rename CapabilityType Capability
This commit is contained in:
@@ -209,8 +209,8 @@ func FuzzerFor(t *testing.T, version string, src rand.Source) *fuzz.Fuzzer {
|
||||
priv := c.RandBool()
|
||||
sc.Privileged = &priv
|
||||
sc.Capabilities = &api.Capabilities{
|
||||
Add: make([]api.CapabilityType, 0),
|
||||
Drop: make([]api.CapabilityType, 0),
|
||||
Add: make([]api.Capability, 0),
|
||||
Drop: make([]api.Capability, 0),
|
||||
}
|
||||
c.Fuzz(&sc.Capabilities.Add)
|
||||
c.Fuzz(&sc.Capabilities.Drop)
|
||||
|
@@ -582,15 +582,15 @@ const (
|
||||
PullIfNotPresent PullPolicy = "IfNotPresent"
|
||||
)
|
||||
|
||||
// CapabilityType represent POSIX capabilities type
|
||||
type CapabilityType string
|
||||
// Capability represent POSIX capabilities type
|
||||
type Capability string
|
||||
|
||||
// Capabilities represent POSIX capabilities that can be added or removed to a running container.
|
||||
type Capabilities struct {
|
||||
// Added capabilities
|
||||
Add []CapabilityType `json:"add,omitempty"`
|
||||
Add []Capability `json:"add,omitempty"`
|
||||
// Removed capabilities
|
||||
Drop []CapabilityType `json:"drop,omitempty"`
|
||||
Drop []Capability `json:"drop,omitempty"`
|
||||
}
|
||||
|
||||
// ResourceRequirements describes the compute resource requirements.
|
||||
|
@@ -84,17 +84,17 @@ func convert_v1_Capabilities_To_api_Capabilities(in *Capabilities, out *newer.Ca
|
||||
defaulting.(func(*Capabilities))(in)
|
||||
}
|
||||
if in.Add != nil {
|
||||
out.Add = make([]newer.CapabilityType, len(in.Add))
|
||||
out.Add = make([]newer.Capability, len(in.Add))
|
||||
for i := range in.Add {
|
||||
out.Add[i] = newer.CapabilityType(in.Add[i])
|
||||
out.Add[i] = newer.Capability(in.Add[i])
|
||||
}
|
||||
} else {
|
||||
out.Add = nil
|
||||
}
|
||||
if in.Drop != nil {
|
||||
out.Drop = make([]newer.CapabilityType, len(in.Drop))
|
||||
out.Drop = make([]newer.Capability, len(in.Drop))
|
||||
for i := range in.Drop {
|
||||
out.Drop[i] = newer.CapabilityType(in.Drop[i])
|
||||
out.Drop[i] = newer.Capability(in.Drop[i])
|
||||
}
|
||||
} else {
|
||||
out.Drop = nil
|
||||
@@ -107,17 +107,17 @@ func convert_api_Capabilities_To_v1_Capabilities(in *newer.Capabilities, out *Ca
|
||||
defaulting.(func(*newer.Capabilities))(in)
|
||||
}
|
||||
if in.Add != nil {
|
||||
out.Add = make([]CapabilityType, len(in.Add))
|
||||
out.Add = make([]Capability, len(in.Add))
|
||||
for i := range in.Add {
|
||||
out.Add[i] = CapabilityType(in.Add[i])
|
||||
out.Add[i] = Capability(in.Add[i])
|
||||
}
|
||||
} else {
|
||||
out.Add = nil
|
||||
}
|
||||
if in.Drop != nil {
|
||||
out.Drop = make([]CapabilityType, len(in.Drop))
|
||||
out.Drop = make([]Capability, len(in.Drop))
|
||||
for i := range in.Drop {
|
||||
out.Drop[i] = CapabilityType(in.Drop[i])
|
||||
out.Drop[i] = Capability(in.Drop[i])
|
||||
}
|
||||
} else {
|
||||
out.Drop = nil
|
||||
|
@@ -590,15 +590,15 @@ const (
|
||||
PullIfNotPresent PullPolicy = "IfNotPresent"
|
||||
)
|
||||
|
||||
// CapabilityType represent POSIX capabilities type
|
||||
type CapabilityType string
|
||||
// Capability represent POSIX capabilities type
|
||||
type Capability string
|
||||
|
||||
// Capabilities represent POSIX capabilities that can be added or removed to a running container.
|
||||
type Capabilities struct {
|
||||
// Added capabilities
|
||||
Add []CapabilityType `json:"add,omitempty" description:"added capabilities"`
|
||||
Add []Capability `json:"add,omitempty" description:"added capabilities"`
|
||||
// Removed capabilities
|
||||
Drop []CapabilityType `json:"drop,omitempty" description:"droped capabilities"`
|
||||
Drop []Capability `json:"drop,omitempty" description:"droped capabilities"`
|
||||
}
|
||||
|
||||
// ResourceRequirements describes the compute resource requirements.
|
||||
|
@@ -771,11 +771,11 @@ func TestBadSecurityContextConversion(t *testing.T) {
|
||||
"mismatched caps add": {
|
||||
c: ¤t.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Add: []current.Capability{"foo"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -784,11 +784,11 @@ func TestBadSecurityContextConversion(t *testing.T) {
|
||||
"mismatched caps drop": {
|
||||
c: ¤t.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Drop: []current.CapabilityType{"foo"},
|
||||
Drop: []current.Capability{"foo"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
|
@@ -351,8 +351,8 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
c: current.Container{
|
||||
Privileged: false,
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &priv,
|
||||
@@ -363,13 +363,13 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
c: current.Container{
|
||||
Privileged: false,
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -380,8 +380,8 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &priv,
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"biz"},
|
||||
Drop: []current.CapabilityType{"baz"},
|
||||
Add: []current.Capability{"biz"},
|
||||
Drop: []current.Capability{"baz"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -389,14 +389,14 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
"upward defaulting priv": {
|
||||
c: current.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &privTrue,
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
|
@@ -481,15 +481,15 @@ const (
|
||||
PullIfNotPresent PullPolicy = "PullIfNotPresent"
|
||||
)
|
||||
|
||||
// CapabilityType represent POSIX capabilities type
|
||||
type CapabilityType string
|
||||
// Capability represent POSIX capabilities type
|
||||
type Capability string
|
||||
|
||||
// Capabilities represent POSIX capabilities that can be added or removed to a running container.
|
||||
type Capabilities struct {
|
||||
// Added capabilities
|
||||
Add []CapabilityType `json:"add,omitempty" description:"added capabilities"`
|
||||
Add []Capability `json:"add,omitempty" description:"added capabilities"`
|
||||
// Removed capabilities
|
||||
Drop []CapabilityType `json:"drop,omitempty" description:"droped capabilities"`
|
||||
Drop []Capability `json:"drop,omitempty" description:"droped capabilities"`
|
||||
}
|
||||
|
||||
type ResourceRequirements struct {
|
||||
|
@@ -586,11 +586,11 @@ func TestBadSecurityContextConversion(t *testing.T) {
|
||||
"mismatched caps add": {
|
||||
c: ¤t.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Add: []current.Capability{"foo"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -599,11 +599,11 @@ func TestBadSecurityContextConversion(t *testing.T) {
|
||||
"mismatched caps drop": {
|
||||
c: ¤t.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Drop: []current.CapabilityType{"foo"},
|
||||
Drop: []current.Capability{"foo"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
|
@@ -350,8 +350,8 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
c: current.Container{
|
||||
Privileged: false,
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &priv,
|
||||
@@ -362,13 +362,13 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
c: current.Container{
|
||||
Privileged: false,
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -379,8 +379,8 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &priv,
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"biz"},
|
||||
Drop: []current.CapabilityType{"baz"},
|
||||
Add: []current.Capability{"biz"},
|
||||
Drop: []current.Capability{"baz"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -388,14 +388,14 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
"upward defaulting priv": {
|
||||
c: current.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &privTrue,
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
|
@@ -466,17 +466,17 @@ const (
|
||||
PullIfNotPresent PullPolicy = "PullIfNotPresent"
|
||||
)
|
||||
|
||||
// CapabilityType represent POSIX capabilities type
|
||||
type CapabilityType string
|
||||
// Capability represent POSIX capabilities type
|
||||
type Capability string
|
||||
|
||||
// Capabilities represent POSIX capabilities that can be added or removed to a running container.
|
||||
//
|
||||
// http://docs.k8s.io/containers.md#capabilities
|
||||
type Capabilities struct {
|
||||
// Added capabilities
|
||||
Add []CapabilityType `json:"add,omitempty" description:"added capabilities"`
|
||||
Add []Capability `json:"add,omitempty" description:"added capabilities"`
|
||||
// Removed capabilities
|
||||
Drop []CapabilityType `json:"drop,omitempty" description:"droped capabilities"`
|
||||
Drop []Capability `json:"drop,omitempty" description:"droped capabilities"`
|
||||
}
|
||||
|
||||
type ResourceRequirements struct {
|
||||
|
@@ -84,17 +84,17 @@ func convert_api_Capabilities_To_v1beta3_Capabilities(in *newer.Capabilities, ou
|
||||
defaulting.(func(*newer.Capabilities))(in)
|
||||
}
|
||||
if in.Add != nil {
|
||||
out.Add = make([]CapabilityType, len(in.Add))
|
||||
out.Add = make([]Capability, len(in.Add))
|
||||
for i := range in.Add {
|
||||
out.Add[i] = CapabilityType(in.Add[i])
|
||||
out.Add[i] = Capability(in.Add[i])
|
||||
}
|
||||
} else {
|
||||
out.Add = nil
|
||||
}
|
||||
if in.Drop != nil {
|
||||
out.Drop = make([]CapabilityType, len(in.Drop))
|
||||
out.Drop = make([]Capability, len(in.Drop))
|
||||
for i := range in.Drop {
|
||||
out.Drop[i] = CapabilityType(in.Drop[i])
|
||||
out.Drop[i] = Capability(in.Drop[i])
|
||||
}
|
||||
} else {
|
||||
out.Drop = nil
|
||||
@@ -107,17 +107,17 @@ func convert_v1beta3_Capabilities_To_api_Capabilities(in *Capabilities, out *new
|
||||
defaulting.(func(*Capabilities))(in)
|
||||
}
|
||||
if in.Add != nil {
|
||||
out.Add = make([]newer.CapabilityType, len(in.Add))
|
||||
out.Add = make([]newer.Capability, len(in.Add))
|
||||
for i := range in.Add {
|
||||
out.Add[i] = newer.CapabilityType(in.Add[i])
|
||||
out.Add[i] = newer.Capability(in.Add[i])
|
||||
}
|
||||
} else {
|
||||
out.Add = nil
|
||||
}
|
||||
if in.Drop != nil {
|
||||
out.Drop = make([]newer.CapabilityType, len(in.Drop))
|
||||
out.Drop = make([]newer.Capability, len(in.Drop))
|
||||
for i := range in.Drop {
|
||||
out.Drop[i] = newer.CapabilityType(in.Drop[i])
|
||||
out.Drop[i] = newer.Capability(in.Drop[i])
|
||||
}
|
||||
} else {
|
||||
out.Drop = nil
|
||||
|
@@ -67,11 +67,11 @@ func TestBadSecurityContextConversion(t *testing.T) {
|
||||
"mismatched caps add": {
|
||||
c: ¤t.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Add: []current.Capability{"foo"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -80,11 +80,11 @@ func TestBadSecurityContextConversion(t *testing.T) {
|
||||
"mismatched caps drop": {
|
||||
c: ¤t.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Drop: []current.CapabilityType{"foo"},
|
||||
Drop: []current.Capability{"foo"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
|
@@ -360,8 +360,8 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
c: current.Container{
|
||||
Privileged: false,
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &priv,
|
||||
@@ -372,13 +372,13 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
c: current.Container{
|
||||
Privileged: false,
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -389,8 +389,8 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &priv,
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"biz"},
|
||||
Drop: []current.CapabilityType{"baz"},
|
||||
Add: []current.Capability{"biz"},
|
||||
Drop: []current.Capability{"baz"},
|
||||
},
|
||||
},
|
||||
},
|
||||
@@ -398,14 +398,14 @@ func TestSetDefaultSecurityContext(t *testing.T) {
|
||||
"upward defaulting priv": {
|
||||
c: current.Container{
|
||||
Capabilities: current.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
SecurityContext: ¤t.SecurityContext{
|
||||
Privileged: &privTrue,
|
||||
Capabilities: ¤t.Capabilities{
|
||||
Add: []current.CapabilityType{"foo"},
|
||||
Drop: []current.CapabilityType{"bar"},
|
||||
Add: []current.Capability{"foo"},
|
||||
Drop: []current.Capability{"bar"},
|
||||
},
|
||||
},
|
||||
},
|
||||
|
@@ -590,15 +590,15 @@ const (
|
||||
PullIfNotPresent PullPolicy = "IfNotPresent"
|
||||
)
|
||||
|
||||
// CapabilityType represent POSIX capabilities type
|
||||
type CapabilityType string
|
||||
// Capability represent POSIX capabilities type
|
||||
type Capability string
|
||||
|
||||
// Capabilities represent POSIX capabilities that can be added or removed to a running container.
|
||||
type Capabilities struct {
|
||||
// Added capabilities
|
||||
Add []CapabilityType `json:"add,omitempty" description:"added capabilities"`
|
||||
Add []Capability `json:"add,omitempty" description:"added capabilities"`
|
||||
// Removed capabilities
|
||||
Drop []CapabilityType `json:"drop,omitempty" description:"droped capabilities"`
|
||||
Drop []Capability `json:"drop,omitempty" description:"droped capabilities"`
|
||||
}
|
||||
|
||||
// ResourceRequirements describes the compute resource requirements.
|
||||
|
@@ -3175,8 +3175,8 @@ func TestValidateSecurityContext(t *testing.T) {
|
||||
return &api.SecurityContext{
|
||||
Privileged: &priv,
|
||||
Capabilities: &api.Capabilities{
|
||||
Add: []api.CapabilityType{"foo"},
|
||||
Drop: []api.CapabilityType{"bar"},
|
||||
Add: []api.Capability{"foo"},
|
||||
Drop: []api.Capability{"bar"},
|
||||
},
|
||||
SELinuxOptions: &api.SELinuxOptions{
|
||||
User: "user",
|
||||
|
Reference in New Issue
Block a user