mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-22 11:21:47 +00:00
Merge pull request #69694 from jessfraz/69647
add default for ProcMountType
This commit is contained in:
commit
74d0ef2291
3
api/swagger-spec/apps_v1.json
generated
3
api/swagger-spec/apps_v1.json
generated
@ -8657,9 +8657,6 @@
|
||||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
3
api/swagger-spec/apps_v1beta1.json
generated
3
api/swagger-spec/apps_v1beta1.json
generated
@ -6169,9 +6169,6 @@
|
||||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
3
api/swagger-spec/apps_v1beta2.json
generated
3
api/swagger-spec/apps_v1beta2.json
generated
@ -8657,9 +8657,6 @@
|
||||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
3
api/swagger-spec/batch_v1.json
generated
3
api/swagger-spec/batch_v1.json
generated
@ -3353,9 +3353,6 @@
|
||||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
3
api/swagger-spec/batch_v1beta1.json
generated
3
api/swagger-spec/batch_v1beta1.json
generated
@ -3408,9 +3408,6 @@
|
||||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
3
api/swagger-spec/batch_v2alpha1.json
generated
3
api/swagger-spec/batch_v2alpha1.json
generated
@ -3408,9 +3408,6 @@
|
||||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
3
api/swagger-spec/extensions_v1beta1.json
generated
3
api/swagger-spec/extensions_v1beta1.json
generated
@ -9353,9 +9353,6 @@
|
||||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
3
api/swagger-spec/v1.json
generated
3
api/swagger-spec/v1.json
generated
@ -22533,9 +22533,6 @@
|
||||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
2
docs/api-reference/apps/v1/definitions.html
generated
2
docs/api-reference/apps/v1/definitions.html
generated
@ -6757,7 +6757,7 @@ Examples:<br>
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
2
docs/api-reference/apps/v1beta1/definitions.html
generated
2
docs/api-reference/apps/v1beta1/definitions.html
generated
@ -6617,7 +6617,7 @@ Examples:<br>
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
2
docs/api-reference/apps/v1beta2/definitions.html
generated
2
docs/api-reference/apps/v1beta2/definitions.html
generated
@ -6896,7 +6896,7 @@ Examples:<br>
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
2
docs/api-reference/batch/v1/definitions.html
generated
2
docs/api-reference/batch/v1/definitions.html
generated
@ -5388,7 +5388,7 @@ Examples:<br>
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
@ -5525,7 +5525,7 @@ Examples:<br>
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
@ -5326,7 +5326,7 @@ Examples:<br>
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
@ -7583,7 +7583,7 @@ If PodSelector is also set, then the NetworkPolicyPeer as a whole selects the Po
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
2
docs/api-reference/v1/definitions.html
generated
2
docs/api-reference/v1/definitions.html
generated
@ -5083,7 +5083,7 @@ Examples:<br>
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
@ -5219,7 +5219,7 @@ type SecurityContext struct {
|
||||
// readonly paths and masked paths.
|
||||
// This requires the ProcMountType feature flag to be enabled.
|
||||
// +optional
|
||||
ProcMount *ProcMountType `json:"procMount,omitEmpty" protobuf:"bytes,9,opt,name=procMount"`
|
||||
ProcMount *ProcMountType `json:"procMount,omitempty" protobuf:"bytes,9,opt,name=procMount"`
|
||||
}
|
||||
|
||||
type ProcMountType string
|
||||
|
Loading…
Reference in New Issue
Block a user