diff --git a/.github/workflows/update-sdk.yml b/.github/workflows/update-sdk.yml index 4a30a70fa6..8dd7420552 100644 --- a/.github/workflows/update-sdk.yml +++ b/.github/workflows/update-sdk.yml @@ -27,6 +27,7 @@ jobs: - name: Update Atlas SDK run: | ./scripts/update-sdk.sh + make clean gen-crds - name: Check for Changes id: check_changes run: | diff --git a/api/v1/alert_configurations.go b/api/v1/alert_configurations.go index 104b49e687..ebc74cc931 100644 --- a/api/v1/alert_configurations.go +++ b/api/v1/alert_configurations.go @@ -19,7 +19,7 @@ import ( "strconv" "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" diff --git a/api/v1/alert_configurations_test.go b/api/v1/alert_configurations_test.go index d98696ebe8..593a0bf11d 100644 --- a/api/v1/alert_configurations_test.go +++ b/api/v1/alert_configurations_test.go @@ -21,7 +21,7 @@ import ( "github.com/google/go-cmp/cmp" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" ) diff --git a/api/v1/atlasbackupcompliancepolicy_types.go b/api/v1/atlasbackupcompliancepolicy_types.go index 1aef6d2de6..cb875e03b1 100644 --- a/api/v1/atlasbackupcompliancepolicy_types.go +++ b/api/v1/atlasbackupcompliancepolicy_types.go @@ -17,7 +17,7 @@ package v1 import ( "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" diff --git a/api/v1/atlasbackupcompliancepolicy_types_test.go b/api/v1/atlasbackupcompliancepolicy_types_test.go index 55e7f39a81..f79be7c243 100644 --- a/api/v1/atlasbackupcompliancepolicy_types_test.go +++ b/api/v1/atlasbackupcompliancepolicy_types_test.go @@ -20,7 +20,7 @@ import ( "github.com/google/go-cmp/cmp" "github.com/stretchr/testify/assert" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/api/v1/atlasbackupschedule_types.go b/api/v1/atlasbackupschedule_types.go index 13954c5675..c9727c4e19 100644 --- a/api/v1/atlasbackupschedule_types.go +++ b/api/v1/atlasbackupschedule_types.go @@ -17,7 +17,7 @@ package v1 import ( "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" diff --git a/api/v1/atlasbackupschedule_types_test.go b/api/v1/atlasbackupschedule_types_test.go index a40d6d82f1..27e4a15e21 100644 --- a/api/v1/atlasbackupschedule_types_test.go +++ b/api/v1/atlasbackupschedule_types_test.go @@ -18,7 +18,7 @@ import ( "testing" "github.com/go-test/deep" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" ) diff --git a/api/v1/atlasdatabaseuser_types.go b/api/v1/atlasdatabaseuser_types.go index 870d01f17b..883d7f27b2 100644 --- a/api/v1/atlasdatabaseuser_types.go +++ b/api/v1/atlasdatabaseuser_types.go @@ -18,7 +18,7 @@ import ( "context" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/api/v1/atlasdeployment_types.go b/api/v1/atlasdeployment_types.go index 35f3acc1ab..96d35d5999 100644 --- a/api/v1/atlasdeployment_types.go +++ b/api/v1/atlasdeployment_types.go @@ -15,7 +15,7 @@ package v1 import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/api/v1/atlasfederatedauth_types.go b/api/v1/atlasfederatedauth_types.go index 558f12de3d..978a20a3d6 100644 --- a/api/v1/atlasfederatedauth_types.go +++ b/api/v1/atlasfederatedauth_types.go @@ -18,7 +18,7 @@ import ( "errors" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/api/v1/atlasfederatedauth_types_test.go b/api/v1/atlasfederatedauth_types_test.go index 5d787bb60f..57049d8283 100644 --- a/api/v1/atlasfederatedauth_types_test.go +++ b/api/v1/atlasfederatedauth_types_test.go @@ -20,7 +20,7 @@ import ( "github.com/go-test/deep" "github.com/google/go-cmp/cmp" "github.com/stretchr/testify/assert" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/api/v1/atlasproject_types_test.go b/api/v1/atlasproject_types_test.go index dee9a1ebd1..c860f4c138 100644 --- a/api/v1/atlasproject_types_test.go +++ b/api/v1/atlasproject_types_test.go @@ -23,7 +23,7 @@ import ( "github.com/google/go-cmp/cmp" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "k8s.io/apimachinery/pkg/runtime" "sigs.k8s.io/yaml" diff --git a/api/v1/atlasteam_types.go b/api/v1/atlasteam_types.go index 1a9236fe68..8efae2895f 100644 --- a/api/v1/atlasteam_types.go +++ b/api/v1/atlasteam_types.go @@ -15,7 +15,7 @@ package v1 import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" diff --git a/api/v1/networkpeer.go b/api/v1/networkpeer.go index 9646ee91c8..ad671a15aa 100644 --- a/api/v1/networkpeer.go +++ b/api/v1/networkpeer.go @@ -15,7 +15,7 @@ package v1 import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/compat" diff --git a/api/v1/privateendpoint.go b/api/v1/privateendpoint.go index 160c47e969..f57c8609b6 100644 --- a/api/v1/privateendpoint.go +++ b/api/v1/privateendpoint.go @@ -15,7 +15,7 @@ package v1 import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/status" diff --git a/api/v1/project_settings.go b/api/v1/project_settings.go index ef7ed2fc22..c66fc9394e 100644 --- a/api/v1/project_settings.go +++ b/api/v1/project_settings.go @@ -15,7 +15,7 @@ package v1 import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) type ProjectSettings struct { diff --git a/api/v1/project_teams.go b/api/v1/project_teams.go index 5e1c0ca9aa..df1e7d100b 100644 --- a/api/v1/project_teams.go +++ b/api/v1/project_teams.go @@ -15,7 +15,7 @@ package v1 import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" ) @@ -44,8 +44,8 @@ type Team struct { func (in *Team) ToAtlas(teamID string) admin.TeamRole { roleNames := make([]string, 0, len(in.Roles)) result := admin.TeamRole{ - TeamId: &teamID, - RoleNames: &roleNames, + TeamId: teamID, + RoleNames: roleNames, } for _, role := range in.Roles { diff --git a/api/v1/status/alert_configurations.go b/api/v1/status/alert_configurations.go index 9ca2ad17a9..f198d7720f 100644 --- a/api/v1/status/alert_configurations.go +++ b/api/v1/status/alert_configurations.go @@ -19,7 +19,7 @@ import ( "fmt" "strconv" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/compat" diff --git a/api/v1/status/networkpeer.go b/api/v1/status/networkpeer.go index e4d7e41f10..88482a1fc7 100644 --- a/api/v1/status/networkpeer.go +++ b/api/v1/status/networkpeer.go @@ -15,7 +15,7 @@ package status import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" ) diff --git a/config/openapi2crd.yaml b/config/openapi2crd.yaml index c358160cac..f24110929f 100644 --- a/config/openapi2crd.yaml +++ b/config/openapi2crd.yaml @@ -53,7 +53,7 @@ spec: openapi: - name: v20250312 - package: go.mongodb.org/atlas-sdk/v20250312009/admin + package: go.mongodb.org/atlas-sdk/v20250312011/admin crd: - gvk: diff --git a/devbox.json b/devbox.json index cb21bd5ed6..21b4139790 100644 --- a/devbox.json +++ b/devbox.json @@ -33,6 +33,7 @@ "version": "latest", "platforms": ["aarch64-darwin", "x86_64-darwin"] }, - "path:./flakes/go": {} + "path:./flakes/go": {}, + "gnused": "latest" } } diff --git a/devbox.lock b/devbox.lock index 022abf2209..4353831100 100644 --- a/devbox.lock +++ b/devbox.lock @@ -653,6 +653,70 @@ "last_modified": "2025-12-11T12:49:49Z", "resolved": "github:NixOS/nixpkgs/f997fa0f94fb1ce55bccb97f60d41412ae8fde4c?lastModified=1765457389" }, + "gnused@latest": { + "last_modified": "2025-11-23T21:50:36Z", + "resolved": "github:NixOS/nixpkgs/ee09932cedcef15aaf476f9343d1dea2cb77e261#gnused", + "source": "devbox-search", + "version": "4.9", + "systems": { + "aarch64-darwin": { + "outputs": [ + { + "name": "out", + "path": "/nix/store/ipgh18959gxm39fhy7b9db4cn6vl0p0j-gnused-4.9", + "default": true + }, + { + "name": "info", + "path": "/nix/store/nwbb6v11d385qkvh1f320jw28vpzjv4h-gnused-4.9-info" + } + ], + "store_path": "/nix/store/ipgh18959gxm39fhy7b9db4cn6vl0p0j-gnused-4.9" + }, + "aarch64-linux": { + "outputs": [ + { + "name": "out", + "path": "/nix/store/xcjag3jcsfdmixjcm3xckkrkcl5r48b6-gnused-4.9", + "default": true + }, + { + "name": "info", + "path": "/nix/store/ck8g1q6qp5ab3v0kgysh77prz950qqc3-gnused-4.9-info" + } + ], + "store_path": "/nix/store/xcjag3jcsfdmixjcm3xckkrkcl5r48b6-gnused-4.9" + }, + "x86_64-darwin": { + "outputs": [ + { + "name": "out", + "path": "/nix/store/7w2wwlbr9rmjlr34ng42hbp00hwjaawz-gnused-4.9", + "default": true + }, + { + "name": "info", + "path": "/nix/store/nq47w0avvqk2r0ln7splxxqrmbk17h8n-gnused-4.9-info" + } + ], + "store_path": "/nix/store/7w2wwlbr9rmjlr34ng42hbp00hwjaawz-gnused-4.9" + }, + "x86_64-linux": { + "outputs": [ + { + "name": "out", + "path": "/nix/store/drc7kang929jaza6cy9zdx10s4gw1z5p-gnused-4.9", + "default": true + }, + { + "name": "info", + "path": "/nix/store/p0xbl3agrrybwbqykdsh18yw1vf5n0p8-gnused-4.9-info" + } + ], + "store_path": "/nix/store/drc7kang929jaza6cy9zdx10s4gw1z5p-gnused-4.9" + } + } + }, "go-licenses@1.6.0": { "last_modified": "2025-11-23T21:50:36Z", "resolved": "github:NixOS/nixpkgs/ee09932cedcef15aaf476f9343d1dea2cb77e261#go-licenses", diff --git a/go.mod b/go.mod index c51b76677c..9294ada6df 100644 --- a/go.mod +++ b/go.mod @@ -34,7 +34,7 @@ require ( github.com/sethvargo/go-password v0.3.1 github.com/stretchr/testify v1.11.1 github.com/yudai/gojsondiff v1.0.0 - go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0 + go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0 go.mongodb.org/mongo-driver v1.17.6 go.uber.org/zap v1.27.1 golang.org/x/sync v0.19.0 diff --git a/go.sum b/go.sum index b731cbfb75..7d231d5b1b 100644 --- a/go.sum +++ b/go.sum @@ -373,8 +373,8 @@ github.com/yudai/pp v2.0.1+incompatible/go.mod h1:PuxR/8QJ7cyCkFp/aUDS+JY727OFEZ github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY= -go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0 h1:iaFFJcOkT7U5WcuOl8XVAOkPwBlP27coQGJUiDVd3+8= -go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0/go.mod h1:fusey5SPjrcmUiJ+MxvYtEgV7N/lkW3SjacSYYejlAc= +go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0 h1:yIb9nnhXfF62m6s83pZvGJpPUOQZtAgDWp2b0dgKHmo= +go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0/go.mod h1:uP/+Tal6pOGcRMAptkDxULKvpI6frOux17vs+rRza/s= go.mongodb.org/mongo-driver v1.17.6 h1:87JUG1wZfWsr6rIz3ZmpH90rL5tea7O3IHuSwHUpsss= go.mongodb.org/mongo-driver v1.17.6/go.mod h1:Hy04i7O2kC4RS06ZrhPRqj/u4DTYkFDAAccj+rVKqgQ= go.opentelemetry.io/auto/sdk v1.1.0 h1:cH53jehLUN6UFLY71z+NDOiNJqDdPRaXzTel0sJySYA= diff --git a/internal/controller/atlas/client.go b/internal/controller/atlas/client.go index e24cbdf331..a7ef5ab4d3 100644 --- a/internal/controller/atlas/client.go +++ b/internal/controller/atlas/client.go @@ -14,7 +14,7 @@ package atlas -import "go.mongodb.org/atlas-sdk/v20250312009/admin" +import "go.mongodb.org/atlas-sdk/v20250312011/admin" func NewClient(domain, publicKey, privateKey string) (*admin.APIClient, error) { return admin.NewClient( diff --git a/internal/controller/atlas/provider.go b/internal/controller/atlas/provider.go index e3e9d225ec..dd2fdb312b 100644 --- a/internal/controller/atlas/provider.go +++ b/internal/controller/atlas/provider.go @@ -24,7 +24,7 @@ import ( "strings" "github.com/mongodb-forks/digest" - v20250312009 "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312011 "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" @@ -46,7 +46,7 @@ type Provider interface { } type ClientSet struct { - SdkClient20250312009 *v20250312009.APIClient + SdkClient20250312011 *v20250312011.APIClient } type ProductionProvider struct { @@ -133,16 +133,16 @@ func (p *ProductionProvider) SdkClientSet(ctx context.Context, creds *Credential httpClient := &http.Client{Transport: transport} - clientv20250312009, err := v20250312009.NewClient( - v20250312009.UseBaseURL(p.domain), - v20250312009.UseHTTPClient(httpClient), - v20250312009.UseUserAgent(operatorUserAgent())) + clientv20250312011, err := v20250312011.NewClient( + v20250312011.UseBaseURL(p.domain), + v20250312011.UseHTTPClient(httpClient), + v20250312011.UseUserAgent(operatorUserAgent())) if err != nil { return nil, err } return &ClientSet{ - SdkClient20250312009: clientv20250312009, + SdkClient20250312011: clientv20250312011, }, nil } diff --git a/internal/controller/atlascustomrole/atlascustomrole_controller.go b/internal/controller/atlascustomrole/atlascustomrole_controller.go index ba16f4dc13..ed90f59302 100644 --- a/internal/controller/atlascustomrole/atlascustomrole_controller.go +++ b/internal/controller/atlascustomrole/atlascustomrole_controller.go @@ -143,8 +143,8 @@ func (r *AtlasCustomRoleReconciler) Reconcile(ctx context.Context, req ctrl.Requ if err != nil { return r.terminate(workflowCtx, atlasCustomRole, api.ProjectCustomRolesReadyType, workflow.AtlasAPIAccessNotConfigured, true, err) } - service := customroles.NewCustomRoles(atlasSdkClientSet.SdkClient20250312009.CustomDatabaseRolesApi) - project, err := r.ResolveProject(ctx, atlasSdkClientSet.SdkClient20250312009, atlasCustomRole) + service := customroles.NewCustomRoles(atlasSdkClientSet.SdkClient20250312011.CustomDatabaseRolesApi) + project, err := r.ResolveProject(ctx, atlasSdkClientSet.SdkClient20250312011, atlasCustomRole) if err != nil { return r.terminate(workflowCtx, atlasCustomRole, api.ProjectCustomRolesReadyType, workflow.AtlasAPIAccessNotConfigured, true, err) } diff --git a/internal/controller/atlascustomrole/atlascustomrole_controller_test.go b/internal/controller/atlascustomrole/atlascustomrole_controller_test.go index 7e4866fb75..696e42733d 100644 --- a/internal/controller/atlascustomrole/atlascustomrole_controller_test.go +++ b/internal/controller/atlascustomrole/atlascustomrole_controller_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -395,7 +395,7 @@ func TestAtlasCustomRoleReconciler_Reconcile(t *testing.T) { pAPI.EXPECT().GetGroupExecute(admin.GetGroupApiRequest{ApiService: pAPI}). Return(grp, nil, nil) } - return &atlas.ClientSet{SdkClient20250312009: &admin.APIClient{ + return &atlas.ClientSet{SdkClient20250312011: &admin.APIClient{ CustomDatabaseRolesApi: cdrAPI, ProjectsApi: pAPI, }}, nil diff --git a/internal/controller/atlascustomrole/custom_role_test.go b/internal/controller/atlascustomrole/custom_role_test.go index b33116293c..514475d9f0 100644 --- a/internal/controller/atlascustomrole/custom_role_test.go +++ b/internal/controller/atlascustomrole/custom_role_test.go @@ -26,8 +26,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" @@ -757,7 +757,7 @@ func Test_handleCustomRole(t *testing.T) { Log: zap.S(), OrgID: "", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CustomDatabaseRolesApi: func() admin.CustomDatabaseRolesApi { cdrAPI := mockadmin.NewCustomDatabaseRolesApi(t) cdrAPI.EXPECT().GetCustomDbRole(context.Background(), "testProjectID", "testRole"). @@ -826,7 +826,7 @@ func Test_handleCustomRole(t *testing.T) { Log: zap.S(), OrgID: "", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CustomDatabaseRolesApi: func() admin.CustomDatabaseRolesApi { cdrAPI := mockadmin.NewCustomDatabaseRolesApi(t) cdrAPI.EXPECT().GetCustomDbRole(context.Background(), "testProjectID", "testRole"). @@ -916,7 +916,7 @@ func Test_handleCustomRole(t *testing.T) { Log: zap.S(), OrgID: "", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CustomDatabaseRolesApi: func() admin.CustomDatabaseRolesApi { cdrAPI := mockadmin.NewCustomDatabaseRolesApi(t) return cdrAPI @@ -976,7 +976,7 @@ func Test_handleCustomRole(t *testing.T) { Log: zap.S(), OrgID: "", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CustomDatabaseRolesApi: func() admin.CustomDatabaseRolesApi { cdrAPI := mockadmin.NewCustomDatabaseRolesApi(t) return cdrAPI @@ -1014,7 +1014,7 @@ func Test_handleCustomRole(t *testing.T) { WithScheme(testScheme). WithObjects(tt.args.k8sObjects...). Build() - service := customroles.NewCustomRoles(tt.args.ctx.SdkClientSet.SdkClient20250312009.CustomDatabaseRolesApi) + service := customroles.NewCustomRoles(tt.args.ctx.SdkClientSet.SdkClient20250312011.CustomDatabaseRolesApi) r := AtlasCustomRoleReconciler{ AtlasReconciler: reconciler.AtlasReconciler{Client: k8sClient}, } @@ -1036,5 +1036,5 @@ func solveProjectID(t *testing.T, r *AtlasCustomRoleReconciler, args args) (*pro if args.akoCustomRole.Spec.ProjectDualReference.ExternalProjectRef != nil { return &project.Project{ID: args.akoCustomRole.Spec.ExternalProjectRef.ID}, nil } - return r.ResolveProject(args.ctx.Context, args.ctx.SdkClientSet.SdkClient20250312009, args.akoCustomRole) + return r.ResolveProject(args.ctx.Context, args.ctx.SdkClientSet.SdkClient20250312011, args.akoCustomRole) } diff --git a/internal/controller/atlasdatabaseuser/databaseuser.go b/internal/controller/atlasdatabaseuser/databaseuser.go index a504b5c9e9..97eb73c364 100644 --- a/internal/controller/atlasdatabaseuser/databaseuser.go +++ b/internal/controller/atlasdatabaseuser/databaseuser.go @@ -65,9 +65,9 @@ func (r *AtlasDatabaseUserReconciler) handleDatabaseUser(ctx *workflow.Context, if err != nil { return r.terminate(ctx, atlasDatabaseUser, api.DatabaseUserReadyType, workflow.AtlasAPIAccessNotConfigured, true, err) } - dbUserService := dbuser.NewAtlasUsers(sdkClientSet.SdkClient20250312009.DatabaseUsersApi) - deploymentService := deployment.NewAtlasDeployments(sdkClientSet.SdkClient20250312009.ClustersApi, sdkClientSet.SdkClient20250312009.GlobalClustersApi, sdkClientSet.SdkClient20250312009.FlexClustersApi, r.AtlasProvider.IsCloudGov()) - atlasProject, err := r.ResolveProject(ctx.Context, sdkClientSet.SdkClient20250312009, atlasDatabaseUser) + dbUserService := dbuser.NewAtlasUsers(sdkClientSet.SdkClient20250312011.DatabaseUsersApi) + deploymentService := deployment.NewAtlasDeployments(sdkClientSet.SdkClient20250312011.ClustersApi, sdkClientSet.SdkClient20250312011.GlobalClustersApi, sdkClientSet.SdkClient20250312011.FlexClustersApi, r.AtlasProvider.IsCloudGov()) + atlasProject, err := r.ResolveProject(ctx.Context, sdkClientSet.SdkClient20250312011, atlasDatabaseUser) if err != nil { return r.terminate(ctx, atlasDatabaseUser, api.DatabaseUserReadyType, workflow.AtlasAPIAccessNotConfigured, true, err) } diff --git a/internal/controller/atlasdatabaseuser/databaseuser_test.go b/internal/controller/atlasdatabaseuser/databaseuser_test.go index ed88a07e14..78ea6daf58 100644 --- a/internal/controller/atlasdatabaseuser/databaseuser_test.go +++ b/internal/controller/atlasdatabaseuser/databaseuser_test.go @@ -24,8 +24,8 @@ import ( "github.com/google/go-cmp/cmp/cmpopts" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -202,7 +202,7 @@ func TestHandleDatabaseUser(t *testing.T) { clusterAPI := mockadmin.NewClustersApi(t) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: projectAPI, ClustersApi: clusterAPI, DatabaseUsersApi: userAPI}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: projectAPI, ClustersApi: clusterAPI, DatabaseUsersApi: userAPI}, }, nil }, }, @@ -2316,7 +2316,7 @@ func DefaultTestProvider(t *testing.T) *atlasmock.TestProvider { Return(&admin.Group{Id: pointer.MakePtr("my-project")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectsApi: projectAPI, ClustersApi: clusterAPI, DatabaseUsersApi: userAPI, diff --git a/internal/controller/atlasdatafederation/datafederation_controller.go b/internal/controller/atlasdatafederation/datafederation_controller.go index 8c1a2637bc..49b116fe3f 100644 --- a/internal/controller/atlasdatafederation/datafederation_controller.go +++ b/internal/controller/atlasdatafederation/datafederation_controller.go @@ -127,8 +127,8 @@ func (r *AtlasDataFederationReconciler) Reconcile(context context.Context, req c ctx.SetConditionFromResult(api.DatabaseUserReadyType, result) return result.ReconcileResult() } - endpointService := datafederation.NewDatafederationPrivateEndpoint(clientSet.SdkClient20250312009.DataFederationApi) - dataFederationService := datafederation.NewAtlasDataFederation(clientSet.SdkClient20250312009.DataFederationApi) + endpointService := datafederation.NewDatafederationPrivateEndpoint(clientSet.SdkClient20250312011.DataFederationApi) + dataFederationService := datafederation.NewAtlasDataFederation(clientSet.SdkClient20250312011.DataFederationApi) if result = r.ensureDataFederation(ctx, project, dataFederation, dataFederationService); !result.IsOk() { ctx.SetConditionFromResult(api.DataFederationReadyType, result) diff --git a/internal/controller/atlasdeployment/advanced_deployment.go b/internal/controller/atlasdeployment/advanced_deployment.go index 998b3d8d30..8001bed2ce 100644 --- a/internal/controller/atlasdeployment/advanced_deployment.go +++ b/internal/controller/atlasdeployment/advanced_deployment.go @@ -107,7 +107,7 @@ func (r *AtlasDeploymentReconciler) handleAdvancedDeployment(ctx *workflow.Conte results = append(results, searchNodeResult) } - searchService := searchindex.NewSearchIndexes(ctx.SdkClientSet.SdkClient20250312009.AtlasSearchApi) + searchService := searchindex.NewSearchIndexes(ctx.SdkClientSet.SdkClient20250312011.AtlasSearchApi) result := handleSearchIndexes(ctx, r.Client, searchService, akoCluster.GetCustomResource(), akoCluster.GetProjectID()) results = append(results, result) diff --git a/internal/controller/atlasdeployment/advanced_deployment_test.go b/internal/controller/atlasdeployment/advanced_deployment_test.go index 56d65b85e2..bd6107802a 100644 --- a/internal/controller/atlasdeployment/advanced_deployment_test.go +++ b/internal/controller/atlasdeployment/advanced_deployment_test.go @@ -25,7 +25,7 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap/zaptest" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" @@ -970,7 +970,7 @@ func TestHandleAdvancedDeployment(t *testing.T) { Context: context.Background(), Log: logger, SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: tt.sdkMock(), + SdkClient20250312011: tt.sdkMock(), }, } diff --git a/internal/controller/atlasdeployment/atlasdeployment_controller.go b/internal/controller/atlasdeployment/atlasdeployment_controller.go index f4372968fe..e6df0095ee 100644 --- a/internal/controller/atlasdeployment/atlasdeployment_controller.go +++ b/internal/controller/atlasdeployment/atlasdeployment_controller.go @@ -140,9 +140,9 @@ func (r *AtlasDeploymentReconciler) Reconcile(ctx context.Context, req ctrl.Requ return r.terminate(workflowCtx, workflow.AtlasAPIAccessNotConfigured, err) } workflowCtx.SdkClientSet = sdkClientSet - projectService := project.NewProjectAPIService(sdkClientSet.SdkClient20250312009.ProjectsApi) - deploymentService := deployment.NewAtlasDeployments(sdkClientSet.SdkClient20250312009.ClustersApi, sdkClientSet.SdkClient20250312009.GlobalClustersApi, sdkClientSet.SdkClient20250312009.FlexClustersApi, r.AtlasProvider.IsCloudGov()) - atlasProject, err := r.ResolveProject(workflowCtx.Context, sdkClientSet.SdkClient20250312009, atlasDeployment) + projectService := project.NewProjectAPIService(sdkClientSet.SdkClient20250312011.ProjectsApi) + deploymentService := deployment.NewAtlasDeployments(sdkClientSet.SdkClient20250312011.ClustersApi, sdkClientSet.SdkClient20250312011.GlobalClustersApi, sdkClientSet.SdkClient20250312011.FlexClustersApi, r.AtlasProvider.IsCloudGov()) + atlasProject, err := r.ResolveProject(workflowCtx.Context, sdkClientSet.SdkClient20250312011, atlasDeployment) if err != nil { return r.terminate(workflowCtx, workflow.AtlasAPIAccessNotConfigured, err) } diff --git a/internal/controller/atlasdeployment/atlasdeployment_controller_test.go b/internal/controller/atlasdeployment/atlasdeployment_controller_test.go index 247c0d37fc..c34f2bbd85 100644 --- a/internal/controller/atlasdeployment/atlasdeployment_controller_test.go +++ b/internal/controller/atlasdeployment/atlasdeployment_controller_test.go @@ -26,8 +26,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" "go.uber.org/zap/zaptest/observer" @@ -494,7 +494,7 @@ func TestRegularClusterReconciliation(t *testing.T) { }, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ FlexClustersApi: flexAPI, ClustersApi: clusterAPI, AtlasSearchApi: searchAPI, @@ -620,7 +620,7 @@ func TestServerlessInstanceReconciliation(t *testing.T) { Return(&admin.Group{Id: pointer.MakePtr("abc123")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ FlexClustersApi: flexAPI, ClustersApi: clusterAPI, ProjectsApi: projectAPI, @@ -746,7 +746,7 @@ func TestFlexClusterReconciliation(t *testing.T) { Return(&admin.Group{Id: pointer.MakePtr("abc123")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ FlexClustersApi: flexAPI, ClustersApi: clusterAPI, ProjectsApi: projectAPI, @@ -922,7 +922,7 @@ func TestDeletionReconciliation(t *testing.T) { Return(&admin.Group{Id: pointer.MakePtr("abc123")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ FlexClustersApi: flexAPI, ClustersApi: clusterAPI, ProjectsApi: projectAPI, @@ -1295,7 +1295,7 @@ func TestChangeDeploymentType(t *testing.T) { Return(&admin.Group{Id: pointer.MakePtr("abc123")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ClustersApi: clusterAPI, ProjectsApi: projectAPI, }, @@ -1377,7 +1377,7 @@ func TestChangeDeploymentType(t *testing.T) { Return(&admin.Group{Id: pointer.MakePtr("abc123")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ClustersApi: clusterAPI, ProjectsApi: projectAPI, }, @@ -1448,7 +1448,7 @@ func TestChangeDeploymentType(t *testing.T) { Return(&admin.Group{Id: pointer.MakePtr("abc123")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ClustersApi: clusterAPI, FlexClustersApi: flexAPI, ProjectsApi: projectAPI, diff --git a/internal/controller/atlasdeployment/backup.go b/internal/controller/atlasdeployment/backup.go index 89744a18fb..90efc82b0d 100644 --- a/internal/controller/atlasdeployment/backup.go +++ b/internal/controller/atlasdeployment/backup.go @@ -22,7 +22,7 @@ import ( "fmt" "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "golang.org/x/sync/errgroup" "sigs.k8s.io/controller-runtime/pkg/client" @@ -170,7 +170,7 @@ func (r *AtlasDeploymentReconciler) ensureBackupPolicy(service *workflow.Context func (r *AtlasDeploymentReconciler) updateBackupScheduleAndPolicy(ctx context.Context, service *workflow.Context, deploymentService deployment.AtlasDeploymentsService, projectID string, deployment *akov2.AtlasDeployment, bSchedule *akov2.AtlasBackupSchedule, bPolicy *akov2.AtlasBackupPolicy, zoneID string) transitionFn { clusterName := deployment.GetDeploymentName() - currentSchedule, response, err := service.SdkClientSet.SdkClient20250312009.CloudBackupsApi.GetBackupSchedule(ctx, projectID, clusterName).Execute() + currentSchedule, response, err := service.SdkClientSet.SdkClient20250312011.CloudBackupsApi.GetBackupSchedule(ctx, projectID, clusterName).Execute() if err != nil { errMessage := "unable to get current backup configuration for project" r.Log.Debugf("%s: %s:%s, %v", errMessage, projectID, clusterName, err) @@ -201,7 +201,7 @@ func (r *AtlasDeploymentReconciler) updateBackupScheduleAndPolicy(ctx context.Co } r.Log.Debugf("applying backup configuration: %v", *bSchedule) - if _, _, err := service.SdkClientSet.SdkClient20250312009.CloudBackupsApi.UpdateBackupSchedule(ctx, projectID, clusterName, apiScheduleReq).Execute(); err != nil { + if _, _, err := service.SdkClientSet.SdkClient20250312011.CloudBackupsApi.UpdateBackupSchedule(ctx, projectID, clusterName, apiScheduleReq).Execute(); err != nil { return r.transitionFromLegacy(service, deploymentService, projectID, deployment, fmt.Errorf("unable to create backup schedule %s. e: %w", client.ObjectKeyFromObject(bSchedule).String(), err)) } r.Log.Infof("successfully updated backup configuration for deployment %v", clusterName) diff --git a/internal/controller/atlasdeployment/search_nodes.go b/internal/controller/atlasdeployment/search_nodes.go index cc9f4aab7c..caaba1cee1 100644 --- a/internal/controller/atlasdeployment/search_nodes.go +++ b/internal/controller/atlasdeployment/search_nodes.go @@ -20,7 +20,7 @@ import ( "net/http" "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" @@ -186,7 +186,7 @@ func (s *searchNodeController) handleDeleting() workflow.DeprecatedResult { // - terminated: when an error occurred. func (s *searchNodeController) create() workflow.DeprecatedResult { s.ctx.Log.Debugf("creating search nodes %v", s.deployment.Spec.DeploymentSpec.SearchNodes) - resp, _, err := s.ctx.SdkClientSet.SdkClient20250312009.AtlasSearchApi.CreateClusterSearchDeployment(s.ctx.Context, s.projectID, s.deployment.GetDeploymentName(), &admin.ApiSearchDeploymentRequest{ + resp, _, err := s.ctx.SdkClientSet.SdkClient20250312011.AtlasSearchApi.CreateClusterSearchDeployment(s.ctx.Context, s.projectID, s.deployment.GetDeploymentName(), &admin.ApiSearchDeploymentRequest{ Specs: s.deployment.Spec.DeploymentSpec.SearchNodesToAtlas(), }).Execute() if err != nil { @@ -209,7 +209,7 @@ func (s *searchNodeController) update(atlasNodes *admin.ApiSearchDeploymentRespo currentAkoNodesAsAtlas := s.deployment.Spec.DeploymentSpec.SearchNodesToAtlas() // We can deepequal without normalization here because there is only ever 1 spec in the array if !reflect.DeepEqual(currentAkoNodesAsAtlas, atlasNodes.GetSpecs()) { - updateResponse, _, err := s.ctx.SdkClientSet.SdkClient20250312009.AtlasSearchApi.UpdateClusterSearchDeployment( + updateResponse, _, err := s.ctx.SdkClientSet.SdkClient20250312011.AtlasSearchApi.UpdateClusterSearchDeployment( s.ctx.Context, s.projectID, s.deployment.GetDeploymentName(), &admin.ApiSearchDeploymentRequest{ Specs: s.deployment.Spec.DeploymentSpec.SearchNodesToAtlas(), }).Execute() @@ -244,7 +244,7 @@ func (s *searchNodeController) update(atlasNodes *admin.ApiSearchDeploymentRespo // - terminated: when an error occurred. func (s *searchNodeController) delete() workflow.DeprecatedResult { s.ctx.Log.Debug("deleting search nodes") - _, err := s.ctx.SdkClientSet.SdkClient20250312009.AtlasSearchApi.DeleteClusterSearchDeployment(s.ctx.Context, s.projectID, s.deployment.GetDeploymentName()).Execute() + _, err := s.ctx.SdkClientSet.SdkClient20250312011.AtlasSearchApi.DeleteClusterSearchDeployment(s.ctx.Context, s.projectID, s.deployment.GetDeploymentName()).Execute() if err != nil { return s.terminate(workflow.ErrorSearchNodesNotDeletedInAtlas, err) } @@ -289,7 +289,7 @@ func (s *searchNodeController) idle() workflow.DeprecatedResult { } func (s *searchNodeController) getAtlasSearchDeployment() (*admin.ApiSearchDeploymentResponse, bool, error) { - atlasNodes, _, err := s.ctx.SdkClientSet.SdkClient20250312009.AtlasSearchApi.GetClusterSearchDeployment(s.ctx.Context, s.projectID, s.deployment.GetDeploymentName()).Execute() + atlasNodes, _, err := s.ctx.SdkClientSet.SdkClient20250312011.AtlasSearchApi.GetClusterSearchDeployment(s.ctx.Context, s.projectID, s.deployment.GetDeploymentName()).Execute() if err != nil { apiError, ok := admin.AsError(err) // TODO: Currently 400, should be be 404: CLOUDP-239015 diff --git a/internal/controller/atlasdeployment/search_nodes_test.go b/internal/controller/atlasdeployment/search_nodes_test.go index 91b7b80c80..4329d783d6 100644 --- a/internal/controller/atlasdeployment/search_nodes_test.go +++ b/internal/controller/atlasdeployment/search_nodes_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" @@ -52,7 +52,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -108,7 +108,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -146,7 +146,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -193,7 +193,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -244,7 +244,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -286,7 +286,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -331,7 +331,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -376,7 +376,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -410,7 +410,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -448,7 +448,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -487,7 +487,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -526,7 +526,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, @@ -561,7 +561,7 @@ func TestHandleSearchNodes(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AtlasSearchApi: searchAPI, }, }, diff --git a/internal/controller/atlasdeployment/searchindex_test.go b/internal/controller/atlasdeployment/searchindex_test.go index 8c4aa87112..02d939ebe3 100644 --- a/internal/controller/atlasdeployment/searchindex_test.go +++ b/internal/controller/atlasdeployment/searchindex_test.go @@ -24,8 +24,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" apiextensions "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1" @@ -434,7 +434,7 @@ func Test_searchIndexReconcileRequest(t *testing.T) { ctx: &workflow.Context{ Log: zap.S(), OrgID: "testOrgID", - SdkClientSet: &atlas.ClientSet{SdkClient20250312009: &admin.APIClient{}}, + SdkClientSet: &atlas.ClientSet{SdkClient20250312011: &admin.APIClient{}}, Context: context.Background(), }, deployment: nil, @@ -451,7 +451,7 @@ func Test_searchIndexReconcileRequest(t *testing.T) { ctx: &workflow.Context{ Log: zap.S(), OrgID: "testOrgID", - SdkClientSet: &atlas.ClientSet{SdkClient20250312009: &admin.APIClient{}}, + SdkClientSet: &atlas.ClientSet{SdkClient20250312011: &admin.APIClient{}}, Context: context.Background(), }, deployment: nil, diff --git a/internal/controller/atlasfederatedauth/atlasfederated_auth.go b/internal/controller/atlasfederatedauth/atlasfederated_auth.go index cc54d0012c..48a5cdd428 100644 --- a/internal/controller/atlasfederatedauth/atlasfederated_auth.go +++ b/internal/controller/atlasfederatedauth/atlasfederated_auth.go @@ -21,7 +21,7 @@ import ( "net/http" "github.com/google/go-cmp/cmp" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/controller/workflow" @@ -35,27 +35,27 @@ func (r *AtlasFederatedAuthReconciler) ensureFederatedAuth(service *workflow.Con } // Get current IDP for the ORG - atlasFedSettings, _, err := service.SdkClientSet.SdkClient20250312009.FederatedAuthenticationApi. + atlasFedSettings, _, err := service.SdkClientSet.SdkClient20250312011.FederatedAuthenticationApi. GetFederationSettings(service.Context, service.OrgID). Execute() if err != nil { return workflow.Terminate(workflow.FederatedAuthNotAvailable, err) } - identityProvider, err := GetIdentityProviderForFederatedSettings(service.Context, service.SdkClientSet.SdkClient20250312009, atlasFedSettings) + identityProvider, err := GetIdentityProviderForFederatedSettings(service.Context, service.SdkClientSet.SdkClient20250312011, atlasFedSettings) if err != nil { return workflow.Terminate(workflow.FederatedAuthNotAvailable, err) } // Get current Org config - orgConfig, _, err := service.SdkClientSet.SdkClient20250312009.FederatedAuthenticationApi. + orgConfig, _, err := service.SdkClientSet.SdkClient20250312011.FederatedAuthenticationApi. GetConnectedOrgConfig(service.Context, atlasFedSettings.GetId(), service.OrgID). Execute() if err != nil { return workflow.Terminate(workflow.FederatedAuthOrgNotConnected, err) } - projectList, err := prepareProjectList(service.Context, service.SdkClientSet.SdkClient20250312009) + projectList, err := prepareProjectList(service.Context, service.SdkClientSet.SdkClient20250312011) if err != nil { return workflow.Terminate(workflow.Internal, fmt.Errorf("cannot list projects for org ID %s: %w", service.OrgID, err)) } @@ -65,7 +65,7 @@ func (r *AtlasFederatedAuthReconciler) ensureFederatedAuth(service *workflow.Con return workflow.Terminate(workflow.Internal, fmt.Errorf("cannot convert Federated Auth spec to Atlas: %w", err)) } - if result := r.ensureIDPSettings(service.Context, atlasFedSettings.GetId(), identityProvider, fedauth, service.SdkClientSet.SdkClient20250312009); !result.IsOk() { + if result := r.ensureIDPSettings(service.Context, atlasFedSettings.GetId(), identityProvider, fedauth, service.SdkClientSet.SdkClient20250312011); !result.IsOk() { return result } @@ -73,7 +73,7 @@ func (r *AtlasFederatedAuthReconciler) ensureFederatedAuth(service *workflow.Con return workflow.OK() } - updatedSettings, _, err := service.SdkClientSet.SdkClient20250312009.FederatedAuthenticationApi. + updatedSettings, _, err := service.SdkClientSet.SdkClient20250312011.FederatedAuthenticationApi. UpdateConnectedOrgConfig(service.Context, atlasFedSettings.GetId(), service.OrgID, operatorConf). Execute() if err != nil { diff --git a/internal/controller/atlasfederatedauth/atlasfederated_auth_controller_test.go b/internal/controller/atlasfederatedauth/atlasfederated_auth_controller_test.go index 9ab3b28d4c..391bab33b7 100644 --- a/internal/controller/atlasfederatedauth/atlasfederated_auth_controller_test.go +++ b/internal/controller/atlasfederatedauth/atlasfederated_auth_controller_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -170,7 +170,7 @@ func TestReconcile(t *testing.T) { atlasProvider := atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectsApi: groupAPI, FederatedAuthenticationApi: fedAuthAPI, }, diff --git a/internal/controller/atlasipaccesslist/atlasipaccesslist_controller_test.go b/internal/controller/atlasipaccesslist/atlasipaccesslist_controller_test.go index e2fa40b2c2..0528bbf6ae 100644 --- a/internal/controller/atlasipaccesslist/atlasipaccesslist_controller_test.go +++ b/internal/controller/atlasipaccesslist/atlasipaccesslist_controller_test.go @@ -21,8 +21,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -92,7 +92,7 @@ func TestReconcile(t *testing.T) { Return(&admin.Group{Id: pointer.MakePtr("123")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectIPAccessListApi: ialAPI, ProjectsApi: projectAPI, }, diff --git a/internal/controller/atlasipaccesslist/state.go b/internal/controller/atlasipaccesslist/state.go index ffb852c263..4240de0445 100644 --- a/internal/controller/atlasipaccesslist/state.go +++ b/internal/controller/atlasipaccesslist/state.go @@ -55,11 +55,11 @@ func (r *AtlasIPAccessListReconciler) handleCustomResource(ctx context.Context, if err != nil { return r.terminate(workflowCtx, ipAccessList, api.ReadyType, workflow.AtlasAPIAccessNotConfigured, err) } - atlasProject, err := r.ResolveProject(ctx, sdkClientSet.SdkClient20250312009, ipAccessList) + atlasProject, err := r.ResolveProject(ctx, sdkClientSet.SdkClient20250312011, ipAccessList) if err != nil { return r.terminate(workflowCtx, ipAccessList, api.ReadyType, workflow.AtlasAPIAccessNotConfigured, err) } - ipAccessListService := ipaccesslist.NewIPAccessList(sdkClientSet.SdkClient20250312009.ProjectIPAccessListApi) + ipAccessListService := ipaccesslist.NewIPAccessList(sdkClientSet.SdkClient20250312011.ProjectIPAccessListApi) return r.handleIPAccessList(workflowCtx, ipAccessListService, atlasProject.ID, ipAccessList) } diff --git a/internal/controller/atlasipaccesslist/state_test.go b/internal/controller/atlasipaccesslist/state_test.go index e304cd10ee..bbc467b543 100644 --- a/internal/controller/atlasipaccesslist/state_test.go +++ b/internal/controller/atlasipaccesslist/state_test.go @@ -25,8 +25,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -242,7 +242,7 @@ func TestHandleCustomResource(t *testing.T) { }, SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{}, + SdkClient20250312011: &admin.APIClient{}, }, nil }, }, @@ -315,7 +315,7 @@ func TestHandleCustomResource(t *testing.T) { Return(&admin.Group{Id: pointer.MakePtr("123")}, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectIPAccessListApi: ialAPI, ProjectsApi: projectAPI, }, diff --git a/internal/controller/atlasnetworkcontainer/state.go b/internal/controller/atlasnetworkcontainer/state.go index 2f23d06a1f..37b9ec7d30 100644 --- a/internal/controller/atlasnetworkcontainer/state.go +++ b/internal/controller/atlasnetworkcontainer/state.go @@ -65,7 +65,7 @@ func (r *AtlasNetworkContainerReconciler) handleCustomResource(ctx context.Conte if err != nil { return r.terminate(workflowCtx, networkContainer, workflow.NetworkContainerNotConfigured, err) } - project, err := r.ResolveProject(ctx, sdkClientSet.SdkClient20250312009, networkContainer) + project, err := r.ResolveProject(ctx, sdkClientSet.SdkClient20250312011, networkContainer) if err != nil { return r.release(workflowCtx, networkContainer, err) } diff --git a/internal/controller/atlasnetworkcontainer/state_test.go b/internal/controller/atlasnetworkcontainer/state_test.go index 9a1b55f0ac..67e5d36062 100644 --- a/internal/controller/atlasnetworkcontainer/state_test.go +++ b/internal/controller/atlasnetworkcontainer/state_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -262,7 +262,7 @@ func TestHandleCustomResource(t *testing.T) { SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { pAPI := mockadmin.NewProjectsApi(t) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: pAPI}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: pAPI}, }, nil }, }, @@ -326,7 +326,7 @@ func TestHandleCustomResource(t *testing.T) { }, nil, nil, ) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ NetworkPeeringApi: ncAPI, ProjectsApi: pAPI, }, diff --git a/internal/controller/atlasnetworkpeering/state.go b/internal/controller/atlasnetworkpeering/state.go index 0d1598ab80..a4eb9efe21 100644 --- a/internal/controller/atlasnetworkpeering/state.go +++ b/internal/controller/atlasnetworkpeering/state.go @@ -68,7 +68,7 @@ func (r *AtlasNetworkPeeringReconciler) handleCustomResource(ctx context.Context if err != nil { return r.terminate(workflowCtx, networkPeering, workflow.NetworkPeeringNotConfigured, err) } - project, err := r.ResolveProject(ctx, sdkClientSet.SdkClient20250312009, networkPeering) + project, err := r.ResolveProject(ctx, sdkClientSet.SdkClient20250312011, networkPeering) if err != nil { return r.release(workflowCtx, networkPeering, err) } diff --git a/internal/controller/atlasnetworkpeering/state_test.go b/internal/controller/atlasnetworkpeering/state_test.go index 8aa20ee073..64346c03ab 100644 --- a/internal/controller/atlasnetworkpeering/state_test.go +++ b/internal/controller/atlasnetworkpeering/state_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -221,7 +221,7 @@ func TestHandleCustomResource(t *testing.T) { SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { pAPI := mockadmin.NewProjectsApi(t) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectsApi: pAPI, }, }, nil @@ -272,7 +272,7 @@ func TestHandleCustomResource(t *testing.T) { ) npAPI := mockadmin.NewNetworkPeeringApi(t) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectsApi: pAPI, NetworkPeeringApi: npAPI, }, diff --git a/internal/controller/atlasorgsettings/atlasorgsettings_controller.go b/internal/controller/atlasorgsettings/atlasorgsettings_controller.go index bab94bda69..1536b5cb15 100644 --- a/internal/controller/atlasorgsettings/atlasorgsettings_controller.go +++ b/internal/controller/atlasorgsettings/atlasorgsettings_controller.go @@ -67,7 +67,7 @@ func NewAtlasOrgSettingsReconciler( GlobalSecretRef: globalSecretRef, }, serviceBuilder: func(clientSet *atlas.ClientSet) atlasorgsettings.AtlasOrgSettingsService { - return atlasorgsettings.NewAtlasOrgSettingsService(clientSet.SdkClient20250312009.OrganizationsApi) + return atlasorgsettings.NewAtlasOrgSettingsService(clientSet.SdkClient20250312011.OrganizationsApi) }, } return ctrlstate.NewStateReconciler( diff --git a/internal/controller/atlasorgsettings/handler_test.go b/internal/controller/atlasorgsettings/handler_test.go index 133110dd48..a11d45f60d 100644 --- a/internal/controller/atlasorgsettings/handler_test.go +++ b/internal/controller/atlasorgsettings/handler_test.go @@ -23,7 +23,7 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -88,7 +88,7 @@ func createSuccessfulProvider() atlas.Provider { return &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{OrganizationsApi: &admin.OrganizationsApiService{}}, + SdkClient20250312011: &admin.APIClient{OrganizationsApi: &admin.OrganizationsApiService{}}, }, nil }, } diff --git a/internal/controller/atlasprivateendpoint/atlasprivateendpoint_controller.go b/internal/controller/atlasprivateendpoint/atlasprivateendpoint_controller.go index d63014f488..59a7a0b0af 100644 --- a/internal/controller/atlasprivateendpoint/atlasprivateendpoint_controller.go +++ b/internal/controller/atlasprivateendpoint/atlasprivateendpoint_controller.go @@ -105,11 +105,11 @@ func (r *AtlasPrivateEndpointReconciler) ensureCustomResource(ctx context.Contex if err != nil { return r.terminate(workflowCtx, akoPrivateEndpoint, nil, api.ReadyType, workflow.AtlasAPIAccessNotConfigured, err) } - atlasProject, err := r.ResolveProject(ctx, sdkClientSet.SdkClient20250312009, akoPrivateEndpoint) + atlasProject, err := r.ResolveProject(ctx, sdkClientSet.SdkClient20250312011, akoPrivateEndpoint) if err != nil { return r.terminate(workflowCtx, akoPrivateEndpoint, nil, api.ReadyType, workflow.AtlasAPIAccessNotConfigured, err) } - privateEndpointService := privateendpoint.NewPrivateEndpointAPI(sdkClientSet.SdkClient20250312009.PrivateEndpointServicesApi) + privateEndpointService := privateendpoint.NewPrivateEndpointAPI(sdkClientSet.SdkClient20250312011.PrivateEndpointServicesApi) return r.handlePrivateEndpointService(workflowCtx, privateEndpointService, atlasProject.ID, akoPrivateEndpoint) } diff --git a/internal/controller/atlasprivateendpoint/atlasprivateendpoint_controller_test.go b/internal/controller/atlasprivateendpoint/atlasprivateendpoint_controller_test.go index e79551934a..6f78b7e36b 100644 --- a/internal/controller/atlasprivateendpoint/atlasprivateendpoint_controller_test.go +++ b/internal/controller/atlasprivateendpoint/atlasprivateendpoint_controller_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" "go.uber.org/zap/zaptest/observer" @@ -367,7 +367,7 @@ func TestEnsureCustomResource(t *testing.T) { ) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: projectAPI, PrivateEndpointServicesApi: peAPI}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: projectAPI, PrivateEndpointServicesApi: peAPI}, }, nil }, }, diff --git a/internal/controller/atlasproject/alert_configurations.go b/internal/controller/atlasproject/alert_configurations.go index 903fd0aead..35e855e210 100644 --- a/internal/controller/atlasproject/alert_configurations.go +++ b/internal/controller/atlasproject/alert_configurations.go @@ -20,7 +20,7 @@ import ( "fmt" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" v1 "k8s.io/api/core/v1" "sigs.k8s.io/controller-runtime/pkg/client" @@ -147,7 +147,7 @@ func readNotificationSecret(ctx context.Context, kubeClient client.Client, res c func syncAlertConfigurations(service *workflow.Context, groupID string, alertSpec []akov2.AlertConfiguration) workflow.DeprecatedResult { logger := service.Log existedAlertConfigs, err := paging.ListAll(service.Context, func(ctx context.Context, pageNum int) (paging.Response[admin.GroupAlertsConfig], *http.Response, error) { - return service.SdkClientSet.SdkClient20250312009.AlertConfigurationsApi. + return service.SdkClientSet.SdkClient20250312011.AlertConfigurationsApi. ListAlertConfigs(ctx, groupID). PageNum(pageNum). Execute() @@ -189,7 +189,7 @@ func checkAlertConfigurationStatuses(statuses []status.AlertConfiguration) workf func deleteAlertConfigs(workflowCtx *workflow.Context, groupID string, alertConfigIDs []string) error { logger := workflowCtx.Log for _, alertConfigID := range alertConfigIDs { - _, err := workflowCtx.SdkClientSet.SdkClient20250312009.AlertConfigurationsApi. + _, err := workflowCtx.SdkClientSet.SdkClient20250312011.AlertConfigurationsApi. DeleteAlertConfig(workflowCtx.Context, groupID, alertConfigID). Execute() if err != nil { @@ -218,7 +218,7 @@ func createAlertConfigs(workflowCtx *workflow.Context, groupID string, alertSpec continue } - alertConfiguration, _, err := workflowCtx.SdkClientSet.SdkClient20250312009.AlertConfigurationsApi. + alertConfiguration, _, err := workflowCtx.SdkClientSet.SdkClient20250312011.AlertConfigurationsApi. CreateAlertConfig(workflowCtx.Context, groupID, atlasAlert). Execute() if err != nil { diff --git a/internal/controller/atlasproject/alert_configurations_test.go b/internal/controller/atlasproject/alert_configurations_test.go index 28f1449778..d29d3fede3 100644 --- a/internal/controller/atlasproject/alert_configurations_test.go +++ b/internal/controller/atlasproject/alert_configurations_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -534,7 +534,7 @@ func TestSyncAlertConfigurations(t *testing.T) { } atlasClientSet := &atlas.ClientSet{ - SdkClient20250312009: mockAPIClient, + SdkClient20250312011: mockAPIClient, } workflowCtx := &workflow.Context{ @@ -669,7 +669,7 @@ func TestDeleteAlertConfigs(t *testing.T) { } atlasClientSet := &atlas.ClientSet{ - SdkClient20250312009: mockAPIClient, + SdkClient20250312011: mockAPIClient, } workflowCtx := &workflow.Context{ @@ -772,7 +772,7 @@ func TestCreateAlertConfigs(t *testing.T) { } atlasClientSet := &atlas.ClientSet{ - SdkClient20250312009: mockAPIClient, + SdkClient20250312011: mockAPIClient, } workflowCtx := &workflow.Context{ diff --git a/internal/controller/atlasproject/atlasproject_controller.go b/internal/controller/atlasproject/atlasproject_controller.go index dba545e7a6..0361f4a81d 100644 --- a/internal/controller/atlasproject/atlasproject_controller.go +++ b/internal/controller/atlasproject/atlasproject_controller.go @@ -165,10 +165,10 @@ func (r *AtlasProjectReconciler) Reconcile(ctx context.Context, req ctrl.Request workflowCtx.SdkClientSet = atlasSdkClient workflowCtx.OrgID = connectionConfig.OrgID services := AtlasProjectServices{} - services.projectService = project.NewProjectAPIService(atlasSdkClient.SdkClient20250312009.ProjectsApi) - services.teamsService = teams.NewTeamsAPIService(atlasSdkClient.SdkClient20250312009.TeamsApi, atlasSdkClient.SdkClient20250312009.MongoDBCloudUsersApi) - services.maintenanceService = maintenancewindow.NewMaintenanceWindowAPIService(atlasSdkClient.SdkClient20250312009.MaintenanceWindowsApi) - services.encryptionAtRestService = encryptionatrest.NewEncryptionAtRestAPI(atlasSdkClient.SdkClient20250312009.EncryptionAtRestUsingCustomerKeyManagementApi) + services.projectService = project.NewProjectAPIService(atlasSdkClient.SdkClient20250312011.ProjectsApi) + services.teamsService = teams.NewTeamsAPIService(atlasSdkClient.SdkClient20250312011.TeamsApi, atlasSdkClient.SdkClient20250312011.MongoDBCloudUsersApi) + services.maintenanceService = maintenancewindow.NewMaintenanceWindowAPIService(atlasSdkClient.SdkClient20250312011.MaintenanceWindowsApi) + services.encryptionAtRestService = encryptionatrest.NewEncryptionAtRestAPI(atlasSdkClient.SdkClient20250312011.EncryptionAtRestUsingCustomerKeyManagementApi) return r.handleProject(workflowCtx, connectionConfig.OrgID, atlasProject, &services) } diff --git a/internal/controller/atlasproject/atlasproject_controller_test.go b/internal/controller/atlasproject/atlasproject_controller_test.go index dc79e67316..51bebc332c 100644 --- a/internal/controller/atlasproject/atlasproject_controller_test.go +++ b/internal/controller/atlasproject/atlasproject_controller_test.go @@ -26,8 +26,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -164,7 +164,7 @@ func TestRenconcile(t *testing.T) { }, SdkClientSetFunc: func(ctx context.Context, creds *atlas_controllers.Credentials, log *zap.SugaredLogger) (*atlas_controllers.ClientSet, error) { return &atlas_controllers.ClientSet{ - SdkClient20250312009: tt.atlasSDKMocker(), + SdkClient20250312011: tt.atlasSDKMocker(), }, nil }, }, diff --git a/internal/controller/atlasproject/auditing.go b/internal/controller/atlasproject/auditing.go index e648f9c342..f7ef0838c8 100644 --- a/internal/controller/atlasproject/auditing.go +++ b/internal/controller/atlasproject/auditing.go @@ -96,7 +96,7 @@ func handleAudit(ctx *workflow.Context, project *akov2.AtlasProject) workflow.De a := auditController{ ctx: ctx, project: project, - service: audit.NewAuditLog(ctx.SdkClientSet.SdkClient20250312009.AuditingApi), + service: audit.NewAuditLog(ctx.SdkClientSet.SdkClient20250312011.AuditingApi), } return a.reconcile() diff --git a/internal/controller/atlasproject/auditing_test.go b/internal/controller/atlasproject/auditing_test.go index acb80cc780..479e4b3f7d 100644 --- a/internal/controller/atlasproject/auditing_test.go +++ b/internal/controller/atlasproject/auditing_test.go @@ -24,8 +24,8 @@ import ( "github.com/google/go-cmp/cmp/cmpopts" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" @@ -274,7 +274,7 @@ func TestHandleAudit(t *testing.T) { Context: context.Background(), Log: zaptest.NewLogger(t).Sugar(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ AuditingApi: tt.expectedCalls(mockadmin.NewAuditingApi(t)), }, }, diff --git a/internal/controller/atlasproject/backupcompliancepolicy.go b/internal/controller/atlasproject/backupcompliancepolicy.go index ae8b06ae24..e769633dea 100644 --- a/internal/controller/atlasproject/backupcompliancepolicy.go +++ b/internal/controller/atlasproject/backupcompliancepolicy.go @@ -20,7 +20,7 @@ import ( "fmt" "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "sigs.k8s.io/controller-runtime/pkg/client" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" @@ -149,7 +149,7 @@ func (b *backupComplianceController) upsert(atlasBCP *admin.DataProtectionSettin } if !equal { - atlasBCP, _, err = b.ctx.SdkClientSet.SdkClient20250312009.CloudBackupsApi.UpdateCompliancePolicy(b.ctx.Context, b.project.ID(), akoBCP.ToAtlas(b.project.ID())).OverwriteBackupPolicies(akoBCP.Spec.OverwriteBackupPolicies).Execute() + atlasBCP, _, err = b.ctx.SdkClientSet.SdkClient20250312011.CloudBackupsApi.UpdateCompliancePolicy(b.ctx.Context, b.project.ID(), akoBCP.ToAtlas(b.project.ID())).OverwriteBackupPolicies(akoBCP.Spec.OverwriteBackupPolicies).Execute() if err != nil { if admin.IsErrorCode(err, atlas.BackupComplianceNotMet) { return b.terminate(workflow.ProjectBackupCompliancePolicyNotMet, err) @@ -210,7 +210,7 @@ func (b *backupComplianceController) idle() workflow.DeprecatedResult { } func (b *backupComplianceController) getAtlasBackupCompliancePolicy() (*admin.DataProtectionSettings20231001, bool, error) { - bcp, _, err := b.ctx.SdkClientSet.SdkClient20250312009.CloudBackupsApi.GetCompliancePolicy(b.ctx.Context, b.project.ID()).Execute() + bcp, _, err := b.ctx.SdkClientSet.SdkClient20250312011.CloudBackupsApi.GetCompliancePolicy(b.ctx.Context, b.project.ID()).Execute() if err != nil { // NOTE: getting backup compliance policies never yields a 404 return nil, false, fmt.Errorf("error finding backup compliance policy: %w", err) diff --git a/internal/controller/atlasproject/backupcompliancepolicy_test.go b/internal/controller/atlasproject/backupcompliancepolicy_test.go index a648757053..1ee90bc317 100644 --- a/internal/controller/atlasproject/backupcompliancepolicy_test.go +++ b/internal/controller/atlasproject/backupcompliancepolicy_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" @@ -392,7 +392,7 @@ func TestEnsureBackupCompliance(t *testing.T) { t.Run(tc.name, func(t *testing.T) { workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudBackupsApi: tc.backupAPI, }, }, diff --git a/internal/controller/atlasproject/cloud_provider_integration.go b/internal/controller/atlasproject/cloud_provider_integration.go index 2d01dbbb14..1472810051 100644 --- a/internal/controller/atlasproject/cloud_provider_integration.go +++ b/internal/controller/atlasproject/cloud_provider_integration.go @@ -19,7 +19,7 @@ import ( "fmt" "sort" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" @@ -63,7 +63,7 @@ func ensureCloudProviderIntegration(workflowCtx *workflow.Context, project *akov func syncCloudProviderIntegration(workflowCtx *workflow.Context, projectID string, cpaSpecs []akov2.CloudProviderIntegration) (bool, error) { // this endpoint does not offer paginated responses - atlasCPAs, _, err := workflowCtx.SdkClientSet.SdkClient20250312009.CloudProviderAccessApi. + atlasCPAs, _, err := workflowCtx.SdkClientSet.SdkClient20250312011.CloudProviderAccessApi. ListCloudProviderAccess(workflowCtx.Context, projectID). Execute() if err != nil { @@ -259,7 +259,7 @@ func copyCloudProviderAccessData(cpiStatus *status.CloudProviderIntegration, atl } func createCloudProviderAccess(workflowCtx *workflow.Context, projectID string, cpiStatus *status.CloudProviderIntegration) *status.CloudProviderIntegration { - cpa, _, err := workflowCtx.SdkClientSet.SdkClient20250312009.CloudProviderAccessApi.CreateCloudProviderAccess( + cpa, _, err := workflowCtx.SdkClientSet.SdkClient20250312011.CloudProviderAccessApi.CreateCloudProviderAccess( workflowCtx.Context, projectID, &admin.CloudProviderAccessRoleRequest{ @@ -280,7 +280,7 @@ func createCloudProviderAccess(workflowCtx *workflow.Context, projectID string, } func authorizeCloudProviderAccess(workflowCtx *workflow.Context, projectID string, cpiStatus *status.CloudProviderIntegration) *status.CloudProviderIntegration { - cpa, _, err := workflowCtx.SdkClientSet.SdkClient20250312009.CloudProviderAccessApi.AuthorizeProviderAccessRole( + cpa, _, err := workflowCtx.SdkClientSet.SdkClient20250312011.CloudProviderAccessApi.AuthorizeProviderAccessRole( workflowCtx.Context, projectID, cpiStatus.RoleID, @@ -303,7 +303,7 @@ func authorizeCloudProviderAccess(workflowCtx *workflow.Context, projectID strin } func deleteCloudProviderAccess(workflowCtx *workflow.Context, projectID string, cpiStatus *status.CloudProviderIntegration) { - _, err := workflowCtx.SdkClientSet.SdkClient20250312009.CloudProviderAccessApi.DeauthorizeProviderAccessRole( + _, err := workflowCtx.SdkClientSet.SdkClient20250312011.CloudProviderAccessApi.DeauthorizeProviderAccessRole( workflowCtx.Context, projectID, cpiStatus.ProviderName, diff --git a/internal/controller/atlasproject/cloud_provider_integration_test.go b/internal/controller/atlasproject/cloud_provider_integration_test.go index 477e1778f0..16ef01951c 100644 --- a/internal/controller/atlasproject/cloud_provider_integration_test.go +++ b/internal/controller/atlasproject/cloud_provider_integration_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" @@ -49,7 +49,7 @@ func TestSyncCloudProviderIntegration(t *testing.T) { } workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &atlasClient, + SdkClient20250312011: &atlasClient, }, Context: context.Background(), } @@ -150,7 +150,7 @@ func TestSyncCloudProviderIntegration(t *testing.T) { Return(&http.Response{}, nil) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, @@ -221,7 +221,7 @@ func TestSyncCloudProviderIntegration(t *testing.T) { ) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, @@ -278,7 +278,7 @@ func TestSyncCloudProviderIntegration(t *testing.T) { Return(nil, &http.Response{}, errors.New("service unavailable")) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, @@ -864,7 +864,7 @@ func TestCreateCloudProviderIntegration(t *testing.T) { ) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, @@ -895,7 +895,7 @@ func TestCreateCloudProviderIntegration(t *testing.T) { Return(nil, &http.Response{}, errors.New("service unavailable")) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, @@ -951,7 +951,7 @@ func TestAuthorizeCloudProviderIntegration(t *testing.T) { ) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, @@ -990,7 +990,7 @@ func TestAuthorizeCloudProviderIntegration(t *testing.T) { Return(nil, &http.Response{}, errors.New("service unavailable")) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, @@ -1024,7 +1024,7 @@ func TestDeleteCloudProviderIntegration(t *testing.T) { Return(&http.Response{}, nil) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, @@ -1054,7 +1054,7 @@ func TestDeleteCloudProviderIntegration(t *testing.T) { Return(&http.Response{}, errors.New("service unavailable")) workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CloudProviderAccessApi: cpa, }, }, diff --git a/internal/controller/atlasproject/custom_roles.go b/internal/controller/atlasproject/custom_roles.go index f7c5bb7199..bb3405b216 100644 --- a/internal/controller/atlasproject/custom_roles.go +++ b/internal/controller/atlasproject/custom_roles.go @@ -84,7 +84,7 @@ func ensureCustomRoles(workflowCtx *workflow.Context, project *akov2.AtlasProjec r := roleController{ ctx: workflowCtx, project: project, - service: customroles.NewCustomRoles(workflowCtx.SdkClientSet.SdkClient20250312009.CustomDatabaseRolesApi), + service: customroles.NewCustomRoles(workflowCtx.SdkClientSet.SdkClient20250312011.CustomDatabaseRolesApi), } currentAtlasCustomRoles, err := r.service.List(r.ctx.Context, r.project.ID()) diff --git a/internal/controller/atlasproject/custom_roles_test.go b/internal/controller/atlasproject/custom_roles_test.go index 19b0e0f8ce..dab56057a7 100644 --- a/internal/controller/atlasproject/custom_roles_test.go +++ b/internal/controller/atlasproject/custom_roles_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -397,7 +397,7 @@ func TestEnsureCustomRoles(t *testing.T) { t.Run(tc.name, func(t *testing.T) { workflowCtx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CustomDatabaseRolesApi: tc.roleAPI, }, }, @@ -481,7 +481,7 @@ func TestCustomRolesNonGreedyBehaviour(t *testing.T) { Log: zaptest.NewLogger(t).Sugar(), Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ CustomDatabaseRolesApi: roleAPI, }, }, diff --git a/internal/controller/atlasproject/encryption_at_rest.go b/internal/controller/atlasproject/encryption_at_rest.go index ec5ae86a6f..ff0d64a5b2 100644 --- a/internal/controller/atlasproject/encryption_at_rest.go +++ b/internal/controller/atlasproject/encryption_at_rest.go @@ -194,7 +194,7 @@ func normalizeAwsKms(ctx *workflow.Context, projectID string, awsKms *encryption // This endpoint does not offer paginated responses. // Assume that role ID is set as AWS ARN. - resp, _, err := ctx.SdkClientSet.SdkClient20250312009.CloudProviderAccessApi.ListCloudProviderAccess(ctx.Context, projectID).Execute() + resp, _, err := ctx.SdkClientSet.SdkClient20250312011.CloudProviderAccessApi.ListCloudProviderAccess(ctx.Context, projectID).Execute() if err != nil { return err } diff --git a/internal/controller/atlasproject/integrations.go b/internal/controller/atlasproject/integrations.go index 093d78c0d1..74b834d249 100644 --- a/internal/controller/atlasproject/integrations.go +++ b/internal/controller/atlasproject/integrations.go @@ -252,7 +252,7 @@ func (ir IntegrationReconciler) reconcile(ctx *workflow.Context) workflow.Deprec if _, found := ir.integrationsInAKO["PROMETHEUS"]; found { ctx.EnsureStatusOption(status.AtlasProjectPrometheusOption(&status.Prometheus{ Scheme: "https", - DiscoveryURL: fmt.Sprintf("https://%s/prometheus/v1.0/groups/%s/discovery", ctx.SdkClientSet.SdkClient20250312009.GetConfig().Host, ir.project.ID()), + DiscoveryURL: fmt.Sprintf("https://%s/prometheus/v1.0/groups/%s/discovery", ctx.SdkClientSet.SdkClient20250312011.GetConfig().Host, ir.project.ID()), })) } else { ctx.EnsureStatusOption(status.AtlasProjectPrometheusOption(nil)) @@ -271,7 +271,7 @@ func NewIntegrationReconciler( project: project, integrationsInAKO: mapIntegrationsPerType(integrations), lasAppliedIntegrationsTypes: lastAppliedIntegrationsTypes, - service: integration.NewThirdPartyIntegrationService(ctx.SdkClientSet.SdkClient20250312009.ThirdPartyIntegrationsApi), + service: integration.NewThirdPartyIntegrationService(ctx.SdkClientSet.SdkClient20250312011.ThirdPartyIntegrationsApi), } } diff --git a/internal/controller/atlasproject/integrations_test.go b/internal/controller/atlasproject/integrations_test.go index ab051bf145..4635f7e254 100644 --- a/internal/controller/atlasproject/integrations_test.go +++ b/internal/controller/atlasproject/integrations_test.go @@ -23,8 +23,8 @@ import ( "github.com/google/go-cmp/cmp/cmpopts" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -543,10 +543,10 @@ func TestEnsureIntegration(t *testing.T) { Context: context.Background(), Log: zaptest.NewLogger(t).Sugar(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: admin.NewAPIClient(&admin.Configuration{Host: "cloud-qa.mongodb.com"}), + SdkClient20250312011: admin.NewAPIClient(&admin.Configuration{Host: "cloud-qa.mongodb.com"}), }, } - workflowCtx.SdkClientSet.SdkClient20250312009.ThirdPartyIntegrationsApi = tt.apiMock() + workflowCtx.SdkClientSet.SdkClient20250312011.ThirdPartyIntegrationsApi = tt.apiMock() reconciler := &AtlasProjectReconciler{ Client: fake.NewClientBuilder(). WithScheme(testScheme). @@ -773,7 +773,7 @@ func TestIntegrationReconcile(t *testing.T) { Context: context.Background(), Log: zaptest.NewLogger(t).Sugar(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: admin.NewAPIClient(&admin.Configuration{Host: "cloud-qa.mongodb.com"}), + SdkClient20250312011: admin.NewAPIClient(&admin.Configuration{Host: "cloud-qa.mongodb.com"}), }, } reconciler := IntegrationReconciler{ diff --git a/internal/controller/atlasproject/ipaccess_list.go b/internal/controller/atlasproject/ipaccess_list.go index 9e7e335f99..1b784577a0 100644 --- a/internal/controller/atlasproject/ipaccess_list.go +++ b/internal/controller/atlasproject/ipaccess_list.go @@ -150,7 +150,7 @@ func handleIPAccessList(ctx *workflow.Context, project *akov2.AtlasProject) work c := ipAccessListController{ ctx: ctx, project: project, - service: ipaccesslist.NewIPAccessList(ctx.SdkClientSet.SdkClient20250312009.ProjectIPAccessListApi), + service: ipaccesslist.NewIPAccessList(ctx.SdkClientSet.SdkClient20250312011.ProjectIPAccessListApi), lastApplied: lastApplied, } diff --git a/internal/controller/atlasproject/ipaccess_list_test.go b/internal/controller/atlasproject/ipaccess_list_test.go index 243ea6a7bc..086b854285 100644 --- a/internal/controller/atlasproject/ipaccess_list_test.go +++ b/internal/controller/atlasproject/ipaccess_list_test.go @@ -26,8 +26,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -480,7 +480,7 @@ func TestHandleIPAccessList(t *testing.T) { Context: context.Background(), Log: zaptest.NewLogger(t).Sugar(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectIPAccessListApi: tt.expectedCalls(mockadmin.NewProjectIPAccessListApi(t)), }, }, @@ -629,7 +629,7 @@ func TestIPAccessListNonGreedyBehaviour(t *testing.T) { Log: zaptest.NewLogger(t).Sugar(), Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectIPAccessListApi: ipAccessAPI, }, }, diff --git a/internal/controller/atlasproject/network_peering.go b/internal/controller/atlasproject/network_peering.go index d950eede78..e7ebef29c0 100644 --- a/internal/controller/atlasproject/network_peering.go +++ b/internal/controller/atlasproject/network_peering.go @@ -21,7 +21,7 @@ import ( "net/http" "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" @@ -104,7 +104,7 @@ func failedPeerStatus(errMessage string, peer akov2.NetworkPeer) status.AtlasNet func SyncNetworkPeer(workflowCtx *workflow.Context, groupID string, peerStatuses []status.AtlasNetworkPeer, peerSpecs []akov2.NetworkPeer, lastAppliedPeers []akov2.NetworkPeer) (workflow.DeprecatedResult, api.ConditionType) { defer workflowCtx.EnsureStatusOption(status.AtlasProjectSetNetworkPeerOption(&peerStatuses)) logger := workflowCtx.Log - mongoClient := workflowCtx.SdkClientSet.SdkClient20250312009 + mongoClient := workflowCtx.SdkClientSet.SdkClient20250312011 logger.Debugf("syncing network peers for project %v", groupID) list, err := GetAllExistedNetworkPeer(workflowCtx.Context, mongoClient.NetworkPeeringApi, groupID) if err != nil { diff --git a/internal/controller/atlasproject/network_peering_test.go b/internal/controller/atlasproject/network_peering_test.go index c03d750d5c..c51c7fb897 100644 --- a/internal/controller/atlasproject/network_peering_test.go +++ b/internal/controller/atlasproject/network_peering_test.go @@ -21,8 +21,8 @@ import ( "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -111,7 +111,7 @@ func TestNetworkPeeringsNonGreedyBehaviour(t *testing.T) { Log: zaptest.NewLogger(t).Sugar(), Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ NetworkPeeringApi: peeringAPI, }, }, diff --git a/internal/controller/atlasproject/private_endpoint.go b/internal/controller/atlasproject/private_endpoint.go index 63e56ae6d9..8992744f37 100644 --- a/internal/controller/atlasproject/private_endpoint.go +++ b/internal/controller/atlasproject/private_endpoint.go @@ -19,7 +19,7 @@ import ( "errors" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "golang.org/x/exp/slices" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" @@ -40,7 +40,7 @@ func ensurePrivateEndpoint(workflowCtx *workflow.Context, project *akov2.AtlasPr return workflow.Terminate(workflow.Internal, err) } - atlasPEs, err := getAllPrivateEndpoints(workflowCtx.Context, workflowCtx.SdkClientSet.SdkClient20250312009, project.ID()) + atlasPEs, err := getAllPrivateEndpoints(workflowCtx.Context, workflowCtx.SdkClientSet.SdkClient20250312011, project.ID()) if err != nil { return workflow.Terminate(workflow.Internal, err) } @@ -156,7 +156,7 @@ func getStatusForInterfaces(ctx *workflow.Context, projectID string, specPEs []a return notReadyInterfaceResult } - interfaceEndpoint, _, err := ctx.SdkClientSet.SdkClient20250312009.PrivateEndpointServicesApi.GetPrivateEndpointWithParams(ctx.Context, &admin.GetPrivateEndpointApiParams{ + interfaceEndpoint, _, err := ctx.SdkClientSet.SdkClient20250312011.PrivateEndpointServicesApi.GetPrivateEndpointWithParams(ctx.Context, &admin.GetPrivateEndpointApiParams{ GroupId: projectID, CloudProvider: atlasPeService.GetCloudProvider(), EndpointId: interfaceEndpointID, @@ -246,7 +246,7 @@ func getAllPrivateEndpoints(ctx context.Context, client *admin.APIClient, projec func createPeServiceInAtlas(ctx *workflow.Context, projectID string, endpointsToCreate []akov2.PrivateEndpoint, endpointCounts []int) (newConnections []atlasPE, err error) { newConnections = make([]atlasPE, 0) for idx, pe := range endpointsToCreate { - conn, _, err := ctx.SdkClientSet.SdkClient20250312009.PrivateEndpointServicesApi.CreatePrivateEndpointService(ctx.Context, projectID, &admin.CloudProviderEndpointServiceRequest{ + conn, _, err := ctx.SdkClientSet.SdkClient20250312011.PrivateEndpointServicesApi.CreatePrivateEndpointService(ctx.Context, projectID, &admin.CloudProviderEndpointServiceRequest{ ProviderName: string(pe.Provider), Region: pe.Region, }).Execute() @@ -282,7 +282,7 @@ func syncPeInterfaceInAtlas(ctx *workflow.Context, projectID string, endpointsTo } interfaceConn.Endpoints = specPeService.Endpoints.ConvertToAtlas() - privateEndpoint, response, err := ctx.SdkClientSet.SdkClient20250312009.PrivateEndpointServicesApi.CreatePrivateEndpointWithParams(ctx.Context, &admin.CreatePrivateEndpointApiParams{ + privateEndpoint, response, err := ctx.SdkClientSet.SdkClient20250312011.PrivateEndpointServicesApi.CreatePrivateEndpointWithParams(ctx.Context, &admin.CreatePrivateEndpointApiParams{ GroupId: projectID, CloudProvider: string(specPeService.Provider), EndpointServiceId: atlasPeService.GetId(), @@ -335,7 +335,7 @@ func endpointDefinedInSpec(specEndpoint akov2.PrivateEndpoint) bool { } func DeleteAllPrivateEndpoints(ctx *workflow.Context, atlasProject *akov2.AtlasProject) workflow.DeprecatedResult { - atlasPEs, err := getAllPrivateEndpoints(ctx.Context, ctx.SdkClientSet.SdkClient20250312009, atlasProject.ID()) + atlasPEs, err := getAllPrivateEndpoints(ctx.Context, ctx.SdkClientSet.SdkClient20250312011, atlasProject.ID()) if err != nil { return workflow.Terminate(workflow.Internal, err) } @@ -363,7 +363,7 @@ func deletePrivateEndpointsFromAtlas(ctx *workflow.Context, projectID string, li interfaceEndpointIDs := peService.InterfaceEndpointIDs() if len(interfaceEndpointIDs) != 0 { for _, interfaceEndpointID := range interfaceEndpointIDs { - _, err := ctx.SdkClientSet.SdkClient20250312009.PrivateEndpointServicesApi.DeletePrivateEndpointWithParams(ctx.Context, &admin.DeletePrivateEndpointApiParams{ + _, err := ctx.SdkClientSet.SdkClient20250312011.PrivateEndpointServicesApi.DeletePrivateEndpointWithParams(ctx.Context, &admin.DeletePrivateEndpointApiParams{ GroupId: projectID, CloudProvider: peService.GetCloudProvider(), EndpointId: interfaceEndpointID, @@ -377,7 +377,7 @@ func deletePrivateEndpointsFromAtlas(ctx *workflow.Context, projectID string, li continue } - _, err := ctx.SdkClientSet.SdkClient20250312009.PrivateEndpointServicesApi.DeletePrivateEndpointServiceWithParams(ctx.Context, &admin.DeletePrivateEndpointServiceApiParams{ + _, err := ctx.SdkClientSet.SdkClient20250312011.PrivateEndpointServicesApi.DeletePrivateEndpointServiceWithParams(ctx.Context, &admin.DeletePrivateEndpointServiceApiParams{ GroupId: projectID, CloudProvider: peService.GetCloudProvider(), EndpointServiceId: peService.GetId(), @@ -454,7 +454,7 @@ func getGCPInterfaceEndpoint(ctx *workflow.Context, projectID string, endpoint s if endpoint.InterfaceEndpointID == "" { return nil, errors.New("InterfaceEndpointID is empty") } - interfaceEndpointConn, _, err := ctx.SdkClientSet.SdkClient20250312009.PrivateEndpointServicesApi.GetPrivateEndpointWithParams(ctx.Context, &admin.GetPrivateEndpointApiParams{ + interfaceEndpointConn, _, err := ctx.SdkClientSet.SdkClient20250312011.PrivateEndpointServicesApi.GetPrivateEndpointWithParams(ctx.Context, &admin.GetPrivateEndpointApiParams{ GroupId: projectID, CloudProvider: string(provider.ProviderGCP), EndpointId: endpoint.InterfaceEndpointID, diff --git a/internal/controller/atlasproject/private_endpoint_test.go b/internal/controller/atlasproject/private_endpoint_test.go index f3e9a5068d..e2358f958a 100644 --- a/internal/controller/atlasproject/private_endpoint_test.go +++ b/internal/controller/atlasproject/private_endpoint_test.go @@ -24,8 +24,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -354,7 +354,7 @@ func TestPrivateEndpointsNonGreedyBehaviour(t *testing.T) { Log: zaptest.NewLogger(t).Sugar(), Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ PrivateEndpointServicesApi: privateEndpointsAPI, }, }, diff --git a/internal/controller/atlasproject/project.go b/internal/controller/atlasproject/project.go index 444bc0d009..b66ca0daf0 100644 --- a/internal/controller/atlasproject/project.go +++ b/internal/controller/atlasproject/project.go @@ -115,7 +115,7 @@ func (r *AtlasProjectReconciler) delete(ctx *workflow.Context, services *AtlasPr if result := DeleteAllPrivateEndpoints(ctx, atlasProject); !result.IsOk() { return r.terminate(ctx, workflow.ServerlessPrivateEndpointReady, errors.New(result.GetMessage())) } - if result := DeleteOwnedNetworkPeers(ctx.Context, atlasProject, ctx.SdkClientSet.SdkClient20250312009.NetworkPeeringApi, ctx.Log); !result.IsOk() { + if result := DeleteOwnedNetworkPeers(ctx.Context, atlasProject, ctx.SdkClientSet.SdkClient20250312011.NetworkPeeringApi, ctx.Log); !result.IsOk() { return r.terminate(ctx, workflow.ProjectNetworkPeerIsNotReadyInAtlas, errors.New(result.GetMessage())) } diff --git a/internal/controller/atlasproject/project_settings.go b/internal/controller/atlasproject/project_settings.go index 887220d136..587049fb6c 100644 --- a/internal/controller/atlasproject/project_settings.go +++ b/internal/controller/atlasproject/project_settings.go @@ -61,12 +61,12 @@ func areSettingsInSync(atlas, spec *akov2.ProjectSettings) bool { func patchSettings(ctx *workflow.Context, projectID string, spec *akov2.ProjectSettings) error { specAsAtlas := spec.ToAtlas() - _, _, err := ctx.SdkClientSet.SdkClient20250312009.ProjectsApi.UpdateGroupSettings(ctx.Context, projectID, specAsAtlas).Execute() + _, _, err := ctx.SdkClientSet.SdkClient20250312011.ProjectsApi.UpdateGroupSettings(ctx.Context, projectID, specAsAtlas).Execute() return err } func fetchSettings(ctx *workflow.Context, projectID string) (*akov2.ProjectSettings, error) { - data, _, err := ctx.SdkClientSet.SdkClient20250312009.ProjectsApi.GetGroupSettings(ctx.Context, projectID).Execute() + data, _, err := ctx.SdkClientSet.SdkClient20250312011.ProjectsApi.GetGroupSettings(ctx.Context, projectID).Execute() if err != nil { return nil, err } diff --git a/internal/controller/atlasproject/project_settings_test.go b/internal/controller/atlasproject/project_settings_test.go index 72e573ce93..6ba48561b3 100644 --- a/internal/controller/atlasproject/project_settings_test.go +++ b/internal/controller/atlasproject/project_settings_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" @@ -232,7 +232,7 @@ func TestEnsureProjectSettings(t *testing.T) { t.Run(tc.name, func(t *testing.T) { ctx := &workflow.Context{ SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectsApi: tc.projectAPI, }, }, diff --git a/internal/controller/atlasproject/project_test.go b/internal/controller/atlasproject/project_test.go index 89988a5525..545ed87e7f 100644 --- a/internal/controller/atlasproject/project_test.go +++ b/internal/controller/atlasproject/project_test.go @@ -25,8 +25,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -678,7 +678,7 @@ func TestHandleProject(t *testing.T) { Context: context.Background(), Log: logger, SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: tt.atlasSDKMocker(), + SdkClient20250312011: tt.atlasSDKMocker(), }, } instancesIndexer := indexer.NewAtlasStreamInstanceByProjectIndexer(zaptest.NewLogger(t)) @@ -1121,7 +1121,7 @@ func TestDelete(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: tt.atlasSDKMocker(), + SdkClient20250312011: tt.atlasSDKMocker(), }, Log: logger, } diff --git a/internal/controller/atlasproject/team_reconciler.go b/internal/controller/atlasproject/team_reconciler.go index e552022107..0845faad00 100644 --- a/internal/controller/atlasproject/team_reconciler.go +++ b/internal/controller/atlasproject/team_reconciler.go @@ -21,7 +21,7 @@ import ( "sync" "github.com/google/go-cmp/cmp" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "golang.org/x/sync/errgroup" "sigs.k8s.io/controller-runtime/pkg/reconcile" @@ -112,7 +112,7 @@ func (r *AtlasProjectReconciler) teamReconcile(team *akov2.AtlasTeam, workflowCt return workflow.OK().ReconcileResult() } else { log.Infow("-> Starting AtlasTeam deletion", "spec", team.Spec) - _, err := teamCtx.SdkClientSet.SdkClient20250312009.TeamsApi.DeleteOrgTeam(teamCtx.Context, teamCtx.OrgID, team.Status.ID).Execute() + _, err := teamCtx.SdkClientSet.SdkClient20250312011.TeamsApi.DeleteOrgTeam(teamCtx.Context, teamCtx.OrgID, team.Status.ID).Execute() if admin.IsErrorCode(err, atlas.NotInGroup) { log.Infow("team does not exist", "projectID", team.Status.ID) return workflow.Terminate(workflow.TeamDoesNotExist, err).ReconcileResult() @@ -209,7 +209,7 @@ func (r *AtlasProjectReconciler) ensureTeamUsersAreInSync(workflowCtx *workflow. username := team.Spec.Usernames[i] if _, ok := atlasUsernamesMap[string(username)]; !ok { g.Go(func() error { - user, _, err := workflowCtx.SdkClientSet.SdkClient20250312009.MongoDBCloudUsersApi.GetUser(taskContext, string(username)).Execute() + user, _, err := workflowCtx.SdkClientSet.SdkClient20250312011.MongoDBCloudUsersApi.GetUser(taskContext, string(username)).Execute() if err != nil { return err diff --git a/internal/controller/atlasproject/team_reconciler_test.go b/internal/controller/atlasproject/team_reconciler_test.go index 2e86cf6158..d0c52d53b2 100644 --- a/internal/controller/atlasproject/team_reconciler_test.go +++ b/internal/controller/atlasproject/team_reconciler_test.go @@ -20,7 +20,7 @@ import ( "testing" "github.com/stretchr/testify/assert" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/status" @@ -36,7 +36,7 @@ func TestTeamManagedByAtlas(t *testing.T) { workflowCtx := &workflow.Context{ OrgID: "orgID", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{}, + SdkClient20250312011: &admin.APIClient{}, }, Context: context.Background(), } @@ -50,7 +50,7 @@ func TestTeamManagedByAtlas(t *testing.T) { workflowCtx := &workflow.Context{ OrgID: "orgID", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{}, + SdkClient20250312011: &admin.APIClient{}, }, Context: context.Background(), } @@ -70,7 +70,7 @@ func TestTeamManagedByAtlas(t *testing.T) { workflowCtx := &workflow.Context{ OrgID: "orgID", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &atlasClient, + SdkClient20250312011: &atlasClient, }, Context: context.Background(), } @@ -100,7 +100,7 @@ func TestTeamManagedByAtlas(t *testing.T) { workflowCtx := &workflow.Context{ OrgID: "orgID", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &atlasClient, + SdkClient20250312011: &atlasClient, }, Context: context.Background(), } @@ -131,7 +131,7 @@ func TestTeamManagedByAtlas(t *testing.T) { workflowCtx := &workflow.Context{ OrgID: "orgID-1", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &atlasClient, + SdkClient20250312011: &atlasClient, }, Context: context.Background(), } @@ -175,7 +175,7 @@ func TestTeamManagedByAtlas(t *testing.T) { workflowCtx := &workflow.Context{ OrgID: "orgID-1", SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &atlasClient, + SdkClient20250312011: &atlasClient, }, Context: context.Background(), } diff --git a/internal/controller/atlasproject/teams_test.go b/internal/controller/atlasproject/teams_test.go index 08dc945153..26750422ca 100644 --- a/internal/controller/atlasproject/teams_test.go +++ b/internal/controller/atlasproject/teams_test.go @@ -20,7 +20,7 @@ import ( "testing" "github.com/stretchr/testify/assert" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -311,7 +311,7 @@ func TestSyncAssignedTeams(t *testing.T) { ctx := &workflow.Context{ Log: logger, SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: atlasClient, + SdkClient20250312011: atlasClient, }, Context: context.Background(), } diff --git a/internal/controller/atlasproject/x509_auth.go b/internal/controller/atlasproject/x509_auth.go index 85805e41ec..0ba5229f5b 100644 --- a/internal/controller/atlasproject/x509_auth.go +++ b/internal/controller/atlasproject/x509_auth.go @@ -21,7 +21,7 @@ import ( "fmt" "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" "sigs.k8s.io/controller-runtime/pkg/client" @@ -70,7 +70,7 @@ func (r *AtlasProjectReconciler) enableX509Authentication(ctx *workflow.Context, return terminateX509(ctx, err) } - ldapConfig, _, err := ctx.SdkClientSet.SdkClient20250312009.LDAPConfigurationApi.GetUserSecurity(ctx.Context, atlasProject.ID()).Execute() + ldapConfig, _, err := ctx.SdkClientSet.SdkClient20250312011.LDAPConfigurationApi.GetUserSecurity(ctx.Context, atlasProject.ID()).Execute() if err != nil { return terminateX509(ctx, err) } @@ -84,7 +84,7 @@ func (r *AtlasProjectReconciler) enableX509Authentication(ctx *workflow.Context, } r.Log.Infow("Saving new x509 cert", "projectID", atlasProject.ID()) - _, _, err = ctx.SdkClientSet.SdkClient20250312009.LDAPConfigurationApi.UpdateUserSecurity(ctx.Context, atlasProject.ID(), &conf).Execute() + _, _, err = ctx.SdkClientSet.SdkClient20250312011.LDAPConfigurationApi.UpdateUserSecurity(ctx.Context, atlasProject.ID(), &conf).Execute() if err != nil { return terminateX509(ctx, err) } @@ -98,7 +98,7 @@ func (r *AtlasProjectReconciler) enableX509Authentication(ctx *workflow.Context, func (r *AtlasProjectReconciler) disableX509Authentication(ctx *workflow.Context, atlasProject *akov2.AtlasProject) workflow.DeprecatedResult { r.Log.Infow("Disable x509 auth", "projectID", atlasProject.ID()) - _, _, err := ctx.SdkClientSet.SdkClient20250312009.X509AuthenticationApi.DisableSecurityCustomerX509(ctx.Context, atlasProject.ID()).Execute() + _, _, err := ctx.SdkClientSet.SdkClient20250312011.X509AuthenticationApi.DisableSecurityCustomerX509(ctx.Context, atlasProject.ID()).Execute() if err != nil { return terminateX509(ctx, err) } diff --git a/internal/controller/atlasstream/atlasstream_connection.go b/internal/controller/atlasstream/atlasstream_connection.go index 2e851b48b7..042979e806 100644 --- a/internal/controller/atlasstream/atlasstream_connection.go +++ b/internal/controller/atlasstream/atlasstream_connection.go @@ -20,7 +20,7 @@ import ( "net/http" "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" ctrl "sigs.k8s.io/controller-runtime" "sigs.k8s.io/controller-runtime/pkg/client" @@ -69,7 +69,7 @@ func (r *AtlasStreamsInstanceReconciler) handleConnectionRegistry( atlasStreamInstance *admin.StreamsTenant, ) (ctrl.Result, error) { streamConnections, err := paging.ListAll(ctx.Context, func(c context.Context, pageNum int) (paging.Response[admin.StreamsConnection], *http.Response, error) { - return ctx.SdkClientSet.SdkClient20250312009.StreamsApi. + return ctx.SdkClientSet.SdkClient20250312011.StreamsApi. ListStreamConnections(c, project.ID(), akoStreamInstance.Spec.Name). PageNum(pageNum). Execute() diff --git a/internal/controller/atlasstream/atlasstream_connection_test.go b/internal/controller/atlasstream/atlasstream_connection_test.go index 031149591b..f2e44e56ee 100644 --- a/internal/controller/atlasstream/atlasstream_connection_test.go +++ b/internal/controller/atlasstream/atlasstream_connection_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -185,7 +185,7 @@ func TestHandleConnectionRegistry(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -270,7 +270,7 @@ func TestHandleConnectionRegistry(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -356,7 +356,7 @@ func TestHandleConnectionRegistry(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -453,7 +453,7 @@ func TestHandleConnectionRegistry(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -533,7 +533,7 @@ func TestHandleConnectionRegistry(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, diff --git a/internal/controller/atlasstream/atlasstream_instance_controller.go b/internal/controller/atlasstream/atlasstream_instance_controller.go index 5769ffb604..a973f44210 100644 --- a/internal/controller/atlasstream/atlasstream_instance_controller.go +++ b/internal/controller/atlasstream/atlasstream_instance_controller.go @@ -17,7 +17,7 @@ package atlasstream import ( "context" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/fields" @@ -123,7 +123,7 @@ func (r *AtlasStreamsInstanceReconciler) ensureAtlasStreamsInstance(ctx context. workflowCtx.SdkClientSet = atlasClientSet workflowCtx.OrgID = connectionConfig.OrgID - atlasStreamInstance, _, err := workflowCtx.SdkClientSet.SdkClient20250312009.StreamsApi. + atlasStreamInstance, _, err := workflowCtx.SdkClientSet.SdkClient20250312011.StreamsApi. GetStreamWorkspace(workflowCtx.Context, project.ID(), akoStreamInstance.Spec.Name). Execute() diff --git a/internal/controller/atlasstream/atlasstream_instance_controller_test.go b/internal/controller/atlasstream/atlasstream_instance_controller_test.go index 14aff1ae06..c182dd63fa 100644 --- a/internal/controller/atlasstream/atlasstream_instance_controller_test.go +++ b/internal/controller/atlasstream/atlasstream_instance_controller_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" "go.uber.org/zap/zaptest/observer" @@ -491,7 +491,7 @@ func TestEnsureAtlasStreamsInstance(t *testing.T) { }, SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{StreamsApi: streamsAPI}, + SdkClient20250312011: &admin.APIClient{StreamsApi: streamsAPI}, }, nil }, }, @@ -623,7 +623,7 @@ func TestEnsureAtlasStreamsInstance(t *testing.T) { }, SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{StreamsApi: streamsAPI}, + SdkClient20250312011: &admin.APIClient{StreamsApi: streamsAPI}, }, nil }, }, @@ -753,7 +753,7 @@ func TestEnsureAtlasStreamsInstance(t *testing.T) { }, SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{StreamsApi: streamsAPI}, + SdkClient20250312011: &admin.APIClient{StreamsApi: streamsAPI}, }, nil }, }, @@ -885,7 +885,7 @@ func TestEnsureAtlasStreamsInstance(t *testing.T) { }, SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{StreamsApi: streamsAPI}, + SdkClient20250312011: &admin.APIClient{StreamsApi: streamsAPI}, }, nil }, }, @@ -1016,7 +1016,7 @@ func TestEnsureAtlasStreamsInstance(t *testing.T) { }, SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{StreamsApi: streamsAPI}, + SdkClient20250312011: &admin.APIClient{StreamsApi: streamsAPI}, }, nil }, }, diff --git a/internal/controller/atlasstream/transitions.go b/internal/controller/atlasstream/transitions.go index 36e473a45d..b74d0e5f29 100644 --- a/internal/controller/atlasstream/transitions.go +++ b/internal/controller/atlasstream/transitions.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" ctrl "sigs.k8s.io/controller-runtime" @@ -46,7 +46,7 @@ func (r *AtlasStreamsInstanceReconciler) create( GroupId: pointer.MakePtr(project.ID()), } - atlasStreamInstance, _, err := ctx.SdkClientSet.SdkClient20250312009.StreamsApi. + atlasStreamInstance, _, err := ctx.SdkClientSet.SdkClient20250312011.StreamsApi. CreateStreamWorkspace(ctx.Context, project.ID(), &streamTenant). Execute() @@ -63,7 +63,7 @@ func (r *AtlasStreamsInstanceReconciler) update(ctx *workflow.Context, project * Region: streamInstance.Spec.Config.Region, } - atlasStreamInstance, _, err := ctx.SdkClientSet.SdkClient20250312009.StreamsApi. + atlasStreamInstance, _, err := ctx.SdkClientSet.SdkClient20250312011.StreamsApi. UpdateStreamWorkspace(ctx.Context, project.ID(), streamInstance.Spec.Name, &dataProcessRegion). Execute() @@ -90,7 +90,7 @@ func (r *AtlasStreamsInstanceReconciler) delete(ctx *workflow.Context, project * } func deleteStreamInstance(ctx *workflow.Context, project *akov2.AtlasProject, streamInstance *akov2.AtlasStreamInstance) error { - _, err := ctx.SdkClientSet.SdkClient20250312009.StreamsApi. + _, err := ctx.SdkClientSet.SdkClient20250312011.StreamsApi. DeleteStreamWorkspace(ctx.Context, project.ID(), streamInstance.Spec.Name). Execute() @@ -114,7 +114,7 @@ func createConnections( return err } - _, _, err = ctx.SdkClientSet.SdkClient20250312009.StreamsApi. + _, _, err = ctx.SdkClientSet.SdkClient20250312011.StreamsApi. CreateStreamConnection(ctx.Context, project.ID(), akoStreamInstance.Spec.Name, connection). Execute() @@ -149,7 +149,7 @@ func updateConnections( return err } - _, _, err = ctx.SdkClientSet.SdkClient20250312009.StreamsApi. + _, _, err = ctx.SdkClientSet.SdkClient20250312011.StreamsApi. UpdateStreamConnection(ctx.Context, project.ID(), akoStreamInstance.Spec.Name, akoStreamConnection.Spec.Name, connection). Execute() @@ -178,7 +178,7 @@ func deleteConnections( atlasStreamConnections []*admin.StreamsConnection, ) error { for _, atlasStreamConnection := range atlasStreamConnections { - _, err := ctx.SdkClientSet.SdkClient20250312009.StreamsApi. + _, err := ctx.SdkClientSet.SdkClient20250312011.StreamsApi. DeleteStreamConnection(ctx.Context, project.ID(), streamInstance.Spec.Name, atlasStreamConnection.GetName()). Execute() diff --git a/internal/controller/atlasstream/transitions_test.go b/internal/controller/atlasstream/transitions_test.go index c8153128eb..3e08a47520 100644 --- a/internal/controller/atlasstream/transitions_test.go +++ b/internal/controller/atlasstream/transitions_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -132,7 +132,7 @@ func TestCreate(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -220,7 +220,7 @@ func TestCreate(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -314,7 +314,7 @@ func TestDelete(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -478,7 +478,7 @@ func TestDelete(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -576,7 +576,7 @@ func TestDelete(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -841,7 +841,7 @@ func TestUpdate(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -932,7 +932,7 @@ func TestUpdate(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -967,7 +967,7 @@ func TestCreateConnections(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -1045,7 +1045,7 @@ func TestCreateConnections(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -1193,7 +1193,7 @@ func TestUpdateConnections(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -1271,7 +1271,7 @@ func TestUpdateConnections(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -1415,7 +1415,7 @@ func TestDeleteConnections(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, @@ -1482,7 +1482,7 @@ func TestDeleteConnections(t *testing.T) { ctx := &workflow.Context{ Context: context.Background(), SdkClientSet: &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ StreamsApi: streamsAPI, }, }, diff --git a/internal/controller/atlasthirdpartyintegrations/handler_test.go b/internal/controller/atlasthirdpartyintegrations/handler_test.go index 54e8055c0f..cf05cea634 100644 --- a/internal/controller/atlasthirdpartyintegrations/handler_test.go +++ b/internal/controller/atlasthirdpartyintegrations/handler_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -108,7 +108,7 @@ func TestHandleUpsert(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -137,7 +137,7 @@ func TestHandleUpsert(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -169,7 +169,7 @@ func TestHandleUpsert(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -202,7 +202,7 @@ func TestHandleUpsert(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -234,7 +234,7 @@ func TestHandleUpsert(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -265,7 +265,7 @@ func TestHandleUpsert(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -296,7 +296,7 @@ func TestHandleUpsert(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -345,7 +345,7 @@ func TestHandleUpsert(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -439,7 +439,7 @@ func TestHandleDeletion(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -463,7 +463,7 @@ func TestHandleDeletion(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -484,7 +484,7 @@ func TestHandleDeletion(t *testing.T) { provider: &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: mockFindFakeParentProject(t)}, }, nil }, }, @@ -511,7 +511,7 @@ func TestHandleDeletion(t *testing.T) { projectAPI.EXPECT().GetGroupByNameExecute(mock.Anything). Return(nil, nil, fmt.Errorf("unexpected project fetch error")) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ProjectsApi: projectAPI}, + SdkClient20250312011: &admin.APIClient{ProjectsApi: projectAPI}, }, nil }, }, diff --git a/internal/controller/atlasthirdpartyintegrations/setup.go b/internal/controller/atlasthirdpartyintegrations/setup.go index 95e8223e8f..fb60417b3f 100644 --- a/internal/controller/atlasthirdpartyintegrations/setup.go +++ b/internal/controller/atlasthirdpartyintegrations/setup.go @@ -179,7 +179,7 @@ func (h *AtlasThirdPartyIntegrationHandler) newReconcileRequest(ctx context.Cont } req.ClientSet = sdkClientSet req.Service = h.serviceBuilder(sdkClientSet) - resolvedProject, err := h.ResolveProject(ctx, sdkClientSet.SdkClient20250312009, integration) + resolvedProject, err := h.ResolveProject(ctx, sdkClientSet.SdkClient20250312011, integration) if err != nil { return nil, fmt.Errorf("failed to fetch referenced project: %w", err) } diff --git a/internal/controller/atlasthirdpartyintegrations/setup_test.go b/internal/controller/atlasthirdpartyintegrations/setup_test.go index 81d50ab3fc..e1c60c382c 100644 --- a/internal/controller/atlasthirdpartyintegrations/setup_test.go +++ b/internal/controller/atlasthirdpartyintegrations/setup_test.go @@ -21,8 +21,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -152,7 +152,7 @@ func TestNewReconcileRequest(t *testing.T) { projectAPI := mockFindFakeParentProject(t) integrationsAPI := mockadmin.NewThirdPartyIntegrationsApi(t) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectsApi: projectAPI, ThirdPartyIntegrationsApi: integrationsAPI, }, diff --git a/internal/controller/reconciler/project.go b/internal/controller/reconciler/project.go index c9556a37b1..3439ab76e7 100644 --- a/internal/controller/reconciler/project.go +++ b/internal/controller/reconciler/project.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" k8serrors "k8s.io/apimachinery/pkg/api/errors" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/internal/crapi/crapi_test.go b/internal/crapi/crapi_test.go index 47c93e7bd9..0c42227edf 100644 --- a/internal/crapi/crapi_test.go +++ b/internal/crapi/crapi_test.go @@ -24,7 +24,7 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - admin2025 "go.mongodb.org/atlas-sdk/v20250312009/admin" + admin2025 "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" diff --git a/internal/crapi/objmap/objmap_test.go b/internal/crapi/objmap/objmap_test.go index 4e91bad0cc..aff2d5d322 100644 --- a/internal/crapi/objmap/objmap_test.go +++ b/internal/crapi/objmap/objmap_test.go @@ -21,7 +21,7 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - admin2025 "go.mongodb.org/atlas-sdk/v20250312009/admin" + admin2025 "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/crapi/objmap" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/internal/crapi/unstructured_test.go b/internal/crapi/unstructured_test.go index a48bb5f55d..1928d098ff 100644 --- a/internal/crapi/unstructured_test.go +++ b/internal/crapi/unstructured_test.go @@ -22,7 +22,7 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - admin2025 "go.mongodb.org/atlas-sdk/v20250312009/admin" + admin2025 "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" diff --git a/internal/generated/controller/cluster/cluster_controller.go b/internal/generated/controller/cluster/cluster_controller.go index 03a461dbca..071b8d83f5 100644 --- a/internal/generated/controller/cluster/cluster_controller.go +++ b/internal/generated/controller/cluster/cluster_controller.go @@ -17,7 +17,7 @@ package cluster import ( "fmt" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" zap "go.uber.org/zap" client "sigs.k8s.io/controller-runtime/pkg/client" cluster "sigs.k8s.io/controller-runtime/pkg/cluster" diff --git a/internal/generated/controller/cluster/handler.go b/internal/generated/controller/cluster/handler.go index ff8f4ad35a..707408b4e3 100644 --- a/internal/generated/controller/cluster/handler.go +++ b/internal/generated/controller/cluster/handler.go @@ -52,7 +52,7 @@ func (h *Handler) getHandlerForResource(ctx context.Context, cluster *akov2gener return nil, errors.New("unsupported version v20250312 set in CR") } versionCount++ - selectedHandler = h.handlerv20250312(h.Client, atlasClients.SdkClient20250312009, translator, h.deletionProtection) + selectedHandler = h.handlerv20250312(h.Client, atlasClients.SdkClient20250312011, translator, h.deletionProtection) } if versionCount == 0 { diff --git a/internal/generated/controller/cluster/handler_v20250312.go b/internal/generated/controller/cluster/handler_v20250312.go index 37d7cd558d..08b0b6f6fb 100644 --- a/internal/generated/controller/cluster/handler_v20250312.go +++ b/internal/generated/controller/cluster/handler_v20250312.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" controllerruntime "sigs.k8s.io/controller-runtime" builder "sigs.k8s.io/controller-runtime/pkg/builder" client "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/internal/generated/controller/connectionsecret/connection_target_federation.go b/internal/generated/controller/connectionsecret/connection_target_federation.go index f3c5502160..015abfafda 100644 --- a/internal/generated/controller/connectionsecret/connection_target_federation.go +++ b/internal/generated/controller/connectionsecret/connection_target_federation.go @@ -107,7 +107,7 @@ func (e DataFederationConnectionTarget) BuildConnectionData(ctx context.Context, return ConnectionSecretData{}, err } - dataFederationService := datafederation.NewAtlasDataFederation(clientSet.SdkClient20250312009.DataFederationApi) + dataFederationService := datafederation.NewAtlasDataFederation(clientSet.SdkClient20250312011.DataFederationApi) df, err := dataFederationService.Get(ctx, project.ID(), e.obj.Spec.Name) if err != nil { return ConnectionSecretData{}, fmt.Errorf("atlas DF get: %w", err) diff --git a/internal/generated/controller/connectionsecret/connection_target_federation_test.go b/internal/generated/controller/connectionsecret/connection_target_federation_test.go index f60120b929..53829406af 100644 --- a/internal/generated/controller/connectionsecret/connection_target_federation_test.go +++ b/internal/generated/controller/connectionsecret/connection_target_federation_test.go @@ -20,8 +20,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - admin "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + admin "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -239,7 +239,7 @@ func TestFederationConnectionTarget_BuildConnData(t *testing.T) { r.AtlasProvider = &atlasmock.TestProvider{ SdkClientSetFunc: func(ctx context.Context, creds *atlas.Credentials, log *zap.SugaredLogger) (*atlas.ClientSet, error) { return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ DataFederationApi: dfAPI, }, }, nil diff --git a/internal/generated/controller/connectionsecret/connectionsecret_controller_test.go b/internal/generated/controller/connectionsecret/connectionsecret_controller_test.go index 3b47b3cfb5..d19a196697 100644 --- a/internal/generated/controller/connectionsecret/connectionsecret_controller_test.go +++ b/internal/generated/controller/connectionsecret/connectionsecret_controller_test.go @@ -22,8 +22,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - admin "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + admin "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "go.uber.org/zap" "go.uber.org/zap/zaptest" corev1 "k8s.io/api/core/v1" @@ -813,7 +813,7 @@ func createDummyEnv(t *testing.T, objs []client.Object) *ConnectionSecretReconci }, nil, nil) return &atlas.ClientSet{ - SdkClient20250312009: &admin.APIClient{ + SdkClient20250312011: &admin.APIClient{ ProjectsApi: projectAPI, }, }, nil diff --git a/internal/generated/controller/databaseuser/databaseuser_controller.go b/internal/generated/controller/databaseuser/databaseuser_controller.go index 3402ed8971..e81b3cf487 100644 --- a/internal/generated/controller/databaseuser/databaseuser_controller.go +++ b/internal/generated/controller/databaseuser/databaseuser_controller.go @@ -17,7 +17,7 @@ package databaseuser import ( "fmt" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" zap "go.uber.org/zap" client "sigs.k8s.io/controller-runtime/pkg/client" cluster "sigs.k8s.io/controller-runtime/pkg/cluster" diff --git a/internal/generated/controller/databaseuser/handler.go b/internal/generated/controller/databaseuser/handler.go index cdb5fb50cc..ed2e055549 100644 --- a/internal/generated/controller/databaseuser/handler.go +++ b/internal/generated/controller/databaseuser/handler.go @@ -53,7 +53,7 @@ func (h *Handler) getHandlerForResource(ctx context.Context, databaseuser *akov2 return nil, errors.New("unsupported version v20250312 set in CR") } versionCount++ - selectedHandler = h.handlerv20250312(h.Client, atlasClients.SdkClient20250312009, translator, h.deletionProtection) + selectedHandler = h.handlerv20250312(h.Client, atlasClients.SdkClient20250312011, translator, h.deletionProtection) } if versionCount == 0 { diff --git a/internal/generated/controller/databaseuser/handler_v20250312.go b/internal/generated/controller/databaseuser/handler_v20250312.go index 534d7bcfc1..9310318bcd 100644 --- a/internal/generated/controller/databaseuser/handler_v20250312.go +++ b/internal/generated/controller/databaseuser/handler_v20250312.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" v1 "k8s.io/api/core/v1" controllerruntime "sigs.k8s.io/controller-runtime" builder "sigs.k8s.io/controller-runtime/pkg/builder" diff --git a/internal/generated/controller/flexcluster/flexcluster_controller.go b/internal/generated/controller/flexcluster/flexcluster_controller.go index f71c931f8e..d5d6f62242 100644 --- a/internal/generated/controller/flexcluster/flexcluster_controller.go +++ b/internal/generated/controller/flexcluster/flexcluster_controller.go @@ -17,7 +17,7 @@ package flexcluster import ( "fmt" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" zap "go.uber.org/zap" client "sigs.k8s.io/controller-runtime/pkg/client" cluster "sigs.k8s.io/controller-runtime/pkg/cluster" diff --git a/internal/generated/controller/flexcluster/handler.go b/internal/generated/controller/flexcluster/handler.go index 7954dc5109..eef2b9b404 100644 --- a/internal/generated/controller/flexcluster/handler.go +++ b/internal/generated/controller/flexcluster/handler.go @@ -52,7 +52,7 @@ func (h *Handler) getHandlerForResource(ctx context.Context, flexcluster *akov2g return nil, errors.New("unsupported version v20250312 set in CR") } versionCount++ - selectedHandler = h.handlerv20250312(h.Client, atlasClients.SdkClient20250312009, translator, h.deletionProtection) + selectedHandler = h.handlerv20250312(h.Client, atlasClients.SdkClient20250312011, translator, h.deletionProtection) } if versionCount == 0 { diff --git a/internal/generated/controller/flexcluster/handler_v20250312.go b/internal/generated/controller/flexcluster/handler_v20250312.go index dcfabd9d49..8b3fda190c 100644 --- a/internal/generated/controller/flexcluster/handler_v20250312.go +++ b/internal/generated/controller/flexcluster/handler_v20250312.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" controllerruntime "sigs.k8s.io/controller-runtime" builder "sigs.k8s.io/controller-runtime/pkg/builder" client "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/internal/generated/controller/flexcluster/handler_v20250312_test.go b/internal/generated/controller/flexcluster/handler_v20250312_test.go index d89d15a6a9..908cbd8082 100644 --- a/internal/generated/controller/flexcluster/handler_v20250312_test.go +++ b/internal/generated/controller/flexcluster/handler_v20250312_test.go @@ -24,9 +24,9 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" diff --git a/internal/generated/controller/group/group_controller.go b/internal/generated/controller/group/group_controller.go index d1449ebd35..b04056fb85 100644 --- a/internal/generated/controller/group/group_controller.go +++ b/internal/generated/controller/group/group_controller.go @@ -17,7 +17,7 @@ package group import ( "fmt" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" zap "go.uber.org/zap" client "sigs.k8s.io/controller-runtime/pkg/client" cluster "sigs.k8s.io/controller-runtime/pkg/cluster" diff --git a/internal/generated/controller/group/handler.go b/internal/generated/controller/group/handler.go index cb2b0870ce..196d8fc372 100644 --- a/internal/generated/controller/group/handler.go +++ b/internal/generated/controller/group/handler.go @@ -49,7 +49,7 @@ func (h *Handler) getHandlerForResource(ctx context.Context, group *akov2generat return nil, errors.New("unsupported version v20250312 set in CR") } versionCount++ - selectedHandler = h.handlerv20250312(h.Client, atlasClients.SdkClient20250312009, translator, h.deletionProtection) + selectedHandler = h.handlerv20250312(h.Client, atlasClients.SdkClient20250312011, translator, h.deletionProtection) } if versionCount == 0 { diff --git a/internal/generated/controller/group/handler_v20250312.go b/internal/generated/controller/group/handler_v20250312.go index dd64b42093..4daca49bb1 100644 --- a/internal/generated/controller/group/handler_v20250312.go +++ b/internal/generated/controller/group/handler_v20250312.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - v20250312sdk "go.mongodb.org/atlas-sdk/v20250312009/admin" + v20250312sdk "go.mongodb.org/atlas-sdk/v20250312011/admin" controllerruntime "sigs.k8s.io/controller-runtime" builder "sigs.k8s.io/controller-runtime/pkg/builder" client "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/internal/generated/crds/crds.yaml b/internal/generated/crds/crds.yaml index 634906b676..fa2c8c8349 100644 --- a/internal/generated/crds/crds.yaml +++ b/internal/generated/crds/crds.yaml @@ -9,7 +9,7 @@ metadata: spec: properties: v20250312: - x-atlas-sdk-version: go.mongodb.org/atlas-sdk/v20250312009/admin + x-atlas-sdk-version: go.mongodb.org/atlas-sdk/v20250312011/admin creationTimestamp: null name: groups.atlas.generated.mongodb.com spec: @@ -226,7 +226,7 @@ metadata: version: v1 x-openapi-mapping: property: $.groupId - x-atlas-sdk-version: go.mongodb.org/atlas-sdk/v20250312009/admin + x-atlas-sdk-version: go.mongodb.org/atlas-sdk/v20250312011/admin creationTimestamp: null name: clusters.atlas.generated.mongodb.com spec: @@ -303,6 +303,13 @@ spec: items: type: string type: array + customOpensslCipherConfigTls13: + description: The custom OpenSSL cipher suite list for + TLS 1.3. This field is only valid when `tlsCipherConfigMode` + is set to `CUSTOM`. + items: + type: string + type: array minimumEnabledTlsProtocol: description: Minimum Transport Layer Security (TLS) version that the cluster accepts for incoming connections. Clusters @@ -991,6 +998,13 @@ spec: items: type: string type: array + customOpensslCipherConfigTls13: + description: The custom OpenSSL cipher suite list for TLS + 1.3. This field is only valid when `tlsCipherConfigMode` + is set to `CUSTOM`. + items: + type: string + type: array minimumEnabledTlsProtocol: description: Minimum Transport Layer Security (TLS) version that the cluster accepts for incoming connections. Clusters @@ -1553,7 +1567,7 @@ metadata: version: v1 x-openapi-mapping: property: $.groupId - x-atlas-sdk-version: go.mongodb.org/atlas-sdk/v20250312009/admin + x-atlas-sdk-version: go.mongodb.org/atlas-sdk/v20250312011/admin creationTimestamp: null name: flexclusters.atlas.generated.mongodb.com spec: @@ -1885,7 +1899,7 @@ metadata: version: v1 x-openapi-mapping: property: $.groupId - x-atlas-sdk-version: go.mongodb.org/atlas-sdk/v20250312009/admin + x-atlas-sdk-version: go.mongodb.org/atlas-sdk/v20250312011/admin creationTimestamp: null name: databaseusers.atlas.generated.mongodb.com spec: diff --git a/internal/nextapi/generated/v1/cluster.go b/internal/nextapi/generated/v1/cluster.go index dfb3068349..5e047923fb 100644 --- a/internal/nextapi/generated/v1/cluster.go +++ b/internal/nextapi/generated/v1/cluster.go @@ -207,6 +207,10 @@ type AdvancedConfiguration struct { // This field is only valid when `tlsCipherConfigMode` is set to `CUSTOM`. CustomOpensslCipherConfigTls12 *[]string `json:"customOpensslCipherConfigTls12,omitempty"` + // CustomOpensslCipherConfigTls13 The custom OpenSSL cipher suite list for TLS 1.3. + // This field is only valid when `tlsCipherConfigMode` is set to `CUSTOM`. + CustomOpensslCipherConfigTls13 *[]string `json:"customOpensslCipherConfigTls13,omitempty"` + // MinimumEnabledTlsProtocol Minimum Transport Layer Security (TLS) version that // the cluster accepts for incoming connections. Clusters using TLS 1.0 or 1.1 // should consider setting TLS 1.2 as the minimum TLS protocol version. diff --git a/internal/nextapi/generated/v1/zz_generated.deepcopy.go b/internal/nextapi/generated/v1/zz_generated.deepcopy.go index b04803c986..beff1b1db9 100644 --- a/internal/nextapi/generated/v1/zz_generated.deepcopy.go +++ b/internal/nextapi/generated/v1/zz_generated.deepcopy.go @@ -1,19 +1,5 @@ //go:build !ignore_autogenerated -//Copyright 2025 MongoDB Inc -// -//Licensed under the Apache License, Version 2.0 (the "License"); -//you may not use this file except in compliance with the License. -//You may obtain a copy of the License at -// -// http://www.apache.org/licenses/LICENSE-2.0 -// -//Unless required by applicable law or agreed to in writing, software -//distributed under the License is distributed on an "AS IS" BASIS, -//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -//See the License for the specific language governing permissions and -//limitations under the License. - // Code generated by controller-gen. DO NOT EDIT. package v1 @@ -60,6 +46,15 @@ func (in *AdvancedConfiguration) DeepCopyInto(out *AdvancedConfiguration) { copy(*out, *in) } } + if in.CustomOpensslCipherConfigTls13 != nil { + in, out := &in.CustomOpensslCipherConfigTls13, &out.CustomOpensslCipherConfigTls13 + *out = new([]string) + if **in != nil { + in, out := *in, *out + *out = make([]string, len(*in)) + copy(*out, *in) + } + } if in.MinimumEnabledTlsProtocol != nil { in, out := &in.MinimumEnabledTlsProtocol, &out.MinimumEnabledTlsProtocol *out = new(string) diff --git a/internal/translation/atlasorgsettings/atlasorgsettings.go b/internal/translation/atlasorgsettings/atlasorgsettings.go index e4e381f76c..8c4189ad06 100644 --- a/internal/translation/atlasorgsettings/atlasorgsettings.go +++ b/internal/translation/atlasorgsettings/atlasorgsettings.go @@ -15,7 +15,7 @@ package atlasorgsettings import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" ) diff --git a/internal/translation/atlasorgsettings/atlasorgsettings_test.go b/internal/translation/atlasorgsettings/atlasorgsettings_test.go index dbc9c08822..5fce675dea 100644 --- a/internal/translation/atlasorgsettings/atlasorgsettings_test.go +++ b/internal/translation/atlasorgsettings/atlasorgsettings_test.go @@ -18,7 +18,7 @@ import ( "testing" "github.com/stretchr/testify/assert" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" diff --git a/internal/translation/atlasorgsettings/service.go b/internal/translation/atlasorgsettings/service.go index 86b69ae218..c5a34b49cf 100644 --- a/internal/translation/atlasorgsettings/service.go +++ b/internal/translation/atlasorgsettings/service.go @@ -18,7 +18,7 @@ import ( "context" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/httputil" ) diff --git a/internal/translation/atlasorgsettings/service_test.go b/internal/translation/atlasorgsettings/service_test.go index f982ef8b84..ab16f16a86 100644 --- a/internal/translation/atlasorgsettings/service_test.go +++ b/internal/translation/atlasorgsettings/service_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/internal/translation/audit/audit.go b/internal/translation/audit/audit.go index 677591e233..413d27e580 100644 --- a/internal/translation/audit/audit.go +++ b/internal/translation/audit/audit.go @@ -18,7 +18,7 @@ import ( "context" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) // AuditLogService is the interface exposed by this translation layer over diff --git a/internal/translation/audit/conversion.go b/internal/translation/audit/conversion.go index b5585fc4a6..f55937c279 100644 --- a/internal/translation/audit/conversion.go +++ b/internal/translation/audit/conversion.go @@ -15,7 +15,7 @@ package audit import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" ) diff --git a/internal/translation/customroles/conversion.go b/internal/translation/customroles/conversion.go index 1b128654e6..f4d61c6aa4 100644 --- a/internal/translation/customroles/conversion.go +++ b/internal/translation/customroles/conversion.go @@ -15,7 +15,7 @@ package customroles import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/internal/translation/customroles/custom_roles.go b/internal/translation/customroles/custom_roles.go index 7d6a28b56d..d56f4a1a0a 100644 --- a/internal/translation/customroles/custom_roles.go +++ b/internal/translation/customroles/custom_roles.go @@ -19,7 +19,7 @@ import ( "fmt" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/httputil" ) diff --git a/internal/translation/datafederation/conversion.go b/internal/translation/datafederation/conversion.go index 6963757923..b0ba1b2ae9 100644 --- a/internal/translation/datafederation/conversion.go +++ b/internal/translation/datafederation/conversion.go @@ -18,7 +18,7 @@ import ( "fmt" "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" diff --git a/internal/translation/datafederation/conversion_endpoints.go b/internal/translation/datafederation/conversion_endpoints.go index 9dd444cb76..44211f8c63 100644 --- a/internal/translation/datafederation/conversion_endpoints.go +++ b/internal/translation/datafederation/conversion_endpoints.go @@ -19,7 +19,7 @@ import ( "fmt" "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/cmp" diff --git a/internal/translation/datafederation/datafederation.go b/internal/translation/datafederation/datafederation.go index a2d623b7d9..1686d0afbf 100644 --- a/internal/translation/datafederation/datafederation.go +++ b/internal/translation/datafederation/datafederation.go @@ -20,7 +20,7 @@ import ( "fmt" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/httputil" ) diff --git a/internal/translation/datafederation/datafederationendpoints.go b/internal/translation/datafederation/datafederationendpoints.go index 3ef7c41285..38d5bc2b1f 100644 --- a/internal/translation/datafederation/datafederationendpoints.go +++ b/internal/translation/datafederation/datafederationendpoints.go @@ -19,7 +19,7 @@ import ( "fmt" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/translation/paging" ) diff --git a/internal/translation/dbuser/conversion.go b/internal/translation/dbuser/conversion.go index d6ae4de48c..4cf747e0d5 100644 --- a/internal/translation/dbuser/conversion.go +++ b/internal/translation/dbuser/conversion.go @@ -21,7 +21,7 @@ import ( "time" "github.com/nsf/jsondiff" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" diff --git a/internal/translation/dbuser/dbuser.go b/internal/translation/dbuser/dbuser.go index 7ff5a1fc03..ae1025fbf1 100644 --- a/internal/translation/dbuser/dbuser.go +++ b/internal/translation/dbuser/dbuser.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/controller/atlas" ) diff --git a/internal/translation/dbuser/dbuser_test.go b/internal/translation/dbuser/dbuser_test.go index a8a38d4fc1..35b4bb9757 100644 --- a/internal/translation/dbuser/dbuser_test.go +++ b/internal/translation/dbuser/dbuser_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" ) diff --git a/internal/translation/dbuser/internal_test.go b/internal/translation/dbuser/internal_test.go index 84f433dcf1..1f3e8fdf7e 100644 --- a/internal/translation/dbuser/internal_test.go +++ b/internal/translation/dbuser/internal_test.go @@ -20,7 +20,7 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/internal/translation/deployment/compare_test.go b/internal/translation/deployment/compare_test.go index 5ff0314bcd..025f1816c5 100644 --- a/internal/translation/deployment/compare_test.go +++ b/internal/translation/deployment/compare_test.go @@ -18,7 +18,7 @@ import ( "testing" "github.com/stretchr/testify/assert" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" diff --git a/internal/translation/deployment/conversion.go b/internal/translation/deployment/conversion.go index a2b8eb4a62..f33d3e9822 100644 --- a/internal/translation/deployment/conversion.go +++ b/internal/translation/deployment/conversion.go @@ -19,7 +19,7 @@ import ( "strconv" "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" diff --git a/internal/translation/deployment/conversion_test.go b/internal/translation/deployment/conversion_test.go index 77fedef961..e9e2f40406 100644 --- a/internal/translation/deployment/conversion_test.go +++ b/internal/translation/deployment/conversion_test.go @@ -21,7 +21,7 @@ import ( fuzz "github.com/google/gofuzz" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" diff --git a/internal/translation/deployment/deployment.go b/internal/translation/deployment/deployment.go index d95b6832b8..a6d61ec5fb 100644 --- a/internal/translation/deployment/deployment.go +++ b/internal/translation/deployment/deployment.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/controller/atlas" diff --git a/internal/translation/deployment/deployment_test.go b/internal/translation/deployment/deployment_test.go index 1ef4e9489c..abf9c77c93 100644 --- a/internal/translation/deployment/deployment_test.go +++ b/internal/translation/deployment/deployment_test.go @@ -25,8 +25,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" diff --git a/internal/translation/encryptionatrest/conversion.go b/internal/translation/encryptionatrest/conversion.go index f1167dcc5c..568a77e312 100644 --- a/internal/translation/encryptionatrest/conversion.go +++ b/internal/translation/encryptionatrest/conversion.go @@ -17,7 +17,7 @@ package encryptionatrest import ( "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/common" diff --git a/internal/translation/encryptionatrest/encryptionatrest.go b/internal/translation/encryptionatrest/encryptionatrest.go index 95abb9bc30..34321ea2af 100644 --- a/internal/translation/encryptionatrest/encryptionatrest.go +++ b/internal/translation/encryptionatrest/encryptionatrest.go @@ -18,7 +18,7 @@ import ( "context" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) type EncryptionAtRestService interface { diff --git a/internal/translation/ipaccesslist/conversion.go b/internal/translation/ipaccesslist/conversion.go index 1f5d97c2fb..ef0752243b 100644 --- a/internal/translation/ipaccesslist/conversion.go +++ b/internal/translation/ipaccesslist/conversion.go @@ -20,7 +20,7 @@ import ( "strings" "time" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/project" diff --git a/internal/translation/ipaccesslist/ipaccesslist.go b/internal/translation/ipaccesslist/ipaccesslist.go index 86e09e3146..cb0b3d75a1 100644 --- a/internal/translation/ipaccesslist/ipaccesslist.go +++ b/internal/translation/ipaccesslist/ipaccesslist.go @@ -19,7 +19,7 @@ import ( "fmt" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/translation/paging" ) diff --git a/internal/translation/ipaccesslist/ipaccesslist_test.go b/internal/translation/ipaccesslist/ipaccesslist_test.go index cbf3510538..6a2ac35bc5 100644 --- a/internal/translation/ipaccesslist/ipaccesslist_test.go +++ b/internal/translation/ipaccesslist/ipaccesslist_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" ) diff --git a/internal/translation/maintenancewindow/conversion.go b/internal/translation/maintenancewindow/conversion.go index 8679b2eb15..749bf6fc13 100644 --- a/internal/translation/maintenancewindow/conversion.go +++ b/internal/translation/maintenancewindow/conversion.go @@ -17,7 +17,7 @@ package maintenancewindow import ( "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/project" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/internal/translation/maintenancewindow/maintenancewindow.go b/internal/translation/maintenancewindow/maintenancewindow.go index a85708b44f..f1f11893fe 100644 --- a/internal/translation/maintenancewindow/maintenancewindow.go +++ b/internal/translation/maintenancewindow/maintenancewindow.go @@ -18,7 +18,7 @@ import ( "context" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) type MaintenanceWindowService interface { diff --git a/internal/translation/networkcontainer/conversion.go b/internal/translation/networkcontainer/conversion.go index cf94d04d03..a719cbefa3 100644 --- a/internal/translation/networkcontainer/conversion.go +++ b/internal/translation/networkcontainer/conversion.go @@ -15,7 +15,7 @@ package networkcontainer import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" diff --git a/internal/translation/networkcontainer/networkcontainer.go b/internal/translation/networkcontainer/networkcontainer.go index cd3e16ceaf..205297af98 100644 --- a/internal/translation/networkcontainer/networkcontainer.go +++ b/internal/translation/networkcontainer/networkcontainer.go @@ -20,7 +20,7 @@ import ( "fmt" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/controller/atlas" @@ -52,7 +52,7 @@ type networkContainerService struct { } func NewNetworkContainerServiceFromClientSet(clientSet *atlas.ClientSet) NetworkContainerService { - return NewNetworkContainerService(clientSet.SdkClient20250312009.NetworkPeeringApi) + return NewNetworkContainerService(clientSet.SdkClient20250312011.NetworkPeeringApi) } func NewNetworkContainerService(peeringAPI admin.NetworkPeeringApi) NetworkContainerService { diff --git a/internal/translation/networkcontainer/networkcontainer_test.go b/internal/translation/networkcontainer/networkcontainer_test.go index 080192803e..31aef10ae7 100644 --- a/internal/translation/networkcontainer/networkcontainer_test.go +++ b/internal/translation/networkcontainer/networkcontainer_test.go @@ -21,8 +21,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" diff --git a/internal/translation/networkpeering/conversion.go b/internal/translation/networkpeering/conversion.go index dce6bbe623..4ea4cbe36d 100644 --- a/internal/translation/networkpeering/conversion.go +++ b/internal/translation/networkpeering/conversion.go @@ -19,7 +19,7 @@ import ( "fmt" "reflect" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" diff --git a/internal/translation/networkpeering/conversion_test.go b/internal/translation/networkpeering/conversion_test.go index d6a77a484d..25a72bb58d 100644 --- a/internal/translation/networkpeering/conversion_test.go +++ b/internal/translation/networkpeering/conversion_test.go @@ -21,7 +21,7 @@ import ( gofuzz "github.com/google/gofuzz" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" ) diff --git a/internal/translation/networkpeering/networkpeering.go b/internal/translation/networkpeering/networkpeering.go index b96bf702c8..24b957193d 100644 --- a/internal/translation/networkpeering/networkpeering.go +++ b/internal/translation/networkpeering/networkpeering.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/controller/atlas" @@ -42,7 +42,7 @@ type networkPeeringService struct { } func NewNetworkPeeringServiceFromClientSet(clientSet *atlas.ClientSet) NetworkPeeringService { - return NewNetworkPeeringService(clientSet.SdkClient20250312009.NetworkPeeringApi) + return NewNetworkPeeringService(clientSet.SdkClient20250312011.NetworkPeeringApi) } func NewNetworkPeeringService(peeringAPI admin.NetworkPeeringApi) NetworkPeeringService { diff --git a/internal/translation/networkpeering/networkpeering_test.go b/internal/translation/networkpeering/networkpeering_test.go index c5d6ceebb7..975a39e683 100644 --- a/internal/translation/networkpeering/networkpeering_test.go +++ b/internal/translation/networkpeering/networkpeering_test.go @@ -21,8 +21,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/provider" diff --git a/internal/translation/privateendpoint/conversion.go b/internal/translation/privateendpoint/conversion.go index 17d5680426..cc870582ac 100644 --- a/internal/translation/privateendpoint/conversion.go +++ b/internal/translation/privateendpoint/conversion.go @@ -17,7 +17,7 @@ package privateendpoint import ( "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/status" diff --git a/internal/translation/privateendpoint/privateendpoint.go b/internal/translation/privateendpoint/privateendpoint.go index 280dada867..3ba38a6186 100644 --- a/internal/translation/privateendpoint/privateendpoint.go +++ b/internal/translation/privateendpoint/privateendpoint.go @@ -19,7 +19,7 @@ import ( "fmt" "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "golang.org/x/exp/slices" ) diff --git a/internal/translation/privateendpoint/privateendpoint_test.go b/internal/translation/privateendpoint/privateendpoint_test.go index 6a865ca7c9..70bc292a6e 100644 --- a/internal/translation/privateendpoint/privateendpoint_test.go +++ b/internal/translation/privateendpoint/privateendpoint_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" ) diff --git a/internal/translation/project/conversion.go b/internal/translation/project/conversion.go index 779d135ebb..984ffb2b72 100644 --- a/internal/translation/project/conversion.go +++ b/internal/translation/project/conversion.go @@ -15,7 +15,7 @@ package project import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/translation/tag" diff --git a/internal/translation/project/project.go b/internal/translation/project/project.go index a9c9a0d3ee..11aeeac358 100644 --- a/internal/translation/project/project.go +++ b/internal/translation/project/project.go @@ -18,7 +18,7 @@ import ( "context" "errors" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "sigs.k8s.io/controller-runtime/pkg/client" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" diff --git a/internal/translation/project/project_test.go b/internal/translation/project/project_test.go index e79e2614b3..951b8daf71 100644 --- a/internal/translation/project/project_test.go +++ b/internal/translation/project/project_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/internal/translation/searchindex/searchIndexsvc.go b/internal/translation/searchindex/searchIndexsvc.go index acce9e946d..9b18c8c321 100644 --- a/internal/translation/searchindex/searchIndexsvc.go +++ b/internal/translation/searchindex/searchIndexsvc.go @@ -20,7 +20,7 @@ import ( "fmt" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/httputil" ) diff --git a/internal/translation/searchindex/searchindex.go b/internal/translation/searchindex/searchindex.go index bb69a81717..6178fc1797 100644 --- a/internal/translation/searchindex/searchindex.go +++ b/internal/translation/searchindex/searchindex.go @@ -20,7 +20,7 @@ import ( "errors" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" diff --git a/internal/translation/searchindex/searchindex_test.go b/internal/translation/searchindex/searchindex_test.go index ecef176ed4..002714d3d5 100644 --- a/internal/translation/searchindex/searchindex_test.go +++ b/internal/translation/searchindex/searchindex_test.go @@ -21,7 +21,7 @@ import ( "github.com/google/go-cmp/cmp" "github.com/google/go-cmp/cmp/cmpopts" "github.com/stretchr/testify/assert" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" diff --git a/internal/translation/tag/tag.go b/internal/translation/tag/tag.go index ca12771a09..ae9a4bfad6 100644 --- a/internal/translation/tag/tag.go +++ b/internal/translation/tag/tag.go @@ -15,7 +15,7 @@ package tag import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" ) diff --git a/internal/translation/teams/conversion.go b/internal/translation/teams/conversion.go index 0ce3ef60b3..408b7df148 100644 --- a/internal/translation/teams/conversion.go +++ b/internal/translation/teams/conversion.go @@ -15,7 +15,7 @@ package teams import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" @@ -117,8 +117,8 @@ func TeamRolesToAtlas(atlasTeams []AssignedTeam) []admin.TeamRole { for _, team := range atlasTeams { result := admin.TeamRole{ - TeamId: pointer.MakePtrOrNil(team.TeamID), - RoleNames: &team.Roles, + TeamId: team.TeamID, + RoleNames: team.Roles, } teams = append(teams, result) } diff --git a/internal/translation/teams/teams.go b/internal/translation/teams/teams.go index 90dab52f31..fc25654494 100644 --- a/internal/translation/teams/teams.go +++ b/internal/translation/teams/teams.go @@ -19,7 +19,7 @@ import ( "fmt" "net/http" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/httputil" @@ -135,7 +135,7 @@ func (tm *TeamsAPI) UpdateRoles(ctx context.Context, at *AssignedTeam, projectID roles = append(roles, string(role)) } - _, _, err := tm.teamsAPI.UpdateGroupTeam(ctx, projectID, at.TeamID, &admin.TeamRole{RoleNames: &roles}).Execute() + _, _, err := tm.teamsAPI.UpdateGroupTeam(ctx, projectID, at.TeamID, &admin.TeamRole{RoleNames: roles}).Execute() return err } diff --git a/internal/translation/teams/teams_test.go b/internal/translation/teams/teams_test.go index 34bdb7cea3..8c01e50d14 100644 --- a/internal/translation/teams/teams_test.go +++ b/internal/translation/teams/teams_test.go @@ -23,8 +23,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" ) @@ -71,12 +71,12 @@ func TestTeamsAPI_ListProjectTeams(t *testing.T) { Return(&admin.PaginatedTeamRole{ Results: &[]admin.TeamRole{ { - RoleNames: &[]string{"role1", "role2"}, - TeamId: &testTeamID1, + RoleNames: []string{"role1", "role2"}, + TeamId: testTeamID1, }, { - RoleNames: &[]string{"role3", "role4"}, - TeamId: &testTeamID2, + RoleNames: []string{"role3", "role4"}, + TeamId: testTeamID2, }, }, }, &http.Response{}, nil) @@ -242,8 +242,8 @@ func TestTeamsAPI_Assign(t *testing.T) { Return(&admin.PaginatedTeamRole{ Results: &[]admin.TeamRole{ { - RoleNames: &[]string{"role1", "role2"}, - TeamId: &testTeamID1, + RoleNames: []string{"role1", "role2"}, + TeamId: testTeamID1, }, }, }, &http.Response{}, nil) @@ -461,8 +461,8 @@ func TestTeamsAPI_UpdateRoles(t *testing.T) { Return(&admin.PaginatedTeamRole{ Results: &[]admin.TeamRole{ { - RoleNames: &[]string{"role1", "role2"}, - TeamId: &testTeamID1, + RoleNames: []string{"role1", "role2"}, + TeamId: testTeamID1, }, }, }, &http.Response{}, nil) diff --git a/internal/translation/thirdpartyintegration/conversion.go b/internal/translation/thirdpartyintegration/conversion.go index ee96f2d116..d3fad5b3bc 100644 --- a/internal/translation/thirdpartyintegration/conversion.go +++ b/internal/translation/thirdpartyintegration/conversion.go @@ -19,7 +19,7 @@ import ( "fmt" "strings" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/internal/translation/thirdpartyintegration/thirdpartyintegration.go b/internal/translation/thirdpartyintegration/thirdpartyintegration.go index 6e29b3d737..fd7adc930a 100644 --- a/internal/translation/thirdpartyintegration/thirdpartyintegration.go +++ b/internal/translation/thirdpartyintegration/thirdpartyintegration.go @@ -19,7 +19,7 @@ import ( "errors" "fmt" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/controller/atlas" ) @@ -38,7 +38,7 @@ type ThirdPartyIntegrationService interface { } func NewThirdPartyIntegrationServiceFromClientSet(clientSet *atlas.ClientSet) ThirdPartyIntegrationService { - return NewThirdPartyIntegrationService(clientSet.SdkClient20250312009.ThirdPartyIntegrationsApi) + return NewThirdPartyIntegrationService(clientSet.SdkClient20250312011.ThirdPartyIntegrationsApi) } func NewThirdPartyIntegrationService(integrationsAPI admin.ThirdPartyIntegrationsApi) ThirdPartyIntegrationService { diff --git a/internal/translation/thirdpartyintegration/thirdpartyintegration_test.go b/internal/translation/thirdpartyintegration/thirdpartyintegration_test.go index 34fb431d21..3147ebc6be 100644 --- a/internal/translation/thirdpartyintegration/thirdpartyintegration_test.go +++ b/internal/translation/thirdpartyintegration/thirdpartyintegration_test.go @@ -21,8 +21,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" - "go.mongodb.org/atlas-sdk/v20250312009/admin" - "go.mongodb.org/atlas-sdk/v20250312009/mockadmin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" + "go.mongodb.org/atlas-sdk/v20250312011/mockadmin" akov2 "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" diff --git a/scripts/update-sdk.sh b/scripts/update-sdk.sh index ea2501d465..f4b7138417 100755 --- a/scripts/update-sdk.sh +++ b/scripts/update-sdk.sh @@ -16,7 +16,9 @@ set -euo pipefail -CURRENT_SDK_RELEASE=$(go list -m all | grep go.mongodb.org/atlas-sdk | awk -F '/| ' '{print $3}') +CURRENT_SDK_TAG=$(go list -m all | grep go.mongodb.org/atlas-sdk | awk -F '/| ' '{print $4}') +CURRENT_SDK_RELEASE=$(echo "${CURRENT_SDK_TAG}" | cut -d '.' -f 1) +echo "CURRENT_SDK_TAG: $CURRENT_SDK_TAG" echo "CURRENT_SDK_RELEASE: $CURRENT_SDK_RELEASE" LATEST_SDK_TAG=$(curl -sSfL -X GET https://api.github.com/repos/mongodb/atlas-sdk-go/releases/latest | jq -r '.tag_name') @@ -29,4 +31,6 @@ echo "==> Updating SDK to latest major version ${LATEST_SDK_TAG}" go tool --modfile tools/toolbox/go.mod gomajor get --rewrite "go.mongodb.org/atlas-sdk/${CURRENT_SDK_RELEASE}" "go.mongodb.org/atlas-sdk/${LATEST_SDK_RELEASE}@${LATEST_SDK_TAG}" go mod tidy +sed -i -e "s/${CURRENT_SDK_RELEASE}/${LATEST_SDK_RELEASE}/g" config/openapi2crd.yaml + echo "Done" \ No newline at end of file diff --git a/test/e2e/alert_config_test.go b/test/e2e/alert_config_test.go index f54ec916e8..265c2adb8e 100644 --- a/test/e2e/alert_config_test.go +++ b/test/e2e/alert_config_test.go @@ -21,7 +21,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/types" diff --git a/test/e2e/dry_run_test.go b/test/e2e/dry_run_test.go index 35084f3990..4f64da481b 100644 --- a/test/e2e/dry_run_test.go +++ b/test/e2e/dry_run_test.go @@ -23,7 +23,7 @@ import ( "github.com/google/uuid" . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/fields" diff --git a/test/e2e/encryption_at_rest_test.go b/test/e2e/encryption_at_rest_test.go index c61c214797..e8f5fa6530 100644 --- a/test/e2e/encryption_at_rest_test.go +++ b/test/e2e/encryption_at_rest_test.go @@ -22,7 +22,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/types" diff --git a/test/e2e/flex_deployment_test.go b/test/e2e/flex_deployment_test.go index e7eca4f594..930c141b19 100644 --- a/test/e2e/flex_deployment_test.go +++ b/test/e2e/flex_deployment_test.go @@ -22,7 +22,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/types" diff --git a/test/e2e/free_tier_test.go b/test/e2e/free_tier_test.go index 7fd83e7876..08db785368 100644 --- a/test/e2e/free_tier_test.go +++ b/test/e2e/free_tier_test.go @@ -19,7 +19,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/pointer" "github.com/mongodb/mongodb-atlas-kubernetes/v2/test/helper/e2e/actions" diff --git a/test/helper/access/ipaccesslist_matcher.go b/test/helper/access/ipaccesslist_matcher.go index 558c24eb33..372d6fb3a3 100644 --- a/test/helper/access/ipaccesslist_matcher.go +++ b/test/helper/access/ipaccesslist_matcher.go @@ -17,7 +17,7 @@ package access import ( "github.com/onsi/gomega/format" "github.com/onsi/gomega/types" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/project" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/timeutil" diff --git a/test/helper/atlas/waiters.go b/test/helper/atlas/waiters.go index 2a08e89747..f1b1595e3b 100644 --- a/test/helper/atlas/waiters.go +++ b/test/helper/atlas/waiters.go @@ -18,7 +18,7 @@ import ( "context" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) // WaitForAtlasDeploymentStateToNotBeReached periodically checks the given atlas deployment for a given condition. The function diff --git a/test/helper/e2e/actions/steps.go b/test/helper/e2e/actions/steps.go index fcd5f1fc39..9f2758dd4d 100644 --- a/test/helper/e2e/actions/steps.go +++ b/test/helper/e2e/actions/steps.go @@ -23,7 +23,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" . "github.com/onsi/gomega/gstruct" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/types" diff --git a/test/helper/e2e/api/atlas/atlas.go b/test/helper/e2e/api/atlas/atlas.go index 4410a9db4f..7887ea451d 100644 --- a/test/helper/e2e/api/atlas/atlas.go +++ b/test/helper/e2e/api/atlas/atlas.go @@ -22,7 +22,7 @@ import ( "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/controller/atlas" "github.com/mongodb/mongodb-atlas-kubernetes/v2/internal/translation/paging" diff --git a/test/helper/e2e/fixtest/remove_duplicates.go b/test/helper/e2e/fixtest/remove_duplicates.go index e9fe605443..141af1129d 100644 --- a/test/helper/e2e/fixtest/remove_duplicates.go +++ b/test/helper/e2e/fixtest/remove_duplicates.go @@ -19,7 +19,7 @@ import ( "io" "sort" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" "go.uber.org/zap/zapcore" ) diff --git a/test/helper/e2e/model/atlas_key_type.go b/test/helper/e2e/model/atlas_key_type.go index bf37161155..6d9183317c 100644 --- a/test/helper/e2e/model/atlas_key_type.go +++ b/test/helper/e2e/model/atlas_key_type.go @@ -15,7 +15,7 @@ package model import ( - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) type AtlasRoles = string diff --git a/test/helper/maintenance/maintenancewindow_matcher.go b/test/helper/maintenance/maintenancewindow_matcher.go index be6a43f086..3dc13b67ee 100644 --- a/test/helper/maintenance/maintenancewindow_matcher.go +++ b/test/helper/maintenance/maintenancewindow_matcher.go @@ -20,7 +20,7 @@ import ( "github.com/onsi/gomega/format" "github.com/onsi/gomega/types" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "github.com/mongodb/mongodb-atlas-kubernetes/v2/api/v1/project" ) diff --git a/test/int/clusterwide/integration_suite_test.go b/test/int/clusterwide/integration_suite_test.go index ffac809f8a..06ca95737d 100644 --- a/test/int/clusterwide/integration_suite_test.go +++ b/test/int/clusterwide/integration_suite_test.go @@ -25,7 +25,7 @@ import ( "github.com/go-logr/zapr" . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" "k8s.io/client-go/kubernetes/scheme" diff --git a/test/int/databaseuser_protected_test.go b/test/int/databaseuser_protected_test.go index bb5012ac29..ec059ec4a6 100644 --- a/test/int/databaseuser_protected_test.go +++ b/test/int/databaseuser_protected_test.go @@ -22,7 +22,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/test/int/databaseuser_unprotected_test.go b/test/int/databaseuser_unprotected_test.go index 2ea360e015..66a5124569 100644 --- a/test/int/databaseuser_unprotected_test.go +++ b/test/int/databaseuser_unprotected_test.go @@ -25,7 +25,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.mongodb.org/mongo-driver/bson" "go.mongodb.org/mongo-driver/mongo" "go.mongodb.org/mongo-driver/mongo/options" diff --git a/test/int/datafederation_protect_test.go b/test/int/datafederation_protect_test.go index c1ea50437d..21070d8d61 100644 --- a/test/int/datafederation_protect_test.go +++ b/test/int/datafederation_protect_test.go @@ -21,7 +21,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/test/int/deployment_test.go b/test/int/deployment_test.go index 079a6e7561..a0f000b0b1 100644 --- a/test/int/deployment_test.go +++ b/test/int/deployment_test.go @@ -26,7 +26,7 @@ import ( "github.com/google/go-cmp/cmp/cmpopts" . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" k8serrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" diff --git a/test/int/federated_auth_test.go b/test/int/federated_auth_test.go index 23e1cfdc80..0502f0d0cc 100644 --- a/test/int/federated_auth_test.go +++ b/test/int/federated_auth_test.go @@ -21,7 +21,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/test/int/integration_suite_test.go b/test/int/integration_suite_test.go index 5b5b69b3bb..b37180d976 100644 --- a/test/int/integration_suite_test.go +++ b/test/int/integration_suite_test.go @@ -27,7 +27,7 @@ import ( "github.com/go-logr/zapr" . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "go.uber.org/zap" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" diff --git a/test/int/project_protect_test.go b/test/int/project_protect_test.go index 48562c9b7f..34dfeabd32 100644 --- a/test/int/project_protect_test.go +++ b/test/int/project_protect_test.go @@ -22,7 +22,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/test/int/project_test.go b/test/int/project_test.go index a5a5dcb619..a0345ebe60 100644 --- a/test/int/project_test.go +++ b/test/int/project_test.go @@ -23,7 +23,7 @@ import ( . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "sigs.k8s.io/controller-runtime/pkg/client" diff --git a/tools/clean/atlas/atlas.go b/tools/clean/atlas/atlas.go index a0280f9298..9a735704fa 100644 --- a/tools/clean/atlas/atlas.go +++ b/tools/clean/atlas/atlas.go @@ -22,7 +22,7 @@ import ( "time" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" "tools/clean/provider" ) diff --git a/tools/clean/atlas/clusters.go b/tools/clean/atlas/clusters.go index 958fd2730d..10f599e135 100644 --- a/tools/clean/atlas/clusters.go +++ b/tools/clean/atlas/clusters.go @@ -19,7 +19,7 @@ import ( "fmt" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) listClusters(ctx context.Context, projectID string) []admin.ClusterDescription20240805 { diff --git a/tools/clean/atlas/data_federation.go b/tools/clean/atlas/data_federation.go index 0ce297fd94..cf1390bb9f 100644 --- a/tools/clean/atlas/data_federation.go +++ b/tools/clean/atlas/data_federation.go @@ -19,7 +19,7 @@ import ( "fmt" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) listFederatedDatabases(ctx context.Context, projectID string) []admin.DataLakeTenant { diff --git a/tools/clean/atlas/data_federation_private_endpoints.go b/tools/clean/atlas/data_federation_private_endpoints.go index b88da6e001..6a5c32e5c3 100644 --- a/tools/clean/atlas/data_federation_private_endpoints.go +++ b/tools/clean/atlas/data_federation_private_endpoints.go @@ -19,7 +19,7 @@ import ( "fmt" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) listFederatedDBPrivateEndpoints(ctx context.Context, projectID string) []admin.PrivateNetworkEndpointIdEntry { diff --git a/tools/clean/atlas/encryption_at_rest.go b/tools/clean/atlas/encryption_at_rest.go index 8fa87fdd80..606a8ad1ac 100644 --- a/tools/clean/atlas/encryption_at_rest.go +++ b/tools/clean/atlas/encryption_at_rest.go @@ -19,7 +19,7 @@ import ( "fmt" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) getEncryptionAtRest(ctx context.Context, projectID string) *admin.EncryptionAtRest { diff --git a/tools/clean/atlas/network_peering.go b/tools/clean/atlas/network_peering.go index fcd358038f..e723d16603 100644 --- a/tools/clean/atlas/network_peering.go +++ b/tools/clean/atlas/network_peering.go @@ -19,7 +19,7 @@ import ( "fmt" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) listNetworkPeering(ctx context.Context, projectID string, providers []string) []admin.BaseNetworkPeeringConnectionSettings { diff --git a/tools/clean/atlas/private_endpoints.go b/tools/clean/atlas/private_endpoints.go index e6d8b36201..149ea08d56 100644 --- a/tools/clean/atlas/private_endpoints.go +++ b/tools/clean/atlas/private_endpoints.go @@ -19,7 +19,7 @@ import ( "fmt" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) listPrivateEndpoints(ctx context.Context, projectID, cloudProvider string) []admin.EndpointService { diff --git a/tools/clean/atlas/projects.go b/tools/clean/atlas/projects.go index 306de1ffbd..4cb1a039ea 100644 --- a/tools/clean/atlas/projects.go +++ b/tools/clean/atlas/projects.go @@ -20,7 +20,7 @@ import ( "sync" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) listProjectsByOrg(ctx context.Context, orgID string) []admin.Group { diff --git a/tools/clean/atlas/streams.go b/tools/clean/atlas/streams.go index 86839b2135..8ba0421e69 100644 --- a/tools/clean/atlas/streams.go +++ b/tools/clean/atlas/streams.go @@ -19,7 +19,7 @@ import ( "fmt" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) listStreams(ctx context.Context, id string) []admin.StreamsTenant { diff --git a/tools/clean/atlas/teams.go b/tools/clean/atlas/teams.go index f46532a3d0..73df3f1e83 100644 --- a/tools/clean/atlas/teams.go +++ b/tools/clean/atlas/teams.go @@ -19,7 +19,7 @@ import ( "fmt" "github.com/jedib0t/go-pretty/v6/text" - "go.mongodb.org/atlas-sdk/v20250312009/admin" + "go.mongodb.org/atlas-sdk/v20250312011/admin" ) func (c *Cleaner) listTeamsByOrg(ctx context.Context, orgID string) []admin.TeamResponse { diff --git a/tools/clean/go.mod b/tools/clean/go.mod index a46f4ac111..43a8b714d9 100644 --- a/tools/clean/go.mod +++ b/tools/clean/go.mod @@ -15,7 +15,7 @@ require ( github.com/aws/aws-sdk-go-v2/service/kms v1.49.4 github.com/aws/smithy-go v1.24.0 github.com/jedib0t/go-pretty/v6 v6.7.7 - go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0 + go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0 google.golang.org/api v0.257.0 ) diff --git a/tools/clean/go.sum b/tools/clean/go.sum index ccef01e4b1..e2c72abc28 100644 --- a/tools/clean/go.sum +++ b/tools/clean/go.sum @@ -119,8 +119,8 @@ github.com/rivo/uniseg v0.4.7 h1:WUdvkW8uEhrYfLC4ZzdpI2ztxP1I582+49Oc5Mq64VQ= github.com/rivo/uniseg v0.4.7/go.mod h1:FN3SvrM+Zdj16jyLfmOkMNblXMcoc8DfTHruCPUcx88= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0 h1:iaFFJcOkT7U5WcuOl8XVAOkPwBlP27coQGJUiDVd3+8= -go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0/go.mod h1:fusey5SPjrcmUiJ+MxvYtEgV7N/lkW3SjacSYYejlAc= +go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0 h1:yIb9nnhXfF62m6s83pZvGJpPUOQZtAgDWp2b0dgKHmo= +go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0/go.mod h1:uP/+Tal6pOGcRMAptkDxULKvpI6frOux17vs+rRza/s= go.opentelemetry.io/auto/sdk v1.2.1 h1:jXsnJ4Lmnqd11kwkBV2LgLoFMZKizbCi5fNZ/ipaZ64= go.opentelemetry.io/auto/sdk v1.2.1/go.mod h1:KRTj+aOaElaLi+wW1kO/DZRXwkF4C5xPbEe3ZiIhN7Y= go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.61.0 h1:q4XOmH/0opmeuJtPsbFNivyl7bCt7yRBbeEm2sC/XtQ= diff --git a/tools/openapi2crd/go.mod b/tools/openapi2crd/go.mod index cb7eff7076..460e183c43 100644 --- a/tools/openapi2crd/go.mod +++ b/tools/openapi2crd/go.mod @@ -20,7 +20,7 @@ require ( github.com/stretchr/testify v1.11.1 go.mongodb.org/atlas-sdk/v20250312005 v20250312005.0.0 go.mongodb.org/atlas-sdk/v20250312008 v20250312008.0.0 - go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0 + go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0 k8s.io/api v0.32.9 k8s.io/apiextensions-apiserver v0.32.9 k8s.io/apimachinery v0.32.9 @@ -109,7 +109,7 @@ require ( golang.org/x/exp v0.0.0-20251023183803-a4bb9ffd2546 // indirect golang.org/x/mod v0.29.0 // indirect golang.org/x/net v0.46.0 // indirect - golang.org/x/oauth2 v0.32.0 // indirect + golang.org/x/oauth2 v0.33.0 // indirect golang.org/x/sync v0.17.0 // indirect golang.org/x/sys v0.37.0 // indirect golang.org/x/term v0.36.0 // indirect diff --git a/tools/openapi2crd/go.sum b/tools/openapi2crd/go.sum index 3c6c6c0e02..3478dda460 100644 --- a/tools/openapi2crd/go.sum +++ b/tools/openapi2crd/go.sum @@ -196,8 +196,8 @@ go.mongodb.org/atlas-sdk/v20250312005 v20250312005.0.0 h1:uKOtHXCP/Gwuj+IF1hsKtI go.mongodb.org/atlas-sdk/v20250312005 v20250312005.0.0/go.mod h1:UeRE741z+kDGH00qQasZmthQxJMeA6PmAtY/2dStW+Q= go.mongodb.org/atlas-sdk/v20250312008 v20250312008.0.0 h1:Pzrb2bPXtkw1vDTiFxovZyYD4BIA4l0o6c2/HBqxe0I= go.mongodb.org/atlas-sdk/v20250312008 v20250312008.0.0/go.mod h1:o1ExR4zmunAhRHXF5hlkVUNoJNkmyQ9vRScDGahstyQ= -go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0 h1:iaFFJcOkT7U5WcuOl8XVAOkPwBlP27coQGJUiDVd3+8= -go.mongodb.org/atlas-sdk/v20250312009 v20250312009.1.0/go.mod h1:fusey5SPjrcmUiJ+MxvYtEgV7N/lkW3SjacSYYejlAc= +go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0 h1:yIb9nnhXfF62m6s83pZvGJpPUOQZtAgDWp2b0dgKHmo= +go.mongodb.org/atlas-sdk/v20250312011 v20250312011.0.0/go.mod h1:uP/+Tal6pOGcRMAptkDxULKvpI6frOux17vs+rRza/s= go.opentelemetry.io/auto/sdk v1.1.0 h1:cH53jehLUN6UFLY71z+NDOiNJqDdPRaXzTel0sJySYA= go.opentelemetry.io/auto/sdk v1.1.0/go.mod h1:3wSPjt5PWp2RhlCcmmOial7AvC4DQqZb7a7wCow3W8A= go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.54.0 h1:r6I7RJCN86bpD/FQwedZ0vSixDpwuWREjW9oRMsmqDc= @@ -245,8 +245,8 @@ golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLL golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU= golang.org/x/net v0.46.0 h1:giFlY12I07fugqwPuWJi68oOnpfqFnJIJzaIIm2JVV4= golang.org/x/net v0.46.0/go.mod h1:Q9BGdFy1y4nkUwiLvT5qtyhAnEHgnQ/zd8PfU6nc210= -golang.org/x/oauth2 v0.32.0 h1:jsCblLleRMDrxMN29H3z/k1KliIvpLgCkE6R8FXXNgY= -golang.org/x/oauth2 v0.32.0/go.mod h1:lzm5WQJQwKZ3nwavOZ3IS5Aulzxi68dUSgRHujetwEA= +golang.org/x/oauth2 v0.33.0 h1:4Q+qn+E5z8gPRJfmRy7C2gGG3T4jIprK6aSYgTXGRpo= +golang.org/x/oauth2 v0.33.0/go.mod h1:lzm5WQJQwKZ3nwavOZ3IS5Aulzxi68dUSgRHujetwEA= golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= diff --git a/tools/openapi2crd/pkg/config/dependency_magnet.go b/tools/openapi2crd/pkg/config/dependency_magnet.go index 67e89b1bfd..b90d37ea4a 100644 --- a/tools/openapi2crd/pkg/config/dependency_magnet.go +++ b/tools/openapi2crd/pkg/config/dependency_magnet.go @@ -18,5 +18,5 @@ package config import ( _ "go.mongodb.org/atlas-sdk/v20250312005/admin" _ "go.mongodb.org/atlas-sdk/v20250312008/admin" - _ "go.mongodb.org/atlas-sdk/v20250312009/admin" + _ "go.mongodb.org/atlas-sdk/v20250312011/admin" )