cue b/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/apimachinery/pkg/watch/watch_go_gen.cue
index ec357b7..ebf1576 100644
--- a/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/apimachinery/pkg/watch/watch_go_gen.cue
+++ b/doc/tutorial/kubernetes/quick/cue.mod/gen/k8s.io/apimachinery/pkg/watch/watch_go_gen.cue
@@ -43,8 +43,5 @@
 	Object: runtime.Object
 }
 
-// FakeWatcher lets you test anything that consumes a watch.Interface; threadsafe.
-FakeWatcher :: Stopped: bool
-
 // RaceFreeFakeWatcher lets you test anything that consumes a watch.Interface; threadsafe.
 RaceFreeFakeWatcher :: Stopped: bool