client-go: remove extensions psp only
This commit is contained in:
parent
b7d7bd8da3
commit
e41b1bff58
4334
staging/src/k8s.io/api/extensions/v1beta1/generated.pb.go
generated
4334
staging/src/k8s.io/api/extensions/v1beta1/generated.pb.go
generated
File diff suppressed because it is too large
Load Diff
@ -30,37 +30,6 @@ import "k8s.io/apimachinery/pkg/util/intstr/generated.proto";
|
|||||||
// Package-wide variables from generator "generated".
|
// Package-wide variables from generator "generated".
|
||||||
option go_package = "k8s.io/api/extensions/v1beta1";
|
option go_package = "k8s.io/api/extensions/v1beta1";
|
||||||
|
|
||||||
// AllowedCSIDriver represents a single inline CSI Driver that is allowed to be used.
|
|
||||||
message AllowedCSIDriver {
|
|
||||||
// Name is the registered name of the CSI driver
|
|
||||||
optional string name = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
// AllowedFlexVolume represents a single Flexvolume that is allowed to be used.
|
|
||||||
// Deprecated: use AllowedFlexVolume from policy API Group instead.
|
|
||||||
message AllowedFlexVolume {
|
|
||||||
// driver is the name of the Flexvolume driver.
|
|
||||||
optional string driver = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
// AllowedHostPath defines the host volume conditions that will be enabled by a policy
|
|
||||||
// for pods to use. It requires the path prefix to be defined.
|
|
||||||
// Deprecated: use AllowedHostPath from policy API Group instead.
|
|
||||||
message AllowedHostPath {
|
|
||||||
// pathPrefix is the path prefix that the host volume must match.
|
|
||||||
// It does not support `*`.
|
|
||||||
// Trailing slashes are trimmed when validating the path prefix with a host path.
|
|
||||||
//
|
|
||||||
// Examples:
|
|
||||||
// `/foo` would allow `/foo`, `/foo/` and `/foo/bar`
|
|
||||||
// `/foo` would not allow `/food` or `/etc/foo`
|
|
||||||
optional string pathPrefix = 1;
|
|
||||||
|
|
||||||
// when set to true, will allow host volumes matching the pathPrefix only if all volume mounts are readOnly.
|
|
||||||
// +optional
|
|
||||||
optional bool readOnly = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for
|
// DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for
|
||||||
// more information.
|
// more information.
|
||||||
// DaemonSet represents the configuration of a daemon set.
|
// DaemonSet represents the configuration of a daemon set.
|
||||||
@ -398,19 +367,6 @@ message DeploymentStrategy {
|
|||||||
optional RollingUpdateDeployment rollingUpdate = 2;
|
optional RollingUpdateDeployment rollingUpdate = 2;
|
||||||
}
|
}
|
||||||
|
|
||||||
// FSGroupStrategyOptions defines the strategy type and options used to create the strategy.
|
|
||||||
// Deprecated: use FSGroupStrategyOptions from policy API Group instead.
|
|
||||||
message FSGroupStrategyOptions {
|
|
||||||
// rule is the strategy that will dictate what FSGroup is used in the SecurityContext.
|
|
||||||
// +optional
|
|
||||||
optional string rule = 1;
|
|
||||||
|
|
||||||
// ranges are the allowed ranges of fs groups. If you would like to force a single
|
|
||||||
// fs group then supply a single range with the same start and end. Required for MustRunAs.
|
|
||||||
// +optional
|
|
||||||
repeated IDRange ranges = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// HTTPIngressPath associates a path with a backend. Incoming urls matching the
|
// HTTPIngressPath associates a path with a backend. Incoming urls matching the
|
||||||
// path are forwarded to the backend.
|
// path are forwarded to the backend.
|
||||||
message HTTPIngressPath {
|
message HTTPIngressPath {
|
||||||
@ -453,27 +409,6 @@ message HTTPIngressRuleValue {
|
|||||||
repeated HTTPIngressPath paths = 1;
|
repeated HTTPIngressPath paths = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
// HostPortRange defines a range of host ports that will be enabled by a policy
|
|
||||||
// for pods to use. It requires both the start and end to be defined.
|
|
||||||
// Deprecated: use HostPortRange from policy API Group instead.
|
|
||||||
message HostPortRange {
|
|
||||||
// min is the start of the range, inclusive.
|
|
||||||
optional int32 min = 1;
|
|
||||||
|
|
||||||
// max is the end of the range, inclusive.
|
|
||||||
optional int32 max = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// IDRange provides a min/max of an allowed range of IDs.
|
|
||||||
// Deprecated: use IDRange from policy API Group instead.
|
|
||||||
message IDRange {
|
|
||||||
// min is the start of the range, inclusive.
|
|
||||||
optional int64 min = 1;
|
|
||||||
|
|
||||||
// max is the end of the range, inclusive.
|
|
||||||
optional int64 max = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// DEPRECATED 1.9 - This group version of IPBlock is deprecated by networking/v1/IPBlock.
|
// DEPRECATED 1.9 - This group version of IPBlock is deprecated by networking/v1/IPBlock.
|
||||||
// IPBlock describes a particular CIDR (Ex. "192.168.1.0/24","2001:db8::/64") that is allowed
|
// IPBlock describes a particular CIDR (Ex. "192.168.1.0/24","2001:db8::/64") that is allowed
|
||||||
// to the pods matched by a NetworkPolicySpec's podSelector. The except entry describes CIDRs
|
// to the pods matched by a NetworkPolicySpec's podSelector. The except entry describes CIDRs
|
||||||
@ -875,164 +810,6 @@ message NetworkPolicyStatus {
|
|||||||
repeated k8s.io.apimachinery.pkg.apis.meta.v1.Condition conditions = 1;
|
repeated k8s.io.apimachinery.pkg.apis.meta.v1.Condition conditions = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
// PodSecurityPolicy governs the ability to make requests that affect the Security Context
|
|
||||||
// that will be applied to a pod and container.
|
|
||||||
// Deprecated: use PodSecurityPolicy from policy API Group instead.
|
|
||||||
message PodSecurityPolicy {
|
|
||||||
// Standard object's metadata.
|
|
||||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
||||||
// +optional
|
|
||||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
|
||||||
|
|
||||||
// spec defines the policy enforced.
|
|
||||||
// +optional
|
|
||||||
optional PodSecurityPolicySpec spec = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// PodSecurityPolicyList is a list of PodSecurityPolicy objects.
|
|
||||||
// Deprecated: use PodSecurityPolicyList from policy API Group instead.
|
|
||||||
message PodSecurityPolicyList {
|
|
||||||
// Standard list metadata.
|
|
||||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
||||||
// +optional
|
|
||||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
|
||||||
|
|
||||||
// items is a list of schema objects.
|
|
||||||
repeated PodSecurityPolicy items = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// PodSecurityPolicySpec defines the policy enforced.
|
|
||||||
// Deprecated: use PodSecurityPolicySpec from policy API Group instead.
|
|
||||||
message PodSecurityPolicySpec {
|
|
||||||
// privileged determines if a pod can request to be run as privileged.
|
|
||||||
// +optional
|
|
||||||
optional bool privileged = 1;
|
|
||||||
|
|
||||||
// defaultAddCapabilities is the default set of capabilities that will be added to the container
|
|
||||||
// unless the pod spec specifically drops the capability. You may not list a capability in both
|
|
||||||
// defaultAddCapabilities and requiredDropCapabilities. Capabilities added here are implicitly
|
|
||||||
// allowed, and need not be included in the allowedCapabilities list.
|
|
||||||
// +optional
|
|
||||||
repeated string defaultAddCapabilities = 2;
|
|
||||||
|
|
||||||
// requiredDropCapabilities are the capabilities that will be dropped from the container. These
|
|
||||||
// are required to be dropped and cannot be added.
|
|
||||||
// +optional
|
|
||||||
repeated string requiredDropCapabilities = 3;
|
|
||||||
|
|
||||||
// allowedCapabilities is a list of capabilities that can be requested to add to the container.
|
|
||||||
// Capabilities in this field may be added at the pod author's discretion.
|
|
||||||
// You must not list a capability in both allowedCapabilities and requiredDropCapabilities.
|
|
||||||
// +optional
|
|
||||||
repeated string allowedCapabilities = 4;
|
|
||||||
|
|
||||||
// volumes is an allowlist of volume plugins. Empty indicates that
|
|
||||||
// no volumes may be used. To allow all volumes you may use '*'.
|
|
||||||
// +optional
|
|
||||||
repeated string volumes = 5;
|
|
||||||
|
|
||||||
// hostNetwork determines if the policy allows the use of HostNetwork in the pod spec.
|
|
||||||
// +optional
|
|
||||||
optional bool hostNetwork = 6;
|
|
||||||
|
|
||||||
// hostPorts determines which host port ranges are allowed to be exposed.
|
|
||||||
// +optional
|
|
||||||
repeated HostPortRange hostPorts = 7;
|
|
||||||
|
|
||||||
// hostPID determines if the policy allows the use of HostPID in the pod spec.
|
|
||||||
// +optional
|
|
||||||
optional bool hostPID = 8;
|
|
||||||
|
|
||||||
// hostIPC determines if the policy allows the use of HostIPC in the pod spec.
|
|
||||||
// +optional
|
|
||||||
optional bool hostIPC = 9;
|
|
||||||
|
|
||||||
// seLinux is the strategy that will dictate the allowable labels that may be set.
|
|
||||||
optional SELinuxStrategyOptions seLinux = 10;
|
|
||||||
|
|
||||||
// runAsUser is the strategy that will dictate the allowable RunAsUser values that may be set.
|
|
||||||
optional RunAsUserStrategyOptions runAsUser = 11;
|
|
||||||
|
|
||||||
// RunAsGroup is the strategy that will dictate the allowable RunAsGroup values that may be set.
|
|
||||||
// If this field is omitted, the pod's RunAsGroup can take any value. This field requires the
|
|
||||||
// RunAsGroup feature gate to be enabled.
|
|
||||||
// +optional
|
|
||||||
optional RunAsGroupStrategyOptions runAsGroup = 22;
|
|
||||||
|
|
||||||
// supplementalGroups is the strategy that will dictate what supplemental groups are used by the SecurityContext.
|
|
||||||
optional SupplementalGroupsStrategyOptions supplementalGroups = 12;
|
|
||||||
|
|
||||||
// fsGroup is the strategy that will dictate what fs group is used by the SecurityContext.
|
|
||||||
optional FSGroupStrategyOptions fsGroup = 13;
|
|
||||||
|
|
||||||
// readOnlyRootFilesystem when set to true will force containers to run with a read only root file
|
|
||||||
// system. If the container specifically requests to run with a non-read only root file system
|
|
||||||
// the PSP should deny the pod.
|
|
||||||
// If set to false the container may run with a read only root file system if it wishes but it
|
|
||||||
// will not be forced to.
|
|
||||||
// +optional
|
|
||||||
optional bool readOnlyRootFilesystem = 14;
|
|
||||||
|
|
||||||
// defaultAllowPrivilegeEscalation controls the default setting for whether a
|
|
||||||
// process can gain more privileges than its parent process.
|
|
||||||
// +optional
|
|
||||||
optional bool defaultAllowPrivilegeEscalation = 15;
|
|
||||||
|
|
||||||
// allowPrivilegeEscalation determines if a pod can request to allow
|
|
||||||
// privilege escalation. If unspecified, defaults to true.
|
|
||||||
// +optional
|
|
||||||
optional bool allowPrivilegeEscalation = 16;
|
|
||||||
|
|
||||||
// allowedHostPaths is an allowlist of host paths. Empty indicates
|
|
||||||
// that all host paths may be used.
|
|
||||||
// +optional
|
|
||||||
repeated AllowedHostPath allowedHostPaths = 17;
|
|
||||||
|
|
||||||
// allowedFlexVolumes is an allowlist of Flexvolumes. Empty or nil indicates that all
|
|
||||||
// Flexvolumes may be used. This parameter is effective only when the usage of the Flexvolumes
|
|
||||||
// is allowed in the "volumes" field.
|
|
||||||
// +optional
|
|
||||||
repeated AllowedFlexVolume allowedFlexVolumes = 18;
|
|
||||||
|
|
||||||
// AllowedCSIDrivers is an allowlist of inline CSI drivers that must be explicitly set to be embedded within a pod spec.
|
|
||||||
// An empty value indicates that any CSI driver can be used for inline ephemeral volumes.
|
|
||||||
// +optional
|
|
||||||
repeated AllowedCSIDriver allowedCSIDrivers = 23;
|
|
||||||
|
|
||||||
// allowedUnsafeSysctls is a list of explicitly allowed unsafe sysctls, defaults to none.
|
|
||||||
// Each entry is either a plain sysctl name or ends in "*" in which case it is considered
|
|
||||||
// as a prefix of allowed sysctls. Single * means all unsafe sysctls are allowed.
|
|
||||||
// Kubelet has to allowlist all unsafe sysctls explicitly to avoid rejection.
|
|
||||||
//
|
|
||||||
// Examples:
|
|
||||||
// e.g. "foo/*" allows "foo/bar", "foo/baz", etc.
|
|
||||||
// e.g. "foo.*" allows "foo.bar", "foo.baz", etc.
|
|
||||||
// +optional
|
|
||||||
repeated string allowedUnsafeSysctls = 19;
|
|
||||||
|
|
||||||
// forbiddenSysctls is a list of explicitly forbidden sysctls, defaults to none.
|
|
||||||
// Each entry is either a plain sysctl name or ends in "*" in which case it is considered
|
|
||||||
// as a prefix of forbidden sysctls. Single * means all sysctls are forbidden.
|
|
||||||
//
|
|
||||||
// Examples:
|
|
||||||
// e.g. "foo/*" forbids "foo/bar", "foo/baz", etc.
|
|
||||||
// e.g. "foo.*" forbids "foo.bar", "foo.baz", etc.
|
|
||||||
// +optional
|
|
||||||
repeated string forbiddenSysctls = 20;
|
|
||||||
|
|
||||||
// AllowedProcMountTypes is an allowlist of allowed ProcMountTypes.
|
|
||||||
// Empty or nil indicates that only the DefaultProcMountType may be used.
|
|
||||||
// This requires the ProcMountType feature flag to be enabled.
|
|
||||||
// +optional
|
|
||||||
repeated string allowedProcMountTypes = 21;
|
|
||||||
|
|
||||||
// runtimeClass is the strategy that will dictate the allowable RuntimeClasses for a pod.
|
|
||||||
// If this field is omitted, the pod's runtimeClassName field is unrestricted.
|
|
||||||
// Enforcement of this field depends on the RuntimeClass feature gate being enabled.
|
|
||||||
// +optional
|
|
||||||
optional RuntimeClassStrategyOptions runtimeClass = 24;
|
|
||||||
}
|
|
||||||
|
|
||||||
// DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for
|
// DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for
|
||||||
// more information.
|
// more information.
|
||||||
// ReplicaSet ensures that a specified number of pod replicas are running at any given time.
|
// ReplicaSet ensures that a specified number of pod replicas are running at any given time.
|
||||||
@ -1227,57 +1004,6 @@ message RollingUpdateDeployment {
|
|||||||
optional k8s.io.apimachinery.pkg.util.intstr.IntOrString maxSurge = 2;
|
optional k8s.io.apimachinery.pkg.util.intstr.IntOrString maxSurge = 2;
|
||||||
}
|
}
|
||||||
|
|
||||||
// RunAsGroupStrategyOptions defines the strategy type and any options used to create the strategy.
|
|
||||||
// Deprecated: use RunAsGroupStrategyOptions from policy API Group instead.
|
|
||||||
message RunAsGroupStrategyOptions {
|
|
||||||
// rule is the strategy that will dictate the allowable RunAsGroup values that may be set.
|
|
||||||
optional string rule = 1;
|
|
||||||
|
|
||||||
// ranges are the allowed ranges of gids that may be used. If you would like to force a single gid
|
|
||||||
// then supply a single range with the same start and end. Required for MustRunAs.
|
|
||||||
// +optional
|
|
||||||
repeated IDRange ranges = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// RunAsUserStrategyOptions defines the strategy type and any options used to create the strategy.
|
|
||||||
// Deprecated: use RunAsUserStrategyOptions from policy API Group instead.
|
|
||||||
message RunAsUserStrategyOptions {
|
|
||||||
// rule is the strategy that will dictate the allowable RunAsUser values that may be set.
|
|
||||||
optional string rule = 1;
|
|
||||||
|
|
||||||
// ranges are the allowed ranges of uids that may be used. If you would like to force a single uid
|
|
||||||
// then supply a single range with the same start and end. Required for MustRunAs.
|
|
||||||
// +optional
|
|
||||||
repeated IDRange ranges = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// RuntimeClassStrategyOptions define the strategy that will dictate the allowable RuntimeClasses
|
|
||||||
// for a pod.
|
|
||||||
message RuntimeClassStrategyOptions {
|
|
||||||
// allowedRuntimeClassNames is an allowlist of RuntimeClass names that may be specified on a pod.
|
|
||||||
// A value of "*" means that any RuntimeClass name is allowed, and must be the only item in the
|
|
||||||
// list. An empty list requires the RuntimeClassName field to be unset.
|
|
||||||
repeated string allowedRuntimeClassNames = 1;
|
|
||||||
|
|
||||||
// defaultRuntimeClassName is the default RuntimeClassName to set on the pod.
|
|
||||||
// The default MUST be allowed by the allowedRuntimeClassNames list.
|
|
||||||
// A value of nil does not mutate the Pod.
|
|
||||||
// +optional
|
|
||||||
optional string defaultRuntimeClassName = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// SELinuxStrategyOptions defines the strategy type and any options used to create the strategy.
|
|
||||||
// Deprecated: use SELinuxStrategyOptions from policy API Group instead.
|
|
||||||
message SELinuxStrategyOptions {
|
|
||||||
// rule is the strategy that will dictate the allowable labels that may be set.
|
|
||||||
optional string rule = 1;
|
|
||||||
|
|
||||||
// seLinuxOptions required to run as; required for MustRunAs
|
|
||||||
// More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
|
||||||
// +optional
|
|
||||||
optional k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
// represents a scaling request for a resource.
|
// represents a scaling request for a resource.
|
||||||
message Scale {
|
message Scale {
|
||||||
// Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
|
// Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
|
||||||
@ -1320,16 +1046,3 @@ message ScaleStatus {
|
|||||||
optional string targetSelector = 3;
|
optional string targetSelector = 3;
|
||||||
}
|
}
|
||||||
|
|
||||||
// SupplementalGroupsStrategyOptions defines the strategy type and options used to create the strategy.
|
|
||||||
// Deprecated: use SupplementalGroupsStrategyOptions from policy API Group instead.
|
|
||||||
message SupplementalGroupsStrategyOptions {
|
|
||||||
// rule is the strategy that will dictate what supplemental groups is used in the SecurityContext.
|
|
||||||
// +optional
|
|
||||||
optional string rule = 1;
|
|
||||||
|
|
||||||
// ranges are the allowed ranges of supplemental groups. If you would like to force a single
|
|
||||||
// supplemental group then supply a single range with the same start and end. Required for MustRunAs.
|
|
||||||
// +optional
|
|
||||||
repeated IDRange ranges = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
@ -54,8 +54,6 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||||||
&IngressList{},
|
&IngressList{},
|
||||||
&ReplicaSet{},
|
&ReplicaSet{},
|
||||||
&ReplicaSetList{},
|
&ReplicaSetList{},
|
||||||
&PodSecurityPolicy{},
|
|
||||||
&PodSecurityPolicyList{},
|
|
||||||
&NetworkPolicy{},
|
&NetworkPolicy{},
|
||||||
&NetworkPolicyList{},
|
&NetworkPolicyList{},
|
||||||
)
|
)
|
||||||
|
@ -1021,389 +1021,6 @@ type ReplicaSetCondition struct {
|
|||||||
Message string `json:"message,omitempty" protobuf:"bytes,5,opt,name=message"`
|
Message string `json:"message,omitempty" protobuf:"bytes,5,opt,name=message"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// +genclient
|
|
||||||
// +genclient:nonNamespaced
|
|
||||||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
|
||||||
// +k8s:prerelease-lifecycle-gen:introduced=1.2
|
|
||||||
// +k8s:prerelease-lifecycle-gen:deprecated=1.11
|
|
||||||
// +k8s:prerelease-lifecycle-gen:removed=1.16
|
|
||||||
// +k8s:prerelease-lifecycle-gen:replacement=policy,v1beta1,PodSecurityPolicy
|
|
||||||
|
|
||||||
// PodSecurityPolicy governs the ability to make requests that affect the Security Context
|
|
||||||
// that will be applied to a pod and container.
|
|
||||||
// Deprecated: use PodSecurityPolicy from policy API Group instead.
|
|
||||||
type PodSecurityPolicy struct {
|
|
||||||
metav1.TypeMeta `json:",inline"`
|
|
||||||
// Standard object's metadata.
|
|
||||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
||||||
// +optional
|
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
|
||||||
|
|
||||||
// spec defines the policy enforced.
|
|
||||||
// +optional
|
|
||||||
Spec PodSecurityPolicySpec `json:"spec,omitempty" protobuf:"bytes,2,opt,name=spec"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// PodSecurityPolicySpec defines the policy enforced.
|
|
||||||
// Deprecated: use PodSecurityPolicySpec from policy API Group instead.
|
|
||||||
type PodSecurityPolicySpec struct {
|
|
||||||
// privileged determines if a pod can request to be run as privileged.
|
|
||||||
// +optional
|
|
||||||
Privileged bool `json:"privileged,omitempty" protobuf:"varint,1,opt,name=privileged"`
|
|
||||||
// defaultAddCapabilities is the default set of capabilities that will be added to the container
|
|
||||||
// unless the pod spec specifically drops the capability. You may not list a capability in both
|
|
||||||
// defaultAddCapabilities and requiredDropCapabilities. Capabilities added here are implicitly
|
|
||||||
// allowed, and need not be included in the allowedCapabilities list.
|
|
||||||
// +optional
|
|
||||||
DefaultAddCapabilities []v1.Capability `json:"defaultAddCapabilities,omitempty" protobuf:"bytes,2,rep,name=defaultAddCapabilities,casttype=k8s.io/api/core/v1.Capability"`
|
|
||||||
// requiredDropCapabilities are the capabilities that will be dropped from the container. These
|
|
||||||
// are required to be dropped and cannot be added.
|
|
||||||
// +optional
|
|
||||||
RequiredDropCapabilities []v1.Capability `json:"requiredDropCapabilities,omitempty" protobuf:"bytes,3,rep,name=requiredDropCapabilities,casttype=k8s.io/api/core/v1.Capability"`
|
|
||||||
// allowedCapabilities is a list of capabilities that can be requested to add to the container.
|
|
||||||
// Capabilities in this field may be added at the pod author's discretion.
|
|
||||||
// You must not list a capability in both allowedCapabilities and requiredDropCapabilities.
|
|
||||||
// +optional
|
|
||||||
AllowedCapabilities []v1.Capability `json:"allowedCapabilities,omitempty" protobuf:"bytes,4,rep,name=allowedCapabilities,casttype=k8s.io/api/core/v1.Capability"`
|
|
||||||
// volumes is an allowlist of volume plugins. Empty indicates that
|
|
||||||
// no volumes may be used. To allow all volumes you may use '*'.
|
|
||||||
// +optional
|
|
||||||
Volumes []FSType `json:"volumes,omitempty" protobuf:"bytes,5,rep,name=volumes,casttype=FSType"`
|
|
||||||
// hostNetwork determines if the policy allows the use of HostNetwork in the pod spec.
|
|
||||||
// +optional
|
|
||||||
HostNetwork bool `json:"hostNetwork,omitempty" protobuf:"varint,6,opt,name=hostNetwork"`
|
|
||||||
// hostPorts determines which host port ranges are allowed to be exposed.
|
|
||||||
// +optional
|
|
||||||
HostPorts []HostPortRange `json:"hostPorts,omitempty" protobuf:"bytes,7,rep,name=hostPorts"`
|
|
||||||
// hostPID determines if the policy allows the use of HostPID in the pod spec.
|
|
||||||
// +optional
|
|
||||||
HostPID bool `json:"hostPID,omitempty" protobuf:"varint,8,opt,name=hostPID"`
|
|
||||||
// hostIPC determines if the policy allows the use of HostIPC in the pod spec.
|
|
||||||
// +optional
|
|
||||||
HostIPC bool `json:"hostIPC,omitempty" protobuf:"varint,9,opt,name=hostIPC"`
|
|
||||||
// seLinux is the strategy that will dictate the allowable labels that may be set.
|
|
||||||
SELinux SELinuxStrategyOptions `json:"seLinux" protobuf:"bytes,10,opt,name=seLinux"`
|
|
||||||
// runAsUser is the strategy that will dictate the allowable RunAsUser values that may be set.
|
|
||||||
RunAsUser RunAsUserStrategyOptions `json:"runAsUser" protobuf:"bytes,11,opt,name=runAsUser"`
|
|
||||||
// RunAsGroup is the strategy that will dictate the allowable RunAsGroup values that may be set.
|
|
||||||
// If this field is omitted, the pod's RunAsGroup can take any value. This field requires the
|
|
||||||
// RunAsGroup feature gate to be enabled.
|
|
||||||
// +optional
|
|
||||||
RunAsGroup *RunAsGroupStrategyOptions `json:"runAsGroup,omitempty" protobuf:"bytes,22,opt,name=runAsGroup"`
|
|
||||||
// supplementalGroups is the strategy that will dictate what supplemental groups are used by the SecurityContext.
|
|
||||||
SupplementalGroups SupplementalGroupsStrategyOptions `json:"supplementalGroups" protobuf:"bytes,12,opt,name=supplementalGroups"`
|
|
||||||
// fsGroup is the strategy that will dictate what fs group is used by the SecurityContext.
|
|
||||||
FSGroup FSGroupStrategyOptions `json:"fsGroup" protobuf:"bytes,13,opt,name=fsGroup"`
|
|
||||||
// readOnlyRootFilesystem when set to true will force containers to run with a read only root file
|
|
||||||
// system. If the container specifically requests to run with a non-read only root file system
|
|
||||||
// the PSP should deny the pod.
|
|
||||||
// If set to false the container may run with a read only root file system if it wishes but it
|
|
||||||
// will not be forced to.
|
|
||||||
// +optional
|
|
||||||
ReadOnlyRootFilesystem bool `json:"readOnlyRootFilesystem,omitempty" protobuf:"varint,14,opt,name=readOnlyRootFilesystem"`
|
|
||||||
// defaultAllowPrivilegeEscalation controls the default setting for whether a
|
|
||||||
// process can gain more privileges than its parent process.
|
|
||||||
// +optional
|
|
||||||
DefaultAllowPrivilegeEscalation *bool `json:"defaultAllowPrivilegeEscalation,omitempty" protobuf:"varint,15,opt,name=defaultAllowPrivilegeEscalation"`
|
|
||||||
// allowPrivilegeEscalation determines if a pod can request to allow
|
|
||||||
// privilege escalation. If unspecified, defaults to true.
|
|
||||||
// +optional
|
|
||||||
AllowPrivilegeEscalation *bool `json:"allowPrivilegeEscalation,omitempty" protobuf:"varint,16,opt,name=allowPrivilegeEscalation"`
|
|
||||||
// allowedHostPaths is an allowlist of host paths. Empty indicates
|
|
||||||
// that all host paths may be used.
|
|
||||||
// +optional
|
|
||||||
AllowedHostPaths []AllowedHostPath `json:"allowedHostPaths,omitempty" protobuf:"bytes,17,rep,name=allowedHostPaths"`
|
|
||||||
// allowedFlexVolumes is an allowlist of Flexvolumes. Empty or nil indicates that all
|
|
||||||
// Flexvolumes may be used. This parameter is effective only when the usage of the Flexvolumes
|
|
||||||
// is allowed in the "volumes" field.
|
|
||||||
// +optional
|
|
||||||
AllowedFlexVolumes []AllowedFlexVolume `json:"allowedFlexVolumes,omitempty" protobuf:"bytes,18,rep,name=allowedFlexVolumes"`
|
|
||||||
// AllowedCSIDrivers is an allowlist of inline CSI drivers that must be explicitly set to be embedded within a pod spec.
|
|
||||||
// An empty value indicates that any CSI driver can be used for inline ephemeral volumes.
|
|
||||||
// +optional
|
|
||||||
AllowedCSIDrivers []AllowedCSIDriver `json:"allowedCSIDrivers,omitempty" protobuf:"bytes,23,rep,name=allowedCSIDrivers"`
|
|
||||||
// allowedUnsafeSysctls is a list of explicitly allowed unsafe sysctls, defaults to none.
|
|
||||||
// Each entry is either a plain sysctl name or ends in "*" in which case it is considered
|
|
||||||
// as a prefix of allowed sysctls. Single * means all unsafe sysctls are allowed.
|
|
||||||
// Kubelet has to allowlist all unsafe sysctls explicitly to avoid rejection.
|
|
||||||
//
|
|
||||||
// Examples:
|
|
||||||
// e.g. "foo/*" allows "foo/bar", "foo/baz", etc.
|
|
||||||
// e.g. "foo.*" allows "foo.bar", "foo.baz", etc.
|
|
||||||
// +optional
|
|
||||||
AllowedUnsafeSysctls []string `json:"allowedUnsafeSysctls,omitempty" protobuf:"bytes,19,rep,name=allowedUnsafeSysctls"`
|
|
||||||
// forbiddenSysctls is a list of explicitly forbidden sysctls, defaults to none.
|
|
||||||
// Each entry is either a plain sysctl name or ends in "*" in which case it is considered
|
|
||||||
// as a prefix of forbidden sysctls. Single * means all sysctls are forbidden.
|
|
||||||
//
|
|
||||||
// Examples:
|
|
||||||
// e.g. "foo/*" forbids "foo/bar", "foo/baz", etc.
|
|
||||||
// e.g. "foo.*" forbids "foo.bar", "foo.baz", etc.
|
|
||||||
// +optional
|
|
||||||
ForbiddenSysctls []string `json:"forbiddenSysctls,omitempty" protobuf:"bytes,20,rep,name=forbiddenSysctls"`
|
|
||||||
// AllowedProcMountTypes is an allowlist of allowed ProcMountTypes.
|
|
||||||
// Empty or nil indicates that only the DefaultProcMountType may be used.
|
|
||||||
// This requires the ProcMountType feature flag to be enabled.
|
|
||||||
// +optional
|
|
||||||
AllowedProcMountTypes []v1.ProcMountType `json:"allowedProcMountTypes,omitempty" protobuf:"bytes,21,opt,name=allowedProcMountTypes"`
|
|
||||||
// runtimeClass is the strategy that will dictate the allowable RuntimeClasses for a pod.
|
|
||||||
// If this field is omitted, the pod's runtimeClassName field is unrestricted.
|
|
||||||
// Enforcement of this field depends on the RuntimeClass feature gate being enabled.
|
|
||||||
// +optional
|
|
||||||
RuntimeClass *RuntimeClassStrategyOptions `json:"runtimeClass,omitempty" protobuf:"bytes,24,opt,name=runtimeClass"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// AllowedHostPath defines the host volume conditions that will be enabled by a policy
|
|
||||||
// for pods to use. It requires the path prefix to be defined.
|
|
||||||
// Deprecated: use AllowedHostPath from policy API Group instead.
|
|
||||||
type AllowedHostPath struct {
|
|
||||||
// pathPrefix is the path prefix that the host volume must match.
|
|
||||||
// It does not support `*`.
|
|
||||||
// Trailing slashes are trimmed when validating the path prefix with a host path.
|
|
||||||
//
|
|
||||||
// Examples:
|
|
||||||
// `/foo` would allow `/foo`, `/foo/` and `/foo/bar`
|
|
||||||
// `/foo` would not allow `/food` or `/etc/foo`
|
|
||||||
PathPrefix string `json:"pathPrefix,omitempty" protobuf:"bytes,1,rep,name=pathPrefix"`
|
|
||||||
|
|
||||||
// when set to true, will allow host volumes matching the pathPrefix only if all volume mounts are readOnly.
|
|
||||||
// +optional
|
|
||||||
ReadOnly bool `json:"readOnly,omitempty" protobuf:"varint,2,opt,name=readOnly"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// FSType gives strong typing to different file systems that are used by volumes.
|
|
||||||
// Deprecated: use FSType from policy API Group instead.
|
|
||||||
type FSType string
|
|
||||||
|
|
||||||
const (
|
|
||||||
AzureFile FSType = "azureFile"
|
|
||||||
Flocker FSType = "flocker"
|
|
||||||
FlexVolume FSType = "flexVolume"
|
|
||||||
HostPath FSType = "hostPath"
|
|
||||||
EmptyDir FSType = "emptyDir"
|
|
||||||
GCEPersistentDisk FSType = "gcePersistentDisk"
|
|
||||||
AWSElasticBlockStore FSType = "awsElasticBlockStore"
|
|
||||||
GitRepo FSType = "gitRepo"
|
|
||||||
Secret FSType = "secret"
|
|
||||||
NFS FSType = "nfs"
|
|
||||||
ISCSI FSType = "iscsi"
|
|
||||||
Glusterfs FSType = "glusterfs"
|
|
||||||
PersistentVolumeClaim FSType = "persistentVolumeClaim"
|
|
||||||
RBD FSType = "rbd"
|
|
||||||
Cinder FSType = "cinder"
|
|
||||||
CephFS FSType = "cephFS"
|
|
||||||
DownwardAPI FSType = "downwardAPI"
|
|
||||||
FC FSType = "fc"
|
|
||||||
ConfigMap FSType = "configMap"
|
|
||||||
Quobyte FSType = "quobyte"
|
|
||||||
AzureDisk FSType = "azureDisk"
|
|
||||||
CSI FSType = "csi"
|
|
||||||
All FSType = "*"
|
|
||||||
)
|
|
||||||
|
|
||||||
// AllowedFlexVolume represents a single Flexvolume that is allowed to be used.
|
|
||||||
// Deprecated: use AllowedFlexVolume from policy API Group instead.
|
|
||||||
type AllowedFlexVolume struct {
|
|
||||||
// driver is the name of the Flexvolume driver.
|
|
||||||
Driver string `json:"driver" protobuf:"bytes,1,opt,name=driver"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// AllowedCSIDriver represents a single inline CSI Driver that is allowed to be used.
|
|
||||||
type AllowedCSIDriver struct {
|
|
||||||
// Name is the registered name of the CSI driver
|
|
||||||
Name string `json:"name" protobuf:"bytes,1,opt,name=name"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// HostPortRange defines a range of host ports that will be enabled by a policy
|
|
||||||
// for pods to use. It requires both the start and end to be defined.
|
|
||||||
// Deprecated: use HostPortRange from policy API Group instead.
|
|
||||||
type HostPortRange struct {
|
|
||||||
// min is the start of the range, inclusive.
|
|
||||||
Min int32 `json:"min" protobuf:"varint,1,opt,name=min"`
|
|
||||||
// max is the end of the range, inclusive.
|
|
||||||
Max int32 `json:"max" protobuf:"varint,2,opt,name=max"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// SELinuxStrategyOptions defines the strategy type and any options used to create the strategy.
|
|
||||||
// Deprecated: use SELinuxStrategyOptions from policy API Group instead.
|
|
||||||
type SELinuxStrategyOptions struct {
|
|
||||||
// rule is the strategy that will dictate the allowable labels that may be set.
|
|
||||||
Rule SELinuxStrategy `json:"rule" protobuf:"bytes,1,opt,name=rule,casttype=SELinuxStrategy"`
|
|
||||||
// seLinuxOptions required to run as; required for MustRunAs
|
|
||||||
// More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
|
||||||
// +optional
|
|
||||||
SELinuxOptions *v1.SELinuxOptions `json:"seLinuxOptions,omitempty" protobuf:"bytes,2,opt,name=seLinuxOptions"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// SELinuxStrategy denotes strategy types for generating SELinux options for a
|
|
||||||
// Security Context.
|
|
||||||
// Deprecated: use SELinuxStrategy from policy API Group instead.
|
|
||||||
type SELinuxStrategy string
|
|
||||||
|
|
||||||
const (
|
|
||||||
// SELinuxStrategyMustRunAs means that container must have SELinux labels of X applied.
|
|
||||||
// Deprecated: use SELinuxStrategyMustRunAs from policy API Group instead.
|
|
||||||
SELinuxStrategyMustRunAs SELinuxStrategy = "MustRunAs"
|
|
||||||
// SELinuxStrategyRunAsAny means that container may make requests for any SELinux context labels.
|
|
||||||
// Deprecated: use SELinuxStrategyRunAsAny from policy API Group instead.
|
|
||||||
SELinuxStrategyRunAsAny SELinuxStrategy = "RunAsAny"
|
|
||||||
)
|
|
||||||
|
|
||||||
// RunAsUserStrategyOptions defines the strategy type and any options used to create the strategy.
|
|
||||||
// Deprecated: use RunAsUserStrategyOptions from policy API Group instead.
|
|
||||||
type RunAsUserStrategyOptions struct {
|
|
||||||
// rule is the strategy that will dictate the allowable RunAsUser values that may be set.
|
|
||||||
Rule RunAsUserStrategy `json:"rule" protobuf:"bytes,1,opt,name=rule,casttype=RunAsUserStrategy"`
|
|
||||||
// ranges are the allowed ranges of uids that may be used. If you would like to force a single uid
|
|
||||||
// then supply a single range with the same start and end. Required for MustRunAs.
|
|
||||||
// +optional
|
|
||||||
Ranges []IDRange `json:"ranges,omitempty" protobuf:"bytes,2,rep,name=ranges"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// RunAsGroupStrategyOptions defines the strategy type and any options used to create the strategy.
|
|
||||||
// Deprecated: use RunAsGroupStrategyOptions from policy API Group instead.
|
|
||||||
type RunAsGroupStrategyOptions struct {
|
|
||||||
// rule is the strategy that will dictate the allowable RunAsGroup values that may be set.
|
|
||||||
Rule RunAsGroupStrategy `json:"rule" protobuf:"bytes,1,opt,name=rule,casttype=RunAsGroupStrategy"`
|
|
||||||
// ranges are the allowed ranges of gids that may be used. If you would like to force a single gid
|
|
||||||
// then supply a single range with the same start and end. Required for MustRunAs.
|
|
||||||
// +optional
|
|
||||||
Ranges []IDRange `json:"ranges,omitempty" protobuf:"bytes,2,rep,name=ranges"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// IDRange provides a min/max of an allowed range of IDs.
|
|
||||||
// Deprecated: use IDRange from policy API Group instead.
|
|
||||||
type IDRange struct {
|
|
||||||
// min is the start of the range, inclusive.
|
|
||||||
Min int64 `json:"min" protobuf:"varint,1,opt,name=min"`
|
|
||||||
// max is the end of the range, inclusive.
|
|
||||||
Max int64 `json:"max" protobuf:"varint,2,opt,name=max"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// RunAsUserStrategy denotes strategy types for generating RunAsUser values for a
|
|
||||||
// Security Context.
|
|
||||||
// Deprecated: use RunAsUserStrategy from policy API Group instead.
|
|
||||||
type RunAsUserStrategy string
|
|
||||||
|
|
||||||
const (
|
|
||||||
// RunAsUserStrategyMustRunAs means that container must run as a particular uid.
|
|
||||||
// Deprecated: use RunAsUserStrategyMustRunAs from policy API Group instead.
|
|
||||||
RunAsUserStrategyMustRunAs RunAsUserStrategy = "MustRunAs"
|
|
||||||
// RunAsUserStrategyMustRunAsNonRoot means that container must run as a non-root uid.
|
|
||||||
// Deprecated: use RunAsUserStrategyMustRunAsNonRoot from policy API Group instead.
|
|
||||||
RunAsUserStrategyMustRunAsNonRoot RunAsUserStrategy = "MustRunAsNonRoot"
|
|
||||||
// RunAsUserStrategyRunAsAny means that container may make requests for any uid.
|
|
||||||
// Deprecated: use RunAsUserStrategyRunAsAny from policy API Group instead.
|
|
||||||
RunAsUserStrategyRunAsAny RunAsUserStrategy = "RunAsAny"
|
|
||||||
)
|
|
||||||
|
|
||||||
// RunAsGroupStrategy denotes strategy types for generating RunAsGroup values for a
|
|
||||||
// Security Context.
|
|
||||||
// Deprecated: use RunAsGroupStrategy from policy API Group instead.
|
|
||||||
type RunAsGroupStrategy string
|
|
||||||
|
|
||||||
const (
|
|
||||||
// RunAsGroupStrategyMayRunAs means that container does not need to run with a particular gid.
|
|
||||||
// However, when RunAsGroup are specified, they have to fall in the defined range.
|
|
||||||
RunAsGroupStrategyMayRunAs RunAsGroupStrategy = "MayRunAs"
|
|
||||||
// RunAsGroupStrategyMustRunAs means that container must run as a particular gid.
|
|
||||||
// Deprecated: use RunAsGroupStrategyMustRunAs from policy API Group instead.
|
|
||||||
RunAsGroupStrategyMustRunAs RunAsGroupStrategy = "MustRunAs"
|
|
||||||
// RunAsGroupStrategyRunAsAny means that container may make requests for any gid.
|
|
||||||
// Deprecated: use RunAsGroupStrategyRunAsAny from policy API Group instead.
|
|
||||||
RunAsGroupStrategyRunAsAny RunAsGroupStrategy = "RunAsAny"
|
|
||||||
)
|
|
||||||
|
|
||||||
// FSGroupStrategyOptions defines the strategy type and options used to create the strategy.
|
|
||||||
// Deprecated: use FSGroupStrategyOptions from policy API Group instead.
|
|
||||||
type FSGroupStrategyOptions struct {
|
|
||||||
// rule is the strategy that will dictate what FSGroup is used in the SecurityContext.
|
|
||||||
// +optional
|
|
||||||
Rule FSGroupStrategyType `json:"rule,omitempty" protobuf:"bytes,1,opt,name=rule,casttype=FSGroupStrategyType"`
|
|
||||||
// ranges are the allowed ranges of fs groups. If you would like to force a single
|
|
||||||
// fs group then supply a single range with the same start and end. Required for MustRunAs.
|
|
||||||
// +optional
|
|
||||||
Ranges []IDRange `json:"ranges,omitempty" protobuf:"bytes,2,rep,name=ranges"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// FSGroupStrategyType denotes strategy types for generating FSGroup values for a
|
|
||||||
// SecurityContext
|
|
||||||
// Deprecated: use FSGroupStrategyType from policy API Group instead.
|
|
||||||
type FSGroupStrategyType string
|
|
||||||
|
|
||||||
const (
|
|
||||||
// FSGroupStrategyMustRunAs meant that container must have FSGroup of X applied.
|
|
||||||
// Deprecated: use FSGroupStrategyMustRunAs from policy API Group instead.
|
|
||||||
FSGroupStrategyMustRunAs FSGroupStrategyType = "MustRunAs"
|
|
||||||
// FSGroupStrategyRunAsAny means that container may make requests for any FSGroup labels.
|
|
||||||
// Deprecated: use FSGroupStrategyRunAsAny from policy API Group instead.
|
|
||||||
FSGroupStrategyRunAsAny FSGroupStrategyType = "RunAsAny"
|
|
||||||
)
|
|
||||||
|
|
||||||
// SupplementalGroupsStrategyOptions defines the strategy type and options used to create the strategy.
|
|
||||||
// Deprecated: use SupplementalGroupsStrategyOptions from policy API Group instead.
|
|
||||||
type SupplementalGroupsStrategyOptions struct {
|
|
||||||
// rule is the strategy that will dictate what supplemental groups is used in the SecurityContext.
|
|
||||||
// +optional
|
|
||||||
Rule SupplementalGroupsStrategyType `json:"rule,omitempty" protobuf:"bytes,1,opt,name=rule,casttype=SupplementalGroupsStrategyType"`
|
|
||||||
// ranges are the allowed ranges of supplemental groups. If you would like to force a single
|
|
||||||
// supplemental group then supply a single range with the same start and end. Required for MustRunAs.
|
|
||||||
// +optional
|
|
||||||
Ranges []IDRange `json:"ranges,omitempty" protobuf:"bytes,2,rep,name=ranges"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// SupplementalGroupsStrategyType denotes strategy types for determining valid supplemental
|
|
||||||
// groups for a SecurityContext.
|
|
||||||
// Deprecated: use SupplementalGroupsStrategyType from policy API Group instead.
|
|
||||||
type SupplementalGroupsStrategyType string
|
|
||||||
|
|
||||||
const (
|
|
||||||
// SupplementalGroupsStrategyMustRunAs means that container must run as a particular gid.
|
|
||||||
// Deprecated: use SupplementalGroupsStrategyMustRunAs from policy API Group instead.
|
|
||||||
SupplementalGroupsStrategyMustRunAs SupplementalGroupsStrategyType = "MustRunAs"
|
|
||||||
// SupplementalGroupsStrategyRunAsAny means that container may make requests for any gid.
|
|
||||||
// Deprecated: use SupplementalGroupsStrategyRunAsAny from policy API Group instead.
|
|
||||||
SupplementalGroupsStrategyRunAsAny SupplementalGroupsStrategyType = "RunAsAny"
|
|
||||||
)
|
|
||||||
|
|
||||||
// RuntimeClassStrategyOptions define the strategy that will dictate the allowable RuntimeClasses
|
|
||||||
// for a pod.
|
|
||||||
type RuntimeClassStrategyOptions struct {
|
|
||||||
// allowedRuntimeClassNames is an allowlist of RuntimeClass names that may be specified on a pod.
|
|
||||||
// A value of "*" means that any RuntimeClass name is allowed, and must be the only item in the
|
|
||||||
// list. An empty list requires the RuntimeClassName field to be unset.
|
|
||||||
AllowedRuntimeClassNames []string `json:"allowedRuntimeClassNames" protobuf:"bytes,1,rep,name=allowedRuntimeClassNames"`
|
|
||||||
// defaultRuntimeClassName is the default RuntimeClassName to set on the pod.
|
|
||||||
// The default MUST be allowed by the allowedRuntimeClassNames list.
|
|
||||||
// A value of nil does not mutate the Pod.
|
|
||||||
// +optional
|
|
||||||
DefaultRuntimeClassName *string `json:"defaultRuntimeClassName,omitempty" protobuf:"bytes,2,opt,name=defaultRuntimeClassName"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// AllowAllRuntimeClassNames can be used as a value for the
|
|
||||||
// RuntimeClassStrategyOptions.AllowedRuntimeClassNames field and means that any RuntimeClassName is
|
|
||||||
// allowed.
|
|
||||||
const AllowAllRuntimeClassNames = "*"
|
|
||||||
|
|
||||||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
|
||||||
// +k8s:prerelease-lifecycle-gen:introduced=1.2
|
|
||||||
// +k8s:prerelease-lifecycle-gen:deprecated=1.11
|
|
||||||
// +k8s:prerelease-lifecycle-gen:removed=1.16
|
|
||||||
// +k8s:prerelease-lifecycle-gen:replacement=policy,v1beta1,PodSecurityPolicyList
|
|
||||||
|
|
||||||
// PodSecurityPolicyList is a list of PodSecurityPolicy objects.
|
|
||||||
// Deprecated: use PodSecurityPolicyList from policy API Group instead.
|
|
||||||
type PodSecurityPolicyList struct {
|
|
||||||
metav1.TypeMeta `json:",inline"`
|
|
||||||
// Standard list metadata.
|
|
||||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
||||||
// +optional
|
|
||||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
|
||||||
|
|
||||||
// items is a list of schema objects.
|
|
||||||
Items []PodSecurityPolicy `json:"items" protobuf:"bytes,2,rep,name=items"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// +genclient
|
// +genclient
|
||||||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
// +k8s:prerelease-lifecycle-gen:introduced=1.3
|
// +k8s:prerelease-lifecycle-gen:introduced=1.3
|
||||||
|
@ -28,54 +28,6 @@ import (
|
|||||||
intstr "k8s.io/apimachinery/pkg/util/intstr"
|
intstr "k8s.io/apimachinery/pkg/util/intstr"
|
||||||
)
|
)
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *AllowedCSIDriver) DeepCopyInto(out *AllowedCSIDriver) {
|
|
||||||
*out = *in
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedCSIDriver.
|
|
||||||
func (in *AllowedCSIDriver) DeepCopy() *AllowedCSIDriver {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(AllowedCSIDriver)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *AllowedFlexVolume) DeepCopyInto(out *AllowedFlexVolume) {
|
|
||||||
*out = *in
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedFlexVolume.
|
|
||||||
func (in *AllowedFlexVolume) DeepCopy() *AllowedFlexVolume {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(AllowedFlexVolume)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *AllowedHostPath) DeepCopyInto(out *AllowedHostPath) {
|
|
||||||
*out = *in
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedHostPath.
|
|
||||||
func (in *AllowedHostPath) DeepCopy() *AllowedHostPath {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(AllowedHostPath)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *DaemonSet) DeepCopyInto(out *DaemonSet) {
|
func (in *DaemonSet) DeepCopyInto(out *DaemonSet) {
|
||||||
*out = *in
|
*out = *in
|
||||||
@ -435,27 +387,6 @@ func (in *DeploymentStrategy) DeepCopy() *DeploymentStrategy {
|
|||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *FSGroupStrategyOptions) DeepCopyInto(out *FSGroupStrategyOptions) {
|
|
||||||
*out = *in
|
|
||||||
if in.Ranges != nil {
|
|
||||||
in, out := &in.Ranges, &out.Ranges
|
|
||||||
*out = make([]IDRange, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new FSGroupStrategyOptions.
|
|
||||||
func (in *FSGroupStrategyOptions) DeepCopy() *FSGroupStrategyOptions {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(FSGroupStrategyOptions)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *HTTPIngressPath) DeepCopyInto(out *HTTPIngressPath) {
|
func (in *HTTPIngressPath) DeepCopyInto(out *HTTPIngressPath) {
|
||||||
*out = *in
|
*out = *in
|
||||||
@ -501,38 +432,6 @@ func (in *HTTPIngressRuleValue) DeepCopy() *HTTPIngressRuleValue {
|
|||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *HostPortRange) DeepCopyInto(out *HostPortRange) {
|
|
||||||
*out = *in
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new HostPortRange.
|
|
||||||
func (in *HostPortRange) DeepCopy() *HostPortRange {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(HostPortRange)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *IDRange) DeepCopyInto(out *IDRange) {
|
|
||||||
*out = *in
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IDRange.
|
|
||||||
func (in *IDRange) DeepCopy() *IDRange {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(IDRange)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *IPBlock) DeepCopyInto(out *IPBlock) {
|
func (in *IPBlock) DeepCopyInto(out *IPBlock) {
|
||||||
*out = *in
|
*out = *in
|
||||||
@ -1062,161 +961,6 @@ func (in *NetworkPolicyStatus) DeepCopy() *NetworkPolicyStatus {
|
|||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *PodSecurityPolicy) DeepCopyInto(out *PodSecurityPolicy) {
|
|
||||||
*out = *in
|
|
||||||
out.TypeMeta = in.TypeMeta
|
|
||||||
in.ObjectMeta.DeepCopyInto(&out.ObjectMeta)
|
|
||||||
in.Spec.DeepCopyInto(&out.Spec)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PodSecurityPolicy.
|
|
||||||
func (in *PodSecurityPolicy) DeepCopy() *PodSecurityPolicy {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(PodSecurityPolicy)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
|
||||||
func (in *PodSecurityPolicy) DeepCopyObject() runtime.Object {
|
|
||||||
if c := in.DeepCopy(); c != nil {
|
|
||||||
return c
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *PodSecurityPolicyList) DeepCopyInto(out *PodSecurityPolicyList) {
|
|
||||||
*out = *in
|
|
||||||
out.TypeMeta = in.TypeMeta
|
|
||||||
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
|
||||||
if in.Items != nil {
|
|
||||||
in, out := &in.Items, &out.Items
|
|
||||||
*out = make([]PodSecurityPolicy, len(*in))
|
|
||||||
for i := range *in {
|
|
||||||
(*in)[i].DeepCopyInto(&(*out)[i])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PodSecurityPolicyList.
|
|
||||||
func (in *PodSecurityPolicyList) DeepCopy() *PodSecurityPolicyList {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(PodSecurityPolicyList)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
|
||||||
func (in *PodSecurityPolicyList) DeepCopyObject() runtime.Object {
|
|
||||||
if c := in.DeepCopy(); c != nil {
|
|
||||||
return c
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *PodSecurityPolicySpec) DeepCopyInto(out *PodSecurityPolicySpec) {
|
|
||||||
*out = *in
|
|
||||||
if in.DefaultAddCapabilities != nil {
|
|
||||||
in, out := &in.DefaultAddCapabilities, &out.DefaultAddCapabilities
|
|
||||||
*out = make([]corev1.Capability, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.RequiredDropCapabilities != nil {
|
|
||||||
in, out := &in.RequiredDropCapabilities, &out.RequiredDropCapabilities
|
|
||||||
*out = make([]corev1.Capability, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.AllowedCapabilities != nil {
|
|
||||||
in, out := &in.AllowedCapabilities, &out.AllowedCapabilities
|
|
||||||
*out = make([]corev1.Capability, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.Volumes != nil {
|
|
||||||
in, out := &in.Volumes, &out.Volumes
|
|
||||||
*out = make([]FSType, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.HostPorts != nil {
|
|
||||||
in, out := &in.HostPorts, &out.HostPorts
|
|
||||||
*out = make([]HostPortRange, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
in.SELinux.DeepCopyInto(&out.SELinux)
|
|
||||||
in.RunAsUser.DeepCopyInto(&out.RunAsUser)
|
|
||||||
if in.RunAsGroup != nil {
|
|
||||||
in, out := &in.RunAsGroup, &out.RunAsGroup
|
|
||||||
*out = new(RunAsGroupStrategyOptions)
|
|
||||||
(*in).DeepCopyInto(*out)
|
|
||||||
}
|
|
||||||
in.SupplementalGroups.DeepCopyInto(&out.SupplementalGroups)
|
|
||||||
in.FSGroup.DeepCopyInto(&out.FSGroup)
|
|
||||||
if in.DefaultAllowPrivilegeEscalation != nil {
|
|
||||||
in, out := &in.DefaultAllowPrivilegeEscalation, &out.DefaultAllowPrivilegeEscalation
|
|
||||||
*out = new(bool)
|
|
||||||
**out = **in
|
|
||||||
}
|
|
||||||
if in.AllowPrivilegeEscalation != nil {
|
|
||||||
in, out := &in.AllowPrivilegeEscalation, &out.AllowPrivilegeEscalation
|
|
||||||
*out = new(bool)
|
|
||||||
**out = **in
|
|
||||||
}
|
|
||||||
if in.AllowedHostPaths != nil {
|
|
||||||
in, out := &in.AllowedHostPaths, &out.AllowedHostPaths
|
|
||||||
*out = make([]AllowedHostPath, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.AllowedFlexVolumes != nil {
|
|
||||||
in, out := &in.AllowedFlexVolumes, &out.AllowedFlexVolumes
|
|
||||||
*out = make([]AllowedFlexVolume, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.AllowedCSIDrivers != nil {
|
|
||||||
in, out := &in.AllowedCSIDrivers, &out.AllowedCSIDrivers
|
|
||||||
*out = make([]AllowedCSIDriver, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.AllowedUnsafeSysctls != nil {
|
|
||||||
in, out := &in.AllowedUnsafeSysctls, &out.AllowedUnsafeSysctls
|
|
||||||
*out = make([]string, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.ForbiddenSysctls != nil {
|
|
||||||
in, out := &in.ForbiddenSysctls, &out.ForbiddenSysctls
|
|
||||||
*out = make([]string, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.AllowedProcMountTypes != nil {
|
|
||||||
in, out := &in.AllowedProcMountTypes, &out.AllowedProcMountTypes
|
|
||||||
*out = make([]corev1.ProcMountType, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.RuntimeClass != nil {
|
|
||||||
in, out := &in.RuntimeClass, &out.RuntimeClass
|
|
||||||
*out = new(RuntimeClassStrategyOptions)
|
|
||||||
(*in).DeepCopyInto(*out)
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PodSecurityPolicySpec.
|
|
||||||
func (in *PodSecurityPolicySpec) DeepCopy() *PodSecurityPolicySpec {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(PodSecurityPolicySpec)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *ReplicaSet) DeepCopyInto(out *ReplicaSet) {
|
func (in *ReplicaSet) DeepCopyInto(out *ReplicaSet) {
|
||||||
*out = *in
|
*out = *in
|
||||||
@ -1413,95 +1157,6 @@ func (in *RollingUpdateDeployment) DeepCopy() *RollingUpdateDeployment {
|
|||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *RunAsGroupStrategyOptions) DeepCopyInto(out *RunAsGroupStrategyOptions) {
|
|
||||||
*out = *in
|
|
||||||
if in.Ranges != nil {
|
|
||||||
in, out := &in.Ranges, &out.Ranges
|
|
||||||
*out = make([]IDRange, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RunAsGroupStrategyOptions.
|
|
||||||
func (in *RunAsGroupStrategyOptions) DeepCopy() *RunAsGroupStrategyOptions {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(RunAsGroupStrategyOptions)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *RunAsUserStrategyOptions) DeepCopyInto(out *RunAsUserStrategyOptions) {
|
|
||||||
*out = *in
|
|
||||||
if in.Ranges != nil {
|
|
||||||
in, out := &in.Ranges, &out.Ranges
|
|
||||||
*out = make([]IDRange, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RunAsUserStrategyOptions.
|
|
||||||
func (in *RunAsUserStrategyOptions) DeepCopy() *RunAsUserStrategyOptions {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(RunAsUserStrategyOptions)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *RuntimeClassStrategyOptions) DeepCopyInto(out *RuntimeClassStrategyOptions) {
|
|
||||||
*out = *in
|
|
||||||
if in.AllowedRuntimeClassNames != nil {
|
|
||||||
in, out := &in.AllowedRuntimeClassNames, &out.AllowedRuntimeClassNames
|
|
||||||
*out = make([]string, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
if in.DefaultRuntimeClassName != nil {
|
|
||||||
in, out := &in.DefaultRuntimeClassName, &out.DefaultRuntimeClassName
|
|
||||||
*out = new(string)
|
|
||||||
**out = **in
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RuntimeClassStrategyOptions.
|
|
||||||
func (in *RuntimeClassStrategyOptions) DeepCopy() *RuntimeClassStrategyOptions {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(RuntimeClassStrategyOptions)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *SELinuxStrategyOptions) DeepCopyInto(out *SELinuxStrategyOptions) {
|
|
||||||
*out = *in
|
|
||||||
if in.SELinuxOptions != nil {
|
|
||||||
in, out := &in.SELinuxOptions, &out.SELinuxOptions
|
|
||||||
*out = new(corev1.SELinuxOptions)
|
|
||||||
**out = **in
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SELinuxStrategyOptions.
|
|
||||||
func (in *SELinuxStrategyOptions) DeepCopy() *SELinuxStrategyOptions {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(SELinuxStrategyOptions)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *Scale) DeepCopyInto(out *Scale) {
|
func (in *Scale) DeepCopyInto(out *Scale) {
|
||||||
*out = *in
|
*out = *in
|
||||||
@ -1568,24 +1223,3 @@ func (in *ScaleStatus) DeepCopy() *ScaleStatus {
|
|||||||
in.DeepCopyInto(out)
|
in.DeepCopyInto(out)
|
||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *SupplementalGroupsStrategyOptions) DeepCopyInto(out *SupplementalGroupsStrategyOptions) {
|
|
||||||
*out = *in
|
|
||||||
if in.Ranges != nil {
|
|
||||||
in, out := &in.Ranges, &out.Ranges
|
|
||||||
*out = make([]IDRange, len(*in))
|
|
||||||
copy(*out, *in)
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SupplementalGroupsStrategyOptions.
|
|
||||||
func (in *SupplementalGroupsStrategyOptions) DeepCopy() *SupplementalGroupsStrategyOptions {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(SupplementalGroupsStrategyOptions)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
@ -235,54 +235,6 @@ func (in *NetworkPolicyList) APILifecycleRemoved() (major, minor int) {
|
|||||||
return 1, 16
|
return 1, 16
|
||||||
}
|
}
|
||||||
|
|
||||||
// APILifecycleIntroduced is an autogenerated function, returning the release in which the API struct was introduced as int versions of major and minor for comparison.
|
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go.
|
|
||||||
func (in *PodSecurityPolicy) APILifecycleIntroduced() (major, minor int) {
|
|
||||||
return 1, 2
|
|
||||||
}
|
|
||||||
|
|
||||||
// APILifecycleDeprecated is an autogenerated function, returning the release in which the API struct was or will be deprecated as int versions of major and minor for comparison.
|
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:deprecated" tags in types.go or "k8s:prerelease-lifecycle-gen:introduced" plus three minor.
|
|
||||||
func (in *PodSecurityPolicy) APILifecycleDeprecated() (major, minor int) {
|
|
||||||
return 1, 11
|
|
||||||
}
|
|
||||||
|
|
||||||
// APILifecycleReplacement is an autogenerated function, returning the group, version, and kind that should be used instead of this deprecated type.
|
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:replacement=<group>,<version>,<kind>" tags in types.go.
|
|
||||||
func (in *PodSecurityPolicy) APILifecycleReplacement() schema.GroupVersionKind {
|
|
||||||
return schema.GroupVersionKind{Group: "policy", Version: "v1beta1", Kind: "PodSecurityPolicy"}
|
|
||||||
}
|
|
||||||
|
|
||||||
// APILifecycleRemoved is an autogenerated function, returning the release in which the API is no longer served as int versions of major and minor for comparison.
|
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:removed" tags in types.go or "k8s:prerelease-lifecycle-gen:deprecated" plus three minor.
|
|
||||||
func (in *PodSecurityPolicy) APILifecycleRemoved() (major, minor int) {
|
|
||||||
return 1, 16
|
|
||||||
}
|
|
||||||
|
|
||||||
// APILifecycleIntroduced is an autogenerated function, returning the release in which the API struct was introduced as int versions of major and minor for comparison.
|
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go.
|
|
||||||
func (in *PodSecurityPolicyList) APILifecycleIntroduced() (major, minor int) {
|
|
||||||
return 1, 2
|
|
||||||
}
|
|
||||||
|
|
||||||
// APILifecycleDeprecated is an autogenerated function, returning the release in which the API struct was or will be deprecated as int versions of major and minor for comparison.
|
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:deprecated" tags in types.go or "k8s:prerelease-lifecycle-gen:introduced" plus three minor.
|
|
||||||
func (in *PodSecurityPolicyList) APILifecycleDeprecated() (major, minor int) {
|
|
||||||
return 1, 11
|
|
||||||
}
|
|
||||||
|
|
||||||
// APILifecycleReplacement is an autogenerated function, returning the group, version, and kind that should be used instead of this deprecated type.
|
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:replacement=<group>,<version>,<kind>" tags in types.go.
|
|
||||||
func (in *PodSecurityPolicyList) APILifecycleReplacement() schema.GroupVersionKind {
|
|
||||||
return schema.GroupVersionKind{Group: "policy", Version: "v1beta1", Kind: "PodSecurityPolicyList"}
|
|
||||||
}
|
|
||||||
|
|
||||||
// APILifecycleRemoved is an autogenerated function, returning the release in which the API is no longer served as int versions of major and minor for comparison.
|
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:removed" tags in types.go or "k8s:prerelease-lifecycle-gen:deprecated" plus three minor.
|
|
||||||
func (in *PodSecurityPolicyList) APILifecycleRemoved() (major, minor int) {
|
|
||||||
return 1, 16
|
|
||||||
}
|
|
||||||
|
|
||||||
// APILifecycleIntroduced is an autogenerated function, returning the release in which the API struct was introduced as int versions of major and minor for comparison.
|
// APILifecycleIntroduced is an autogenerated function, returning the release in which the API struct was introduced as int versions of major and minor for comparison.
|
||||||
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go.
|
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go.
|
||||||
func (in *ReplicaSet) APILifecycleIntroduced() (major, minor int) {
|
func (in *ReplicaSet) APILifecycleIntroduced() (major, minor int) {
|
||||||
|
@ -1,149 +0,0 @@
|
|||||||
{
|
|
||||||
"kind": "PodSecurityPolicy",
|
|
||||||
"apiVersion": "extensions/v1beta1",
|
|
||||||
"metadata": {
|
|
||||||
"name": "nameValue",
|
|
||||||
"generateName": "generateNameValue",
|
|
||||||
"namespace": "namespaceValue",
|
|
||||||
"selfLink": "selfLinkValue",
|
|
||||||
"uid": "uidValue",
|
|
||||||
"resourceVersion": "resourceVersionValue",
|
|
||||||
"generation": 7,
|
|
||||||
"creationTimestamp": "2008-01-01T01:01:01Z",
|
|
||||||
"deletionTimestamp": "2009-01-01T01:01:01Z",
|
|
||||||
"deletionGracePeriodSeconds": 10,
|
|
||||||
"labels": {
|
|
||||||
"labelsKey": "labelsValue"
|
|
||||||
},
|
|
||||||
"annotations": {
|
|
||||||
"annotationsKey": "annotationsValue"
|
|
||||||
},
|
|
||||||
"ownerReferences": [
|
|
||||||
{
|
|
||||||
"apiVersion": "apiVersionValue",
|
|
||||||
"kind": "kindValue",
|
|
||||||
"name": "nameValue",
|
|
||||||
"uid": "uidValue",
|
|
||||||
"controller": true,
|
|
||||||
"blockOwnerDeletion": true
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"finalizers": [
|
|
||||||
"finalizersValue"
|
|
||||||
],
|
|
||||||
"managedFields": [
|
|
||||||
{
|
|
||||||
"manager": "managerValue",
|
|
||||||
"operation": "operationValue",
|
|
||||||
"apiVersion": "apiVersionValue",
|
|
||||||
"time": "2004-01-01T01:01:01Z",
|
|
||||||
"fieldsType": "fieldsTypeValue",
|
|
||||||
"fieldsV1": {},
|
|
||||||
"subresource": "subresourceValue"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"spec": {
|
|
||||||
"privileged": true,
|
|
||||||
"defaultAddCapabilities": [
|
|
||||||
"defaultAddCapabilitiesValue"
|
|
||||||
],
|
|
||||||
"requiredDropCapabilities": [
|
|
||||||
"requiredDropCapabilitiesValue"
|
|
||||||
],
|
|
||||||
"allowedCapabilities": [
|
|
||||||
"allowedCapabilitiesValue"
|
|
||||||
],
|
|
||||||
"volumes": [
|
|
||||||
"volumesValue"
|
|
||||||
],
|
|
||||||
"hostNetwork": true,
|
|
||||||
"hostPorts": [
|
|
||||||
{
|
|
||||||
"min": 1,
|
|
||||||
"max": 2
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"hostPID": true,
|
|
||||||
"hostIPC": true,
|
|
||||||
"seLinux": {
|
|
||||||
"rule": "ruleValue",
|
|
||||||
"seLinuxOptions": {
|
|
||||||
"user": "userValue",
|
|
||||||
"role": "roleValue",
|
|
||||||
"type": "typeValue",
|
|
||||||
"level": "levelValue"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"runAsUser": {
|
|
||||||
"rule": "ruleValue",
|
|
||||||
"ranges": [
|
|
||||||
{
|
|
||||||
"min": 1,
|
|
||||||
"max": 2
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"runAsGroup": {
|
|
||||||
"rule": "ruleValue",
|
|
||||||
"ranges": [
|
|
||||||
{
|
|
||||||
"min": 1,
|
|
||||||
"max": 2
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"supplementalGroups": {
|
|
||||||
"rule": "ruleValue",
|
|
||||||
"ranges": [
|
|
||||||
{
|
|
||||||
"min": 1,
|
|
||||||
"max": 2
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"fsGroup": {
|
|
||||||
"rule": "ruleValue",
|
|
||||||
"ranges": [
|
|
||||||
{
|
|
||||||
"min": 1,
|
|
||||||
"max": 2
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"readOnlyRootFilesystem": true,
|
|
||||||
"defaultAllowPrivilegeEscalation": true,
|
|
||||||
"allowPrivilegeEscalation": true,
|
|
||||||
"allowedHostPaths": [
|
|
||||||
{
|
|
||||||
"pathPrefix": "pathPrefixValue",
|
|
||||||
"readOnly": true
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"allowedFlexVolumes": [
|
|
||||||
{
|
|
||||||
"driver": "driverValue"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"allowedCSIDrivers": [
|
|
||||||
{
|
|
||||||
"name": "nameValue"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"allowedUnsafeSysctls": [
|
|
||||||
"allowedUnsafeSysctlsValue"
|
|
||||||
],
|
|
||||||
"forbiddenSysctls": [
|
|
||||||
"forbiddenSysctlsValue"
|
|
||||||
],
|
|
||||||
"allowedProcMountTypes": [
|
|
||||||
"allowedProcMountTypesValue"
|
|
||||||
],
|
|
||||||
"runtimeClass": {
|
|
||||||
"allowedRuntimeClassNames": [
|
|
||||||
"allowedRuntimeClassNamesValue"
|
|
||||||
],
|
|
||||||
"defaultRuntimeClassName": "defaultRuntimeClassNameValue"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
Binary file not shown.
@ -1,97 +0,0 @@
|
|||||||
apiVersion: extensions/v1beta1
|
|
||||||
kind: PodSecurityPolicy
|
|
||||||
metadata:
|
|
||||||
annotations:
|
|
||||||
annotationsKey: annotationsValue
|
|
||||||
creationTimestamp: "2008-01-01T01:01:01Z"
|
|
||||||
deletionGracePeriodSeconds: 10
|
|
||||||
deletionTimestamp: "2009-01-01T01:01:01Z"
|
|
||||||
finalizers:
|
|
||||||
- finalizersValue
|
|
||||||
generateName: generateNameValue
|
|
||||||
generation: 7
|
|
||||||
labels:
|
|
||||||
labelsKey: labelsValue
|
|
||||||
managedFields:
|
|
||||||
- apiVersion: apiVersionValue
|
|
||||||
fieldsType: fieldsTypeValue
|
|
||||||
fieldsV1: {}
|
|
||||||
manager: managerValue
|
|
||||||
operation: operationValue
|
|
||||||
subresource: subresourceValue
|
|
||||||
time: "2004-01-01T01:01:01Z"
|
|
||||||
name: nameValue
|
|
||||||
namespace: namespaceValue
|
|
||||||
ownerReferences:
|
|
||||||
- apiVersion: apiVersionValue
|
|
||||||
blockOwnerDeletion: true
|
|
||||||
controller: true
|
|
||||||
kind: kindValue
|
|
||||||
name: nameValue
|
|
||||||
uid: uidValue
|
|
||||||
resourceVersion: resourceVersionValue
|
|
||||||
selfLink: selfLinkValue
|
|
||||||
uid: uidValue
|
|
||||||
spec:
|
|
||||||
allowPrivilegeEscalation: true
|
|
||||||
allowedCSIDrivers:
|
|
||||||
- name: nameValue
|
|
||||||
allowedCapabilities:
|
|
||||||
- allowedCapabilitiesValue
|
|
||||||
allowedFlexVolumes:
|
|
||||||
- driver: driverValue
|
|
||||||
allowedHostPaths:
|
|
||||||
- pathPrefix: pathPrefixValue
|
|
||||||
readOnly: true
|
|
||||||
allowedProcMountTypes:
|
|
||||||
- allowedProcMountTypesValue
|
|
||||||
allowedUnsafeSysctls:
|
|
||||||
- allowedUnsafeSysctlsValue
|
|
||||||
defaultAddCapabilities:
|
|
||||||
- defaultAddCapabilitiesValue
|
|
||||||
defaultAllowPrivilegeEscalation: true
|
|
||||||
forbiddenSysctls:
|
|
||||||
- forbiddenSysctlsValue
|
|
||||||
fsGroup:
|
|
||||||
ranges:
|
|
||||||
- max: 2
|
|
||||||
min: 1
|
|
||||||
rule: ruleValue
|
|
||||||
hostIPC: true
|
|
||||||
hostNetwork: true
|
|
||||||
hostPID: true
|
|
||||||
hostPorts:
|
|
||||||
- max: 2
|
|
||||||
min: 1
|
|
||||||
privileged: true
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
requiredDropCapabilities:
|
|
||||||
- requiredDropCapabilitiesValue
|
|
||||||
runAsGroup:
|
|
||||||
ranges:
|
|
||||||
- max: 2
|
|
||||||
min: 1
|
|
||||||
rule: ruleValue
|
|
||||||
runAsUser:
|
|
||||||
ranges:
|
|
||||||
- max: 2
|
|
||||||
min: 1
|
|
||||||
rule: ruleValue
|
|
||||||
runtimeClass:
|
|
||||||
allowedRuntimeClassNames:
|
|
||||||
- allowedRuntimeClassNamesValue
|
|
||||||
defaultRuntimeClassName: defaultRuntimeClassNameValue
|
|
||||||
seLinux:
|
|
||||||
rule: ruleValue
|
|
||||||
seLinuxOptions:
|
|
||||||
level: levelValue
|
|
||||||
role: roleValue
|
|
||||||
type: typeValue
|
|
||||||
user: userValue
|
|
||||||
supplementalGroups:
|
|
||||||
ranges:
|
|
||||||
- max: 2
|
|
||||||
min: 1
|
|
||||||
rule: ruleValue
|
|
||||||
volumes:
|
|
||||||
- volumesValue
|
|
@ -1,39 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
// AllowedCSIDriverApplyConfiguration represents an declarative configuration of the AllowedCSIDriver type for use
|
|
||||||
// with apply.
|
|
||||||
type AllowedCSIDriverApplyConfiguration struct {
|
|
||||||
Name *string `json:"name,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// AllowedCSIDriverApplyConfiguration constructs an declarative configuration of the AllowedCSIDriver type for use with
|
|
||||||
// apply.
|
|
||||||
func AllowedCSIDriver() *AllowedCSIDriverApplyConfiguration {
|
|
||||||
return &AllowedCSIDriverApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithName sets the Name field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Name field is set to the value of the last call.
|
|
||||||
func (b *AllowedCSIDriverApplyConfiguration) WithName(value string) *AllowedCSIDriverApplyConfiguration {
|
|
||||||
b.Name = &value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,39 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
// AllowedFlexVolumeApplyConfiguration represents an declarative configuration of the AllowedFlexVolume type for use
|
|
||||||
// with apply.
|
|
||||||
type AllowedFlexVolumeApplyConfiguration struct {
|
|
||||||
Driver *string `json:"driver,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// AllowedFlexVolumeApplyConfiguration constructs an declarative configuration of the AllowedFlexVolume type for use with
|
|
||||||
// apply.
|
|
||||||
func AllowedFlexVolume() *AllowedFlexVolumeApplyConfiguration {
|
|
||||||
return &AllowedFlexVolumeApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithDriver sets the Driver field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Driver field is set to the value of the last call.
|
|
||||||
func (b *AllowedFlexVolumeApplyConfiguration) WithDriver(value string) *AllowedFlexVolumeApplyConfiguration {
|
|
||||||
b.Driver = &value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,48 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
// AllowedHostPathApplyConfiguration represents an declarative configuration of the AllowedHostPath type for use
|
|
||||||
// with apply.
|
|
||||||
type AllowedHostPathApplyConfiguration struct {
|
|
||||||
PathPrefix *string `json:"pathPrefix,omitempty"`
|
|
||||||
ReadOnly *bool `json:"readOnly,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// AllowedHostPathApplyConfiguration constructs an declarative configuration of the AllowedHostPath type for use with
|
|
||||||
// apply.
|
|
||||||
func AllowedHostPath() *AllowedHostPathApplyConfiguration {
|
|
||||||
return &AllowedHostPathApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithPathPrefix sets the PathPrefix field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the PathPrefix field is set to the value of the last call.
|
|
||||||
func (b *AllowedHostPathApplyConfiguration) WithPathPrefix(value string) *AllowedHostPathApplyConfiguration {
|
|
||||||
b.PathPrefix = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithReadOnly sets the ReadOnly field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the ReadOnly field is set to the value of the last call.
|
|
||||||
func (b *AllowedHostPathApplyConfiguration) WithReadOnly(value bool) *AllowedHostPathApplyConfiguration {
|
|
||||||
b.ReadOnly = &value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,57 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// FSGroupStrategyOptionsApplyConfiguration represents an declarative configuration of the FSGroupStrategyOptions type for use
|
|
||||||
// with apply.
|
|
||||||
type FSGroupStrategyOptionsApplyConfiguration struct {
|
|
||||||
Rule *v1beta1.FSGroupStrategyType `json:"rule,omitempty"`
|
|
||||||
Ranges []IDRangeApplyConfiguration `json:"ranges,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// FSGroupStrategyOptionsApplyConfiguration constructs an declarative configuration of the FSGroupStrategyOptions type for use with
|
|
||||||
// apply.
|
|
||||||
func FSGroupStrategyOptions() *FSGroupStrategyOptionsApplyConfiguration {
|
|
||||||
return &FSGroupStrategyOptionsApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRule sets the Rule field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Rule field is set to the value of the last call.
|
|
||||||
func (b *FSGroupStrategyOptionsApplyConfiguration) WithRule(value v1beta1.FSGroupStrategyType) *FSGroupStrategyOptionsApplyConfiguration {
|
|
||||||
b.Rule = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRanges adds the given value to the Ranges field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the Ranges field.
|
|
||||||
func (b *FSGroupStrategyOptionsApplyConfiguration) WithRanges(values ...*IDRangeApplyConfiguration) *FSGroupStrategyOptionsApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithRanges")
|
|
||||||
}
|
|
||||||
b.Ranges = append(b.Ranges, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,48 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
// HostPortRangeApplyConfiguration represents an declarative configuration of the HostPortRange type for use
|
|
||||||
// with apply.
|
|
||||||
type HostPortRangeApplyConfiguration struct {
|
|
||||||
Min *int32 `json:"min,omitempty"`
|
|
||||||
Max *int32 `json:"max,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// HostPortRangeApplyConfiguration constructs an declarative configuration of the HostPortRange type for use with
|
|
||||||
// apply.
|
|
||||||
func HostPortRange() *HostPortRangeApplyConfiguration {
|
|
||||||
return &HostPortRangeApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithMin sets the Min field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Min field is set to the value of the last call.
|
|
||||||
func (b *HostPortRangeApplyConfiguration) WithMin(value int32) *HostPortRangeApplyConfiguration {
|
|
||||||
b.Min = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithMax sets the Max field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Max field is set to the value of the last call.
|
|
||||||
func (b *HostPortRangeApplyConfiguration) WithMax(value int32) *HostPortRangeApplyConfiguration {
|
|
||||||
b.Max = &value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,48 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
// IDRangeApplyConfiguration represents an declarative configuration of the IDRange type for use
|
|
||||||
// with apply.
|
|
||||||
type IDRangeApplyConfiguration struct {
|
|
||||||
Min *int64 `json:"min,omitempty"`
|
|
||||||
Max *int64 `json:"max,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// IDRangeApplyConfiguration constructs an declarative configuration of the IDRange type for use with
|
|
||||||
// apply.
|
|
||||||
func IDRange() *IDRangeApplyConfiguration {
|
|
||||||
return &IDRangeApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithMin sets the Min field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Min field is set to the value of the last call.
|
|
||||||
func (b *IDRangeApplyConfiguration) WithMin(value int64) *IDRangeApplyConfiguration {
|
|
||||||
b.Min = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithMax sets the Max field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Max field is set to the value of the last call.
|
|
||||||
func (b *IDRangeApplyConfiguration) WithMax(value int64) *IDRangeApplyConfiguration {
|
|
||||||
b.Max = &value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,247 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
extensionsv1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
||||||
types "k8s.io/apimachinery/pkg/types"
|
|
||||||
managedfields "k8s.io/apimachinery/pkg/util/managedfields"
|
|
||||||
internal "k8s.io/client-go/applyconfigurations/internal"
|
|
||||||
v1 "k8s.io/client-go/applyconfigurations/meta/v1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// PodSecurityPolicyApplyConfiguration represents an declarative configuration of the PodSecurityPolicy type for use
|
|
||||||
// with apply.
|
|
||||||
type PodSecurityPolicyApplyConfiguration struct {
|
|
||||||
v1.TypeMetaApplyConfiguration `json:",inline"`
|
|
||||||
*v1.ObjectMetaApplyConfiguration `json:"metadata,omitempty"`
|
|
||||||
Spec *PodSecurityPolicySpecApplyConfiguration `json:"spec,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// PodSecurityPolicy constructs an declarative configuration of the PodSecurityPolicy type for use with
|
|
||||||
// apply.
|
|
||||||
func PodSecurityPolicy(name string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b := &PodSecurityPolicyApplyConfiguration{}
|
|
||||||
b.WithName(name)
|
|
||||||
b.WithKind("PodSecurityPolicy")
|
|
||||||
b.WithAPIVersion("extensions/v1beta1")
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// ExtractPodSecurityPolicy extracts the applied configuration owned by fieldManager from
|
|
||||||
// podSecurityPolicy. If no managedFields are found in podSecurityPolicy for fieldManager, a
|
|
||||||
// PodSecurityPolicyApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
|
||||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
|
||||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
|
||||||
// the fieldManager never owned fields any fields.
|
|
||||||
// podSecurityPolicy must be a unmodified PodSecurityPolicy API object that was retrieved from the Kubernetes API.
|
|
||||||
// ExtractPodSecurityPolicy provides a way to perform a extract/modify-in-place/apply workflow.
|
|
||||||
// Note that an extracted apply configuration will contain fewer fields than what the fieldManager previously
|
|
||||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
|
||||||
// Experimental!
|
|
||||||
func ExtractPodSecurityPolicy(podSecurityPolicy *extensionsv1beta1.PodSecurityPolicy, fieldManager string) (*PodSecurityPolicyApplyConfiguration, error) {
|
|
||||||
return extractPodSecurityPolicy(podSecurityPolicy, fieldManager, "")
|
|
||||||
}
|
|
||||||
|
|
||||||
// ExtractPodSecurityPolicyStatus is the same as ExtractPodSecurityPolicy except
|
|
||||||
// that it extracts the status subresource applied configuration.
|
|
||||||
// Experimental!
|
|
||||||
func ExtractPodSecurityPolicyStatus(podSecurityPolicy *extensionsv1beta1.PodSecurityPolicy, fieldManager string) (*PodSecurityPolicyApplyConfiguration, error) {
|
|
||||||
return extractPodSecurityPolicy(podSecurityPolicy, fieldManager, "status")
|
|
||||||
}
|
|
||||||
|
|
||||||
func extractPodSecurityPolicy(podSecurityPolicy *extensionsv1beta1.PodSecurityPolicy, fieldManager string, subresource string) (*PodSecurityPolicyApplyConfiguration, error) {
|
|
||||||
b := &PodSecurityPolicyApplyConfiguration{}
|
|
||||||
err := managedfields.ExtractInto(podSecurityPolicy, internal.Parser().Type("io.k8s.api.extensions.v1beta1.PodSecurityPolicy"), fieldManager, b, subresource)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
b.WithName(podSecurityPolicy.Name)
|
|
||||||
|
|
||||||
b.WithKind("PodSecurityPolicy")
|
|
||||||
b.WithAPIVersion("extensions/v1beta1")
|
|
||||||
return b, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithKind sets the Kind field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Kind field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithKind(value string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.Kind = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAPIVersion sets the APIVersion field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the APIVersion field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithAPIVersion(value string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.APIVersion = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithName sets the Name field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Name field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithName(value string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.Name = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithGenerateName sets the GenerateName field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the GenerateName field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithGenerateName(value string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.GenerateName = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithNamespace sets the Namespace field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Namespace field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithNamespace(value string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.Namespace = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithUID sets the UID field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the UID field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithUID(value types.UID) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.UID = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithResourceVersion sets the ResourceVersion field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the ResourceVersion field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithResourceVersion(value string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.ResourceVersion = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithGeneration sets the Generation field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Generation field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithGeneration(value int64) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.Generation = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithCreationTimestamp sets the CreationTimestamp field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the CreationTimestamp field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithCreationTimestamp(value metav1.Time) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.CreationTimestamp = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithDeletionTimestamp sets the DeletionTimestamp field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the DeletionTimestamp field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithDeletionTimestamp(value metav1.Time) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.DeletionTimestamp = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithDeletionGracePeriodSeconds sets the DeletionGracePeriodSeconds field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the DeletionGracePeriodSeconds field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithDeletionGracePeriodSeconds(value int64) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
b.DeletionGracePeriodSeconds = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithLabels puts the entries into the Labels field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the entries provided by each call will be put on the Labels field,
|
|
||||||
// overwriting an existing map entries in Labels field with the same key.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithLabels(entries map[string]string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
if b.Labels == nil && len(entries) > 0 {
|
|
||||||
b.Labels = make(map[string]string, len(entries))
|
|
||||||
}
|
|
||||||
for k, v := range entries {
|
|
||||||
b.Labels[k] = v
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAnnotations puts the entries into the Annotations field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the entries provided by each call will be put on the Annotations field,
|
|
||||||
// overwriting an existing map entries in Annotations field with the same key.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithAnnotations(entries map[string]string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
if b.Annotations == nil && len(entries) > 0 {
|
|
||||||
b.Annotations = make(map[string]string, len(entries))
|
|
||||||
}
|
|
||||||
for k, v := range entries {
|
|
||||||
b.Annotations[k] = v
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithOwnerReferences adds the given value to the OwnerReferences field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the OwnerReferences field.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithOwnerReferences(values ...*v1.OwnerReferenceApplyConfiguration) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithOwnerReferences")
|
|
||||||
}
|
|
||||||
b.OwnerReferences = append(b.OwnerReferences, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithFinalizers adds the given value to the Finalizers field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the Finalizers field.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithFinalizers(values ...string) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.ensureObjectMetaApplyConfigurationExists()
|
|
||||||
for i := range values {
|
|
||||||
b.Finalizers = append(b.Finalizers, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) ensureObjectMetaApplyConfigurationExists() {
|
|
||||||
if b.ObjectMetaApplyConfiguration == nil {
|
|
||||||
b.ObjectMetaApplyConfiguration = &v1.ObjectMetaApplyConfiguration{}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithSpec sets the Spec field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Spec field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicyApplyConfiguration) WithSpec(value *PodSecurityPolicySpecApplyConfiguration) *PodSecurityPolicyApplyConfiguration {
|
|
||||||
b.Spec = value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,285 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
v1 "k8s.io/api/core/v1"
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// PodSecurityPolicySpecApplyConfiguration represents an declarative configuration of the PodSecurityPolicySpec type for use
|
|
||||||
// with apply.
|
|
||||||
type PodSecurityPolicySpecApplyConfiguration struct {
|
|
||||||
Privileged *bool `json:"privileged,omitempty"`
|
|
||||||
DefaultAddCapabilities []v1.Capability `json:"defaultAddCapabilities,omitempty"`
|
|
||||||
RequiredDropCapabilities []v1.Capability `json:"requiredDropCapabilities,omitempty"`
|
|
||||||
AllowedCapabilities []v1.Capability `json:"allowedCapabilities,omitempty"`
|
|
||||||
Volumes []v1beta1.FSType `json:"volumes,omitempty"`
|
|
||||||
HostNetwork *bool `json:"hostNetwork,omitempty"`
|
|
||||||
HostPorts []HostPortRangeApplyConfiguration `json:"hostPorts,omitempty"`
|
|
||||||
HostPID *bool `json:"hostPID,omitempty"`
|
|
||||||
HostIPC *bool `json:"hostIPC,omitempty"`
|
|
||||||
SELinux *SELinuxStrategyOptionsApplyConfiguration `json:"seLinux,omitempty"`
|
|
||||||
RunAsUser *RunAsUserStrategyOptionsApplyConfiguration `json:"runAsUser,omitempty"`
|
|
||||||
RunAsGroup *RunAsGroupStrategyOptionsApplyConfiguration `json:"runAsGroup,omitempty"`
|
|
||||||
SupplementalGroups *SupplementalGroupsStrategyOptionsApplyConfiguration `json:"supplementalGroups,omitempty"`
|
|
||||||
FSGroup *FSGroupStrategyOptionsApplyConfiguration `json:"fsGroup,omitempty"`
|
|
||||||
ReadOnlyRootFilesystem *bool `json:"readOnlyRootFilesystem,omitempty"`
|
|
||||||
DefaultAllowPrivilegeEscalation *bool `json:"defaultAllowPrivilegeEscalation,omitempty"`
|
|
||||||
AllowPrivilegeEscalation *bool `json:"allowPrivilegeEscalation,omitempty"`
|
|
||||||
AllowedHostPaths []AllowedHostPathApplyConfiguration `json:"allowedHostPaths,omitempty"`
|
|
||||||
AllowedFlexVolumes []AllowedFlexVolumeApplyConfiguration `json:"allowedFlexVolumes,omitempty"`
|
|
||||||
AllowedCSIDrivers []AllowedCSIDriverApplyConfiguration `json:"allowedCSIDrivers,omitempty"`
|
|
||||||
AllowedUnsafeSysctls []string `json:"allowedUnsafeSysctls,omitempty"`
|
|
||||||
ForbiddenSysctls []string `json:"forbiddenSysctls,omitempty"`
|
|
||||||
AllowedProcMountTypes []v1.ProcMountType `json:"allowedProcMountTypes,omitempty"`
|
|
||||||
RuntimeClass *RuntimeClassStrategyOptionsApplyConfiguration `json:"runtimeClass,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// PodSecurityPolicySpecApplyConfiguration constructs an declarative configuration of the PodSecurityPolicySpec type for use with
|
|
||||||
// apply.
|
|
||||||
func PodSecurityPolicySpec() *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
return &PodSecurityPolicySpecApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithPrivileged sets the Privileged field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Privileged field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithPrivileged(value bool) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.Privileged = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithDefaultAddCapabilities adds the given value to the DefaultAddCapabilities field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the DefaultAddCapabilities field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithDefaultAddCapabilities(values ...v1.Capability) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
b.DefaultAddCapabilities = append(b.DefaultAddCapabilities, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRequiredDropCapabilities adds the given value to the RequiredDropCapabilities field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the RequiredDropCapabilities field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithRequiredDropCapabilities(values ...v1.Capability) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
b.RequiredDropCapabilities = append(b.RequiredDropCapabilities, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAllowedCapabilities adds the given value to the AllowedCapabilities field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the AllowedCapabilities field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithAllowedCapabilities(values ...v1.Capability) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
b.AllowedCapabilities = append(b.AllowedCapabilities, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithVolumes adds the given value to the Volumes field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the Volumes field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithVolumes(values ...v1beta1.FSType) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
b.Volumes = append(b.Volumes, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithHostNetwork sets the HostNetwork field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the HostNetwork field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithHostNetwork(value bool) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.HostNetwork = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithHostPorts adds the given value to the HostPorts field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the HostPorts field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithHostPorts(values ...*HostPortRangeApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithHostPorts")
|
|
||||||
}
|
|
||||||
b.HostPorts = append(b.HostPorts, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithHostPID sets the HostPID field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the HostPID field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithHostPID(value bool) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.HostPID = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithHostIPC sets the HostIPC field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the HostIPC field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithHostIPC(value bool) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.HostIPC = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithSELinux sets the SELinux field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the SELinux field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithSELinux(value *SELinuxStrategyOptionsApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.SELinux = value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRunAsUser sets the RunAsUser field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the RunAsUser field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithRunAsUser(value *RunAsUserStrategyOptionsApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.RunAsUser = value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRunAsGroup sets the RunAsGroup field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the RunAsGroup field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithRunAsGroup(value *RunAsGroupStrategyOptionsApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.RunAsGroup = value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithSupplementalGroups sets the SupplementalGroups field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the SupplementalGroups field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithSupplementalGroups(value *SupplementalGroupsStrategyOptionsApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.SupplementalGroups = value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithFSGroup sets the FSGroup field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the FSGroup field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithFSGroup(value *FSGroupStrategyOptionsApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.FSGroup = value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithReadOnlyRootFilesystem sets the ReadOnlyRootFilesystem field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the ReadOnlyRootFilesystem field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithReadOnlyRootFilesystem(value bool) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.ReadOnlyRootFilesystem = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithDefaultAllowPrivilegeEscalation sets the DefaultAllowPrivilegeEscalation field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the DefaultAllowPrivilegeEscalation field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithDefaultAllowPrivilegeEscalation(value bool) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.DefaultAllowPrivilegeEscalation = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAllowPrivilegeEscalation sets the AllowPrivilegeEscalation field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the AllowPrivilegeEscalation field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithAllowPrivilegeEscalation(value bool) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.AllowPrivilegeEscalation = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAllowedHostPaths adds the given value to the AllowedHostPaths field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the AllowedHostPaths field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithAllowedHostPaths(values ...*AllowedHostPathApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithAllowedHostPaths")
|
|
||||||
}
|
|
||||||
b.AllowedHostPaths = append(b.AllowedHostPaths, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAllowedFlexVolumes adds the given value to the AllowedFlexVolumes field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the AllowedFlexVolumes field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithAllowedFlexVolumes(values ...*AllowedFlexVolumeApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithAllowedFlexVolumes")
|
|
||||||
}
|
|
||||||
b.AllowedFlexVolumes = append(b.AllowedFlexVolumes, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAllowedCSIDrivers adds the given value to the AllowedCSIDrivers field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the AllowedCSIDrivers field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithAllowedCSIDrivers(values ...*AllowedCSIDriverApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithAllowedCSIDrivers")
|
|
||||||
}
|
|
||||||
b.AllowedCSIDrivers = append(b.AllowedCSIDrivers, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAllowedUnsafeSysctls adds the given value to the AllowedUnsafeSysctls field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the AllowedUnsafeSysctls field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithAllowedUnsafeSysctls(values ...string) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
b.AllowedUnsafeSysctls = append(b.AllowedUnsafeSysctls, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithForbiddenSysctls adds the given value to the ForbiddenSysctls field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the ForbiddenSysctls field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithForbiddenSysctls(values ...string) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
b.ForbiddenSysctls = append(b.ForbiddenSysctls, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAllowedProcMountTypes adds the given value to the AllowedProcMountTypes field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the AllowedProcMountTypes field.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithAllowedProcMountTypes(values ...v1.ProcMountType) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
b.AllowedProcMountTypes = append(b.AllowedProcMountTypes, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRuntimeClass sets the RuntimeClass field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the RuntimeClass field is set to the value of the last call.
|
|
||||||
func (b *PodSecurityPolicySpecApplyConfiguration) WithRuntimeClass(value *RuntimeClassStrategyOptionsApplyConfiguration) *PodSecurityPolicySpecApplyConfiguration {
|
|
||||||
b.RuntimeClass = value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,57 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// RunAsGroupStrategyOptionsApplyConfiguration represents an declarative configuration of the RunAsGroupStrategyOptions type for use
|
|
||||||
// with apply.
|
|
||||||
type RunAsGroupStrategyOptionsApplyConfiguration struct {
|
|
||||||
Rule *v1beta1.RunAsGroupStrategy `json:"rule,omitempty"`
|
|
||||||
Ranges []IDRangeApplyConfiguration `json:"ranges,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// RunAsGroupStrategyOptionsApplyConfiguration constructs an declarative configuration of the RunAsGroupStrategyOptions type for use with
|
|
||||||
// apply.
|
|
||||||
func RunAsGroupStrategyOptions() *RunAsGroupStrategyOptionsApplyConfiguration {
|
|
||||||
return &RunAsGroupStrategyOptionsApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRule sets the Rule field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Rule field is set to the value of the last call.
|
|
||||||
func (b *RunAsGroupStrategyOptionsApplyConfiguration) WithRule(value v1beta1.RunAsGroupStrategy) *RunAsGroupStrategyOptionsApplyConfiguration {
|
|
||||||
b.Rule = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRanges adds the given value to the Ranges field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the Ranges field.
|
|
||||||
func (b *RunAsGroupStrategyOptionsApplyConfiguration) WithRanges(values ...*IDRangeApplyConfiguration) *RunAsGroupStrategyOptionsApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithRanges")
|
|
||||||
}
|
|
||||||
b.Ranges = append(b.Ranges, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,57 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// RunAsUserStrategyOptionsApplyConfiguration represents an declarative configuration of the RunAsUserStrategyOptions type for use
|
|
||||||
// with apply.
|
|
||||||
type RunAsUserStrategyOptionsApplyConfiguration struct {
|
|
||||||
Rule *v1beta1.RunAsUserStrategy `json:"rule,omitempty"`
|
|
||||||
Ranges []IDRangeApplyConfiguration `json:"ranges,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// RunAsUserStrategyOptionsApplyConfiguration constructs an declarative configuration of the RunAsUserStrategyOptions type for use with
|
|
||||||
// apply.
|
|
||||||
func RunAsUserStrategyOptions() *RunAsUserStrategyOptionsApplyConfiguration {
|
|
||||||
return &RunAsUserStrategyOptionsApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRule sets the Rule field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Rule field is set to the value of the last call.
|
|
||||||
func (b *RunAsUserStrategyOptionsApplyConfiguration) WithRule(value v1beta1.RunAsUserStrategy) *RunAsUserStrategyOptionsApplyConfiguration {
|
|
||||||
b.Rule = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRanges adds the given value to the Ranges field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the Ranges field.
|
|
||||||
func (b *RunAsUserStrategyOptionsApplyConfiguration) WithRanges(values ...*IDRangeApplyConfiguration) *RunAsUserStrategyOptionsApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithRanges")
|
|
||||||
}
|
|
||||||
b.Ranges = append(b.Ranges, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,50 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
// RuntimeClassStrategyOptionsApplyConfiguration represents an declarative configuration of the RuntimeClassStrategyOptions type for use
|
|
||||||
// with apply.
|
|
||||||
type RuntimeClassStrategyOptionsApplyConfiguration struct {
|
|
||||||
AllowedRuntimeClassNames []string `json:"allowedRuntimeClassNames,omitempty"`
|
|
||||||
DefaultRuntimeClassName *string `json:"defaultRuntimeClassName,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// RuntimeClassStrategyOptionsApplyConfiguration constructs an declarative configuration of the RuntimeClassStrategyOptions type for use with
|
|
||||||
// apply.
|
|
||||||
func RuntimeClassStrategyOptions() *RuntimeClassStrategyOptionsApplyConfiguration {
|
|
||||||
return &RuntimeClassStrategyOptionsApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithAllowedRuntimeClassNames adds the given value to the AllowedRuntimeClassNames field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the AllowedRuntimeClassNames field.
|
|
||||||
func (b *RuntimeClassStrategyOptionsApplyConfiguration) WithAllowedRuntimeClassNames(values ...string) *RuntimeClassStrategyOptionsApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
b.AllowedRuntimeClassNames = append(b.AllowedRuntimeClassNames, values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithDefaultRuntimeClassName sets the DefaultRuntimeClassName field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the DefaultRuntimeClassName field is set to the value of the last call.
|
|
||||||
func (b *RuntimeClassStrategyOptionsApplyConfiguration) WithDefaultRuntimeClassName(value string) *RuntimeClassStrategyOptionsApplyConfiguration {
|
|
||||||
b.DefaultRuntimeClassName = &value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,53 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
v1 "k8s.io/client-go/applyconfigurations/core/v1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// SELinuxStrategyOptionsApplyConfiguration represents an declarative configuration of the SELinuxStrategyOptions type for use
|
|
||||||
// with apply.
|
|
||||||
type SELinuxStrategyOptionsApplyConfiguration struct {
|
|
||||||
Rule *v1beta1.SELinuxStrategy `json:"rule,omitempty"`
|
|
||||||
SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// SELinuxStrategyOptionsApplyConfiguration constructs an declarative configuration of the SELinuxStrategyOptions type for use with
|
|
||||||
// apply.
|
|
||||||
func SELinuxStrategyOptions() *SELinuxStrategyOptionsApplyConfiguration {
|
|
||||||
return &SELinuxStrategyOptionsApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRule sets the Rule field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Rule field is set to the value of the last call.
|
|
||||||
func (b *SELinuxStrategyOptionsApplyConfiguration) WithRule(value v1beta1.SELinuxStrategy) *SELinuxStrategyOptionsApplyConfiguration {
|
|
||||||
b.Rule = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithSELinuxOptions sets the SELinuxOptions field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the SELinuxOptions field is set to the value of the last call.
|
|
||||||
func (b *SELinuxStrategyOptionsApplyConfiguration) WithSELinuxOptions(value *v1.SELinuxOptionsApplyConfiguration) *SELinuxStrategyOptionsApplyConfiguration {
|
|
||||||
b.SELinuxOptions = value
|
|
||||||
return b
|
|
||||||
}
|
|
@ -1,57 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
)
|
|
||||||
|
|
||||||
// SupplementalGroupsStrategyOptionsApplyConfiguration represents an declarative configuration of the SupplementalGroupsStrategyOptions type for use
|
|
||||||
// with apply.
|
|
||||||
type SupplementalGroupsStrategyOptionsApplyConfiguration struct {
|
|
||||||
Rule *v1beta1.SupplementalGroupsStrategyType `json:"rule,omitempty"`
|
|
||||||
Ranges []IDRangeApplyConfiguration `json:"ranges,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// SupplementalGroupsStrategyOptionsApplyConfiguration constructs an declarative configuration of the SupplementalGroupsStrategyOptions type for use with
|
|
||||||
// apply.
|
|
||||||
func SupplementalGroupsStrategyOptions() *SupplementalGroupsStrategyOptionsApplyConfiguration {
|
|
||||||
return &SupplementalGroupsStrategyOptionsApplyConfiguration{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRule sets the Rule field in the declarative configuration to the given value
|
|
||||||
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
|
||||||
// If called multiple times, the Rule field is set to the value of the last call.
|
|
||||||
func (b *SupplementalGroupsStrategyOptionsApplyConfiguration) WithRule(value v1beta1.SupplementalGroupsStrategyType) *SupplementalGroupsStrategyOptionsApplyConfiguration {
|
|
||||||
b.Rule = &value
|
|
||||||
return b
|
|
||||||
}
|
|
||||||
|
|
||||||
// WithRanges adds the given value to the Ranges field in the declarative configuration
|
|
||||||
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
|
||||||
// If called multiple times, values provided by each call will be appended to the Ranges field.
|
|
||||||
func (b *SupplementalGroupsStrategyOptionsApplyConfiguration) WithRanges(values ...*IDRangeApplyConfiguration) *SupplementalGroupsStrategyOptionsApplyConfiguration {
|
|
||||||
for i := range values {
|
|
||||||
if values[i] == nil {
|
|
||||||
panic("nil value passed to WithRanges")
|
|
||||||
}
|
|
||||||
b.Ranges = append(b.Ranges, *values[i])
|
|
||||||
}
|
|
||||||
return b
|
|
||||||
}
|
|
@ -7734,29 +7734,6 @@ var schemaYAML = typed.YAMLObject(`types:
|
|||||||
type:
|
type:
|
||||||
namedType: io.k8s.apimachinery.pkg.apis.meta.v1.MicroTime
|
namedType: io.k8s.apimachinery.pkg.apis.meta.v1.MicroTime
|
||||||
default: {}
|
default: {}
|
||||||
- name: io.k8s.api.extensions.v1beta1.AllowedCSIDriver
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: name
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
default: ""
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.AllowedFlexVolume
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: driver
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
default: ""
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.AllowedHostPath
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: pathPrefix
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
- name: readOnly
|
|
||||||
type:
|
|
||||||
scalar: boolean
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.DaemonSet
|
- name: io.k8s.api.extensions.v1beta1.DaemonSet
|
||||||
map:
|
map:
|
||||||
fields:
|
fields:
|
||||||
@ -7992,18 +7969,6 @@ var schemaYAML = typed.YAMLObject(`types:
|
|||||||
- name: type
|
- name: type
|
||||||
type:
|
type:
|
||||||
scalar: string
|
scalar: string
|
||||||
- name: io.k8s.api.extensions.v1beta1.FSGroupStrategyOptions
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: ranges
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.IDRange
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: rule
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.HTTPIngressPath
|
- name: io.k8s.api.extensions.v1beta1.HTTPIngressPath
|
||||||
map:
|
map:
|
||||||
fields:
|
fields:
|
||||||
@ -8026,28 +7991,6 @@ var schemaYAML = typed.YAMLObject(`types:
|
|||||||
elementType:
|
elementType:
|
||||||
namedType: io.k8s.api.extensions.v1beta1.HTTPIngressPath
|
namedType: io.k8s.api.extensions.v1beta1.HTTPIngressPath
|
||||||
elementRelationship: atomic
|
elementRelationship: atomic
|
||||||
- name: io.k8s.api.extensions.v1beta1.HostPortRange
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: max
|
|
||||||
type:
|
|
||||||
scalar: numeric
|
|
||||||
default: 0
|
|
||||||
- name: min
|
|
||||||
type:
|
|
||||||
scalar: numeric
|
|
||||||
default: 0
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.IDRange
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: max
|
|
||||||
type:
|
|
||||||
scalar: numeric
|
|
||||||
default: 0
|
|
||||||
- name: min
|
|
||||||
type:
|
|
||||||
scalar: numeric
|
|
||||||
default: 0
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.IPBlock
|
- name: io.k8s.api.extensions.v1beta1.IPBlock
|
||||||
map:
|
map:
|
||||||
fields:
|
fields:
|
||||||
@ -8293,135 +8236,6 @@ var schemaYAML = typed.YAMLObject(`types:
|
|||||||
elementRelationship: associative
|
elementRelationship: associative
|
||||||
keys:
|
keys:
|
||||||
- type
|
- type
|
||||||
- name: io.k8s.api.extensions.v1beta1.PodSecurityPolicy
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: apiVersion
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
- name: kind
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
- name: metadata
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.apimachinery.pkg.apis.meta.v1.ObjectMeta
|
|
||||||
default: {}
|
|
||||||
- name: spec
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.PodSecurityPolicySpec
|
|
||||||
default: {}
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.PodSecurityPolicySpec
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: allowPrivilegeEscalation
|
|
||||||
type:
|
|
||||||
scalar: boolean
|
|
||||||
- name: allowedCSIDrivers
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.AllowedCSIDriver
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: allowedCapabilities
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
scalar: string
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: allowedFlexVolumes
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.AllowedFlexVolume
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: allowedHostPaths
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.AllowedHostPath
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: allowedProcMountTypes
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
scalar: string
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: allowedUnsafeSysctls
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
scalar: string
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: defaultAddCapabilities
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
scalar: string
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: defaultAllowPrivilegeEscalation
|
|
||||||
type:
|
|
||||||
scalar: boolean
|
|
||||||
- name: forbiddenSysctls
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
scalar: string
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: fsGroup
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.FSGroupStrategyOptions
|
|
||||||
default: {}
|
|
||||||
- name: hostIPC
|
|
||||||
type:
|
|
||||||
scalar: boolean
|
|
||||||
- name: hostNetwork
|
|
||||||
type:
|
|
||||||
scalar: boolean
|
|
||||||
- name: hostPID
|
|
||||||
type:
|
|
||||||
scalar: boolean
|
|
||||||
- name: hostPorts
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.HostPortRange
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: privileged
|
|
||||||
type:
|
|
||||||
scalar: boolean
|
|
||||||
- name: readOnlyRootFilesystem
|
|
||||||
type:
|
|
||||||
scalar: boolean
|
|
||||||
- name: requiredDropCapabilities
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
scalar: string
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: runAsGroup
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.RunAsGroupStrategyOptions
|
|
||||||
- name: runAsUser
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.RunAsUserStrategyOptions
|
|
||||||
default: {}
|
|
||||||
- name: runtimeClass
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.RuntimeClassStrategyOptions
|
|
||||||
- name: seLinux
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.SELinuxStrategyOptions
|
|
||||||
default: {}
|
|
||||||
- name: supplementalGroups
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.SupplementalGroupsStrategyOptions
|
|
||||||
default: {}
|
|
||||||
- name: volumes
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
scalar: string
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.ReplicaSet
|
- name: io.k8s.api.extensions.v1beta1.ReplicaSet
|
||||||
map:
|
map:
|
||||||
fields:
|
fields:
|
||||||
@ -8531,66 +8345,6 @@ var schemaYAML = typed.YAMLObject(`types:
|
|||||||
- name: maxUnavailable
|
- name: maxUnavailable
|
||||||
type:
|
type:
|
||||||
namedType: io.k8s.apimachinery.pkg.util.intstr.IntOrString
|
namedType: io.k8s.apimachinery.pkg.util.intstr.IntOrString
|
||||||
- name: io.k8s.api.extensions.v1beta1.RunAsGroupStrategyOptions
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: ranges
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.IDRange
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: rule
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
default: ""
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.RunAsUserStrategyOptions
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: ranges
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.IDRange
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: rule
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
default: ""
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.RuntimeClassStrategyOptions
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: allowedRuntimeClassNames
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
scalar: string
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: defaultRuntimeClassName
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.SELinuxStrategyOptions
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: rule
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
default: ""
|
|
||||||
- name: seLinuxOptions
|
|
||||||
type:
|
|
||||||
namedType: io.k8s.api.core.v1.SELinuxOptions
|
|
||||||
- name: io.k8s.api.extensions.v1beta1.SupplementalGroupsStrategyOptions
|
|
||||||
map:
|
|
||||||
fields:
|
|
||||||
- name: ranges
|
|
||||||
type:
|
|
||||||
list:
|
|
||||||
elementType:
|
|
||||||
namedType: io.k8s.api.extensions.v1beta1.IDRange
|
|
||||||
elementRelationship: atomic
|
|
||||||
- name: rule
|
|
||||||
type:
|
|
||||||
scalar: string
|
|
||||||
- name: io.k8s.api.flowcontrol.v1alpha1.FlowDistinguisherMethod
|
- name: io.k8s.api.flowcontrol.v1alpha1.FlowDistinguisherMethod
|
||||||
map:
|
map:
|
||||||
fields:
|
fields:
|
||||||
|
@ -937,12 +937,6 @@ func ForKind(kind schema.GroupVersionKind) interface{} {
|
|||||||
return &applyconfigurationseventsv1beta1.EventSeriesApplyConfiguration{}
|
return &applyconfigurationseventsv1beta1.EventSeriesApplyConfiguration{}
|
||||||
|
|
||||||
// Group=extensions, Version=v1beta1
|
// Group=extensions, Version=v1beta1
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("AllowedCSIDriver"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.AllowedCSIDriverApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("AllowedFlexVolume"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.AllowedFlexVolumeApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("AllowedHostPath"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.AllowedHostPathApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("DaemonSet"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("DaemonSet"):
|
||||||
return &applyconfigurationsextensionsv1beta1.DaemonSetApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.DaemonSetApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("DaemonSetCondition"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("DaemonSetCondition"):
|
||||||
@ -963,16 +957,10 @@ func ForKind(kind schema.GroupVersionKind) interface{} {
|
|||||||
return &applyconfigurationsextensionsv1beta1.DeploymentStatusApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.DeploymentStatusApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("DeploymentStrategy"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("DeploymentStrategy"):
|
||||||
return &applyconfigurationsextensionsv1beta1.DeploymentStrategyApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.DeploymentStrategyApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("FSGroupStrategyOptions"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.FSGroupStrategyOptionsApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("HostPortRange"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.HostPortRangeApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("HTTPIngressPath"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("HTTPIngressPath"):
|
||||||
return &applyconfigurationsextensionsv1beta1.HTTPIngressPathApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.HTTPIngressPathApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("HTTPIngressRuleValue"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("HTTPIngressRuleValue"):
|
||||||
return &applyconfigurationsextensionsv1beta1.HTTPIngressRuleValueApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.HTTPIngressRuleValueApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("IDRange"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.IDRangeApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("Ingress"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("Ingress"):
|
||||||
return &applyconfigurationsextensionsv1beta1.IngressApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.IngressApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("IngressBackend"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("IngressBackend"):
|
||||||
@ -1009,10 +997,6 @@ func ForKind(kind schema.GroupVersionKind) interface{} {
|
|||||||
return &applyconfigurationsextensionsv1beta1.NetworkPolicySpecApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.NetworkPolicySpecApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("NetworkPolicyStatus"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("NetworkPolicyStatus"):
|
||||||
return &applyconfigurationsextensionsv1beta1.NetworkPolicyStatusApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.NetworkPolicyStatusApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("PodSecurityPolicy"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.PodSecurityPolicyApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("PodSecurityPolicySpec"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.PodSecurityPolicySpecApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("ReplicaSet"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("ReplicaSet"):
|
||||||
return &applyconfigurationsextensionsv1beta1.ReplicaSetApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.ReplicaSetApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("ReplicaSetCondition"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("ReplicaSetCondition"):
|
||||||
@ -1027,18 +1011,8 @@ func ForKind(kind schema.GroupVersionKind) interface{} {
|
|||||||
return &applyconfigurationsextensionsv1beta1.RollingUpdateDaemonSetApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.RollingUpdateDaemonSetApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("RollingUpdateDeployment"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("RollingUpdateDeployment"):
|
||||||
return &applyconfigurationsextensionsv1beta1.RollingUpdateDeploymentApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.RollingUpdateDeploymentApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("RunAsGroupStrategyOptions"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.RunAsGroupStrategyOptionsApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("RunAsUserStrategyOptions"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.RunAsUserStrategyOptionsApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("RuntimeClassStrategyOptions"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.RuntimeClassStrategyOptionsApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("Scale"):
|
case extensionsv1beta1.SchemeGroupVersion.WithKind("Scale"):
|
||||||
return &applyconfigurationsextensionsv1beta1.ScaleApplyConfiguration{}
|
return &applyconfigurationsextensionsv1beta1.ScaleApplyConfiguration{}
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("SELinuxStrategyOptions"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.SELinuxStrategyOptionsApplyConfiguration{}
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithKind("SupplementalGroupsStrategyOptions"):
|
|
||||||
return &applyconfigurationsextensionsv1beta1.SupplementalGroupsStrategyOptionsApplyConfiguration{}
|
|
||||||
|
|
||||||
// Group=flowcontrol.apiserver.k8s.io, Version=v1alpha1
|
// Group=flowcontrol.apiserver.k8s.io, Version=v1alpha1
|
||||||
case flowcontrolv1alpha1.SchemeGroupVersion.WithKind("FlowDistinguisherMethod"):
|
case flowcontrolv1alpha1.SchemeGroupVersion.WithKind("FlowDistinguisherMethod"):
|
||||||
|
@ -32,8 +32,6 @@ type Interface interface {
|
|||||||
Ingresses() IngressInformer
|
Ingresses() IngressInformer
|
||||||
// NetworkPolicies returns a NetworkPolicyInformer.
|
// NetworkPolicies returns a NetworkPolicyInformer.
|
||||||
NetworkPolicies() NetworkPolicyInformer
|
NetworkPolicies() NetworkPolicyInformer
|
||||||
// PodSecurityPolicies returns a PodSecurityPolicyInformer.
|
|
||||||
PodSecurityPolicies() PodSecurityPolicyInformer
|
|
||||||
// ReplicaSets returns a ReplicaSetInformer.
|
// ReplicaSets returns a ReplicaSetInformer.
|
||||||
ReplicaSets() ReplicaSetInformer
|
ReplicaSets() ReplicaSetInformer
|
||||||
}
|
}
|
||||||
@ -69,11 +67,6 @@ func (v *version) NetworkPolicies() NetworkPolicyInformer {
|
|||||||
return &networkPolicyInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
return &networkPolicyInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
}
|
}
|
||||||
|
|
||||||
// PodSecurityPolicies returns a PodSecurityPolicyInformer.
|
|
||||||
func (v *version) PodSecurityPolicies() PodSecurityPolicyInformer {
|
|
||||||
return &podSecurityPolicyInformer{factory: v.factory, tweakListOptions: v.tweakListOptions}
|
|
||||||
}
|
|
||||||
|
|
||||||
// ReplicaSets returns a ReplicaSetInformer.
|
// ReplicaSets returns a ReplicaSetInformer.
|
||||||
func (v *version) ReplicaSets() ReplicaSetInformer {
|
func (v *version) ReplicaSets() ReplicaSetInformer {
|
||||||
return &replicaSetInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
return &replicaSetInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
@ -1,89 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by informer-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
"context"
|
|
||||||
time "time"
|
|
||||||
|
|
||||||
extensionsv1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
||||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
|
||||||
watch "k8s.io/apimachinery/pkg/watch"
|
|
||||||
internalinterfaces "k8s.io/client-go/informers/internalinterfaces"
|
|
||||||
kubernetes "k8s.io/client-go/kubernetes"
|
|
||||||
v1beta1 "k8s.io/client-go/listers/extensions/v1beta1"
|
|
||||||
cache "k8s.io/client-go/tools/cache"
|
|
||||||
)
|
|
||||||
|
|
||||||
// PodSecurityPolicyInformer provides access to a shared informer and lister for
|
|
||||||
// PodSecurityPolicies.
|
|
||||||
type PodSecurityPolicyInformer interface {
|
|
||||||
Informer() cache.SharedIndexInformer
|
|
||||||
Lister() v1beta1.PodSecurityPolicyLister
|
|
||||||
}
|
|
||||||
|
|
||||||
type podSecurityPolicyInformer struct {
|
|
||||||
factory internalinterfaces.SharedInformerFactory
|
|
||||||
tweakListOptions internalinterfaces.TweakListOptionsFunc
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewPodSecurityPolicyInformer constructs a new informer for PodSecurityPolicy type.
|
|
||||||
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
|
||||||
// one. This reduces memory footprint and number of connections to the server.
|
|
||||||
func NewPodSecurityPolicyInformer(client kubernetes.Interface, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer {
|
|
||||||
return NewFilteredPodSecurityPolicyInformer(client, resyncPeriod, indexers, nil)
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewFilteredPodSecurityPolicyInformer constructs a new informer for PodSecurityPolicy type.
|
|
||||||
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
|
||||||
// one. This reduces memory footprint and number of connections to the server.
|
|
||||||
func NewFilteredPodSecurityPolicyInformer(client kubernetes.Interface, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer {
|
|
||||||
return cache.NewSharedIndexInformer(
|
|
||||||
&cache.ListWatch{
|
|
||||||
ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
|
|
||||||
if tweakListOptions != nil {
|
|
||||||
tweakListOptions(&options)
|
|
||||||
}
|
|
||||||
return client.ExtensionsV1beta1().PodSecurityPolicies().List(context.TODO(), options)
|
|
||||||
},
|
|
||||||
WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
|
|
||||||
if tweakListOptions != nil {
|
|
||||||
tweakListOptions(&options)
|
|
||||||
}
|
|
||||||
return client.ExtensionsV1beta1().PodSecurityPolicies().Watch(context.TODO(), options)
|
|
||||||
},
|
|
||||||
},
|
|
||||||
&extensionsv1beta1.PodSecurityPolicy{},
|
|
||||||
resyncPeriod,
|
|
||||||
indexers,
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (f *podSecurityPolicyInformer) defaultInformer(client kubernetes.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
|
||||||
return NewFilteredPodSecurityPolicyInformer(client, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (f *podSecurityPolicyInformer) Informer() cache.SharedIndexInformer {
|
|
||||||
return f.factory.InformerFor(&extensionsv1beta1.PodSecurityPolicy{}, f.defaultInformer)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (f *podSecurityPolicyInformer) Lister() v1beta1.PodSecurityPolicyLister {
|
|
||||||
return v1beta1.NewPodSecurityPolicyLister(f.Informer().GetIndexer())
|
|
||||||
}
|
|
@ -247,8 +247,6 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().Ingresses().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().Ingresses().Informer()}, nil
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithResource("networkpolicies"):
|
case extensionsv1beta1.SchemeGroupVersion.WithResource("networkpolicies"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().NetworkPolicies().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().NetworkPolicies().Informer()}, nil
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithResource("podsecuritypolicies"):
|
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().PodSecurityPolicies().Informer()}, nil
|
|
||||||
case extensionsv1beta1.SchemeGroupVersion.WithResource("replicasets"):
|
case extensionsv1beta1.SchemeGroupVersion.WithResource("replicasets"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().ReplicaSets().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().ReplicaSets().Informer()}, nil
|
||||||
|
|
||||||
|
@ -32,7 +32,6 @@ type ExtensionsV1beta1Interface interface {
|
|||||||
DeploymentsGetter
|
DeploymentsGetter
|
||||||
IngressesGetter
|
IngressesGetter
|
||||||
NetworkPoliciesGetter
|
NetworkPoliciesGetter
|
||||||
PodSecurityPoliciesGetter
|
|
||||||
ReplicaSetsGetter
|
ReplicaSetsGetter
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -57,10 +56,6 @@ func (c *ExtensionsV1beta1Client) NetworkPolicies(namespace string) NetworkPolic
|
|||||||
return newNetworkPolicies(c, namespace)
|
return newNetworkPolicies(c, namespace)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *ExtensionsV1beta1Client) PodSecurityPolicies() PodSecurityPolicyInterface {
|
|
||||||
return newPodSecurityPolicies(c)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *ExtensionsV1beta1Client) ReplicaSets(namespace string) ReplicaSetInterface {
|
func (c *ExtensionsV1beta1Client) ReplicaSets(namespace string) ReplicaSetInterface {
|
||||||
return newReplicaSets(c, namespace)
|
return newReplicaSets(c, namespace)
|
||||||
}
|
}
|
||||||
|
@ -44,10 +44,6 @@ func (c *FakeExtensionsV1beta1) NetworkPolicies(namespace string) v1beta1.Networ
|
|||||||
return &FakeNetworkPolicies{c, namespace}
|
return &FakeNetworkPolicies{c, namespace}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *FakeExtensionsV1beta1) PodSecurityPolicies() v1beta1.PodSecurityPolicyInterface {
|
|
||||||
return &FakePodSecurityPolicies{c}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *FakeExtensionsV1beta1) ReplicaSets(namespace string) v1beta1.ReplicaSetInterface {
|
func (c *FakeExtensionsV1beta1) ReplicaSets(namespace string) v1beta1.ReplicaSetInterface {
|
||||||
return &FakeReplicaSets{c, namespace}
|
return &FakeReplicaSets{c, namespace}
|
||||||
}
|
}
|
||||||
|
@ -1,145 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by client-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package fake
|
|
||||||
|
|
||||||
import (
|
|
||||||
"context"
|
|
||||||
json "encoding/json"
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
||||||
labels "k8s.io/apimachinery/pkg/labels"
|
|
||||||
types "k8s.io/apimachinery/pkg/types"
|
|
||||||
watch "k8s.io/apimachinery/pkg/watch"
|
|
||||||
extensionsv1beta1 "k8s.io/client-go/applyconfigurations/extensions/v1beta1"
|
|
||||||
testing "k8s.io/client-go/testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
// FakePodSecurityPolicies implements PodSecurityPolicyInterface
|
|
||||||
type FakePodSecurityPolicies struct {
|
|
||||||
Fake *FakeExtensionsV1beta1
|
|
||||||
}
|
|
||||||
|
|
||||||
var podsecuritypoliciesResource = v1beta1.SchemeGroupVersion.WithResource("podsecuritypolicies")
|
|
||||||
|
|
||||||
var podsecuritypoliciesKind = v1beta1.SchemeGroupVersion.WithKind("PodSecurityPolicy")
|
|
||||||
|
|
||||||
// Get takes name of the podSecurityPolicy, and returns the corresponding podSecurityPolicy object, and an error if there is any.
|
|
||||||
func (c *FakePodSecurityPolicies) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
obj, err := c.Fake.
|
|
||||||
Invokes(testing.NewRootGetAction(podsecuritypoliciesResource, name), &v1beta1.PodSecurityPolicy{})
|
|
||||||
if obj == nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return obj.(*v1beta1.PodSecurityPolicy), err
|
|
||||||
}
|
|
||||||
|
|
||||||
// List takes label and field selectors, and returns the list of PodSecurityPolicies that match those selectors.
|
|
||||||
func (c *FakePodSecurityPolicies) List(ctx context.Context, opts v1.ListOptions) (result *v1beta1.PodSecurityPolicyList, err error) {
|
|
||||||
obj, err := c.Fake.
|
|
||||||
Invokes(testing.NewRootListAction(podsecuritypoliciesResource, podsecuritypoliciesKind, opts), &v1beta1.PodSecurityPolicyList{})
|
|
||||||
if obj == nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
label, _, _ := testing.ExtractFromListOptions(opts)
|
|
||||||
if label == nil {
|
|
||||||
label = labels.Everything()
|
|
||||||
}
|
|
||||||
list := &v1beta1.PodSecurityPolicyList{ListMeta: obj.(*v1beta1.PodSecurityPolicyList).ListMeta}
|
|
||||||
for _, item := range obj.(*v1beta1.PodSecurityPolicyList).Items {
|
|
||||||
if label.Matches(labels.Set(item.Labels)) {
|
|
||||||
list.Items = append(list.Items, item)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return list, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Watch returns a watch.Interface that watches the requested podSecurityPolicies.
|
|
||||||
func (c *FakePodSecurityPolicies) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
|
||||||
return c.Fake.
|
|
||||||
InvokesWatch(testing.NewRootWatchAction(podsecuritypoliciesResource, opts))
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create takes the representation of a podSecurityPolicy and creates it. Returns the server's representation of the podSecurityPolicy, and an error, if there is any.
|
|
||||||
func (c *FakePodSecurityPolicies) Create(ctx context.Context, podSecurityPolicy *v1beta1.PodSecurityPolicy, opts v1.CreateOptions) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
obj, err := c.Fake.
|
|
||||||
Invokes(testing.NewRootCreateAction(podsecuritypoliciesResource, podSecurityPolicy), &v1beta1.PodSecurityPolicy{})
|
|
||||||
if obj == nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return obj.(*v1beta1.PodSecurityPolicy), err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Update takes the representation of a podSecurityPolicy and updates it. Returns the server's representation of the podSecurityPolicy, and an error, if there is any.
|
|
||||||
func (c *FakePodSecurityPolicies) Update(ctx context.Context, podSecurityPolicy *v1beta1.PodSecurityPolicy, opts v1.UpdateOptions) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
obj, err := c.Fake.
|
|
||||||
Invokes(testing.NewRootUpdateAction(podsecuritypoliciesResource, podSecurityPolicy), &v1beta1.PodSecurityPolicy{})
|
|
||||||
if obj == nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return obj.(*v1beta1.PodSecurityPolicy), err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Delete takes name of the podSecurityPolicy and deletes it. Returns an error if one occurs.
|
|
||||||
func (c *FakePodSecurityPolicies) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
|
||||||
_, err := c.Fake.
|
|
||||||
Invokes(testing.NewRootDeleteActionWithOptions(podsecuritypoliciesResource, name, opts), &v1beta1.PodSecurityPolicy{})
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeleteCollection deletes a collection of objects.
|
|
||||||
func (c *FakePodSecurityPolicies) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
|
||||||
action := testing.NewRootDeleteCollectionAction(podsecuritypoliciesResource, listOpts)
|
|
||||||
|
|
||||||
_, err := c.Fake.Invokes(action, &v1beta1.PodSecurityPolicyList{})
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Patch applies the patch and returns the patched podSecurityPolicy.
|
|
||||||
func (c *FakePodSecurityPolicies) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
obj, err := c.Fake.
|
|
||||||
Invokes(testing.NewRootPatchSubresourceAction(podsecuritypoliciesResource, name, pt, data, subresources...), &v1beta1.PodSecurityPolicy{})
|
|
||||||
if obj == nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return obj.(*v1beta1.PodSecurityPolicy), err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Apply takes the given apply declarative configuration, applies it and returns the applied podSecurityPolicy.
|
|
||||||
func (c *FakePodSecurityPolicies) Apply(ctx context.Context, podSecurityPolicy *extensionsv1beta1.PodSecurityPolicyApplyConfiguration, opts v1.ApplyOptions) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
if podSecurityPolicy == nil {
|
|
||||||
return nil, fmt.Errorf("podSecurityPolicy provided to Apply must not be nil")
|
|
||||||
}
|
|
||||||
data, err := json.Marshal(podSecurityPolicy)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
name := podSecurityPolicy.Name
|
|
||||||
if name == nil {
|
|
||||||
return nil, fmt.Errorf("podSecurityPolicy.Name must be provided to Apply")
|
|
||||||
}
|
|
||||||
obj, err := c.Fake.
|
|
||||||
Invokes(testing.NewRootPatchSubresourceAction(podsecuritypoliciesResource, *name, types.ApplyPatchType, data), &v1beta1.PodSecurityPolicy{})
|
|
||||||
if obj == nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return obj.(*v1beta1.PodSecurityPolicy), err
|
|
||||||
}
|
|
@ -24,6 +24,4 @@ type IngressExpansion interface{}
|
|||||||
|
|
||||||
type NetworkPolicyExpansion interface{}
|
type NetworkPolicyExpansion interface{}
|
||||||
|
|
||||||
type PodSecurityPolicyExpansion interface{}
|
|
||||||
|
|
||||||
type ReplicaSetExpansion interface{}
|
type ReplicaSetExpansion interface{}
|
||||||
|
@ -1,197 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by client-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
"context"
|
|
||||||
json "encoding/json"
|
|
||||||
"fmt"
|
|
||||||
"time"
|
|
||||||
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
||||||
types "k8s.io/apimachinery/pkg/types"
|
|
||||||
watch "k8s.io/apimachinery/pkg/watch"
|
|
||||||
extensionsv1beta1 "k8s.io/client-go/applyconfigurations/extensions/v1beta1"
|
|
||||||
scheme "k8s.io/client-go/kubernetes/scheme"
|
|
||||||
rest "k8s.io/client-go/rest"
|
|
||||||
)
|
|
||||||
|
|
||||||
// PodSecurityPoliciesGetter has a method to return a PodSecurityPolicyInterface.
|
|
||||||
// A group's client should implement this interface.
|
|
||||||
type PodSecurityPoliciesGetter interface {
|
|
||||||
PodSecurityPolicies() PodSecurityPolicyInterface
|
|
||||||
}
|
|
||||||
|
|
||||||
// PodSecurityPolicyInterface has methods to work with PodSecurityPolicy resources.
|
|
||||||
type PodSecurityPolicyInterface interface {
|
|
||||||
Create(ctx context.Context, podSecurityPolicy *v1beta1.PodSecurityPolicy, opts v1.CreateOptions) (*v1beta1.PodSecurityPolicy, error)
|
|
||||||
Update(ctx context.Context, podSecurityPolicy *v1beta1.PodSecurityPolicy, opts v1.UpdateOptions) (*v1beta1.PodSecurityPolicy, error)
|
|
||||||
Delete(ctx context.Context, name string, opts v1.DeleteOptions) error
|
|
||||||
DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error
|
|
||||||
Get(ctx context.Context, name string, opts v1.GetOptions) (*v1beta1.PodSecurityPolicy, error)
|
|
||||||
List(ctx context.Context, opts v1.ListOptions) (*v1beta1.PodSecurityPolicyList, error)
|
|
||||||
Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error)
|
|
||||||
Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1beta1.PodSecurityPolicy, err error)
|
|
||||||
Apply(ctx context.Context, podSecurityPolicy *extensionsv1beta1.PodSecurityPolicyApplyConfiguration, opts v1.ApplyOptions) (result *v1beta1.PodSecurityPolicy, err error)
|
|
||||||
PodSecurityPolicyExpansion
|
|
||||||
}
|
|
||||||
|
|
||||||
// podSecurityPolicies implements PodSecurityPolicyInterface
|
|
||||||
type podSecurityPolicies struct {
|
|
||||||
client rest.Interface
|
|
||||||
}
|
|
||||||
|
|
||||||
// newPodSecurityPolicies returns a PodSecurityPolicies
|
|
||||||
func newPodSecurityPolicies(c *ExtensionsV1beta1Client) *podSecurityPolicies {
|
|
||||||
return &podSecurityPolicies{
|
|
||||||
client: c.RESTClient(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get takes name of the podSecurityPolicy, and returns the corresponding podSecurityPolicy object, and an error if there is any.
|
|
||||||
func (c *podSecurityPolicies) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
result = &v1beta1.PodSecurityPolicy{}
|
|
||||||
err = c.client.Get().
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
Name(name).
|
|
||||||
VersionedParams(&options, scheme.ParameterCodec).
|
|
||||||
Do(ctx).
|
|
||||||
Into(result)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// List takes label and field selectors, and returns the list of PodSecurityPolicies that match those selectors.
|
|
||||||
func (c *podSecurityPolicies) List(ctx context.Context, opts v1.ListOptions) (result *v1beta1.PodSecurityPolicyList, err error) {
|
|
||||||
var timeout time.Duration
|
|
||||||
if opts.TimeoutSeconds != nil {
|
|
||||||
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
|
||||||
}
|
|
||||||
result = &v1beta1.PodSecurityPolicyList{}
|
|
||||||
err = c.client.Get().
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
VersionedParams(&opts, scheme.ParameterCodec).
|
|
||||||
Timeout(timeout).
|
|
||||||
Do(ctx).
|
|
||||||
Into(result)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Watch returns a watch.Interface that watches the requested podSecurityPolicies.
|
|
||||||
func (c *podSecurityPolicies) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
|
||||||
var timeout time.Duration
|
|
||||||
if opts.TimeoutSeconds != nil {
|
|
||||||
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
|
||||||
}
|
|
||||||
opts.Watch = true
|
|
||||||
return c.client.Get().
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
VersionedParams(&opts, scheme.ParameterCodec).
|
|
||||||
Timeout(timeout).
|
|
||||||
Watch(ctx)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create takes the representation of a podSecurityPolicy and creates it. Returns the server's representation of the podSecurityPolicy, and an error, if there is any.
|
|
||||||
func (c *podSecurityPolicies) Create(ctx context.Context, podSecurityPolicy *v1beta1.PodSecurityPolicy, opts v1.CreateOptions) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
result = &v1beta1.PodSecurityPolicy{}
|
|
||||||
err = c.client.Post().
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
VersionedParams(&opts, scheme.ParameterCodec).
|
|
||||||
Body(podSecurityPolicy).
|
|
||||||
Do(ctx).
|
|
||||||
Into(result)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Update takes the representation of a podSecurityPolicy and updates it. Returns the server's representation of the podSecurityPolicy, and an error, if there is any.
|
|
||||||
func (c *podSecurityPolicies) Update(ctx context.Context, podSecurityPolicy *v1beta1.PodSecurityPolicy, opts v1.UpdateOptions) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
result = &v1beta1.PodSecurityPolicy{}
|
|
||||||
err = c.client.Put().
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
Name(podSecurityPolicy.Name).
|
|
||||||
VersionedParams(&opts, scheme.ParameterCodec).
|
|
||||||
Body(podSecurityPolicy).
|
|
||||||
Do(ctx).
|
|
||||||
Into(result)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Delete takes name of the podSecurityPolicy and deletes it. Returns an error if one occurs.
|
|
||||||
func (c *podSecurityPolicies) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
|
||||||
return c.client.Delete().
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
Name(name).
|
|
||||||
Body(&opts).
|
|
||||||
Do(ctx).
|
|
||||||
Error()
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeleteCollection deletes a collection of objects.
|
|
||||||
func (c *podSecurityPolicies) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
|
||||||
var timeout time.Duration
|
|
||||||
if listOpts.TimeoutSeconds != nil {
|
|
||||||
timeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second
|
|
||||||
}
|
|
||||||
return c.client.Delete().
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
VersionedParams(&listOpts, scheme.ParameterCodec).
|
|
||||||
Timeout(timeout).
|
|
||||||
Body(&opts).
|
|
||||||
Do(ctx).
|
|
||||||
Error()
|
|
||||||
}
|
|
||||||
|
|
||||||
// Patch applies the patch and returns the patched podSecurityPolicy.
|
|
||||||
func (c *podSecurityPolicies) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
result = &v1beta1.PodSecurityPolicy{}
|
|
||||||
err = c.client.Patch(pt).
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
Name(name).
|
|
||||||
SubResource(subresources...).
|
|
||||||
VersionedParams(&opts, scheme.ParameterCodec).
|
|
||||||
Body(data).
|
|
||||||
Do(ctx).
|
|
||||||
Into(result)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Apply takes the given apply declarative configuration, applies it and returns the applied podSecurityPolicy.
|
|
||||||
func (c *podSecurityPolicies) Apply(ctx context.Context, podSecurityPolicy *extensionsv1beta1.PodSecurityPolicyApplyConfiguration, opts v1.ApplyOptions) (result *v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
if podSecurityPolicy == nil {
|
|
||||||
return nil, fmt.Errorf("podSecurityPolicy provided to Apply must not be nil")
|
|
||||||
}
|
|
||||||
patchOpts := opts.ToPatchOptions()
|
|
||||||
data, err := json.Marshal(podSecurityPolicy)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
name := podSecurityPolicy.Name
|
|
||||||
if name == nil {
|
|
||||||
return nil, fmt.Errorf("podSecurityPolicy.Name must be provided to Apply")
|
|
||||||
}
|
|
||||||
result = &v1beta1.PodSecurityPolicy{}
|
|
||||||
err = c.client.Patch(types.ApplyPatchType).
|
|
||||||
Resource("podsecuritypolicies").
|
|
||||||
Name(*name).
|
|
||||||
VersionedParams(&patchOpts, scheme.ParameterCodec).
|
|
||||||
Body(data).
|
|
||||||
Do(ctx).
|
|
||||||
Into(result)
|
|
||||||
return
|
|
||||||
}
|
|
@ -41,7 +41,3 @@ type NetworkPolicyListerExpansion interface{}
|
|||||||
// NetworkPolicyNamespaceListerExpansion allows custom methods to be added to
|
// NetworkPolicyNamespaceListerExpansion allows custom methods to be added to
|
||||||
// NetworkPolicyNamespaceLister.
|
// NetworkPolicyNamespaceLister.
|
||||||
type NetworkPolicyNamespaceListerExpansion interface{}
|
type NetworkPolicyNamespaceListerExpansion interface{}
|
||||||
|
|
||||||
// PodSecurityPolicyListerExpansion allows custom methods to be added to
|
|
||||||
// PodSecurityPolicyLister.
|
|
||||||
type PodSecurityPolicyListerExpansion interface{}
|
|
||||||
|
@ -1,68 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
// Code generated by lister-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package v1beta1
|
|
||||||
|
|
||||||
import (
|
|
||||||
v1beta1 "k8s.io/api/extensions/v1beta1"
|
|
||||||
"k8s.io/apimachinery/pkg/api/errors"
|
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
|
||||||
"k8s.io/client-go/tools/cache"
|
|
||||||
)
|
|
||||||
|
|
||||||
// PodSecurityPolicyLister helps list PodSecurityPolicies.
|
|
||||||
// All objects returned here must be treated as read-only.
|
|
||||||
type PodSecurityPolicyLister interface {
|
|
||||||
// List lists all PodSecurityPolicies in the indexer.
|
|
||||||
// Objects returned here must be treated as read-only.
|
|
||||||
List(selector labels.Selector) (ret []*v1beta1.PodSecurityPolicy, err error)
|
|
||||||
// Get retrieves the PodSecurityPolicy from the index for a given name.
|
|
||||||
// Objects returned here must be treated as read-only.
|
|
||||||
Get(name string) (*v1beta1.PodSecurityPolicy, error)
|
|
||||||
PodSecurityPolicyListerExpansion
|
|
||||||
}
|
|
||||||
|
|
||||||
// podSecurityPolicyLister implements the PodSecurityPolicyLister interface.
|
|
||||||
type podSecurityPolicyLister struct {
|
|
||||||
indexer cache.Indexer
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewPodSecurityPolicyLister returns a new PodSecurityPolicyLister.
|
|
||||||
func NewPodSecurityPolicyLister(indexer cache.Indexer) PodSecurityPolicyLister {
|
|
||||||
return &podSecurityPolicyLister{indexer: indexer}
|
|
||||||
}
|
|
||||||
|
|
||||||
// List lists all PodSecurityPolicies in the indexer.
|
|
||||||
func (s *podSecurityPolicyLister) List(selector labels.Selector) (ret []*v1beta1.PodSecurityPolicy, err error) {
|
|
||||||
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
|
|
||||||
ret = append(ret, m.(*v1beta1.PodSecurityPolicy))
|
|
||||||
})
|
|
||||||
return ret, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get retrieves the PodSecurityPolicy from the index for a given name.
|
|
||||||
func (s *podSecurityPolicyLister) Get(name string) (*v1beta1.PodSecurityPolicy, error) {
|
|
||||||
obj, exists, err := s.indexer.GetByKey(name)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
if !exists {
|
|
||||||
return nil, errors.NewNotFound(v1beta1.Resource("podsecuritypolicy"), name)
|
|
||||||
}
|
|
||||||
return obj.(*v1beta1.PodSecurityPolicy), nil
|
|
||||||
}
|
|
Loading…
Reference in New Issue
Block a user