This is an automated email from the ASF dual-hosted git repository.

pcongiusti pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-k.git

commit 520e91a188b3dbd43c95ef05494fbf42b2f28336
Author: Pasquale Congiusti <pasquale.congiu...@gmail.com>
AuthorDate: Tue Jul 30 15:47:59 2024 +0200

    chore(ci): move to ptr package
---
 addons/keda/keda.go                                |  6 ++--
 addons/keda/keda_test.go                           | 26 ++++++++--------
 addons/master/master.go                            | 14 ++++-----
 addons/resume/resume.go                            |  6 ++--
 addons/telemetry/telemetry.go                      | 13 ++++----
 addons/telemetry/telemetry_test.go                 | 14 ++++-----
 addons/threescale/3scale.go                        |  6 ++--
 addons/threescale/3scale_test.go                   |  8 ++---
 addons/tracing/tracing.go                          |  7 ++---
 addons/tracing/tracing_test.go                     |  4 +--
 addons/vault/aws/aws_secrets_manager.go            | 10 +++---
 addons/vault/aws/aws_secrets_manager_test.go       | 12 ++++----
 addons/vault/azure/azure_key_vault.go              | 10 +++---
 addons/vault/azure/azure_key_vault_test.go         | 18 +++++------
 addons/vault/gcp/gcp_secret_manager.go             | 10 +++---
 addons/vault/gcp/gcp_secret_manager_test.go        | 10 +++---
 addons/vault/hashicorp/hashicorp_vault.go          |  4 +--
 addons/vault/hashicorp/hashicorp_vault_test.go     |  8 ++---
 e2e/common/traits/toleration_test.go               |  6 ++--
 e2e/support/test_support.go                        | 10 +++---
 pkg/apis/camel/v1/common_types_support_test.go     | 12 ++++----
 pkg/cmd/debug.go                                   |  6 ++--
 pkg/cmd/debug_test.go                              |  4 +--
 pkg/cmd/run_test.go                                |  8 ++---
 .../integration/integration_controller.go          |  4 +--
 pkg/controller/integration/monitor.go              |  4 +--
 pkg/controller/integration/monitor_test.go         |  6 ++--
 pkg/controller/pipe/initialize_test.go             |  8 ++---
 pkg/controller/pipe/integration_test.go            |  6 ++--
 pkg/controller/pipe/monitor_test.go                | 30 +++++++++---------
 pkg/trait/affinity.go                              | 18 +++++------
 pkg/trait/affinity_test.go                         | 14 ++++-----
 pkg/trait/container.go                             | 10 +++---
 pkg/trait/container_probes_test.go                 | 24 +++++++--------
 pkg/trait/container_test.go                        | 26 ++++++++--------
 pkg/trait/cron.go                                  | 18 +++++------
 pkg/trait/cron_test.go                             |  8 ++---
 pkg/trait/deployer.go                              |  4 +--
 pkg/trait/environment.go                           |  8 ++---
 pkg/trait/environment_test.go                      |  6 ++--
 pkg/trait/gc.go                                    |  4 +--
 pkg/trait/gc_test.go                               |  6 ++--
 pkg/trait/health.go                                | 14 ++++-----
 pkg/trait/health_test.go                           | 14 ++++-----
 pkg/trait/ingress.go                               |  6 ++--
 pkg/trait/ingress_test.go                          |  8 ++---
 pkg/trait/init.go                                  |  5 ++-
 pkg/trait/istio.go                                 |  4 +--
 pkg/trait/istio_test.go                            | 12 ++++----
 pkg/trait/jolokia.go                               |  4 +--
 pkg/trait/jolokia_test.go                          |  8 ++---
 pkg/trait/jvm.go                                   |  8 ++---
 pkg/trait/jvm_test.go                              | 10 +++---
 pkg/trait/kamelets.go                              |  6 ++--
 pkg/trait/kamelets_test.go                         |  4 +--
 pkg/trait/knative.go                               | 18 +++++------
 pkg/trait/knative_service.go                       |  8 ++---
 pkg/trait/knative_service_test.go                  |  8 ++---
 pkg/trait/knative_test.go                          | 36 +++++++++++-----------
 pkg/trait/logging.go                               | 17 +++++-----
 pkg/trait/logging_test.go                          |  8 ++---
 pkg/trait/mount.go                                 |  4 +--
 pkg/trait/owner.go                                 |  4 +--
 pkg/trait/pdb.go                                   |  4 +--
 pkg/trait/pdb_test.go                              |  4 +--
 pkg/trait/platform.go                              | 12 ++++----
 pkg/trait/platform_test.go                         |  8 ++---
 pkg/trait/pod.go                                   |  4 +--
 pkg/trait/pod_test.go                              |  4 +--
 pkg/trait/prometheus.go                            |  8 ++---
 pkg/trait/pull_secret.go                           | 10 +++---
 pkg/trait/pull_secret_test.go                      |  8 ++---
 pkg/trait/quarkus.go                               |  4 +--
 pkg/trait/registry.go                              |  4 +--
 pkg/trait/route.go                                 |  4 +--
 pkg/trait/route_test.go                            |  4 +--
 pkg/trait/security_context.go                      |  4 +--
 pkg/trait/security_context_test.go                 | 14 ++++-----
 pkg/trait/service.go                               | 10 +++---
 pkg/trait/service_binding.go                       |  4 +--
 pkg/trait/service_test.go                          | 28 ++++++++---------
 pkg/trait/toleration.go                            |  4 +--
 pkg/trait/toleration_test.go                       |  4 +--
 pkg/trait/trait_configure_test.go                  | 18 +++++------
 pkg/trait/trait_test.go                            | 18 +++++------
 pkg/trait/trait_types_test.go                      |  6 ++--
 pkg/trait/util_test.go                             | 16 +++++-----
 pkg/util/bindings/bindings_test.go                 | 12 ++++----
 pkg/util/bindings/catalog.go                       |  4 +--
 pkg/util/bindings/knative_ref_test.go              | 14 ++++-----
 pkg/util/bindings/knative_uri.go                   |  7 ++---
 pkg/util/digest/digest_test.go                     |  6 ++--
 pkg/util/kubernetes/security.go                    |  6 ++--
 pkg/util/openshift/openshift.go                    |  6 ++--
 pkg/util/openshift/openshift_test.go               |  4 +--
 95 files changed, 450 insertions(+), 455 deletions(-)

diff --git a/addons/keda/keda.go b/addons/keda/keda.go
index 550fc045f..08b2fa832 100644
--- a/addons/keda/keda.go
+++ b/addons/keda/keda.go
@@ -42,7 +42,7 @@ import (
        autoscalingv1 "k8s.io/api/autoscaling/v1"
        v1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 )
 
@@ -117,7 +117,7 @@ func NewKedaTrait() trait.Trait {
 }
 
 func (t *kedaTrait) Configure(e *trait.Environment) (bool, 
*trait.TraitCondition, error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
        if e.CamelCatalog == nil {
@@ -137,7 +137,7 @@ func (t *kedaTrait) Configure(e *trait.Environment) (bool, 
*trait.TraitCondition
 
 func (t *kedaTrait) Apply(e *trait.Environment) error {
        if e.IntegrationInPhase(camelv1.IntegrationPhaseInitialization) {
-               if !pointer.BoolDeref(t.HackControllerReplicas, false) {
+               if !ptr.Deref(t.HackControllerReplicas, false) {
                        return nil
                }
                if err := t.hackControllerReplicas(e); err != nil {
diff --git a/addons/keda/keda_test.go b/addons/keda/keda_test.go
index cc2bc95c0..b017df262 100644
--- a/addons/keda/keda_test.go
+++ b/addons/keda/keda_test.go
@@ -36,13 +36,13 @@ import (
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/runtime"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 func TestManualConfig(t *testing.T) {
        keda, _ := NewKedaTrait().(*kedaTrait)
-       keda.Enabled = pointer.Bool(true)
-       keda.Auto = pointer.Bool(false)
+       keda.Enabled = ptr.To(true)
+       keda.Auto = ptr.To(false)
        meta := map[string]string{
                "prop":      "val",
                "camelCase": "VAL",
@@ -70,8 +70,8 @@ func TestManualConfig(t *testing.T) {
 
 func TestConfigFromSecret(t *testing.T) {
        keda, _ := NewKedaTrait().(*kedaTrait)
-       keda.Enabled = pointer.Bool(true)
-       keda.Auto = pointer.Bool(false)
+       keda.Enabled = ptr.To(true)
+       keda.Auto = ptr.To(false)
        meta := map[string]string{
                "prop":      "val",
                "camelCase": "VAL",
@@ -118,7 +118,7 @@ func TestConfigFromSecret(t *testing.T) {
 
 func TestKameletAutoDetection(t *testing.T) {
        keda, _ := NewKedaTrait().(*kedaTrait)
-       keda.Enabled = pointer.Bool(true)
+       keda.Enabled = ptr.To(true)
        env := createBasicTestEnvironment(
                &camelv1.Kamelet{
                        ObjectMeta: metav1.ObjectMeta{
@@ -209,7 +209,7 @@ func TestKameletAutoDetection(t *testing.T) {
 
 func TestPipeAutoDetection(t *testing.T) {
        keda, _ := NewKedaTrait().(*kedaTrait)
-       keda.Enabled = pointer.Bool(true)
+       keda.Enabled = ptr.To(true)
        logEndpoint := "log:info"
        klb := camelv1.Pipe{
                ObjectMeta: metav1.ObjectMeta{
@@ -324,15 +324,15 @@ func TestPipeAutoDetection(t *testing.T) {
 
 func TestHackReplicas(t *testing.T) {
        keda, _ := NewKedaTrait().(*kedaTrait)
-       keda.Enabled = pointer.Bool(true)
-       keda.Auto = pointer.Bool(false)
+       keda.Enabled = ptr.To(true)
+       keda.Auto = ptr.To(false)
        keda.Triggers = append(keda.Triggers, kedaTrigger{
                Type: "custom",
                Metadata: map[string]string{
                        "a": "b",
                },
        })
-       keda.HackControllerReplicas = pointer.Bool(true)
+       keda.HackControllerReplicas = ptr.To(true)
        env := createBasicTestEnvironment(
                &camelv1.Integration{
                        ObjectMeta: metav1.ObjectMeta{
@@ -359,15 +359,15 @@ func TestHackReplicas(t *testing.T) {
 
 func TestHackKLBReplicas(t *testing.T) {
        keda, _ := NewKedaTrait().(*kedaTrait)
-       keda.Enabled = pointer.Bool(true)
-       keda.Auto = pointer.Bool(false)
+       keda.Enabled = ptr.To(true)
+       keda.Auto = ptr.To(false)
        keda.Triggers = append(keda.Triggers, kedaTrigger{
                Type: "custom",
                Metadata: map[string]string{
                        "a": "b",
                },
        })
-       keda.HackControllerReplicas = pointer.Bool(true)
+       keda.HackControllerReplicas = ptr.To(true)
        env := createBasicTestEnvironment(
                &camelv1.Pipe{
                        ObjectMeta: metav1.ObjectMeta{
diff --git a/addons/master/master.go b/addons/master/master.go
index 845b8bd15..7e3fbda0f 100644
--- a/addons/master/master.go
+++ b/addons/master/master.go
@@ -21,7 +21,7 @@ import (
        "fmt"
        "strings"
 
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
@@ -85,7 +85,7 @@ func (t *masterTrait) Configure(e *trait.Environment) (bool, 
*trait.TraitConditi
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, 
trait.NewIntegrationConditionUserDisabled(masterComponent), nil
        }
        if e.CamelCatalog == nil {
@@ -95,8 +95,8 @@ func (t *masterTrait) Configure(e *trait.Environment) (bool, 
*trait.TraitConditi
                return false, nil, nil
        }
 
-       if !pointer.BoolDeref(t.Auto, true) {
-               return pointer.BoolDeref(t.Enabled, false), nil, nil
+       if !ptr.Deref(t.Auto, true) {
+               return ptr.Deref(t.Enabled, false), nil, nil
        }
 
        // Check if the master component has been used
@@ -118,7 +118,7 @@ func (t *masterTrait) Configure(e *trait.Environment) 
(bool, *trait.TraitConditi
                        }
                }
                // No master component, can skip the trait execution
-               if !pointer.BoolDeref(t.Enabled, false) {
+               if !ptr.Deref(t.Enabled, false) {
                        return false, nil, nil
                }
        }
@@ -132,7 +132,7 @@ func (t *masterTrait) Configure(e *trait.Environment) 
(bool, *trait.TraitConditi
        }
 
        if t.ResourceType == nil {
-               t.ResourceType = pointer.String(leaseResourceType)
+               t.ResourceType = ptr.To(leaseResourceType)
        }
 
        if t.LabelKey == nil {
@@ -144,7 +144,7 @@ func (t *masterTrait) Configure(e *trait.Environment) 
(bool, *trait.TraitConditi
                t.LabelValue = &e.Integration.Name
        }
 
-       return pointer.BoolDeref(t.Enabled, false), nil, nil
+       return ptr.Deref(t.Enabled, false), nil, nil
 }
 
 func (t *masterTrait) Apply(e *trait.Environment) error {
diff --git a/addons/resume/resume.go b/addons/resume/resume.go
index 2f44d1701..1dd92f050 100644
--- a/addons/resume/resume.go
+++ b/addons/resume/resume.go
@@ -25,7 +25,7 @@ import (
        "github.com/apache/camel-k/v2/pkg/util"
        "github.com/apache/camel-k/v2/pkg/util/kubernetes"
        "github.com/apache/camel-k/v2/pkg/util/log"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 // The Resume trait can be used to manage and configure resume strategies.
@@ -76,7 +76,7 @@ func NewResumeTrait() trait.Trait {
 }
 
 func (r *resumeTrait) Configure(environment *trait.Environment) (bool, 
*trait.TraitCondition, error) {
-       if !pointer.BoolDeref(r.Enabled, false) {
+       if !ptr.Deref(r.Enabled, false) {
                return false, nil, nil
        }
        if environment.CamelCatalog == nil {
@@ -86,7 +86,7 @@ func (r *resumeTrait) Configure(environment 
*trait.Environment) (bool, *trait.Tr
                return false, nil, nil
        }
 
-       if pointer.BoolDeref(r.Auto, true) {
+       if ptr.Deref(r.Auto, true) {
                // Check which components have been used
                sources, err := 
kubernetes.ResolveIntegrationSources(environment.Ctx, r.Client, 
environment.Integration, environment.Resources)
                if err != nil {
diff --git a/addons/telemetry/telemetry.go b/addons/telemetry/telemetry.go
index 81654830c..806bbd1b9 100644
--- a/addons/telemetry/telemetry.go
+++ b/addons/telemetry/telemetry.go
@@ -22,9 +22,8 @@ import (
 
        "github.com/apache/camel-k/v2/pkg/util/boolean"
 
-       "k8s.io/utils/pointer"
-
        corev1 "k8s.io/api/core/v1"
+       "k8s.io/utils/ptr"
 
        "github.com/apache/camel-k/v2/addons/telemetry/discovery"
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
@@ -92,18 +91,18 @@ func NewTelemetryTrait() trait.Trait {
 }
 
 func (t *telemetryTrait) isForcefullyEnabled() bool {
-       return pointer.BoolDeref(t.Enabled, false) && 
!pointer.BoolDeref(t.Auto, true)
+       return ptr.Deref(t.Enabled, false) && !ptr.Deref(t.Auto, true)
 }
 
 func (t *telemetryTrait) Configure(e *trait.Environment) (bool, 
*trait.TraitCondition, error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
        if e.CamelCatalog == nil && !t.isForcefullyEnabled() {
                return false, 
trait.NewIntegrationConditionPlatformDisabledCatalogMissing(), nil
        }
 
-       if !pointer.BoolDeref(t.Auto, true) {
+       if !ptr.Deref(t.Auto, true) {
                return true, nil, nil
        }
 
@@ -170,7 +169,7 @@ func (t *telemetryTrait) setCatalogConfiguration(e 
*trait.Environment) {
        if t.SamplerRatio != "" {
                e.ApplicationProperties["camel.k.telemetry.samplerRatio"] = 
t.SamplerRatio
        }
-       if pointer.BoolDeref(t.SamplerParentBased, true) {
+       if ptr.Deref(t.SamplerParentBased, true) {
                e.ApplicationProperties["camel.k.telemetry.samplerParentBased"] 
= boolean.TrueString
        } else {
                e.ApplicationProperties["camel.k.telemetry.samplerParentBased"] 
= boolean.FalseString
@@ -207,7 +206,7 @@ func (t *telemetryTrait) setRuntimeProviderProperties(e 
*trait.Environment) {
                e.ApplicationProperties[appPropSamplerRatio] = t.SamplerRatio
        }
        if appPropSamplerParentBased := properties[propSamplerParentBased]; 
appPropSamplerParentBased != "" {
-               if pointer.BoolDeref(t.SamplerParentBased, true) {
+               if ptr.Deref(t.SamplerParentBased, true) {
                        e.ApplicationProperties[appPropSamplerParentBased] = 
"true"
                } else {
                        e.ApplicationProperties[appPropSamplerParentBased] = 
boolean.FalseString
diff --git a/addons/telemetry/telemetry_test.go 
b/addons/telemetry/telemetry_test.go
index 1543780c7..d85431270 100644
--- a/addons/telemetry/telemetry_test.go
+++ b/addons/telemetry/telemetry_test.go
@@ -23,7 +23,7 @@ import (
        "github.com/apache/camel-k/v2/pkg/util/boolean"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/trait"
@@ -37,7 +37,7 @@ func TestTelemetryTraitOnDefaultQuarkus(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        telemetry := NewTelemetryTrait()
        tt, _ := telemetry.(*telemetryTrait)
-       tt.Enabled = pointer.Bool(true)
+       tt.Enabled = ptr.To(true)
        tt.Endpoint = "http://endpoint3";
        ok, condition, err := telemetry.Configure(e)
        require.NoError(t, err)
@@ -64,12 +64,12 @@ func TestTelemetryTraitWithValues(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        telemetry := NewTelemetryTrait()
        tt, _ := telemetry.(*telemetryTrait)
-       tt.Enabled = pointer.Bool(true)
+       tt.Enabled = ptr.To(true)
        tt.Endpoint = "http://endpoint3";
        tt.ServiceName = "Test"
        tt.Sampler = "ratio"
        tt.SamplerRatio = "0.001"
-       tt.SamplerParentBased = pointer.Bool(false)
+       tt.SamplerParentBased = ptr.To(false)
        ok, condition, err := telemetry.Configure(e)
        require.NoError(t, err)
        assert.True(t, ok)
@@ -97,13 +97,13 @@ func TestTelemetryForSourceless(t *testing.T) {
        e.CamelCatalog = nil
        telemetry := NewTelemetryTrait()
        tt, _ := telemetry.(*telemetryTrait)
-       tt.Enabled = pointer.Bool(true)
-       tt.Auto = pointer.Bool(false)
+       tt.Enabled = ptr.To(true)
+       tt.Auto = ptr.To(false)
        tt.Endpoint = "http://endpoint3";
        tt.ServiceName = "Test"
        tt.Sampler = "ratio"
        tt.SamplerRatio = "0.001"
-       tt.SamplerParentBased = pointer.Bool(false)
+       tt.SamplerParentBased = ptr.To(false)
        assert.True(t, tt.isForcefullyEnabled())
 
        ok, condition, err := telemetry.Configure(e)
diff --git a/addons/threescale/3scale.go b/addons/threescale/3scale.go
index 2bab8ea21..54750c337 100644
--- a/addons/threescale/3scale.go
+++ b/addons/threescale/3scale.go
@@ -21,7 +21,7 @@ import (
        "strconv"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -88,14 +88,14 @@ func NewThreeScaleTrait() trait.Trait {
 }
 
 func (t *threeScaleTrait) Configure(e *trait.Environment) (bool, 
*trait.TraitCondition, error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
        if !e.IntegrationInRunningPhases() {
                return false, nil, nil
        }
 
-       if pointer.BoolDeref(t.Auto, true) {
+       if ptr.Deref(t.Auto, true) {
                if t.Scheme == "" {
                        t.Scheme = ThreeScaleSchemeDefaultValue
                }
diff --git a/addons/threescale/3scale_test.go b/addons/threescale/3scale_test.go
index 65a934bd3..4aba8fdce 100644
--- a/addons/threescale/3scale_test.go
+++ b/addons/threescale/3scale_test.go
@@ -28,7 +28,7 @@ import (
        "github.com/stretchr/testify/require"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 func TestThreeScaleDisabled(t *testing.T) {
@@ -50,7 +50,7 @@ func TestThreeScaleInjection(t *testing.T) {
        svc, e := createEnvironment(t)
        threeScale := NewThreeScaleTrait()
        tst, _ := threeScale.(*threeScaleTrait)
-       tst.Enabled = pointer.Bool(true)
+       tst.Enabled = ptr.To(true)
        ok, condition, err := threeScale.Configure(e)
        require.NoError(t, err)
        assert.True(t, ok)
@@ -70,8 +70,8 @@ func TestThreeScaleInjectionNoAPIPath(t *testing.T) {
        svc, e := createEnvironment(t)
        threeScale := NewThreeScaleTrait()
        tst, _ := threeScale.(*threeScaleTrait)
-       tst.Enabled = pointer.Bool(true)
-       tst.DescriptionPath = pointer.String("")
+       tst.Enabled = ptr.To(true)
+       tst.DescriptionPath = ptr.To("")
        ok, condition, err := threeScale.Configure(e)
        require.NoError(t, err)
        assert.True(t, ok)
diff --git a/addons/tracing/tracing.go b/addons/tracing/tracing.go
index 7acbd7d47..80a302be4 100644
--- a/addons/tracing/tracing.go
+++ b/addons/tracing/tracing.go
@@ -18,13 +18,12 @@ limitations under the License.
 package tracing
 
 import (
-       "k8s.io/utils/pointer"
-
        "github.com/apache/camel-k/v2/addons/tracing/discovery"
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        "github.com/apache/camel-k/v2/pkg/trait"
        "github.com/apache/camel-k/v2/pkg/util"
+       "k8s.io/utils/ptr"
 )
 
 // WARNING: The Tracing trait has been **deprecated** in favor of the 
xref:traits:telemetry.adoc[Telemetry] trait.
@@ -88,14 +87,14 @@ func NewTracingTrait() trait.Trait {
 }
 
 func (t *tracingTrait) Configure(e *trait.Environment) (bool, 
*trait.TraitCondition, error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
        if e.CamelCatalog == nil {
                return false, 
trait.NewIntegrationConditionPlatformDisabledCatalogMissing(), nil
        }
 
-       if !pointer.BoolDeref(t.Auto, true) {
+       if !ptr.Deref(t.Auto, true) {
                return true, nil, nil
        }
 
diff --git a/addons/tracing/tracing_test.go b/addons/tracing/tracing_test.go
index f441a9d46..f5bc525ce 100644
--- a/addons/tracing/tracing_test.go
+++ b/addons/tracing/tracing_test.go
@@ -21,7 +21,7 @@ import (
        "testing"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/trait"
@@ -35,7 +35,7 @@ func TestTracingTraitOnQuarkus(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        tracing := NewTracingTrait()
        tt, _ := tracing.(*tracingTrait)
-       tt.Enabled = pointer.Bool(true)
+       tt.Enabled = ptr.To(true)
        tt.Endpoint = "http://endpoint3";
        ok, condition, err := tracing.Configure(e)
        require.NoError(t, err)
diff --git a/addons/vault/aws/aws_secrets_manager.go 
b/addons/vault/aws/aws_secrets_manager.go
index a89ec8cdf..6e57e4a8c 100644
--- a/addons/vault/aws/aws_secrets_manager.go
+++ b/addons/vault/aws/aws_secrets_manager.go
@@ -27,7 +27,7 @@ import (
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        "github.com/apache/camel-k/v2/pkg/trait"
        "github.com/apache/camel-k/v2/pkg/util"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 // The Secrets Manager trait can be used to use secrets from AWS Secrets 
Manager
@@ -83,7 +83,7 @@ func NewAwsSecretsManagerTrait() trait.Trait {
 }
 
 func (t *awsSecretsManagerTrait) Configure(environment *trait.Environment) 
(bool, *trait.TraitCondition, error) {
-       if environment.Integration == nil || !pointer.BoolDeref(t.Enabled, 
false) {
+       if environment.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
@@ -92,13 +92,13 @@ func (t *awsSecretsManagerTrait) Configure(environment 
*trait.Environment) (bool
        }
 
        if t.UseDefaultCredentialsProvider == nil {
-               t.UseDefaultCredentialsProvider = pointer.Bool(false)
+               t.UseDefaultCredentialsProvider = ptr.To(false)
        }
        if t.ContextReloadEnabled == nil {
-               t.ContextReloadEnabled = pointer.Bool(false)
+               t.ContextReloadEnabled = ptr.To(false)
        }
        if t.RefreshEnabled == nil {
-               t.RefreshEnabled = pointer.Bool(false)
+               t.RefreshEnabled = ptr.To(false)
        }
 
        return true, nil, nil
diff --git a/addons/vault/aws/aws_secrets_manager_test.go 
b/addons/vault/aws/aws_secrets_manager_test.go
index 8027ff40f..8c9ab48ba 100644
--- a/addons/vault/aws/aws_secrets_manager_test.go
+++ b/addons/vault/aws/aws_secrets_manager_test.go
@@ -26,7 +26,7 @@ import (
        corev1 "k8s.io/api/core/v1"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/trait"
@@ -41,8 +41,8 @@ func TestAwsSecretsManagerTraitApply(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        aws := NewAwsSecretsManagerTrait()
        secrets, _ := aws.(*awsSecretsManagerTrait)
-       secrets.Enabled = pointer.Bool(true)
-       secrets.UseDefaultCredentialsProvider = pointer.Bool(false)
+       secrets.Enabled = ptr.To(true)
+       secrets.UseDefaultCredentialsProvider = ptr.To(false)
        secrets.Region = "eu-west-1"
        secrets.AccessKey = "access-key"
        secrets.SecretKey = "secret-key"
@@ -65,7 +65,7 @@ func TestAwsSecretsManagerTraitNoDefaultCreds(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        aws := NewAwsSecretsManagerTrait()
        secrets, _ := aws.(*awsSecretsManagerTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.Region = "eu-west-1"
        secrets.AccessKey = "access-key"
        secrets.SecretKey = "secret-key"
@@ -105,7 +105,7 @@ func TestAwsSecretsManagerTraitWithSecrets(t *testing.T) {
 
        aws := NewAwsSecretsManagerTrait()
        secrets, _ := aws.(*awsSecretsManagerTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.Region = "eu-west-1"
        secrets.AccessKey = "secret:my-secret2/aws-access-key"
        secrets.SecretKey = "secret:my-secret1/aws-secret-key"
@@ -145,7 +145,7 @@ func TestAwsSecretsManagerTraitWithConfigMap(t *testing.T) {
 
        aws := NewAwsSecretsManagerTrait()
        secrets, _ := aws.(*awsSecretsManagerTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.Region = "eu-west-1"
        secrets.AccessKey = "configmap:my-configmap2/aws-access-key"
        secrets.SecretKey = "configmap:my-configmap1/aws-secret-key"
diff --git a/addons/vault/azure/azure_key_vault.go 
b/addons/vault/azure/azure_key_vault.go
index e1a534415..0dcdfc5b8 100644
--- a/addons/vault/azure/azure_key_vault.go
+++ b/addons/vault/azure/azure_key_vault.go
@@ -27,7 +27,7 @@ import (
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        "github.com/apache/camel-k/v2/pkg/trait"
        "github.com/apache/camel-k/v2/pkg/util"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 // The Azure Key Vault trait can be used to use secrets from Azure Key Vault 
service
@@ -97,7 +97,7 @@ func NewAzureKeyVaultTrait() trait.Trait {
 }
 
 func (t *azureKeyVaultTrait) Configure(environment *trait.Environment) (bool, 
*trait.TraitCondition, error) {
-       if environment.Integration == nil || !pointer.BoolDeref(t.Enabled, 
false) {
+       if environment.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
@@ -106,15 +106,15 @@ func (t *azureKeyVaultTrait) Configure(environment 
*trait.Environment) (bool, *t
        }
 
        if t.ContextReloadEnabled == nil {
-               t.ContextReloadEnabled = pointer.Bool(false)
+               t.ContextReloadEnabled = ptr.To(false)
        }
 
        if t.RefreshEnabled == nil {
-               t.RefreshEnabled = pointer.Bool(false)
+               t.RefreshEnabled = ptr.To(false)
        }
 
        if t.AzureIdentityEnabled == nil {
-               t.AzureIdentityEnabled = pointer.Bool(false)
+               t.AzureIdentityEnabled = ptr.To(false)
        }
 
        return true, nil, nil
diff --git a/addons/vault/azure/azure_key_vault_test.go 
b/addons/vault/azure/azure_key_vault_test.go
index cc9c61171..e829ff0a9 100644
--- a/addons/vault/azure/azure_key_vault_test.go
+++ b/addons/vault/azure/azure_key_vault_test.go
@@ -22,9 +22,9 @@ import (
 
        "github.com/apache/camel-k/v2/pkg/util/test"
        corev1 "k8s.io/api/core/v1"
+       "k8s.io/utils/ptr"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/trait"
@@ -39,7 +39,7 @@ func TestAzureKeyVaultTraitApply(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        azure := NewAzureKeyVaultTrait()
        secrets, _ := azure.(*azureKeyVaultTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.TenantID = "tenant-id"
        secrets.ClientID = "client-id"
        secrets.ClientSecret = "secret"
@@ -78,12 +78,12 @@ func TestAzureKeyVaultTraitApplyWithConfigmapAndRefresh(t 
*testing.T) {
        })
        azure := NewAzureKeyVaultTrait()
        secrets, _ := azure.(*azureKeyVaultTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.TenantID = "tenant-id"
        secrets.ClientID = "client-id"
        secrets.ClientSecret = "configmap:my-configmap1/azure-client-secret"
        secrets.VaultName = "my-vault"
-       secrets.RefreshEnabled = pointer.Bool(true)
+       secrets.RefreshEnabled = ptr.To(true)
        secrets.BlobAccessKey = "configmap:my-configmap2/azure-storage-blob-key"
        secrets.BlobAccountName = "camel-k"
        secrets.BlobContainerName = "camel-k-container"
@@ -125,12 +125,12 @@ func TestAzureKeyVaultTraitApplyWithSecretAndRefresh(t 
*testing.T) {
        })
        azure := NewAzureKeyVaultTrait()
        secrets, _ := azure.(*azureKeyVaultTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.TenantID = "tenant-id"
        secrets.ClientID = "client-id"
        secrets.ClientSecret = "secret:my-secret1/azure-client-secret"
        secrets.VaultName = "my-vault"
-       secrets.RefreshEnabled = pointer.Bool(true)
+       secrets.RefreshEnabled = ptr.To(true)
        secrets.BlobAccessKey = "secret:my-secret2/azure-storage-blob-key"
        secrets.BlobAccountName = "camel-k"
        secrets.BlobContainerName = "camel-k-container"
@@ -172,13 +172,13 @@ func 
TestAzureKeyVaultTraitAzureIdentityEnabledApplyWithSecretAndRefresh(t *test
        })
        azure := NewAzureKeyVaultTrait()
        secrets, _ := azure.(*azureKeyVaultTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.TenantID = "tenant-id"
        secrets.ClientID = "client-id"
        secrets.ClientSecret = "secret:my-secret1/azure-client-secret"
        secrets.VaultName = "my-vault"
-       secrets.RefreshEnabled = pointer.Bool(true)
-       secrets.AzureIdentityEnabled = pointer.Bool(true)
+       secrets.RefreshEnabled = ptr.To(true)
+       secrets.AzureIdentityEnabled = ptr.To(true)
        secrets.BlobAccessKey = "secret:my-secret2/azure-storage-blob-key"
        secrets.BlobAccountName = "camel-k"
        secrets.BlobContainerName = "camel-k-container"
diff --git a/addons/vault/gcp/gcp_secret_manager.go 
b/addons/vault/gcp/gcp_secret_manager.go
index 12ae1a2d3..8fcdbfc0e 100644
--- a/addons/vault/gcp/gcp_secret_manager.go
+++ b/addons/vault/gcp/gcp_secret_manager.go
@@ -24,7 +24,7 @@ import (
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        "github.com/apache/camel-k/v2/pkg/trait"
        "github.com/apache/camel-k/v2/pkg/util"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 // The Google Secret Manager trait can be used to use secrets from Google 
Secret Manager
@@ -76,7 +76,7 @@ func NewGcpSecretManagerTrait() trait.Trait {
 }
 
 func (t *gcpSecretManagerTrait) Configure(environment *trait.Environment) 
(bool, *trait.TraitCondition, error) {
-       if environment.Integration == nil || !pointer.BoolDeref(t.Enabled, 
false) {
+       if environment.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
@@ -85,15 +85,15 @@ func (t *gcpSecretManagerTrait) Configure(environment 
*trait.Environment) (bool,
        }
 
        if t.UseDefaultInstance == nil {
-               t.UseDefaultInstance = pointer.Bool(false)
+               t.UseDefaultInstance = ptr.To(false)
        }
 
        if t.ContextReloadEnabled == nil {
-               t.ContextReloadEnabled = pointer.Bool(false)
+               t.ContextReloadEnabled = ptr.To(false)
        }
 
        if t.RefreshEnabled == nil {
-               t.RefreshEnabled = pointer.Bool(false)
+               t.RefreshEnabled = ptr.To(false)
        }
 
        return true, nil, nil
diff --git a/addons/vault/gcp/gcp_secret_manager_test.go 
b/addons/vault/gcp/gcp_secret_manager_test.go
index 02b82cd7e..1f36e9b96 100644
--- a/addons/vault/gcp/gcp_secret_manager_test.go
+++ b/addons/vault/gcp/gcp_secret_manager_test.go
@@ -23,7 +23,7 @@ import (
        "github.com/apache/camel-k/v2/pkg/util/boolean"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/trait"
@@ -37,8 +37,8 @@ func TestGcpSecretManagerTraitApply(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        gcp := NewGcpSecretManagerTrait()
        secrets, _ := gcp.(*gcpSecretManagerTrait)
-       secrets.Enabled = pointer.Bool(true)
-       secrets.UseDefaultInstance = pointer.Bool(false)
+       secrets.Enabled = ptr.To(true)
+       secrets.UseDefaultInstance = ptr.To(false)
        secrets.ProjectID = "project-gcp"
        secrets.ServiceAccountKey = "file:////usr/local/serviceaccount.json"
        ok, condition, err := secrets.Configure(e)
@@ -58,8 +58,8 @@ func TestGcpSecretManagerTraitNoDefaultCreds(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        gcp := NewGcpSecretManagerTrait()
        secrets, _ := gcp.(*gcpSecretManagerTrait)
-       secrets.Enabled = pointer.Bool(true)
-       secrets.UseDefaultInstance = pointer.Bool(false)
+       secrets.Enabled = ptr.To(true)
+       secrets.UseDefaultInstance = ptr.To(false)
        secrets.ProjectID = "project-gcp"
        secrets.ServiceAccountKey = "file:////usr/local/serviceaccount.json"
        ok, condition, err := secrets.Configure(e)
diff --git a/addons/vault/hashicorp/hashicorp_vault.go 
b/addons/vault/hashicorp/hashicorp_vault.go
index 2542e157e..d8aeb00fd 100644
--- a/addons/vault/hashicorp/hashicorp_vault.go
+++ b/addons/vault/hashicorp/hashicorp_vault.go
@@ -25,7 +25,7 @@ import (
        "github.com/apache/camel-k/v2/pkg/trait"
        "github.com/apache/camel-k/v2/pkg/util"
        "github.com/apache/camel-k/v2/pkg/util/kubernetes"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 // The Hashicorp Vault trait can be used to use secrets from Hashicorp Vault
@@ -69,7 +69,7 @@ func NewHashicorpVaultTrait() trait.Trait {
 }
 
 func (t *hashicorpVaultTrait) Configure(environment *trait.Environment) (bool, 
*trait.TraitCondition, error) {
-       if environment.Integration == nil || !pointer.BoolDeref(t.Enabled, 
false) {
+       if environment.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
diff --git a/addons/vault/hashicorp/hashicorp_vault_test.go 
b/addons/vault/hashicorp/hashicorp_vault_test.go
index ed21fb6c0..3e0c101cf 100644
--- a/addons/vault/hashicorp/hashicorp_vault_test.go
+++ b/addons/vault/hashicorp/hashicorp_vault_test.go
@@ -22,9 +22,9 @@ import (
 
        "github.com/apache/camel-k/v2/pkg/util/test"
        corev1 "k8s.io/api/core/v1"
+       "k8s.io/utils/ptr"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/trait"
@@ -39,7 +39,7 @@ func TestHashicorpVaultTraitApply(t *testing.T) {
        e := createEnvironment(t, camel.QuarkusCatalog)
        hashicorp := NewHashicorpVaultTrait()
        secrets, _ := hashicorp.(*hashicorpVaultTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.Engine = "test"
        secrets.Token = "wwww.testx1234590"
        secrets.Host = "localhost"
@@ -73,7 +73,7 @@ func TestHashicorpVaultTraitWithSecretApply(t *testing.T) {
        })
        hashicorp := NewHashicorpVaultTrait()
        secrets, _ := hashicorp.(*hashicorpVaultTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.Engine = "test"
        secrets.Token = "secret:my-secret1/hashicorp-vault-token"
        secrets.Host = "localhost"
@@ -107,7 +107,7 @@ func TestHashicorpVaultTraitWithConfigMapApply(t 
*testing.T) {
        })
        hashicorp := NewHashicorpVaultTrait()
        secrets, _ := hashicorp.(*hashicorpVaultTrait)
-       secrets.Enabled = pointer.Bool(true)
+       secrets.Enabled = ptr.To(true)
        secrets.Engine = "test"
        secrets.Token = "configmap:my-configmap1/hashicorp-vault-token"
        secrets.Host = "localhost"
diff --git a/e2e/common/traits/toleration_test.go 
b/e2e/common/traits/toleration_test.go
index 000242c14..0bd97ada6 100644
--- a/e2e/common/traits/toleration_test.go
+++ b/e2e/common/traits/toleration_test.go
@@ -30,7 +30,7 @@ import (
        . "github.com/onsi/gomega/gstruct"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        . "github.com/apache/camel-k/v2/e2e/support"
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
@@ -53,7 +53,7 @@ func TestTolerationTrait(t *testing.T) {
                                Key:               "camel.apache.org/master",
                                Operator:          corev1.TolerationOpExists,
                                Effect:            corev1.TaintEffectNoExecute,
-                               TolerationSeconds: pointer.Int64(300),
+                               TolerationSeconds: ptr.To(int64(300)),
                        }))
                })
 
@@ -71,7 +71,7 @@ func TestTolerationTrait(t *testing.T) {
                                Key:      "camel.apache.org/master",
                                Operator: corev1.TolerationOpEqual,
                                Value:    "test", Effect: 
corev1.TaintEffectNoExecute,
-                               TolerationSeconds: pointer.Int64(300),
+                               TolerationSeconds: ptr.To(int64(300)),
                        }))
                })
 
diff --git a/e2e/support/test_support.go b/e2e/support/test_support.go
index 4bef76677..f8f8a659a 100644
--- a/e2e/support/test_support.go
+++ b/e2e/support/test_support.go
@@ -61,7 +61,7 @@ import (
        "k8s.io/apimachinery/pkg/runtime/serializer"
        "k8s.io/apimachinery/pkg/types"
        "k8s.io/client-go/rest"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
        "sigs.k8s.io/controller-runtime/pkg/client/apiutil"
@@ -420,7 +420,7 @@ func IntegrationLogs(t *testing.T, ctx context.Context, ns, 
name string) func()
                }
 
                options := corev1.PodLogOptions{
-                       TailLines: pointer.Int64(100),
+                       TailLines: ptr.To(int64(100)),
                }
 
                for _, container := range pod.Status.ContainerStatuses {
@@ -442,7 +442,7 @@ func IntegrationLogs(t *testing.T, ctx context.Context, ns, 
name string) func()
 func TailedLogs(t *testing.T, ctx context.Context, ns, name string, numLines 
int64) func() string {
        return func() string {
                options := corev1.PodLogOptions{
-                       TailLines: pointer.Int64(numLines),
+                       TailLines: ptr.To(numLines),
                }
 
                return Logs(t, ctx, ns, name, options)()
@@ -1578,8 +1578,8 @@ func CreatePlainTextConfigmapWithOwnerRefWithLabels(t 
*testing.T, ctx context.Co
                                Kind:               "Integration",
                                Name:               orname,
                                UID:                uid,
-                               Controller:         pointer.Bool(true),
-                               BlockOwnerDeletion: pointer.Bool(true),
+                               Controller:         ptr.To(true),
+                               BlockOwnerDeletion: ptr.To(true),
                        },
                        },
                        Labels: labels,
diff --git a/pkg/apis/camel/v1/common_types_support_test.go 
b/pkg/apis/camel/v1/common_types_support_test.go
index 082696987..e04a6e834 100644
--- a/pkg/apis/camel/v1/common_types_support_test.go
+++ b/pkg/apis/camel/v1/common_types_support_test.go
@@ -26,18 +26,18 @@ import (
 
        "github.com/stretchr/testify/assert"
        "github.com/stretchr/testify/require"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 func TestTraitsMerge(t *testing.T) {
        t1 := Traits{
                Container: &trait.ContainerTrait{
                        Name:        "test-container",
-                       Auto:        pointer.Bool(false),
+                       Auto:        ptr.To(false),
                        ServicePort: 81,
                },
                Logging: &trait.LoggingTrait{
-                       Color: pointer.Bool(false),
+                       Color: ptr.To(false),
                        Level: "INFO",
                },
                Addons: map[string]AddonTrait{
@@ -55,7 +55,7 @@ func TestTraitsMerge(t *testing.T) {
                        PortName: "http-8081",
                },
                Logging: &trait.LoggingTrait{
-                       Color: pointer.Bool(true),
+                       Color: ptr.To(true),
                        Level: "DEBUG",
                },
                Addons: map[string]AddonTrait{
@@ -70,13 +70,13 @@ func TestTraitsMerge(t *testing.T) {
        require.NoError(t, err)
 
        assert.NotNil(t, t1.Container)
-       assert.False(t, pointer.BoolDeref(t1.Container.Auto, true))
+       assert.False(t, ptr.Deref(t1.Container.Auto, true))
        assert.Equal(t, "http-8081", t1.Container.PortName)
        assert.Equal(t, 81, t1.Container.ServicePort)
 
        // values from merged trait take precedence over the original ones
        assert.NotNil(t, t1.Logging)
-       assert.True(t, pointer.BoolDeref(t1.Logging.Color, false))
+       assert.True(t, ptr.Deref(t1.Logging.Color, false))
        assert.Equal(t, "DEBUG", t1.Logging.Level)
 
        assert.NotNil(t, t1.Addons)
diff --git a/pkg/cmd/debug.go b/pkg/cmd/debug.go
index b6c38262c..bdbe94616 100644
--- a/pkg/cmd/debug.go
+++ b/pkg/cmd/debug.go
@@ -33,7 +33,7 @@ import (
        "github.com/spf13/cobra"
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 func newCmdDebug(rootCmdOptions *RootCmdOptions) (*cobra.Command, 
*debugCmdOptions) {
@@ -145,8 +145,8 @@ func (o *debugCmdOptions) toggle(it *v1.Integration, active 
bool) *v1.Integratio
        jvmTrait := it.Spec.Traits.JVM
 
        if active {
-               jvmTrait.Debug = pointer.Bool(true)
-               jvmTrait.DebugSuspend = pointer.Bool(o.Suspend)
+               jvmTrait.Debug = ptr.To(true)
+               jvmTrait.DebugSuspend = ptr.To(o.Suspend)
        } else {
                jvmTrait.Debug = nil
                jvmTrait.DebugSuspend = nil
diff --git a/pkg/cmd/debug_test.go b/pkg/cmd/debug_test.go
index 67d5e23d0..abd7957bf 100644
--- a/pkg/cmd/debug_test.go
+++ b/pkg/cmd/debug_test.go
@@ -27,7 +27,7 @@ import (
        "github.com/stretchr/testify/require"
        corev1 "k8s.io/api/core/v1"
        "k8s.io/apimachinery/pkg/runtime"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 const cmdDebug = "debug"
@@ -58,7 +58,7 @@ func TestToggle(t *testing.T) {
        _, debugCmdOptions := initializeDebugCmdOptions(t, &defaultIntegration, 
&defaultKit)
        // toggle on
        it := debugCmdOptions.toggle(&defaultIntegration, true)
-       assert.Equal(t, pointer.Bool(true), it.Spec.Traits.JVM.Debug)
+       assert.Equal(t, ptr.To(true), it.Spec.Traits.JVM.Debug)
        // toggle off
        it = debugCmdOptions.toggle(&defaultIntegration, false)
        assert.Nil(t, it.Spec.Traits.JVM.Debug)
diff --git a/pkg/cmd/run_test.go b/pkg/cmd/run_test.go
index 3d3a19a5f..0cfa30a92 100644
--- a/pkg/cmd/run_test.go
+++ b/pkg/cmd/run_test.go
@@ -31,11 +31,11 @@ import (
        "github.com/apache/camel-k/v2/pkg/trait"
        "github.com/apache/camel-k/v2/pkg/util/defaults"
        "github.com/apache/camel-k/v2/pkg/util/test"
+       "k8s.io/utils/ptr"
 
        "github.com/spf13/cobra"
        "github.com/stretchr/testify/assert"
        "github.com/stretchr/testify/require"
-       "k8s.io/utils/pointer"
 )
 
 const (
@@ -455,9 +455,9 @@ func TestConfigureTraits(t *testing.T) {
        traitMap, err := trait.ToTraitMap(traits)
        require.NoError(t, err)
        assert.Len(t, traitMap, 3)
-       assertTraitConfiguration(t, traits.Affinity, 
&traitv1.AffinityTrait{PodAffinity: pointer.Bool(false)})
-       assertTraitConfiguration(t, traits.Environment, 
&traitv1.EnvironmentTrait{ContainerMeta: pointer.Bool(false)})
-       assertTraitConfiguration(t, traits.Prometheus, 
&traitv1.PrometheusTrait{PodMonitor: pointer.Bool(false)})
+       assertTraitConfiguration(t, traits.Affinity, 
&traitv1.AffinityTrait{PodAffinity: ptr.To(false)})
+       assertTraitConfiguration(t, traits.Environment, 
&traitv1.EnvironmentTrait{ContainerMeta: ptr.To(false)})
+       assertTraitConfiguration(t, traits.Prometheus, 
&traitv1.PrometheusTrait{PodMonitor: ptr.To(false)})
 }
 
 func assertTraitConfiguration(t *testing.T, trait interface{}, expected 
interface{}) {
diff --git a/pkg/controller/integration/integration_controller.go 
b/pkg/controller/integration/integration_controller.go
index a3c895c2f..04cb6017b 100644
--- a/pkg/controller/integration/integration_controller.go
+++ b/pkg/controller/integration/integration_controller.go
@@ -32,7 +32,7 @@ import (
        "k8s.io/apimachinery/pkg/runtime/schema"
        "k8s.io/apimachinery/pkg/types"
        "k8s.io/client-go/tools/record"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
        "sigs.k8s.io/controller-runtime/pkg/builder"
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
        "sigs.k8s.io/controller-runtime/pkg/event"
@@ -202,7 +202,7 @@ func enqueueRequestsFromConfigFunc(ctx context.Context, c 
client.Client, res ctr
 
        for _, integration := range list.Items {
                found := false
-               if integration.Spec.Traits.Mount == nil || 
!pointer.BoolDeref(integration.Spec.Traits.Mount.HotReload, false) {
+               if integration.Spec.Traits.Mount == nil || 
!ptr.Deref(integration.Spec.Traits.Mount.HotReload, false) {
                        continue
                }
                for _, c := range integration.Spec.Traits.Mount.Configs {
diff --git a/pkg/controller/integration/monitor.go 
b/pkg/controller/integration/monitor.go
index 5d908cca6..6342269b0 100644
--- a/pkg/controller/integration/monitor.go
+++ b/pkg/controller/integration/monitor.go
@@ -31,7 +31,7 @@ import (
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
        "k8s.io/apimachinery/pkg/labels"
        "k8s.io/apimachinery/pkg/selection"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 
@@ -310,7 +310,7 @@ func isIntegrationKitResetRequired(integration 
*v1.Integration, kit *v1.Integrat
 func getIntegrationSecretAndConfigmapResourceVersions(ctx context.Context, 
client client.Client, integration *v1.Integration) ([]string, []string) {
        configmaps := make([]string, 0)
        secrets := make([]string, 0)
-       if integration.Spec.Traits.Mount != nil && 
pointer.BoolDeref(integration.Spec.Traits.Mount.HotReload, false) {
+       if integration.Spec.Traits.Mount != nil && 
ptr.Deref(integration.Spec.Traits.Mount.HotReload, false) {
                mergedResources := make([]string, 0)
                mergedResources = append(mergedResources, 
integration.Spec.Traits.Mount.Configs...)
                mergedResources = append(mergedResources, 
integration.Spec.Traits.Mount.Resources...)
diff --git a/pkg/controller/integration/monitor_test.go 
b/pkg/controller/integration/monitor_test.go
index 5d444bf3d..a655edea9 100644
--- a/pkg/controller/integration/monitor_test.go
+++ b/pkg/controller/integration/monitor_test.go
@@ -24,7 +24,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -51,7 +51,7 @@ func TestGetIntegrationSecretAndConfigmapResourceVersions(t 
*testing.T) {
                        Name:      "sec-test",
                        Namespace: "default",
                },
-               Immutable: pointer.Bool(true),
+               Immutable: ptr.To(true),
        }
        sec.Data = map[string][]byte{
                "test.txt": []byte("hello"),
@@ -81,7 +81,7 @@ func TestGetIntegrationSecretAndConfigmapResourceVersions(t 
*testing.T) {
        assert.Len(t, configmaps, 0)
        assert.Len(t, secrets, 0)
        // Enabled hot reload (true)
-       it.Spec.Traits.Mount.HotReload = pointer.Bool(true)
+       it.Spec.Traits.Mount.HotReload = ptr.To(true)
        configmaps, secrets = 
getIntegrationSecretAndConfigmapResourceVersions(context.TODO(), c, it)
        assert.Len(t, configmaps, 1)
        assert.Len(t, secrets, 1)
diff --git a/pkg/controller/pipe/initialize_test.go 
b/pkg/controller/pipe/initialize_test.go
index 2f64cb5df..f12bf7386 100644
--- a/pkg/controller/pipe/initialize_test.go
+++ b/pkg/controller/pipe/initialize_test.go
@@ -24,7 +24,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
 
@@ -79,10 +79,10 @@ func TestNewPipeWithComponentsCreating(t *testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
-                               URI: pointer.String("log:info"),
+                               URI: ptr.To("log:info"),
                        },
                },
        }
@@ -248,7 +248,7 @@ func TestNewPipeUnsupportedRef(t *testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
                                Ref: &corev1.ObjectReference{
diff --git a/pkg/controller/pipe/integration_test.go 
b/pkg/controller/pipe/integration_test.go
index 9a6c69229..3b334f786 100644
--- a/pkg/controller/pipe/integration_test.go
+++ b/pkg/controller/pipe/integration_test.go
@@ -27,7 +27,7 @@ import (
        "github.com/stretchr/testify/assert"
        "github.com/stretchr/testify/require"
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 func TestCreateIntegrationForPipe(t *testing.T) {
@@ -202,7 +202,7 @@ func TestExtractTraitAnnotations(t *testing.T) {
        }
        traits, err := extractAndDeleteTraits(client, annotations)
        require.NoError(t, err)
-       assert.Equal(t, pointer.Bool(true), traits.Service.Enabled)
+       assert.Equal(t, ptr.To(true), traits.Service.Enabled)
        assert.Equal(t, corev1.PullNever, traits.Container.ImagePullPolicy)
        assert.Equal(t, "1.2.3", traits.Camel.RuntimeVersion)
        assert.Equal(t, []string{"prop1=1", "prop2=2"}, traits.Camel.Properties)
@@ -256,5 +256,5 @@ func 
TestCreateIntegrationTraitsForPipeWithTraitAnnotations(t *testing.T) {
        assert.Equal(t, map[string]string{
                "my-annotation": "my-annotation-val",
        }, it.Annotations)
-       assert.Equal(t, pointer.Bool(true), it.Spec.Traits.Service.Enabled)
+       assert.Equal(t, ptr.To(true), it.Spec.Traits.Service.Enabled)
 }
diff --git a/pkg/controller/pipe/monitor_test.go 
b/pkg/controller/pipe/monitor_test.go
index d3dde71da..fc6b37baf 100644
--- a/pkg/controller/pipe/monitor_test.go
+++ b/pkg/controller/pipe/monitor_test.go
@@ -23,7 +23,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
 
@@ -46,10 +46,10 @@ func TestPipeIntegrationSpecChanged(t *testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
-                               URI: pointer.String("log:info"),
+                               URI: ptr.To("log:info"),
                        },
                },
                Status: v1.PipeStatus{
@@ -95,10 +95,10 @@ func TestPipeIntegrationReady(t *testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
-                               URI: pointer.String("log:info"),
+                               URI: ptr.To("log:info"),
                        },
                },
                Status: v1.PipeStatus{
@@ -140,10 +140,10 @@ func TestPipeIntegrationUnknown(t *testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
-                               URI: pointer.String("log:info"),
+                               URI: ptr.To("log:info"),
                        },
                },
                Status: v1.PipeStatus{
@@ -184,10 +184,10 @@ func TestPipeIntegrationError(t *testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
-                               URI: pointer.String("log:info"),
+                               URI: ptr.To("log:info"),
                        },
                },
                Status: v1.PipeStatus{
@@ -260,10 +260,10 @@ func TestPipeIntegrationCreatingFromPipeErrorPhase(t 
*testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
-                               URI: pointer.String("log:info"),
+                               URI: ptr.To("log:info"),
                        },
                },
                Status: v1.PipeStatus{
@@ -296,10 +296,10 @@ func TestPipeIntegrationCreatingFromPipeCreatingPhase(t 
*testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
-                               URI: pointer.String("log:info"),
+                               URI: ptr.To("log:info"),
                        },
                },
                Status: v1.PipeStatus{
@@ -344,10 +344,10 @@ func TestPipeIntegrationPipeTraitAnnotations(t 
*testing.T) {
                },
                Spec: v1.PipeSpec{
                        Source: v1.Endpoint{
-                               URI: pointer.String("timer:tick"),
+                               URI: ptr.To("timer:tick"),
                        },
                        Sink: v1.Endpoint{
-                               URI: pointer.String("log:info"),
+                               URI: ptr.To("log:info"),
                        },
                },
                Status: v1.PipeStatus{
diff --git a/pkg/trait/affinity.go b/pkg/trait/affinity.go
index 4d653daa6..caa927835 100644
--- a/pkg/trait/affinity.go
+++ b/pkg/trait/affinity.go
@@ -25,7 +25,7 @@ import (
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/labels"
        "k8s.io/apimachinery/pkg/selection"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -45,18 +45,18 @@ func newAffinityTrait() Trait {
        return &affinityTrait{
                BaseTrait: NewBaseTrait(affinityTraitID, affinityTraitOrder),
                AffinityTrait: traitv1.AffinityTrait{
-                       PodAffinity:     pointer.Bool(false),
-                       PodAntiAffinity: pointer.Bool(false),
+                       PodAffinity:     ptr.To(false),
+                       PodAntiAffinity: ptr.To(false),
                },
        }
 }
 
 func (t *affinityTrait) Configure(e *Environment) (bool, *TraitCondition, 
error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
-       if pointer.BoolDeref(t.PodAffinity, false) && 
pointer.BoolDeref(t.PodAntiAffinity, false) {
+       if ptr.Deref(t.PodAffinity, false) && ptr.Deref(t.PodAntiAffinity, 
false) {
                return false, nil, fmt.Errorf("both pod affinity and pod 
anti-affinity can't be set simultaneously")
        }
 
@@ -124,7 +124,7 @@ func (t *affinityTrait) addNodeAffinity(_ *Environment, 
podSpec *corev1.PodSpec)
 
 //nolint:dupl
 func (t *affinityTrait) addPodAffinity(e *Environment, podSpec 
*corev1.PodSpec) error {
-       if !pointer.BoolDeref(t.PodAffinity, false) && len(t.PodAffinityLabels) 
== 0 {
+       if !ptr.Deref(t.PodAffinity, false) && len(t.PodAffinityLabels) == 0 {
                return nil
        }
 
@@ -149,7 +149,7 @@ func (t *affinityTrait) addPodAffinity(e *Environment, 
podSpec *corev1.PodSpec)
                }
        }
 
-       if pointer.BoolDeref(t.PodAffinity, false) {
+       if ptr.Deref(t.PodAffinity, false) {
                labelSelectorRequirements = append(labelSelectorRequirements, 
metav1.LabelSelectorRequirement{
                        Key:      v1.IntegrationLabel,
                        Operator: metav1.LabelSelectorOpIn,
@@ -176,7 +176,7 @@ func (t *affinityTrait) addPodAffinity(e *Environment, 
podSpec *corev1.PodSpec)
 
 //nolint:dupl
 func (t *affinityTrait) addPodAntiAffinity(e *Environment, podSpec 
*corev1.PodSpec) error {
-       if !pointer.BoolDeref(t.PodAntiAffinity, false) && 
len(t.PodAntiAffinityLabels) == 0 {
+       if !ptr.Deref(t.PodAntiAffinity, false) && len(t.PodAntiAffinityLabels) 
== 0 {
                return nil
        }
 
@@ -201,7 +201,7 @@ func (t *affinityTrait) addPodAntiAffinity(e *Environment, 
podSpec *corev1.PodSp
                }
        }
 
-       if pointer.BoolDeref(t.PodAntiAffinity, false) {
+       if ptr.Deref(t.PodAntiAffinity, false) {
                labelSelectorRequirements = append(labelSelectorRequirements, 
metav1.LabelSelectorRequirement{
                        Key:      v1.IntegrationLabel,
                        Operator: metav1.LabelSelectorOpIn,
diff --git a/pkg/trait/affinity_test.go b/pkg/trait/affinity_test.go
index 06885e715..818eb72af 100644
--- a/pkg/trait/affinity_test.go
+++ b/pkg/trait/affinity_test.go
@@ -25,7 +25,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
 )
@@ -43,8 +43,8 @@ func TestConfigureAffinityTraitDoesSucceed(t *testing.T) {
 func TestConfigureAffinityTraitWithConflictingAffinitiesFails(t *testing.T) {
        affinityTrait := createNominalAffinityTest()
        environment, _ := createNominalDeploymentTraitTest()
-       affinityTrait.PodAffinity = pointer.Bool(true)
-       affinityTrait.PodAntiAffinity = pointer.Bool(true)
+       affinityTrait.PodAffinity = ptr.To(true)
+       affinityTrait.PodAntiAffinity = ptr.To(true)
        configured, condition, err := affinityTrait.Configure(environment)
 
        assert.False(t, configured)
@@ -54,7 +54,7 @@ func 
TestConfigureAffinityTraitWithConflictingAffinitiesFails(t *testing.T) {
 
 func TestConfigureDisabledAffinityTraitFails(t *testing.T) {
        affinityTrait := createNominalAffinityTest()
-       affinityTrait.Enabled = pointer.Bool(false)
+       affinityTrait.Enabled = ptr.To(false)
        environment, _ := createNominalDeploymentTraitTest()
        configured, condition, err := affinityTrait.Configure(environment)
 
@@ -125,7 +125,7 @@ func testApplyNodeAffinityLabelsDoesSucceed(t *testing.T, 
trait *affinityTrait,
 
 func TestApplyPodAntiAffinityLabelsDoesSucceed(t *testing.T) {
        affinityTrait := createNominalAffinityTest()
-       affinityTrait.PodAntiAffinity = pointer.Bool(true)
+       affinityTrait.PodAntiAffinity = ptr.To(true)
        affinityTrait.PodAntiAffinityLabels = []string{"criteria != value"}
 
        environment, deployment := createNominalDeploymentTraitTest()
@@ -160,7 +160,7 @@ func testApplyPodAntiAffinityLabelsDoesSucceed(t 
*testing.T, trait *affinityTrai
 
 func TestApplyPodAffinityLabelsDoesSucceed(t *testing.T) {
        affinityTrait := createNominalAffinityTest()
-       affinityTrait.PodAffinity = pointer.Bool(true)
+       affinityTrait.PodAffinity = ptr.To(true)
        affinityTrait.PodAffinityLabels = []string{"!criteria"}
 
        environment, deployment := createNominalDeploymentTraitTest()
@@ -194,7 +194,7 @@ func testApplyPodAffinityLabelsDoesSucceed(t *testing.T, 
trait *affinityTrait, e
 
 func createNominalAffinityTest() *affinityTrait {
        trait, _ := newAffinityTrait().(*affinityTrait)
-       trait.Enabled = pointer.Bool(true)
+       trait.Enabled = ptr.To(true)
 
        return trait
 }
diff --git a/pkg/trait/container.go b/pkg/trait/container.go
index b50530481..bfe098e7c 100644
--- a/pkg/trait/container.go
+++ b/pkg/trait/container.go
@@ -26,7 +26,7 @@ import (
        batchv1 "k8s.io/api/batch/v1"
        corev1 "k8s.io/api/core/v1"
        "k8s.io/apimachinery/pkg/util/intstr"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        serving "knative.dev/serving/pkg/apis/serving/v1"
 
@@ -74,9 +74,9 @@ func newContainerTrait() Trait {
                        ServicePort:              defaultServicePort,
                        ServicePortName:          defaultContainerPortName,
                        Name:                     defaultContainerName,
-                       RunAsNonRoot:             
pointer.Bool(defaultContainerRunAsNonRoot),
+                       RunAsNonRoot:             
ptr.To(defaultContainerRunAsNonRoot),
                        SeccompProfileType:       
defaultContainerSeccompProfileType,
-                       AllowPrivilegeEscalation: 
pointer.Bool(defaultContainerAllowPrivilegeEscalation),
+                       AllowPrivilegeEscalation: 
ptr.To(defaultContainerAllowPrivilegeEscalation),
                        CapabilitiesDrop:         
[]corev1.Capability{defaultContainerCapabilitiesDrop},
                        RequestCPU:               defaultContainerResourceCPU,
                        RequestMemory:            
defaultContainerResourceMemory,
@@ -116,7 +116,7 @@ func (t *containerTrait) Configure(e *Environment) (bool, 
*TraitCondition, error
                }
        }
 
-       if pointer.BoolDeref(t.Auto, true) {
+       if ptr.Deref(t.Auto, true) {
                if t.Expose == nil {
                        e := 
e.Resources.GetServiceForIntegration(e.Integration) != nil
                        t.Expose = &e
@@ -268,7 +268,7 @@ func (t *containerTrait) configureContainer(e *Environment) 
error {
                e.Resources.Add(props)
        }
        t.configureResources(&container)
-       if knative || pointer.BoolDeref(t.Expose, false) {
+       if knative || ptr.Deref(t.Expose, false) {
                t.configureService(e, &container, knative)
        }
        t.configureCapabilities(e)
diff --git a/pkg/trait/container_probes_test.go 
b/pkg/trait/container_probes_test.go
index d56857525..5a60f7352 100644
--- a/pkg/trait/container_probes_test.go
+++ b/pkg/trait/container_probes_test.go
@@ -24,7 +24,7 @@ import (
        "github.com/stretchr/testify/require"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -69,7 +69,7 @@ func TestProbesDependencies(t *testing.T) {
                        Traits: v1.Traits{
                                Health: &traitv1.HealthTrait{
                                        Trait: traitv1.Trait{
-                                               Enabled: pointer.Bool(true),
+                                               Enabled: ptr.To(true),
                                        },
                                },
                        },
@@ -91,10 +91,10 @@ func TestProbesOnDeployment(t *testing.T) {
                        Traits: v1.Traits{
                                Health: &traitv1.HealthTrait{
                                        Trait: traitv1.Trait{
-                                               Enabled: pointer.Bool(true),
+                                               Enabled: ptr.To(true),
                                        },
-                                       LivenessProbeEnabled:  
pointer.Bool(true),
-                                       ReadinessProbeEnabled: 
pointer.Bool(true),
+                                       LivenessProbeEnabled:  ptr.To(true),
+                                       ReadinessProbeEnabled: ptr.To(true),
                                        LivenessTimeout:       1234,
                                },
                        },
@@ -127,10 +127,10 @@ func TestProbesOnDeploymentWithCustomScheme(t *testing.T) 
{
                        Traits: v1.Traits{
                                Health: &traitv1.HealthTrait{
                                        Trait: traitv1.Trait{
-                                               Enabled: pointer.Bool(true),
+                                               Enabled: ptr.To(true),
                                        },
-                                       LivenessProbeEnabled:  
pointer.Bool(true),
-                                       ReadinessProbeEnabled: 
pointer.Bool(true),
+                                       LivenessProbeEnabled:  ptr.To(true),
+                                       ReadinessProbeEnabled: ptr.To(true),
                                        LivenessScheme:        "HTTPS",
                                        ReadinessScheme:       "HTTPS",
                                        LivenessTimeout:       1234,
@@ -166,15 +166,15 @@ func TestProbesOnKnativeService(t *testing.T) {
                        Traits: v1.Traits{
                                KnativeService: &traitv1.KnativeServiceTrait{
                                        Trait: traitv1.Trait{
-                                               Enabled: pointer.Bool(true),
+                                               Enabled: ptr.To(true),
                                        },
                                },
                                Health: &traitv1.HealthTrait{
                                        Trait: traitv1.Trait{
-                                               Enabled: pointer.Bool(true),
+                                               Enabled: ptr.To(true),
                                        },
-                                       LivenessProbeEnabled:  
pointer.Bool(true),
-                                       ReadinessProbeEnabled: 
pointer.Bool(true),
+                                       LivenessProbeEnabled:  ptr.To(true),
+                                       ReadinessProbeEnabled: ptr.To(true),
                                        LivenessTimeout:       1234,
                                },
                        },
diff --git a/pkg/trait/container_test.go b/pkg/trait/container_test.go
index d3988163b..0e208dcb5 100644
--- a/pkg/trait/container_test.go
+++ b/pkg/trait/container_test.go
@@ -30,7 +30,7 @@ import (
        "k8s.io/apimachinery/pkg/api/resource"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/types"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 
@@ -182,8 +182,8 @@ func TestContainerWithOpenshift(t *testing.T) {
        assert.NotNil(t, d)
        assert.Len(t, d.Spec.Template.Spec.Containers, 1)
        assert.Equal(t, defaultContainerName, 
d.Spec.Template.Spec.Containers[0].Name)
-       assert.Equal(t, pointer.Bool(defaultContainerRunAsNonRoot), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot)
-       assert.Equal(t, pointer.Int64(1000860000), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsUser)
+       assert.Equal(t, ptr.To(defaultContainerRunAsNonRoot), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot)
+       assert.Equal(t, ptr.To(int64(1000860000)), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsUser)
 }
 
 func TestContainerWithCustomName(t *testing.T) {
@@ -673,10 +673,10 @@ func TestDefaultKubernetesSecurityContext(t *testing.T) {
        assert.NotNil(t, d)
        assert.Len(t, d.Spec.Template.Spec.Containers, 1)
        assert.Equal(t, defaultContainerName, 
d.Spec.Template.Spec.Containers[0].Name)
-       assert.Equal(t, pointer.Bool(defaultContainerRunAsNonRoot), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot)
+       assert.Equal(t, ptr.To(defaultContainerRunAsNonRoot), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot)
        assert.Nil(t, 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsUser)
        assert.Equal(t, corev1.SeccompProfileTypeRuntimeDefault, 
d.Spec.Template.Spec.Containers[0].SecurityContext.SeccompProfile.Type)
-       assert.Equal(t, pointer.Bool(defaultContainerAllowPrivilegeEscalation), 
d.Spec.Template.Spec.Containers[0].SecurityContext.AllowPrivilegeEscalation)
+       assert.Equal(t, ptr.To(defaultContainerAllowPrivilegeEscalation), 
d.Spec.Template.Spec.Containers[0].SecurityContext.AllowPrivilegeEscalation)
        assert.Equal(t, []corev1.Capability{defaultContainerCapabilitiesDrop}, 
d.Spec.Template.Spec.Containers[0].SecurityContext.Capabilities.Drop)
        assert.Nil(t, 
d.Spec.Template.Spec.Containers[0].SecurityContext.Capabilities.Add)
 }
@@ -701,10 +701,10 @@ func TestDefaultKnativeSecurityContext(t *testing.T) {
        assert.NotNil(t, s)
        assert.Len(t, s.Spec.Template.Spec.Containers, 1)
        assert.Equal(t, defaultContainerName, 
s.Spec.Template.Spec.Containers[0].Name)
-       assert.Equal(t, pointer.Bool(defaultContainerRunAsNonRoot), 
s.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot)
+       assert.Equal(t, ptr.To(defaultContainerRunAsNonRoot), 
s.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot)
        assert.Nil(t, 
s.Spec.Template.Spec.Containers[0].SecurityContext.RunAsUser)
        assert.Equal(t, corev1.SeccompProfileTypeRuntimeDefault, 
s.Spec.Template.Spec.Containers[0].SecurityContext.SeccompProfile.Type)
-       assert.Equal(t, pointer.Bool(defaultContainerAllowPrivilegeEscalation), 
s.Spec.Template.Spec.Containers[0].SecurityContext.AllowPrivilegeEscalation)
+       assert.Equal(t, ptr.To(defaultContainerAllowPrivilegeEscalation), 
s.Spec.Template.Spec.Containers[0].SecurityContext.AllowPrivilegeEscalation)
        assert.Equal(t, []corev1.Capability{defaultContainerCapabilitiesDrop}, 
s.Spec.Template.Spec.Containers[0].SecurityContext.Capabilities.Drop)
        assert.Nil(t, 
s.Spec.Template.Spec.Containers[0].SecurityContext.Capabilities.Add)
 }
@@ -713,10 +713,10 @@ func TestUserSecurityContext(t *testing.T) {
        environment := createSettingContextEnvironment(t, 
v1.TraitProfileKubernetes)
        environment.Integration.Spec.Traits = v1.Traits{
                Container: &traitv1.ContainerTrait{
-                       RunAsNonRoot:             pointer.Bool(false),
-                       RunAsUser:                pointer.Int64(1000),
+                       RunAsNonRoot:             ptr.To(false),
+                       RunAsUser:                ptr.To(int64(1000)),
                        SeccompProfileType:       "Unconfined",
-                       AllowPrivilegeEscalation: pointer.Bool(true),
+                       AllowPrivilegeEscalation: ptr.To(true),
                        CapabilitiesDrop:         []corev1.Capability{"DROP"},
                        CapabilitiesAdd:          []corev1.Capability{"ADD"},
                },
@@ -735,10 +735,10 @@ func TestUserSecurityContext(t *testing.T) {
 
        assert.NotNil(t, d)
        assert.Len(t, d.Spec.Template.Spec.Containers, 1)
-       assert.Equal(t, pointer.Bool(false), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot)
-       assert.Equal(t, pointer.Int64(1000), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsUser)
+       assert.Equal(t, ptr.To(false), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot)
+       assert.Equal(t, ptr.To(int64(1000)), 
d.Spec.Template.Spec.Containers[0].SecurityContext.RunAsUser)
        assert.Equal(t, corev1.SeccompProfileTypeUnconfined, 
d.Spec.Template.Spec.Containers[0].SecurityContext.SeccompProfile.Type)
-       assert.Equal(t, pointer.Bool(true), 
d.Spec.Template.Spec.Containers[0].SecurityContext.AllowPrivilegeEscalation)
+       assert.Equal(t, ptr.To(true), 
d.Spec.Template.Spec.Containers[0].SecurityContext.AllowPrivilegeEscalation)
        assert.Equal(t, []corev1.Capability{"DROP"}, 
d.Spec.Template.Spec.Containers[0].SecurityContext.Capabilities.Drop)
        assert.Equal(t, []corev1.Capability{"ADD"}, 
d.Spec.Template.Spec.Containers[0].SecurityContext.Capabilities.Add)
 }
diff --git a/pkg/trait/cron.go b/pkg/trait/cron.go
index 6c13bb1e8..9b7364bee 100644
--- a/pkg/trait/cron.go
+++ b/pkg/trait/cron.go
@@ -26,7 +26,7 @@ import (
        batchv1 "k8s.io/api/batch/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -83,7 +83,7 @@ func (t *cronTrait) Configure(e *Environment) (bool, 
*TraitCondition, error) {
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationConditionUserDisabled("Cron"), nil
        }
        if !e.IntegrationInPhase(v1.IntegrationPhaseInitialization) && 
!e.IntegrationInRunningPhases() {
@@ -102,7 +102,7 @@ func (t *cronTrait) Configure(e *Environment) (bool, 
*TraitCondition, error) {
                ), nil
        }
 
-       if pointer.BoolDeref(t.Auto, true) {
+       if ptr.Deref(t.Auto, true) {
                err := t.autoConfigure(e)
                if err != nil {
                        return false,
@@ -118,7 +118,7 @@ func (t *cronTrait) Configure(e *Environment) (bool, 
*TraitCondition, error) {
        }
 
        // Fallback strategy can be implemented in any other controller
-       if pointer.BoolDeref(t.Fallback, false) {
+       if ptr.Deref(t.Fallback, false) {
                var condition *TraitCondition
                if e.IntegrationInPhase(v1.IntegrationPhaseDeploying) {
                        condition = NewIntegrationCondition(
@@ -180,7 +180,7 @@ func (t *cronTrait) autoConfigure(e *Environment) error {
                }
                for _, fromURI := range fromURIs {
                        if uri.GetComponent(fromURI) == genericCronComponent {
-                               t.Fallback = pointer.Bool(true)
+                               t.Fallback = ptr.To(true)
                                break
                        }
                }
@@ -193,7 +193,7 @@ func (t *cronTrait) Apply(e *Environment) error {
        if e.IntegrationInPhase(v1.IntegrationPhaseInitialization) {
                util.StringSliceUniqueAdd(&e.Integration.Status.Capabilities, 
v1.CapabilityCron)
 
-               if pointer.BoolDeref(t.Fallback, false) {
+               if ptr.Deref(t.Fallback, false) {
                        fallbackArtifact := 
e.CamelCatalog.GetArtifactByScheme(genericCronComponentFallbackScheme)
                        if fallbackArtifact == nil {
                                return fmt.Errorf("no fallback artifact for 
scheme %q has been found in camel catalog", genericCronComponentFallbackScheme)
@@ -203,7 +203,7 @@ func (t *cronTrait) Apply(e *Environment) error {
                }
        }
 
-       if !pointer.BoolDeref(t.Fallback, false) && 
e.IntegrationInRunningPhases() {
+       if !ptr.Deref(t.Fallback, false) && e.IntegrationInRunningPhases() {
                if e.ApplicationProperties == nil {
                        e.ApplicationProperties = make(map[string]string)
                }
@@ -287,13 +287,13 @@ func (t *cronTrait) getCronJobFor(e *Environment) 
*batchv1.CronJob {
 // SelectControllerStrategy can be used to check if a CronJob can be generated 
given the integration and trait settings.
 func (t *cronTrait) SelectControllerStrategy(e *Environment) 
(*ControllerStrategy, error) {
        cronStrategy := ControllerStrategyCronJob
-       if pointer.BoolDeref(t.Fallback, false) {
+       if ptr.Deref(t.Fallback, false) {
                return nil, nil
        }
        if t.Schedule != "" {
                return &cronStrategy, nil
        }
-       if pointer.BoolDeref(t.Auto, true) {
+       if ptr.Deref(t.Auto, true) {
                globalCron, err := t.getGlobalCron(e)
                if err == nil && globalCron != nil {
                        return &cronStrategy, nil
diff --git a/pkg/trait/cron_test.go b/pkg/trait/cron_test.go
index 5868c8c50..178f22d08 100644
--- a/pkg/trait/cron_test.go
+++ b/pkg/trait/cron_test.go
@@ -28,7 +28,7 @@ import (
        batchv1 "k8s.io/api/batch/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -410,7 +410,7 @@ func TestCronDepsFallback(t *testing.T) {
                                },
                                Traits: v1.Traits{
                                        Cron: &traitv1.CronTrait{
-                                               Fallback: pointer.Bool(true),
+                                               Fallback: ptr.To(true),
                                        },
                                },
                        },
@@ -490,7 +490,7 @@ func TestCronWithActiveDeadline(t *testing.T) {
                                },
                                Traits: v1.Traits{
                                        Cron: &traitv1.CronTrait{
-                                               ActiveDeadlineSeconds: 
pointer.Int64(120),
+                                               ActiveDeadlineSeconds: 
ptr.To(int64(120)),
                                        },
                                },
                        },
@@ -579,7 +579,7 @@ func TestCronWithBackoffLimit(t *testing.T) {
                                },
                                Traits: v1.Traits{
                                        Cron: &traitv1.CronTrait{
-                                               BackoffLimit: pointer.Int32(5),
+                                               BackoffLimit: ptr.To(int32(5)),
                                        },
                                },
                        },
diff --git a/pkg/trait/deployer.go b/pkg/trait/deployer.go
index 754751722..a308663a1 100644
--- a/pkg/trait/deployer.go
+++ b/pkg/trait/deployer.go
@@ -27,7 +27,7 @@ import (
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
        "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
        "k8s.io/apimachinery/pkg/types"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 
@@ -70,7 +70,7 @@ func (t *deployerTrait) Apply(e *Environment) error {
                        // check its list of accepted MIME types.
                        // As a simpler solution, we fall back to client-side 
apply at the first
                        // 415 error, and assume server-side apply is not 
available globally.
-                       if hasServerSideApply && pointer.BoolDeref(t.UseSSA, 
true) {
+                       if hasServerSideApply && ptr.Deref(t.UseSSA, true) {
                                err := t.serverSideApply(env, resource)
                                switch {
                                case err == nil:
diff --git a/pkg/trait/environment.go b/pkg/trait/environment.go
index 7dda54826..3609ff7b9 100644
--- a/pkg/trait/environment.go
+++ b/pkg/trait/environment.go
@@ -20,7 +20,7 @@ package trait
 import (
        "os"
 
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        "github.com/apache/camel-k/v2/pkg/util/camel"
@@ -59,7 +59,7 @@ func newEnvironmentTrait() Trait {
        return &environmentTrait{
                BasePlatformTrait: NewBasePlatformTrait(environmentTraitID, 
environmentTraitOrder),
                EnvironmentTrait: traitv1.EnvironmentTrait{
-                       ContainerMeta: pointer.Bool(true),
+                       ContainerMeta: ptr.To(true),
                },
        }
 }
@@ -82,12 +82,12 @@ func (t *environmentTrait) Apply(e *Environment) error {
        envvar.SetVal(&e.EnvVars, envVarMountPathConfigMaps, 
camel.ConfigConfigmapsMountPath)
        envvar.SetVal(&e.EnvVars, envVarMountPathSecrets, 
camel.ConfigSecretsMountPath)
 
-       if pointer.BoolDeref(t.ContainerMeta, true) {
+       if ptr.Deref(t.ContainerMeta, true) {
                envvar.SetValFrom(&e.EnvVars, envVarNamespace, 
"metadata.namespace")
                envvar.SetValFrom(&e.EnvVars, envVarPodName, "metadata.name")
        }
 
-       if pointer.BoolDeref(t.HTTPProxy, true) {
+       if ptr.Deref(t.HTTPProxy, true) {
                if HTTPProxy, ok := os.LookupEnv("HTTP_PROXY"); ok {
                        envvar.SetVal(&e.EnvVars, "HTTP_PROXY", HTTPProxy)
                }
diff --git a/pkg/trait/environment_test.go b/pkg/trait/environment_test.go
index f83043702..fb19d54c6 100644
--- a/pkg/trait/environment_test.go
+++ b/pkg/trait/environment_test.go
@@ -26,7 +26,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -86,7 +86,7 @@ func TestEnabledContainerMetaDataEnvVars(t *testing.T) {
        env := mockEnvironment(c)
        env.Integration.Spec.Traits = v1.Traits{
                Environment: &traitv1.EnvironmentTrait{
-                       ContainerMeta: pointer.Bool(true),
+                       ContainerMeta: ptr.To(true),
                },
        }
        env.Platform.ResyncStatusFullConfig()
@@ -125,7 +125,7 @@ func TestDisabledContainerMetaDataEnvVars(t *testing.T) {
        env := mockEnvironment(c)
        env.Integration.Spec.Traits = v1.Traits{
                Environment: &traitv1.EnvironmentTrait{
-                       ContainerMeta: pointer.Bool(false),
+                       ContainerMeta: ptr.To(false),
                },
        }
 
diff --git a/pkg/trait/gc.go b/pkg/trait/gc.go
index cede57eb9..91254de68 100644
--- a/pkg/trait/gc.go
+++ b/pkg/trait/gc.go
@@ -32,6 +32,7 @@ import (
        authorization "k8s.io/api/authorization/v1"
        batchv1 "k8s.io/api/batch/v1"
        corev1 "k8s.io/api/core/v1"
+       "k8s.io/utils/ptr"
 
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -40,7 +41,6 @@ import (
        "k8s.io/apimachinery/pkg/runtime/schema"
        "k8s.io/apimachinery/pkg/selection"
        "k8s.io/client-go/discovery"
-       "k8s.io/utils/pointer"
 
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 
@@ -109,7 +109,7 @@ func (t *gcTrait) Configure(e *Environment) (bool, 
*TraitCondition, error) {
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationConditionUserDisabled("GC"), nil
        }
 
diff --git a/pkg/trait/gc_test.go b/pkg/trait/gc_test.go
index fa21a8531..15a654f5a 100644
--- a/pkg/trait/gc_test.go
+++ b/pkg/trait/gc_test.go
@@ -30,7 +30,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
        eventingv1 "knative.dev/eventing/pkg/apis/eventing/v1"
        servingv1 "knative.dev/serving/pkg/apis/serving/v1"
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
@@ -49,7 +49,7 @@ func TestConfigureGCTraitDoesSucceed(t *testing.T) {
 
 func TestConfigureDisabledGCTraitDoesNotSucceed(t *testing.T) {
        gcTrait, environment := createNominalGCTest()
-       gcTrait.Enabled = pointer.Bool(false)
+       gcTrait.Enabled = ptr.To(false)
 
        expectedCondition := NewIntegrationCondition(
                "GC",
@@ -308,7 +308,7 @@ func getIntegrationDeployment(integration *v1.Integration) 
*appsv1.Deployment {
 
 func createNominalGCTest() (*gcTrait, *Environment) {
        trait, _ := newGCTrait().(*gcTrait)
-       trait.Enabled = pointer.Bool(true)
+       trait.Enabled = ptr.To(true)
 
        environment := &Environment{
                Catalog: NewCatalog(nil),
diff --git a/pkg/trait/health.go b/pkg/trait/health.go
index bbaf9b66c..c4b7e6eec 100644
--- a/pkg/trait/health.go
+++ b/pkg/trait/health.go
@@ -23,7 +23,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        "k8s.io/apimachinery/pkg/util/intstr"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -58,13 +58,13 @@ func newHealthTrait() Trait {
 func (t *healthTrait) Configure(e *Environment) (bool, *TraitCondition, error) 
{
        if e.Integration == nil ||
                (!e.IntegrationInPhase(v1.IntegrationPhaseInitialization) && 
!e.IntegrationInRunningPhases()) ||
-               !pointer.BoolDeref(t.Enabled, false) {
+               !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
        // The trait must be disabled if a debug operation is ongoing
        if jt := e.Catalog.GetTrait(jvmTraitID); jt != nil {
-               if jvm, ok := jt.(*jvmTrait); ok && 
pointer.BoolDeref(jvm.Debug, false) {
+               if jvm, ok := jt.(*jvmTrait); ok && ptr.Deref(jvm.Debug, false) 
{
                        return false, 
NewIntegrationConditionPlatformDisabledWithMessage("Health", "debug operation 
ongoing: incompatible with health checks"), nil
                }
        }
@@ -113,7 +113,7 @@ func (t *healthTrait) Apply(e *Environment) error {
                return nil
        }
 
-       if !pointer.BoolDeref(t.LivenessProbeEnabled, false) && 
!pointer.BoolDeref(t.ReadinessProbeEnabled, true) && 
!pointer.BoolDeref(t.StartupProbeEnabled, false) {
+       if !ptr.Deref(t.LivenessProbeEnabled, false) && 
!ptr.Deref(t.ReadinessProbeEnabled, true) && !ptr.Deref(t.StartupProbeEnabled, 
false) {
                return nil
        }
 
@@ -134,19 +134,19 @@ func (t *healthTrait) Apply(e *Environment) error {
 }
 
 func (t *healthTrait) setProbes(container *corev1.Container, port 
*intstr.IntOrString) error {
-       if pointer.BoolDeref(t.LivenessProbeEnabled, false) {
+       if ptr.Deref(t.LivenessProbeEnabled, false) {
                if t.LivenessProbe == "" {
                        return fmt.Errorf("you need to configure a liveness 
probe explicitly or in your catalog")
                }
                container.LivenessProbe = t.newLivenessProbe(port, 
t.LivenessProbe)
        }
-       if pointer.BoolDeref(t.ReadinessProbeEnabled, true) {
+       if ptr.Deref(t.ReadinessProbeEnabled, true) {
                if t.ReadinessProbe == "" {
                        return fmt.Errorf("you need to configure a readiness 
probe explicitly or in your catalog")
                }
                container.ReadinessProbe = t.newReadinessProbe(port, 
t.ReadinessProbe)
        }
-       if pointer.BoolDeref(t.StartupProbeEnabled, false) {
+       if ptr.Deref(t.StartupProbeEnabled, false) {
                if t.StartupProbe == "" {
                        return fmt.Errorf("you need to configure a startup 
probe explicitly or in your catalog")
                }
diff --git a/pkg/trait/health_test.go b/pkg/trait/health_test.go
index b22709081..e60e8fd15 100644
--- a/pkg/trait/health_test.go
+++ b/pkg/trait/health_test.go
@@ -26,7 +26,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -59,10 +59,10 @@ func TestHealthTrait(t *testing.T) {
                                Traits: v1.Traits{
                                        Health: &trait.HealthTrait{
                                                Trait: trait.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               LivenessProbeEnabled:  
pointer.Bool(true),
-                                               ReadinessProbeEnabled: 
pointer.Bool(true),
+                                               LivenessProbeEnabled:  
ptr.To(true),
+                                               ReadinessProbeEnabled: 
ptr.To(true),
                                        },
                                },
                        },
@@ -103,9 +103,9 @@ func TestHealthTrait(t *testing.T) {
        assert.Nil(t, d.Spec.Template.Spec.Containers[0].StartupProbe)
 
        // Change traits configuration
-       environment.Integration.Spec.Traits.Health.LivenessProbeEnabled = 
pointer.Bool(false)
-       environment.Integration.Spec.Traits.Health.ReadinessProbeEnabled = 
pointer.Bool(false)
-       environment.Integration.Spec.Traits.Health.StartupProbeEnabled = 
pointer.Bool(true)
+       environment.Integration.Spec.Traits.Health.LivenessProbeEnabled = 
ptr.To(false)
+       environment.Integration.Spec.Traits.Health.ReadinessProbeEnabled = 
ptr.To(false)
+       environment.Integration.Spec.Traits.Health.StartupProbeEnabled = 
ptr.To(true)
 
        environment.Platform.ResyncStatusFullConfig()
        _, err = traitCatalog.apply(&environment)
diff --git a/pkg/trait/ingress.go b/pkg/trait/ingress.go
index 277784708..93a42b32b 100644
--- a/pkg/trait/ingress.go
+++ b/pkg/trait/ingress.go
@@ -26,7 +26,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        networkingv1 "k8s.io/api/networking/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 const (
@@ -65,7 +65,7 @@ func (t *ingressTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
        if !e.IntegrationInRunningPhases() {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationCondition(
                        "Ingress",
                        v1.IntegrationConditionExposureAvailable,
@@ -75,7 +75,7 @@ func (t *ingressTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
                ), nil
        }
 
-       if pointer.BoolDeref(t.Auto, true) {
+       if ptr.Deref(t.Auto, true) {
                if e.Resources.GetUserServiceForIntegration(e.Integration) == 
nil {
                        return false, nil, nil
                }
diff --git a/pkg/trait/ingress_test.go b/pkg/trait/ingress_test.go
index 79249b2a6..a1b310516 100644
--- a/pkg/trait/ingress_test.go
+++ b/pkg/trait/ingress_test.go
@@ -27,7 +27,7 @@ import (
        networkingv1 "k8s.io/api/networking/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/runtime"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/util/kubernetes"
@@ -47,7 +47,7 @@ func TestConfigureIngressTraitDoesSucceed(t *testing.T) {
 
 func TestConfigureDisabledIngressTraitDoesNotSucceed(t *testing.T) {
        ingressTrait, environment := createNominalIngressTest()
-       ingressTrait.Enabled = pointer.Bool(false)
+       ingressTrait.Enabled = ptr.To(false)
 
        expectedCondition := NewIntegrationCondition(
                "Ingress",
@@ -223,8 +223,8 @@ func 
TestConfigureTLSWithoutSecretNameIngressTraitWDoesSucceed(t *testing.T) {
 
 func createNominalIngressTest() (*ingressTrait, *Environment) {
        trait, _ := newIngressTrait().(*ingressTrait)
-       trait.Enabled = pointer.Bool(true)
-       trait.Auto = pointer.Bool(false)
+       trait.Enabled = ptr.To(true)
+       trait.Auto = ptr.To(false)
        trait.Host = "hostname"
 
        environment := &Environment{
diff --git a/pkg/trait/init.go b/pkg/trait/init.go
index 7c9aff9cb..4a2306764 100644
--- a/pkg/trait/init.go
+++ b/pkg/trait/init.go
@@ -21,12 +21,11 @@ import (
        "errors"
        "sort"
 
-       "k8s.io/utils/pointer"
-
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        "github.com/apache/camel-k/v2/pkg/util"
        "github.com/apache/camel-k/v2/pkg/util/dsl"
+       "k8s.io/utils/ptr"
 )
 
 const (
@@ -48,7 +47,7 @@ func NewInitTrait() Trait {
 }
 
 func (t *initTrait) Configure(e *Environment) (bool, *TraitCondition, error) {
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, nil, errors.New("trait init cannot be disabled")
        }
 
diff --git a/pkg/trait/istio.go b/pkg/trait/istio.go
index a3d2a85e5..93169ddbc 100644
--- a/pkg/trait/istio.go
+++ b/pkg/trait/istio.go
@@ -23,7 +23,7 @@ import (
        "github.com/apache/camel-k/v2/pkg/util/boolean"
 
        appsv1 "k8s.io/api/apps/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        servingv1 "knative.dev/serving/pkg/apis/serving/v1"
 
@@ -55,7 +55,7 @@ func newIstioTrait() Trait {
 }
 
 func (t *istioTrait) Configure(e *Environment) (bool, *TraitCondition, error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
diff --git a/pkg/trait/istio_test.go b/pkg/trait/istio_test.go
index 3b34f4ff4..7be2a6291 100644
--- a/pkg/trait/istio_test.go
+++ b/pkg/trait/istio_test.go
@@ -26,7 +26,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        serving "knative.dev/serving/pkg/apis/serving/v1"
 
@@ -78,7 +78,7 @@ func NewIstioTestEnv(t *testing.T, d *appsv1.Deployment, s 
*serving.Service, ena
        if enabled {
                env.Integration.Spec.Traits.Istio = &traitv1.IstioTrait{
                        Trait: traitv1.Trait{
-                               Enabled: pointer.Bool(true),
+                               Enabled: ptr.To(true),
                        },
                }
        }
@@ -123,8 +123,8 @@ func TestIstioForcedInjectTrue(t *testing.T) {
        }
 
        env := NewIstioTestEnv(t, &d, &s, true)
-       env.Integration.Spec.Traits.Istio.Enabled = pointer.Bool(true)
-       env.Integration.Spec.Traits.Istio.Inject = pointer.Bool(true)
+       env.Integration.Spec.Traits.Istio.Enabled = ptr.To(true)
+       env.Integration.Spec.Traits.Istio.Inject = ptr.To(true)
 
        conditions, err := env.Catalog.apply(&env)
        require.NoError(t, err)
@@ -148,8 +148,8 @@ func TestIstioForcedInjectFalse(t *testing.T) {
        }
 
        env := NewIstioTestEnv(t, &d, &s, true)
-       env.Integration.Spec.Traits.Istio.Enabled = pointer.Bool(true)
-       env.Integration.Spec.Traits.Istio.Inject = pointer.Bool(false)
+       env.Integration.Spec.Traits.Istio.Enabled = ptr.To(true)
+       env.Integration.Spec.Traits.Istio.Inject = ptr.To(false)
 
        conditions, err := env.Catalog.apply(&env)
        require.NoError(t, err)
diff --git a/pkg/trait/jolokia.go b/pkg/trait/jolokia.go
index e78bd9f50..d5f602ea6 100644
--- a/pkg/trait/jolokia.go
+++ b/pkg/trait/jolokia.go
@@ -23,7 +23,7 @@ import (
        "strings"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -52,7 +52,7 @@ func newJolokiaTrait() Trait {
 }
 
 func (t *jolokiaTrait) Configure(e *Environment) (bool, *TraitCondition, 
error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
diff --git a/pkg/trait/jolokia_test.go b/pkg/trait/jolokia_test.go
index 6668f3850..b9ffa492b 100644
--- a/pkg/trait/jolokia_test.go
+++ b/pkg/trait/jolokia_test.go
@@ -25,7 +25,7 @@ import (
 
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/util/boolean"
@@ -214,7 +214,7 @@ func TestSetDefaultBoolJolokiaOptionShouldSucceed(t 
*testing.T) {
 func TestSetDefaultBoolJolokiaOptionShouldNotOverrideExistingValue(t 
*testing.T) {
        trait, _ := newJolokiaTrait().(*jolokiaTrait)
        options := map[string]string{}
-       option := pointer.Bool(false)
+       option := ptr.To(false)
 
        trait.setDefaultJolokiaOption(options, &option, "key", true)
 
@@ -257,7 +257,7 @@ func TestAddBoolPointerOptionToJolokiaOptions(t *testing.T) 
{
        trait, _ := newJolokiaTrait().(*jolokiaTrait)
        options := map[string]string{}
 
-       trait.addToJolokiaOptions(options, "key", pointer.Bool(false))
+       trait.addToJolokiaOptions(options, "key", ptr.To(false))
 
        assert.Len(t, options, 1)
        assert.Equal(t, boolean.FalseString, options["key"])
@@ -274,7 +274,7 @@ func TestAddWrongTypeOptionToJolokiaOptionsDoesNothing(t 
*testing.T) {
 
 func createNominalJolokiaTest() (*jolokiaTrait, *Environment) {
        trait, _ := newJolokiaTrait().(*jolokiaTrait)
-       trait.Enabled = pointer.Bool(true)
+       trait.Enabled = ptr.To(true)
 
        environment := &Environment{
                Catalog: NewCatalog(nil),
diff --git a/pkg/trait/jvm.go b/pkg/trait/jvm.go
index 2a352f52b..3b43191ba 100644
--- a/pkg/trait/jvm.go
+++ b/pkg/trait/jvm.go
@@ -27,7 +27,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        "k8s.io/apimachinery/pkg/api/resource"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 
@@ -66,7 +66,7 @@ func newJvmTrait() Trait {
 
 func (t *jvmTrait) Configure(e *Environment) (bool, *TraitCondition, error) {
        // Deprecated: the JVM has to be a platform trait and the user should 
not be able to disable it
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                notice := userDisabledMessage + "; this configuration is 
deprecated and may be removed within next releases"
                return false, NewIntegrationCondition("JVM", 
v1.IntegrationConditionTraitInfo, corev1.ConditionTrue, 
traitConfigurationReason, notice), nil
        }
@@ -122,7 +122,7 @@ func (t *jvmTrait) Apply(e *Environment) error {
        // Other traits may have already contributed some arguments
        args := container.Args
 
-       if pointer.BoolDeref(t.Debug, false) {
+       if ptr.Deref(t.Debug, false) {
                debugArgs := t.enableDebug(e)
                args = append(args, debugArgs)
        }
@@ -188,7 +188,7 @@ func (t *jvmTrait) Apply(e *Environment) error {
 
 func (t *jvmTrait) enableDebug(e *Environment) string {
        suspend := "n"
-       if pointer.BoolDeref(t.DebugSuspend, false) {
+       if ptr.Deref(t.DebugSuspend, false) {
                suspend = "y"
        }
        // Add label to mark the pods with debug enabled
diff --git a/pkg/trait/jvm_test.go b/pkg/trait/jvm_test.go
index fefefffd2..fab68efc2 100644
--- a/pkg/trait/jvm_test.go
+++ b/pkg/trait/jvm_test.go
@@ -32,7 +32,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
        serving "knative.dev/serving/pkg/apis/serving/v1"
 )
 
@@ -74,7 +74,7 @@ func 
TestConfigureJvmTraitInWrongIntegrationKitPhaseDoesNotSucceed(t *testing.T)
 
 func TestConfigureJvmTraitInWrongJvmDisabled(t *testing.T) {
        trait, environment := 
createNominalJvmTest(v1.IntegrationKitTypePlatform)
-       trait.Enabled = pointer.Bool(false)
+       trait.Enabled = ptr.To(false)
 
        expectedCondition := NewIntegrationCondition(
                "JVM",
@@ -346,8 +346,8 @@ func TestApplyJvmTraitWithKnativeResource(t *testing.T) {
 
 func TestApplyJvmTraitWithDebugEnabled(t *testing.T) {
        trait, environment := 
createNominalJvmTest(v1.IntegrationKitTypePlatform)
-       trait.Debug = pointer.Bool(true)
-       trait.DebugSuspend = pointer.Bool(true)
+       trait.Debug = ptr.To(true)
+       trait.DebugSuspend = ptr.To(true)
 
        d := appsv1.Deployment{
                Spec: appsv1.DeploymentSpec{
@@ -585,7 +585,7 @@ func createNominalJvmTest(kitType string) (*jvmTrait, 
*Environment) {
        catalog, _ := camel.DefaultCatalog()
        client, _ := test.NewFakeClient()
        trait, _ := newJvmTrait().(*jvmTrait)
-       trait.PrintCommand = pointer.Bool(false)
+       trait.PrintCommand = ptr.To(false)
        trait.Client = client
 
        environment := &Environment{
diff --git a/pkg/trait/kamelets.go b/pkg/trait/kamelets.go
index 8f59d547b..402833b9c 100644
--- a/pkg/trait/kamelets.go
+++ b/pkg/trait/kamelets.go
@@ -27,7 +27,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -79,7 +79,7 @@ func (t *kameletsTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationConditionUserDisabled("Kamelets"), 
nil
        }
        if !e.IntegrationInPhase(v1.IntegrationPhaseInitialization) && 
!e.IntegrationInRunningPhases() {
@@ -88,7 +88,7 @@ func (t *kameletsTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
        if t.MountPoint == "" {
                t.MountPoint = filepath.Join(camel.BasePath, "kamelets")
        }
-       if pointer.BoolDeref(t.Auto, true) {
+       if ptr.Deref(t.Auto, true) {
                if e.CamelCatalog == nil {
                        // Cannot execute this trait for synthetic 
IntegrationKit. In order to use it, the
                        // user has to specify forcefully auto=false option and 
pass a list of kamelets explicitly
diff --git a/pkg/trait/kamelets_test.go b/pkg/trait/kamelets_test.go
index 85e606bc5..ff379c74d 100644
--- a/pkg/trait/kamelets_test.go
+++ b/pkg/trait/kamelets_test.go
@@ -31,7 +31,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/runtime"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 func TestConfigurationNoKameletsUsed(t *testing.T) {
@@ -602,7 +602,7 @@ func TestKameletSyntheticKitConditionTrue(t *testing.T) {
                })
        environment.CamelCatalog = nil
        environment.Integration.Spec.Sources = nil
-       trait.Auto = pointer.Bool(false)
+       trait.Auto = ptr.To(false)
        trait.List = "timer-source"
 
        enabled, condition, err := trait.Configure(environment)
diff --git a/pkg/trait/knative.go b/pkg/trait/knative.go
index c8aa3fc87..677cf2f4d 100644
--- a/pkg/trait/knative.go
+++ b/pkg/trait/knative.go
@@ -30,7 +30,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
        "k8s.io/apimachinery/pkg/runtime"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 
@@ -75,7 +75,7 @@ func (t *knativeTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationConditionUserDisabled("Knative"), 
nil
        }
        if e.CamelCatalog == nil {
@@ -90,7 +90,7 @@ func (t *knativeTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
        if !e.IntegrationInPhase(v1.IntegrationPhaseInitialization) && 
!e.IntegrationInRunningPhases() {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Auto, true) {
+       if !ptr.Deref(t.Auto, true) {
                return true, nil, nil
        }
 
@@ -147,7 +147,7 @@ func (t *knativeTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
        }
        if t.FilterSourceChannels == nil {
                // Filtering is no longer used by default
-               t.FilterSourceChannels = pointer.Bool(false)
+               t.FilterSourceChannels = ptr.To(false)
        }
        if t.SinkBinding == nil {
                allowed := t.isSinkBindingAllowed(e)
@@ -159,7 +159,7 @@ func (t *knativeTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
 
 // This is true only when the user set the enabled flag on and the auto flag 
off.
 func (t *knativeTrait) isForcefullyEnabled() bool {
-       return pointer.BoolDeref(t.Enabled, false) && 
!pointer.BoolDeref(t.Auto, true)
+       return ptr.Deref(t.Enabled, false) && !ptr.Deref(t.Auto, true)
 }
 
 func filterMetaItems(catalog *camel.RuntimeCatalog, sources []v1.SourceSpec, 
cst knativeapi.CamelServiceType, uriType string) ([]string, error) {
@@ -240,7 +240,7 @@ func (t *knativeTrait) configureChannels(e *Environment, 
env *knativeapi.CamelEn
                                knativeapi.CamelMetaKnativeKind:       ref.Kind,
                                knativeapi.CamelMetaKnativeReply:      
boolean.FalseString,
                        }
-                       if pointer.BoolDeref(t.FilterSourceChannels, false) {
+                       if ptr.Deref(t.FilterSourceChannels, false) {
                                
meta[knativeapi.CamelMetaFilterPrefix+knativeHistoryHeader] = loc.Host
                        }
                        svc := knativeapi.CamelServiceDefinition{
@@ -417,7 +417,7 @@ func (t *knativeTrait) isSinkBindingAllowed(e *Environment) 
bool {
 }
 
 func (t *knativeTrait) configureSinkBinding(e *Environment, env 
*knativeapi.CamelEnvironment) error {
-       if !pointer.BoolDeref(t.SinkBinding, false) {
+       if !ptr.Deref(t.SinkBinding, false) {
                return nil
        }
        var serviceType knativeapi.CamelServiceType
@@ -477,7 +477,7 @@ func (t *knativeTrait) configureSinkBinding(e *Environment, 
env *knativeapi.Came
                                        APIVersion: ref.APIVersion,
                                }
 
-                               if pointer.BoolDeref(t.NamespaceLabel, true) {
+                               if ptr.Deref(t.NamespaceLabel, true) {
                                        // set the namespace label to allow 
automatic sinkbinding injection
                                        enabled, err := 
knativeutil.EnableKnativeBindInNamespace(e.Ctx, e.Client, 
e.Integration.Namespace)
                                        if err != nil {
@@ -526,7 +526,7 @@ func (t *knativeTrait) createTrigger(e *Environment, ref 
*corev1.ObjectReference
                attributes[key] = value
        }
 
-       if _, eventTypeSpecified := attributes["type"]; !eventTypeSpecified && 
pointer.BoolDeref(t.FilterEventType, true) && eventType != "" {
+       if _, eventTypeSpecified := attributes["type"]; !eventTypeSpecified && 
ptr.Deref(t.FilterEventType, true) && eventType != "" {
                // Apply default trigger filter attribute for the event type
                attributes["type"] = eventType
        }
diff --git a/pkg/trait/knative_service.go b/pkg/trait/knative_service.go
index 50c87a451..fab0b05a7 100644
--- a/pkg/trait/knative_service.go
+++ b/pkg/trait/knative_service.go
@@ -23,7 +23,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        serving "knative.dev/serving/pkg/apis/serving/v1"
 
@@ -77,7 +77,7 @@ func (t *knativeServiceTrait) Configure(e *Environment) 
(bool, *TraitCondition,
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationCondition(
                        "KnativeService",
                        v1.IntegrationConditionKnativeServiceAvailable,
@@ -148,7 +148,7 @@ func (t *knativeServiceTrait) Apply(e *Environment) error {
 }
 
 func (t *knativeServiceTrait) SelectControllerStrategy(e *Environment) 
(*ControllerStrategy, error) {
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                // explicitly disabled by the user
                return nil, nil
        }
@@ -194,7 +194,7 @@ func (t *knativeServiceTrait) SelectControllerStrategy(e 
*Environment) (*Control
 
 // This is true only when the user set the enabled flag on and the auto flag 
off.
 func (t *knativeServiceTrait) isForcefullyEnabled() bool {
-       return pointer.BoolDeref(t.Enabled, false) && 
!pointer.BoolDeref(t.Auto, true)
+       return ptr.Deref(t.Enabled, false) && !ptr.Deref(t.Auto, true)
 }
 
 func (t *knativeServiceTrait) ControllerStrategySelectorOrder() int {
diff --git a/pkg/trait/knative_service_test.go 
b/pkg/trait/knative_service_test.go
index 5fa1e8d10..14ecfc461 100644
--- a/pkg/trait/knative_service_test.go
+++ b/pkg/trait/knative_service_test.go
@@ -28,7 +28,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        serving "knative.dev/serving/pkg/apis/serving/v1"
 
@@ -88,7 +88,7 @@ func TestKnativeService(t *testing.T) {
                                Traits: v1.Traits{
                                        KnativeService: 
&traitv1.KnativeServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -212,9 +212,9 @@ func TestKnativeServiceWithCustomContainerName(t 
*testing.T) {
                                        },
                                        KnativeService: 
&traitv1.KnativeServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               Auto: pointer.Bool(false),
+                                               Auto: ptr.To(false),
                                        },
                                        Container: &traitv1.ContainerTrait{
                                                Name: "my-container-name",
diff --git a/pkg/trait/knative_test.go b/pkg/trait/knative_test.go
index bcecc5581..cc5625bf1 100644
--- a/pkg/trait/knative_test.go
+++ b/pkg/trait/knative_test.go
@@ -28,7 +28,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        eventingduckv1 "knative.dev/eventing/pkg/apis/duck/v1"
        eventing "knative.dev/eventing/pkg/apis/eventing/v1"
@@ -71,9 +71,9 @@ func TestKnativeEnvConfigurationFromTrait(t *testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               Auto:            
pointer.Bool(false),
+                                               Auto:            ptr.To(false),
                                                ChannelSources:  
[]string{"channel-source-1"},
                                                ChannelSinks:    
[]string{"channel-sink-1"},
                                                EndpointSources: 
[]string{"endpoint-source-1"},
@@ -203,7 +203,7 @@ func TestKnativeEnvConfigurationFromSource(t *testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -315,7 +315,7 @@ func TestKnativeTriggerExplicitFilterConfig(t *testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                                Filters: 
[]string{"source=my-source"},
                                        },
@@ -414,10 +414,10 @@ func 
TestKnativeTriggerExplicitFilterConfigNoEventTypeFilter(t *testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                                Filters:         
[]string{"source=my-source"},
-                                               FilterEventType: 
pointer.Bool(false),
+                                               FilterEventType: ptr.To(false),
                                        },
                                },
                        },
@@ -513,7 +513,7 @@ func TestKnativeTriggerDefaultEventTypeFilter(t *testing.T) 
{
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -609,9 +609,9 @@ func TestKnativeTriggerDefaultEventTypeFilterDisabled(t 
*testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               FilterEventType: 
pointer.Bool(false),
+                                               FilterEventType: ptr.To(false),
                                        },
                                },
                        },
@@ -710,7 +710,7 @@ func TestKnativeMultipleTrigger(t *testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -847,7 +847,7 @@ func TestKnativeMultipleTriggerAdditionalFilterConfig(t 
*testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                                Filters: 
[]string{"subject=Hello"},
                                        },
@@ -983,7 +983,7 @@ func TestKnativeTriggerNoEventType(t *testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -1080,7 +1080,7 @@ func TestKnativeTriggerNoServingAvailable(t *testing.T) {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -1393,7 +1393,7 @@ func NewFakeEnvironment(t *testing.T, source 
v1.SourceSpec) Environment {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -1448,7 +1448,7 @@ func NewFakeEnvironmentForSyntheticKit(t *testing.T) 
Environment {
                                Traits: v1.Traits{
                                        Knative: &traitv1.KnativeTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -1697,8 +1697,8 @@ func TestKnativeSyntheticKitDefault(t *testing.T) {
 func TestKnativeSyntheticKitEnabled(t *testing.T) {
        e := NewFakeEnvironmentForSyntheticKit(t)
        knTrait, _ := newKnativeTrait().(*knativeTrait)
-       knTrait.Enabled = pointer.Bool(true)
-       knTrait.Auto = pointer.Bool(false)
+       knTrait.Enabled = ptr.To(true)
+       knTrait.Auto = ptr.To(false)
        ok, condition, err := knTrait.Configure(&e)
        require.NoError(t, err)
        assert.True(t, ok)
diff --git a/pkg/trait/logging.go b/pkg/trait/logging.go
index 54c7a69d6..60cdb4113 100644
--- a/pkg/trait/logging.go
+++ b/pkg/trait/logging.go
@@ -18,11 +18,10 @@ limitations under the License.
 package trait
 
 import (
-       "k8s.io/utils/pointer"
-
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        "github.com/apache/camel-k/v2/pkg/util/boolean"
        "github.com/apache/camel-k/v2/pkg/util/envvar"
+       "k8s.io/utils/ptr"
 )
 
 const (
@@ -55,7 +54,7 @@ func (l loggingTrait) Configure(e *Environment) (bool, 
*TraitCondition, error) {
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(l.Enabled, true) {
+       if !ptr.Deref(l.Enabled, true) {
                return false, NewIntegrationConditionUserDisabled("Logging"), 
nil
        }
 
@@ -80,16 +79,16 @@ func (l loggingTrait) setEnvConfiguration(e *Environment) {
                envvar.SetVal(&e.EnvVars, envVarQuarkusLogConsoleFormat, 
l.Format)
        }
 
-       if pointer.BoolDeref(l.JSON, false) {
+       if ptr.Deref(l.JSON, false) {
                envvar.SetVal(&e.EnvVars, envVarQuarkusLogConsoleJSON, 
boolean.TrueString)
-               if pointer.BoolDeref(l.JSONPrettyPrint, false) {
+               if ptr.Deref(l.JSONPrettyPrint, false) {
                        envvar.SetVal(&e.EnvVars, 
envVarQuarkusLogConsoleJSONPrettyPrint, boolean.TrueString)
                }
        } else {
                // If the trait is false OR unset, we default to false.
                envvar.SetVal(&e.EnvVars, envVarQuarkusLogConsoleJSON, 
boolean.FalseString)
 
-               if pointer.BoolDeref(l.Color, true) {
+               if ptr.Deref(l.Color, true) {
                        envvar.SetVal(&e.EnvVars, envVarQuarkusConsoleColor, 
boolean.TrueString)
                }
        }
@@ -103,15 +102,15 @@ func (l loggingTrait) setCatalogConfiguration(e 
*Environment) {
        if l.Format != "" {
                e.ApplicationProperties["camel.k.logging.format"] = l.Format
        }
-       if pointer.BoolDeref(l.JSON, false) {
+       if ptr.Deref(l.JSON, false) {
                e.ApplicationProperties["camel.k.logging.json"] = 
boolean.TrueString
-               if pointer.BoolDeref(l.JSONPrettyPrint, false) {
+               if ptr.Deref(l.JSONPrettyPrint, false) {
                        
e.ApplicationProperties["camel.k.logging.jsonPrettyPrint"] = boolean.TrueString
                }
        } else {
                // If the trait is false OR unset, we default to false.
                e.ApplicationProperties["camel.k.logging.json"] = 
boolean.FalseString
-               if pointer.BoolDeref(l.Color, true) {
+               if ptr.Deref(l.Color, true) {
                        e.ApplicationProperties["camel.k.logging.color"] = 
boolean.TrueString
                }
        }
diff --git a/pkg/trait/logging_test.go b/pkg/trait/logging_test.go
index 1a2bae6d3..1ba6c482e 100644
--- a/pkg/trait/logging_test.go
+++ b/pkg/trait/logging_test.go
@@ -26,7 +26,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -63,10 +63,10 @@ func createLoggingTestEnv(t *testing.T, color bool, json 
bool, jsonPrettyPrint b
                                Profile: v1.TraitProfileOpenShift,
                                Traits: v1.Traits{
                                        Logging: &traitv1.LoggingTrait{
-                                               Color:           
pointer.Bool(color),
+                                               Color:           ptr.To(color),
                                                Format:          logFormat,
-                                               JSON:            
pointer.Bool(json),
-                                               JSONPrettyPrint: 
pointer.Bool(jsonPrettyPrint),
+                                               JSON:            ptr.To(json),
+                                               JSONPrettyPrint: 
ptr.To(jsonPrettyPrint),
                                                Level:           logLevel,
                                        },
                                },
diff --git a/pkg/trait/mount.go b/pkg/trait/mount.go
index 778de6a68..becc42da9 100644
--- a/pkg/trait/mount.go
+++ b/pkg/trait/mount.go
@@ -25,7 +25,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        batchv1 "k8s.io/api/batch/v1"
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        serving "knative.dev/serving/pkg/apis/serving/v1"
 
@@ -206,7 +206,7 @@ func (t *mountTrait) addImplicitKameletsSecrets(e 
*Environment) *TraitCondition
                                "Unexpected error happened while casting to 
kamelets trait",
                        )
                }
-               if !pointer.BoolDeref(t.ScanKameletsImplicitLabelSecrets, true) 
{
+               if !ptr.Deref(t.ScanKameletsImplicitLabelSecrets, true) {
                        return nil
                }
                implicitKameletSecrets, err := 
kamelets.listConfigurationSecrets(e)
diff --git a/pkg/trait/owner.go b/pkg/trait/owner.go
index 591390e2f..ee945de0a 100644
--- a/pkg/trait/owner.go
+++ b/pkg/trait/owner.go
@@ -20,7 +20,7 @@ package trait
 import (
        appsv1 "k8s.io/api/apps/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        serving "knative.dev/serving/pkg/apis/serving/v1"
 
@@ -48,7 +48,7 @@ func (t *ownerTrait) Configure(e *Environment) (bool, 
*TraitCondition, error) {
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationConditionUserDisabled("Owner"), nil
        }
 
diff --git a/pkg/trait/pdb.go b/pkg/trait/pdb.go
index 9ef25223f..d4a88a0b0 100644
--- a/pkg/trait/pdb.go
+++ b/pkg/trait/pdb.go
@@ -23,7 +23,7 @@ import (
        policyv1 "k8s.io/api/policy/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/util/intstr"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -46,7 +46,7 @@ func newPdbTrait() Trait {
 }
 
 func (t *pdbTrait) Configure(e *Environment) (bool, *TraitCondition, error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
diff --git a/pkg/trait/pdb_test.go b/pkg/trait/pdb_test.go
index 5c72d5a7c..7c32a4467 100644
--- a/pkg/trait/pdb_test.go
+++ b/pkg/trait/pdb_test.go
@@ -27,7 +27,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        policyv1 "k8s.io/api/policy/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/util/kubernetes"
@@ -102,7 +102,7 @@ func findPdb(resources *kubernetes.Collection) 
*policyv1.PodDisruptionBudget {
 // nolint: unparam
 func createPdbTest() (*pdbTrait, *Environment, *appsv1.Deployment) {
        trait, _ := newPdbTrait().(*pdbTrait)
-       trait.Enabled = pointer.Bool(true)
+       trait.Enabled = ptr.To(true)
 
        deployment := &appsv1.Deployment{
                ObjectMeta: metav1.ObjectMeta{
diff --git a/pkg/trait/platform.go b/pkg/trait/platform.go
index f46623bf8..cc9a04bbb 100644
--- a/pkg/trait/platform.go
+++ b/pkg/trait/platform.go
@@ -20,7 +20,7 @@ package trait
 import (
        "github.com/apache/camel-k/v2/pkg/install"
        apierrors "k8s.io/apimachinery/pkg/api/errors"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -57,16 +57,16 @@ func (t *platformTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
                return false, nil, nil
        }
 
-       if t.CreateDefault == nil && pointer.BoolDeref(t.Auto, false) && 
e.Platform == nil {
+       if t.CreateDefault == nil && ptr.Deref(t.Auto, false) && e.Platform == 
nil {
                // Calculate if the platform should be automatically created 
when missing.
                if ocp, err := openshift.IsOpenShift(t.Client); err != nil {
                        return false, nil, err
                } else if ocp {
-                       t.CreateDefault = pointer.Bool(true)
+                       t.CreateDefault = ptr.To(true)
                } else if addr, err := image.GetRegistryAddress(e.Ctx, 
t.Client); err != nil {
                        return false, nil, err
                } else if addr != nil {
-                       t.CreateDefault = pointer.Bool(true)
+                       t.CreateDefault = ptr.To(true)
                }
        }
 
@@ -117,7 +117,7 @@ func (t *platformTrait) getOrCreatePlatform(e *Environment) 
(*v1.IntegrationPlat
        if err != nil && !apierrors.IsNotFound(err) {
                return nil, err
        }
-       if apierrors.IsNotFound(err) && pointer.BoolDeref(t.CreateDefault, 
false) {
+       if apierrors.IsNotFound(err) && ptr.Deref(t.CreateDefault, false) {
                pl = t.createDefaultPlatform(e)
                e.Resources.Add(pl)
 
@@ -146,7 +146,7 @@ func (t *platformTrait) createDefaultPlatform(e 
*Environment) *v1.IntegrationPla
                platformName = platform.DefaultPlatformName
        }
        namespace := e.Integration.Namespace
-       if pointer.BoolDeref(t.Global, false) {
+       if ptr.Deref(t.Global, false) {
                operatorNamespace := platform.GetOperatorNamespace()
                if operatorNamespace != "" {
                        namespace = operatorNamespace
diff --git a/pkg/trait/platform_test.go b/pkg/trait/platform_test.go
index 0965773ff..0c1e7d8f0 100644
--- a/pkg/trait/platform_test.go
+++ b/pkg/trait/platform_test.go
@@ -30,7 +30,7 @@ import (
        "github.com/stretchr/testify/require"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 func TestPlatformTraitChangeStatus(t *testing.T) {
@@ -61,7 +61,7 @@ func TestPlatformTraitChangeStatus(t *testing.T) {
                        }
 
                        trait, _ := newPlatformTrait().(*platformTrait)
-                       trait.CreateDefault = pointer.Bool(false)
+                       trait.CreateDefault = ptr.To(false)
 
                        var err error
                        trait.Client, err = test.NewFakeClient()
@@ -96,7 +96,7 @@ func TestPlatformTraitCreatesDefaultPlatform(t *testing.T) {
        }
 
        trait, _ := newPlatformTrait().(*platformTrait)
-       trait.CreateDefault = pointer.Bool(true)
+       trait.CreateDefault = ptr.To(true)
 
        var err error
        trait.Client, err = test.NewFakeClient()
@@ -152,7 +152,7 @@ func TestPlatformTraitExisting(t *testing.T) {
                        }
 
                        trait, _ := newPlatformTrait().(*platformTrait)
-                       trait.CreateDefault = pointer.Bool(true)
+                       trait.CreateDefault = ptr.To(true)
 
                        var err error
                        existingPlatform := v1.NewIntegrationPlatform("ns1", 
"existing")
diff --git a/pkg/trait/pod.go b/pkg/trait/pod.go
index 80fc15063..715c1916f 100644
--- a/pkg/trait/pod.go
+++ b/pkg/trait/pod.go
@@ -25,7 +25,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        "k8s.io/apimachinery/pkg/util/json"
        "k8s.io/apimachinery/pkg/util/strategicpatch"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        serving "knative.dev/serving/pkg/apis/serving/v1"
 
@@ -50,7 +50,7 @@ func (t *podTrait) Configure(e *Environment) (bool, 
*TraitCondition, error) {
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationConditionUserDisabled("Pod"), nil
        }
        if e.Integration.Spec.PodTemplate == nil {
diff --git a/pkg/trait/pod_test.go b/pkg/trait/pod_test.go
index 520a9d388..80d4f0c04 100755
--- a/pkg/trait/pod_test.go
+++ b/pkg/trait/pod_test.go
@@ -24,11 +24,11 @@ import (
        "github.com/stretchr/testify/require"
 
        "k8s.io/apimachinery/pkg/util/yaml"
+       "k8s.io/utils/ptr"
 
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/util/digest"
@@ -115,7 +115,7 @@ func TestAutomountServiceAccountToken(t *testing.T) {
 // nolint: unparam
 func createPodTest(podSpecTemplate string) (*podTrait, *Environment, 
*appsv1.Deployment) {
        trait, _ := newPodTrait().(*podTrait)
-       trait.Enabled = pointer.Bool(true)
+       trait.Enabled = ptr.To(true)
 
        var podSpec v1.PodSpec
        if podSpecTemplate != "" {
diff --git a/pkg/trait/prometheus.go b/pkg/trait/prometheus.go
index c4b45427d..4138ff8fd 100644
--- a/pkg/trait/prometheus.go
+++ b/pkg/trait/prometheus.go
@@ -22,7 +22,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        monitoringv1 
"github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring/v1"
 
@@ -45,13 +45,13 @@ func newPrometheusTrait() Trait {
        return &prometheusTrait{
                BaseTrait: NewBaseTrait(prometheusTraitID, 
prometheusTraitOrder),
                PrometheusTrait: traitv1.PrometheusTrait{
-                       PodMonitor: pointer.Bool(true),
+                       PodMonitor: ptr.To(true),
                },
        }
 }
 
 func (t *prometheusTrait) Configure(e *Environment) (bool, *TraitCondition, 
error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
@@ -89,7 +89,7 @@ func (t *prometheusTrait) Apply(e *Environment) error {
        condition.Message = fmt.Sprintf("%s(%d)", container.Name, 
containerPort.ContainerPort)
 
        // Add the PodMonitor resource
-       if pointer.BoolDeref(t.PodMonitor, false) {
+       if ptr.Deref(t.PodMonitor, false) {
                portName := containerPort.Name
                podMonitor, err := t.getPodMonitorFor(e, portName)
                if err != nil {
diff --git a/pkg/trait/pull_secret.go b/pkg/trait/pull_secret.go
index a0dc5549f..6f91c89c2 100644
--- a/pkg/trait/pull_secret.go
+++ b/pkg/trait/pull_secret.go
@@ -23,7 +23,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        rbacv1 "k8s.io/api/rbac/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 
@@ -53,21 +53,21 @@ func (t *pullSecretTrait) Configure(e *Environment) (bool, 
*TraitCondition, erro
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, 
NewIntegrationConditionUserDisabled("PullSecret"), nil
        }
        if !e.IntegrationInRunningPhases() {
                return false, nil, nil
        }
 
-       if pointer.BoolDeref(t.Auto, true) {
+       if ptr.Deref(t.Auto, true) {
                err := t.autoConfigure(e)
                if err != nil {
                        return false, nil, err
                }
        }
 
-       return t.SecretName != "" || pointer.BoolDeref(t.ImagePullerDelegation, 
false), nil, nil
+       return t.SecretName != "" || ptr.Deref(t.ImagePullerDelegation, false), 
nil, nil
 }
 func (t *pullSecretTrait) autoConfigure(e *Environment) error {
        if t.SecretName == "" {
@@ -105,7 +105,7 @@ func (t *pullSecretTrait) Apply(e *Environment) error {
                        })
                })
        }
-       if pointer.BoolDeref(t.ImagePullerDelegation, false) {
+       if ptr.Deref(t.ImagePullerDelegation, false) {
                if err := t.delegateImagePuller(e); err != nil {
                        return err
                }
diff --git a/pkg/trait/pull_secret_test.go b/pkg/trait/pull_secret_test.go
index e470c51f1..ffe5e0c44 100644
--- a/pkg/trait/pull_secret_test.go
+++ b/pkg/trait/pull_secret_test.go
@@ -29,7 +29,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        rbacv1 "k8s.io/api/rbac/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
        "sigs.k8s.io/controller-runtime/pkg/client"
 
        "github.com/stretchr/testify/assert"
@@ -66,7 +66,7 @@ func TestPullSecretAuto(t *testing.T) {
        e, _ := getEnvironmentAndDeployment(t)
 
        trait, _ := newPullSecretTrait().(*pullSecretTrait)
-       trait.Auto = pointer.Bool(false)
+       trait.Auto = ptr.To(false)
        enabled, condition, err := trait.Configure(e)
        require.NoError(t, err)
        assert.False(t, enabled)
@@ -77,8 +77,8 @@ func TestPullSecretImagePullerDelegation(t *testing.T) {
        e, _ := getEnvironmentAndDeployment(t)
 
        trait, _ := newPullSecretTrait().(*pullSecretTrait)
-       trait.Auto = pointer.Bool(false)
-       trait.ImagePullerDelegation = pointer.Bool(true)
+       trait.Auto = ptr.To(false)
+       trait.ImagePullerDelegation = ptr.To(true)
        enabled, condition, err := trait.Configure(e)
        require.NoError(t, err)
        assert.True(t, enabled)
diff --git a/pkg/trait/quarkus.go b/pkg/trait/quarkus.go
index 8d4744614..2c4e5e219 100644
--- a/pkg/trait/quarkus.go
+++ b/pkg/trait/quarkus.go
@@ -24,7 +24,7 @@ import (
        "github.com/rs/xid"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -429,7 +429,7 @@ func (t *quarkusTrait) isIncrementalImageBuild(e 
*Environment) bool {
        // We need to get this information from the builder trait
        if trait := e.Catalog.GetTrait(builderTraitID); trait != nil {
                builder, ok := trait.(*builderTrait)
-               return ok && pointer.BoolDeref(builder.IncrementalImageBuild, 
true)
+               return ok && ptr.Deref(builder.IncrementalImageBuild, true)
        }
 
        // Default always to true for performance reasons
diff --git a/pkg/trait/registry.go b/pkg/trait/registry.go
index 3ef00ea1d..288aef615 100644
--- a/pkg/trait/registry.go
+++ b/pkg/trait/registry.go
@@ -34,7 +34,7 @@ import (
        "github.com/apache/camel-k/v2/pkg/util/registry"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
        ctrl "sigs.k8s.io/controller-runtime/pkg/client"
 )
 
@@ -61,7 +61,7 @@ func (t *registryTrait) InfluencesKit() bool {
 
 func (t *registryTrait) Configure(e *Environment) (bool, *TraitCondition, 
error) {
        // disabled by default
-       if e.IntegrationKit == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.IntegrationKit == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
        enabled := e.IntegrationKitInPhase(v1.IntegrationKitPhaseBuildSubmitted)
diff --git a/pkg/trait/route.go b/pkg/trait/route.go
index a95e9827d..c35b83c87 100644
--- a/pkg/trait/route.go
+++ b/pkg/trait/route.go
@@ -25,7 +25,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/util/intstr"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        routev1 "github.com/openshift/api/route/v1"
 
@@ -63,7 +63,7 @@ func (t *routeTrait) Configure(e *Environment) (bool, 
*TraitCondition, error) {
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationCondition(
                        "Route",
                        v1.IntegrationConditionExposureAvailable,
diff --git a/pkg/trait/route_test.go b/pkg/trait/route_test.go
index 927998678..376464fa6 100644
--- a/pkg/trait/route_test.go
+++ b/pkg/trait/route_test.go
@@ -29,7 +29,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -230,7 +230,7 @@ func TestRoute_Disabled(t *testing.T) {
        environment.Integration.Spec.Traits = v1.Traits{
                Route: &traitv1.RouteTrait{
                        Trait: traitv1.Trait{
-                               Enabled: pointer.Bool(false),
+                               Enabled: ptr.To(false),
                        },
                },
        }
diff --git a/pkg/trait/security_context.go b/pkg/trait/security_context.go
index d1dfa1b26..c43d90f98 100644
--- a/pkg/trait/security_context.go
+++ b/pkg/trait/security_context.go
@@ -21,7 +21,7 @@ import (
        "fmt"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -45,7 +45,7 @@ func newSecurityContextTrait() Trait {
        return &securityContextTrait{
                BasePlatformTrait: NewBasePlatformTrait(securityContextTraitID, 
securityContextTraitOder),
                SecurityContextTrait: traitv1.SecurityContextTrait{
-                       RunAsNonRoot:       
pointer.Bool(defaultPodRunAsNonRoot),
+                       RunAsNonRoot:       ptr.To(defaultPodRunAsNonRoot),
                        SeccompProfileType: defaultPodSeccompProfileType,
                },
        }
diff --git a/pkg/trait/security_context_test.go 
b/pkg/trait/security_context_test.go
index c45edabf9..633177233 100644
--- a/pkg/trait/security_context_test.go
+++ b/pkg/trait/security_context_test.go
@@ -26,7 +26,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -63,7 +63,7 @@ func TestDefaultPodKubernetesSecurityContext(t *testing.T) {
        d := 
environment.Resources.GetDeploymentForIntegration(environment.Integration)
 
        assert.NotNil(t, d)
-       assert.Equal(t, pointer.Bool(defaultPodRunAsNonRoot), 
d.Spec.Template.Spec.SecurityContext.RunAsNonRoot)
+       assert.Equal(t, ptr.To(defaultPodRunAsNonRoot), 
d.Spec.Template.Spec.SecurityContext.RunAsNonRoot)
        assert.Nil(t, d.Spec.Template.Spec.SecurityContext.RunAsUser)
        assert.Equal(t, corev1.SeccompProfileTypeRuntimeDefault, 
d.Spec.Template.Spec.SecurityContext.SeccompProfile.Type)
 }
@@ -83,7 +83,7 @@ func TestDefaultPodOpenshiftSecurityContext(t *testing.T) {
        d := 
environment.Resources.GetDeploymentForIntegration(environment.Integration)
 
        assert.NotNil(t, d)
-       assert.Equal(t, pointer.Bool(defaultPodRunAsNonRoot), 
d.Spec.Template.Spec.SecurityContext.RunAsNonRoot)
+       assert.Equal(t, ptr.To(defaultPodRunAsNonRoot), 
d.Spec.Template.Spec.SecurityContext.RunAsNonRoot)
        assert.NotNil(t, d.Spec.Template.Spec.SecurityContext.RunAsUser)
        assert.Equal(t, corev1.SeccompProfileTypeRuntimeDefault, 
d.Spec.Template.Spec.SecurityContext.SeccompProfile.Type)
 }
@@ -113,8 +113,8 @@ func TestUserPodSecurityContext(t *testing.T) {
        environment := createPodSettingContextEnvironment(t, 
v1.TraitProfileKubernetes)
        environment.Integration.Spec.Traits = v1.Traits{
                SecurityContext: &traitv1.SecurityContextTrait{
-                       RunAsNonRoot:       pointer.Bool(false),
-                       RunAsUser:          pointer.Int64(1000),
+                       RunAsNonRoot:       ptr.To(false),
+                       RunAsUser:          ptr.To(int64(1000)),
                        SeccompProfileType: "Unconfined",
                },
        }
@@ -131,8 +131,8 @@ func TestUserPodSecurityContext(t *testing.T) {
        d := 
environment.Resources.GetDeploymentForIntegration(environment.Integration)
 
        assert.NotNil(t, d)
-       assert.Equal(t, pointer.Bool(false), 
d.Spec.Template.Spec.SecurityContext.RunAsNonRoot)
-       assert.Equal(t, pointer.Int64(1000), 
d.Spec.Template.Spec.SecurityContext.RunAsUser)
+       assert.Equal(t, ptr.To(false), 
d.Spec.Template.Spec.SecurityContext.RunAsNonRoot)
+       assert.Equal(t, ptr.To(int64(1000)), 
d.Spec.Template.Spec.SecurityContext.RunAsUser)
        assert.Equal(t, corev1.SeccompProfileTypeUnconfined, 
d.Spec.Template.Spec.SecurityContext.SeccompProfile.Type)
 }
 
diff --git a/pkg/trait/service.go b/pkg/trait/service.go
index 50fc30b6d..51859517f 100644
--- a/pkg/trait/service.go
+++ b/pkg/trait/service.go
@@ -22,7 +22,7 @@ import (
 
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -50,7 +50,7 @@ func (t *serviceTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, NewIntegrationCondition(
                        "Service",
                        v1.IntegrationConditionServiceAvailable,
@@ -66,7 +66,7 @@ func (t *serviceTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
        // then this service is disabled
        if e.GetTrait(knativeServiceTraitID) != nil {
                knativeServiceTrait, _ := 
e.GetTrait(knativeServiceTraitID).(*knativeServiceTrait)
-               if pointer.BoolDeref(knativeServiceTrait.Enabled, true) {
+               if ptr.Deref(knativeServiceTrait.Enabled, true) {
                        return false, 
NewIntegrationConditionPlatformDisabledWithMessage("Service", "knative-service 
trait has priority over this trait"), nil
                }
        }
@@ -75,7 +75,7 @@ func (t *serviceTrait) Configure(e *Environment) (bool, 
*TraitCondition, error)
                return false, nil, nil
        }
 
-       if pointer.BoolDeref(t.Auto, true) {
+       if ptr.Deref(t.Auto, true) {
                sources, err := kubernetes.ResolveIntegrationSources(e.Ctx, 
t.Client, e.Integration, e.Resources)
                var condition *TraitCondition
                if err != nil {
@@ -118,7 +118,7 @@ func (t *serviceTrait) Apply(e *Environment) error {
                        default:
                                return fmt.Errorf("unsupported service type: 
%s", *t.Type)
                        }
-               } else if pointer.BoolDeref(t.NodePort, false) {
+               } else if ptr.Deref(t.NodePort, false) {
                        t.L.ForIntegration(e.Integration).Infof("Integration 
%s/%s should no more use the flag node-port as it is deprecated, use type 
instead", e.Integration.Namespace, e.Integration.Name)
                        serviceType = corev1.ServiceTypeNodePort
                }
diff --git a/pkg/trait/service_binding.go b/pkg/trait/service_binding.go
index 7e328772a..e2956858f 100644
--- a/pkg/trait/service_binding.go
+++ b/pkg/trait/service_binding.go
@@ -21,7 +21,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/client-go/dynamic"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        sb 
"github.com/redhat-developer/service-binding-operator/apis/binding/v1alpha1"
        
"github.com/redhat-developer/service-binding-operator/pkg/client/kubernetes"
@@ -71,7 +71,7 @@ func (t *serviceBindingTrait) Configure(e *Environment) 
(bool, *TraitCondition,
        if e.Integration == nil {
                return false, nil, nil
        }
-       if !pointer.BoolDeref(t.Enabled, true) {
+       if !ptr.Deref(t.Enabled, true) {
                return false, 
NewIntegrationConditionUserDisabled("ServiceBinding"), nil
        }
        if e.CamelCatalog == nil {
diff --git a/pkg/trait/service_test.go b/pkg/trait/service_test.go
index 1769110f9..58063df29 100644
--- a/pkg/trait/service_test.go
+++ b/pkg/trait/service_test.go
@@ -26,7 +26,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -78,9 +78,9 @@ func TestServiceWithDefaults(t *testing.T) {
                                Traits: v1.Traits{
                                        Service: &traitv1.ServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               Auto: pointer.Bool(false),
+                                               Auto: ptr.To(false),
                                        },
                                },
                        },
@@ -177,13 +177,13 @@ func TestService(t *testing.T) {
                                Traits: v1.Traits{
                                        Service: &traitv1.ServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                        Container: &traitv1.ContainerTrait{
                                                PlatformBaseTrait: 
traitv1.PlatformBaseTrait{},
-                                               Auto:              
pointer.Bool(false),
-                                               Expose:            
pointer.Bool(true),
+                                               Auto:              
ptr.To(false),
+                                               Expose:            ptr.To(true),
                                                Port:              8081,
                                                PortName:          "http-8081",
                                                ServicePort:       81,
@@ -269,9 +269,9 @@ func TestServiceWithCustomContainerName(t *testing.T) {
                                Traits: v1.Traits{
                                        Service: &traitv1.ServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               Auto: pointer.Bool(false),
+                                               Auto: ptr.To(false),
                                        },
                                        Container: &traitv1.ContainerTrait{
                                                Name: "my-container-name",
@@ -362,9 +362,9 @@ func TestServiceWithNodePort(t *testing.T) {
                                Traits: v1.Traits{
                                        Service: &traitv1.ServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               Auto: pointer.Bool(false),
+                                               Auto: ptr.To(false),
                                                Type: &serviceType,
                                        },
                                },
@@ -457,13 +457,13 @@ func TestServiceWithKnativeServiceEnabled(t *testing.T) {
                                Traits: v1.Traits{
                                        Service: &traitv1.ServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               Auto: pointer.Bool(false),
+                                               Auto: ptr.To(false),
                                        },
                                        KnativeService: 
&traitv1.KnativeServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
                                        },
                                },
@@ -639,7 +639,7 @@ func 
TestServiceWithKnativeServiceDisabledInIntegrationPlatform(t *testing.T) {
                                Traits: v1.Traits{
                                        KnativeService: 
&traitv1.KnativeServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(false),
+                                                       Enabled: ptr.To(false),
                                                },
                                        },
                                },
diff --git a/pkg/trait/toleration.go b/pkg/trait/toleration.go
index 1a55ee1b0..0414e2029 100644
--- a/pkg/trait/toleration.go
+++ b/pkg/trait/toleration.go
@@ -21,7 +21,7 @@ import (
        "fmt"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        "github.com/apache/camel-k/v2/pkg/util/kubernetes"
@@ -44,7 +44,7 @@ func newTolerationTrait() Trait {
 }
 
 func (t *tolerationTrait) Configure(e *Environment) (bool, *TraitCondition, 
error) {
-       if e.Integration == nil || !pointer.BoolDeref(t.Enabled, false) {
+       if e.Integration == nil || !ptr.Deref(t.Enabled, false) {
                return false, nil, nil
        }
 
diff --git a/pkg/trait/toleration_test.go b/pkg/trait/toleration_test.go
index 184a671cf..ea4538902 100644
--- a/pkg/trait/toleration_test.go
+++ b/pkg/trait/toleration_test.go
@@ -24,7 +24,7 @@ import (
        "github.com/stretchr/testify/require"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 func TestConfigureTolerationTraitMissingTaint(t *testing.T) {
@@ -133,7 +133,7 @@ func TestTolerationValidTaints(t *testing.T) {
 
 func createNominalTolerationTrait() *tolerationTrait {
        tolerationTrait, _ := newTolerationTrait().(*tolerationTrait)
-       tolerationTrait.Enabled = pointer.Bool(true)
+       tolerationTrait.Enabled = ptr.To(true)
        tolerationTrait.Taints = make([]string, 0)
 
        return tolerationTrait
diff --git a/pkg/trait/trait_configure_test.go 
b/pkg/trait/trait_configure_test.go
index 1dbd2c644..1c6654e8a 100644
--- a/pkg/trait/trait_configure_test.go
+++ b/pkg/trait/trait_configure_test.go
@@ -24,7 +24,7 @@ import (
        "github.com/stretchr/testify/require"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -38,15 +38,15 @@ func TestTraitConfiguration(t *testing.T) {
                                Profile: v1.TraitProfileKubernetes,
                                Traits: v1.Traits{
                                        Logging: &traitv1.LoggingTrait{
-                                               JSON:            
pointer.Bool(true),
-                                               JSONPrettyPrint: 
pointer.Bool(false),
+                                               JSON:            ptr.To(true),
+                                               JSONPrettyPrint: ptr.To(false),
                                                Level:           "DEBUG",
                                        },
                                        Service: &traitv1.ServiceTrait{
                                                Trait: traitv1.Trait{
-                                                       Enabled: 
pointer.Bool(true),
+                                                       Enabled: ptr.To(true),
                                                },
-                                               Auto: pointer.Bool(true),
+                                               Auto: ptr.To(true),
                                        },
                                },
                        },
@@ -78,7 +78,7 @@ func TestTraitConfigurationFromAnnotations(t *testing.T) {
                                Profile: v1.TraitProfileKubernetes,
                                Traits: v1.Traits{
                                        Cron: &traitv1.CronTrait{
-                                               Fallback:          
pointer.Bool(true),
+                                               Fallback:          ptr.To(true),
                                                ConcurrencyPolicy: "mypolicy",
                                        },
                                },
@@ -141,7 +141,7 @@ func TestTraitConfigurationOverrideRulesFromAnnotations(t 
*testing.T) {
                        Spec: v1.IntegrationKitSpec{
                                Traits: v1.IntegrationKitTraits{
                                        Builder: &traitv1.BuilderTrait{
-                                               Verbose: pointer.Bool(false),
+                                               Verbose: ptr.To(false),
                                        },
                                },
                        },
@@ -219,7 +219,7 @@ func TestTraitDecode(t *testing.T) {
                PlatformBaseTrait: traitv1.PlatformBaseTrait{},
                Name:              "test-container",
                Port:              7071,
-               Auto:              pointer.Bool(false),
+               Auto:              ptr.To(false),
        })
 
        target, ok := newContainerTrait().(*containerTrait)
@@ -229,5 +229,5 @@ func TestTraitDecode(t *testing.T) {
 
        assert.Equal(t, "test-container", target.Name)
        assert.Equal(t, 7071, target.Port)
-       assert.False(t, pointer.BoolDeref(target.Auto, true))
+       assert.False(t, ptr.Deref(target.Auto, true))
 }
diff --git a/pkg/trait/trait_test.go b/pkg/trait/trait_test.go
index 34f0ac5bc..a759f17e2 100644
--- a/pkg/trait/trait_test.go
+++ b/pkg/trait/trait_test.go
@@ -29,7 +29,7 @@ import (
        appsv1 "k8s.io/api/apps/v1"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -95,7 +95,7 @@ func TestOpenShiftTraitsWithWebAndDisabledTrait(t *testing.T) 
{
        env := createTestEnv(t, v1.IntegrationPlatformClusterOpenShift, 
"from('netty-http:http').to('log:info')")
        env.Integration.Spec.Traits.Service = &traitv1.ServiceTrait{
                Trait: traitv1.Trait{
-                       Enabled: pointer.Bool(false),
+                       Enabled: ptr.To(false),
                },
        }
        res := processTestEnv(t, env)
@@ -144,20 +144,20 @@ func TestTraitHierarchyDecode(t *testing.T) {
 
        env.Platform.Spec.Traits.KnativeService = &traitv1.KnativeServiceTrait{
                Trait: traitv1.Trait{
-                       Enabled: pointer.Bool(false),
+                       Enabled: ptr.To(false),
                },
-               MinScale: pointer.Int(1),
-               MaxScale: pointer.Int(10),
-               Target:   pointer.Int(15),
+               MinScale: ptr.To(1),
+               MaxScale: ptr.To(10),
+               Target:   ptr.To(15),
        }
        env.Platform.ResyncStatusFullConfig()
 
        env.Integration.Spec.Traits.KnativeService = 
&traitv1.KnativeServiceTrait{
                Trait: traitv1.Trait{
-                       Enabled: pointer.Bool(true),
+                       Enabled: ptr.To(true),
                },
-               MinScale: pointer.Int(5),
-               MaxScale: pointer.Int(20),
+               MinScale: ptr.To(5),
+               MaxScale: ptr.To(20),
        }
 
        c := NewTraitTestCatalog()
diff --git a/pkg/trait/trait_types_test.go b/pkg/trait/trait_types_test.go
index ab3eabef3..6397995c4 100644
--- a/pkg/trait/trait_types_test.go
+++ b/pkg/trait/trait_types_test.go
@@ -24,7 +24,7 @@ import (
        "github.com/stretchr/testify/require"
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -199,9 +199,9 @@ func 
TestDetermineControllerStrategySyntheticKitForceKnative(t *testing.T) {
        e.Integration.Spec.Traits = v1.Traits{
                KnativeService: &trait.KnativeServiceTrait{
                        Trait: trait.Trait{
-                               Enabled: pointer.Bool(true),
+                               Enabled: ptr.To(true),
                        },
-                       Auto: pointer.Bool(false),
+                       Auto: ptr.To(false),
                },
        }
        e.Platform.ResyncStatusFullConfig()
diff --git a/pkg/trait/util_test.go b/pkg/trait/util_test.go
index fe3977fd4..e8e8e153c 100644
--- a/pkg/trait/util_test.go
+++ b/pkg/trait/util_test.go
@@ -21,7 +21,7 @@ import (
        "testing"
 
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -36,8 +36,8 @@ func TestToTraitMap(t *testing.T) {
                Container: &traitv1.ContainerTrait{
                        PlatformBaseTrait: traitv1.PlatformBaseTrait{},
                        Name:              "test-container",
-                       Auto:              pointer.Bool(false),
-                       Expose:            pointer.Bool(true),
+                       Auto:              ptr.To(false),
+                       Expose:            ptr.To(true),
                        Port:              8081,
                        PortName:          "http-8081",
                        ServicePort:       81,
@@ -45,7 +45,7 @@ func TestToTraitMap(t *testing.T) {
                },
                Service: &traitv1.ServiceTrait{
                        Trait: traitv1.Trait{
-                               Enabled: pointer.Bool(true),
+                               Enabled: ptr.To(true),
                        },
                },
                Addons: map[string]v1.AddonTrait{
@@ -84,8 +84,8 @@ func TestToPropertyMap(t *testing.T) {
        trait := traitv1.ContainerTrait{
                PlatformBaseTrait: traitv1.PlatformBaseTrait{},
                Name:              "test-container",
-               Auto:              pointer.Bool(false),
-               Expose:            pointer.Bool(true),
+               Auto:              ptr.To(false),
+               Expose:            ptr.To(true),
                Port:              8081,
                PortName:          "http-8081",
                ServicePort:       81,
@@ -159,8 +159,8 @@ func TestToTrait(t *testing.T) {
        expected := traitv1.ContainerTrait{
                PlatformBaseTrait: traitv1.PlatformBaseTrait{},
                Name:              "test-container",
-               Auto:              pointer.Bool(false),
-               Expose:            pointer.Bool(true),
+               Auto:              ptr.To(false),
+               Expose:            ptr.To(true),
                Port:              8081,
                PortName:          "http-8081",
                ServicePort:       81,
diff --git a/pkg/util/bindings/bindings_test.go 
b/pkg/util/bindings/bindings_test.go
index 0cd7e3516..f1e06b7a0 100644
--- a/pkg/util/bindings/bindings_test.go
+++ b/pkg/util/bindings/bindings_test.go
@@ -23,7 +23,7 @@ import (
        "testing"
 
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
@@ -128,7 +128,7 @@ func TestBindings(t *testing.T) {
                        traits: v1.Traits{
                                Knative: &traitv1.KnativeTrait{
                                        Filters:         
[]string{"type=myeventtype"},
-                                       FilterEventType: pointer.Bool(true),
+                                       FilterEventType: ptr.To(true),
                                },
                        },
                },
@@ -183,7 +183,7 @@ func TestBindings(t *testing.T) {
                {
                        endpointType: v1.EndpointTypeSink,
                        endpoint: v1.Endpoint{
-                               URI: pointer.String("https://myurl/hey";),
+                               URI: ptr.To("https://myurl/hey";),
                                Properties: 
asEndpointProperties(map[string]string{
                                        "ce.override.ce-type": "mytype",
                                }),
@@ -191,7 +191,7 @@ func TestBindings(t *testing.T) {
                        uri: "knative:endpoint/sink?ce.override.ce-type=mytype",
                        traits: v1.Traits{
                                Knative: &traitv1.KnativeTrait{
-                                       SinkBinding:   pointer.Bool(false),
+                                       SinkBinding:   ptr.To(false),
                                        Configuration: 
asKnativeConfig("https://myurl/hey";),
                                },
                        },
@@ -199,7 +199,7 @@ func TestBindings(t *testing.T) {
                {
                        endpointType: v1.EndpointTypeSink,
                        endpoint: v1.Endpoint{
-                               URI: pointer.String("https://myurl/hey";),
+                               URI: ptr.To("https://myurl/hey";),
                        },
                        profile: v1.TraitProfileKubernetes,
                        uri:     "https://myurl/hey";,
@@ -207,7 +207,7 @@ func TestBindings(t *testing.T) {
                {
                        endpointType: v1.EndpointTypeSink,
                        endpoint: v1.Endpoint{
-                               URI: pointer.String("docker://xxx"),
+                               URI: ptr.To("docker://xxx"),
                        },
                        uri: "docker://xxx",
                },
diff --git a/pkg/util/bindings/catalog.go b/pkg/util/bindings/catalog.go
index 995228150..18bcb2483 100644
--- a/pkg/util/bindings/catalog.go
+++ b/pkg/util/bindings/catalog.go
@@ -25,7 +25,7 @@ import (
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/apis/camel/v1alpha1"
        "github.com/apache/camel-k/v2/pkg/platform"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 var bindingProviders []BindingProvider
@@ -76,7 +76,7 @@ func Translate(ctx BindingContext, endpointCtx 
EndpointContext, endpoint v1.Endp
        if endpoint.Ref != nil {
                errorMessage = fmt.Sprintf("could not find any suitable binding 
provider for %s/%s %s in namespace %s. Bindings available: %q",
                        endpoint.Ref.APIVersion, endpoint.Ref.Kind, 
endpoint.Ref.Name, endpoint.Ref.Namespace, availableBindings)
-       } else if pointer.StringDeref(endpoint.URI, "") != "" {
+       } else if ptr.Deref(endpoint.URI, "") != "" {
                errorMessage = fmt.Sprintf("could not find any suitable binding 
provider for %s", *endpoint.URI)
        }
        return nil, fmt.Errorf(errorMessage)
diff --git a/pkg/util/bindings/knative_ref_test.go 
b/pkg/util/bindings/knative_ref_test.go
index 18e482090..be0506a7d 100644
--- a/pkg/util/bindings/knative_ref_test.go
+++ b/pkg/util/bindings/knative_ref_test.go
@@ -25,7 +25,7 @@ import (
        "github.com/stretchr/testify/assert"
        "github.com/stretchr/testify/require"
        v1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        camelv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/apache/camel-k/v2/pkg/util/test"
@@ -49,7 +49,7 @@ func TestKnativeRefAsSource(t *testing.T) {
                                },
                        },
                        uri:             
"knative:event?apiVersion=eventing.knative.dev%2Fv1&kind=Broker&name=default",
-                       filterEventType: pointer.Bool(false),
+                       filterEventType: ptr.To(false),
                },
                {
                        name: "broker-name-property",
@@ -62,7 +62,7 @@ func TestKnativeRefAsSource(t *testing.T) {
                                Properties: 
asEndpointProperties(map[string]string{"name": "my-broker"}),
                        },
                        uri:             
"knative:event?apiVersion=eventing.knative.dev%2Fv1&kind=Broker&name=my-broker",
-                       filterEventType: pointer.Bool(false),
+                       filterEventType: ptr.To(false),
                },
                {
                        name: "event-type-filter",
@@ -102,7 +102,7 @@ func TestKnativeRefAsSource(t *testing.T) {
                        },
                        uri:             
"knative:event?apiVersion=eventing.knative.dev%2Fv1&kind=Broker&name=default",
                        filters:         []string{"source=my-source", 
"subject=mySubject"},
-                       filterEventType: pointer.Bool(false),
+                       filterEventType: ptr.To(false),
                },
                {
                        name: "event-extension-filters",
@@ -116,7 +116,7 @@ func TestKnativeRefAsSource(t *testing.T) {
                        },
                        uri:             
"knative:event?apiVersion=eventing.knative.dev%2Fv1&kind=Broker&name=default",
                        filters:         []string{"myextension=foo"},
-                       filterEventType: pointer.Bool(false),
+                       filterEventType: ptr.To(false),
                },
                {
                        name: "channel",
@@ -164,7 +164,7 @@ func TestKnativeRefAsSource(t *testing.T) {
                        assert.NotNil(t, binding)
                        assert.Equal(t, tc.uri, binding.URI)
 
-                       if tc.filters != nil || 
!pointer.BoolDeref(tc.filterEventType, true) {
+                       if tc.filters != nil || !ptr.Deref(tc.filterEventType, 
true) {
                                assert.NotNil(t, binding.Traits.Knative)
                                assert.Len(t, binding.Traits.Knative.Filters, 
len(tc.filters))
 
@@ -172,7 +172,7 @@ func TestKnativeRefAsSource(t *testing.T) {
                                        assert.Contains(t, 
binding.Traits.Knative.Filters, filterExpression)
                                }
 
-                               assert.Equal(t, 
pointer.BoolDeref(binding.Traits.Knative.FilterEventType, true), 
pointer.BoolDeref(tc.filterEventType, true))
+                               assert.Equal(t, 
ptr.Deref(binding.Traits.Knative.FilterEventType, true), 
ptr.Deref(tc.filterEventType, true))
                        }
                })
        }
diff --git a/pkg/util/bindings/knative_uri.go b/pkg/util/bindings/knative_uri.go
index 2873dca4a..ae5a626db 100644
--- a/pkg/util/bindings/knative_uri.go
+++ b/pkg/util/bindings/knative_uri.go
@@ -21,12 +21,11 @@ import (
        "net/url"
        "strings"
 
-       "k8s.io/utils/pointer"
-
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        knativeapis "github.com/apache/camel-k/v2/pkg/apis/camel/v1/knative"
        traitv1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
        v1alpha1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1alpha1"
+       "k8s.io/utils/ptr"
 
        "github.com/apache/camel-k/v2/pkg/util/uri"
 )
@@ -91,7 +90,7 @@ func (k KnativeURIBindingProvider) Translate(ctx 
BindingContext, endpointCtx End
                Traits: v1.Traits{
                        Knative: &traitv1.KnativeTrait{
                                Configuration: config,
-                               SinkBinding:   pointer.Bool(false),
+                               SinkBinding:   ptr.To(false),
                        },
                },
        }, nil
@@ -164,7 +163,7 @@ func (k V1alpha1KnativeURIBindingProvider) Translate(ctx 
V1alpha1BindingContext,
                Traits: v1.Traits{
                        Knative: &traitv1.KnativeTrait{
                                Configuration: config,
-                               SinkBinding:   pointer.Bool(false),
+                               SinkBinding:   ptr.To(false),
                        },
                },
        }, nil
diff --git a/pkg/util/digest/digest_test.go b/pkg/util/digest/digest_test.go
index a087dfc37..81dd4aa44 100644
--- a/pkg/util/digest/digest_test.go
+++ b/pkg/util/digest/digest_test.go
@@ -22,7 +22,7 @@ import (
        "testing"
 
        "github.com/apache/camel-k/v2/pkg/apis/camel/v1/trait"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 
        v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
        "github.com/stretchr/testify/assert"
@@ -71,7 +71,7 @@ func TestDigestUsesConfigmap(t *testing.T) {
                        Traits: v1.Traits{
                                Mount: &trait.MountTrait{
                                        Configs:   []string{"configmap:cm"},
-                                       HotReload: pointer.Bool(true),
+                                       HotReload: ptr.To(true),
                                },
                        },
                },
@@ -101,7 +101,7 @@ func TestDigestUsesSecret(t *testing.T) {
                        Traits: v1.Traits{
                                Mount: &trait.MountTrait{
                                        Configs:   []string{"secret:mysec"},
-                                       HotReload: pointer.Bool(true),
+                                       HotReload: ptr.To(true),
                                },
                        },
                },
diff --git a/pkg/util/kubernetes/security.go b/pkg/util/kubernetes/security.go
index 3c5d55697..1f4e346a2 100644
--- a/pkg/util/kubernetes/security.go
+++ b/pkg/util/kubernetes/security.go
@@ -19,17 +19,17 @@ package kubernetes
 
 import (
        corev1 "k8s.io/api/core/v1"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 // DefaultOperatorSecurityContext to ensure a container with low privilege and 
limited permissions.
 func DefaultOperatorSecurityContext() *corev1.SecurityContext {
        sc := corev1.SecurityContext{
-               RunAsNonRoot: pointer.Bool(true),
+               RunAsNonRoot: ptr.To(true),
                SeccompProfile: &corev1.SeccompProfile{
                        Type: corev1.SeccompProfileTypeRuntimeDefault,
                },
-               AllowPrivilegeEscalation: pointer.Bool(false),
+               AllowPrivilegeEscalation: ptr.To(false),
                Capabilities:             &corev1.Capabilities{Drop: 
[]corev1.Capability{"ALL"}},
        }
 
diff --git a/pkg/util/openshift/openshift.go b/pkg/util/openshift/openshift.go
index 77e02b627..d2e280bd9 100644
--- a/pkg/util/openshift/openshift.go
+++ b/pkg/util/openshift/openshift.go
@@ -28,7 +28,7 @@ import (
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/client-go/kubernetes"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 // IsOpenShift returns true if we are connected to a OpenShift cluster.
@@ -88,11 +88,11 @@ func GetOpenshiftSecurityContextRestricted(ctx 
context.Context, client kubernete
 
        sc := corev1.SecurityContext{
                RunAsUser:    uid,
-               RunAsNonRoot: pointer.Bool(true),
+               RunAsNonRoot: ptr.To(true),
                SeccompProfile: &corev1.SeccompProfile{
                        Type: corev1.SeccompProfileTypeRuntimeDefault,
                },
-               AllowPrivilegeEscalation: pointer.Bool(false),
+               AllowPrivilegeEscalation: ptr.To(false),
                Capabilities:             &corev1.Capabilities{Drop: 
[]corev1.Capability{"ALL"}},
        }
 
diff --git a/pkg/util/openshift/openshift_test.go 
b/pkg/util/openshift/openshift_test.go
index e7d943585..1de9a5c01 100644
--- a/pkg/util/openshift/openshift_test.go
+++ b/pkg/util/openshift/openshift_test.go
@@ -26,7 +26,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        fakeclientset "k8s.io/client-go/kubernetes/fake"
-       "k8s.io/utils/pointer"
+       "k8s.io/utils/ptr"
 )
 
 var noSccAnnotationNamespace *corev1.Namespace = &corev1.Namespace{
@@ -68,7 +68,7 @@ func TestGetUserIdNamespaceConstrained(t *testing.T) {
        uid, errUID := GetOpenshiftUser(context.Background(), kclient, "myuser")
 
        require.NoError(t, errUID)
-       assert.Equal(t, pointer.Int64(1000860000), uid)
+       assert.Equal(t, ptr.To(int64(1000860000)), uid)
 }
 
 func TestGetPodSecurityContextNamespaceWithoutLabels(t *testing.T) {

Reply via email to