mirror of
https://github.com/kubernetes-sigs/descheduler.git
synced 2026-01-28 06:29:29 +01:00
Bump to k8s v0.30.0-alpha.3 (#1359)
* update go.mod for v0.30.0-alpha.3 * update vendor deps * regenrate go.mod transitive dependencies --------- Co-authored-by: Amir Alavi <amiralavi7@gmail.com>
This commit is contained in:
8
vendor/k8s.io/api/admissionregistration/v1/generated.proto
generated
vendored
8
vendor/k8s.io/api/admissionregistration/v1/generated.proto
generated
vendored
@@ -76,6 +76,7 @@ message MutatingWebhook {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
repeated RuleWithOperations rules = 3;
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -183,6 +184,7 @@ message MutatingWebhook {
|
||||
// If a persisted webhook configuration specifies allowed versions and does not
|
||||
// include any versions known to the API Server, calls to the webhook will fail
|
||||
// and be subject to the failure policy.
|
||||
// +listType=atomic
|
||||
repeated string admissionReviewVersions = 8;
|
||||
|
||||
// reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation.
|
||||
@@ -236,6 +238,8 @@ message MutatingWebhookConfiguration {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated MutatingWebhook Webhooks = 2;
|
||||
}
|
||||
|
||||
@@ -352,6 +356,7 @@ message ValidatingWebhook {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
repeated RuleWithOperations rules = 3;
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -459,6 +464,7 @@ message ValidatingWebhook {
|
||||
// If a persisted webhook configuration specifies allowed versions and does not
|
||||
// include any versions known to the API Server, calls to the webhook will fail
|
||||
// and be subject to the failure policy.
|
||||
// +listType=atomic
|
||||
repeated string admissionReviewVersions = 8;
|
||||
|
||||
// MatchConditions is a list of conditions that must be met for a request to be sent to this
|
||||
@@ -494,6 +500,8 @@ message ValidatingWebhookConfiguration {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated ValidatingWebhook Webhooks = 2;
|
||||
}
|
||||
|
||||
|
||||
8
vendor/k8s.io/api/admissionregistration/v1/types.go
generated
vendored
8
vendor/k8s.io/api/admissionregistration/v1/types.go
generated
vendored
@@ -134,6 +134,8 @@ type ValidatingWebhookConfiguration struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Webhooks []ValidatingWebhook `json:"webhooks,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=Webhooks"`
|
||||
}
|
||||
|
||||
@@ -164,6 +166,8 @@ type MutatingWebhookConfiguration struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Webhooks []MutatingWebhook `json:"webhooks,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=Webhooks"`
|
||||
}
|
||||
|
||||
@@ -199,6 +203,7 @@ type ValidatingWebhook struct {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
Rules []RuleWithOperations `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -306,6 +311,7 @@ type ValidatingWebhook struct {
|
||||
// If a persisted webhook configuration specifies allowed versions and does not
|
||||
// include any versions known to the API Server, calls to the webhook will fail
|
||||
// and be subject to the failure policy.
|
||||
// +listType=atomic
|
||||
AdmissionReviewVersions []string `json:"admissionReviewVersions" protobuf:"bytes,8,rep,name=admissionReviewVersions"`
|
||||
|
||||
// MatchConditions is a list of conditions that must be met for a request to be sent to this
|
||||
@@ -350,6 +356,7 @@ type MutatingWebhook struct {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
Rules []RuleWithOperations `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -457,6 +464,7 @@ type MutatingWebhook struct {
|
||||
// If a persisted webhook configuration specifies allowed versions and does not
|
||||
// include any versions known to the API Server, calls to the webhook will fail
|
||||
// and be subject to the failure policy.
|
||||
// +listType=atomic
|
||||
AdmissionReviewVersions []string `json:"admissionReviewVersions" protobuf:"bytes,8,rep,name=admissionReviewVersions"`
|
||||
|
||||
// reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation.
|
||||
|
||||
9
vendor/k8s.io/api/admissionregistration/v1beta1/generated.proto
generated
vendored
9
vendor/k8s.io/api/admissionregistration/v1beta1/generated.proto
generated
vendored
@@ -222,6 +222,7 @@ message MutatingWebhook {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.admissionregistration.v1.RuleWithOperations rules = 3;
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -332,6 +333,7 @@ message MutatingWebhook {
|
||||
// and be subject to the failure policy.
|
||||
// Default to `['v1beta1']`.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string admissionReviewVersions = 8;
|
||||
|
||||
// reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation.
|
||||
@@ -386,6 +388,8 @@ message MutatingWebhookConfiguration {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated MutatingWebhook Webhooks = 2;
|
||||
}
|
||||
|
||||
@@ -765,6 +769,7 @@ message ValidatingWebhook {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.admissionregistration.v1.RuleWithOperations rules = 3;
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -856,6 +861,7 @@ message ValidatingWebhook {
|
||||
// Requests with the dryRun attribute will be auto-rejected if they match a webhook with
|
||||
// sideEffects == Unknown or Some. Defaults to Unknown.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
optional string sideEffects = 6;
|
||||
|
||||
// TimeoutSeconds specifies the timeout for this webhook. After the timeout passes,
|
||||
@@ -875,6 +881,7 @@ message ValidatingWebhook {
|
||||
// and be subject to the failure policy.
|
||||
// Default to `['v1beta1']`.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string admissionReviewVersions = 8;
|
||||
|
||||
// MatchConditions is a list of conditions that must be met for a request to be sent to this
|
||||
@@ -911,6 +918,8 @@ message ValidatingWebhookConfiguration {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated ValidatingWebhook Webhooks = 2;
|
||||
}
|
||||
|
||||
|
||||
9
vendor/k8s.io/api/admissionregistration/v1beta1/types.go
generated
vendored
9
vendor/k8s.io/api/admissionregistration/v1beta1/types.go
generated
vendored
@@ -684,6 +684,8 @@ type ValidatingWebhookConfiguration struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Webhooks []ValidatingWebhook `json:"webhooks,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=Webhooks"`
|
||||
}
|
||||
|
||||
@@ -723,6 +725,8 @@ type MutatingWebhookConfiguration struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Webhooks []MutatingWebhook `json:"webhooks,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=Webhooks"`
|
||||
}
|
||||
|
||||
@@ -762,6 +766,7 @@ type ValidatingWebhook struct {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
Rules []RuleWithOperations `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -853,6 +858,7 @@ type ValidatingWebhook struct {
|
||||
// Requests with the dryRun attribute will be auto-rejected if they match a webhook with
|
||||
// sideEffects == Unknown or Some. Defaults to Unknown.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
SideEffects *SideEffectClass `json:"sideEffects,omitempty" protobuf:"bytes,6,opt,name=sideEffects,casttype=SideEffectClass"`
|
||||
|
||||
// TimeoutSeconds specifies the timeout for this webhook. After the timeout passes,
|
||||
@@ -872,6 +878,7 @@ type ValidatingWebhook struct {
|
||||
// and be subject to the failure policy.
|
||||
// Default to `['v1beta1']`.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AdmissionReviewVersions []string `json:"admissionReviewVersions,omitempty" protobuf:"bytes,8,rep,name=admissionReviewVersions"`
|
||||
|
||||
// MatchConditions is a list of conditions that must be met for a request to be sent to this
|
||||
@@ -916,6 +923,7 @@ type MutatingWebhook struct {
|
||||
// from putting the cluster in a state which cannot be recovered from without completely
|
||||
// disabling the plugin, ValidatingAdmissionWebhooks and MutatingAdmissionWebhooks are never called
|
||||
// on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects.
|
||||
// +listType=atomic
|
||||
Rules []RuleWithOperations `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
|
||||
// FailurePolicy defines how unrecognized errors from the admission endpoint are handled -
|
||||
@@ -1026,6 +1034,7 @@ type MutatingWebhook struct {
|
||||
// and be subject to the failure policy.
|
||||
// Default to `['v1beta1']`.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AdmissionReviewVersions []string `json:"admissionReviewVersions,omitempty" protobuf:"bytes,8,rep,name=admissionReviewVersions"`
|
||||
|
||||
// reinvocationPolicy indicates whether this webhook should be called multiple times as part of a single admission evaluation.
|
||||
|
||||
9
vendor/k8s.io/api/apps/v1/generated.proto
generated
vendored
9
vendor/k8s.io/api/apps/v1/generated.proto
generated
vendored
@@ -200,6 +200,8 @@ message DaemonSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DaemonSetCondition conditions = 10;
|
||||
}
|
||||
|
||||
@@ -341,6 +343,8 @@ message DeploymentStatus {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DeploymentCondition conditions = 6;
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -475,6 +479,8 @@ message ReplicaSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ReplicaSetCondition conditions = 6;
|
||||
}
|
||||
|
||||
@@ -688,6 +694,7 @@ message StatefulSetSpec {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.core.v1.PersistentVolumeClaim volumeClaimTemplates = 4;
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -782,6 +789,8 @@ message StatefulSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated StatefulSetCondition conditions = 10;
|
||||
|
||||
// Total number of available pods (ready for at least minReadySeconds) targeted by this statefulset.
|
||||
|
||||
9
vendor/k8s.io/api/apps/v1/types.go
generated
vendored
9
vendor/k8s.io/api/apps/v1/types.go
generated
vendored
@@ -211,6 +211,7 @@ type StatefulSetSpec struct {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumeClaimTemplates []v1.PersistentVolumeClaim `json:"volumeClaimTemplates,omitempty" protobuf:"bytes,4,rep,name=volumeClaimTemplates"`
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -305,6 +306,8 @@ type StatefulSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []StatefulSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
|
||||
// Total number of available pods (ready for at least minReadySeconds) targeted by this statefulset.
|
||||
@@ -507,6 +510,8 @@ type DeploymentStatus struct {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DeploymentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -714,6 +719,8 @@ type DaemonSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DaemonSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -884,6 +891,8 @@ type ReplicaSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ReplicaSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
|
||||
5
vendor/k8s.io/api/apps/v1beta1/generated.proto
generated
vendored
5
vendor/k8s.io/api/apps/v1beta1/generated.proto
generated
vendored
@@ -208,6 +208,8 @@ message DeploymentStatus {
|
||||
// Conditions represent the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DeploymentCondition conditions = 6;
|
||||
|
||||
// collisionCount is the count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -445,6 +447,7 @@ message StatefulSetSpec {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.core.v1.PersistentVolumeClaim volumeClaimTemplates = 4;
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -536,6 +539,8 @@ message StatefulSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated StatefulSetCondition conditions = 10;
|
||||
|
||||
// availableReplicas is the total number of available pods (ready for at least minReadySeconds) targeted by this StatefulSet.
|
||||
|
||||
5
vendor/k8s.io/api/apps/v1beta1/types.go
generated
vendored
5
vendor/k8s.io/api/apps/v1beta1/types.go
generated
vendored
@@ -251,6 +251,7 @@ type StatefulSetSpec struct {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumeClaimTemplates []v1.PersistentVolumeClaim `json:"volumeClaimTemplates,omitempty" protobuf:"bytes,4,rep,name=volumeClaimTemplates"`
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -342,6 +343,8 @@ type StatefulSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []StatefulSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
|
||||
// availableReplicas is the total number of available pods (ready for at least minReadySeconds) targeted by this StatefulSet.
|
||||
@@ -577,6 +580,8 @@ type DeploymentStatus struct {
|
||||
// Conditions represent the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DeploymentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
|
||||
// collisionCount is the count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
|
||||
9
vendor/k8s.io/api/apps/v1beta2/generated.proto
generated
vendored
9
vendor/k8s.io/api/apps/v1beta2/generated.proto
generated
vendored
@@ -204,6 +204,8 @@ message DaemonSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DaemonSetCondition conditions = 10;
|
||||
}
|
||||
|
||||
@@ -346,6 +348,8 @@ message DeploymentStatus {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DeploymentCondition conditions = 6;
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -481,6 +485,8 @@ message ReplicaSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ReplicaSetCondition conditions = 6;
|
||||
}
|
||||
|
||||
@@ -733,6 +739,7 @@ message StatefulSetSpec {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.api.core.v1.PersistentVolumeClaim volumeClaimTemplates = 4;
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -824,6 +831,8 @@ message StatefulSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated StatefulSetCondition conditions = 10;
|
||||
|
||||
// Total number of available pods (ready for at least minReadySeconds) targeted by this StatefulSet.
|
||||
|
||||
9
vendor/k8s.io/api/apps/v1beta2/types.go
generated
vendored
9
vendor/k8s.io/api/apps/v1beta2/types.go
generated
vendored
@@ -261,6 +261,7 @@ type StatefulSetSpec struct {
|
||||
// any volumes in the template, with the same name.
|
||||
// TODO: Define the behavior if a claim already exists with the same name.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumeClaimTemplates []v1.PersistentVolumeClaim `json:"volumeClaimTemplates,omitempty" protobuf:"bytes,4,rep,name=volumeClaimTemplates"`
|
||||
|
||||
// serviceName is the name of the service that governs this StatefulSet.
|
||||
@@ -352,6 +353,8 @@ type StatefulSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []StatefulSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
|
||||
// Total number of available pods (ready for at least minReadySeconds) targeted by this StatefulSet.
|
||||
@@ -555,6 +558,8 @@ type DeploymentStatus struct {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DeploymentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -765,6 +770,8 @@ type DaemonSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DaemonSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -951,6 +958,8 @@ type ReplicaSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ReplicaSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
|
||||
4
vendor/k8s.io/api/authentication/v1/generated.proto
generated
vendored
4
vendor/k8s.io/api/authentication/v1/generated.proto
generated
vendored
@@ -99,6 +99,7 @@ message TokenRequestSpec {
|
||||
// token issued for multiple audiences may be used to authenticate
|
||||
// against any of the audiences listed but implies a high degree of
|
||||
// trust between the target audiences.
|
||||
// +listType=atomic
|
||||
repeated string audiences = 1;
|
||||
|
||||
// ExpirationSeconds is the requested duration of validity of the request. The
|
||||
@@ -154,6 +155,7 @@ message TokenReviewSpec {
|
||||
// this list. If no audiences are provided, the audience will default to the
|
||||
// audience of the Kubernetes apiserver.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string audiences = 2;
|
||||
}
|
||||
|
||||
@@ -177,6 +179,7 @@ message TokenReviewStatus {
|
||||
// status.audience field where status.authenticated is "true", the token is
|
||||
// valid against the audience of the Kubernetes API server.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string audiences = 4;
|
||||
|
||||
// Error indicates that the token couldn't be checked
|
||||
@@ -199,6 +202,7 @@ message UserInfo {
|
||||
|
||||
// The names of groups this user is a part of.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string groups = 3;
|
||||
|
||||
// Any additional information provided by the authenticator.
|
||||
|
||||
4
vendor/k8s.io/api/authentication/v1/types.go
generated
vendored
4
vendor/k8s.io/api/authentication/v1/types.go
generated
vendored
@@ -75,6 +75,7 @@ type TokenReviewSpec struct {
|
||||
// this list. If no audiences are provided, the audience will default to the
|
||||
// audience of the Kubernetes apiserver.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences,omitempty" protobuf:"bytes,2,rep,name=audiences"`
|
||||
}
|
||||
|
||||
@@ -96,6 +97,7 @@ type TokenReviewStatus struct {
|
||||
// status.audience field where status.authenticated is "true", the token is
|
||||
// valid against the audience of the Kubernetes API server.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences,omitempty" protobuf:"bytes,4,rep,name=audiences"`
|
||||
// Error indicates that the token couldn't be checked
|
||||
// +optional
|
||||
@@ -115,6 +117,7 @@ type UserInfo struct {
|
||||
UID string `json:"uid,omitempty" protobuf:"bytes,2,opt,name=uid"`
|
||||
// The names of groups this user is a part of.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Groups []string `json:"groups,omitempty" protobuf:"bytes,3,rep,name=groups"`
|
||||
// Any additional information provided by the authenticator.
|
||||
// +optional
|
||||
@@ -156,6 +159,7 @@ type TokenRequestSpec struct {
|
||||
// token issued for multiple audiences may be used to authenticate
|
||||
// against any of the audiences listed but implies a high degree of
|
||||
// trust between the target audiences.
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences" protobuf:"bytes,1,rep,name=audiences"`
|
||||
|
||||
// ExpirationSeconds is the requested duration of validity of the request. The
|
||||
|
||||
3
vendor/k8s.io/api/authentication/v1beta1/generated.proto
generated
vendored
3
vendor/k8s.io/api/authentication/v1beta1/generated.proto
generated
vendored
@@ -87,6 +87,7 @@ message TokenReviewSpec {
|
||||
// this list. If no audiences are provided, the audience will default to the
|
||||
// audience of the Kubernetes apiserver.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string audiences = 2;
|
||||
}
|
||||
|
||||
@@ -110,6 +111,7 @@ message TokenReviewStatus {
|
||||
// status.audience field where status.authenticated is "true", the token is
|
||||
// valid against the audience of the Kubernetes API server.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string audiences = 4;
|
||||
|
||||
// Error indicates that the token couldn't be checked
|
||||
@@ -132,6 +134,7 @@ message UserInfo {
|
||||
|
||||
// The names of groups this user is a part of.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string groups = 3;
|
||||
|
||||
// Any additional information provided by the authenticator.
|
||||
|
||||
3
vendor/k8s.io/api/authentication/v1beta1/types.go
generated
vendored
3
vendor/k8s.io/api/authentication/v1beta1/types.go
generated
vendored
@@ -60,6 +60,7 @@ type TokenReviewSpec struct {
|
||||
// this list. If no audiences are provided, the audience will default to the
|
||||
// audience of the Kubernetes apiserver.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences,omitempty" protobuf:"bytes,2,rep,name=audiences"`
|
||||
}
|
||||
|
||||
@@ -81,6 +82,7 @@ type TokenReviewStatus struct {
|
||||
// status.audience field where status.authenticated is "true", the token is
|
||||
// valid against the audience of the Kubernetes API server.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Audiences []string `json:"audiences,omitempty" protobuf:"bytes,4,rep,name=audiences"`
|
||||
// Error indicates that the token couldn't be checked
|
||||
// +optional
|
||||
@@ -100,6 +102,7 @@ type UserInfo struct {
|
||||
UID string `json:"uid,omitempty" protobuf:"bytes,2,opt,name=uid"`
|
||||
// The names of groups this user is a part of.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Groups []string `json:"groups,omitempty" protobuf:"bytes,3,rep,name=groups"`
|
||||
// Any additional information provided by the authenticator.
|
||||
// +optional
|
||||
|
||||
9
vendor/k8s.io/api/authorization/v1/generated.proto
generated
vendored
9
vendor/k8s.io/api/authorization/v1/generated.proto
generated
vendored
@@ -69,11 +69,13 @@ message NonResourceAttributes {
|
||||
// NonResourceRule holds information that describes a rule for the non-resource
|
||||
message NonResourceRule {
|
||||
// Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full,
|
||||
// final step in the path. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 2;
|
||||
}
|
||||
|
||||
@@ -115,20 +117,24 @@ message ResourceAttributes {
|
||||
// may contain duplicates, and possibly be incomplete.
|
||||
message ResourceRule {
|
||||
// Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 2;
|
||||
|
||||
// Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups.
|
||||
// "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 3;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 4;
|
||||
}
|
||||
|
||||
@@ -220,6 +226,7 @@ message SubjectAccessReviewSpec {
|
||||
|
||||
// Groups is the groups you're testing for.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string groups = 4;
|
||||
|
||||
// Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer
|
||||
@@ -262,10 +269,12 @@ message SubjectAccessReviewStatus {
|
||||
message SubjectRulesReviewStatus {
|
||||
// ResourceRules is the list of actions the subject is allowed to perform on resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
repeated ResourceRule resourceRules = 1;
|
||||
|
||||
// NonResourceRules is the list of actions the subject is allowed to perform on non-resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
repeated NonResourceRule nonResourceRules = 2;
|
||||
|
||||
// Incomplete is true when the rules returned by this call are incomplete. This is most commonly
|
||||
|
||||
9
vendor/k8s.io/api/authorization/v1/types.go
generated
vendored
9
vendor/k8s.io/api/authorization/v1/types.go
generated
vendored
@@ -143,6 +143,7 @@ type SubjectAccessReviewSpec struct {
|
||||
User string `json:"user,omitempty" protobuf:"bytes,3,opt,name=user"`
|
||||
// Groups is the groups you're testing for.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Groups []string `json:"groups,omitempty" protobuf:"bytes,4,rep,name=groups"`
|
||||
// Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer
|
||||
// it needs a reflection here.
|
||||
@@ -232,9 +233,11 @@ type SelfSubjectRulesReviewSpec struct {
|
||||
type SubjectRulesReviewStatus struct {
|
||||
// ResourceRules is the list of actions the subject is allowed to perform on resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
ResourceRules []ResourceRule `json:"resourceRules" protobuf:"bytes,1,rep,name=resourceRules"`
|
||||
// NonResourceRules is the list of actions the subject is allowed to perform on non-resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
NonResourceRules []NonResourceRule `json:"nonResourceRules" protobuf:"bytes,2,rep,name=nonResourceRules"`
|
||||
// Incomplete is true when the rules returned by this call are incomplete. This is most commonly
|
||||
// encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.
|
||||
@@ -250,28 +253,34 @@ type SubjectRulesReviewStatus struct {
|
||||
// may contain duplicates, and possibly be incomplete.
|
||||
type ResourceRule struct {
|
||||
// Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups.
|
||||
// "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"`
|
||||
}
|
||||
|
||||
// NonResourceRule holds information that describes a rule for the non-resource
|
||||
type NonResourceRule struct {
|
||||
// Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full,
|
||||
// final step in the path. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,2,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
9
vendor/k8s.io/api/authorization/v1beta1/generated.proto
generated
vendored
9
vendor/k8s.io/api/authorization/v1beta1/generated.proto
generated
vendored
@@ -69,11 +69,13 @@ message NonResourceAttributes {
|
||||
// NonResourceRule holds information that describes a rule for the non-resource
|
||||
message NonResourceRule {
|
||||
// Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full,
|
||||
// final step in the path. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 2;
|
||||
}
|
||||
|
||||
@@ -115,20 +117,24 @@ message ResourceAttributes {
|
||||
// may contain duplicates, and possibly be incomplete.
|
||||
message ResourceRule {
|
||||
// Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 2;
|
||||
|
||||
// Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups.
|
||||
// "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 3;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 4;
|
||||
}
|
||||
|
||||
@@ -220,6 +226,7 @@ message SubjectAccessReviewSpec {
|
||||
|
||||
// Groups is the groups you're testing for.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string group = 4;
|
||||
|
||||
// Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer
|
||||
@@ -262,10 +269,12 @@ message SubjectAccessReviewStatus {
|
||||
message SubjectRulesReviewStatus {
|
||||
// ResourceRules is the list of actions the subject is allowed to perform on resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
repeated ResourceRule resourceRules = 1;
|
||||
|
||||
// NonResourceRules is the list of actions the subject is allowed to perform on non-resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
repeated NonResourceRule nonResourceRules = 2;
|
||||
|
||||
// Incomplete is true when the rules returned by this call are incomplete. This is most commonly
|
||||
|
||||
9
vendor/k8s.io/api/authorization/v1beta1/types.go
generated
vendored
9
vendor/k8s.io/api/authorization/v1beta1/types.go
generated
vendored
@@ -152,6 +152,7 @@ type SubjectAccessReviewSpec struct {
|
||||
User string `json:"user,omitempty" protobuf:"bytes,3,opt,name=user"`
|
||||
// Groups is the groups you're testing for.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Groups []string `json:"group,omitempty" protobuf:"bytes,4,rep,name=group"`
|
||||
// Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer
|
||||
// it needs a reflection here.
|
||||
@@ -244,9 +245,11 @@ type SelfSubjectRulesReviewSpec struct {
|
||||
type SubjectRulesReviewStatus struct {
|
||||
// ResourceRules is the list of actions the subject is allowed to perform on resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
ResourceRules []ResourceRule `json:"resourceRules" protobuf:"bytes,1,rep,name=resourceRules"`
|
||||
// NonResourceRules is the list of actions the subject is allowed to perform on non-resources.
|
||||
// The list ordering isn't significant, may contain duplicates, and possibly be incomplete.
|
||||
// +listType=atomic
|
||||
NonResourceRules []NonResourceRule `json:"nonResourceRules" protobuf:"bytes,2,rep,name=nonResourceRules"`
|
||||
// Incomplete is true when the rules returned by this call are incomplete. This is most commonly
|
||||
// encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.
|
||||
@@ -262,28 +265,34 @@ type SubjectRulesReviewStatus struct {
|
||||
// may contain duplicates, and possibly be incomplete.
|
||||
type ResourceRule struct {
|
||||
// Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups.
|
||||
// "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"`
|
||||
}
|
||||
|
||||
// NonResourceRule holds information that describes a rule for the non-resource
|
||||
type NonResourceRule struct {
|
||||
// Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full,
|
||||
// final step in the path. "*" means all.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,2,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
3
vendor/k8s.io/api/autoscaling/v2beta1/generated.proto
generated
vendored
3
vendor/k8s.io/api/autoscaling/v2beta1/generated.proto
generated
vendored
@@ -220,6 +220,7 @@ message HorizontalPodAutoscalerSpec {
|
||||
// increased, and vice-versa. See the individual metric source types for
|
||||
// more information about how each type of metric must respond.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated MetricSpec metrics = 4;
|
||||
}
|
||||
|
||||
@@ -244,11 +245,13 @@ message HorizontalPodAutoscalerStatus {
|
||||
|
||||
// currentMetrics is the last read state of the metrics used by this autoscaler.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated MetricStatus currentMetrics = 5;
|
||||
|
||||
// conditions is the set of conditions required for this autoscaler to scale its target,
|
||||
// and indicates whether or not those conditions are met.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated HorizontalPodAutoscalerCondition conditions = 6;
|
||||
}
|
||||
|
||||
|
||||
3
vendor/k8s.io/api/autoscaling/v2beta1/types.go
generated
vendored
3
vendor/k8s.io/api/autoscaling/v2beta1/types.go
generated
vendored
@@ -56,6 +56,7 @@ type HorizontalPodAutoscalerSpec struct {
|
||||
// increased, and vice-versa. See the individual metric source types for
|
||||
// more information about how each type of metric must respond.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Metrics []MetricSpec `json:"metrics,omitempty" protobuf:"bytes,4,rep,name=metrics"`
|
||||
}
|
||||
|
||||
@@ -260,11 +261,13 @@ type HorizontalPodAutoscalerStatus struct {
|
||||
|
||||
// currentMetrics is the last read state of the metrics used by this autoscaler.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
CurrentMetrics []MetricStatus `json:"currentMetrics" protobuf:"bytes,5,rep,name=currentMetrics"`
|
||||
|
||||
// conditions is the set of conditions required for this autoscaler to scale its target,
|
||||
// and indicates whether or not those conditions are met.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Conditions []HorizontalPodAutoscalerCondition `json:"conditions" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
|
||||
4
vendor/k8s.io/api/autoscaling/v2beta2/generated.proto
generated
vendored
4
vendor/k8s.io/api/autoscaling/v2beta2/generated.proto
generated
vendored
@@ -136,6 +136,7 @@ message HPAScalingRules {
|
||||
// policies is a list of potential scaling polices which can be used during scaling.
|
||||
// At least one policy must be specified, otherwise the HPAScalingRules will be discarded as invalid
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated HPAScalingPolicy policies = 2;
|
||||
}
|
||||
|
||||
@@ -238,6 +239,7 @@ message HorizontalPodAutoscalerSpec {
|
||||
// more information about how each type of metric must respond.
|
||||
// If not set, the default metric will be set to 80% average CPU utilization.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated MetricSpec metrics = 4;
|
||||
|
||||
// behavior configures the scaling behavior of the target
|
||||
@@ -268,11 +270,13 @@ message HorizontalPodAutoscalerStatus {
|
||||
|
||||
// currentMetrics is the last read state of the metrics used by this autoscaler.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated MetricStatus currentMetrics = 5;
|
||||
|
||||
// conditions is the set of conditions required for this autoscaler to scale its target,
|
||||
// and indicates whether or not those conditions are met.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated HorizontalPodAutoscalerCondition conditions = 6;
|
||||
}
|
||||
|
||||
|
||||
4
vendor/k8s.io/api/autoscaling/v2beta2/types.go
generated
vendored
4
vendor/k8s.io/api/autoscaling/v2beta2/types.go
generated
vendored
@@ -76,6 +76,7 @@ type HorizontalPodAutoscalerSpec struct {
|
||||
// more information about how each type of metric must respond.
|
||||
// If not set, the default metric will be set to 80% average CPU utilization.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Metrics []MetricSpec `json:"metrics,omitempty" protobuf:"bytes,4,rep,name=metrics"`
|
||||
|
||||
// behavior configures the scaling behavior of the target
|
||||
@@ -199,6 +200,7 @@ type HPAScalingRules struct {
|
||||
// policies is a list of potential scaling polices which can be used during scaling.
|
||||
// At least one policy must be specified, otherwise the HPAScalingRules will be discarded as invalid
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Policies []HPAScalingPolicy `json:"policies,omitempty" protobuf:"bytes,2,rep,name=policies"`
|
||||
}
|
||||
|
||||
@@ -393,11 +395,13 @@ type HorizontalPodAutoscalerStatus struct {
|
||||
|
||||
// currentMetrics is the last read state of the metrics used by this autoscaler.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
CurrentMetrics []MetricStatus `json:"currentMetrics" protobuf:"bytes,5,rep,name=currentMetrics"`
|
||||
|
||||
// conditions is the set of conditions required for this autoscaler to scale its target,
|
||||
// and indicates whether or not those conditions are met.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Conditions []HorizontalPodAutoscalerCondition `json:"conditions" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
|
||||
3
vendor/k8s.io/api/batch/v1/generated.proto
generated
vendored
3
vendor/k8s.io/api/batch/v1/generated.proto
generated
vendored
@@ -361,7 +361,8 @@ message JobStatus {
|
||||
// +optional
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.Time completionTime = 3;
|
||||
|
||||
// The number of pending and running pods.
|
||||
// The number of pending and running pods which are not terminating (without
|
||||
// a deletionTimestamp).
|
||||
// +optional
|
||||
optional int32 active = 4;
|
||||
|
||||
|
||||
3
vendor/k8s.io/api/batch/v1/types.go
generated
vendored
3
vendor/k8s.io/api/batch/v1/types.go
generated
vendored
@@ -441,7 +441,8 @@ type JobStatus struct {
|
||||
// +optional
|
||||
CompletionTime *metav1.Time `json:"completionTime,omitempty" protobuf:"bytes,3,opt,name=completionTime"`
|
||||
|
||||
// The number of pending and running pods.
|
||||
// The number of pending and running pods which are not terminating (without
|
||||
// a deletionTimestamp).
|
||||
// +optional
|
||||
Active int32 `json:"active,omitempty" protobuf:"varint,4,opt,name=active"`
|
||||
|
||||
|
||||
2
vendor/k8s.io/api/batch/v1/types_swagger_doc_generated.go
generated
vendored
2
vendor/k8s.io/api/batch/v1/types_swagger_doc_generated.go
generated
vendored
@@ -137,7 +137,7 @@ var map_JobStatus = map[string]string{
|
||||
"conditions": "The latest available observations of an object's current state. When a Job fails, one of the conditions will have type \"Failed\" and status true. When a Job is suspended, one of the conditions will have type \"Suspended\" and status true; when the Job is resumed, the status of this condition will become false. When a Job is completed, one of the conditions will have type \"Complete\" and status true. More info: https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/",
|
||||
"startTime": "Represents time when the job controller started processing a job. When a Job is created in the suspended state, this field is not set until the first time it is resumed. This field is reset every time a Job is resumed from suspension. It is represented in RFC3339 form and is in UTC.",
|
||||
"completionTime": "Represents time when the job was completed. It is not guaranteed to be set in happens-before order across separate operations. It is represented in RFC3339 form and is in UTC. The completion time is only set when the job finishes successfully.",
|
||||
"active": "The number of pending and running pods.",
|
||||
"active": "The number of pending and running pods which are not terminating (without a deletionTimestamp).",
|
||||
"succeeded": "The number of pods which reached phase Succeeded.",
|
||||
"failed": "The number of pods which reached phase Failed.",
|
||||
"terminating": "The number of pods which are terminating (in phase Pending or Running and have a deletionTimestamp).\n\nThis field is beta-level. The job controller populates the field when the feature gate JobPodReplacementPolicy is enabled (enabled by default).",
|
||||
|
||||
136
vendor/k8s.io/api/core/v1/generated.proto
generated
vendored
136
vendor/k8s.io/api/core/v1/generated.proto
generated
vendored
@@ -93,6 +93,7 @@ message AvoidPods {
|
||||
// Bounded-sized list of signatures of pods that should avoid this node, sorted
|
||||
// in timestamp order from oldest to newest. Size of the slice is unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PreferAvoidPodsEntry preferAvoidPods = 1;
|
||||
}
|
||||
|
||||
@@ -269,10 +270,12 @@ message CSIVolumeSource {
|
||||
message Capabilities {
|
||||
// Added capabilities
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string add = 1;
|
||||
|
||||
// Removed capabilities
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string drop = 2;
|
||||
}
|
||||
|
||||
@@ -281,6 +284,7 @@ message Capabilities {
|
||||
message CephFSPersistentVolumeSource {
|
||||
// monitors is Required: Monitors is a collection of Ceph monitors
|
||||
// More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
repeated string monitors = 1;
|
||||
|
||||
// path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /
|
||||
@@ -314,6 +318,7 @@ message CephFSPersistentVolumeSource {
|
||||
message CephFSVolumeSource {
|
||||
// monitors is Required: Monitors is a collection of Ceph monitors
|
||||
// More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
repeated string monitors = 1;
|
||||
|
||||
// path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /
|
||||
@@ -498,6 +503,8 @@ message ComponentStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ComponentCondition conditions = 2;
|
||||
}
|
||||
|
||||
@@ -628,6 +635,7 @@ message ConfigMapProjection {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated KeyToPath items = 2;
|
||||
|
||||
// optional specify whether the ConfigMap or its keys must be defined
|
||||
@@ -652,6 +660,7 @@ message ConfigMapVolumeSource {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated KeyToPath items = 2;
|
||||
|
||||
// defaultMode is optional: mode bits used to set permissions on created files by default.
|
||||
@@ -692,6 +701,7 @@ message Container {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string command = 3;
|
||||
|
||||
// Arguments to the entrypoint.
|
||||
@@ -703,6 +713,7 @@ message Container {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string args = 4;
|
||||
|
||||
// Container's working directory.
|
||||
@@ -734,6 +745,7 @@ message Container {
|
||||
// Values defined by an Env with a duplicate key will take precedence.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EnvFromSource envFrom = 19;
|
||||
|
||||
// List of environment variables to set in the container.
|
||||
@@ -741,6 +753,8 @@ message Container {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated EnvVar env = 7;
|
||||
|
||||
// Compute Resources required by this container.
|
||||
@@ -779,11 +793,15 @@ message Container {
|
||||
// +optional
|
||||
// +patchMergeKey=mountPath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=mountPath
|
||||
repeated VolumeMount volumeMounts = 9;
|
||||
|
||||
// volumeDevices is the list of block devices to be used by the container.
|
||||
// +patchMergeKey=devicePath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=devicePath
|
||||
// +optional
|
||||
repeated VolumeDevice volumeDevices = 21;
|
||||
|
||||
@@ -877,6 +895,7 @@ message ContainerImage {
|
||||
// Names by which this image is known.
|
||||
// e.g. ["kubernetes.example/hyperkube:v1.0.7", "cloud-vendor.registry.example/cloud-vendor/hyperkube:v1.0.7"]
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string names = 1;
|
||||
|
||||
// The size of the image in bytes.
|
||||
@@ -1076,6 +1095,7 @@ message DaemonEndpoint {
|
||||
message DownwardAPIProjection {
|
||||
// Items is a list of DownwardAPIVolume file
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated DownwardAPIVolumeFile items = 1;
|
||||
}
|
||||
|
||||
@@ -1108,6 +1128,7 @@ message DownwardAPIVolumeFile {
|
||||
message DownwardAPIVolumeSource {
|
||||
// Items is a list of downward API volume file
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated DownwardAPIVolumeFile items = 1;
|
||||
|
||||
// Optional: mode bits to use on created files by default. Must be a
|
||||
@@ -1218,16 +1239,19 @@ message EndpointSubset {
|
||||
// IP addresses which offer the related ports that are marked as ready. These endpoints
|
||||
// should be considered safe for load balancers and clients to utilize.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EndpointAddress addresses = 1;
|
||||
|
||||
// IP addresses which offer the related ports but are not currently marked as ready
|
||||
// because they have not yet finished starting, have recently failed a readiness check,
|
||||
// or have recently failed a liveness check.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EndpointAddress notReadyAddresses = 2;
|
||||
|
||||
// Port numbers available on the related IP addresses.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EndpointPort ports = 3;
|
||||
}
|
||||
|
||||
@@ -1258,6 +1282,7 @@ message Endpoints {
|
||||
// NotReadyAddresses in the same subset.
|
||||
// Sets of addresses and ports that comprise a service.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EndpointSubset subsets = 2;
|
||||
}
|
||||
|
||||
@@ -1377,6 +1402,7 @@ message EphemeralContainerCommon {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string command = 3;
|
||||
|
||||
// Arguments to the entrypoint.
|
||||
@@ -1388,6 +1414,7 @@ message EphemeralContainerCommon {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string args = 4;
|
||||
|
||||
// Container's working directory.
|
||||
@@ -1413,6 +1440,7 @@ message EphemeralContainerCommon {
|
||||
// Values defined by an Env with a duplicate key will take precedence.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated EnvFromSource envFrom = 19;
|
||||
|
||||
// List of environment variables to set in the container.
|
||||
@@ -1420,6 +1448,8 @@ message EphemeralContainerCommon {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated EnvVar env = 7;
|
||||
|
||||
// Resources are not allowed for ephemeral containers. Ephemeral containers use spare resources
|
||||
@@ -1446,11 +1476,15 @@ message EphemeralContainerCommon {
|
||||
// +optional
|
||||
// +patchMergeKey=mountPath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=mountPath
|
||||
repeated VolumeMount volumeMounts = 9;
|
||||
|
||||
// volumeDevices is the list of block devices to be used by the container.
|
||||
// +patchMergeKey=devicePath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=devicePath
|
||||
// +optional
|
||||
repeated VolumeDevice volumeDevices = 21;
|
||||
|
||||
@@ -1661,6 +1695,7 @@ message ExecAction {
|
||||
// a shell, you need to explicitly call out to that shell.
|
||||
// Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string command = 1;
|
||||
}
|
||||
|
||||
@@ -1670,6 +1705,7 @@ message ExecAction {
|
||||
message FCVolumeSource {
|
||||
// targetWWNs is Optional: FC target worldwide names (WWNs)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string targetWWNs = 1;
|
||||
|
||||
// lun is Optional: FC target lun number
|
||||
@@ -1691,6 +1727,7 @@ message FCVolumeSource {
|
||||
// wwids Optional: FC volume world wide identifiers (wwids)
|
||||
// Either wwids or combination of targetWWNs and lun must be set, but not both simultaneously.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string wwids = 5;
|
||||
}
|
||||
|
||||
@@ -1903,6 +1940,7 @@ message HTTPGetAction {
|
||||
|
||||
// Custom headers to set in the request. HTTP allows repeated headers.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated HTTPHeader httpHeaders = 5;
|
||||
}
|
||||
|
||||
@@ -1923,6 +1961,7 @@ message HostAlias {
|
||||
optional string ip = 1;
|
||||
|
||||
// Hostnames for the above IP address.
|
||||
// +listType=atomic
|
||||
repeated string hostnames = 2;
|
||||
}
|
||||
|
||||
@@ -1982,6 +2021,7 @@ message ISCSIPersistentVolumeSource {
|
||||
// portals is the iSCSI Target Portal List. The Portal is either an IP or ip_addr:port if the port
|
||||
// is other than default (typically TCP ports 860 and 3260).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string portals = 7;
|
||||
|
||||
// chapAuthDiscovery defines whether support iSCSI Discovery CHAP authentication
|
||||
@@ -2038,6 +2078,7 @@ message ISCSIVolumeSource {
|
||||
// portals is the iSCSI Target Portal List. The portal is either an IP or ip_addr:port if the port
|
||||
// is other than default (typically TCP ports 860 and 3260).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string portals = 7;
|
||||
|
||||
// chapAuthDiscovery defines whether support iSCSI Discovery CHAP authentication
|
||||
@@ -2181,6 +2222,7 @@ message LimitRangeList {
|
||||
// LimitRangeSpec defines a min/max usage limit for resources that match on kind.
|
||||
message LimitRangeSpec {
|
||||
// Limits is the list of LimitRangeItem objects that are enforced.
|
||||
// +listType=atomic
|
||||
repeated LimitRangeItem limits = 1;
|
||||
}
|
||||
|
||||
@@ -2229,6 +2271,7 @@ message LoadBalancerStatus {
|
||||
// Ingress is a list containing ingress points for the load-balancer.
|
||||
// Traffic intended for the service should be sent to these ingress points.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated LoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -2347,6 +2390,7 @@ message NamespaceSpec {
|
||||
// Finalizers is an opaque list of values that must be empty to permanently remove object from storage.
|
||||
// More info: https://kubernetes.io/docs/tasks/administer-cluster/namespaces/
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string finalizers = 1;
|
||||
}
|
||||
|
||||
@@ -2361,6 +2405,8 @@ message NamespaceStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated NamespaceCondition conditions = 2;
|
||||
}
|
||||
|
||||
@@ -2414,6 +2460,7 @@ message NodeAffinity {
|
||||
// "weight" to the sum if the node matches the corresponding matchExpressions; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PreferredSchedulingTerm preferredDuringSchedulingIgnoredDuringExecution = 2;
|
||||
}
|
||||
|
||||
@@ -2537,6 +2584,7 @@ message NodeResources {
|
||||
// +structType=atomic
|
||||
message NodeSelector {
|
||||
// Required. A list of node selector terms. The terms are ORed.
|
||||
// +listType=atomic
|
||||
repeated NodeSelectorTerm nodeSelectorTerms = 1;
|
||||
}
|
||||
|
||||
@@ -2556,6 +2604,7 @@ message NodeSelectorRequirement {
|
||||
// array must have a single element, which will be interpreted as an integer.
|
||||
// This array is replaced during a strategic merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string values = 3;
|
||||
}
|
||||
|
||||
@@ -2566,10 +2615,12 @@ message NodeSelectorRequirement {
|
||||
message NodeSelectorTerm {
|
||||
// A list of node selector requirements by node's labels.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NodeSelectorRequirement matchExpressions = 1;
|
||||
|
||||
// A list of node selector requirements by node's fields.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NodeSelectorRequirement matchFields = 2;
|
||||
}
|
||||
|
||||
@@ -2584,6 +2635,7 @@ message NodeSpec {
|
||||
// each of IPv4 and IPv6.
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +listType=set
|
||||
repeated string podCIDRs = 7;
|
||||
|
||||
// ID of the node assigned by the cloud provider in the format: <ProviderName>://<ProviderSpecificNodeID>
|
||||
@@ -2597,6 +2649,7 @@ message NodeSpec {
|
||||
|
||||
// If specified, the node's taints.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Taint taints = 5;
|
||||
|
||||
// Deprecated: Previously used to specify the source of the node's configuration for the DynamicKubeletConfig feature. This feature is removed.
|
||||
@@ -2632,6 +2685,8 @@ message NodeStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated NodeCondition conditions = 4;
|
||||
|
||||
// List of addresses reachable to the node.
|
||||
@@ -2647,6 +2702,8 @@ message NodeStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated NodeAddress addresses = 5;
|
||||
|
||||
// Endpoints of daemons running on the Node.
|
||||
@@ -2660,14 +2717,17 @@ message NodeStatus {
|
||||
|
||||
// List of container images on this node
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ContainerImage images = 8;
|
||||
|
||||
// List of attachable volumes in use (mounted) by the node.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string volumesInUse = 9;
|
||||
|
||||
// List of volumes that are attached to the node.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated AttachedVolume volumesAttached = 10;
|
||||
|
||||
// Status of the config assigned to the node via the dynamic Kubelet config feature.
|
||||
@@ -2840,7 +2900,7 @@ message PersistentVolumeClaimCondition {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 4;
|
||||
|
||||
// reason is a unique, this should be a short, machine understandable string that gives the reason
|
||||
// for condition's last transition. If it reports "ResizeStarted" that means the underlying
|
||||
// for condition's last transition. If it reports "Resizing" that means the underlying
|
||||
// persistent volume is being resized.
|
||||
// +optional
|
||||
optional string reason = 5;
|
||||
@@ -2868,6 +2928,7 @@ message PersistentVolumeClaimSpec {
|
||||
// accessModes contains the desired access modes the volume should have.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string accessModes = 1;
|
||||
|
||||
// selector is a label query over volumes to consider for binding.
|
||||
@@ -2959,6 +3020,7 @@ message PersistentVolumeClaimStatus {
|
||||
// accessModes contains the actual access modes the volume backing the PVC has.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string accessModes = 2;
|
||||
|
||||
// capacity represents the actual resources of the underlying volume.
|
||||
@@ -2966,10 +3028,12 @@ message PersistentVolumeClaimStatus {
|
||||
map<string, k8s.io.apimachinery.pkg.api.resource.Quantity> capacity = 3;
|
||||
|
||||
// conditions is the current Condition of persistent volume claim. If underlying persistent volume is being
|
||||
// resized then the Condition will be set to 'ResizeStarted'.
|
||||
// resized then the Condition will be set to 'Resizing'.
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated PersistentVolumeClaimCondition conditions = 4;
|
||||
|
||||
// allocatedResources tracks the resources allocated to a PVC including its capacity.
|
||||
@@ -3217,6 +3281,7 @@ message PersistentVolumeSpec {
|
||||
// accessModes contains all ways the volume can be mounted.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string accessModes = 3;
|
||||
|
||||
// claimRef is part of a bi-directional binding between PersistentVolume and PersistentVolumeClaim.
|
||||
@@ -3244,6 +3309,7 @@ message PersistentVolumeSpec {
|
||||
// simply fail if one is invalid.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#mount-options
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string mountOptions = 7;
|
||||
|
||||
// volumeMode defines if a volume is intended to be used with a formatted filesystem
|
||||
@@ -3286,7 +3352,7 @@ message PersistentVolumeStatus {
|
||||
|
||||
// lastPhaseTransitionTime is the time the phase transitioned from one to another
|
||||
// and automatically resets to current time everytime a volume phase transitions.
|
||||
// This is an alpha field and requires enabling PersistentVolumeLastPhaseTransitionTime feature.
|
||||
// This is a beta field and requires the PersistentVolumeLastPhaseTransitionTime feature to be enabled (enabled by default).
|
||||
// +featureGate=PersistentVolumeLastPhaseTransitionTime
|
||||
// +optional
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.Time lastPhaseTransitionTime = 4;
|
||||
@@ -3335,6 +3401,7 @@ message PodAffinity {
|
||||
// When there are multiple elements, the lists of nodes corresponding to each
|
||||
// podAffinityTerm are intersected, i.e. all terms must be satisfied.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PodAffinityTerm requiredDuringSchedulingIgnoredDuringExecution = 1;
|
||||
|
||||
// The scheduler will prefer to schedule pods to nodes that satisfy
|
||||
@@ -3347,6 +3414,7 @@ message PodAffinity {
|
||||
// "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated WeightedPodAffinityTerm preferredDuringSchedulingIgnoredDuringExecution = 2;
|
||||
}
|
||||
|
||||
@@ -3367,6 +3435,7 @@ message PodAffinityTerm {
|
||||
// and the ones selected by namespaceSelector.
|
||||
// null or empty namespaces list and null namespaceSelector means "this pod's namespace".
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string namespaces = 2;
|
||||
|
||||
// This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching
|
||||
@@ -3386,12 +3455,12 @@ message PodAffinityTerm {
|
||||
|
||||
// MatchLabelKeys is a set of pod label keys to select which pods will
|
||||
// be taken into consideration. The keys are used to lookup values from the
|
||||
// incoming pod labels, those key-value labels are merged with `LabelSelector` as `key in (value)`
|
||||
// incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)`
|
||||
// to select the group of existing pods which pods will be taken into consideration
|
||||
// for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming
|
||||
// pod labels will be ignored. The default value is empty.
|
||||
// The same key is forbidden to exist in both MatchLabelKeys and LabelSelector.
|
||||
// Also, MatchLabelKeys cannot be set when LabelSelector isn't set.
|
||||
// The same key is forbidden to exist in both matchLabelKeys and labelSelector.
|
||||
// Also, matchLabelKeys cannot be set when labelSelector isn't set.
|
||||
// This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.
|
||||
// +listType=atomic
|
||||
// +optional
|
||||
@@ -3399,12 +3468,12 @@ message PodAffinityTerm {
|
||||
|
||||
// MismatchLabelKeys is a set of pod label keys to select which pods will
|
||||
// be taken into consideration. The keys are used to lookup values from the
|
||||
// incoming pod labels, those key-value labels are merged with `LabelSelector` as `key notin (value)`
|
||||
// incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)`
|
||||
// to select the group of existing pods which pods will be taken into consideration
|
||||
// for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming
|
||||
// pod labels will be ignored. The default value is empty.
|
||||
// The same key is forbidden to exist in both MismatchLabelKeys and LabelSelector.
|
||||
// Also, MismatchLabelKeys cannot be set when LabelSelector isn't set.
|
||||
// The same key is forbidden to exist in both mismatchLabelKeys and labelSelector.
|
||||
// Also, mismatchLabelKeys cannot be set when labelSelector isn't set.
|
||||
// This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.
|
||||
// +listType=atomic
|
||||
// +optional
|
||||
@@ -3421,6 +3490,7 @@ message PodAntiAffinity {
|
||||
// When there are multiple elements, the lists of nodes corresponding to each
|
||||
// podAffinityTerm are intersected, i.e. all terms must be satisfied.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PodAffinityTerm requiredDuringSchedulingIgnoredDuringExecution = 1;
|
||||
|
||||
// The scheduler will prefer to schedule pods to nodes that satisfy
|
||||
@@ -3433,6 +3503,7 @@ message PodAntiAffinity {
|
||||
// "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated WeightedPodAffinityTerm preferredDuringSchedulingIgnoredDuringExecution = 2;
|
||||
}
|
||||
|
||||
@@ -3504,12 +3575,14 @@ message PodDNSConfig {
|
||||
// This will be appended to the base nameservers generated from DNSPolicy.
|
||||
// Duplicated nameservers will be removed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nameservers = 1;
|
||||
|
||||
// A list of DNS search domains for host-name lookup.
|
||||
// This will be appended to the base search paths generated from DNSPolicy.
|
||||
// Duplicated search paths will be removed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string searches = 2;
|
||||
|
||||
// A list of DNS resolver options.
|
||||
@@ -3517,6 +3590,7 @@ message PodDNSConfig {
|
||||
// Duplicated entries will be removed. Resolution options given in Options
|
||||
// will override those that appear in the base DNSPolicy.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PodDNSConfigOption options = 3;
|
||||
}
|
||||
|
||||
@@ -3558,6 +3632,7 @@ message PodExecOptions {
|
||||
optional string container = 5;
|
||||
|
||||
// Command is the remote command to execute. argv array. Not executed within a shell.
|
||||
// +listType=atomic
|
||||
repeated string command = 6;
|
||||
}
|
||||
|
||||
@@ -3652,6 +3727,7 @@ message PodPortForwardOptions {
|
||||
// List of ports to forward
|
||||
// Required when using WebSockets
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated int32 ports = 1;
|
||||
}
|
||||
|
||||
@@ -3760,6 +3836,7 @@ message PodSecurityContext {
|
||||
// even if they are not included in this list.
|
||||
// Note that this field cannot be set when spec.os.name is windows.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated int64 supplementalGroups = 4;
|
||||
|
||||
// A special supplemental group that applies to all containers in a pod.
|
||||
@@ -3779,6 +3856,7 @@ message PodSecurityContext {
|
||||
// sysctls (by the container runtime) might fail to launch.
|
||||
// Note that this field cannot be set when spec.os.name is windows.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Sysctl sysctls = 7;
|
||||
|
||||
// fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
|
||||
@@ -3812,6 +3890,8 @@ message PodSpec {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge,retainKeys
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated Volume volumes = 1;
|
||||
|
||||
// List of initialization containers belonging to the pod.
|
||||
@@ -3829,6 +3909,8 @@ message PodSpec {
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated Container initContainers = 20;
|
||||
|
||||
// List of containers belonging to the pod.
|
||||
@@ -3837,6 +3919,8 @@ message PodSpec {
|
||||
// Cannot be updated.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated Container containers = 2;
|
||||
|
||||
// List of ephemeral containers run in this pod. Ephemeral containers may be run in an existing
|
||||
@@ -3846,6 +3930,8 @@ message PodSpec {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated EphemeralContainer ephemeralContainers = 34;
|
||||
|
||||
// Restart policy for all containers within the pod.
|
||||
@@ -3893,7 +3979,7 @@ message PodSpec {
|
||||
// +optional
|
||||
optional string serviceAccountName = 8;
|
||||
|
||||
// DeprecatedServiceAccount is a depreciated alias for ServiceAccountName.
|
||||
// DeprecatedServiceAccount is a deprecated alias for ServiceAccountName.
|
||||
// Deprecated: Use serviceAccountName instead.
|
||||
// +k8s:conversion-gen=false
|
||||
// +optional
|
||||
@@ -3948,6 +4034,8 @@ message PodSpec {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated LocalObjectReference imagePullSecrets = 15;
|
||||
|
||||
// Specifies the hostname of the Pod
|
||||
@@ -3971,6 +4059,7 @@ message PodSpec {
|
||||
|
||||
// If specified, the pod's tolerations.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Toleration tolerations = 22;
|
||||
|
||||
// HostAliases is an optional list of hosts and IPs that will be injected into the pod's hosts
|
||||
@@ -3978,6 +4067,8 @@ message PodSpec {
|
||||
// +optional
|
||||
// +patchMergeKey=ip
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=ip
|
||||
repeated HostAlias hostAliases = 23;
|
||||
|
||||
// If specified, indicates the pod's priority. "system-node-critical" and
|
||||
@@ -4008,6 +4099,7 @@ message PodSpec {
|
||||
// all conditions specified in the readiness gates have status equal to "True"
|
||||
// More info: https://git.k8s.io/enhancements/keps/sig-network/580-pod-readiness-gates
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PodReadinessGate readinessGates = 28;
|
||||
|
||||
// RuntimeClassName refers to a RuntimeClass object in the node.k8s.io group, which should be used
|
||||
@@ -4168,6 +4260,8 @@ message PodStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated PodCondition conditions = 2;
|
||||
|
||||
// A human readable message indicating details about why the pod is in this condition.
|
||||
@@ -4216,6 +4310,8 @@ message PodStatus {
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +patchMergeKey=ip
|
||||
// +listType=map
|
||||
// +listMapKey=ip
|
||||
repeated PodIP podIPs = 12;
|
||||
|
||||
// RFC 3339 date and time at which the object was acknowledged by the Kubelet.
|
||||
@@ -4227,11 +4323,13 @@ message PodStatus {
|
||||
// init container will have ready = true, the most recently started container will have
|
||||
// startTime set.
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status
|
||||
// +listType=atomic
|
||||
repeated ContainerStatus initContainerStatuses = 10;
|
||||
|
||||
// The list has one entry per container in the manifest.
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ContainerStatus containerStatuses = 8;
|
||||
|
||||
// The Quality of Service (QOS) classification assigned to the pod based on resource requirements
|
||||
@@ -4242,6 +4340,7 @@ message PodStatus {
|
||||
|
||||
// Status for any ephemeral containers that have run in this pod.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ContainerStatus ephemeralContainerStatuses = 13;
|
||||
|
||||
// Status of resources resize desired for pod's containers.
|
||||
@@ -4459,6 +4558,7 @@ message ProbeHandler {
|
||||
message ProjectedVolumeSource {
|
||||
// sources is the list of volume projections
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated VolumeProjection sources = 1;
|
||||
|
||||
// defaultMode are the mode bits used to set permissions on created files by default.
|
||||
@@ -4508,6 +4608,7 @@ message QuobyteVolumeSource {
|
||||
message RBDPersistentVolumeSource {
|
||||
// monitors is a collection of Ceph monitors.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
repeated string monitors = 1;
|
||||
|
||||
// image is the rados image name.
|
||||
@@ -4559,6 +4660,7 @@ message RBDPersistentVolumeSource {
|
||||
message RBDVolumeSource {
|
||||
// monitors is a collection of Ceph monitors.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
repeated string monitors = 1;
|
||||
|
||||
// image is the rados image name.
|
||||
@@ -4733,6 +4835,8 @@ message ReplicationControllerStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ReplicationControllerCondition conditions = 6;
|
||||
}
|
||||
|
||||
@@ -4799,6 +4903,7 @@ message ResourceQuotaSpec {
|
||||
// A collection of filters that must match each object tracked by a quota.
|
||||
// If not specified, the quota matches all objects.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string scopes = 2;
|
||||
|
||||
// scopeSelector is also a collection of filters like scopes that must match each object tracked by a quota
|
||||
@@ -4966,6 +5071,7 @@ message ScaleIOVolumeSource {
|
||||
message ScopeSelector {
|
||||
// A list of scope selector requirements by scope of the resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated ScopedResourceSelectorRequirement matchExpressions = 1;
|
||||
}
|
||||
|
||||
@@ -4984,6 +5090,7 @@ message ScopedResourceSelectorRequirement {
|
||||
// the values array must be empty.
|
||||
// This array is replaced during a strategic merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string values = 3;
|
||||
}
|
||||
|
||||
@@ -5101,6 +5208,7 @@ message SecretProjection {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated KeyToPath items = 2;
|
||||
|
||||
// optional field specify whether the Secret or its key must be defined
|
||||
@@ -5140,6 +5248,7 @@ message SecretVolumeSource {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated KeyToPath items = 2;
|
||||
|
||||
// defaultMode is Optional: mode bits used to set permissions on created files by default.
|
||||
@@ -5293,6 +5402,8 @@ message ServiceAccount {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated ObjectReference secrets = 2;
|
||||
|
||||
// ImagePullSecrets is a list of references to secrets in the same namespace to use for pulling any images
|
||||
@@ -5300,6 +5411,7 @@ message ServiceAccount {
|
||||
// can be mounted in the pod, but ImagePullSecrets are only accessed by the kubelet.
|
||||
// More info: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated LocalObjectReference imagePullSecrets = 3;
|
||||
|
||||
// AutomountServiceAccountToken indicates whether pods running as this service account should have an API token automatically mounted.
|
||||
@@ -5520,6 +5632,7 @@ message ServiceSpec {
|
||||
// at a node with this IP. A common example is external load-balancers
|
||||
// that are not part of the Kubernetes system.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string externalIPs = 5;
|
||||
|
||||
// Supports "ClientIP" and "None". Used to maintain session affinity.
|
||||
@@ -5545,6 +5658,7 @@ message ServiceSpec {
|
||||
// cloud-provider does not support the feature."
|
||||
// More info: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string loadBalancerSourceRanges = 9;
|
||||
|
||||
// externalName is the external reference that discovery mechanisms will
|
||||
@@ -5838,6 +5952,7 @@ message TopologySelectorLabelRequirement {
|
||||
|
||||
// An array of string values. One value must match the label to be selected.
|
||||
// Each entry in Values is ORed.
|
||||
// +listType=atomic
|
||||
repeated string values = 2;
|
||||
}
|
||||
|
||||
@@ -5850,6 +5965,7 @@ message TopologySelectorLabelRequirement {
|
||||
message TopologySelectorTerm {
|
||||
// A list of topology selector requirements by labels.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated TopologySelectorLabelRequirement matchLabelExpressions = 1;
|
||||
}
|
||||
|
||||
|
||||
140
vendor/k8s.io/api/core/v1/types.go
generated
vendored
140
vendor/k8s.io/api/core/v1/types.go
generated
vendored
@@ -331,6 +331,7 @@ type PersistentVolumeSpec struct {
|
||||
// accessModes contains all ways the volume can be mounted.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AccessModes []PersistentVolumeAccessMode `json:"accessModes,omitempty" protobuf:"bytes,3,rep,name=accessModes,casttype=PersistentVolumeAccessMode"`
|
||||
// claimRef is part of a bi-directional binding between PersistentVolume and PersistentVolumeClaim.
|
||||
// Expected to be non-nil when bound.
|
||||
@@ -354,6 +355,7 @@ type PersistentVolumeSpec struct {
|
||||
// simply fail if one is invalid.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#mount-options
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MountOptions []string `json:"mountOptions,omitempty" protobuf:"bytes,7,opt,name=mountOptions"`
|
||||
// volumeMode defines if a volume is intended to be used with a formatted filesystem
|
||||
// or to remain in raw block state. Value of Filesystem is implied when not included in spec.
|
||||
@@ -423,7 +425,7 @@ type PersistentVolumeStatus struct {
|
||||
Reason string `json:"reason,omitempty" protobuf:"bytes,3,opt,name=reason"`
|
||||
// lastPhaseTransitionTime is the time the phase transitioned from one to another
|
||||
// and automatically resets to current time everytime a volume phase transitions.
|
||||
// This is an alpha field and requires enabling PersistentVolumeLastPhaseTransitionTime feature.
|
||||
// This is a beta field and requires the PersistentVolumeLastPhaseTransitionTime feature to be enabled (enabled by default).
|
||||
// +featureGate=PersistentVolumeLastPhaseTransitionTime
|
||||
// +optional
|
||||
LastPhaseTransitionTime *metav1.Time `json:"lastPhaseTransitionTime,omitempty" protobuf:"bytes,4,opt,name=lastPhaseTransitionTime"`
|
||||
@@ -486,6 +488,7 @@ type PersistentVolumeClaimSpec struct {
|
||||
// accessModes contains the desired access modes the volume should have.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AccessModes []PersistentVolumeAccessMode `json:"accessModes,omitempty" protobuf:"bytes,1,rep,name=accessModes,casttype=PersistentVolumeAccessMode"`
|
||||
// selector is a label query over volumes to consider for binding.
|
||||
// +optional
|
||||
@@ -660,7 +663,7 @@ type PersistentVolumeClaimCondition struct {
|
||||
// +optional
|
||||
LastTransitionTime metav1.Time `json:"lastTransitionTime,omitempty" protobuf:"bytes,4,opt,name=lastTransitionTime"`
|
||||
// reason is a unique, this should be a short, machine understandable string that gives the reason
|
||||
// for condition's last transition. If it reports "ResizeStarted" that means the underlying
|
||||
// for condition's last transition. If it reports "Resizing" that means the underlying
|
||||
// persistent volume is being resized.
|
||||
// +optional
|
||||
Reason string `json:"reason,omitempty" protobuf:"bytes,5,opt,name=reason"`
|
||||
@@ -677,15 +680,18 @@ type PersistentVolumeClaimStatus struct {
|
||||
// accessModes contains the actual access modes the volume backing the PVC has.
|
||||
// More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
AccessModes []PersistentVolumeAccessMode `json:"accessModes,omitempty" protobuf:"bytes,2,rep,name=accessModes,casttype=PersistentVolumeAccessMode"`
|
||||
// capacity represents the actual resources of the underlying volume.
|
||||
// +optional
|
||||
Capacity ResourceList `json:"capacity,omitempty" protobuf:"bytes,3,rep,name=capacity,casttype=ResourceList,castkey=ResourceName"`
|
||||
// conditions is the current Condition of persistent volume claim. If underlying persistent volume is being
|
||||
// resized then the Condition will be set to 'ResizeStarted'.
|
||||
// resized then the Condition will be set to 'Resizing'.
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []PersistentVolumeClaimCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,4,rep,name=conditions"`
|
||||
// allocatedResources tracks the resources allocated to a PVC including its capacity.
|
||||
// Key names follow standard Kubernetes label syntax. Valid values are either:
|
||||
@@ -921,6 +927,7 @@ type GlusterfsPersistentVolumeSource struct {
|
||||
type RBDVolumeSource struct {
|
||||
// monitors is a collection of Ceph monitors.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
CephMonitors []string `json:"monitors" protobuf:"bytes,1,rep,name=monitors"`
|
||||
// image is the rados image name.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
@@ -965,6 +972,7 @@ type RBDVolumeSource struct {
|
||||
type RBDPersistentVolumeSource struct {
|
||||
// monitors is a collection of Ceph monitors.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
CephMonitors []string `json:"monitors" protobuf:"bytes,1,rep,name=monitors"`
|
||||
// image is the rados image name.
|
||||
// More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
|
||||
@@ -1059,6 +1067,7 @@ type CinderPersistentVolumeSource struct {
|
||||
type CephFSVolumeSource struct {
|
||||
// monitors is Required: Monitors is a collection of Ceph monitors
|
||||
// More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
Monitors []string `json:"monitors" protobuf:"bytes,1,rep,name=monitors"`
|
||||
// path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /
|
||||
// +optional
|
||||
@@ -1099,6 +1108,7 @@ type SecretReference struct {
|
||||
type CephFSPersistentVolumeSource struct {
|
||||
// monitors is Required: Monitors is a collection of Ceph monitors
|
||||
// More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it
|
||||
// +listType=atomic
|
||||
Monitors []string `json:"monitors" protobuf:"bytes,1,rep,name=monitors"`
|
||||
// path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /
|
||||
// +optional
|
||||
@@ -1341,6 +1351,7 @@ type SecretVolumeSource struct {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []KeyToPath `json:"items,omitempty" protobuf:"bytes,2,rep,name=items"`
|
||||
// defaultMode is Optional: mode bits used to set permissions on created files by default.
|
||||
// Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511.
|
||||
@@ -1376,6 +1387,7 @@ type SecretProjection struct {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []KeyToPath `json:"items,omitempty" protobuf:"bytes,2,rep,name=items"`
|
||||
// optional field specify whether the Secret or its key must be defined
|
||||
// +optional
|
||||
@@ -1429,6 +1441,7 @@ type ISCSIVolumeSource struct {
|
||||
// portals is the iSCSI Target Portal List. The portal is either an IP or ip_addr:port if the port
|
||||
// is other than default (typically TCP ports 860 and 3260).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Portals []string `json:"portals,omitempty" protobuf:"bytes,7,opt,name=portals"`
|
||||
// chapAuthDiscovery defines whether support iSCSI Discovery CHAP authentication
|
||||
// +optional
|
||||
@@ -1475,6 +1488,7 @@ type ISCSIPersistentVolumeSource struct {
|
||||
// portals is the iSCSI Target Portal List. The Portal is either an IP or ip_addr:port if the port
|
||||
// is other than default (typically TCP ports 860 and 3260).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Portals []string `json:"portals,omitempty" protobuf:"bytes,7,opt,name=portals"`
|
||||
// chapAuthDiscovery defines whether support iSCSI Discovery CHAP authentication
|
||||
// +optional
|
||||
@@ -1498,6 +1512,7 @@ type ISCSIPersistentVolumeSource struct {
|
||||
type FCVolumeSource struct {
|
||||
// targetWWNs is Optional: FC target worldwide names (WWNs)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TargetWWNs []string `json:"targetWWNs,omitempty" protobuf:"bytes,1,rep,name=targetWWNs"`
|
||||
// lun is Optional: FC target lun number
|
||||
// +optional
|
||||
@@ -1515,6 +1530,7 @@ type FCVolumeSource struct {
|
||||
// wwids Optional: FC volume world wide identifiers (wwids)
|
||||
// Either wwids or combination of targetWWNs and lun must be set, but not both simultaneously.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
WWIDs []string `json:"wwids,omitempty" protobuf:"bytes,5,rep,name=wwids"`
|
||||
}
|
||||
|
||||
@@ -1771,6 +1787,7 @@ type ConfigMapVolumeSource struct {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []KeyToPath `json:"items,omitempty" protobuf:"bytes,2,rep,name=items"`
|
||||
// defaultMode is optional: mode bits used to set permissions on created files by default.
|
||||
// Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511.
|
||||
@@ -1807,6 +1824,7 @@ type ConfigMapProjection struct {
|
||||
// the volume setup will error unless it is marked optional. Paths must be
|
||||
// relative and may not contain the '..' path or start with '..'.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []KeyToPath `json:"items,omitempty" protobuf:"bytes,2,rep,name=items"`
|
||||
// optional specify whether the ConfigMap or its keys must be defined
|
||||
// +optional
|
||||
@@ -1875,6 +1893,7 @@ type ClusterTrustBundleProjection struct {
|
||||
type ProjectedVolumeSource struct {
|
||||
// sources is the list of volume projections
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Sources []VolumeProjection `json:"sources" protobuf:"bytes,1,rep,name=sources"`
|
||||
// defaultMode are the mode bits used to set permissions on created files by default.
|
||||
// Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511.
|
||||
@@ -2347,6 +2366,7 @@ type HTTPGetAction struct {
|
||||
Scheme URIScheme `json:"scheme,omitempty" protobuf:"bytes,4,opt,name=scheme,casttype=URIScheme"`
|
||||
// Custom headers to set in the request. HTTP allows repeated headers.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
HTTPHeaders []HTTPHeader `json:"httpHeaders,omitempty" protobuf:"bytes,5,rep,name=httpHeaders"`
|
||||
}
|
||||
|
||||
@@ -2393,6 +2413,7 @@ type ExecAction struct {
|
||||
// a shell, you need to explicitly call out to that shell.
|
||||
// Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Command []string `json:"command,omitempty" protobuf:"bytes,1,rep,name=command"`
|
||||
}
|
||||
|
||||
@@ -2514,9 +2535,11 @@ type Capability string
|
||||
type Capabilities struct {
|
||||
// Added capabilities
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Add []Capability `json:"add,omitempty" protobuf:"bytes,1,rep,name=add,casttype=Capability"`
|
||||
// Removed capabilities
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Drop []Capability `json:"drop,omitempty" protobuf:"bytes,2,rep,name=drop,casttype=Capability"`
|
||||
}
|
||||
|
||||
@@ -2602,6 +2625,7 @@ type Container struct {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Command []string `json:"command,omitempty" protobuf:"bytes,3,rep,name=command"`
|
||||
// Arguments to the entrypoint.
|
||||
// The container image's CMD is used if this is not provided.
|
||||
@@ -2612,6 +2636,7 @@ type Container struct {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Args []string `json:"args,omitempty" protobuf:"bytes,4,rep,name=args"`
|
||||
// Container's working directory.
|
||||
// If not specified, the container runtime's default will be used, which
|
||||
@@ -2640,12 +2665,15 @@ type Container struct {
|
||||
// Values defined by an Env with a duplicate key will take precedence.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
EnvFrom []EnvFromSource `json:"envFrom,omitempty" protobuf:"bytes,19,rep,name=envFrom"`
|
||||
// List of environment variables to set in the container.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Env []EnvVar `json:"env,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,7,rep,name=env"`
|
||||
// Compute Resources required by this container.
|
||||
// Cannot be updated.
|
||||
@@ -2680,10 +2708,14 @@ type Container struct {
|
||||
// +optional
|
||||
// +patchMergeKey=mountPath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=mountPath
|
||||
VolumeMounts []VolumeMount `json:"volumeMounts,omitempty" patchStrategy:"merge" patchMergeKey:"mountPath" protobuf:"bytes,9,rep,name=volumeMounts"`
|
||||
// volumeDevices is the list of block devices to be used by the container.
|
||||
// +patchMergeKey=devicePath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=devicePath
|
||||
// +optional
|
||||
VolumeDevices []VolumeDevice `json:"volumeDevices,omitempty" patchStrategy:"merge" patchMergeKey:"devicePath" protobuf:"bytes,21,rep,name=volumeDevices"`
|
||||
// Periodic probe of container liveness.
|
||||
@@ -3123,6 +3155,7 @@ const (
|
||||
// +structType=atomic
|
||||
type NodeSelector struct {
|
||||
// Required. A list of node selector terms. The terms are ORed.
|
||||
// +listType=atomic
|
||||
NodeSelectorTerms []NodeSelectorTerm `json:"nodeSelectorTerms" protobuf:"bytes,1,rep,name=nodeSelectorTerms"`
|
||||
}
|
||||
|
||||
@@ -3133,9 +3166,11 @@ type NodeSelector struct {
|
||||
type NodeSelectorTerm struct {
|
||||
// A list of node selector requirements by node's labels.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchExpressions []NodeSelectorRequirement `json:"matchExpressions,omitempty" protobuf:"bytes,1,rep,name=matchExpressions"`
|
||||
// A list of node selector requirements by node's fields.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchFields []NodeSelectorRequirement `json:"matchFields,omitempty" protobuf:"bytes,2,rep,name=matchFields"`
|
||||
}
|
||||
|
||||
@@ -3153,6 +3188,7 @@ type NodeSelectorRequirement struct {
|
||||
// array must have a single element, which will be interpreted as an integer.
|
||||
// This array is replaced during a strategic merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Values []string `json:"values,omitempty" protobuf:"bytes,3,rep,name=values"`
|
||||
}
|
||||
|
||||
@@ -3181,6 +3217,7 @@ type TopologySelectorTerm struct {
|
||||
|
||||
// A list of topology selector requirements by labels.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchLabelExpressions []TopologySelectorLabelRequirement `json:"matchLabelExpressions,omitempty" protobuf:"bytes,1,rep,name=matchLabelExpressions"`
|
||||
}
|
||||
|
||||
@@ -3191,6 +3228,7 @@ type TopologySelectorLabelRequirement struct {
|
||||
Key string `json:"key" protobuf:"bytes,1,opt,name=key"`
|
||||
// An array of string values. One value must match the label to be selected.
|
||||
// Each entry in Values is ORed.
|
||||
// +listType=atomic
|
||||
Values []string `json:"values" protobuf:"bytes,2,rep,name=values"`
|
||||
}
|
||||
|
||||
@@ -3228,6 +3266,7 @@ type PodAffinity struct {
|
||||
// When there are multiple elements, the lists of nodes corresponding to each
|
||||
// podAffinityTerm are intersected, i.e. all terms must be satisfied.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
RequiredDuringSchedulingIgnoredDuringExecution []PodAffinityTerm `json:"requiredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,1,rep,name=requiredDuringSchedulingIgnoredDuringExecution"`
|
||||
// The scheduler will prefer to schedule pods to nodes that satisfy
|
||||
// the affinity expressions specified by this field, but it may choose
|
||||
@@ -3239,6 +3278,7 @@ type PodAffinity struct {
|
||||
// "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PreferredDuringSchedulingIgnoredDuringExecution []WeightedPodAffinityTerm `json:"preferredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,2,rep,name=preferredDuringSchedulingIgnoredDuringExecution"`
|
||||
}
|
||||
|
||||
@@ -3263,6 +3303,7 @@ type PodAntiAffinity struct {
|
||||
// When there are multiple elements, the lists of nodes corresponding to each
|
||||
// podAffinityTerm are intersected, i.e. all terms must be satisfied.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
RequiredDuringSchedulingIgnoredDuringExecution []PodAffinityTerm `json:"requiredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,1,rep,name=requiredDuringSchedulingIgnoredDuringExecution"`
|
||||
// The scheduler will prefer to schedule pods to nodes that satisfy
|
||||
// the anti-affinity expressions specified by this field, but it may choose
|
||||
@@ -3274,6 +3315,7 @@ type PodAntiAffinity struct {
|
||||
// "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PreferredDuringSchedulingIgnoredDuringExecution []WeightedPodAffinityTerm `json:"preferredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,2,rep,name=preferredDuringSchedulingIgnoredDuringExecution"`
|
||||
}
|
||||
|
||||
@@ -3302,6 +3344,7 @@ type PodAffinityTerm struct {
|
||||
// and the ones selected by namespaceSelector.
|
||||
// null or empty namespaces list and null namespaceSelector means "this pod's namespace".
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Namespaces []string `json:"namespaces,omitempty" protobuf:"bytes,2,rep,name=namespaces"`
|
||||
// This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching
|
||||
// the labelSelector in the specified namespaces, where co-located is defined as running on a node
|
||||
@@ -3318,24 +3361,24 @@ type PodAffinityTerm struct {
|
||||
NamespaceSelector *metav1.LabelSelector `json:"namespaceSelector,omitempty" protobuf:"bytes,4,opt,name=namespaceSelector"`
|
||||
// MatchLabelKeys is a set of pod label keys to select which pods will
|
||||
// be taken into consideration. The keys are used to lookup values from the
|
||||
// incoming pod labels, those key-value labels are merged with `LabelSelector` as `key in (value)`
|
||||
// incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)`
|
||||
// to select the group of existing pods which pods will be taken into consideration
|
||||
// for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming
|
||||
// pod labels will be ignored. The default value is empty.
|
||||
// The same key is forbidden to exist in both MatchLabelKeys and LabelSelector.
|
||||
// Also, MatchLabelKeys cannot be set when LabelSelector isn't set.
|
||||
// The same key is forbidden to exist in both matchLabelKeys and labelSelector.
|
||||
// Also, matchLabelKeys cannot be set when labelSelector isn't set.
|
||||
// This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.
|
||||
// +listType=atomic
|
||||
// +optional
|
||||
MatchLabelKeys []string `json:"matchLabelKeys,omitempty" protobuf:"bytes,5,opt,name=matchLabelKeys"`
|
||||
// MismatchLabelKeys is a set of pod label keys to select which pods will
|
||||
// be taken into consideration. The keys are used to lookup values from the
|
||||
// incoming pod labels, those key-value labels are merged with `LabelSelector` as `key notin (value)`
|
||||
// incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)`
|
||||
// to select the group of existing pods which pods will be taken into consideration
|
||||
// for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming
|
||||
// pod labels will be ignored. The default value is empty.
|
||||
// The same key is forbidden to exist in both MismatchLabelKeys and LabelSelector.
|
||||
// Also, MismatchLabelKeys cannot be set when LabelSelector isn't set.
|
||||
// The same key is forbidden to exist in both mismatchLabelKeys and labelSelector.
|
||||
// Also, mismatchLabelKeys cannot be set when labelSelector isn't set.
|
||||
// This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.
|
||||
// +listType=atomic
|
||||
// +optional
|
||||
@@ -3370,6 +3413,7 @@ type NodeAffinity struct {
|
||||
// "weight" to the sum if the node matches the corresponding matchExpressions; the
|
||||
// node(s) with the highest sum are the most preferred.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PreferredDuringSchedulingIgnoredDuringExecution []PreferredSchedulingTerm `json:"preferredDuringSchedulingIgnoredDuringExecution,omitempty" protobuf:"bytes,2,rep,name=preferredDuringSchedulingIgnoredDuringExecution"`
|
||||
}
|
||||
|
||||
@@ -3475,6 +3519,8 @@ type PodSpec struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge,retainKeys
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Volumes []Volume `json:"volumes,omitempty" patchStrategy:"merge,retainKeys" patchMergeKey:"name" protobuf:"bytes,1,rep,name=volumes"`
|
||||
// List of initialization containers belonging to the pod.
|
||||
// Init containers are executed in order prior to containers being started. If any
|
||||
@@ -3491,6 +3537,8 @@ type PodSpec struct {
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
InitContainers []Container `json:"initContainers,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,20,rep,name=initContainers"`
|
||||
// List of containers belonging to the pod.
|
||||
// Containers cannot currently be added or removed.
|
||||
@@ -3498,6 +3546,8 @@ type PodSpec struct {
|
||||
// Cannot be updated.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Containers []Container `json:"containers" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=containers"`
|
||||
// List of ephemeral containers run in this pod. Ephemeral containers may be run in an existing
|
||||
// pod to perform user-initiated actions such as debugging. This list cannot be specified when
|
||||
@@ -3506,6 +3556,8 @@ type PodSpec struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
EphemeralContainers []EphemeralContainer `json:"ephemeralContainers,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,34,rep,name=ephemeralContainers"`
|
||||
// Restart policy for all containers within the pod.
|
||||
// One of Always, OnFailure, Never. In some contexts, only a subset of those values may be permitted.
|
||||
@@ -3547,7 +3599,7 @@ type PodSpec struct {
|
||||
// More info: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
|
||||
// +optional
|
||||
ServiceAccountName string `json:"serviceAccountName,omitempty" protobuf:"bytes,8,opt,name=serviceAccountName"`
|
||||
// DeprecatedServiceAccount is a depreciated alias for ServiceAccountName.
|
||||
// DeprecatedServiceAccount is a deprecated alias for ServiceAccountName.
|
||||
// Deprecated: Use serviceAccountName instead.
|
||||
// +k8s:conversion-gen=false
|
||||
// +optional
|
||||
@@ -3595,6 +3647,8 @@ type PodSpec struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
ImagePullSecrets []LocalObjectReference `json:"imagePullSecrets,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,15,rep,name=imagePullSecrets"`
|
||||
// Specifies the hostname of the Pod
|
||||
// If not specified, the pod's hostname will be set to a system-defined value.
|
||||
@@ -3613,12 +3667,15 @@ type PodSpec struct {
|
||||
SchedulerName string `json:"schedulerName,omitempty" protobuf:"bytes,19,opt,name=schedulerName"`
|
||||
// If specified, the pod's tolerations.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Tolerations []Toleration `json:"tolerations,omitempty" protobuf:"bytes,22,opt,name=tolerations"`
|
||||
// HostAliases is an optional list of hosts and IPs that will be injected into the pod's hosts
|
||||
// file if specified. This is only valid for non-hostNetwork pods.
|
||||
// +optional
|
||||
// +patchMergeKey=ip
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=ip
|
||||
HostAliases []HostAlias `json:"hostAliases,omitempty" patchStrategy:"merge" patchMergeKey:"ip" protobuf:"bytes,23,rep,name=hostAliases"`
|
||||
// If specified, indicates the pod's priority. "system-node-critical" and
|
||||
// "system-cluster-critical" are two special keywords which indicate the
|
||||
@@ -3645,6 +3702,7 @@ type PodSpec struct {
|
||||
// all conditions specified in the readiness gates have status equal to "True"
|
||||
// More info: https://git.k8s.io/enhancements/keps/sig-network/580-pod-readiness-gates
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ReadinessGates []PodReadinessGate `json:"readinessGates,omitempty" protobuf:"bytes,28,opt,name=readinessGates"`
|
||||
// RuntimeClassName refers to a RuntimeClass object in the node.k8s.io group, which should be used
|
||||
// to run this pod. If no RuntimeClass resource matches the named class, the pod will not be run.
|
||||
@@ -4001,6 +4059,7 @@ type HostAlias struct {
|
||||
// IP address of the host file entry.
|
||||
IP string `json:"ip,omitempty" protobuf:"bytes,1,opt,name=ip"`
|
||||
// Hostnames for the above IP address.
|
||||
// +listType=atomic
|
||||
Hostnames []string `json:"hostnames,omitempty" protobuf:"bytes,2,rep,name=hostnames"`
|
||||
}
|
||||
|
||||
@@ -4071,6 +4130,7 @@ type PodSecurityContext struct {
|
||||
// even if they are not included in this list.
|
||||
// Note that this field cannot be set when spec.os.name is windows.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
SupplementalGroups []int64 `json:"supplementalGroups,omitempty" protobuf:"varint,4,rep,name=supplementalGroups"`
|
||||
// A special supplemental group that applies to all containers in a pod.
|
||||
// Some volume types allow the Kubelet to change the ownership of that volume
|
||||
@@ -4088,6 +4148,7 @@ type PodSecurityContext struct {
|
||||
// sysctls (by the container runtime) might fail to launch.
|
||||
// Note that this field cannot be set when spec.os.name is windows.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Sysctls []Sysctl `json:"sysctls,omitempty" protobuf:"bytes,7,rep,name=sysctls"`
|
||||
// fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
|
||||
// before being exposed inside Pod. This field will only apply to
|
||||
@@ -4158,17 +4219,20 @@ type PodDNSConfig struct {
|
||||
// This will be appended to the base nameservers generated from DNSPolicy.
|
||||
// Duplicated nameservers will be removed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Nameservers []string `json:"nameservers,omitempty" protobuf:"bytes,1,rep,name=nameservers"`
|
||||
// A list of DNS search domains for host-name lookup.
|
||||
// This will be appended to the base search paths generated from DNSPolicy.
|
||||
// Duplicated search paths will be removed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Searches []string `json:"searches,omitempty" protobuf:"bytes,2,rep,name=searches"`
|
||||
// A list of DNS resolver options.
|
||||
// This will be merged with the base options generated from DNSPolicy.
|
||||
// Duplicated entries will be removed. Resolution options given in Options
|
||||
// will override those that appear in the base DNSPolicy.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Options []PodDNSConfigOption `json:"options,omitempty" protobuf:"bytes,3,rep,name=options"`
|
||||
}
|
||||
|
||||
@@ -4212,6 +4276,7 @@ type EphemeralContainerCommon struct {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Command []string `json:"command,omitempty" protobuf:"bytes,3,rep,name=command"`
|
||||
// Arguments to the entrypoint.
|
||||
// The image's CMD is used if this is not provided.
|
||||
@@ -4222,6 +4287,7 @@ type EphemeralContainerCommon struct {
|
||||
// of whether the variable exists or not. Cannot be updated.
|
||||
// More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Args []string `json:"args,omitempty" protobuf:"bytes,4,rep,name=args"`
|
||||
// Container's working directory.
|
||||
// If not specified, the container runtime's default will be used, which
|
||||
@@ -4244,12 +4310,15 @@ type EphemeralContainerCommon struct {
|
||||
// Values defined by an Env with a duplicate key will take precedence.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
EnvFrom []EnvFromSource `json:"envFrom,omitempty" protobuf:"bytes,19,rep,name=envFrom"`
|
||||
// List of environment variables to set in the container.
|
||||
// Cannot be updated.
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Env []EnvVar `json:"env,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,7,rep,name=env"`
|
||||
// Resources are not allowed for ephemeral containers. Ephemeral containers use spare resources
|
||||
// already allocated to the pod.
|
||||
@@ -4272,10 +4341,14 @@ type EphemeralContainerCommon struct {
|
||||
// +optional
|
||||
// +patchMergeKey=mountPath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=mountPath
|
||||
VolumeMounts []VolumeMount `json:"volumeMounts,omitempty" patchStrategy:"merge" patchMergeKey:"mountPath" protobuf:"bytes,9,rep,name=volumeMounts"`
|
||||
// volumeDevices is the list of block devices to be used by the container.
|
||||
// +patchMergeKey=devicePath
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=devicePath
|
||||
// +optional
|
||||
VolumeDevices []VolumeDevice `json:"volumeDevices,omitempty" patchStrategy:"merge" patchMergeKey:"devicePath" protobuf:"bytes,21,rep,name=volumeDevices"`
|
||||
// Probes are not allowed for ephemeral containers.
|
||||
@@ -4401,6 +4474,8 @@ type PodStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []PodCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,2,rep,name=conditions"`
|
||||
// A human readable message indicating details about why the pod is in this condition.
|
||||
// +optional
|
||||
@@ -4446,6 +4521,8 @@ type PodStatus struct {
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +patchMergeKey=ip
|
||||
// +listType=map
|
||||
// +listMapKey=ip
|
||||
PodIPs []PodIP `json:"podIPs,omitempty" protobuf:"bytes,12,rep,name=podIPs" patchStrategy:"merge" patchMergeKey:"ip"`
|
||||
|
||||
// RFC 3339 date and time at which the object was acknowledged by the Kubelet.
|
||||
@@ -4457,11 +4534,13 @@ type PodStatus struct {
|
||||
// init container will have ready = true, the most recently started container will have
|
||||
// startTime set.
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status
|
||||
// +listType=atomic
|
||||
InitContainerStatuses []ContainerStatus `json:"initContainerStatuses,omitempty" protobuf:"bytes,10,rep,name=initContainerStatuses"`
|
||||
|
||||
// The list has one entry per container in the manifest.
|
||||
// More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ContainerStatuses []ContainerStatus `json:"containerStatuses,omitempty" protobuf:"bytes,8,rep,name=containerStatuses"`
|
||||
// The Quality of Service (QOS) classification assigned to the pod based on resource requirements
|
||||
// See PodQOSClass type for available QOS classes
|
||||
@@ -4470,6 +4549,7 @@ type PodStatus struct {
|
||||
QOSClass PodQOSClass `json:"qosClass,omitempty" protobuf:"bytes,9,rep,name=qosClass"`
|
||||
// Status for any ephemeral containers that have run in this pod.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
EphemeralContainerStatuses []ContainerStatus `json:"ephemeralContainerStatuses,omitempty" protobuf:"bytes,13,rep,name=ephemeralContainerStatuses"`
|
||||
|
||||
// Status of resources resize desired for pod's containers.
|
||||
@@ -4658,6 +4738,8 @@ type ReplicationControllerStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ReplicationControllerCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -4859,6 +4941,7 @@ type LoadBalancerStatus struct {
|
||||
// Ingress is a list containing ingress points for the load-balancer.
|
||||
// Traffic intended for the service should be sent to these ingress points.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []LoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
@@ -5024,6 +5107,7 @@ type ServiceSpec struct {
|
||||
// at a node with this IP. A common example is external load-balancers
|
||||
// that are not part of the Kubernetes system.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ExternalIPs []string `json:"externalIPs,omitempty" protobuf:"bytes,5,rep,name=externalIPs"`
|
||||
|
||||
// Supports "ClientIP" and "None". Used to maintain session affinity.
|
||||
@@ -5049,6 +5133,7 @@ type ServiceSpec struct {
|
||||
// cloud-provider does not support the feature."
|
||||
// More info: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
LoadBalancerSourceRanges []string `json:"loadBalancerSourceRanges,omitempty" protobuf:"bytes,9,opt,name=loadBalancerSourceRanges"`
|
||||
|
||||
// externalName is the external reference that discovery mechanisms will
|
||||
@@ -5303,6 +5388,8 @@ type ServiceAccount struct {
|
||||
// +optional
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Secrets []ObjectReference `json:"secrets,omitempty" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,2,rep,name=secrets"`
|
||||
|
||||
// ImagePullSecrets is a list of references to secrets in the same namespace to use for pulling any images
|
||||
@@ -5310,6 +5397,7 @@ type ServiceAccount struct {
|
||||
// can be mounted in the pod, but ImagePullSecrets are only accessed by the kubelet.
|
||||
// More info: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ImagePullSecrets []LocalObjectReference `json:"imagePullSecrets,omitempty" protobuf:"bytes,3,rep,name=imagePullSecrets"`
|
||||
|
||||
// AutomountServiceAccountToken indicates whether pods running as this service account should have an API token automatically mounted.
|
||||
@@ -5364,6 +5452,7 @@ type Endpoints struct {
|
||||
// NotReadyAddresses in the same subset.
|
||||
// Sets of addresses and ports that comprise a service.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subsets []EndpointSubset `json:"subsets,omitempty" protobuf:"bytes,2,rep,name=subsets"`
|
||||
}
|
||||
|
||||
@@ -5384,14 +5473,17 @@ type EndpointSubset struct {
|
||||
// IP addresses which offer the related ports that are marked as ready. These endpoints
|
||||
// should be considered safe for load balancers and clients to utilize.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Addresses []EndpointAddress `json:"addresses,omitempty" protobuf:"bytes,1,rep,name=addresses"`
|
||||
// IP addresses which offer the related ports but are not currently marked as ready
|
||||
// because they have not yet finished starting, have recently failed a readiness check,
|
||||
// or have recently failed a liveness check.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NotReadyAddresses []EndpointAddress `json:"notReadyAddresses,omitempty" protobuf:"bytes,2,rep,name=notReadyAddresses"`
|
||||
// Port numbers available on the related IP addresses.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []EndpointPort `json:"ports,omitempty" protobuf:"bytes,3,rep,name=ports"`
|
||||
}
|
||||
|
||||
@@ -5476,6 +5568,7 @@ type NodeSpec struct {
|
||||
// each of IPv4 and IPv6.
|
||||
// +optional
|
||||
// +patchStrategy=merge
|
||||
// +listType=set
|
||||
PodCIDRs []string `json:"podCIDRs,omitempty" protobuf:"bytes,7,opt,name=podCIDRs" patchStrategy:"merge"`
|
||||
|
||||
// ID of the node assigned by the cloud provider in the format: <ProviderName>://<ProviderSpecificNodeID>
|
||||
@@ -5487,6 +5580,7 @@ type NodeSpec struct {
|
||||
Unschedulable bool `json:"unschedulable,omitempty" protobuf:"varint,4,opt,name=unschedulable"`
|
||||
// If specified, the node's taints.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Taints []Taint `json:"taints,omitempty" protobuf:"bytes,5,opt,name=taints"`
|
||||
|
||||
// Deprecated: Previously used to specify the source of the node's configuration for the DynamicKubeletConfig feature. This feature is removed.
|
||||
@@ -5657,6 +5751,8 @@ type NodeStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []NodeCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,4,rep,name=conditions"`
|
||||
// List of addresses reachable to the node.
|
||||
// Queried from cloud provider, if available.
|
||||
@@ -5671,6 +5767,8 @@ type NodeStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Addresses []NodeAddress `json:"addresses,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,5,rep,name=addresses"`
|
||||
// Endpoints of daemons running on the Node.
|
||||
// +optional
|
||||
@@ -5681,12 +5779,15 @@ type NodeStatus struct {
|
||||
NodeInfo NodeSystemInfo `json:"nodeInfo,omitempty" protobuf:"bytes,7,opt,name=nodeInfo"`
|
||||
// List of container images on this node
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Images []ContainerImage `json:"images,omitempty" protobuf:"bytes,8,rep,name=images"`
|
||||
// List of attachable volumes in use (mounted) by the node.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumesInUse []UniqueVolumeName `json:"volumesInUse,omitempty" protobuf:"bytes,9,rep,name=volumesInUse"`
|
||||
// List of volumes that are attached to the node.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumesAttached []AttachedVolume `json:"volumesAttached,omitempty" protobuf:"bytes,10,rep,name=volumesAttached"`
|
||||
// Status of the config assigned to the node via the dynamic Kubelet config feature.
|
||||
// +optional
|
||||
@@ -5711,6 +5812,7 @@ type AvoidPods struct {
|
||||
// Bounded-sized list of signatures of pods that should avoid this node, sorted
|
||||
// in timestamp order from oldest to newest. Size of the slice is unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PreferAvoidPods []PreferAvoidPodsEntry `json:"preferAvoidPods,omitempty" protobuf:"bytes,1,rep,name=preferAvoidPods"`
|
||||
}
|
||||
|
||||
@@ -5742,6 +5844,7 @@ type ContainerImage struct {
|
||||
// Names by which this image is known.
|
||||
// e.g. ["kubernetes.example/hyperkube:v1.0.7", "cloud-vendor.registry.example/cloud-vendor/hyperkube:v1.0.7"]
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Names []string `json:"names" protobuf:"bytes,1,rep,name=names"`
|
||||
// The size of the image in bytes.
|
||||
// +optional
|
||||
@@ -5764,8 +5867,7 @@ const (
|
||||
type NodeConditionType string
|
||||
|
||||
// These are valid but not exhaustive conditions of node. A cloud provider may set a condition not listed here.
|
||||
// The built-in set of conditions are:
|
||||
// NodeReachable, NodeLive, NodeReady, NodeSchedulable, NodeRunnable.
|
||||
// Relevant events contain "NodeReady", "NodeNotReady", "NodeSchedulable", and "NodeNotSchedulable".
|
||||
const (
|
||||
// NodeReady means kubelet is healthy and ready to accept pods.
|
||||
NodeReady NodeConditionType = "Ready"
|
||||
@@ -5867,7 +5969,6 @@ const (
|
||||
// Volume size, in bytes (e,g. 5Gi = 5GiB = 5 * 1024 * 1024 * 1024)
|
||||
ResourceStorage ResourceName = "storage"
|
||||
// Local ephemeral storage, in bytes. (500Gi = 500GiB = 500 * 1024 * 1024 * 1024)
|
||||
// The resource name for ResourceEphemeralStorage is alpha and it can change across releases.
|
||||
ResourceEphemeralStorage ResourceName = "ephemeral-storage"
|
||||
)
|
||||
|
||||
@@ -5937,6 +6038,7 @@ type NamespaceSpec struct {
|
||||
// Finalizers is an opaque list of values that must be empty to permanently remove object from storage.
|
||||
// More info: https://kubernetes.io/docs/tasks/administer-cluster/namespaces/
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Finalizers []FinalizerName `json:"finalizers,omitempty" protobuf:"bytes,1,rep,name=finalizers,casttype=FinalizerName"`
|
||||
}
|
||||
|
||||
@@ -5951,6 +6053,8 @@ type NamespaceStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []NamespaceCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,2,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -6188,6 +6292,7 @@ type PodExecOptions struct {
|
||||
Container string `json:"container,omitempty" protobuf:"bytes,5,opt,name=container"`
|
||||
|
||||
// Command is the remote command to execute. argv array. Not executed within a shell.
|
||||
// +listType=atomic
|
||||
Command []string `json:"command" protobuf:"bytes,6,rep,name=command"`
|
||||
}
|
||||
|
||||
@@ -6206,6 +6311,7 @@ type PodPortForwardOptions struct {
|
||||
// List of ports to forward
|
||||
// Required when using WebSockets
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []int32 `json:"ports,omitempty" protobuf:"varint,1,rep,name=ports"`
|
||||
}
|
||||
|
||||
@@ -6499,6 +6605,7 @@ type LimitRangeItem struct {
|
||||
// LimitRangeSpec defines a min/max usage limit for resources that match on kind.
|
||||
type LimitRangeSpec struct {
|
||||
// Limits is the list of LimitRangeItem objects that are enforced.
|
||||
// +listType=atomic
|
||||
Limits []LimitRangeItem `json:"limits" protobuf:"bytes,1,rep,name=limits"`
|
||||
}
|
||||
|
||||
@@ -6607,6 +6714,7 @@ type ResourceQuotaSpec struct {
|
||||
// A collection of filters that must match each object tracked by a quota.
|
||||
// If not specified, the quota matches all objects.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Scopes []ResourceQuotaScope `json:"scopes,omitempty" protobuf:"bytes,2,rep,name=scopes,casttype=ResourceQuotaScope"`
|
||||
// scopeSelector is also a collection of filters like scopes that must match each object tracked by a quota
|
||||
// but expressed using ScopeSelectorOperator in combination with possible values.
|
||||
@@ -6621,6 +6729,7 @@ type ResourceQuotaSpec struct {
|
||||
type ScopeSelector struct {
|
||||
// A list of scope selector requirements by scope of the resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MatchExpressions []ScopedResourceSelectorRequirement `json:"matchExpressions,omitempty" protobuf:"bytes,1,rep,name=matchExpressions"`
|
||||
}
|
||||
|
||||
@@ -6637,6 +6746,7 @@ type ScopedResourceSelectorRequirement struct {
|
||||
// the values array must be empty.
|
||||
// This array is replaced during a strategic merge patch.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Values []string `json:"values,omitempty" protobuf:"bytes,3,rep,name=values"`
|
||||
}
|
||||
|
||||
@@ -6936,6 +7046,8 @@ type ComponentStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ComponentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,2,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -6959,6 +7071,7 @@ type ComponentStatusList struct {
|
||||
type DownwardAPIVolumeSource struct {
|
||||
// Items is a list of downward API volume file
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []DownwardAPIVolumeFile `json:"items,omitempty" protobuf:"bytes,1,rep,name=items"`
|
||||
// Optional: mode bits to use on created files by default. Must be a
|
||||
// Optional: mode bits used to set permissions on created files by default.
|
||||
@@ -7003,6 +7116,7 @@ type DownwardAPIVolumeFile struct {
|
||||
type DownwardAPIProjection struct {
|
||||
// Items is a list of DownwardAPIVolume file
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Items []DownwardAPIVolumeFile `json:"items,omitempty" protobuf:"bytes,1,rep,name=items"`
|
||||
}
|
||||
|
||||
|
||||
12
vendor/k8s.io/api/core/v1/types_swagger_doc_generated.go
generated
vendored
12
vendor/k8s.io/api/core/v1/types_swagger_doc_generated.go
generated
vendored
@@ -1345,7 +1345,7 @@ var map_PersistentVolumeClaimCondition = map[string]string{
|
||||
"": "PersistentVolumeClaimCondition contains details about state of pvc",
|
||||
"lastProbeTime": "lastProbeTime is the time we probed the condition.",
|
||||
"lastTransitionTime": "lastTransitionTime is the time the condition transitioned from one status to another.",
|
||||
"reason": "reason is a unique, this should be a short, machine understandable string that gives the reason for condition's last transition. If it reports \"ResizeStarted\" that means the underlying persistent volume is being resized.",
|
||||
"reason": "reason is a unique, this should be a short, machine understandable string that gives the reason for condition's last transition. If it reports \"Resizing\" that means the underlying persistent volume is being resized.",
|
||||
"message": "message is the human-readable message indicating details about last transition.",
|
||||
}
|
||||
|
||||
@@ -1385,7 +1385,7 @@ var map_PersistentVolumeClaimStatus = map[string]string{
|
||||
"phase": "phase represents the current phase of PersistentVolumeClaim.",
|
||||
"accessModes": "accessModes contains the actual access modes the volume backing the PVC has. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1",
|
||||
"capacity": "capacity represents the actual resources of the underlying volume.",
|
||||
"conditions": "conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'ResizeStarted'.",
|
||||
"conditions": "conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'Resizing'.",
|
||||
"allocatedResources": "allocatedResources tracks the resources allocated to a PVC including its capacity. Key names follow standard Kubernetes label syntax. Valid values are either:\n\t* Un-prefixed keys:\n\t\t- storage - the capacity of the volume.\n\t* Custom resources must use implementation-defined prefixed names such as \"example.com/my-custom-resource\"\nApart from above values - keys that are unprefixed or have kubernetes.io prefix are considered reserved and hence may not be used.\n\nCapacity reported here may be larger than the actual capacity when a volume expansion operation is requested. For storage quota, the larger value from allocatedResources and PVC.spec.resources is used. If allocatedResources is not set, PVC.spec.resources alone is used for quota calculation. If a volume expansion capacity request is lowered, allocatedResources is only lowered if there are no expansion operations in progress and if the actual volume capacity is equal or lower than the requested capacity.\n\nA controller that receives PVC update with previously unknown resourceName should ignore the update for the purpose it was designed. For example - a controller that only is responsible for resizing capacity of the volume, should ignore PVC updates that change other valid resources associated with PVC.\n\nThis is an alpha field and requires enabling RecoverVolumeExpansionFailure feature.",
|
||||
"allocatedResourceStatuses": "allocatedResourceStatuses stores status of resource being resized for the given PVC. Key names follow standard Kubernetes label syntax. Valid values are either:\n\t* Un-prefixed keys:\n\t\t- storage - the capacity of the volume.\n\t* Custom resources must use implementation-defined prefixed names such as \"example.com/my-custom-resource\"\nApart from above values - keys that are unprefixed or have kubernetes.io prefix are considered reserved and hence may not be used.\n\nClaimResourceStatus can be in any of following states:\n\t- ControllerResizeInProgress:\n\t\tState set when resize controller starts resizing the volume in control-plane.\n\t- ControllerResizeFailed:\n\t\tState set when resize has failed in resize controller with a terminal error.\n\t- NodeResizePending:\n\t\tState set when resize controller has finished resizing the volume but further resizing of\n\t\tvolume is needed on the node.\n\t- NodeResizeInProgress:\n\t\tState set when kubelet starts resizing the volume.\n\t- NodeResizeFailed:\n\t\tState set when resizing has failed in kubelet with a terminal error. Transient errors don't set\n\t\tNodeResizeFailed.\nFor example: if expanding a PVC for more capacity - this field can be one of the following states:\n\t- pvc.status.allocatedResourceStatus['storage'] = \"ControllerResizeInProgress\"\n - pvc.status.allocatedResourceStatus['storage'] = \"ControllerResizeFailed\"\n - pvc.status.allocatedResourceStatus['storage'] = \"NodeResizePending\"\n - pvc.status.allocatedResourceStatus['storage'] = \"NodeResizeInProgress\"\n - pvc.status.allocatedResourceStatus['storage'] = \"NodeResizeFailed\"\nWhen this field is not set, it means that no resize operation is in progress for the given PVC.\n\nA controller that receives PVC update with previously unknown resourceName or ClaimResourceStatus should ignore the update for the purpose it was designed. For example - a controller that only is responsible for resizing capacity of the volume, should ignore PVC updates that change other valid resources associated with PVC.\n\nThis is an alpha field and requires enabling RecoverVolumeExpansionFailure feature.",
|
||||
"currentVolumeAttributesClassName": "currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is an alpha field and requires enabling VolumeAttributesClass feature.",
|
||||
@@ -1478,7 +1478,7 @@ var map_PersistentVolumeStatus = map[string]string{
|
||||
"phase": "phase indicates if a volume is available, bound to a claim, or released by a claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#phase",
|
||||
"message": "message is a human-readable message indicating details about why the volume is in this state.",
|
||||
"reason": "reason is a brief CamelCase string that describes any failure and is meant for machine parsing and tidy display in the CLI.",
|
||||
"lastPhaseTransitionTime": "lastPhaseTransitionTime is the time the phase transitioned from one to another and automatically resets to current time everytime a volume phase transitions. This is an alpha field and requires enabling PersistentVolumeLastPhaseTransitionTime feature.",
|
||||
"lastPhaseTransitionTime": "lastPhaseTransitionTime is the time the phase transitioned from one to another and automatically resets to current time everytime a volume phase transitions. This is a beta field and requires the PersistentVolumeLastPhaseTransitionTime feature to be enabled (enabled by default).",
|
||||
}
|
||||
|
||||
func (PersistentVolumeStatus) SwaggerDoc() map[string]string {
|
||||
@@ -1522,8 +1522,8 @@ var map_PodAffinityTerm = map[string]string{
|
||||
"namespaces": "namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means \"this pod's namespace\".",
|
||||
"topologyKey": "This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed.",
|
||||
"namespaceSelector": "A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means \"this pod's namespace\". An empty selector ({}) matches all namespaces.",
|
||||
"matchLabelKeys": "MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `LabelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both MatchLabelKeys and LabelSelector. Also, MatchLabelKeys cannot be set when LabelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.",
|
||||
"mismatchLabelKeys": "MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `LabelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both MismatchLabelKeys and LabelSelector. Also, MismatchLabelKeys cannot be set when LabelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.",
|
||||
"matchLabelKeys": "MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.",
|
||||
"mismatchLabelKeys": "MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.",
|
||||
}
|
||||
|
||||
func (PodAffinityTerm) SwaggerDoc() map[string]string {
|
||||
@@ -1741,7 +1741,7 @@ var map_PodSpec = map[string]string{
|
||||
"dnsPolicy": "Set DNS policy for the pod. Defaults to \"ClusterFirst\". Valid values are 'ClusterFirstWithHostNet', 'ClusterFirst', 'Default' or 'None'. DNS parameters given in DNSConfig will be merged with the policy selected with DNSPolicy. To have DNS options set along with hostNetwork, you have to specify DNS policy explicitly to 'ClusterFirstWithHostNet'.",
|
||||
"nodeSelector": "NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node's labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/",
|
||||
"serviceAccountName": "ServiceAccountName is the name of the ServiceAccount to use to run this pod. More info: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/",
|
||||
"serviceAccount": "DeprecatedServiceAccount is a depreciated alias for ServiceAccountName. Deprecated: Use serviceAccountName instead.",
|
||||
"serviceAccount": "DeprecatedServiceAccount is a deprecated alias for ServiceAccountName. Deprecated: Use serviceAccountName instead.",
|
||||
"automountServiceAccountToken": "AutomountServiceAccountToken indicates whether a service account token should be automatically mounted.",
|
||||
"nodeName": "NodeName is a request to schedule this pod onto a specific node. If it is non-empty, the scheduler simply schedules this pod onto that node, assuming that it fits resource requirements.",
|
||||
"hostNetwork": "Host networking requested for this pod. Use the host's network namespace. If this option is set, the ports that will be used must be specified. Default to false.",
|
||||
|
||||
19
vendor/k8s.io/api/extensions/v1beta1/generated.proto
generated
vendored
19
vendor/k8s.io/api/extensions/v1beta1/generated.proto
generated
vendored
@@ -176,6 +176,8 @@ message DaemonSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DaemonSetCondition conditions = 10;
|
||||
}
|
||||
|
||||
@@ -343,6 +345,8 @@ message DeploymentStatus {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated DeploymentCondition conditions = 6;
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -406,6 +410,7 @@ message HTTPIngressPath {
|
||||
// or '#'.
|
||||
message HTTPIngressRuleValue {
|
||||
// A collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
repeated HTTPIngressPath paths = 1;
|
||||
}
|
||||
|
||||
@@ -422,6 +427,7 @@ message IPBlock {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the CIDR range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string except = 2;
|
||||
}
|
||||
|
||||
@@ -495,6 +501,7 @@ message IngressLoadBalancerIngress {
|
||||
message IngressLoadBalancerStatus {
|
||||
// Ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressLoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -602,11 +609,13 @@ message IngressSpec {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressTLS tls = 2;
|
||||
|
||||
// A list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressRule rules = 3;
|
||||
}
|
||||
|
||||
@@ -624,6 +633,7 @@ message IngressTLS {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string hosts = 1;
|
||||
|
||||
// SecretName is the name of the secret used to terminate SSL traffic on 443.
|
||||
@@ -659,6 +669,7 @@ message NetworkPolicyEgressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// List of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -667,6 +678,7 @@ message NetworkPolicyEgressRule {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer to = 2;
|
||||
}
|
||||
|
||||
@@ -679,6 +691,7 @@ message NetworkPolicyIngressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows traffic
|
||||
// only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// List of sources which should be able to access the pods selected for this rule.
|
||||
@@ -687,6 +700,7 @@ message NetworkPolicyIngressRule {
|
||||
// If this field is present and contains at least one item, this rule allows traffic only if the
|
||||
// traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer from = 2;
|
||||
}
|
||||
|
||||
@@ -767,6 +781,7 @@ message NetworkPolicySpec {
|
||||
// If this field is empty then this NetworkPolicy does not allow any traffic
|
||||
// (and serves solely to ensure that the pods it selects are isolated by default).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyIngressRule ingress = 2;
|
||||
|
||||
// List of egress rules to be applied to the selected pods. Outgoing traffic is
|
||||
@@ -777,6 +792,7 @@ message NetworkPolicySpec {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyEgressRule egress = 3;
|
||||
|
||||
// List of rule types that the NetworkPolicy relates to.
|
||||
@@ -790,6 +806,7 @@ message NetworkPolicySpec {
|
||||
// an Egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string policyTypes = 4;
|
||||
}
|
||||
|
||||
@@ -905,6 +922,8 @@ message ReplicaSetStatus {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
repeated ReplicaSetCondition conditions = 6;
|
||||
}
|
||||
|
||||
|
||||
19
vendor/k8s.io/api/extensions/v1beta1/types.go
generated
vendored
19
vendor/k8s.io/api/extensions/v1beta1/types.go
generated
vendored
@@ -270,6 +270,8 @@ type DeploymentStatus struct {
|
||||
// Represents the latest available observations of a deployment's current state.
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DeploymentCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
|
||||
// Count of hash collisions for the Deployment. The Deployment controller uses this
|
||||
@@ -490,6 +492,8 @@ type DaemonSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []DaemonSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,10,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -652,11 +656,13 @@ type IngressSpec struct {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TLS []IngressTLS `json:"tls,omitempty" protobuf:"bytes,2,rep,name=tls"`
|
||||
|
||||
// A list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []IngressRule `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
// TODO: Add the ability to specify load-balancer IP through claims
|
||||
}
|
||||
@@ -668,6 +674,7 @@ type IngressTLS struct {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Hosts []string `json:"hosts,omitempty" protobuf:"bytes,1,rep,name=hosts"`
|
||||
// SecretName is the name of the secret used to terminate SSL traffic on 443.
|
||||
// Field is left optional to allow SSL routing based on SNI hostname alone.
|
||||
@@ -690,6 +697,7 @@ type IngressStatus struct {
|
||||
type IngressLoadBalancerStatus struct {
|
||||
// Ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []IngressLoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
@@ -797,6 +805,7 @@ type IngressRuleValue struct {
|
||||
// or '#'.
|
||||
type HTTPIngressRuleValue struct {
|
||||
// A collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
Paths []HTTPIngressPath `json:"paths" protobuf:"bytes,1,rep,name=paths"`
|
||||
// TODO: Consider adding fields for ingress-type specific global
|
||||
// options usable by a loadbalancer, like http keep-alive.
|
||||
@@ -991,6 +1000,8 @@ type ReplicaSetStatus struct {
|
||||
// +optional
|
||||
// +patchMergeKey=type
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=type
|
||||
Conditions []ReplicaSetCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,6,rep,name=conditions"`
|
||||
}
|
||||
|
||||
@@ -1076,6 +1087,7 @@ type NetworkPolicySpec struct {
|
||||
// If this field is empty then this NetworkPolicy does not allow any traffic
|
||||
// (and serves solely to ensure that the pods it selects are isolated by default).
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []NetworkPolicyIngressRule `json:"ingress,omitempty" protobuf:"bytes,2,rep,name=ingress"`
|
||||
|
||||
// List of egress rules to be applied to the selected pods. Outgoing traffic is
|
||||
@@ -1086,6 +1098,7 @@ type NetworkPolicySpec struct {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Egress []NetworkPolicyEgressRule `json:"egress,omitempty" protobuf:"bytes,3,rep,name=egress"`
|
||||
|
||||
// List of rule types that the NetworkPolicy relates to.
|
||||
@@ -1099,6 +1112,7 @@ type NetworkPolicySpec struct {
|
||||
// an Egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PolicyTypes []PolicyType `json:"policyTypes,omitempty" protobuf:"bytes,4,rep,name=policyTypes,casttype=PolicyType"`
|
||||
}
|
||||
|
||||
@@ -1111,6 +1125,7 @@ type NetworkPolicyIngressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows traffic
|
||||
// only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// List of sources which should be able to access the pods selected for this rule.
|
||||
@@ -1119,6 +1134,7 @@ type NetworkPolicyIngressRule struct {
|
||||
// If this field is present and contains at least one item, this rule allows traffic only if the
|
||||
// traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
From []NetworkPolicyPeer `json:"from,omitempty" protobuf:"bytes,2,rep,name=from"`
|
||||
}
|
||||
|
||||
@@ -1133,6 +1149,7 @@ type NetworkPolicyEgressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// List of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -1141,6 +1158,7 @@ type NetworkPolicyEgressRule struct {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
To []NetworkPolicyPeer `json:"to,omitempty" protobuf:"bytes,2,rep,name=to"`
|
||||
}
|
||||
|
||||
@@ -1178,6 +1196,7 @@ type IPBlock struct {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the CIDR range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Except []string `json:"except,omitempty" protobuf:"bytes,2,rep,name=except"`
|
||||
}
|
||||
|
||||
|
||||
9
vendor/k8s.io/api/networking/v1/generated.proto
generated
vendored
9
vendor/k8s.io/api/networking/v1/generated.proto
generated
vendored
@@ -84,6 +84,7 @@ message IPBlock {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the cidr range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string except = 2;
|
||||
}
|
||||
|
||||
@@ -225,6 +226,7 @@ message IngressLoadBalancerIngress {
|
||||
message IngressLoadBalancerStatus {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressLoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -396,6 +398,7 @@ message NetworkPolicyEgressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// to is a list of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -404,6 +407,7 @@ message NetworkPolicyEgressRule {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer to = 2;
|
||||
}
|
||||
|
||||
@@ -416,6 +420,7 @@ message NetworkPolicyIngressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// from is a list of sources which should be able to access the pods selected for this rule.
|
||||
@@ -424,6 +429,7 @@ message NetworkPolicyIngressRule {
|
||||
// source). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer from = 2;
|
||||
}
|
||||
|
||||
@@ -505,6 +511,7 @@ message NetworkPolicySpec {
|
||||
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||
// solely to ensure that the pods it selects are isolated by default)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyIngressRule ingress = 2;
|
||||
|
||||
// egress is a list of egress rules to be applied to the selected pods. Outgoing traffic
|
||||
@@ -515,6 +522,7 @@ message NetworkPolicySpec {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyEgressRule egress = 3;
|
||||
|
||||
// policyTypes is a list of rule types that the NetworkPolicy relates to.
|
||||
@@ -528,6 +536,7 @@ message NetworkPolicySpec {
|
||||
// an egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string policyTypes = 4;
|
||||
}
|
||||
|
||||
|
||||
9
vendor/k8s.io/api/networking/v1/types.go
generated
vendored
9
vendor/k8s.io/api/networking/v1/types.go
generated
vendored
@@ -74,6 +74,7 @@ type NetworkPolicySpec struct {
|
||||
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||
// solely to ensure that the pods it selects are isolated by default)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []NetworkPolicyIngressRule `json:"ingress,omitempty" protobuf:"bytes,2,rep,name=ingress"`
|
||||
|
||||
// egress is a list of egress rules to be applied to the selected pods. Outgoing traffic
|
||||
@@ -84,6 +85,7 @@ type NetworkPolicySpec struct {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Egress []NetworkPolicyEgressRule `json:"egress,omitempty" protobuf:"bytes,3,rep,name=egress"`
|
||||
|
||||
// policyTypes is a list of rule types that the NetworkPolicy relates to.
|
||||
@@ -97,6 +99,7 @@ type NetworkPolicySpec struct {
|
||||
// an egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PolicyTypes []PolicyType `json:"policyTypes,omitempty" protobuf:"bytes,4,rep,name=policyTypes,casttype=PolicyType"`
|
||||
}
|
||||
|
||||
@@ -109,6 +112,7 @@ type NetworkPolicyIngressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// from is a list of sources which should be able to access the pods selected for this rule.
|
||||
@@ -117,6 +121,7 @@ type NetworkPolicyIngressRule struct {
|
||||
// source). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
From []NetworkPolicyPeer `json:"from,omitempty" protobuf:"bytes,2,rep,name=from"`
|
||||
}
|
||||
|
||||
@@ -130,6 +135,7 @@ type NetworkPolicyEgressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// to is a list of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -138,6 +144,7 @@ type NetworkPolicyEgressRule struct {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
To []NetworkPolicyPeer `json:"to,omitempty" protobuf:"bytes,2,rep,name=to"`
|
||||
}
|
||||
|
||||
@@ -175,6 +182,7 @@ type IPBlock struct {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the cidr range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Except []string `json:"except,omitempty" protobuf:"bytes,2,rep,name=except"`
|
||||
}
|
||||
|
||||
@@ -329,6 +337,7 @@ type IngressStatus struct {
|
||||
type IngressLoadBalancerStatus struct {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []IngressLoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
|
||||
1
vendor/k8s.io/api/networking/v1alpha1/generated.proto
generated
vendored
1
vendor/k8s.io/api/networking/v1alpha1/generated.proto
generated
vendored
@@ -121,6 +121,7 @@ message ServiceCIDRSpec {
|
||||
// from which to assign service cluster IPs. Max of two CIDRs is allowed, one of each IP family.
|
||||
// This field is immutable.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string cidrs = 1;
|
||||
}
|
||||
|
||||
|
||||
1
vendor/k8s.io/api/networking/v1alpha1/types.go
generated
vendored
1
vendor/k8s.io/api/networking/v1alpha1/types.go
generated
vendored
@@ -111,6 +111,7 @@ type ServiceCIDRSpec struct {
|
||||
// from which to assign service cluster IPs. Max of two CIDRs is allowed, one of each IP family.
|
||||
// This field is immutable.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
CIDRs []string `json:"cidrs,omitempty" protobuf:"bytes,1,opt,name=cidrs"`
|
||||
}
|
||||
|
||||
|
||||
5
vendor/k8s.io/api/networking/v1beta1/generated.proto
generated
vendored
5
vendor/k8s.io/api/networking/v1beta1/generated.proto
generated
vendored
@@ -69,6 +69,7 @@ message HTTPIngressPath {
|
||||
// or '#'.
|
||||
message HTTPIngressRuleValue {
|
||||
// paths is a collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
repeated HTTPIngressPath paths = 1;
|
||||
}
|
||||
|
||||
@@ -211,6 +212,7 @@ message IngressLoadBalancerIngress {
|
||||
message IngressLoadBalancerStatus {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressLoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -313,11 +315,13 @@ message IngressSpec {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressTLS tls = 2;
|
||||
|
||||
// rules is a list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressRule rules = 3;
|
||||
}
|
||||
|
||||
@@ -335,6 +339,7 @@ message IngressTLS {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string hosts = 1;
|
||||
|
||||
// secretName is the name of the secret used to terminate TLS traffic on
|
||||
|
||||
5
vendor/k8s.io/api/networking/v1beta1/types.go
generated
vendored
5
vendor/k8s.io/api/networking/v1beta1/types.go
generated
vendored
@@ -97,11 +97,13 @@ type IngressSpec struct {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TLS []IngressTLS `json:"tls,omitempty" protobuf:"bytes,2,rep,name=tls"`
|
||||
|
||||
// rules is a list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []IngressRule `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
// TODO: Add the ability to specify load-balancer IP through claims
|
||||
}
|
||||
@@ -113,6 +115,7 @@ type IngressTLS struct {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Hosts []string `json:"hosts,omitempty" protobuf:"bytes,1,rep,name=hosts"`
|
||||
|
||||
// secretName is the name of the secret used to terminate TLS traffic on
|
||||
@@ -136,6 +139,7 @@ type IngressStatus struct {
|
||||
type IngressLoadBalancerStatus struct {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []IngressLoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
@@ -239,6 +243,7 @@ type IngressRuleValue struct {
|
||||
// or '#'.
|
||||
type HTTPIngressRuleValue struct {
|
||||
// paths is a collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
Paths []HTTPIngressPath `json:"paths" protobuf:"bytes,1,rep,name=paths"`
|
||||
// TODO: Consider adding fields for ingress-type specific global
|
||||
// options usable by a loadbalancer, like http keep-alive.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1/generated.proto
generated
vendored
10
vendor/k8s.io/api/rbac/v1/generated.proto
generated
vendored
@@ -33,6 +33,7 @@ message AggregationRule {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector clusterRoleSelectors = 1;
|
||||
}
|
||||
|
||||
@@ -44,6 +45,7 @@ message ClusterRole {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -62,6 +64,7 @@ message ClusterRoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
@@ -94,25 +97,30 @@ message ClusterRoleList {
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
message PolicyRule {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 2;
|
||||
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 3;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 4;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 5;
|
||||
}
|
||||
|
||||
@@ -124,6 +132,7 @@ message Role {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
}
|
||||
|
||||
@@ -137,6 +146,7 @@ message RoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1/types.go
generated
vendored
10
vendor/k8s.io/api/rbac/v1/types.go
generated
vendored
@@ -48,23 +48,28 @@ const (
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
type PolicyRule struct {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,5,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
@@ -111,6 +116,7 @@ type Role struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
}
|
||||
|
||||
@@ -128,6 +134,7 @@ type RoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
@@ -175,6 +182,7 @@ type ClusterRole struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -189,6 +197,7 @@ type AggregationRule struct {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ClusterRoleSelectors []metav1.LabelSelector `json:"clusterRoleSelectors,omitempty" protobuf:"bytes,1,rep,name=clusterRoleSelectors"`
|
||||
}
|
||||
|
||||
@@ -206,6 +215,7 @@ type ClusterRoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1alpha1/generated.proto
generated
vendored
10
vendor/k8s.io/api/rbac/v1alpha1/generated.proto
generated
vendored
@@ -33,6 +33,7 @@ message AggregationRule {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector clusterRoleSelectors = 1;
|
||||
}
|
||||
|
||||
@@ -45,6 +46,7 @@ message ClusterRole {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -64,6 +66,7 @@ message ClusterRoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
@@ -97,25 +100,30 @@ message ClusterRoleList {
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
message PolicyRule {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 3;
|
||||
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 4;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 5;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 6;
|
||||
}
|
||||
|
||||
@@ -128,6 +136,7 @@ message Role {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
}
|
||||
|
||||
@@ -142,6 +151,7 @@ message RoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1alpha1/types.go
generated
vendored
10
vendor/k8s.io/api/rbac/v1alpha1/types.go
generated
vendored
@@ -48,23 +48,28 @@ const (
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
type PolicyRule struct {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,3,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,4,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,5,rep,name=resourceNames"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,6,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
@@ -111,6 +116,7 @@ type Role struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
}
|
||||
|
||||
@@ -129,6 +135,7 @@ type RoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
@@ -178,6 +185,7 @@ type ClusterRole struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -192,6 +200,7 @@ type AggregationRule struct {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ClusterRoleSelectors []metav1.LabelSelector `json:"clusterRoleSelectors,omitempty" protobuf:"bytes,1,rep,name=clusterRoleSelectors"`
|
||||
}
|
||||
|
||||
@@ -210,6 +219,7 @@ type ClusterRoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1beta1/generated.proto
generated
vendored
10
vendor/k8s.io/api/rbac/v1beta1/generated.proto
generated
vendored
@@ -33,6 +33,7 @@ message AggregationRule {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector clusterRoleSelectors = 1;
|
||||
}
|
||||
|
||||
@@ -45,6 +46,7 @@ message ClusterRole {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@@ -64,6 +66,7 @@ message ClusterRoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
@@ -97,26 +100,31 @@ message ClusterRoleList {
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
message PolicyRule {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
repeated string verbs = 1;
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string apiGroups = 2;
|
||||
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources in the specified apiGroups.
|
||||
// '*/foo' represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resources = 3;
|
||||
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string resourceNames = 4;
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string nonResourceURLs = 5;
|
||||
}
|
||||
|
||||
@@ -129,6 +137,7 @@ message Role {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated PolicyRule rules = 2;
|
||||
}
|
||||
|
||||
@@ -143,6 +152,7 @@ message RoleBinding {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated Subject subjects = 2;
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
|
||||
10
vendor/k8s.io/api/rbac/v1beta1/types.go
generated
vendored
10
vendor/k8s.io/api/rbac/v1beta1/types.go
generated
vendored
@@ -48,24 +48,29 @@ const (
|
||||
// about who the rule applies to or which namespace the rule applies to.
|
||||
type PolicyRule struct {
|
||||
// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
|
||||
// +listType=atomic
|
||||
Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"`
|
||||
|
||||
// APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of
|
||||
// the enumerated resources in any API group will be allowed. "" represents the core API group and "*" represents all API groups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"`
|
||||
// Resources is a list of resources this rule applies to. '*' represents all resources in the specified apiGroups.
|
||||
// '*/foo' represents the subresource 'foo' for all resources in the specified apiGroups.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"`
|
||||
// ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"`
|
||||
|
||||
// NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path
|
||||
// Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
|
||||
// Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,5,rep,name=nonResourceURLs"`
|
||||
}
|
||||
|
||||
@@ -115,6 +120,7 @@ type Role struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
}
|
||||
|
||||
@@ -137,6 +143,7 @@ type RoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
@@ -198,6 +205,7 @@ type ClusterRole struct {
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
// If AggregationRule is set, then the Rules are controller managed and direct changes to Rules will be
|
||||
@@ -211,6 +219,7 @@ type AggregationRule struct {
|
||||
// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
|
||||
// If any of the selectors match, then the ClusterRole's permissions will be added
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
ClusterRoleSelectors []metav1.LabelSelector `json:"clusterRoleSelectors,omitempty" protobuf:"bytes,1,rep,name=clusterRoleSelectors"`
|
||||
}
|
||||
|
||||
@@ -233,6 +242,7 @@ type ClusterRoleBinding struct {
|
||||
|
||||
// Subjects holds references to the objects the role applies to.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
|
||||
2
vendor/k8s.io/api/resource/v1alpha2/generated.proto
generated
vendored
2
vendor/k8s.io/api/resource/v1alpha2/generated.proto
generated
vendored
@@ -257,6 +257,8 @@ message ResourceClaimStatus {
|
||||
//
|
||||
// +listType=map
|
||||
// +listMapKey=uid
|
||||
// +patchStrategy=merge
|
||||
// +patchMergeKey=uid
|
||||
// +optional
|
||||
repeated ResourceClaimConsumerReference reservedFor = 3;
|
||||
|
||||
|
||||
4
vendor/k8s.io/api/resource/v1alpha2/types.go
generated
vendored
4
vendor/k8s.io/api/resource/v1alpha2/types.go
generated
vendored
@@ -114,8 +114,10 @@ type ResourceClaimStatus struct {
|
||||
//
|
||||
// +listType=map
|
||||
// +listMapKey=uid
|
||||
// +patchStrategy=merge
|
||||
// +patchMergeKey=uid
|
||||
// +optional
|
||||
ReservedFor []ResourceClaimConsumerReference `json:"reservedFor,omitempty" protobuf:"bytes,3,opt,name=reservedFor"`
|
||||
ReservedFor []ResourceClaimConsumerReference `json:"reservedFor,omitempty" protobuf:"bytes,3,opt,name=reservedFor" patchStrategy:"merge" patchMergeKey:"uid"`
|
||||
|
||||
// DeallocationRequested indicates that a ResourceClaim is to be
|
||||
// deallocated.
|
||||
|
||||
10
vendor/k8s.io/api/storage/v1/generated.proto
generated
vendored
10
vendor/k8s.io/api/storage/v1/generated.proto
generated
vendored
@@ -103,7 +103,7 @@ message CSIDriverSpec {
|
||||
// deployed on such a cluster and the deployment determines which mode that is, for example
|
||||
// via a command line parameter of the driver.
|
||||
//
|
||||
// This field is immutable.
|
||||
// This field was immutable in Kubernetes < 1.29 and now is mutable.
|
||||
//
|
||||
// +optional
|
||||
optional bool podInfoOnMount = 2;
|
||||
@@ -150,7 +150,7 @@ message CSIDriverSpec {
|
||||
// permission of the volume before being mounted.
|
||||
// Refer to the specific FSGroupPolicy values for additional details.
|
||||
//
|
||||
// This field is immutable.
|
||||
// This field was immutable in Kubernetes < 1.29 and now is mutable.
|
||||
//
|
||||
// Defaults to ReadWriteOnceWithFSType, which will examine each volume
|
||||
// to determine if Kubernetes should modify ownership and permissions of the volume.
|
||||
@@ -261,6 +261,7 @@ message CSINodeDriver {
|
||||
// It is possible for different nodes to use different topology keys.
|
||||
// This can be empty if driver does not support topology.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string topologyKeys = 3;
|
||||
|
||||
// allocatable represents the volume resources of a node that are available for scheduling.
|
||||
@@ -286,6 +287,8 @@ message CSINodeSpec {
|
||||
// If all drivers in the list are uninstalled, this can become empty.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSINodeDriver drivers = 1;
|
||||
}
|
||||
|
||||
@@ -378,8 +381,6 @@ message CSIStorageCapacityList {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSIStorageCapacity items = 2;
|
||||
}
|
||||
|
||||
@@ -411,6 +412,7 @@ message StorageClass {
|
||||
// e.g. ["ro", "soft"]. Not validated -
|
||||
// mount of the PVs will simply fail if one is invalid.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string mountOptions = 5;
|
||||
|
||||
// allowVolumeExpansion shows whether the storage class allow volume expand.
|
||||
|
||||
10
vendor/k8s.io/api/storage/v1/types.go
generated
vendored
10
vendor/k8s.io/api/storage/v1/types.go
generated
vendored
@@ -56,6 +56,7 @@ type StorageClass struct {
|
||||
// e.g. ["ro", "soft"]. Not validated -
|
||||
// mount of the PVs will simply fail if one is invalid.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MountOptions []string `json:"mountOptions,omitempty" protobuf:"bytes,5,opt,name=mountOptions"`
|
||||
|
||||
// allowVolumeExpansion shows whether the storage class allow volume expand.
|
||||
@@ -306,7 +307,7 @@ type CSIDriverSpec struct {
|
||||
// deployed on such a cluster and the deployment determines which mode that is, for example
|
||||
// via a command line parameter of the driver.
|
||||
//
|
||||
// This field is immutable.
|
||||
// This field was immutable in Kubernetes < 1.29 and now is mutable.
|
||||
//
|
||||
// +optional
|
||||
PodInfoOnMount *bool `json:"podInfoOnMount,omitempty" protobuf:"bytes,2,opt,name=podInfoOnMount"`
|
||||
@@ -353,7 +354,7 @@ type CSIDriverSpec struct {
|
||||
// permission of the volume before being mounted.
|
||||
// Refer to the specific FSGroupPolicy values for additional details.
|
||||
//
|
||||
// This field is immutable.
|
||||
// This field was immutable in Kubernetes < 1.29 and now is mutable.
|
||||
//
|
||||
// Defaults to ReadWriteOnceWithFSType, which will examine each volume
|
||||
// to determine if Kubernetes should modify ownership and permissions of the volume.
|
||||
@@ -517,6 +518,8 @@ type CSINodeSpec struct {
|
||||
// If all drivers in the list are uninstalled, this can become empty.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Drivers []CSINodeDriver `json:"drivers" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,1,rep,name=drivers"`
|
||||
}
|
||||
|
||||
@@ -549,6 +552,7 @@ type CSINodeDriver struct {
|
||||
// It is possible for different nodes to use different topology keys.
|
||||
// This can be empty if driver does not support topology.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TopologyKeys []string `json:"topologyKeys" protobuf:"bytes,3,rep,name=topologyKeys"`
|
||||
|
||||
// allocatable represents the volume resources of a node that are available for scheduling.
|
||||
@@ -680,7 +684,5 @@ type CSIStorageCapacityList struct {
|
||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Items []CSIStorageCapacity `json:"items" protobuf:"bytes,2,rep,name=items"`
|
||||
}
|
||||
|
||||
4
vendor/k8s.io/api/storage/v1/types_swagger_doc_generated.go
generated
vendored
4
vendor/k8s.io/api/storage/v1/types_swagger_doc_generated.go
generated
vendored
@@ -50,10 +50,10 @@ func (CSIDriverList) SwaggerDoc() map[string]string {
|
||||
var map_CSIDriverSpec = map[string]string{
|
||||
"": "CSIDriverSpec is the specification of a CSIDriver.",
|
||||
"attachRequired": "attachRequired indicates this CSI volume driver requires an attach operation (because it implements the CSI ControllerPublishVolume() method), and that the Kubernetes attach detach controller should call the attach volume interface which checks the volumeattachment status and waits until the volume is attached before proceeding to mounting. The CSI external-attacher coordinates with CSI volume driver and updates the volumeattachment status when the attach operation is complete. If the CSIDriverRegistry feature gate is enabled and the value is specified to false, the attach operation will be skipped. Otherwise the attach operation will be called.\n\nThis field is immutable.",
|
||||
"podInfoOnMount": "podInfoOnMount indicates this CSI volume driver requires additional pod information (like podName, podUID, etc.) during mount operations, if set to true. If set to false, pod information will not be passed on mount. Default is false.\n\nThe CSI driver specifies podInfoOnMount as part of driver deployment. If true, Kubelet will pass pod information as VolumeContext in the CSI NodePublishVolume() calls. The CSI driver is responsible for parsing and validating the information passed in as VolumeContext.\n\nThe following VolumeContext will be passed if podInfoOnMount is set to true. This list might grow, but the prefix will be used. \"csi.storage.k8s.io/pod.name\": pod.Name \"csi.storage.k8s.io/pod.namespace\": pod.Namespace \"csi.storage.k8s.io/pod.uid\": string(pod.UID) \"csi.storage.k8s.io/ephemeral\": \"true\" if the volume is an ephemeral inline volume\n defined by a CSIVolumeSource, otherwise \"false\"\n\n\"csi.storage.k8s.io/ephemeral\" is a new feature in Kubernetes 1.16. It is only required for drivers which support both the \"Persistent\" and \"Ephemeral\" VolumeLifecycleMode. Other drivers can leave pod info disabled and/or ignore this field. As Kubernetes 1.15 doesn't support this field, drivers can only support one mode when deployed on such a cluster and the deployment determines which mode that is, for example via a command line parameter of the driver.\n\nThis field is immutable.",
|
||||
"podInfoOnMount": "podInfoOnMount indicates this CSI volume driver requires additional pod information (like podName, podUID, etc.) during mount operations, if set to true. If set to false, pod information will not be passed on mount. Default is false.\n\nThe CSI driver specifies podInfoOnMount as part of driver deployment. If true, Kubelet will pass pod information as VolumeContext in the CSI NodePublishVolume() calls. The CSI driver is responsible for parsing and validating the information passed in as VolumeContext.\n\nThe following VolumeContext will be passed if podInfoOnMount is set to true. This list might grow, but the prefix will be used. \"csi.storage.k8s.io/pod.name\": pod.Name \"csi.storage.k8s.io/pod.namespace\": pod.Namespace \"csi.storage.k8s.io/pod.uid\": string(pod.UID) \"csi.storage.k8s.io/ephemeral\": \"true\" if the volume is an ephemeral inline volume\n defined by a CSIVolumeSource, otherwise \"false\"\n\n\"csi.storage.k8s.io/ephemeral\" is a new feature in Kubernetes 1.16. It is only required for drivers which support both the \"Persistent\" and \"Ephemeral\" VolumeLifecycleMode. Other drivers can leave pod info disabled and/or ignore this field. As Kubernetes 1.15 doesn't support this field, drivers can only support one mode when deployed on such a cluster and the deployment determines which mode that is, for example via a command line parameter of the driver.\n\nThis field was immutable in Kubernetes < 1.29 and now is mutable.",
|
||||
"volumeLifecycleModes": "volumeLifecycleModes defines what kind of volumes this CSI volume driver supports. The default if the list is empty is \"Persistent\", which is the usage defined by the CSI specification and implemented in Kubernetes via the usual PV/PVC mechanism.\n\nThe other mode is \"Ephemeral\". In this mode, volumes are defined inline inside the pod spec with CSIVolumeSource and their lifecycle is tied to the lifecycle of that pod. A driver has to be aware of this because it is only going to get a NodePublishVolume call for such a volume.\n\nFor more information about implementing this mode, see https://kubernetes-csi.github.io/docs/ephemeral-local-volumes.html A driver can support one or more of these modes and more modes may be added in the future.\n\nThis field is beta. This field is immutable.",
|
||||
"storageCapacity": "storageCapacity indicates that the CSI volume driver wants pod scheduling to consider the storage capacity that the driver deployment will report by creating CSIStorageCapacity objects with capacity information, if set to true.\n\nThe check can be enabled immediately when deploying a driver. In that case, provisioning new volumes with late binding will pause until the driver deployment has published some suitable CSIStorageCapacity object.\n\nAlternatively, the driver can be deployed with the field unset or false and it can be flipped later when storage capacity information has been published.\n\nThis field was immutable in Kubernetes <= 1.22 and now is mutable.",
|
||||
"fsGroupPolicy": "fsGroupPolicy defines if the underlying volume supports changing ownership and permission of the volume before being mounted. Refer to the specific FSGroupPolicy values for additional details.\n\nThis field is immutable.\n\nDefaults to ReadWriteOnceWithFSType, which will examine each volume to determine if Kubernetes should modify ownership and permissions of the volume. With the default policy the defined fsGroup will only be applied if a fstype is defined and the volume's access mode contains ReadWriteOnce.",
|
||||
"fsGroupPolicy": "fsGroupPolicy defines if the underlying volume supports changing ownership and permission of the volume before being mounted. Refer to the specific FSGroupPolicy values for additional details.\n\nThis field was immutable in Kubernetes < 1.29 and now is mutable.\n\nDefaults to ReadWriteOnceWithFSType, which will examine each volume to determine if Kubernetes should modify ownership and permissions of the volume. With the default policy the defined fsGroup will only be applied if a fstype is defined and the volume's access mode contains ReadWriteOnce.",
|
||||
"tokenRequests": "tokenRequests indicates the CSI driver needs pods' service account tokens it is mounting volume for to do necessary authentication. Kubelet will pass the tokens in VolumeContext in the CSI NodePublishVolume calls. The CSI driver should parse and validate the following VolumeContext: \"csi.storage.k8s.io/serviceAccount.tokens\": {\n \"<audience>\": {\n \"token\": <token>,\n \"expirationTimestamp\": <expiration timestamp in RFC3339>,\n },\n ...\n}\n\nNote: Audience in each TokenRequest should be different and at most one token is empty string. To receive a new token after expiry, RequiresRepublish can be used to trigger NodePublishVolume periodically.",
|
||||
"requiresRepublish": "requiresRepublish indicates the CSI driver wants `NodePublishVolume` being periodically called to reflect any possible change in the mounted volume. This field defaults to false.\n\nNote: After a successful initial NodePublishVolume call, subsequent calls to NodePublishVolume should only update the contents of the volume. New mount points will not be seen by a running container.",
|
||||
"seLinuxMount": "seLinuxMount specifies if the CSI driver supports \"-o context\" mount option.\n\nWhen \"true\", the CSI driver must ensure that all volumes provided by this CSI driver can be mounted separately with different `-o context` options. This is typical for storage backends that provide volumes as filesystems on block devices or as independent shared volumes. Kubernetes will call NodeStage / NodePublish with \"-o context=xyz\" mount option when mounting a ReadWriteOncePod volume used in Pod that has explicitly set SELinux context. In the future, it may be expanded to other volume AccessModes. In any case, Kubernetes will ensure that the volume is mounted only with a single SELinux context.\n\nWhen \"false\", Kubernetes won't pass any special SELinux mount options to the driver. This is typical for volumes that represent subdirectories of a bigger shared filesystem.\n\nDefault is \"false\".",
|
||||
|
||||
2
vendor/k8s.io/api/storage/v1alpha1/generated.proto
generated
vendored
2
vendor/k8s.io/api/storage/v1alpha1/generated.proto
generated
vendored
@@ -119,8 +119,6 @@ message CSIStorageCapacityList {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSIStorageCapacity items = 2;
|
||||
}
|
||||
|
||||
|
||||
2
vendor/k8s.io/api/storage/v1alpha1/types.go
generated
vendored
2
vendor/k8s.io/api/storage/v1alpha1/types.go
generated
vendored
@@ -247,8 +247,6 @@ type CSIStorageCapacityList struct {
|
||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Items []CSIStorageCapacity `json:"items" protobuf:"bytes,2,rep,name=items"`
|
||||
}
|
||||
|
||||
|
||||
7
vendor/k8s.io/api/storage/v1beta1/generated.proto
generated
vendored
7
vendor/k8s.io/api/storage/v1beta1/generated.proto
generated
vendored
@@ -127,6 +127,7 @@ message CSIDriverSpec {
|
||||
// This field is immutable.
|
||||
//
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string volumeLifecycleModes = 3;
|
||||
|
||||
// storageCapacity indicates that the CSI volume driver wants pod scheduling to consider the storage
|
||||
@@ -263,6 +264,7 @@ message CSINodeDriver {
|
||||
// It is possible for different nodes to use different topology keys.
|
||||
// This can be empty if driver does not support topology.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string topologyKeys = 3;
|
||||
|
||||
// allocatable represents the volume resources of a node that are available for scheduling.
|
||||
@@ -287,6 +289,8 @@ message CSINodeSpec {
|
||||
// If all drivers in the list are uninstalled, this can become empty.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSINodeDriver drivers = 1;
|
||||
}
|
||||
|
||||
@@ -379,8 +383,6 @@ message CSIStorageCapacityList {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
repeated CSIStorageCapacity items = 2;
|
||||
}
|
||||
|
||||
@@ -412,6 +414,7 @@ message StorageClass {
|
||||
// e.g. ["ro", "soft"]. Not validated -
|
||||
// mount of the PVs will simply fail if one is invalid.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string mountOptions = 5;
|
||||
|
||||
// allowVolumeExpansion shows whether the storage class allow volume expand
|
||||
|
||||
7
vendor/k8s.io/api/storage/v1beta1/types.go
generated
vendored
7
vendor/k8s.io/api/storage/v1beta1/types.go
generated
vendored
@@ -59,6 +59,7 @@ type StorageClass struct {
|
||||
// e.g. ["ro", "soft"]. Not validated -
|
||||
// mount of the PVs will simply fail if one is invalid.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
MountOptions []string `json:"mountOptions,omitempty" protobuf:"bytes,5,opt,name=mountOptions"`
|
||||
|
||||
// allowVolumeExpansion shows whether the storage class allow volume expand
|
||||
@@ -347,6 +348,7 @@ type CSIDriverSpec struct {
|
||||
// This field is immutable.
|
||||
//
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
VolumeLifecycleModes []VolumeLifecycleMode `json:"volumeLifecycleModes,omitempty" protobuf:"bytes,3,opt,name=volumeLifecycleModes"`
|
||||
|
||||
// storageCapacity indicates that the CSI volume driver wants pod scheduling to consider the storage
|
||||
@@ -535,6 +537,8 @@ type CSINodeSpec struct {
|
||||
// If all drivers in the list are uninstalled, this can become empty.
|
||||
// +patchMergeKey=name
|
||||
// +patchStrategy=merge
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Drivers []CSINodeDriver `json:"drivers" patchStrategy:"merge" patchMergeKey:"name" protobuf:"bytes,1,rep,name=drivers"`
|
||||
}
|
||||
|
||||
@@ -567,6 +571,7 @@ type CSINodeDriver struct {
|
||||
// It is possible for different nodes to use different topology keys.
|
||||
// This can be empty if driver does not support topology.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TopologyKeys []string `json:"topologyKeys" protobuf:"bytes,3,rep,name=topologyKeys"`
|
||||
|
||||
// allocatable represents the volume resources of a node that are available for scheduling.
|
||||
@@ -707,7 +712,5 @@ type CSIStorageCapacityList struct {
|
||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// items is the list of CSIStorageCapacity objects.
|
||||
// +listType=map
|
||||
// +listMapKey=name
|
||||
Items []CSIStorageCapacity `json:"items" protobuf:"bytes,2,rep,name=items"`
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user