mirror of
https://github.com/kubernetes-sigs/descheduler.git
synced 2026-01-28 06:29:29 +01:00
chore: update dependencies for security vulnerabilities (CVE-2023-48795)
Signed-off-by: Amir Alavi <amiralavi7@gmail.com>
This commit is contained in:
8
vendor/k8s.io/api/admissionregistration/v1/generated.proto
generated
vendored
8
vendor/k8s.io/api/admissionregistration/v1/generated.proto
generated
vendored
@@ -76,7 +76,6 @@ message MutatingWebhook {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
repeated RuleWithOperations rules = 3;
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -184,7 +183,6 @@ message MutatingWebhook {
|
||||
// If a persisted webhook configuration specifies allowed versions and does not
|
||||
// include any versions known to the API Server, calls to the webhook will fail
|
||||
// and be subject to the failure policy.
|
||||
// +listType=atomic
|
||||
repeated string admissionReviewVersions = 8;
|
||||
|
||||
// reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation.
|
||||
@@ -238,8 +236,6 @@ message MutatingWebhookConfiguration {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated MutatingWebhook Webhooks = 2;
|
||||
}
|
||||
|
||||
@@ -356,7 +352,6 @@ message ValidatingWebhook {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
repeated RuleWithOperations rules = 3;
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -464,7 +459,6 @@ message ValidatingWebhook {
|
||||
// If a persisted webhook configuration specifies allowed versions and does not
|
||||
// include any versions known to the API Server, calls to the webhook will fail
|
||||
// and be subject to the failure policy.
|
||||
// +listType=atomic
|
||||
repeated string admissionReviewVersions = 8;
|
||||
|
||||
// MatchConditions is a list of conditions that must be met for a request to be sent to this
|
||||
@@ -500,8 +494,6 @@ message ValidatingWebhookConfiguration {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated ValidatingWebhook Webhooks = 2;
|
||||
}
|
||||
|
||||
|
||||
8
vendor/k8s.io/api/admissionregistration/v1/types.go
generated
vendored
8
vendor/k8s.io/api/admissionregistration/v1/types.go
generated
vendored
@@ -134,8 +134,6 @@ type ValidatingWebhookConfiguration struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Webhooks []ValidatingWebhook `json:"webhooks,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=Webhooks"`
|
||||
}
|
||||
|
||||
@@ -166,8 +164,6 @@ type MutatingWebhookConfiguration struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Webhooks []MutatingWebhook `json:"webhooks,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=Webhooks"`
|
||||
}
|
||||
|
||||
@@ -203,7 +199,6 @@ type ValidatingWebhook struct {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
Rules []RuleWithOperations `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -311,7 +306,6 @@ type ValidatingWebhook struct {
|
||||
// If a persisted webhook configuration specifies allowed versions and does not
|
||||
// include any versions known to the API Server, calls to the webhook will fail
|
||||
// and be subject to the failure policy.
|
||||
// +listType=atomic
|
||||
AdmissionReviewVersions []string `json:"admissionReviewVersions" protobuf:"bytes,8,rep,name=admissionReviewVersions"`
|
||||
|
||||
// MatchConditions is a list of conditions that must be met for a request to be sent to this
|
||||
@@ -356,7 +350,6 @@ type MutatingWebhook struct {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
Rules []RuleWithOperations `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -464,7 +457,6 @@ type MutatingWebhook struct {
|
||||
// If a persisted webhook configuration specifies allowed versions and does not
|
||||
// include any versions known to the API Server, calls to the webhook will fail
|
||||
// and be subject to the failure policy.
|
||||
// +listType=atomic
|
||||
AdmissionReviewVersions []string `json:"admissionReviewVersions" protobuf:"bytes,8,rep,name=admissionReviewVersions"`
|
||||
|
||||
// reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation.
|
||||
|
||||
9
vendor/k8s.io/api/admissionregistration/v1beta1/generated.proto
generated
vendored
9
vendor/k8s.io/api/admissionregistration/v1beta1/generated.proto
generated
vendored
@@ -222,7 +222,6 @@ message MutatingWebhook {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.admissionregistration.v1.RuleWithOperations rules = 3;
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -333,7 +332,6 @@ message MutatingWebhook {
|
||||
// and be subject to the failure policy.
|
||||
// Default to `['v1beta1']`.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string admissionReviewVersions = 8;
|
||||
|
||||
// reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation.
|
||||
@@ -388,8 +386,6 @@ message MutatingWebhookConfiguration {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated MutatingWebhook Webhooks = 2;
|
||||
}
|
||||
|
||||
@@ -769,7 +765,6 @@ message ValidatingWebhook {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.admissionregistration.v1.RuleWithOperations rules = 3;
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -861,7 +856,6 @@ message ValidatingWebhook {
|
||||
// Requests with the dryRun attribute will be auto-rejected if they match a webhook with
|
||||
// sideEffects == Unknown or Some. Defaults to Unknown.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
optional string sideEffects = 6;
|
||||
|
||||
// TimeoutSeconds specifies the timeout for this webhook. After the timeout passes,
|
||||
@@ -881,7 +875,6 @@ message ValidatingWebhook {
|
||||
// and be subject to the failure policy.
|
||||
// Default to `['v1beta1']`.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string admissionReviewVersions = 8;
|
||||
|
||||
// MatchConditions is a list of conditions that must be met for a request to be sent to this
|
||||
@@ -918,8 +911,6 @@ message ValidatingWebhookConfiguration {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated ValidatingWebhook Webhooks = 2;
|
||||
}
|
||||
|
||||
|
||||
9
vendor/k8s.io/api/admissionregistration/v1beta1/types.go
generated
vendored
9
vendor/k8s.io/api/admissionregistration/v1beta1/types.go
generated
vendored
@@ -684,8 +684,6 @@ type ValidatingWebhookConfiguration struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Webhooks []ValidatingWebhook `json:"webhooks,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=Webhooks"`
|
||||
}
|
||||
|
||||
@@ -725,8 +723,6 @@ type MutatingWebhookConfiguration struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Webhooks []MutatingWebhook `json:"webhooks,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=Webhooks"`
|
||||
}
|
||||
|
||||
@@ -766,7 +762,6 @@ type ValidatingWebhook struct {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
Rules []RuleWithOperations `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -858,7 +853,6 @@ type ValidatingWebhook struct {
|
||||
// Requests with the dryRun attribute will be auto-rejected if they match a webhook with
|
||||
// sideEffects == Unknown or Some. Defaults to Unknown.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
SideEffects *SideEffectClass `json:"sideEffects,omitempty" protobuf:"bytes,6,opt,name=sideEffects,casttype=SideEffectClass"`
|
||||
|
||||
// TimeoutSeconds specifies the timeout for this webhook. After the timeout passes,
|
||||
@@ -878,7 +872,6 @@ type ValidatingWebhook struct {
|
||||
// and be subject to the failure policy.
|
||||
// Default to `['v1beta1']`.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AdmissionReviewVersions []string `json:"admissionReviewVersions,omitempty" protobuf:"bytes,8,rep,name=admissionReviewVersions"`
|
||||
|
||||
// MatchConditions is a list of conditions that must be met for a request to be sent to this
|
||||
@@ -923,7 +916,6 @@ type MutatingWebhook struct {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
Rules []RuleWithOperations `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -1034,7 +1026,6 @@ type MutatingWebhook struct {
|
||||
// and be subject to the failure policy.
|
||||
// Default to `['v1beta1']`.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AdmissionReviewVersions []string `json:"admissionReviewVersions,omitempty" protobuf:"bytes,8,rep,name=admissionReviewVersions"`
|
||||
|
||||
// reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation.
|
||||
|
||||
9
vendor/k8s.io/api/apps/v1/generated.proto
generated
vendored
9
vendor/k8s.io/api/apps/v1/generated.proto
generated
vendored
@@ -200,8 +200,6 @@ message DaemonSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DaemonSetCondition conditions = 10;
|
||||
}
|
||||
|
||||
@@ -343,8 +341,6 @@ message DeploymentStatus {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DeploymentCondition conditions = 6;
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -479,8 +475,6 @@ message ReplicaSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ReplicaSetCondition conditions = 6;
|
||||
}
|
||||
|
||||
@@ -694,7 +688,6 @@ message StatefulSetSpec {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.core.v1.PersistentVolumeClaim volumeClaimTemplates = 4;
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -789,8 +782,6 @@ message StatefulSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated StatefulSetCondition conditions = 10;
|
||||
|
||||
// Total number of available pods (ready for at least minReadySeconds) targeted by this statefulset.
|
||||
|
||||
9
vendor/k8s.io/api/apps/v1/types.go
generated
vendored
9
vendor/k8s.io/api/apps/v1/types.go
generated
vendored
@@ -211,7 +211,6 @@ type StatefulSetSpec struct {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumeClaimTemplates []v1.PersistentVolumeClaim `json:"volumeClaimTemplates,omitempty" protobuf:"bytes,4,rep,name=volumeClaimTemplates"`
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -306,8 +305,6 @@ type StatefulSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []StatefulSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
|
||||
// Total number of available pods (ready for at least minReadySeconds) targeted by this statefulset.
|
||||
@@ -510,8 +507,6 @@ type DeploymentStatus struct {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DeploymentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -719,8 +714,6 @@ type DaemonSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DaemonSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -891,8 +884,6 @@ type ReplicaSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ReplicaSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
|
||||
5
vendor/k8s.io/api/apps/v1beta1/generated.proto
generated
vendored
5
vendor/k8s.io/api/apps/v1beta1/generated.proto
generated
vendored
@@ -208,8 +208,6 @@ message DeploymentStatus {
|
||||
// Conditions represent the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DeploymentCondition conditions = 6;
|
||||
|
||||
// collisionCount is the count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -447,7 +445,6 @@ message StatefulSetSpec {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.core.v1.PersistentVolumeClaim volumeClaimTemplates = 4;
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -539,8 +536,6 @@ message StatefulSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated StatefulSetCondition conditions = 10;
|
||||
|
||||
// availableReplicas is the total number of available pods (ready for at least minReadySeconds) targeted by this StatefulSet.
|
||||
|
||||
5
vendor/k8s.io/api/apps/v1beta1/types.go
generated
vendored
5
vendor/k8s.io/api/apps/v1beta1/types.go
generated
vendored
@@ -251,7 +251,6 @@ type StatefulSetSpec struct {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumeClaimTemplates []v1.PersistentVolumeClaim `json:"volumeClaimTemplates,omitempty" protobuf:"bytes,4,rep,name=volumeClaimTemplates"`
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -343,8 +342,6 @@ type StatefulSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []StatefulSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
|
||||
// availableReplicas is the total number of available pods (ready for at least minReadySeconds) targeted by this StatefulSet.
|
||||
@@ -580,8 +577,6 @@ type DeploymentStatus struct {
|
||||
// Conditions represent the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DeploymentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
|
||||
// collisionCount is the count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
|
||||
9
vendor/k8s.io/api/apps/v1beta2/generated.proto
generated
vendored
9
vendor/k8s.io/api/apps/v1beta2/generated.proto
generated
vendored
@@ -204,8 +204,6 @@ message DaemonSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DaemonSetCondition conditions = 10;
|
||||
}
|
||||
|
||||
@@ -348,8 +346,6 @@ message DeploymentStatus {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DeploymentCondition conditions = 6;
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -485,8 +481,6 @@ message ReplicaSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ReplicaSetCondition conditions = 6;
|
||||
}
|
||||
|
||||
@@ -739,7 +733,6 @@ message StatefulSetSpec {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.core.v1.PersistentVolumeClaim volumeClaimTemplates = 4;
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -831,8 +824,6 @@ message StatefulSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated StatefulSetCondition conditions = 10;
|
||||
|
||||
// Total number of available pods (ready for at least minReadySeconds) targeted by this StatefulSet.
|
||||
|
||||
9
vendor/k8s.io/api/apps/v1beta2/types.go
generated
vendored
9
vendor/k8s.io/api/apps/v1beta2/types.go
generated
vendored
@@ -261,7 +261,6 @@ type StatefulSetSpec struct {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumeClaimTemplates []v1.PersistentVolumeClaim `json:"volumeClaimTemplates,omitempty" protobuf:"bytes,4,rep,name=volumeClaimTemplates"`
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -353,8 +352,6 @@ type StatefulSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []StatefulSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
|
||||
// Total number of available pods (ready for at least minReadySeconds) targeted by this StatefulSet.
|
||||
@@ -558,8 +555,6 @@ type DeploymentStatus struct {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DeploymentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -770,8 +765,6 @@ type DaemonSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DaemonSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -958,8 +951,6 @@ type ReplicaSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ReplicaSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
|
||||
4
vendor/k8s.io/api/authentication/v1/generated.proto
generated
vendored
4
vendor/k8s.io/api/authentication/v1/generated.proto
generated
vendored
@@ -99,7 +99,6 @@ message TokenRequestSpec {
|
||||
// token issued for multiple audiences may be used to authenticate
|
||||
// against any of the audiences listed but implies a high degree of
|
||||
// trust between the target audiences.
|
||||
// +listType=atomic
|
||||
repeated string audiences = 1;
|
||||
|
||||
// ExpirationSeconds is the requested duration of validity of the request. The
|
||||
@@ -155,7 +154,6 @@ message TokenReviewSpec {
|
||||
// this list. If no audiences are provided, the audience will default to the
|
||||
// audience of the Kubernetes apiserver.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string audiences = 2;
|
||||
}
|
||||
|
||||
@@ -179,7 +177,6 @@ message TokenReviewStatus {
|
||||
// status.audience field where status.authenticated is "true", the token is
|
||||
// valid against the audience of the Kubernetes API server.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string audiences = 4;
|
||||
|
||||
// Error indicates that the token couldn't be checked
|
||||
@@ -202,7 +199,6 @@ message UserInfo {
|
||||
|
||||
// The names of groups this user is a part of.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string groups = 3;
|
||||
|
||||
// Any additional information provided by the authenticator.
|
||||
|
||||
4
vendor/k8s.io/api/authentication/v1/types.go
generated
vendored
4
vendor/k8s.io/api/authentication/v1/types.go
generated
vendored
@@ -75,7 +75,6 @@ type TokenReviewSpec struct {
|
||||
// this list. If no audiences are provided, the audience will default to the
|
||||
// audience of the Kubernetes apiserver.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences,omitempty" protobuf:"bytes,2,rep,name=audiences"`
|
||||
}
|
||||
|
||||
@@ -97,7 +96,6 @@ type TokenReviewStatus struct {
|
||||
// status.audience field where status.authenticated is "true", the token is
|
||||
// valid against the audience of the Kubernetes API server.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences,omitempty" protobuf:"bytes,4,rep,name=audiences"`
|
||||
// Error indicates that the token couldn't be checked
|
||||
// +optional
|
||||
@@ -117,7 +115,6 @@ type UserInfo struct {
|
||||
UID string `json:"uid,omitempty" protobuf:"bytes,2,opt,name=uid"`
|
||||
// The names of groups this user is a part of.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Groups []string `json:"groups,omitempty" protobuf:"bytes,3,rep,name=groups"`
|
||||
// Any additional information provided by the authenticator.
|
||||
// +optional
|
||||
@@ -159,7 +156,6 @@ type TokenRequestSpec struct {
|
||||
// token issued for multiple audiences may be used to authenticate
|
||||
// against any of the audiences listed but implies a high degree of
|
||||
// trust between the target audiences.
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences" protobuf:"bytes,1,rep,name=audiences"`
|
||||
|
||||
// ExpirationSeconds is the requested duration of validity of the request. The
|
||||
|
||||
3
vendor/k8s.io/api/authentication/v1beta1/generated.proto
generated
vendored
3
vendor/k8s.io/api/authentication/v1beta1/generated.proto
generated
vendored
@@ -87,7 +87,6 @@ message TokenReviewSpec {
|
||||
// this list. If no audiences are provided, the audience will default to the
|
||||
// audience of the Kubernetes apiserver.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string audiences = 2;
|
||||
}
|
||||
|
||||
@@ -111,7 +110,6 @@ message TokenReviewStatus {
|
||||
// status.audience field where status.authenticated is "true", the token is
|
||||
// valid against the audience of the Kubernetes API server.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string audiences = 4;
|
||||
|
||||
// Error indicates that the token couldn't be checked
|
||||
@@ -134,7 +132,6 @@ message UserInfo {
|
||||
|
||||
// The names of groups this user is a part of.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string groups = 3;
|
||||
|
||||
// Any additional information provided by the authenticator.
|
||||
|
||||
3
vendor/k8s.io/api/authentication/v1beta1/types.go
generated
vendored
3
vendor/k8s.io/api/authentication/v1beta1/types.go
generated
vendored
@@ -60,7 +60,6 @@ type TokenReviewSpec struct {
|
||||
// this list. If no audiences are provided, the audience will default to the
|
||||
// audience of the Kubernetes apiserver.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences,omitempty" protobuf:"bytes,2,rep,name=audiences"`
|
||||
}
|
||||
|
||||
@@ -82,7 +81,6 @@ type TokenReviewStatus struct {
|
||||
// status.audience field where status.authenticated is "true", the token is
|
||||
// valid against the audience of the Kubernetes API server.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences,omitempty" protobuf:"bytes,4,rep,name=audiences"`
|
||||
// Error indicates that the token couldn't be checked
|
||||
// +optional
|
||||
@@ -102,7 +100,6 @@ type UserInfo struct {
|
||||
UID string `json:"uid,omitempty" protobuf:"bytes,2,opt,name=uid"`
|
||||
// The names of groups this user is a part of.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Groups []string `json:"groups,omitempty" protobuf:"bytes,3,rep,name=groups"`
|
||||
// Any additional information provided by the authenticator.
|
||||
// +optional
|
||||
|
||||
9
vendor/k8s.io/api/authorization/v1/generated.proto
generated
vendored
9
vendor/k8s.io/api/authorization/v1/generated.proto
generated
vendored
@@ -69,13 +69,11 @@ message NonResourceAttributes {
|
||||
// NonResourceRule holds information that describes a rule for the non-resource
|
||||
message NonResourceRule {
|
||||
// Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full,
|
||||
// final step in the path. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 2;
|
||||
}
|
||||
|
||||
@@ -117,24 +115,20 @@ message ResourceAttributes {
|
||||
// may contain duplicates, and possibly be incomplete.
|
||||
message ResourceRule {
|
||||
// Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 2;
|
||||
|
||||
// Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups.
|
||||
// "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 3;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 4;
|
||||
}
|
||||
|
||||
@@ -226,7 +220,6 @@ message SubjectAccessReviewSpec {
|
||||
|
||||
// Groups is the groups you're testing for.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string groups = 4;
|
||||
|
||||
// Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer
|
||||
@@ -269,12 +262,10 @@ message SubjectAccessReviewStatus {
|
||||
message SubjectRulesReviewStatus {
|
||||
// ResourceRules is the list of actions the subject is allowed to perform on resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
repeated ResourceRule resourceRules = 1;
|
||||
|
||||
// NonResourceRules is the list of actions the subject is allowed to perform on non-resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
repeated NonResourceRule nonResourceRules = 2;
|
||||
|
||||
// Incomplete is true when the rules returned by this call are incomplete. This is most commonly
|
||||
|
||||
9
vendor/k8s.io/api/authorization/v1/types.go
generated
vendored
9
vendor/k8s.io/api/authorization/v1/types.go
generated
vendored
@@ -143,7 +143,6 @@ type SubjectAccessReviewSpec struct {
|
||||
User string `json:"user,omitempty" protobuf:"bytes,3,opt,name=user"`
|
||||
// Groups is the groups you're testing for.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Groups []string `json:"groups,omitempty" protobuf:"bytes,4,rep,name=groups"`
|
||||
// Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer
|
||||
// it needs a reflection here.
|
||||
@@ -233,11 +232,9 @@ type SelfSubjectRulesReviewSpec struct {
|
||||
type SubjectRulesReviewStatus struct {
|
||||
// ResourceRules is the list of actions the subject is allowed to perform on resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
ResourceRules []ResourceRule `json:"resourceRules" protobuf:"bytes,1,rep,name=resourceRules"`
|
||||
// NonResourceRules is the list of actions the subject is allowed to perform on non-resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
NonResourceRules []NonResourceRule `json:"nonResourceRules" protobuf:"bytes,2,rep,name=nonResourceRules"`
|
||||
// Incomplete is true when the rules returned by this call are incomplete. This is most commonly
|
||||
// encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.
|
||||
@@ -253,34 +250,28 @@ type SubjectRulesReviewStatus struct {
|
||||
// may contain duplicates, and possibly be incomplete.
|
||||
type ResourceRule struct {
|
||||
// Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups.
|
||||
// "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"`
|
||||
}
|
||||
|
||||
// NonResourceRule holds information that describes a rule for the non-resource
|
||||
type NonResourceRule struct {
|
||||
// Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full,
|
||||
// final step in the path. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,2,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
9
vendor/k8s.io/api/authorization/v1beta1/generated.proto
generated
vendored
9
vendor/k8s.io/api/authorization/v1beta1/generated.proto
generated
vendored
@@ -69,13 +69,11 @@ message NonResourceAttributes {
|
||||
// NonResourceRule holds information that describes a rule for the non-resource
|
||||
message NonResourceRule {
|
||||
// Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full,
|
||||
// final step in the path. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 2;
|
||||
}
|
||||
|
||||
@@ -117,24 +115,20 @@ message ResourceAttributes {
|
||||
// may contain duplicates, and possibly be incomplete.
|
||||
message ResourceRule {
|
||||
// Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 2;
|
||||
|
||||
// Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups.
|
||||
// "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 3;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 4;
|
||||
}
|
||||
|
||||
@@ -226,7 +220,6 @@ message SubjectAccessReviewSpec {
|
||||
|
||||
// Groups is the groups you're testing for.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string group = 4;
|
||||
|
||||
// Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer
|
||||
@@ -269,12 +262,10 @@ message SubjectAccessReviewStatus {
|
||||
message SubjectRulesReviewStatus {
|
||||
// ResourceRules is the list of actions the subject is allowed to perform on resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
repeated ResourceRule resourceRules = 1;
|
||||
|
||||
// NonResourceRules is the list of actions the subject is allowed to perform on non-resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
repeated NonResourceRule nonResourceRules = 2;
|
||||
|
||||
// Incomplete is true when the rules returned by this call are incomplete. This is most commonly
|
||||
|
||||
9
vendor/k8s.io/api/authorization/v1beta1/types.go
generated
vendored
9
vendor/k8s.io/api/authorization/v1beta1/types.go
generated
vendored
@@ -152,7 +152,6 @@ type SubjectAccessReviewSpec struct {
|
||||
User string `json:"user,omitempty" protobuf:"bytes,3,opt,name=user"`
|
||||
// Groups is the groups you're testing for.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Groups []string `json:"group,omitempty" protobuf:"bytes,4,rep,name=group"`
|
||||
// Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer
|
||||
// it needs a reflection here.
|
||||
@@ -245,11 +244,9 @@ type SelfSubjectRulesReviewSpec struct {
|
||||
type SubjectRulesReviewStatus struct {
|
||||
// ResourceRules is the list of actions the subject is allowed to perform on resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
ResourceRules []ResourceRule `json:"resourceRules" protobuf:"bytes,1,rep,name=resourceRules"`
|
||||
// NonResourceRules is the list of actions the subject is allowed to perform on non-resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
NonResourceRules []NonResourceRule `json:"nonResourceRules" protobuf:"bytes,2,rep,name=nonResourceRules"`
|
||||
// Incomplete is true when the rules returned by this call are incomplete. This is most commonly
|
||||
// encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.
|
||||
@@ -265,34 +262,28 @@ type SubjectRulesReviewStatus struct {
|
||||
// may contain duplicates, and possibly be incomplete.
|
||||
type ResourceRule struct {
|
||||
// Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups.
|
||||
// "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"`
|
||||
}
|
||||
|
||||
// NonResourceRule holds information that describes a rule for the non-resource
|
||||
type NonResourceRule struct {
|
||||
// Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full,
|
||||
// final step in the path. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,2,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
3
vendor/k8s.io/api/autoscaling/v2beta1/generated.proto
generated
vendored
3
vendor/k8s.io/api/autoscaling/v2beta1/generated.proto
generated
vendored
@@ -220,7 +220,6 @@ message HorizontalPodAutoscalerSpec {
|
||||
// increased, and vice-versa. See the individual metric source types for
|
||||
// more information about how each type of metric must respond.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated MetricSpec metrics = 4;
|
||||
}
|
||||
|
||||
@@ -245,13 +244,11 @@ message HorizontalPodAutoscalerStatus {
|
||||
|
||||
// currentMetrics is the last read state of the metrics used by this autoscaler.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated MetricStatus currentMetrics = 5;
|
||||
|
||||
// conditions is the set of conditions required for this autoscaler to scale its target,
|
||||
// and indicates whether or not those conditions are met.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated HorizontalPodAutoscalerCondition conditions = 6;
|
||||
}
|
||||
|
||||
|
||||
3
vendor/k8s.io/api/autoscaling/v2beta1/types.go
generated
vendored
3
vendor/k8s.io/api/autoscaling/v2beta1/types.go
generated
vendored
@@ -56,7 +56,6 @@ type HorizontalPodAutoscalerSpec struct {
|
||||
// increased, and vice-versa. See the individual metric source types for
|
||||
// more information about how each type of metric must respond.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Metrics []MetricSpec `json:"metrics,omitempty" protobuf:"bytes,4,rep,name=metrics"`
|
||||
}
|
||||
|
||||
@@ -261,13 +260,11 @@ type HorizontalPodAutoscalerStatus struct {
|
||||
|
||||
// currentMetrics is the last read state of the metrics used by this autoscaler.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
CurrentMetrics []MetricStatus `json:"currentMetrics" protobuf:"bytes,5,rep,name=currentMetrics"`
|
||||
|
||||
// conditions is the set of conditions required for this autoscaler to scale its target,
|
||||
// and indicates whether or not those conditions are met.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Conditions []HorizontalPodAutoscalerCondition `json:"conditions" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
|
||||
4
vendor/k8s.io/api/autoscaling/v2beta2/generated.proto
generated
vendored
4
vendor/k8s.io/api/autoscaling/v2beta2/generated.proto
generated
vendored
@@ -136,7 +136,6 @@ message HPAScalingRules {
|
||||
// policies is a list of potential scaling polices which can be used during scaling.
|
||||
// At least one policy must be specified, otherwise the HPAScalingRules will be discarded as invalid
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated HPAScalingPolicy policies = 2;
|
||||
}
|
||||
|
||||
@@ -239,7 +238,6 @@ message HorizontalPodAutoscalerSpec {
|
||||
// more information about how each type of metric must respond.
|
||||
// If not set, the default metric will be set to 80% average CPU utilization.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated MetricSpec metrics = 4;
|
||||
|
||||
// behavior configures the scaling behavior of the target
|
||||
@@ -270,13 +268,11 @@ message HorizontalPodAutoscalerStatus {
|
||||
|
||||
// currentMetrics is the last read state of the metrics used by this autoscaler.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated MetricStatus currentMetrics = 5;
|
||||
|
||||
// conditions is the set of conditions required for this autoscaler to scale its target,
|
||||
// and indicates whether or not those conditions are met.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated HorizontalPodAutoscalerCondition conditions = 6;
|
||||
}
|
||||
|
||||
|
||||
4
vendor/k8s.io/api/autoscaling/v2beta2/types.go
generated
vendored
4
vendor/k8s.io/api/autoscaling/v2beta2/types.go
generated
vendored
@@ -76,7 +76,6 @@ type HorizontalPodAutoscalerSpec struct {
|
||||
// more information about how each type of metric must respond.
|
||||
// If not set, the default metric will be set to 80% average CPU utilization.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Metrics []MetricSpec `json:"metrics,omitempty" protobuf:"bytes,4,rep,name=metrics"`
|
||||
|
||||
// behavior configures the scaling behavior of the target
|
||||
@@ -200,7 +199,6 @@ type HPAScalingRules struct {
|
||||
// policies is a list of potential scaling polices which can be used during scaling.
|
||||
// At least one policy must be specified, otherwise the HPAScalingRules will be discarded as invalid
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Policies []HPAScalingPolicy `json:"policies,omitempty" protobuf:"bytes,2,rep,name=policies"`
|
||||
}
|
||||
|
||||
@@ -395,13 +393,11 @@ type HorizontalPodAutoscalerStatus struct {
|
||||
|
||||
// currentMetrics is the last read state of the metrics used by this autoscaler.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
CurrentMetrics []MetricStatus `json:"currentMetrics" protobuf:"bytes,5,rep,name=currentMetrics"`
|
||||
|
||||
// conditions is the set of conditions required for this autoscaler to scale its target,
|
||||
// and indicates whether or not those conditions are met.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Conditions []HorizontalPodAutoscalerCondition `json:"conditions" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
|
||||
120
vendor/k8s.io/api/core/v1/generated.proto
generated
vendored
120
vendor/k8s.io/api/core/v1/generated.proto
generated
vendored
@@ -93,7 +93,6 @@ message AvoidPods {
|
||||
// Bounded-sized list of signatures of pods that should avoid this node, sorted
|
||||
// in timestamp order from oldest to newest. Size of the slice is unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PreferAvoidPodsEntry preferAvoidPods = 1;
|
||||
}
|
||||
|
||||
@@ -270,12 +269,10 @@ message CSIVolumeSource {
|
||||
message Capabilities {
|
||||
// Added capabilities
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string add = 1;
|
||||
|
||||
// Removed capabilities
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string drop = 2;
|
||||
}
|
||||
|
||||
@@ -284,7 +281,6 @@ message Capabilities {
|
||||
message CephFSPersistentVolumeSource {
|
||||
// monitors is Required: Monitors is a collection of Ceph monitors
|
||||
// More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
repeated string monitors = 1;
|
||||
|
||||
// path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /
|
||||
@@ -318,7 +314,6 @@ message CephFSPersistentVolumeSource {
|
||||
message CephFSVolumeSource {
|
||||
// monitors is Required: Monitors is a collection of Ceph monitors
|
||||
// More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
repeated string monitors = 1;
|
||||
|
||||
// path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /
|
||||
@@ -503,8 +498,6 @@ message ComponentStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ComponentCondition conditions = 2;
|
||||
}
|
||||
|
||||
@@ -635,7 +628,6 @@ message ConfigMapProjection {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated KeyToPath items = 2;
|
||||
|
||||
// optional specify whether the ConfigMap or its keys must be defined
|
||||
@@ -660,7 +652,6 @@ message ConfigMapVolumeSource {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated KeyToPath items = 2;
|
||||
|
||||
// defaultMode is optional: mode bits used to set permissions on created files by default.
|
||||
@@ -701,7 +692,6 @@ message Container {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string command = 3;
|
||||
|
||||
// Arguments to the entrypoint.
|
||||
@@ -713,7 +703,6 @@ message Container {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string args = 4;
|
||||
|
||||
// Container's working directory.
|
||||
@@ -745,7 +734,6 @@ message Container {
|
||||
// Values defined by an Env with a duplicate key will take precedence.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EnvFromSource envFrom = 19;
|
||||
|
||||
// List of environment variables to set in the container.
|
||||
@@ -753,8 +741,6 @@ message Container {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated EnvVar env = 7;
|
||||
|
||||
// Compute Resources required by this container.
|
||||
@@ -793,15 +779,11 @@ message Container {
|
||||
// +optional
|
||||
// +patchMergeKey=mountPath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=mountPath
|
||||
repeated VolumeMount volumeMounts = 9;
|
||||
|
||||
// volumeDevices is the list of block devices to be used by the container.
|
||||
// +patchMergeKey=devicePath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=devicePath
|
||||
// +optional
|
||||
repeated VolumeDevice volumeDevices = 21;
|
||||
|
||||
@@ -895,7 +877,6 @@ message ContainerImage {
|
||||
// Names by which this image is known.
|
||||
// e.g. ["kubernetes.example/hyperkube:v1.0.7", "cloud-vendor.registry.example/cloud-vendor/hyperkube:v1.0.7"]
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string names = 1;
|
||||
|
||||
// The size of the image in bytes.
|
||||
@@ -1095,7 +1076,6 @@ message DaemonEndpoint {
|
||||
message DownwardAPIProjection {
|
||||
// Items is a list of DownwardAPIVolume file
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated DownwardAPIVolumeFile items = 1;
|
||||
}
|
||||
|
||||
@@ -1128,7 +1108,6 @@ message DownwardAPIVolumeFile {
|
||||
message DownwardAPIVolumeSource {
|
||||
// Items is a list of downward API volume file
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated DownwardAPIVolumeFile items = 1;
|
||||
|
||||
// Optional: mode bits to use on created files by default. Must be a
|
||||
@@ -1239,19 +1218,16 @@ message EndpointSubset {
|
||||
// IP addresses which offer the related ports that are marked as ready. These endpoints
|
||||
// should be considered safe for load balancers and clients to utilize.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EndpointAddress addresses = 1;
|
||||
|
||||
// IP addresses which offer the related ports but are not currently marked as ready
|
||||
// because they have not yet finished starting, have recently failed a readiness check,
|
||||
// or have recently failed a liveness check.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EndpointAddress notReadyAddresses = 2;
|
||||
|
||||
// Port numbers available on the related IP addresses.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EndpointPort ports = 3;
|
||||
}
|
||||
|
||||
@@ -1282,7 +1258,6 @@ message Endpoints {
|
||||
// NotReadyAddresses in the same subset.
|
||||
// Sets of addresses and ports that comprise a service.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EndpointSubset subsets = 2;
|
||||
}
|
||||
|
||||
@@ -1402,7 +1377,6 @@ message EphemeralContainerCommon {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string command = 3;
|
||||
|
||||
// Arguments to the entrypoint.
|
||||
@@ -1414,7 +1388,6 @@ message EphemeralContainerCommon {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string args = 4;
|
||||
|
||||
// Container's working directory.
|
||||
@@ -1440,7 +1413,6 @@ message EphemeralContainerCommon {
|
||||
// Values defined by an Env with a duplicate key will take precedence.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EnvFromSource envFrom = 19;
|
||||
|
||||
// List of environment variables to set in the container.
|
||||
@@ -1448,8 +1420,6 @@ message EphemeralContainerCommon {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated EnvVar env = 7;
|
||||
|
||||
// Resources are not allowed for ephemeral containers. Ephemeral containers use spare resources
|
||||
@@ -1476,15 +1446,11 @@ message EphemeralContainerCommon {
|
||||
// +optional
|
||||
// +patchMergeKey=mountPath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=mountPath
|
||||
repeated VolumeMount volumeMounts = 9;
|
||||
|
||||
// volumeDevices is the list of block devices to be used by the container.
|
||||
// +patchMergeKey=devicePath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=devicePath
|
||||
// +optional
|
||||
repeated VolumeDevice volumeDevices = 21;
|
||||
|
||||
@@ -1695,7 +1661,6 @@ message ExecAction {
|
||||
// a shell, you need to explicitly call out to that shell.
|
||||
// Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string command = 1;
|
||||
}
|
||||
|
||||
@@ -1705,7 +1670,6 @@ message ExecAction {
|
||||
message FCVolumeSource {
|
||||
// targetWWNs is Optional: FC target worldwide names (WWNs)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string targetWWNs = 1;
|
||||
|
||||
// lun is Optional: FC target lun number
|
||||
@@ -1727,7 +1691,6 @@ message FCVolumeSource {
|
||||
// wwids Optional: FC volume world wide identifiers (wwids)
|
||||
// Either wwids or combination of targetWWNs and lun must be set, but not both simultaneously.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string wwids = 5;
|
||||
}
|
||||
|
||||
@@ -1940,7 +1903,6 @@ message HTTPGetAction {
|
||||
|
||||
// Custom headers to set in the request. HTTP allows repeated headers.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated HTTPHeader httpHeaders = 5;
|
||||
}
|
||||
|
||||
@@ -1961,7 +1923,6 @@ message HostAlias {
|
||||
optional string ip = 1;
|
||||
|
||||
// Hostnames for the above IP address.
|
||||
// +listType=atomic
|
||||
repeated string hostnames = 2;
|
||||
}
|
||||
|
||||
@@ -2021,7 +1982,6 @@ message ISCSIPersistentVolumeSource {
|
||||
// portals is the iSCSI Target Portal List. The Portal is either an IP or ip_addr:port if the port
|
||||
// is other than default (typically TCP ports 860 and 3260).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string portals = 7;
|
||||
|
||||
// chapAuthDiscovery defines whether support iSCSI Discovery CHAP authentication
|
||||
@@ -2078,7 +2038,6 @@ message ISCSIVolumeSource {
|
||||
// portals is the iSCSI Target Portal List. The portal is either an IP or ip_addr:port if the port
|
||||
// is other than default (typically TCP ports 860 and 3260).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string portals = 7;
|
||||
|
||||
// chapAuthDiscovery defines whether support iSCSI Discovery CHAP authentication
|
||||
@@ -2222,7 +2181,6 @@ message LimitRangeList {
|
||||
// LimitRangeSpec defines a min/max usage limit for resources that match on kind.
|
||||
message LimitRangeSpec {
|
||||
// Limits is the list of LimitRangeItem objects that are enforced.
|
||||
// +listType=atomic
|
||||
repeated LimitRangeItem limits = 1;
|
||||
}
|
||||
|
||||
@@ -2271,7 +2229,6 @@ message LoadBalancerStatus {
|
||||
// Ingress is a list containing ingress points for the load-balancer.
|
||||
// Traffic intended for the service should be sent to these ingress points.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated LoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -2390,7 +2347,6 @@ message NamespaceSpec {
|
||||
// Finalizers is an opaque list of values that must be empty to permanently remove object from storage.
|
||||
// More info: https://kubernetes.io/docs/tasks/administer-cluster/namespaces/
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string finalizers = 1;
|
||||
}
|
||||
|
||||
@@ -2405,8 +2361,6 @@ message NamespaceStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated NamespaceCondition conditions = 2;
|
||||
}
|
||||
|
||||
@@ -2460,7 +2414,6 @@ message NodeAffinity {
|
||||
// "weight" to the sum if the node matches the corresponding matchExpressions; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PreferredSchedulingTerm preferredDuringSchedulingIgnoredDuringExecution = 2;
|
||||
}
|
||||
|
||||
@@ -2584,7 +2537,6 @@ message NodeResources {
|
||||
// +structType=atomic
|
||||
message NodeSelector {
|
||||
// Required. A list of node selector terms. The terms are ORed.
|
||||
// +listType=atomic
|
||||
repeated NodeSelectorTerm nodeSelectorTerms = 1;
|
||||
}
|
||||
|
||||
@@ -2604,7 +2556,6 @@ message NodeSelectorRequirement {
|
||||
// array must have a single element, which will be interpreted as an integer.
|
||||
// This array is replaced during a strategic merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string values = 3;
|
||||
}
|
||||
|
||||
@@ -2615,12 +2566,10 @@ message NodeSelectorRequirement {
|
||||
message NodeSelectorTerm {
|
||||
// A list of node selector requirements by node's labels.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NodeSelectorRequirement matchExpressions = 1;
|
||||
|
||||
// A list of node selector requirements by node's fields.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NodeSelectorRequirement matchFields = 2;
|
||||
}
|
||||
|
||||
@@ -2635,7 +2584,6 @@ message NodeSpec {
|
||||
// each of IPv4 and IPv6.
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +listType=set
|
||||
repeated string podCIDRs = 7;
|
||||
|
||||
// ID of the node assigned by the cloud provider in the format: <ProviderName>://<ProviderSpecificNodeID>
|
||||
@@ -2649,7 +2597,6 @@ message NodeSpec {
|
||||
|
||||
// If specified, the node's taints.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Taint taints = 5;
|
||||
|
||||
// Deprecated: Previously used to specify the source of the node's configuration for the DynamicKubeletConfig feature. This feature is removed.
|
||||
@@ -2685,8 +2632,6 @@ message NodeStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated NodeCondition conditions = 4;
|
||||
|
||||
// List of addresses reachable to the node.
|
||||
@@ -2702,8 +2647,6 @@ message NodeStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated NodeAddress addresses = 5;
|
||||
|
||||
// Endpoints of daemons running on the Node.
|
||||
@@ -2717,17 +2660,14 @@ message NodeStatus {
|
||||
|
||||
// List of container images on this node
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ContainerImage images = 8;
|
||||
|
||||
// List of attachable volumes in use (mounted) by the node.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string volumesInUse = 9;
|
||||
|
||||
// List of volumes that are attached to the node.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated AttachedVolume volumesAttached = 10;
|
||||
|
||||
// Status of the config assigned to the node via the dynamic Kubelet config feature.
|
||||
@@ -2900,7 +2840,7 @@ message PersistentVolumeClaimCondition {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 4;
|
||||
|
||||
// reason is a unique, this should be a short, machine understandable string that gives the reason
|
||||
// for condition's last transition. If it reports "Resizing" that means the underlying
|
||||
// for condition's last transition. If it reports "ResizeStarted" that means the underlying
|
||||
// persistent volume is being resized.
|
||||
// +optional
|
||||
optional string reason = 5;
|
||||
@@ -2928,7 +2868,6 @@ message PersistentVolumeClaimSpec {
|
||||
// accessModes contains the desired access modes the volume should have.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string accessModes = 1;
|
||||
|
||||
// selector is a label query over volumes to consider for binding.
|
||||
@@ -3020,7 +2959,6 @@ message PersistentVolumeClaimStatus {
|
||||
// accessModes contains the actual access modes the volume backing the PVC has.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string accessModes = 2;
|
||||
|
||||
// capacity represents the actual resources of the underlying volume.
|
||||
@@ -3028,12 +2966,10 @@ message PersistentVolumeClaimStatus {
|
||||
map<string, k8s.io.apimachinery.pkg.api.resource.Quantity> capacity = 3;
|
||||
|
||||
// conditions is the current Condition of persistent volume claim. If underlying persistent volume is being
|
||||
// resized then the Condition will be set to 'Resizing'.
|
||||
// resized then the Condition will be set to 'ResizeStarted'.
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated PersistentVolumeClaimCondition conditions = 4;
|
||||
|
||||
// allocatedResources tracks the resources allocated to a PVC including its capacity.
|
||||
@@ -3281,7 +3217,6 @@ message PersistentVolumeSpec {
|
||||
// accessModes contains all ways the volume can be mounted.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string accessModes = 3;
|
||||
|
||||
// claimRef is part of a bi-directional binding between PersistentVolume and PersistentVolumeClaim.
|
||||
@@ -3309,7 +3244,6 @@ message PersistentVolumeSpec {
|
||||
// simply fail if one is invalid.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#mount-options
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string mountOptions = 7;
|
||||
|
||||
// volumeMode defines if a volume is intended to be used with a formatted filesystem
|
||||
@@ -3401,7 +3335,6 @@ message PodAffinity {
|
||||
// When there are multiple elements, the lists of nodes corresponding to each
|
||||
// podAffinityTerm are intersected, i.e. all terms must be satisfied.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PodAffinityTerm requiredDuringSchedulingIgnoredDuringExecution = 1;
|
||||
|
||||
// The scheduler will prefer to schedule pods to nodes that satisfy
|
||||
@@ -3414,7 +3347,6 @@ message PodAffinity {
|
||||
// "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated WeightedPodAffinityTerm preferredDuringSchedulingIgnoredDuringExecution = 2;
|
||||
}
|
||||
|
||||
@@ -3435,7 +3367,6 @@ message PodAffinityTerm {
|
||||
// and the ones selected by namespaceSelector.
|
||||
// null or empty namespaces list and null namespaceSelector means "this pod's namespace".
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string namespaces = 2;
|
||||
|
||||
// This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching
|
||||
@@ -3490,7 +3421,6 @@ message PodAntiAffinity {
|
||||
// When there are multiple elements, the lists of nodes corresponding to each
|
||||
// podAffinityTerm are intersected, i.e. all terms must be satisfied.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PodAffinityTerm requiredDuringSchedulingIgnoredDuringExecution = 1;
|
||||
|
||||
// The scheduler will prefer to schedule pods to nodes that satisfy
|
||||
@@ -3503,7 +3433,6 @@ message PodAntiAffinity {
|
||||
// "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated WeightedPodAffinityTerm preferredDuringSchedulingIgnoredDuringExecution = 2;
|
||||
}
|
||||
|
||||
@@ -3575,14 +3504,12 @@ message PodDNSConfig {
|
||||
// This will be appended to the base nameservers generated from DNSPolicy.
|
||||
// Duplicated nameservers will be removed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nameservers = 1;
|
||||
|
||||
// A list of DNS search domains for host-name lookup.
|
||||
// This will be appended to the base search paths generated from DNSPolicy.
|
||||
// Duplicated search paths will be removed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string searches = 2;
|
||||
|
||||
// A list of DNS resolver options.
|
||||
@@ -3590,7 +3517,6 @@ message PodDNSConfig {
|
||||
// Duplicated entries will be removed. Resolution options given in Options
|
||||
// will override those that appear in the base DNSPolicy.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PodDNSConfigOption options = 3;
|
||||
}
|
||||
|
||||
@@ -3632,7 +3558,6 @@ message PodExecOptions {
|
||||
optional string container = 5;
|
||||
|
||||
// Command is the remote command to execute. argv array. Not executed within a shell.
|
||||
// +listType=atomic
|
||||
repeated string command = 6;
|
||||
}
|
||||
|
||||
@@ -3727,7 +3652,6 @@ message PodPortForwardOptions {
|
||||
// List of ports to forward
|
||||
// Required when using WebSockets
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated int32 ports = 1;
|
||||
}
|
||||
|
||||
@@ -3836,7 +3760,6 @@ message PodSecurityContext {
|
||||
// even if they are not included in this list.
|
||||
// Note that this field cannot be set when spec.os.name is windows.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated int64 supplementalGroups = 4;
|
||||
|
||||
// A special supplemental group that applies to all containers in a pod.
|
||||
@@ -3856,7 +3779,6 @@ message PodSecurityContext {
|
||||
// sysctls (by the container runtime) might fail to launch.
|
||||
// Note that this field cannot be set when spec.os.name is windows.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Sysctl sysctls = 7;
|
||||
|
||||
// fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
|
||||
@@ -3890,8 +3812,6 @@ message PodSpec {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge,retainKeys
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated Volume volumes = 1;
|
||||
|
||||
// List of initialization containers belonging to the pod.
|
||||
@@ -3909,8 +3829,6 @@ message PodSpec {
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated Container initContainers = 20;
|
||||
|
||||
// List of containers belonging to the pod.
|
||||
@@ -3919,8 +3837,6 @@ message PodSpec {
|
||||
// Cannot be updated.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated Container containers = 2;
|
||||
|
||||
// List of ephemeral containers run in this pod. Ephemeral containers may be run in an existing
|
||||
@@ -3930,8 +3846,6 @@ message PodSpec {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated EphemeralContainer ephemeralContainers = 34;
|
||||
|
||||
// Restart policy for all containers within the pod.
|
||||
@@ -4034,8 +3948,6 @@ message PodSpec {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated LocalObjectReference imagePullSecrets = 15;
|
||||
|
||||
// Specifies the hostname of the Pod
|
||||
@@ -4059,7 +3971,6 @@ message PodSpec {
|
||||
|
||||
// If specified, the pod's tolerations.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Toleration tolerations = 22;
|
||||
|
||||
// HostAliases is an optional list of hosts and IPs that will be injected into the pod's hosts
|
||||
@@ -4067,8 +3978,6 @@ message PodSpec {
|
||||
// +optional
|
||||
// +patchMergeKey=ip
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=ip
|
||||
repeated HostAlias hostAliases = 23;
|
||||
|
||||
// If specified, indicates the pod's priority. "system-node-critical" and
|
||||
@@ -4099,7 +4008,6 @@ message PodSpec {
|
||||
// all conditions specified in the readiness gates have status equal to "True"
|
||||
// More info: https://git.k8s.io/enhancements/keps/sig-network/580-pod-readiness-gates
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PodReadinessGate readinessGates = 28;
|
||||
|
||||
// RuntimeClassName refers to a RuntimeClass object in the node.k8s.io group, which should be used
|
||||
@@ -4260,8 +4168,6 @@ message PodStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated PodCondition conditions = 2;
|
||||
|
||||
// A human readable message indicating details about why the pod is in this condition.
|
||||
@@ -4310,8 +4216,6 @@ message PodStatus {
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +patchMergeKey=ip
|
||||
// +listType=map
|
||||
// +listMapKey=ip
|
||||
repeated PodIP podIPs = 12;
|
||||
|
||||
// RFC 3339 date and time at which the object was acknowledged by the Kubelet.
|
||||
@@ -4323,13 +4227,11 @@ message PodStatus {
|
||||
// init container will have ready = true, the most recently started container will have
|
||||
// startTime set.
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status
|
||||
// +listType=atomic
|
||||
repeated ContainerStatus initContainerStatuses = 10;
|
||||
|
||||
// The list has one entry per container in the manifest.
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ContainerStatus containerStatuses = 8;
|
||||
|
||||
// The Quality of Service (QOS) classification assigned to the pod based on resource requirements
|
||||
@@ -4340,7 +4242,6 @@ message PodStatus {
|
||||
|
||||
// Status for any ephemeral containers that have run in this pod.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ContainerStatus ephemeralContainerStatuses = 13;
|
||||
|
||||
// Status of resources resize desired for pod's containers.
|
||||
@@ -4558,7 +4459,6 @@ message ProbeHandler {
|
||||
message ProjectedVolumeSource {
|
||||
// sources is the list of volume projections
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated VolumeProjection sources = 1;
|
||||
|
||||
// defaultMode are the mode bits used to set permissions on created files by default.
|
||||
@@ -4608,7 +4508,6 @@ message QuobyteVolumeSource {
|
||||
message RBDPersistentVolumeSource {
|
||||
// monitors is a collection of Ceph monitors.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
repeated string monitors = 1;
|
||||
|
||||
// image is the rados image name.
|
||||
@@ -4660,7 +4559,6 @@ message RBDPersistentVolumeSource {
|
||||
message RBDVolumeSource {
|
||||
// monitors is a collection of Ceph monitors.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
repeated string monitors = 1;
|
||||
|
||||
// image is the rados image name.
|
||||
@@ -4835,8 +4733,6 @@ message ReplicationControllerStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ReplicationControllerCondition conditions = 6;
|
||||
}
|
||||
|
||||
@@ -4903,7 +4799,6 @@ message ResourceQuotaSpec {
|
||||
// A collection of filters that must match each object tracked by a quota.
|
||||
// If not specified, the quota matches all objects.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string scopes = 2;
|
||||
|
||||
// scopeSelector is also a collection of filters like scopes that must match each object tracked by a quota
|
||||
@@ -5071,7 +4966,6 @@ message ScaleIOVolumeSource {
|
||||
message ScopeSelector {
|
||||
// A list of scope selector requirements by scope of the resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ScopedResourceSelectorRequirement matchExpressions = 1;
|
||||
}
|
||||
|
||||
@@ -5090,7 +4984,6 @@ message ScopedResourceSelectorRequirement {
|
||||
// the values array must be empty.
|
||||
// This array is replaced during a strategic merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string values = 3;
|
||||
}
|
||||
|
||||
@@ -5208,7 +5101,6 @@ message SecretProjection {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated KeyToPath items = 2;
|
||||
|
||||
// optional field specify whether the Secret or its key must be defined
|
||||
@@ -5248,7 +5140,6 @@ message SecretVolumeSource {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated KeyToPath items = 2;
|
||||
|
||||
// defaultMode is Optional: mode bits used to set permissions on created files by default.
|
||||
@@ -5402,8 +5293,6 @@ message ServiceAccount {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated ObjectReference secrets = 2;
|
||||
|
||||
// ImagePullSecrets is a list of references to secrets in the same namespace to use for pulling any images
|
||||
@@ -5411,7 +5300,6 @@ message ServiceAccount {
|
||||
// can be mounted in the pod, but ImagePullSecrets are only accessed by the kubelet.
|
||||
// More info: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated LocalObjectReference imagePullSecrets = 3;
|
||||
|
||||
// AutomountServiceAccountToken indicates whether pods running as this service account should have an API token automatically mounted.
|
||||
@@ -5632,7 +5520,6 @@ message ServiceSpec {
|
||||
// at a node with this IP. A common example is external load-balancers
|
||||
// that are not part of the Kubernetes system.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string externalIPs = 5;
|
||||
|
||||
// Supports "ClientIP" and "None". Used to maintain session affinity.
|
||||
@@ -5658,7 +5545,6 @@ message ServiceSpec {
|
||||
// cloud-provider does not support the feature."
|
||||
// More info: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string loadBalancerSourceRanges = 9;
|
||||
|
||||
// externalName is the external reference that discovery mechanisms will
|
||||
@@ -5952,7 +5838,6 @@ message TopologySelectorLabelRequirement {
|
||||
|
||||
// An array of string values. One value must match the label to be selected.
|
||||
// Each entry in Values is ORed.
|
||||
// +listType=atomic
|
||||
repeated string values = 2;
|
||||
}
|
||||
|
||||
@@ -5965,7 +5850,6 @@ message TopologySelectorLabelRequirement {
|
||||
message TopologySelectorTerm {
|
||||
// A list of topology selector requirements by labels.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated TopologySelectorLabelRequirement matchLabelExpressions = 1;
|
||||
}
|
||||
|
||||
|
||||
121
vendor/k8s.io/api/core/v1/types.go
generated
vendored
121
vendor/k8s.io/api/core/v1/types.go
generated
vendored
@@ -331,7 +331,6 @@ type PersistentVolumeSpec struct {
|
||||
// accessModes contains all ways the volume can be mounted.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AccessModes []PersistentVolumeAccessMode `json:"accessModes,omitempty" protobuf:"bytes,3,rep,name=accessModes,casttype=PersistentVolumeAccessMode"`
|
||||
// claimRef is part of a bi-directional binding between PersistentVolume and PersistentVolumeClaim.
|
||||
// Expected to be non-nil when bound.
|
||||
@@ -355,7 +354,6 @@ type PersistentVolumeSpec struct {
|
||||
// simply fail if one is invalid.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#mount-options
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MountOptions []string `json:"mountOptions,omitempty" protobuf:"bytes,7,opt,name=mountOptions"`
|
||||
// volumeMode defines if a volume is intended to be used with a formatted filesystem
|
||||
// or to remain in raw block state. Value of Filesystem is implied when not included in spec.
|
||||
@@ -488,7 +486,6 @@ type PersistentVolumeClaimSpec struct {
|
||||
// accessModes contains the desired access modes the volume should have.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AccessModes []PersistentVolumeAccessMode `json:"accessModes,omitempty" protobuf:"bytes,1,rep,name=accessModes,casttype=PersistentVolumeAccessMode"`
|
||||
// selector is a label query over volumes to consider for binding.
|
||||
// +optional
|
||||
@@ -663,7 +660,7 @@ type PersistentVolumeClaimCondition struct {
|
||||
// +optional
|
||||
LastTransitionTime metav1.Time `json:"lastTransitionTime,omitempty" protobuf:"bytes,4,opt,name=lastTransitionTime"`
|
||||
// reason is a unique, this should be a short, machine understandable string that gives the reason
|
||||
// for condition's last transition. If it reports "Resizing" that means the underlying
|
||||
// for condition's last transition. If it reports "ResizeStarted" that means the underlying
|
||||
// persistent volume is being resized.
|
||||
// +optional
|
||||
Reason string `json:"reason,omitempty" protobuf:"bytes,5,opt,name=reason"`
|
||||
@@ -680,18 +677,15 @@ type PersistentVolumeClaimStatus struct {
|
||||
// accessModes contains the actual access modes the volume backing the PVC has.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AccessModes []PersistentVolumeAccessMode `json:"accessModes,omitempty" protobuf:"bytes,2,rep,name=accessModes,casttype=PersistentVolumeAccessMode"`
|
||||
// capacity represents the actual resources of the underlying volume.
|
||||
// +optional
|
||||
Capacity ResourceList `json:"capacity,omitempty" protobuf:"bytes,3,rep,name=capacity,casttype=ResourceList,castkey=ResourceName"`
|
||||
// conditions is the current Condition of persistent volume claim. If underlying persistent volume is being
|
||||
// resized then the Condition will be set to 'Resizing'.
|
||||
// resized then the Condition will be set to 'ResizeStarted'.
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []PersistentVolumeClaimCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,4,rep,name=conditions"`
|
||||
// allocatedResources tracks the resources allocated to a PVC including its capacity.
|
||||
// Key names follow standard Kubernetes label syntax. Valid values are either:
|
||||
@@ -927,7 +921,6 @@ type GlusterfsPersistentVolumeSource struct {
|
||||
type RBDVolumeSource struct {
|
||||
// monitors is a collection of Ceph monitors.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
CephMonitors []string `json:"monitors" protobuf:"bytes,1,rep,name=monitors"`
|
||||
// image is the rados image name.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
@@ -972,7 +965,6 @@ type RBDVolumeSource struct {
|
||||
type RBDPersistentVolumeSource struct {
|
||||
// monitors is a collection of Ceph monitors.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
CephMonitors []string `json:"monitors" protobuf:"bytes,1,rep,name=monitors"`
|
||||
// image is the rados image name.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
@@ -1067,7 +1059,6 @@ type CinderPersistentVolumeSource struct {
|
||||
type CephFSVolumeSource struct {
|
||||
// monitors is Required: Monitors is a collection of Ceph monitors
|
||||
// More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
Monitors []string `json:"monitors" protobuf:"bytes,1,rep,name=monitors"`
|
||||
// path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /
|
||||
// +optional
|
||||
@@ -1108,7 +1099,6 @@ type SecretReference struct {
|
||||
type CephFSPersistentVolumeSource struct {
|
||||
// monitors is Required: Monitors is a collection of Ceph monitors
|
||||
// More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
Monitors []string `json:"monitors" protobuf:"bytes,1,rep,name=monitors"`
|
||||
// path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /
|
||||
// +optional
|
||||
@@ -1351,7 +1341,6 @@ type SecretVolumeSource struct {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []KeyToPath `json:"items,omitempty" protobuf:"bytes,2,rep,name=items"`
|
||||
// defaultMode is Optional: mode bits used to set permissions on created files by default.
|
||||
// Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511.
|
||||
@@ -1387,7 +1376,6 @@ type SecretProjection struct {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []KeyToPath `json:"items,omitempty" protobuf:"bytes,2,rep,name=items"`
|
||||
// optional field specify whether the Secret or its key must be defined
|
||||
// +optional
|
||||
@@ -1441,7 +1429,6 @@ type ISCSIVolumeSource struct {
|
||||
// portals is the iSCSI Target Portal List. The portal is either an IP or ip_addr:port if the port
|
||||
// is other than default (typically TCP ports 860 and 3260).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Portals []string `json:"portals,omitempty" protobuf:"bytes,7,opt,name=portals"`
|
||||
// chapAuthDiscovery defines whether support iSCSI Discovery CHAP authentication
|
||||
// +optional
|
||||
@@ -1488,7 +1475,6 @@ type ISCSIPersistentVolumeSource struct {
|
||||
// portals is the iSCSI Target Portal List. The Portal is either an IP or ip_addr:port if the port
|
||||
// is other than default (typically TCP ports 860 and 3260).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Portals []string `json:"portals,omitempty" protobuf:"bytes,7,opt,name=portals"`
|
||||
// chapAuthDiscovery defines whether support iSCSI Discovery CHAP authentication
|
||||
// +optional
|
||||
@@ -1512,7 +1498,6 @@ type ISCSIPersistentVolumeSource struct {
|
||||
type FCVolumeSource struct {
|
||||
// targetWWNs is Optional: FC target worldwide names (WWNs)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TargetWWNs []string `json:"targetWWNs,omitempty" protobuf:"bytes,1,rep,name=targetWWNs"`
|
||||
// lun is Optional: FC target lun number
|
||||
// +optional
|
||||
@@ -1530,7 +1515,6 @@ type FCVolumeSource struct {
|
||||
// wwids Optional: FC volume world wide identifiers (wwids)
|
||||
// Either wwids or combination of targetWWNs and lun must be set, but not both simultaneously.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
WWIDs []string `json:"wwids,omitempty" protobuf:"bytes,5,rep,name=wwids"`
|
||||
}
|
||||
|
||||
@@ -1787,7 +1771,6 @@ type ConfigMapVolumeSource struct {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []KeyToPath `json:"items,omitempty" protobuf:"bytes,2,rep,name=items"`
|
||||
// defaultMode is optional: mode bits used to set permissions on created files by default.
|
||||
// Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511.
|
||||
@@ -1824,7 +1807,6 @@ type ConfigMapProjection struct {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []KeyToPath `json:"items,omitempty" protobuf:"bytes,2,rep,name=items"`
|
||||
// optional specify whether the ConfigMap or its keys must be defined
|
||||
// +optional
|
||||
@@ -1893,7 +1875,6 @@ type ClusterTrustBundleProjection struct {
|
||||
type ProjectedVolumeSource struct {
|
||||
// sources is the list of volume projections
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Sources []VolumeProjection `json:"sources" protobuf:"bytes,1,rep,name=sources"`
|
||||
// defaultMode are the mode bits used to set permissions on created files by default.
|
||||
// Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511.
|
||||
@@ -2366,7 +2347,6 @@ type HTTPGetAction struct {
|
||||
Scheme URIScheme `json:"scheme,omitempty" protobuf:"bytes,4,opt,name=scheme,casttype=URIScheme"`
|
||||
// Custom headers to set in the request. HTTP allows repeated headers.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
HTTPHeaders []HTTPHeader `json:"httpHeaders,omitempty" protobuf:"bytes,5,rep,name=httpHeaders"`
|
||||
}
|
||||
|
||||
@@ -2413,7 +2393,6 @@ type ExecAction struct {
|
||||
// a shell, you need to explicitly call out to that shell.
|
||||
// Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Command []string `json:"command,omitempty" protobuf:"bytes,1,rep,name=command"`
|
||||
}
|
||||
|
||||
@@ -2535,11 +2514,9 @@ type Capability string
|
||||
type Capabilities struct {
|
||||
// Added capabilities
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Add []Capability `json:"add,omitempty" protobuf:"bytes,1,rep,name=add,casttype=Capability"`
|
||||
// Removed capabilities
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Drop []Capability `json:"drop,omitempty" protobuf:"bytes,2,rep,name=drop,casttype=Capability"`
|
||||
}
|
||||
|
||||
@@ -2625,7 +2602,6 @@ type Container struct {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Command []string `json:"command,omitempty" protobuf:"bytes,3,rep,name=command"`
|
||||
// Arguments to the entrypoint.
|
||||
// The container image's CMD is used if this is not provided.
|
||||
@@ -2636,7 +2612,6 @@ type Container struct {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Args []string `json:"args,omitempty" protobuf:"bytes,4,rep,name=args"`
|
||||
// Container's working directory.
|
||||
// If not specified, the container runtime's default will be used, which
|
||||
@@ -2665,15 +2640,12 @@ type Container struct {
|
||||
// Values defined by an Env with a duplicate key will take precedence.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
EnvFrom []EnvFromSource `json:"envFrom,omitempty" protobuf:"bytes,19,rep,name=envFrom"`
|
||||
// List of environment variables to set in the container.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Env []EnvVar `json:"env,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,7,rep,name=env"`
|
||||
// Compute Resources required by this container.
|
||||
// Cannot be updated.
|
||||
@@ -2708,14 +2680,10 @@ type Container struct {
|
||||
// +optional
|
||||
// +patchMergeKey=mountPath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=mountPath
|
||||
VolumeMounts []VolumeMount `json:"volumeMounts,omitempty" patchStrategy:"merge" patchMergeKey:"mountPath" protobuf:"bytes,9,rep,name=volumeMounts"`
|
||||
// volumeDevices is the list of block devices to be used by the container.
|
||||
// +patchMergeKey=devicePath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=devicePath
|
||||
// +optional
|
||||
VolumeDevices []VolumeDevice `json:"volumeDevices,omitempty" patchStrategy:"merge" patchMergeKey:"devicePath" protobuf:"bytes,21,rep,name=volumeDevices"`
|
||||
// Periodic probe of container liveness.
|
||||
@@ -3155,7 +3123,6 @@ const (
|
||||
// +structType=atomic
|
||||
type NodeSelector struct {
|
||||
// Required. A list of node selector terms. The terms are ORed.
|
||||
// +listType=atomic
|
||||
NodeSelectorTerms []NodeSelectorTerm `json:"nodeSelectorTerms" protobuf:"bytes,1,rep,name=nodeSelectorTerms"`
|
||||
}
|
||||
|
||||
@@ -3166,11 +3133,9 @@ type NodeSelector struct {
|
||||
type NodeSelectorTerm struct {
|
||||
// A list of node selector requirements by node's labels.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchExpressions []NodeSelectorRequirement `json:"matchExpressions,omitempty" protobuf:"bytes,1,rep,name=matchExpressions"`
|
||||
// A list of node selector requirements by node's fields.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchFields []NodeSelectorRequirement `json:"matchFields,omitempty" protobuf:"bytes,2,rep,name=matchFields"`
|
||||
}
|
||||
|
||||
@@ -3188,7 +3153,6 @@ type NodeSelectorRequirement struct {
|
||||
// array must have a single element, which will be interpreted as an integer.
|
||||
// This array is replaced during a strategic merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Values []string `json:"values,omitempty" protobuf:"bytes,3,rep,name=values"`
|
||||
}
|
||||
|
||||
@@ -3217,7 +3181,6 @@ type TopologySelectorTerm struct {
|
||||
|
||||
// A list of topology selector requirements by labels.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchLabelExpressions []TopologySelectorLabelRequirement `json:"matchLabelExpressions,omitempty" protobuf:"bytes,1,rep,name=matchLabelExpressions"`
|
||||
}
|
||||
|
||||
@@ -3228,7 +3191,6 @@ type TopologySelectorLabelRequirement struct {
|
||||
Key string `json:"key" protobuf:"bytes,1,opt,name=key"`
|
||||
// An array of string values. One value must match the label to be selected.
|
||||
// Each entry in Values is ORed.
|
||||
// +listType=atomic
|
||||
Values []string `json:"values" protobuf:"bytes,2,rep,name=values"`
|
||||
}
|
||||
|
||||
@@ -3266,7 +3228,6 @@ type PodAffinity struct {
|
||||
// When there are multiple elements, the lists of nodes corresponding to each
|
||||
// podAffinityTerm are intersected, i.e. all terms must be satisfied.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
RequiredDuringSchedulingIgnoredDuringExecution []PodAffinityTerm `json:"requiredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,1,rep,name=requiredDuringSchedulingIgnoredDuringExecution"`
|
||||
// The scheduler will prefer to schedule pods to nodes that satisfy
|
||||
// the affinity expressions specified by this field, but it may choose
|
||||
@@ -3278,7 +3239,6 @@ type PodAffinity struct {
|
||||
// "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PreferredDuringSchedulingIgnoredDuringExecution []WeightedPodAffinityTerm `json:"preferredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,2,rep,name=preferredDuringSchedulingIgnoredDuringExecution"`
|
||||
}
|
||||
|
||||
@@ -3303,7 +3263,6 @@ type PodAntiAffinity struct {
|
||||
// When there are multiple elements, the lists of nodes corresponding to each
|
||||
// podAffinityTerm are intersected, i.e. all terms must be satisfied.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
RequiredDuringSchedulingIgnoredDuringExecution []PodAffinityTerm `json:"requiredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,1,rep,name=requiredDuringSchedulingIgnoredDuringExecution"`
|
||||
// The scheduler will prefer to schedule pods to nodes that satisfy
|
||||
// the anti-affinity expressions specified by this field, but it may choose
|
||||
@@ -3315,7 +3274,6 @@ type PodAntiAffinity struct {
|
||||
// "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PreferredDuringSchedulingIgnoredDuringExecution []WeightedPodAffinityTerm `json:"preferredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,2,rep,name=preferredDuringSchedulingIgnoredDuringExecution"`
|
||||
}
|
||||
|
||||
@@ -3344,7 +3302,6 @@ type PodAffinityTerm struct {
|
||||
// and the ones selected by namespaceSelector.
|
||||
// null or empty namespaces list and null namespaceSelector means "this pod's namespace".
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Namespaces []string `json:"namespaces,omitempty" protobuf:"bytes,2,rep,name=namespaces"`
|
||||
// This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching
|
||||
// the labelSelector in the specified namespaces, where co-located is defined as running on a node
|
||||
@@ -3413,7 +3370,6 @@ type NodeAffinity struct {
|
||||
// "weight" to the sum if the node matches the corresponding matchExpressions; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PreferredDuringSchedulingIgnoredDuringExecution []PreferredSchedulingTerm `json:"preferredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,2,rep,name=preferredDuringSchedulingIgnoredDuringExecution"`
|
||||
}
|
||||
|
||||
@@ -3519,8 +3475,6 @@ type PodSpec struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge,retainKeys
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Volumes []Volume `json:"volumes,omitempty" patchStrategy:"merge,retainKeys" patchMergeKey:"name" protobuf:"bytes,1,rep,name=volumes"`
|
||||
// List of initialization containers belonging to the pod.
|
||||
// Init containers are executed in order prior to containers being started. If any
|
||||
@@ -3537,8 +3491,6 @@ type PodSpec struct {
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
InitContainers []Container `json:"initContainers,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,20,rep,name=initContainers"`
|
||||
// List of containers belonging to the pod.
|
||||
// Containers cannot currently be added or removed.
|
||||
@@ -3546,8 +3498,6 @@ type PodSpec struct {
|
||||
// Cannot be updated.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Containers []Container `json:"containers" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=containers"`
|
||||
// List of ephemeral containers run in this pod. Ephemeral containers may be run in an existing
|
||||
// pod to perform user-initiated actions such as debugging. This list cannot be specified when
|
||||
@@ -3556,8 +3506,6 @@ type PodSpec struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
EphemeralContainers []EphemeralContainer `json:"ephemeralContainers,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,34,rep,name=ephemeralContainers"`
|
||||
// Restart policy for all containers within the pod.
|
||||
// One of Always, OnFailure, Never. In some contexts, only a subset of those values may be permitted.
|
||||
@@ -3647,8 +3595,6 @@ type PodSpec struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
ImagePullSecrets []LocalObjectReference `json:"imagePullSecrets,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,15,rep,name=imagePullSecrets"`
|
||||
// Specifies the hostname of the Pod
|
||||
// If not specified, the pod's hostname will be set to a system-defined value.
|
||||
@@ -3667,15 +3613,12 @@ type PodSpec struct {
|
||||
SchedulerName string `json:"schedulerName,omitempty" protobuf:"bytes,19,opt,name=schedulerName"`
|
||||
// If specified, the pod's tolerations.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Tolerations []Toleration `json:"tolerations,omitempty" protobuf:"bytes,22,opt,name=tolerations"`
|
||||
// HostAliases is an optional list of hosts and IPs that will be injected into the pod's hosts
|
||||
// file if specified. This is only valid for non-hostNetwork pods.
|
||||
// +optional
|
||||
// +patchMergeKey=ip
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=ip
|
||||
HostAliases []HostAlias `json:"hostAliases,omitempty" patchStrategy:"merge" patchMergeKey:"ip" protobuf:"bytes,23,rep,name=hostAliases"`
|
||||
// If specified, indicates the pod's priority. "system-node-critical" and
|
||||
// "system-cluster-critical" are two special keywords which indicate the
|
||||
@@ -3702,7 +3645,6 @@ type PodSpec struct {
|
||||
// all conditions specified in the readiness gates have status equal to "True"
|
||||
// More info: https://git.k8s.io/enhancements/keps/sig-network/580-pod-readiness-gates
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ReadinessGates []PodReadinessGate `json:"readinessGates,omitempty" protobuf:"bytes,28,opt,name=readinessGates"`
|
||||
// RuntimeClassName refers to a RuntimeClass object in the node.k8s.io group, which should be used
|
||||
// to run this pod. If no RuntimeClass resource matches the named class, the pod will not be run.
|
||||
@@ -4059,7 +4001,6 @@ type HostAlias struct {
|
||||
// IP address of the host file entry.
|
||||
IP string `json:"ip,omitempty" protobuf:"bytes,1,opt,name=ip"`
|
||||
// Hostnames for the above IP address.
|
||||
// +listType=atomic
|
||||
Hostnames []string `json:"hostnames,omitempty" protobuf:"bytes,2,rep,name=hostnames"`
|
||||
}
|
||||
|
||||
@@ -4130,7 +4071,6 @@ type PodSecurityContext struct {
|
||||
// even if they are not included in this list.
|
||||
// Note that this field cannot be set when spec.os.name is windows.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
SupplementalGroups []int64 `json:"supplementalGroups,omitempty" protobuf:"varint,4,rep,name=supplementalGroups"`
|
||||
// A special supplemental group that applies to all containers in a pod.
|
||||
// Some volume types allow the Kubelet to change the ownership of that volume
|
||||
@@ -4148,7 +4088,6 @@ type PodSecurityContext struct {
|
||||
// sysctls (by the container runtime) might fail to launch.
|
||||
// Note that this field cannot be set when spec.os.name is windows.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Sysctls []Sysctl `json:"sysctls,omitempty" protobuf:"bytes,7,rep,name=sysctls"`
|
||||
// fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
|
||||
// before being exposed inside Pod. This field will only apply to
|
||||
@@ -4219,20 +4158,17 @@ type PodDNSConfig struct {
|
||||
// This will be appended to the base nameservers generated from DNSPolicy.
|
||||
// Duplicated nameservers will be removed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Nameservers []string `json:"nameservers,omitempty" protobuf:"bytes,1,rep,name=nameservers"`
|
||||
// A list of DNS search domains for host-name lookup.
|
||||
// This will be appended to the base search paths generated from DNSPolicy.
|
||||
// Duplicated search paths will be removed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Searches []string `json:"searches,omitempty" protobuf:"bytes,2,rep,name=searches"`
|
||||
// A list of DNS resolver options.
|
||||
// This will be merged with the base options generated from DNSPolicy.
|
||||
// Duplicated entries will be removed. Resolution options given in Options
|
||||
// will override those that appear in the base DNSPolicy.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Options []PodDNSConfigOption `json:"options,omitempty" protobuf:"bytes,3,rep,name=options"`
|
||||
}
|
||||
|
||||
@@ -4276,7 +4212,6 @@ type EphemeralContainerCommon struct {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Command []string `json:"command,omitempty" protobuf:"bytes,3,rep,name=command"`
|
||||
// Arguments to the entrypoint.
|
||||
// The image's CMD is used if this is not provided.
|
||||
@@ -4287,7 +4222,6 @@ type EphemeralContainerCommon struct {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Args []string `json:"args,omitempty" protobuf:"bytes,4,rep,name=args"`
|
||||
// Container's working directory.
|
||||
// If not specified, the container runtime's default will be used, which
|
||||
@@ -4310,15 +4244,12 @@ type EphemeralContainerCommon struct {
|
||||
// Values defined by an Env with a duplicate key will take precedence.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
EnvFrom []EnvFromSource `json:"envFrom,omitempty" protobuf:"bytes,19,rep,name=envFrom"`
|
||||
// List of environment variables to set in the container.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Env []EnvVar `json:"env,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,7,rep,name=env"`
|
||||
// Resources are not allowed for ephemeral containers. Ephemeral containers use spare resources
|
||||
// already allocated to the pod.
|
||||
@@ -4341,14 +4272,10 @@ type EphemeralContainerCommon struct {
|
||||
// +optional
|
||||
// +patchMergeKey=mountPath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=mountPath
|
||||
VolumeMounts []VolumeMount `json:"volumeMounts,omitempty" patchStrategy:"merge" patchMergeKey:"mountPath" protobuf:"bytes,9,rep,name=volumeMounts"`
|
||||
// volumeDevices is the list of block devices to be used by the container.
|
||||
// +patchMergeKey=devicePath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=devicePath
|
||||
// +optional
|
||||
VolumeDevices []VolumeDevice `json:"volumeDevices,omitempty" patchStrategy:"merge" patchMergeKey:"devicePath" protobuf:"bytes,21,rep,name=volumeDevices"`
|
||||
// Probes are not allowed for ephemeral containers.
|
||||
@@ -4474,8 +4401,6 @@ type PodStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []PodCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,2,rep,name=conditions"`
|
||||
// A human readable message indicating details about why the pod is in this condition.
|
||||
// +optional
|
||||
@@ -4521,8 +4446,6 @@ type PodStatus struct {
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +patchMergeKey=ip
|
||||
// +listType=map
|
||||
// +listMapKey=ip
|
||||
PodIPs []PodIP `json:"podIPs,omitempty" protobuf:"bytes,12,rep,name=podIPs" patchStrategy:"merge" patchMergeKey:"ip"`
|
||||
|
||||
// RFC 3339 date and time at which the object was acknowledged by the Kubelet.
|
||||
@@ -4534,13 +4457,11 @@ type PodStatus struct {
|
||||
// init container will have ready = true, the most recently started container will have
|
||||
// startTime set.
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status
|
||||
// +listType=atomic
|
||||
InitContainerStatuses []ContainerStatus `json:"initContainerStatuses,omitempty" protobuf:"bytes,10,rep,name=initContainerStatuses"`
|
||||
|
||||
// The list has one entry per container in the manifest.
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ContainerStatuses []ContainerStatus `json:"containerStatuses,omitempty" protobuf:"bytes,8,rep,name=containerStatuses"`
|
||||
// The Quality of Service (QOS) classification assigned to the pod based on resource requirements
|
||||
// See PodQOSClass type for available QOS classes
|
||||
@@ -4549,7 +4470,6 @@ type PodStatus struct {
|
||||
QOSClass PodQOSClass `json:"qosClass,omitempty" protobuf:"bytes,9,rep,name=qosClass"`
|
||||
// Status for any ephemeral containers that have run in this pod.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
EphemeralContainerStatuses []ContainerStatus `json:"ephemeralContainerStatuses,omitempty" protobuf:"bytes,13,rep,name=ephemeralContainerStatuses"`
|
||||
|
||||
// Status of resources resize desired for pod's containers.
|
||||
@@ -4738,8 +4658,6 @@ type ReplicationControllerStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ReplicationControllerCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -4941,7 +4859,6 @@ type LoadBalancerStatus struct {
|
||||
// Ingress is a list containing ingress points for the load-balancer.
|
||||
// Traffic intended for the service should be sent to these ingress points.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []LoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
@@ -5107,7 +5024,6 @@ type ServiceSpec struct {
|
||||
// at a node with this IP. A common example is external load-balancers
|
||||
// that are not part of the Kubernetes system.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ExternalIPs []string `json:"externalIPs,omitempty" protobuf:"bytes,5,rep,name=externalIPs"`
|
||||
|
||||
// Supports "ClientIP" and "None". Used to maintain session affinity.
|
||||
@@ -5133,7 +5049,6 @@ type ServiceSpec struct {
|
||||
// cloud-provider does not support the feature."
|
||||
// More info: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
LoadBalancerSourceRanges []string `json:"loadBalancerSourceRanges,omitempty" protobuf:"bytes,9,opt,name=loadBalancerSourceRanges"`
|
||||
|
||||
// externalName is the external reference that discovery mechanisms will
|
||||
@@ -5388,8 +5303,6 @@ type ServiceAccount struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Secrets []ObjectReference `json:"secrets,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=secrets"`
|
||||
|
||||
// ImagePullSecrets is a list of references to secrets in the same namespace to use for pulling any images
|
||||
@@ -5397,7 +5310,6 @@ type ServiceAccount struct {
|
||||
// can be mounted in the pod, but ImagePullSecrets are only accessed by the kubelet.
|
||||
// More info: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ImagePullSecrets []LocalObjectReference `json:"imagePullSecrets,omitempty" protobuf:"bytes,3,rep,name=imagePullSecrets"`
|
||||
|
||||
// AutomountServiceAccountToken indicates whether pods running as this service account should have an API token automatically mounted.
|
||||
@@ -5452,7 +5364,6 @@ type Endpoints struct {
|
||||
// NotReadyAddresses in the same subset.
|
||||
// Sets of addresses and ports that comprise a service.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subsets []EndpointSubset `json:"subsets,omitempty" protobuf:"bytes,2,rep,name=subsets"`
|
||||
}
|
||||
|
||||
@@ -5473,17 +5384,14 @@ type EndpointSubset struct {
|
||||
// IP addresses which offer the related ports that are marked as ready. These endpoints
|
||||
// should be considered safe for load balancers and clients to utilize.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Addresses []EndpointAddress `json:"addresses,omitempty" protobuf:"bytes,1,rep,name=addresses"`
|
||||
// IP addresses which offer the related ports but are not currently marked as ready
|
||||
// because they have not yet finished starting, have recently failed a readiness check,
|
||||
// or have recently failed a liveness check.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NotReadyAddresses []EndpointAddress `json:"notReadyAddresses,omitempty" protobuf:"bytes,2,rep,name=notReadyAddresses"`
|
||||
// Port numbers available on the related IP addresses.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []EndpointPort `json:"ports,omitempty" protobuf:"bytes,3,rep,name=ports"`
|
||||
}
|
||||
|
||||
@@ -5568,7 +5476,6 @@ type NodeSpec struct {
|
||||
// each of IPv4 and IPv6.
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +listType=set
|
||||
PodCIDRs []string `json:"podCIDRs,omitempty" protobuf:"bytes,7,opt,name=podCIDRs" patchStrategy:"merge"`
|
||||
|
||||
// ID of the node assigned by the cloud provider in the format: <ProviderName>://<ProviderSpecificNodeID>
|
||||
@@ -5580,7 +5487,6 @@ type NodeSpec struct {
|
||||
Unschedulable bool `json:"unschedulable,omitempty" protobuf:"varint,4,opt,name=unschedulable"`
|
||||
// If specified, the node's taints.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Taints []Taint `json:"taints,omitempty" protobuf:"bytes,5,opt,name=taints"`
|
||||
|
||||
// Deprecated: Previously used to specify the source of the node's configuration for the DynamicKubeletConfig feature. This feature is removed.
|
||||
@@ -5751,8 +5657,6 @@ type NodeStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []NodeCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,4,rep,name=conditions"`
|
||||
// List of addresses reachable to the node.
|
||||
// Queried from cloud provider, if available.
|
||||
@@ -5767,8 +5671,6 @@ type NodeStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Addresses []NodeAddress `json:"addresses,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,5,rep,name=addresses"`
|
||||
// Endpoints of daemons running on the Node.
|
||||
// +optional
|
||||
@@ -5779,15 +5681,12 @@ type NodeStatus struct {
|
||||
NodeInfo NodeSystemInfo `json:"nodeInfo,omitempty" protobuf:"bytes,7,opt,name=nodeInfo"`
|
||||
// List of container images on this node
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Images []ContainerImage `json:"images,omitempty" protobuf:"bytes,8,rep,name=images"`
|
||||
// List of attachable volumes in use (mounted) by the node.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumesInUse []UniqueVolumeName `json:"volumesInUse,omitempty" protobuf:"bytes,9,rep,name=volumesInUse"`
|
||||
// List of volumes that are attached to the node.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumesAttached []AttachedVolume `json:"volumesAttached,omitempty" protobuf:"bytes,10,rep,name=volumesAttached"`
|
||||
// Status of the config assigned to the node via the dynamic Kubelet config feature.
|
||||
// +optional
|
||||
@@ -5812,7 +5711,6 @@ type AvoidPods struct {
|
||||
// Bounded-sized list of signatures of pods that should avoid this node, sorted
|
||||
// in timestamp order from oldest to newest. Size of the slice is unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PreferAvoidPods []PreferAvoidPodsEntry `json:"preferAvoidPods,omitempty" protobuf:"bytes,1,rep,name=preferAvoidPods"`
|
||||
}
|
||||
|
||||
@@ -5844,7 +5742,6 @@ type ContainerImage struct {
|
||||
// Names by which this image is known.
|
||||
// e.g. ["kubernetes.example/hyperkube:v1.0.7", "cloud-vendor.registry.example/cloud-vendor/hyperkube:v1.0.7"]
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Names []string `json:"names" protobuf:"bytes,1,rep,name=names"`
|
||||
// The size of the image in bytes.
|
||||
// +optional
|
||||
@@ -5970,6 +5867,7 @@ const (
|
||||
// Volume size, in bytes (e,g. 5Gi = 5GiB = 5 * 1024 * 1024 * 1024)
|
||||
ResourceStorage ResourceName = "storage"
|
||||
// Local ephemeral storage, in bytes. (500Gi = 500GiB = 500 * 1024 * 1024 * 1024)
|
||||
// The resource name for ResourceEphemeralStorage is alpha and it can change across releases.
|
||||
ResourceEphemeralStorage ResourceName = "ephemeral-storage"
|
||||
)
|
||||
|
||||
@@ -6039,7 +5937,6 @@ type NamespaceSpec struct {
|
||||
// Finalizers is an opaque list of values that must be empty to permanently remove object from storage.
|
||||
// More info: https://kubernetes.io/docs/tasks/administer-cluster/namespaces/
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Finalizers []FinalizerName `json:"finalizers,omitempty" protobuf:"bytes,1,rep,name=finalizers,casttype=FinalizerName"`
|
||||
}
|
||||
|
||||
@@ -6054,8 +5951,6 @@ type NamespaceStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []NamespaceCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,2,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -6293,7 +6188,6 @@ type PodExecOptions struct {
|
||||
Container string `json:"container,omitempty" protobuf:"bytes,5,opt,name=container"`
|
||||
|
||||
// Command is the remote command to execute. argv array. Not executed within a shell.
|
||||
// +listType=atomic
|
||||
Command []string `json:"command" protobuf:"bytes,6,rep,name=command"`
|
||||
}
|
||||
|
||||
@@ -6312,7 +6206,6 @@ type PodPortForwardOptions struct {
|
||||
// List of ports to forward
|
||||
// Required when using WebSockets
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []int32 `json:"ports,omitempty" protobuf:"varint,1,rep,name=ports"`
|
||||
}
|
||||
|
||||
@@ -6606,7 +6499,6 @@ type LimitRangeItem struct {
|
||||
// LimitRangeSpec defines a min/max usage limit for resources that match on kind.
|
||||
type LimitRangeSpec struct {
|
||||
// Limits is the list of LimitRangeItem objects that are enforced.
|
||||
// +listType=atomic
|
||||
Limits []LimitRangeItem `json:"limits" protobuf:"bytes,1,rep,name=limits"`
|
||||
}
|
||||
|
||||
@@ -6715,7 +6607,6 @@ type ResourceQuotaSpec struct {
|
||||
// A collection of filters that must match each object tracked by a quota.
|
||||
// If not specified, the quota matches all objects.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Scopes []ResourceQuotaScope `json:"scopes,omitempty" protobuf:"bytes,2,rep,name=scopes,casttype=ResourceQuotaScope"`
|
||||
// scopeSelector is also a collection of filters like scopes that must match each object tracked by a quota
|
||||
// but expressed using ScopeSelectorOperator in combination with possible values.
|
||||
@@ -6730,7 +6621,6 @@ type ResourceQuotaSpec struct {
|
||||
type ScopeSelector struct {
|
||||
// A list of scope selector requirements by scope of the resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchExpressions []ScopedResourceSelectorRequirement `json:"matchExpressions,omitempty" protobuf:"bytes,1,rep,name=matchExpressions"`
|
||||
}
|
||||
|
||||
@@ -6747,7 +6637,6 @@ type ScopedResourceSelectorRequirement struct {
|
||||
// the values array must be empty.
|
||||
// This array is replaced during a strategic merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Values []string `json:"values,omitempty" protobuf:"bytes,3,rep,name=values"`
|
||||
}
|
||||
|
||||
@@ -7047,8 +6936,6 @@ type ComponentStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ComponentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,2,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -7072,7 +6959,6 @@ type ComponentStatusList struct {
|
||||
type DownwardAPIVolumeSource struct {
|
||||
// Items is a list of downward API volume file
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []DownwardAPIVolumeFile `json:"items,omitempty" protobuf:"bytes,1,rep,name=items"`
|
||||
// Optional: mode bits to use on created files by default. Must be a
|
||||
// Optional: mode bits used to set permissions on created files by default.
|
||||
@@ -7117,7 +7003,6 @@ type DownwardAPIVolumeFile struct {
|
||||
type DownwardAPIProjection struct {
|
||||
// Items is a list of DownwardAPIVolume file
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []DownwardAPIVolumeFile `json:"items,omitempty" protobuf:"bytes,1,rep,name=items"`
|
||||
}
|
||||
|
||||
|
||||
4
vendor/k8s.io/api/core/v1/types_swagger_doc_generated.go
generated
vendored
4
vendor/k8s.io/api/core/v1/types_swagger_doc_generated.go
generated
vendored
@@ -1345,7 +1345,7 @@ var map_PersistentVolumeClaimCondition = map[string]string{
|
||||
"": "PersistentVolumeClaimCondition contains details about state of pvc",
|
||||
"lastProbeTime": "lastProbeTime is the time we probed the condition.",
|
||||
"lastTransitionTime": "lastTransitionTime is the time the condition transitioned from one status to another.",
|
||||
"reason": "reason is a unique, this should be a short, machine understandable string that gives the reason for condition's last transition. If it reports \"Resizing\" that means the underlying persistent volume is being resized.",
|
||||
"reason": "reason is a unique, this should be a short, machine understandable string that gives the reason for condition's last transition. If it reports \"ResizeStarted\" that means the underlying persistent volume is being resized.",
|
||||
"message": "message is the human-readable message indicating details about last transition.",
|
||||
}
|
||||
|
||||
@@ -1385,7 +1385,7 @@ var map_PersistentVolumeClaimStatus = map[string]string{
|
||||
"phase": "phase represents the current phase of PersistentVolumeClaim.",
|
||||
"accessModes": "accessModes contains the actual access modes the volume backing the PVC has. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1",
|
||||
"capacity": "capacity represents the actual resources of the underlying volume.",
|
||||
"conditions": "conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'Resizing'.",
|
||||
"conditions": "conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'ResizeStarted'.",
|
||||
"allocatedResources": "allocatedResources tracks the resources allocated to a PVC including its capacity. Key names follow standard Kubernetes label syntax. Valid values are either:\n\t* Un-prefixed keys:\n\t\t- storage - the capacity of the volume.\n\t* Custom resources must use implementation-defined prefixed names such as \"example.com/my-custom-resource\"\nApart from above values - keys that are unprefixed or have kubernetes.io prefix are considered reserved and hence may not be used.\n\nCapacity reported here may be larger than the actual capacity when a volume expansion operation is requested. For storage quota, the larger value from allocatedResources and PVC.spec.resources is used. If allocatedResources is not set, PVC.spec.resources alone is used for quota calculation. If a volume expansion capacity request is lowered, allocatedResources is only lowered if there are no expansion operations in progress and if the actual volume capacity is equal or lower than the requested capacity.\n\nA controller that receives PVC update with previously unknown resourceName should ignore the update for the purpose it was designed. For example - a controller that only is responsible for resizing capacity of the volume, should ignore PVC updates that change other valid resources associated with PVC.\n\nThis is an alpha field and requires enabling RecoverVolumeExpansionFailure feature.",
|
||||
"allocatedResourceStatuses": "allocatedResourceStatuses stores status of resource being resized for the given PVC. Key names follow standard Kubernetes label syntax. Valid values are either:\n\t* Un-prefixed keys:\n\t\t- storage - the capacity of the volume.\n\t* Custom resources must use implementation-defined prefixed names such as \"example.com/my-custom-resource\"\nApart from above values - keys that are unprefixed or have kubernetes.io prefix are considered reserved and hence may not be used.\n\nClaimResourceStatus can be in any of following states:\n\t- ControllerResizeInProgress:\n\t\tState set when resize controller starts resizing the volume in control-plane.\n\t- ControllerResizeFailed:\n\t\tState set when resize has failed in resize controller with a terminal error.\n\t- NodeResizePending:\n\t\tState set when resize controller has finished resizing the volume but further resizing of\n\t\tvolume is needed on the node.\n\t- NodeResizeInProgress:\n\t\tState set when kubelet starts resizing the volume.\n\t- NodeResizeFailed:\n\t\tState set when resizing has failed in kubelet with a terminal error. Transient errors don't set\n\t\tNodeResizeFailed.\nFor example: if expanding a PVC for more capacity - this field can be one of the following states:\n\t- pvc.status.allocatedResourceStatus['storage'] = \"ControllerResizeInProgress\"\n - pvc.status.allocatedResourceStatus['storage'] = \"ControllerResizeFailed\"\n - pvc.status.allocatedResourceStatus['storage'] = \"NodeResizePending\"\n - pvc.status.allocatedResourceStatus['storage'] = \"NodeResizeInProgress\"\n - pvc.status.allocatedResourceStatus['storage'] = \"NodeResizeFailed\"\nWhen this field is not set, it means that no resize operation is in progress for the given PVC.\n\nA controller that receives PVC update with previously unknown resourceName or ClaimResourceStatus should ignore the update for the purpose it was designed. For example - a controller that only is responsible for resizing capacity of the volume, should ignore PVC updates that change other valid resources associated with PVC.\n\nThis is an alpha field and requires enabling RecoverVolumeExpansionFailure feature.",
|
||||
"currentVolumeAttributesClassName": "currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is an alpha field and requires enabling VolumeAttributesClass feature.",
|
||||
|
||||
19
vendor/k8s.io/api/extensions/v1beta1/generated.proto
generated
vendored
19
vendor/k8s.io/api/extensions/v1beta1/generated.proto
generated
vendored
@@ -176,8 +176,6 @@ message DaemonSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DaemonSetCondition conditions = 10;
|
||||
}
|
||||
|
||||
@@ -345,8 +343,6 @@ message DeploymentStatus {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DeploymentCondition conditions = 6;
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -410,7 +406,6 @@ message HTTPIngressPath {
|
||||
// or '#'.
|
||||
message HTTPIngressRuleValue {
|
||||
// A collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
repeated HTTPIngressPath paths = 1;
|
||||
}
|
||||
|
||||
@@ -427,7 +422,6 @@ message IPBlock {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the CIDR range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string except = 2;
|
||||
}
|
||||
|
||||
@@ -501,7 +495,6 @@ message IngressLoadBalancerIngress {
|
||||
message IngressLoadBalancerStatus {
|
||||
// Ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressLoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -609,13 +602,11 @@ message IngressSpec {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressTLS tls = 2;
|
||||
|
||||
// A list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressRule rules = 3;
|
||||
}
|
||||
|
||||
@@ -633,7 +624,6 @@ message IngressTLS {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string hosts = 1;
|
||||
|
||||
// SecretName is the name of the secret used to terminate SSL traffic on 443.
|
||||
@@ -669,7 +659,6 @@ message NetworkPolicyEgressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// List of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -678,7 +667,6 @@ message NetworkPolicyEgressRule {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer to = 2;
|
||||
}
|
||||
|
||||
@@ -691,7 +679,6 @@ message NetworkPolicyIngressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows traffic
|
||||
// only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// List of sources which should be able to access the pods selected for this rule.
|
||||
@@ -700,7 +687,6 @@ message NetworkPolicyIngressRule {
|
||||
// If this field is present and contains at least one item, this rule allows traffic only if the
|
||||
// traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer from = 2;
|
||||
}
|
||||
|
||||
@@ -781,7 +767,6 @@ message NetworkPolicySpec {
|
||||
// If this field is empty then this NetworkPolicy does not allow any traffic
|
||||
// (and serves solely to ensure that the pods it selects are isolated by default).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyIngressRule ingress = 2;
|
||||
|
||||
// List of egress rules to be applied to the selected pods. Outgoing traffic is
|
||||
@@ -792,7 +777,6 @@ message NetworkPolicySpec {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyEgressRule egress = 3;
|
||||
|
||||
// List of rule types that the NetworkPolicy relates to.
|
||||
@@ -806,7 +790,6 @@ message NetworkPolicySpec {
|
||||
// an Egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string policyTypes = 4;
|
||||
}
|
||||
|
||||
@@ -922,8 +905,6 @@ message ReplicaSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ReplicaSetCondition conditions = 6;
|
||||
}
|
||||
|
||||
|
||||
19
vendor/k8s.io/api/extensions/v1beta1/types.go
generated
vendored
19
vendor/k8s.io/api/extensions/v1beta1/types.go
generated
vendored
@@ -270,8 +270,6 @@ type DeploymentStatus struct {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DeploymentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -492,8 +490,6 @@ type DaemonSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DaemonSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -656,13 +652,11 @@ type IngressSpec struct {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TLS []IngressTLS `json:"tls,omitempty" protobuf:"bytes,2,rep,name=tls"`
|
||||
|
||||
// A list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []IngressRule `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
// TODO: Add the ability to specify load-balancer IP through claims
|
||||
}
|
||||
@@ -674,7 +668,6 @@ type IngressTLS struct {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Hosts []string `json:"hosts,omitempty" protobuf:"bytes,1,rep,name=hosts"`
|
||||
// SecretName is the name of the secret used to terminate SSL traffic on 443.
|
||||
// Field is left optional to allow SSL routing based on SNI hostname alone.
|
||||
@@ -697,7 +690,6 @@ type IngressStatus struct {
|
||||
type IngressLoadBalancerStatus struct {
|
||||
// Ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []IngressLoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
@@ -805,7 +797,6 @@ type IngressRuleValue struct {
|
||||
// or '#'.
|
||||
type HTTPIngressRuleValue struct {
|
||||
// A collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
Paths []HTTPIngressPath `json:"paths" protobuf:"bytes,1,rep,name=paths"`
|
||||
// TODO: Consider adding fields for ingress-type specific global
|
||||
// options usable by a loadbalancer, like http keep-alive.
|
||||
@@ -1000,8 +991,6 @@ type ReplicaSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ReplicaSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -1087,7 +1076,6 @@ type NetworkPolicySpec struct {
|
||||
// If this field is empty then this NetworkPolicy does not allow any traffic
|
||||
// (and serves solely to ensure that the pods it selects are isolated by default).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []NetworkPolicyIngressRule `json:"ingress,omitempty" protobuf:"bytes,2,rep,name=ingress"`
|
||||
|
||||
// List of egress rules to be applied to the selected pods. Outgoing traffic is
|
||||
@@ -1098,7 +1086,6 @@ type NetworkPolicySpec struct {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Egress []NetworkPolicyEgressRule `json:"egress,omitempty" protobuf:"bytes,3,rep,name=egress"`
|
||||
|
||||
// List of rule types that the NetworkPolicy relates to.
|
||||
@@ -1112,7 +1099,6 @@ type NetworkPolicySpec struct {
|
||||
// an Egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PolicyTypes []PolicyType `json:"policyTypes,omitempty" protobuf:"bytes,4,rep,name=policyTypes,casttype=PolicyType"`
|
||||
}
|
||||
|
||||
@@ -1125,7 +1111,6 @@ type NetworkPolicyIngressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows traffic
|
||||
// only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// List of sources which should be able to access the pods selected for this rule.
|
||||
@@ -1134,7 +1119,6 @@ type NetworkPolicyIngressRule struct {
|
||||
// If this field is present and contains at least one item, this rule allows traffic only if the
|
||||
// traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
From []NetworkPolicyPeer `json:"from,omitempty" protobuf:"bytes,2,rep,name=from"`
|
||||
}
|
||||
|
||||
@@ -1149,7 +1133,6 @@ type NetworkPolicyEgressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// List of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -1158,7 +1141,6 @@ type NetworkPolicyEgressRule struct {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
To []NetworkPolicyPeer `json:"to,omitempty" protobuf:"bytes,2,rep,name=to"`
|
||||
}
|
||||
|
||||
@@ -1196,7 +1178,6 @@ type IPBlock struct {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the CIDR range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Except []string `json:"except,omitempty" protobuf:"bytes,2,rep,name=except"`
|
||||
}
|
||||
|
||||
|
||||
9
vendor/k8s.io/api/networking/v1/generated.proto
generated
vendored
9
vendor/k8s.io/api/networking/v1/generated.proto
generated
vendored
@@ -84,7 +84,6 @@ message IPBlock {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the cidr range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string except = 2;
|
||||
}
|
||||
|
||||
@@ -226,7 +225,6 @@ message IngressLoadBalancerIngress {
|
||||
message IngressLoadBalancerStatus {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressLoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -398,7 +396,6 @@ message NetworkPolicyEgressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// to is a list of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -407,7 +404,6 @@ message NetworkPolicyEgressRule {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer to = 2;
|
||||
}
|
||||
|
||||
@@ -420,7 +416,6 @@ message NetworkPolicyIngressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// from is a list of sources which should be able to access the pods selected for this rule.
|
||||
@@ -429,7 +424,6 @@ message NetworkPolicyIngressRule {
|
||||
// source). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer from = 2;
|
||||
}
|
||||
|
||||
@@ -511,7 +505,6 @@ message NetworkPolicySpec {
|
||||
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||
// solely to ensure that the pods it selects are isolated by default)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyIngressRule ingress = 2;
|
||||
|
||||
// egress is a list of egress rules to be applied to the selected pods. Outgoing traffic
|
||||
@@ -522,7 +515,6 @@ message NetworkPolicySpec {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyEgressRule egress = 3;
|
||||
|
||||
// policyTypes is a list of rule types that the NetworkPolicy relates to.
|
||||
@@ -536,7 +528,6 @@ message NetworkPolicySpec {
|
||||
// an egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string policyTypes = 4;
|
||||
}
|
||||
|
||||
|
||||
9
vendor/k8s.io/api/networking/v1/types.go
generated
vendored
9
vendor/k8s.io/api/networking/v1/types.go
generated
vendored
@@ -74,7 +74,6 @@ type NetworkPolicySpec struct {
|
||||
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||
// solely to ensure that the pods it selects are isolated by default)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []NetworkPolicyIngressRule `json:"ingress,omitempty" protobuf:"bytes,2,rep,name=ingress"`
|
||||
|
||||
// egress is a list of egress rules to be applied to the selected pods. Outgoing traffic
|
||||
@@ -85,7 +84,6 @@ type NetworkPolicySpec struct {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Egress []NetworkPolicyEgressRule `json:"egress,omitempty" protobuf:"bytes,3,rep,name=egress"`
|
||||
|
||||
// policyTypes is a list of rule types that the NetworkPolicy relates to.
|
||||
@@ -99,7 +97,6 @@ type NetworkPolicySpec struct {
|
||||
// an egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PolicyTypes []PolicyType `json:"policyTypes,omitempty" protobuf:"bytes,4,rep,name=policyTypes,casttype=PolicyType"`
|
||||
}
|
||||
|
||||
@@ -112,7 +109,6 @@ type NetworkPolicyIngressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// from is a list of sources which should be able to access the pods selected for this rule.
|
||||
@@ -121,7 +117,6 @@ type NetworkPolicyIngressRule struct {
|
||||
// source). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
From []NetworkPolicyPeer `json:"from,omitempty" protobuf:"bytes,2,rep,name=from"`
|
||||
}
|
||||
|
||||
@@ -135,7 +130,6 @@ type NetworkPolicyEgressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// to is a list of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -144,7 +138,6 @@ type NetworkPolicyEgressRule struct {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
To []NetworkPolicyPeer `json:"to,omitempty" protobuf:"bytes,2,rep,name=to"`
|
||||
}
|
||||
|
||||
@@ -182,7 +175,6 @@ type IPBlock struct {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the cidr range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Except []string `json:"except,omitempty" protobuf:"bytes,2,rep,name=except"`
|
||||
}
|
||||
|
||||
@@ -337,7 +329,6 @@ type IngressStatus struct {
|
||||
type IngressLoadBalancerStatus struct {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []IngressLoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
|
||||
1
vendor/k8s.io/api/networking/v1alpha1/generated.proto
generated
vendored
1
vendor/k8s.io/api/networking/v1alpha1/generated.proto
generated
vendored
@@ -121,7 +121,6 @@ message ServiceCIDRSpec {
|
||||
// from which to assign service cluster IPs. Max of two CIDRs is allowed, one of each IP family.
|
||||
// This field is immutable.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string cidrs = 1;
|
||||
}
|
||||
|
||||
|
||||
1
vendor/k8s.io/api/networking/v1alpha1/types.go
generated
vendored
1
vendor/k8s.io/api/networking/v1alpha1/types.go
generated
vendored
@@ -111,7 +111,6 @@ type ServiceCIDRSpec struct {
|
||||
// from which to assign service cluster IPs. Max of two CIDRs is allowed, one of each IP family.
|
||||
// This field is immutable.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
CIDRs []string `json:"cidrs,omitempty" protobuf:"bytes,1,opt,name=cidrs"`
|
||||
}
|
||||
|
||||
|
||||
5
vendor/k8s.io/api/networking/v1beta1/generated.proto
generated
vendored
5
vendor/k8s.io/api/networking/v1beta1/generated.proto
generated
vendored
@@ -69,7 +69,6 @@ message HTTPIngressPath {
|
||||
// or '#'.
|
||||
message HTTPIngressRuleValue {
|
||||
// paths is a collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
repeated HTTPIngressPath paths = 1;
|
||||
}
|
||||
|
||||
@@ -212,7 +211,6 @@ message IngressLoadBalancerIngress {
|
||||
message IngressLoadBalancerStatus {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressLoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -315,13 +313,11 @@ message IngressSpec {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressTLS tls = 2;
|
||||
|
||||
// rules is a list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressRule rules = 3;
|
||||
}
|
||||
|
||||
@@ -339,7 +335,6 @@ message IngressTLS {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string hosts = 1;
|
||||
|
||||
// secretName is the name of the secret used to terminate TLS traffic on
|
||||
|
||||
5
vendor/k8s.io/api/networking/v1beta1/types.go
generated
vendored
5
vendor/k8s.io/api/networking/v1beta1/types.go
generated
vendored
@@ -97,13 +97,11 @@ type IngressSpec struct {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TLS []IngressTLS `json:"tls,omitempty" protobuf:"bytes,2,rep,name=tls"`
|
||||
|
||||
// rules is a list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []IngressRule `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
// TODO: Add the ability to specify load-balancer IP through claims
|
||||
}
|
||||
@@ -115,7 +113,6 @@ type IngressTLS struct {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Hosts []string `json:"hosts,omitempty" protobuf:"bytes,1,rep,name=hosts"`
|
||||
|
||||
// secretName is the name of the secret used to terminate TLS traffic on
|
||||
@@ -139,7 +136,6 @@ type IngressStatus struct {
|
||||
type IngressLoadBalancerStatus struct {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []IngressLoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
@@ -243,7 +239,6 @@ type IngressRuleValue struct {
|
||||
// or '#'.
|
||||
type HTTPIngressRuleValue struct {
|
||||
// paths is a collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
Paths []HTTPIngressPath `json:"paths" protobuf:"bytes,1,rep,name=paths"`
|
||||
// TODO: Consider adding fields for ingress-type specific global
|
||||
// options usable by a loadbalancer, like http keep-alive.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1/generated.proto
generated
vendored
10
vendor/k8s.io/api/rbac/v1/generated.proto
generated
vendored
@@ -33,7 +33,6 @@ message AggregationRule {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector clusterRoleSelectors = 1;
|
||||
}
|
||||
|
||||
@@ -45,7 +44,6 @@ message ClusterRole {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -64,7 +62,6 @@ message ClusterRoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
@@ -97,30 +94,25 @@ message ClusterRoleList {
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
message PolicyRule {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 2;
|
||||
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 3;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 4;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 5;
|
||||
}
|
||||
|
||||
@@ -132,7 +124,6 @@ message Role {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
}
|
||||
|
||||
@@ -146,7 +137,6 @@ message RoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1/types.go
generated
vendored
10
vendor/k8s.io/api/rbac/v1/types.go
generated
vendored
@@ -48,28 +48,23 @@ const (
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
type PolicyRule struct {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,5,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
@@ -116,7 +111,6 @@ type Role struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
}
|
||||
|
||||
@@ -134,7 +128,6 @@ type RoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
@@ -182,7 +175,6 @@ type ClusterRole struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -197,7 +189,6 @@ type AggregationRule struct {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ClusterRoleSelectors []metav1.LabelSelector `json:"clusterRoleSelectors,omitempty" protobuf:"bytes,1,rep,name=clusterRoleSelectors"`
|
||||
}
|
||||
|
||||
@@ -215,7 +206,6 @@ type ClusterRoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1alpha1/generated.proto
generated
vendored
10
vendor/k8s.io/api/rbac/v1alpha1/generated.proto
generated
vendored
@@ -33,7 +33,6 @@ message AggregationRule {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector clusterRoleSelectors = 1;
|
||||
}
|
||||
|
||||
@@ -46,7 +45,6 @@ message ClusterRole {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -66,7 +64,6 @@ message ClusterRoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
@@ -100,30 +97,25 @@ message ClusterRoleList {
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
message PolicyRule {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 3;
|
||||
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 4;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 5;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 6;
|
||||
}
|
||||
|
||||
@@ -136,7 +128,6 @@ message Role {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
}
|
||||
|
||||
@@ -151,7 +142,6 @@ message RoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1alpha1/types.go
generated
vendored
10
vendor/k8s.io/api/rbac/v1alpha1/types.go
generated
vendored
@@ -48,28 +48,23 @@ const (
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
type PolicyRule struct {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,3,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,4,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,5,rep,name=resourceNames"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,6,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
@@ -116,7 +111,6 @@ type Role struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
}
|
||||
|
||||
@@ -135,7 +129,6 @@ type RoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
@@ -185,7 +178,6 @@ type ClusterRole struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -200,7 +192,6 @@ type AggregationRule struct {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ClusterRoleSelectors []metav1.LabelSelector `json:"clusterRoleSelectors,omitempty" protobuf:"bytes,1,rep,name=clusterRoleSelectors"`
|
||||
}
|
||||
|
||||
@@ -219,7 +210,6 @@ type ClusterRoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1beta1/generated.proto
generated
vendored
10
vendor/k8s.io/api/rbac/v1beta1/generated.proto
generated
vendored
@@ -33,7 +33,6 @@ message AggregationRule {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector clusterRoleSelectors = 1;
|
||||
}
|
||||
|
||||
@@ -46,7 +45,6 @@ message ClusterRole {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -66,7 +64,6 @@ message ClusterRoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
@@ -100,31 +97,26 @@ message ClusterRoleList {
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
message PolicyRule {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 2;
|
||||
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources in the specified apiGroups.
|
||||
// '*/foo' represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 3;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 4;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 5;
|
||||
}
|
||||
|
||||
@@ -137,7 +129,6 @@ message Role {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
}
|
||||
|
||||
@@ -152,7 +143,6 @@ message RoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1beta1/types.go
generated
vendored
10
vendor/k8s.io/api/rbac/v1beta1/types.go
generated
vendored
@@ -48,29 +48,24 @@ const (
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
type PolicyRule struct {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources in the specified apiGroups.
|
||||
// '*/foo' represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,5,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
@@ -120,7 +115,6 @@ type Role struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
}
|
||||
|
||||
@@ -143,7 +137,6 @@ type RoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
@@ -205,7 +198,6 @@ type ClusterRole struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
// If AggregationRule is set, then the Rules are controller managed and direct changes to Rules will be
|
||||
@@ -219,7 +211,6 @@ type AggregationRule struct {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ClusterRoleSelectors []metav1.LabelSelector `json:"clusterRoleSelectors,omitempty" protobuf:"bytes,1,rep,name=clusterRoleSelectors"`
|
||||
}
|
||||
|
||||
@@ -242,7 +233,6 @@ type ClusterRoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/storage/v1/generated.proto
generated
vendored
10
vendor/k8s.io/api/storage/v1/generated.proto
generated
vendored
@@ -103,7 +103,7 @@ message CSIDriverSpec {
|
||||
// deployed on such a cluster and the deployment determines which mode that is, for example
|
||||
// via a command line parameter of the driver.
|
||||
//
|
||||
// This field was immutable in Kubernetes < 1.29 and now is mutable.
|
||||
// This field is immutable.
|
||||
//
|
||||
// +optional
|
||||
optional bool podInfoOnMount = 2;
|
||||
@@ -150,7 +150,7 @@ message CSIDriverSpec {
|
||||
// permission of the volume before being mounted.
|
||||
// Refer to the specific FSGroupPolicy values for additional details.
|
||||
//
|
||||
// This field was immutable in Kubernetes < 1.29 and now is mutable.
|
||||
// This field is immutable.
|
||||
//
|
||||
// Defaults to ReadWriteOnceWithFSType, which will examine each volume
|
||||
// to determine if Kubernetes should modify ownership and permissions of the volume.
|
||||
@@ -261,7 +261,6 @@ message CSINodeDriver {
|
||||
// It is possible for different nodes to use different topology keys.
|
||||
// This can be empty if driver does not support topology.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string topologyKeys = 3;
|
||||
|
||||
// allocatable represents the volume resources of a node that are available for scheduling.
|
||||
@@ -287,8 +286,6 @@ message CSINodeSpec {
|
||||
// If all drivers in the list are uninstalled, this can become empty.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSINodeDriver drivers = 1;
|
||||
}
|
||||
|
||||
@@ -381,6 +378,8 @@ message CSIStorageCapacityList {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSIStorageCapacity items = 2;
|
||||
}
|
||||
|
||||
@@ -412,7 +411,6 @@ message StorageClass {
|
||||
// e.g. ["ro", "soft"]. Not validated -
|
||||
// mount of the PVs will simply fail if one is invalid.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string mountOptions = 5;
|
||||
|
||||
// allowVolumeExpansion shows whether the storage class allow volume expand.
|
||||
|
||||
10
vendor/k8s.io/api/storage/v1/types.go
generated
vendored
10
vendor/k8s.io/api/storage/v1/types.go
generated
vendored
@@ -56,7 +56,6 @@ type StorageClass struct {
|
||||
// e.g. ["ro", "soft"]. Not validated -
|
||||
// mount of the PVs will simply fail if one is invalid.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MountOptions []string `json:"mountOptions,omitempty" protobuf:"bytes,5,opt,name=mountOptions"`
|
||||
|
||||
// allowVolumeExpansion shows whether the storage class allow volume expand.
|
||||
@@ -307,7 +306,7 @@ type CSIDriverSpec struct {
|
||||
// deployed on such a cluster and the deployment determines which mode that is, for example
|
||||
// via a command line parameter of the driver.
|
||||
//
|
||||
// This field was immutable in Kubernetes < 1.29 and now is mutable.
|
||||
// This field is immutable.
|
||||
//
|
||||
// +optional
|
||||
PodInfoOnMount *bool `json:"podInfoOnMount,omitempty" protobuf:"bytes,2,opt,name=podInfoOnMount"`
|
||||
@@ -354,7 +353,7 @@ type CSIDriverSpec struct {
|
||||
// permission of the volume before being mounted.
|
||||
// Refer to the specific FSGroupPolicy values for additional details.
|
||||
//
|
||||
// This field was immutable in Kubernetes < 1.29 and now is mutable.
|
||||
// This field is immutable.
|
||||
//
|
||||
// Defaults to ReadWriteOnceWithFSType, which will examine each volume
|
||||
// to determine if Kubernetes should modify ownership and permissions of the volume.
|
||||
@@ -518,8 +517,6 @@ type CSINodeSpec struct {
|
||||
// If all drivers in the list are uninstalled, this can become empty.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Drivers []CSINodeDriver `json:"drivers" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,1,rep,name=drivers"`
|
||||
}
|
||||
|
||||
@@ -552,7 +549,6 @@ type CSINodeDriver struct {
|
||||
// It is possible for different nodes to use different topology keys.
|
||||
// This can be empty if driver does not support topology.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TopologyKeys []string `json:"topologyKeys" protobuf:"bytes,3,rep,name=topologyKeys"`
|
||||
|
||||
// allocatable represents the volume resources of a node that are available for scheduling.
|
||||
@@ -684,5 +680,7 @@ type CSIStorageCapacityList struct {
|
||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Items []CSIStorageCapacity `json:"items" protobuf:"bytes,2,rep,name=items"`
|
||||
}
|
||||
|
||||
4
vendor/k8s.io/api/storage/v1/types_swagger_doc_generated.go
generated
vendored
4
vendor/k8s.io/api/storage/v1/types_swagger_doc_generated.go
generated
vendored
@@ -50,10 +50,10 @@ func (CSIDriverList) SwaggerDoc() map[string]string {
|
||||
var map_CSIDriverSpec = map[string]string{
|
||||
"": "CSIDriverSpec is the specification of a CSIDriver.",
|
||||
"attachRequired": "attachRequired indicates this CSI volume driver requires an attach operation (because it implements the CSI ControllerPublishVolume() method), and that the Kubernetes attach detach controller should call the attach volume interface which checks the volumeattachment status and waits until the volume is attached before proceeding to mounting. The CSI external-attacher coordinates with CSI volume driver and updates the volumeattachment status when the attach operation is complete. If the CSIDriverRegistry feature gate is enabled and the value is specified to false, the attach operation will be skipped. Otherwise the attach operation will be called.\n\nThis field is immutable.",
|
||||
"podInfoOnMount": "podInfoOnMount indicates this CSI volume driver requires additional pod information (like podName, podUID, etc.) during mount operations, if set to true. If set to false, pod information will not be passed on mount. Default is false.\n\nThe CSI driver specifies podInfoOnMount as part of driver deployment. If true, Kubelet will pass pod information as VolumeContext in the CSI NodePublishVolume() calls. The CSI driver is responsible for parsing and validating the information passed in as VolumeContext.\n\nThe following VolumeContext will be passed if podInfoOnMount is set to true. This list might grow, but the prefix will be used. \"csi.storage.k8s.io/pod.name\": pod.Name \"csi.storage.k8s.io/pod.namespace\": pod.Namespace \"csi.storage.k8s.io/pod.uid\": string(pod.UID) \"csi.storage.k8s.io/ephemeral\": \"true\" if the volume is an ephemeral inline volume\n defined by a CSIVolumeSource, otherwise \"false\"\n\n\"csi.storage.k8s.io/ephemeral\" is a new feature in Kubernetes 1.16. It is only required for drivers which support both the \"Persistent\" and \"Ephemeral\" VolumeLifecycleMode. Other drivers can leave pod info disabled and/or ignore this field. As Kubernetes 1.15 doesn't support this field, drivers can only support one mode when deployed on such a cluster and the deployment determines which mode that is, for example via a command line parameter of the driver.\n\nThis field was immutable in Kubernetes < 1.29 and now is mutable.",
|
||||
"podInfoOnMount": "podInfoOnMount indicates this CSI volume driver requires additional pod information (like podName, podUID, etc.) during mount operations, if set to true. If set to false, pod information will not be passed on mount. Default is false.\n\nThe CSI driver specifies podInfoOnMount as part of driver deployment. If true, Kubelet will pass pod information as VolumeContext in the CSI NodePublishVolume() calls. The CSI driver is responsible for parsing and validating the information passed in as VolumeContext.\n\nThe following VolumeContext will be passed if podInfoOnMount is set to true. This list might grow, but the prefix will be used. \"csi.storage.k8s.io/pod.name\": pod.Name \"csi.storage.k8s.io/pod.namespace\": pod.Namespace \"csi.storage.k8s.io/pod.uid\": string(pod.UID) \"csi.storage.k8s.io/ephemeral\": \"true\" if the volume is an ephemeral inline volume\n defined by a CSIVolumeSource, otherwise \"false\"\n\n\"csi.storage.k8s.io/ephemeral\" is a new feature in Kubernetes 1.16. It is only required for drivers which support both the \"Persistent\" and \"Ephemeral\" VolumeLifecycleMode. Other drivers can leave pod info disabled and/or ignore this field. As Kubernetes 1.15 doesn't support this field, drivers can only support one mode when deployed on such a cluster and the deployment determines which mode that is, for example via a command line parameter of the driver.\n\nThis field is immutable.",
|
||||
"volumeLifecycleModes": "volumeLifecycleModes defines what kind of volumes this CSI volume driver supports. The default if the list is empty is \"Persistent\", which is the usage defined by the CSI specification and implemented in Kubernetes via the usual PV/PVC mechanism.\n\nThe other mode is \"Ephemeral\". In this mode, volumes are defined inline inside the pod spec with CSIVolumeSource and their lifecycle is tied to the lifecycle of that pod. A driver has to be aware of this because it is only going to get a NodePublishVolume call for such a volume.\n\nFor more information about implementing this mode, see https://kubernetes-csi.github.io/docs/ephemeral-local-volumes.html A driver can support one or more of these modes and more modes may be added in the future.\n\nThis field is beta. This field is immutable.",
|
||||
"storageCapacity": "storageCapacity indicates that the CSI volume driver wants pod scheduling to consider the storage capacity that the driver deployment will report by creating CSIStorageCapacity objects with capacity information, if set to true.\n\nThe check can be enabled immediately when deploying a driver. In that case, provisioning new volumes with late binding will pause until the driver deployment has published some suitable CSIStorageCapacity object.\n\nAlternatively, the driver can be deployed with the field unset or false and it can be flipped later when storage capacity information has been published.\n\nThis field was immutable in Kubernetes <= 1.22 and now is mutable.",
|
||||
"fsGroupPolicy": "fsGroupPolicy defines if the underlying volume supports changing ownership and permission of the volume before being mounted. Refer to the specific FSGroupPolicy values for additional details.\n\nThis field was immutable in Kubernetes < 1.29 and now is mutable.\n\nDefaults to ReadWriteOnceWithFSType, which will examine each volume to determine if Kubernetes should modify ownership and permissions of the volume. With the default policy the defined fsGroup will only be applied if a fstype is defined and the volume's access mode contains ReadWriteOnce.",
|
||||
"fsGroupPolicy": "fsGroupPolicy defines if the underlying volume supports changing ownership and permission of the volume before being mounted. Refer to the specific FSGroupPolicy values for additional details.\n\nThis field is immutable.\n\nDefaults to ReadWriteOnceWithFSType, which will examine each volume to determine if Kubernetes should modify ownership and permissions of the volume. With the default policy the defined fsGroup will only be applied if a fstype is defined and the volume's access mode contains ReadWriteOnce.",
|
||||
"tokenRequests": "tokenRequests indicates the CSI driver needs pods' service account tokens it is mounting volume for to do necessary authentication. Kubelet will pass the tokens in VolumeContext in the CSI NodePublishVolume calls. The CSI driver should parse and validate the following VolumeContext: \"csi.storage.k8s.io/serviceAccount.tokens\": {\n \"<audience>\": {\n \"token\": <token>,\n \"expirationTimestamp\": <expiration timestamp in RFC3339>,\n },\n ...\n}\n\nNote: Audience in each TokenRequest should be different and at most one token is empty string. To receive a new token after expiry, RequiresRepublish can be used to trigger NodePublishVolume periodically.",
|
||||
"requiresRepublish": "requiresRepublish indicates the CSI driver wants `NodePublishVolume` being periodically called to reflect any possible change in the mounted volume. This field defaults to false.\n\nNote: After a successful initial NodePublishVolume call, subsequent calls to NodePublishVolume should only update the contents of the volume. New mount points will not be seen by a running container.",
|
||||
"seLinuxMount": "seLinuxMount specifies if the CSI driver supports \"-o context\" mount option.\n\nWhen \"true\", the CSI driver must ensure that all volumes provided by this CSI driver can be mounted separately with different `-o context` options. This is typical for storage backends that provide volumes as filesystems on block devices or as independent shared volumes. Kubernetes will call NodeStage / NodePublish with \"-o context=xyz\" mount option when mounting a ReadWriteOncePod volume used in Pod that has explicitly set SELinux context. In the future, it may be expanded to other volume AccessModes. In any case, Kubernetes will ensure that the volume is mounted only with a single SELinux context.\n\nWhen \"false\", Kubernetes won't pass any special SELinux mount options to the driver. This is typical for volumes that represent subdirectories of a bigger shared filesystem.\n\nDefault is \"false\".",
|
||||
|
||||
2
vendor/k8s.io/api/storage/v1alpha1/generated.proto
generated
vendored
2
vendor/k8s.io/api/storage/v1alpha1/generated.proto
generated
vendored
@@ -119,6 +119,8 @@ message CSIStorageCapacityList {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSIStorageCapacity items = 2;
|
||||
}
|
||||
|
||||
|
||||
2
vendor/k8s.io/api/storage/v1alpha1/types.go
generated
vendored
2
vendor/k8s.io/api/storage/v1alpha1/types.go
generated
vendored
@@ -247,6 +247,8 @@ type CSIStorageCapacityList struct {
|
||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Items []CSIStorageCapacity `json:"items" protobuf:"bytes,2,rep,name=items"`
|
||||
}
|
||||
|
||||
|
||||
7
vendor/k8s.io/api/storage/v1beta1/generated.proto
generated
vendored
7
vendor/k8s.io/api/storage/v1beta1/generated.proto
generated
vendored
@@ -127,7 +127,6 @@ message CSIDriverSpec {
|
||||
// This field is immutable.
|
||||
//
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string volumeLifecycleModes = 3;
|
||||
|
||||
// storageCapacity indicates that the CSI volume driver wants pod scheduling to consider the storage
|
||||
@@ -264,7 +263,6 @@ message CSINodeDriver {
|
||||
// It is possible for different nodes to use different topology keys.
|
||||
// This can be empty if driver does not support topology.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string topologyKeys = 3;
|
||||
|
||||
// allocatable represents the volume resources of a node that are available for scheduling.
|
||||
@@ -289,8 +287,6 @@ message CSINodeSpec {
|
||||
// If all drivers in the list are uninstalled, this can become empty.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSINodeDriver drivers = 1;
|
||||
}
|
||||
|
||||
@@ -383,6 +379,8 @@ message CSIStorageCapacityList {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSIStorageCapacity items = 2;
|
||||
}
|
||||
|
||||
@@ -414,7 +412,6 @@ message StorageClass {
|
||||
// e.g. ["ro", "soft"]. Not validated -
|
||||
// mount of the PVs will simply fail if one is invalid.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string mountOptions = 5;
|
||||
|
||||
// allowVolumeExpansion shows whether the storage class allow volume expand
|
||||
|
||||
7
vendor/k8s.io/api/storage/v1beta1/types.go
generated
vendored
7
vendor/k8s.io/api/storage/v1beta1/types.go
generated
vendored
@@ -59,7 +59,6 @@ type StorageClass struct {
|
||||
// e.g. ["ro", "soft"]. Not validated -
|
||||
// mount of the PVs will simply fail if one is invalid.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MountOptions []string `json:"mountOptions,omitempty" protobuf:"bytes,5,opt,name=mountOptions"`
|
||||
|
||||
// allowVolumeExpansion shows whether the storage class allow volume expand
|
||||
@@ -348,7 +347,6 @@ type CSIDriverSpec struct {
|
||||
// This field is immutable.
|
||||
//
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumeLifecycleModes []VolumeLifecycleMode `json:"volumeLifecycleModes,omitempty" protobuf:"bytes,3,opt,name=volumeLifecycleModes"`
|
||||
|
||||
// storageCapacity indicates that the CSI volume driver wants pod scheduling to consider the storage
|
||||
@@ -537,8 +535,6 @@ type CSINodeSpec struct {
|
||||
// If all drivers in the list are uninstalled, this can become empty.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Drivers []CSINodeDriver `json:"drivers" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,1,rep,name=drivers"`
|
||||
}
|
||||
|
||||
@@ -571,7 +567,6 @@ type CSINodeDriver struct {
|
||||
// It is possible for different nodes to use different topology keys.
|
||||
// This can be empty if driver does not support topology.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TopologyKeys []string `json:"topologyKeys" protobuf:"bytes,3,rep,name=topologyKeys"`
|
||||
|
||||
// allocatable represents the volume resources of a node that are available for scheduling.
|
||||
@@ -712,5 +707,7 @@ type CSIStorageCapacityList struct {
|
||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Items []CSIStorageCapacity `json:"items" protobuf:"bytes,2,rep,name=items"`
|
||||
}
|
||||
|
||||
22
vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto
generated
vendored
22
vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto
generated
vendored
@@ -34,7 +34,6 @@ message APIGroup {
|
||||
optional string name = 1;
|
||||
|
||||
// versions are the versions supported in this group.
|
||||
// +listType=atomic
|
||||
repeated GroupVersionForDiscovery versions = 2;
|
||||
|
||||
// preferredVersion is the version preferred by the API server, which
|
||||
@@ -50,7 +49,6 @@ message APIGroup {
|
||||
// For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
|
||||
// Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ServerAddressByClientCIDR serverAddressByClientCIDRs = 4;
|
||||
}
|
||||
|
||||
@@ -58,7 +56,6 @@ message APIGroup {
|
||||
// /apis.
|
||||
message APIGroupList {
|
||||
// groups is a list of APIGroup.
|
||||
// +listType=atomic
|
||||
repeated APIGroup groups = 1;
|
||||
}
|
||||
|
||||
@@ -91,11 +88,9 @@ message APIResource {
|
||||
optional Verbs verbs = 4;
|
||||
|
||||
// shortNames is a list of suggested short names of the resource.
|
||||
// +listType=atomic
|
||||
repeated string shortNames = 5;
|
||||
|
||||
// categories is a list of the grouped resources this resource belongs to (e.g. 'all')
|
||||
// +listType=atomic
|
||||
repeated string categories = 7;
|
||||
|
||||
// The hash value of the storage version, the version this resource is
|
||||
@@ -117,7 +112,6 @@ message APIResourceList {
|
||||
optional string groupVersion = 1;
|
||||
|
||||
// resources contains the name of the resources and if they are namespaced.
|
||||
// +listType=atomic
|
||||
repeated APIResource resources = 2;
|
||||
}
|
||||
|
||||
@@ -128,7 +122,6 @@ message APIResourceList {
|
||||
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||
message APIVersions {
|
||||
// versions are the api versions that are available.
|
||||
// +listType=atomic
|
||||
repeated string versions = 1;
|
||||
|
||||
// a map of client CIDR to server address that is serving this group.
|
||||
@@ -138,7 +131,6 @@ message APIVersions {
|
||||
// The server returns only those CIDRs that it thinks that the client can match.
|
||||
// For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
|
||||
// Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
|
||||
// +listType=atomic
|
||||
repeated ServerAddressByClientCIDR serverAddressByClientCIDRs = 2;
|
||||
}
|
||||
|
||||
@@ -153,7 +145,6 @@ message ApplyOptions {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string dryRun = 1;
|
||||
|
||||
// Force is going to "force" Apply requests. It means user will
|
||||
@@ -244,7 +235,6 @@ message CreateOptions {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string dryRun = 1;
|
||||
|
||||
// fieldManager is a name associated with the actor or entity
|
||||
@@ -313,7 +303,6 @@ message DeleteOptions {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string dryRun = 5;
|
||||
}
|
||||
|
||||
@@ -429,7 +418,6 @@ message LabelSelector {
|
||||
|
||||
// matchExpressions is a list of label selector requirements. The requirements are ANDed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated LabelSelectorRequirement matchExpressions = 2;
|
||||
}
|
||||
|
||||
@@ -448,7 +436,6 @@ message LabelSelectorRequirement {
|
||||
// the values array must be empty. This array is replaced during a strategic
|
||||
// merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string values = 3;
|
||||
}
|
||||
|
||||
@@ -801,8 +788,6 @@ message ObjectMeta {
|
||||
// +optional
|
||||
// +patchMergeKey=uid
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=uid
|
||||
repeated OwnerReference ownerReferences = 13;
|
||||
|
||||
// Must be empty before the object is deleted from the registry. Each entry
|
||||
@@ -820,7 +805,6 @@ message ObjectMeta {
|
||||
// are not vulnerable to ordering changes in the list.
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +listType=set
|
||||
repeated string finalizers = 14;
|
||||
|
||||
// ManagedFields maps workflow-id and version to the set of fields
|
||||
@@ -832,7 +816,6 @@ message ObjectMeta {
|
||||
// workflow used when modifying the object.
|
||||
//
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ManagedFieldsEntry managedFields = 17;
|
||||
}
|
||||
|
||||
@@ -907,7 +890,6 @@ message PatchOptions {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string dryRun = 1;
|
||||
|
||||
// Force is going to "force" Apply requests. It means user will
|
||||
@@ -961,7 +943,6 @@ message Preconditions {
|
||||
// For example: "/healthz", "/apis".
|
||||
message RootPaths {
|
||||
// paths are the paths available at root.
|
||||
// +listType=atomic
|
||||
repeated string paths = 1;
|
||||
}
|
||||
|
||||
@@ -1004,7 +985,6 @@ message Status {
|
||||
// is not guaranteed to conform to any schema except that defined by
|
||||
// the reason type.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
optional StatusDetails details = 5;
|
||||
|
||||
// Suggested HTTP return code for this status, 0 if not set.
|
||||
@@ -1069,7 +1049,6 @@ message StatusDetails {
|
||||
// The Causes array includes more details associated with the StatusReason
|
||||
// failure. Not all StatusReasons may provide detailed causes.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated StatusCause causes = 4;
|
||||
|
||||
// If specified, the time in seconds before the operation should be retried. Some errors may indicate
|
||||
@@ -1156,7 +1135,6 @@ message UpdateOptions {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string dryRun = 1;
|
||||
|
||||
// fieldManager is a name associated with the actor or entity
|
||||
|
||||
26
vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go
generated
vendored
26
vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go
generated
vendored
@@ -236,8 +236,6 @@ type ObjectMeta struct {
|
||||
// +optional
|
||||
// +patchMergeKey=uid
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=uid
|
||||
OwnerReferences []OwnerReference `json:"ownerReferences,omitempty" patchStrategy:"merge" patchMergeKey:"uid" protobuf:"bytes,13,rep,name=ownerReferences"`
|
||||
|
||||
// Must be empty before the object is deleted from the registry. Each entry
|
||||
@@ -255,7 +253,6 @@ type ObjectMeta struct {
|
||||
// are not vulnerable to ordering changes in the list.
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +listType=set
|
||||
Finalizers []string `json:"finalizers,omitempty" patchStrategy:"merge" protobuf:"bytes,14,rep,name=finalizers"`
|
||||
|
||||
// Tombstone: ClusterName was a legacy field that was always cleared by
|
||||
@@ -271,7 +268,6 @@ type ObjectMeta struct {
|
||||
// workflow used when modifying the object.
|
||||
//
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ManagedFields []ManagedFieldsEntry `json:"managedFields,omitempty" protobuf:"bytes,17,rep,name=managedFields"`
|
||||
}
|
||||
|
||||
@@ -535,7 +531,6 @@ type DeleteOptions struct {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
DryRun []string `json:"dryRun,omitempty" protobuf:"bytes,5,rep,name=dryRun"`
|
||||
}
|
||||
|
||||
@@ -561,7 +556,6 @@ type CreateOptions struct {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
DryRun []string `json:"dryRun,omitempty" protobuf:"bytes,1,rep,name=dryRun"`
|
||||
// +k8s:deprecated=includeUninitialized,protobuf=2
|
||||
|
||||
@@ -606,7 +600,6 @@ type PatchOptions struct {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
DryRun []string `json:"dryRun,omitempty" protobuf:"bytes,1,rep,name=dryRun"`
|
||||
|
||||
// Force is going to "force" Apply requests. It means user will
|
||||
@@ -658,7 +651,6 @@ type ApplyOptions struct {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
DryRun []string `json:"dryRun,omitempty" protobuf:"bytes,1,rep,name=dryRun"`
|
||||
|
||||
// Force is going to "force" Apply requests. It means user will
|
||||
@@ -691,7 +683,6 @@ type UpdateOptions struct {
|
||||
// request. Valid values are:
|
||||
// - All: all dry run stages will be processed
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
DryRun []string `json:"dryRun,omitempty" protobuf:"bytes,1,rep,name=dryRun"`
|
||||
|
||||
// fieldManager is a name associated with the actor or entity
|
||||
@@ -760,7 +751,6 @@ type Status struct {
|
||||
// is not guaranteed to conform to any schema except that defined by
|
||||
// the reason type.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Details *StatusDetails `json:"details,omitempty" protobuf:"bytes,5,opt,name=details"`
|
||||
// Suggested HTTP return code for this status, 0 if not set.
|
||||
// +optional
|
||||
@@ -794,7 +784,6 @@ type StatusDetails struct {
|
||||
// The Causes array includes more details associated with the StatusReason
|
||||
// failure. Not all StatusReasons may provide detailed causes.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Causes []StatusCause `json:"causes,omitempty" protobuf:"bytes,4,rep,name=causes"`
|
||||
// If specified, the time in seconds before the operation should be retried. Some errors may indicate
|
||||
// the client must take an alternate action - for those errors this field may indicate how long to wait
|
||||
@@ -1058,7 +1047,6 @@ type List struct {
|
||||
type APIVersions struct {
|
||||
TypeMeta `json:",inline"`
|
||||
// versions are the api versions that are available.
|
||||
// +listType=atomic
|
||||
Versions []string `json:"versions" protobuf:"bytes,1,rep,name=versions"`
|
||||
// a map of client CIDR to server address that is serving this group.
|
||||
// This is to help clients reach servers in the most network-efficient way possible.
|
||||
@@ -1067,7 +1055,6 @@ type APIVersions struct {
|
||||
// The server returns only those CIDRs that it thinks that the client can match.
|
||||
// For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
|
||||
// Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
|
||||
// +listType=atomic
|
||||
ServerAddressByClientCIDRs []ServerAddressByClientCIDR `json:"serverAddressByClientCIDRs" protobuf:"bytes,2,rep,name=serverAddressByClientCIDRs"`
|
||||
}
|
||||
|
||||
@@ -1078,7 +1065,6 @@ type APIVersions struct {
|
||||
type APIGroupList struct {
|
||||
TypeMeta `json:",inline"`
|
||||
// groups is a list of APIGroup.
|
||||
// +listType=atomic
|
||||
Groups []APIGroup `json:"groups" protobuf:"bytes,1,rep,name=groups"`
|
||||
}
|
||||
|
||||
@@ -1091,7 +1077,6 @@ type APIGroup struct {
|
||||
// name is the name of the group.
|
||||
Name string `json:"name" protobuf:"bytes,1,opt,name=name"`
|
||||
// versions are the versions supported in this group.
|
||||
// +listType=atomic
|
||||
Versions []GroupVersionForDiscovery `json:"versions" protobuf:"bytes,2,rep,name=versions"`
|
||||
// preferredVersion is the version preferred by the API server, which
|
||||
// probably is the storage version.
|
||||
@@ -1105,7 +1090,6 @@ type APIGroup struct {
|
||||
// For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
|
||||
// Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ServerAddressByClientCIDRs []ServerAddressByClientCIDR `json:"serverAddressByClientCIDRs,omitempty" protobuf:"bytes,4,rep,name=serverAddressByClientCIDRs"`
|
||||
}
|
||||
|
||||
@@ -1150,10 +1134,8 @@ type APIResource struct {
|
||||
// update, patch, delete, deletecollection, and proxy)
|
||||
Verbs Verbs `json:"verbs" protobuf:"bytes,4,opt,name=verbs"`
|
||||
// shortNames is a list of suggested short names of the resource.
|
||||
// +listType=atomic
|
||||
ShortNames []string `json:"shortNames,omitempty" protobuf:"bytes,5,rep,name=shortNames"`
|
||||
// categories is a list of the grouped resources this resource belongs to (e.g. 'all')
|
||||
// +listType=atomic
|
||||
Categories []string `json:"categories,omitempty" protobuf:"bytes,7,rep,name=categories"`
|
||||
// The hash value of the storage version, the version this resource is
|
||||
// converted to when written to the data store. Value must be treated
|
||||
@@ -1186,7 +1168,6 @@ type APIResourceList struct {
|
||||
// groupVersion is the group and version this APIResourceList is for.
|
||||
GroupVersion string `json:"groupVersion" protobuf:"bytes,1,opt,name=groupVersion"`
|
||||
// resources contains the name of the resources and if they are namespaced.
|
||||
// +listType=atomic
|
||||
APIResources []APIResource `json:"resources" protobuf:"bytes,2,rep,name=resources"`
|
||||
}
|
||||
|
||||
@@ -1194,7 +1175,6 @@ type APIResourceList struct {
|
||||
// For example: "/healthz", "/apis".
|
||||
type RootPaths struct {
|
||||
// paths are the paths available at root.
|
||||
// +listType=atomic
|
||||
Paths []string `json:"paths" protobuf:"bytes,1,rep,name=paths"`
|
||||
}
|
||||
|
||||
@@ -1238,7 +1218,6 @@ type LabelSelector struct {
|
||||
MatchLabels map[string]string `json:"matchLabels,omitempty" protobuf:"bytes,1,rep,name=matchLabels"`
|
||||
// matchExpressions is a list of label selector requirements. The requirements are ANDed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchExpressions []LabelSelectorRequirement `json:"matchExpressions,omitempty" protobuf:"bytes,2,rep,name=matchExpressions"`
|
||||
}
|
||||
|
||||
@@ -1255,7 +1234,6 @@ type LabelSelectorRequirement struct {
|
||||
// the values array must be empty. This array is replaced during a strategic
|
||||
// merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Values []string `json:"values,omitempty" protobuf:"bytes,3,rep,name=values"`
|
||||
}
|
||||
|
||||
@@ -1357,10 +1335,8 @@ type Table struct {
|
||||
|
||||
// columnDefinitions describes each column in the returned items array. The number of cells per row
|
||||
// will always match the number of column definitions.
|
||||
// +listType=atomic
|
||||
ColumnDefinitions []TableColumnDefinition `json:"columnDefinitions"`
|
||||
// rows is the list of items in the table.
|
||||
// +listType=atomic
|
||||
Rows []TableRow `json:"rows"`
|
||||
}
|
||||
|
||||
@@ -1393,14 +1369,12 @@ type TableRow struct {
|
||||
// cells will be as wide as the column definitions array and may contain strings, numbers (float64 or
|
||||
// int64), booleans, simple maps, lists, or null. See the type field of the column definition for a
|
||||
// more detailed description.
|
||||
// +listType=atomic
|
||||
Cells []interface{} `json:"cells"`
|
||||
// conditions describe additional status of a row that are relevant for a human user. These conditions
|
||||
// apply to the row, not to the object, and will be specific to table output. The only defined
|
||||
// condition type is 'Completed', for a row that indicates a resource that has run to completion and
|
||||
// can be given less visual priority.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Conditions []TableRowCondition `json:"conditions,omitempty"`
|
||||
// This field contains the requested additional information about each object based on the includeObject
|
||||
// policy when requesting the Table. If "None", this field is empty, if "Object" this will be the
|
||||
|
||||
12
vendor/k8s.io/apimachinery/pkg/runtime/helper.go
generated
vendored
12
vendor/k8s.io/apimachinery/pkg/runtime/helper.go
generated
vendored
@@ -236,14 +236,10 @@ func (e WithVersionEncoder) Encode(obj Object, stream io.Writer) error {
|
||||
gvk = preferredGVK
|
||||
}
|
||||
}
|
||||
|
||||
// The gvk only needs to be set if not already as desired.
|
||||
if gvk != oldGVK {
|
||||
kind.SetGroupVersionKind(gvk)
|
||||
defer kind.SetGroupVersionKind(oldGVK)
|
||||
}
|
||||
|
||||
return e.Encoder.Encode(obj, stream)
|
||||
kind.SetGroupVersionKind(gvk)
|
||||
err = e.Encoder.Encode(obj, stream)
|
||||
kind.SetGroupVersionKind(oldGVK)
|
||||
return err
|
||||
}
|
||||
|
||||
// WithoutVersionDecoder clears the group version kind of a deserialized object.
|
||||
|
||||
53
vendor/k8s.io/apimachinery/pkg/util/sets/ordered.go
generated
vendored
Normal file
53
vendor/k8s.io/apimachinery/pkg/util/sets/ordered.go
generated
vendored
Normal file
@@ -0,0 +1,53 @@
|
||||
/*
|
||||
Copyright 2022 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package sets
|
||||
|
||||
// ordered is a constraint that permits any ordered type: any type
|
||||
// that supports the operators < <= >= >.
|
||||
// If future releases of Go add new ordered types,
|
||||
// this constraint will be modified to include them.
|
||||
type ordered interface {
|
||||
integer | float | ~string
|
||||
}
|
||||
|
||||
// integer is a constraint that permits any integer type.
|
||||
// If future releases of Go add new predeclared integer types,
|
||||
// this constraint will be modified to include them.
|
||||
type integer interface {
|
||||
signed | unsigned
|
||||
}
|
||||
|
||||
// float is a constraint that permits any floating-point type.
|
||||
// If future releases of Go add new predeclared floating-point types,
|
||||
// this constraint will be modified to include them.
|
||||
type float interface {
|
||||
~float32 | ~float64
|
||||
}
|
||||
|
||||
// signed is a constraint that permits any signed integer type.
|
||||
// If future releases of Go add new predeclared signed integer types,
|
||||
// this constraint will be modified to include them.
|
||||
type signed interface {
|
||||
~int | ~int8 | ~int16 | ~int32 | ~int64
|
||||
}
|
||||
|
||||
// unsigned is a constraint that permits any unsigned integer type.
|
||||
// If future releases of Go add new predeclared unsigned integer types,
|
||||
// this constraint will be modified to include them.
|
||||
type unsigned interface {
|
||||
~uint | ~uint8 | ~uint16 | ~uint32 | ~uint64 | ~uintptr
|
||||
}
|
||||
9
vendor/k8s.io/apimachinery/pkg/util/sets/set.go
generated
vendored
9
vendor/k8s.io/apimachinery/pkg/util/sets/set.go
generated
vendored
@@ -17,7 +17,6 @@ limitations under the License.
|
||||
package sets
|
||||
|
||||
import (
|
||||
"cmp"
|
||||
"sort"
|
||||
)
|
||||
|
||||
@@ -38,7 +37,7 @@ func New[T comparable](items ...T) Set[T] {
|
||||
// KeySet creates a Set from a keys of a map[comparable](? extends interface{}).
|
||||
// If the value passed in is not actually a map, this will panic.
|
||||
func KeySet[T comparable, V any](theMap map[T]V) Set[T] {
|
||||
ret := make(Set[T], len(theMap))
|
||||
ret := Set[T]{}
|
||||
for keyValue := range theMap {
|
||||
ret.Insert(keyValue)
|
||||
}
|
||||
@@ -194,7 +193,7 @@ func (s1 Set[T]) Equal(s2 Set[T]) bool {
|
||||
return len(s1) == len(s2) && s1.IsSuperset(s2)
|
||||
}
|
||||
|
||||
type sortableSliceOfGeneric[T cmp.Ordered] []T
|
||||
type sortableSliceOfGeneric[T ordered] []T
|
||||
|
||||
func (g sortableSliceOfGeneric[T]) Len() int { return len(g) }
|
||||
func (g sortableSliceOfGeneric[T]) Less(i, j int) bool { return less[T](g[i], g[j]) }
|
||||
@@ -204,7 +203,7 @@ func (g sortableSliceOfGeneric[T]) Swap(i, j int) { g[i], g[j] = g[j], g[i]
|
||||
//
|
||||
// This is a separate function and not a method because not all types supported
|
||||
// by Generic are ordered and only those can be sorted.
|
||||
func List[T cmp.Ordered](s Set[T]) []T {
|
||||
func List[T ordered](s Set[T]) []T {
|
||||
res := make(sortableSliceOfGeneric[T], 0, len(s))
|
||||
for key := range s {
|
||||
res = append(res, key)
|
||||
@@ -237,6 +236,6 @@ func (s Set[T]) Len() int {
|
||||
return len(s)
|
||||
}
|
||||
|
||||
func less[T cmp.Ordered](lhs, rhs T) bool {
|
||||
func less[T ordered](lhs, rhs T) bool {
|
||||
return lhs < rhs
|
||||
}
|
||||
|
||||
2
vendor/k8s.io/apiserver/pkg/admission/plugin/cel/composition.go
generated
vendored
2
vendor/k8s.io/apiserver/pkg/admission/plugin/cel/composition.go
generated
vendored
@@ -178,7 +178,7 @@ func (a *variableAccessor) Callback(_ *lazy.MapValue) ref.Val {
|
||||
return types.NewErr("composited variable %q fails to compile: %v", a.name, a.result.Error)
|
||||
}
|
||||
|
||||
v, details, err := a.result.Program.Eval(a.activation)
|
||||
v, details, err := a.result.Program.ContextEval(a.context, a.activation)
|
||||
if details == nil {
|
||||
return types.NewErr("unable to get evaluation details of variable %q", a.name)
|
||||
}
|
||||
|
||||
16
vendor/k8s.io/apiserver/pkg/cel/environment/base.go
generated
vendored
16
vendor/k8s.io/apiserver/pkg/cel/environment/base.go
generated
vendored
@@ -62,10 +62,18 @@ var baseOpts = []VersionedOptions{
|
||||
library.URLs(),
|
||||
library.Regex(),
|
||||
library.Lists(),
|
||||
|
||||
// cel-go v0.17.7 change the cost of has() from 0 to 1, but also provided the CostEstimatorOptions option to preserve the old behavior, so we enabled it at the same time we bumped our cel version to v0.17.7.
|
||||
// Since it is a regression fix, we apply it uniformly to all code use v0.17.7.
|
||||
cel.CostEstimatorOptions(checker.PresenceTestHasCost(false)),
|
||||
},
|
||||
ProgramOptions: []cel.ProgramOption{
|
||||
cel.EvalOptions(cel.OptOptimize, cel.OptTrackCost),
|
||||
cel.CostLimit(celconfig.PerCallLimit),
|
||||
|
||||
// cel-go v0.17.7 change the cost of has() from 0 to 1, but also provided the CostEstimatorOptions option to preserve the old behavior, so we enabled it at the same time we bumped our cel version to v0.17.7.
|
||||
// Since it is a regression fix, we apply it uniformly to all code use v0.17.7.
|
||||
cel.CostTrackerOptions(interpreter.PresenceTestHasCost(false)),
|
||||
},
|
||||
},
|
||||
{
|
||||
@@ -113,14 +121,6 @@ var baseOpts = []VersionedOptions{
|
||||
IntroducedVersion: version.MajorMinor(1, 29),
|
||||
EnvOptions: []cel.EnvOption{
|
||||
ext.Sets(),
|
||||
// cel-go v0.17.7 introduced CostEstimatorOptions.
|
||||
// Previous the presence has a cost of 0 but cel fixed it to 1. We still set to 0 here to avoid breaking changes.
|
||||
cel.CostEstimatorOptions(checker.PresenceTestHasCost(false)),
|
||||
},
|
||||
ProgramOptions: []cel.ProgramOption{
|
||||
// cel-go v0.17.7 introduced CostTrackerOptions.
|
||||
// Previous the presence has a cost of 0 but cel fixed it to 1. We still set to 0 here to avoid breaking changes.
|
||||
cel.CostTrackerOptions(interpreter.PresenceTestHasCost(false)),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
3
vendor/k8s.io/client-go/tools/cache/index.go
generated
vendored
3
vendor/k8s.io/client-go/tools/cache/index.go
generated
vendored
@@ -50,7 +50,8 @@ type Indexer interface {
|
||||
// GetIndexers return the indexers
|
||||
GetIndexers() Indexers
|
||||
|
||||
// AddIndexers adds more indexers to this store. This supports adding indexes after the store already has items.
|
||||
// AddIndexers adds more indexers to this store. If you call this after you already have data
|
||||
// in the store, the results are undefined.
|
||||
AddIndexers(newIndexers Indexers) error
|
||||
}
|
||||
|
||||
|
||||
4
vendor/k8s.io/client-go/tools/cache/shared_informer.go
generated
vendored
4
vendor/k8s.io/client-go/tools/cache/shared_informer.go
generated
vendored
@@ -540,8 +540,8 @@ func (s *sharedIndexInformer) AddIndexers(indexers Indexers) error {
|
||||
s.startedLock.Lock()
|
||||
defer s.startedLock.Unlock()
|
||||
|
||||
if s.stopped {
|
||||
return fmt.Errorf("indexer was not added because it has stopped already")
|
||||
if s.started {
|
||||
return fmt.Errorf("informer has already started")
|
||||
}
|
||||
|
||||
return s.indexer.AddIndexers(indexers)
|
||||
|
||||
108
vendor/k8s.io/client-go/tools/cache/thread_safe_store.go
generated
vendored
108
vendor/k8s.io/client-go/tools/cache/thread_safe_store.go
generated
vendored
@@ -52,7 +52,8 @@ type ThreadSafeStore interface {
|
||||
ByIndex(indexName, indexedValue string) ([]interface{}, error)
|
||||
GetIndexers() Indexers
|
||||
|
||||
// AddIndexers adds more indexers to this store. This supports adding indexes after the store already has items.
|
||||
// AddIndexers adds more indexers to this store. If you call this after you already have data
|
||||
// in the store, the results are undefined.
|
||||
AddIndexers(newIndexers Indexers) error
|
||||
// Resync is a no-op and is deprecated
|
||||
Resync() error
|
||||
@@ -134,66 +135,50 @@ func (i *storeIndex) addIndexers(newIndexers Indexers) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// updateSingleIndex modifies the objects location in the named index:
|
||||
// - for create you must provide only the newObj
|
||||
// - for update you must provide both the oldObj and the newObj
|
||||
// - for delete you must provide only the oldObj
|
||||
// updateSingleIndex must be called from a function that already has a lock on the cache
|
||||
func (i *storeIndex) updateSingleIndex(name string, oldObj interface{}, newObj interface{}, key string) {
|
||||
var oldIndexValues, indexValues []string
|
||||
indexFunc, ok := i.indexers[name]
|
||||
if !ok {
|
||||
// Should never happen. Caller is responsible for ensuring this exists, and should call with lock
|
||||
// held to avoid any races.
|
||||
panic(fmt.Errorf("indexer %q does not exist", name))
|
||||
}
|
||||
if oldObj != nil {
|
||||
var err error
|
||||
oldIndexValues, err = indexFunc(oldObj)
|
||||
if err != nil {
|
||||
panic(fmt.Errorf("unable to calculate an index entry for key %q on index %q: %v", key, name, err))
|
||||
}
|
||||
} else {
|
||||
oldIndexValues = oldIndexValues[:0]
|
||||
}
|
||||
|
||||
if newObj != nil {
|
||||
var err error
|
||||
indexValues, err = indexFunc(newObj)
|
||||
if err != nil {
|
||||
panic(fmt.Errorf("unable to calculate an index entry for key %q on index %q: %v", key, name, err))
|
||||
}
|
||||
} else {
|
||||
indexValues = indexValues[:0]
|
||||
}
|
||||
|
||||
index := i.indices[name]
|
||||
if index == nil {
|
||||
index = Index{}
|
||||
i.indices[name] = index
|
||||
}
|
||||
|
||||
if len(indexValues) == 1 && len(oldIndexValues) == 1 && indexValues[0] == oldIndexValues[0] {
|
||||
// We optimize for the most common case where indexFunc returns a single value which has not been changed
|
||||
return
|
||||
}
|
||||
|
||||
for _, value := range oldIndexValues {
|
||||
i.deleteKeyFromIndex(key, value, index)
|
||||
}
|
||||
for _, value := range indexValues {
|
||||
i.addKeyToIndex(key, value, index)
|
||||
}
|
||||
}
|
||||
|
||||
// updateIndices modifies the objects location in the managed indexes:
|
||||
// - for create you must provide only the newObj
|
||||
// - for update you must provide both the oldObj and the newObj
|
||||
// - for delete you must provide only the oldObj
|
||||
// updateIndices must be called from a function that already has a lock on the cache
|
||||
func (i *storeIndex) updateIndices(oldObj interface{}, newObj interface{}, key string) {
|
||||
for name := range i.indexers {
|
||||
i.updateSingleIndex(name, oldObj, newObj, key)
|
||||
var oldIndexValues, indexValues []string
|
||||
var err error
|
||||
for name, indexFunc := range i.indexers {
|
||||
if oldObj != nil {
|
||||
oldIndexValues, err = indexFunc(oldObj)
|
||||
} else {
|
||||
oldIndexValues = oldIndexValues[:0]
|
||||
}
|
||||
if err != nil {
|
||||
panic(fmt.Errorf("unable to calculate an index entry for key %q on index %q: %v", key, name, err))
|
||||
}
|
||||
|
||||
if newObj != nil {
|
||||
indexValues, err = indexFunc(newObj)
|
||||
} else {
|
||||
indexValues = indexValues[:0]
|
||||
}
|
||||
if err != nil {
|
||||
panic(fmt.Errorf("unable to calculate an index entry for key %q on index %q: %v", key, name, err))
|
||||
}
|
||||
|
||||
index := i.indices[name]
|
||||
if index == nil {
|
||||
index = Index{}
|
||||
i.indices[name] = index
|
||||
}
|
||||
|
||||
if len(indexValues) == 1 && len(oldIndexValues) == 1 && indexValues[0] == oldIndexValues[0] {
|
||||
// We optimize for the most common case where indexFunc returns a single value which has not been changed
|
||||
continue
|
||||
}
|
||||
|
||||
for _, value := range oldIndexValues {
|
||||
i.deleteKeyFromIndex(key, value, index)
|
||||
}
|
||||
for _, value := range indexValues {
|
||||
i.addKeyToIndex(key, value, index)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -354,18 +339,11 @@ func (c *threadSafeMap) AddIndexers(newIndexers Indexers) error {
|
||||
c.lock.Lock()
|
||||
defer c.lock.Unlock()
|
||||
|
||||
if err := c.index.addIndexers(newIndexers); err != nil {
|
||||
return err
|
||||
if len(c.items) > 0 {
|
||||
return fmt.Errorf("cannot add indexers to running index")
|
||||
}
|
||||
|
||||
// If there are already items, index them
|
||||
for key, item := range c.items {
|
||||
for name := range newIndexers {
|
||||
c.index.updateSingleIndex(name, nil, item, key)
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
return c.index.addIndexers(newIndexers)
|
||||
}
|
||||
|
||||
func (c *threadSafeMap) Resync() error {
|
||||
|
||||
30
vendor/k8s.io/client-go/tools/leaderelection/leaderelection.go
generated
vendored
30
vendor/k8s.io/client-go/tools/leaderelection/leaderelection.go
generated
vendored
@@ -325,22 +325,7 @@ func (le *LeaderElector) tryAcquireOrRenew(ctx context.Context) bool {
|
||||
AcquireTime: now,
|
||||
}
|
||||
|
||||
// 1. fast path for the leader to update optimistically assuming that the record observed
|
||||
// last time is the current version.
|
||||
if le.IsLeader() && le.isLeaseValid(now.Time) {
|
||||
oldObservedRecord := le.getObservedRecord()
|
||||
leaderElectionRecord.AcquireTime = oldObservedRecord.AcquireTime
|
||||
leaderElectionRecord.LeaderTransitions = oldObservedRecord.LeaderTransitions
|
||||
|
||||
err := le.config.Lock.Update(ctx, leaderElectionRecord)
|
||||
if err == nil {
|
||||
le.setObservedRecord(&leaderElectionRecord)
|
||||
return true
|
||||
}
|
||||
klog.Errorf("Failed to update lock optimitically: %v, falling back to slow path", err)
|
||||
}
|
||||
|
||||
// 2. obtain or create the ElectionRecord
|
||||
// 1. obtain or create the ElectionRecord
|
||||
oldLeaderElectionRecord, oldLeaderElectionRawRecord, err := le.config.Lock.Get(ctx)
|
||||
if err != nil {
|
||||
if !errors.IsNotFound(err) {
|
||||
@@ -357,23 +342,24 @@ func (le *LeaderElector) tryAcquireOrRenew(ctx context.Context) bool {
|
||||
return true
|
||||
}
|
||||
|
||||
// 3. Record obtained, check the Identity & Time
|
||||
// 2. Record obtained, check the Identity & Time
|
||||
if !bytes.Equal(le.observedRawRecord, oldLeaderElectionRawRecord) {
|
||||
le.setObservedRecord(oldLeaderElectionRecord)
|
||||
|
||||
le.observedRawRecord = oldLeaderElectionRawRecord
|
||||
}
|
||||
if len(oldLeaderElectionRecord.HolderIdentity) > 0 && le.isLeaseValid(now.Time) && !le.IsLeader() {
|
||||
if len(oldLeaderElectionRecord.HolderIdentity) > 0 &&
|
||||
le.observedTime.Add(time.Second*time.Duration(oldLeaderElectionRecord.LeaseDurationSeconds)).After(now.Time) &&
|
||||
!le.IsLeader() {
|
||||
klog.V(4).Infof("lock is held by %v and has not yet expired", oldLeaderElectionRecord.HolderIdentity)
|
||||
return false
|
||||
}
|
||||
|
||||
// 4. We're going to try to update. The leaderElectionRecord is set to it's default
|
||||
// 3. We're going to try to update. The leaderElectionRecord is set to it's default
|
||||
// here. Let's correct it before updating.
|
||||
if le.IsLeader() {
|
||||
leaderElectionRecord.AcquireTime = oldLeaderElectionRecord.AcquireTime
|
||||
leaderElectionRecord.LeaderTransitions = oldLeaderElectionRecord.LeaderTransitions
|
||||
le.metrics.slowpathExercised(le.config.Name)
|
||||
} else {
|
||||
leaderElectionRecord.LeaderTransitions = oldLeaderElectionRecord.LeaderTransitions + 1
|
||||
}
|
||||
@@ -414,10 +400,6 @@ func (le *LeaderElector) Check(maxTolerableExpiredLease time.Duration) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (le *LeaderElector) isLeaseValid(now time.Time) bool {
|
||||
return le.observedTime.Add(time.Second * time.Duration(le.getObservedRecord().LeaseDurationSeconds)).After(now)
|
||||
}
|
||||
|
||||
// setObservedRecord will set a new observedRecord and update observedTime to the current time.
|
||||
// Protect critical sections with lock.
|
||||
func (le *LeaderElector) setObservedRecord(observedRecord *rl.LeaderElectionRecord) {
|
||||
|
||||
30
vendor/k8s.io/client-go/tools/leaderelection/metrics.go
generated
vendored
30
vendor/k8s.io/client-go/tools/leaderelection/metrics.go
generated
vendored
@@ -26,26 +26,24 @@ import (
|
||||
type leaderMetricsAdapter interface {
|
||||
leaderOn(name string)
|
||||
leaderOff(name string)
|
||||
slowpathExercised(name string)
|
||||
}
|
||||
|
||||
// LeaderMetric instruments metrics used in leader election.
|
||||
type LeaderMetric interface {
|
||||
// GaugeMetric represents a single numerical value that can arbitrarily go up
|
||||
// and down.
|
||||
type SwitchMetric interface {
|
||||
On(name string)
|
||||
Off(name string)
|
||||
SlowpathExercised(name string)
|
||||
}
|
||||
|
||||
type noopMetric struct{}
|
||||
|
||||
func (noopMetric) On(name string) {}
|
||||
func (noopMetric) Off(name string) {}
|
||||
func (noopMetric) SlowpathExercised(name string) {}
|
||||
func (noopMetric) On(name string) {}
|
||||
func (noopMetric) Off(name string) {}
|
||||
|
||||
// defaultLeaderMetrics expects the caller to lock before setting any metrics.
|
||||
type defaultLeaderMetrics struct {
|
||||
// leader's value indicates if the current process is the owner of name lease
|
||||
leader LeaderMetric
|
||||
leader SwitchMetric
|
||||
}
|
||||
|
||||
func (m *defaultLeaderMetrics) leaderOn(name string) {
|
||||
@@ -62,27 +60,19 @@ func (m *defaultLeaderMetrics) leaderOff(name string) {
|
||||
m.leader.Off(name)
|
||||
}
|
||||
|
||||
func (m *defaultLeaderMetrics) slowpathExercised(name string) {
|
||||
if m == nil {
|
||||
return
|
||||
}
|
||||
m.leader.SlowpathExercised(name)
|
||||
}
|
||||
|
||||
type noMetrics struct{}
|
||||
|
||||
func (noMetrics) leaderOn(name string) {}
|
||||
func (noMetrics) leaderOff(name string) {}
|
||||
func (noMetrics) slowpathExercised(name string) {}
|
||||
func (noMetrics) leaderOn(name string) {}
|
||||
func (noMetrics) leaderOff(name string) {}
|
||||
|
||||
// MetricsProvider generates various metrics used by the leader election.
|
||||
type MetricsProvider interface {
|
||||
NewLeaderMetric() LeaderMetric
|
||||
NewLeaderMetric() SwitchMetric
|
||||
}
|
||||
|
||||
type noopMetricsProvider struct{}
|
||||
|
||||
func (noopMetricsProvider) NewLeaderMetric() LeaderMetric {
|
||||
func (_ noopMetricsProvider) NewLeaderMetric() SwitchMetric {
|
||||
return noopMetric{}
|
||||
}
|
||||
|
||||
|
||||
3
vendor/k8s.io/client-go/util/flowcontrol/backoff.go
generated
vendored
3
vendor/k8s.io/client-go/util/flowcontrol/backoff.go
generated
vendored
@@ -23,6 +23,7 @@ import (
|
||||
|
||||
"k8s.io/utils/clock"
|
||||
testingclock "k8s.io/utils/clock/testing"
|
||||
"k8s.io/utils/integer"
|
||||
)
|
||||
|
||||
type backoffEntry struct {
|
||||
@@ -99,7 +100,7 @@ func (p *Backoff) Next(id string, eventTime time.Time) {
|
||||
} else {
|
||||
delay := entry.backoff * 2 // exponential
|
||||
delay += p.jitter(entry.backoff) // add some jitter to the delay
|
||||
entry.backoff = min(delay, p.maxDuration)
|
||||
entry.backoff = time.Duration(integer.Int64Min(int64(delay), int64(p.maxDuration)))
|
||||
}
|
||||
entry.lastUpdate = p.Clock.Now()
|
||||
}
|
||||
|
||||
3
vendor/k8s.io/kube-openapi/pkg/generators/rules/idl_tag.go
generated
vendored
3
vendor/k8s.io/kube-openapi/pkg/generators/rules/idl_tag.go
generated
vendored
@@ -33,8 +33,7 @@ func (l *ListTypeMissing) Validate(t *types.Type) ([]string, error) {
|
||||
continue
|
||||
}
|
||||
|
||||
// All slice fields must have a list-type tag except []byte
|
||||
if m.Type.Kind == types.Slice && m.Type.Elem != types.Byte && !hasListType {
|
||||
if m.Type.Kind == types.Slice && !hasListType {
|
||||
fields = append(fields, m.Name)
|
||||
continue
|
||||
}
|
||||
|
||||
73
vendor/k8s.io/utils/integer/integer.go
generated
vendored
Normal file
73
vendor/k8s.io/utils/integer/integer.go
generated
vendored
Normal file
@@ -0,0 +1,73 @@
|
||||
/*
|
||||
Copyright 2016 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package integer
|
||||
|
||||
import "math"
|
||||
|
||||
// IntMax returns the maximum of the params
|
||||
func IntMax(a, b int) int {
|
||||
if b > a {
|
||||
return b
|
||||
}
|
||||
return a
|
||||
}
|
||||
|
||||
// IntMin returns the minimum of the params
|
||||
func IntMin(a, b int) int {
|
||||
if b < a {
|
||||
return b
|
||||
}
|
||||
return a
|
||||
}
|
||||
|
||||
// Int32Max returns the maximum of the params
|
||||
func Int32Max(a, b int32) int32 {
|
||||
if b > a {
|
||||
return b
|
||||
}
|
||||
return a
|
||||
}
|
||||
|
||||
// Int32Min returns the minimum of the params
|
||||
func Int32Min(a, b int32) int32 {
|
||||
if b < a {
|
||||
return b
|
||||
}
|
||||
return a
|
||||
}
|
||||
|
||||
// Int64Max returns the maximum of the params
|
||||
func Int64Max(a, b int64) int64 {
|
||||
if b > a {
|
||||
return b
|
||||
}
|
||||
return a
|
||||
}
|
||||
|
||||
// Int64Min returns the minimum of the params
|
||||
func Int64Min(a, b int64) int64 {
|
||||
if b < a {
|
||||
return b
|
||||
}
|
||||
return a
|
||||
}
|
||||
|
||||
// RoundToInt32 rounds floats into integer numbers.
|
||||
// Deprecated: use math.Round() and a cast directly.
|
||||
func RoundToInt32(a float64) int32 {
|
||||
return int32(math.Round(a))
|
||||
}
|
||||
Reference in New Issue
Block a user