mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-22 03:11:40 +00:00
Update swagger 1.2 spec
This commit is contained in:
parent
70c4fe7f4f
commit
9fe19d1074
@ -5320,7 +5320,8 @@
|
||||
"description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -5379,10 +5380,6 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixUserID": {
|
||||
"id": "types.UnixUserID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.PodSecurityContext": {
|
||||
"id": "v1.PodSecurityContext",
|
||||
"description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.",
|
||||
@ -5392,7 +5389,8 @@
|
||||
"description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -5402,20 +5400,17 @@
|
||||
"supplementalGroups": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "types.UnixGroupID"
|
||||
"type": "integer"
|
||||
},
|
||||
"description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container."
|
||||
},
|
||||
"fsGroup": {
|
||||
"$ref": "types.UnixGroupID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw "
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixGroupID": {
|
||||
"id": "types.UnixGroupID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.Affinity": {
|
||||
"id": "v1.Affinity",
|
||||
"description": "Affinity is a group of affinity scheduling rules.",
|
||||
|
@ -3067,7 +3067,8 @@
|
||||
"description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -3126,10 +3127,6 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixUserID": {
|
||||
"id": "types.UnixUserID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.PodSecurityContext": {
|
||||
"id": "v1.PodSecurityContext",
|
||||
"description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.",
|
||||
@ -3139,7 +3136,8 @@
|
||||
"description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -3149,20 +3147,17 @@
|
||||
"supplementalGroups": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "types.UnixGroupID"
|
||||
"type": "integer"
|
||||
},
|
||||
"description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container."
|
||||
},
|
||||
"fsGroup": {
|
||||
"$ref": "types.UnixGroupID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw "
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixGroupID": {
|
||||
"id": "types.UnixGroupID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.Affinity": {
|
||||
"id": "v1.Affinity",
|
||||
"description": "Affinity is a group of affinity scheduling rules.",
|
||||
|
@ -4148,7 +4148,8 @@
|
||||
"description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -4207,10 +4208,6 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixUserID": {
|
||||
"id": "types.UnixUserID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.PodSecurityContext": {
|
||||
"id": "v1.PodSecurityContext",
|
||||
"description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.",
|
||||
@ -4220,7 +4217,8 @@
|
||||
"description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -4230,20 +4228,17 @@
|
||||
"supplementalGroups": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "types.UnixGroupID"
|
||||
"type": "integer"
|
||||
},
|
||||
"description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container."
|
||||
},
|
||||
"fsGroup": {
|
||||
"$ref": "types.UnixGroupID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw "
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixGroupID": {
|
||||
"id": "types.UnixGroupID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.Affinity": {
|
||||
"id": "v1.Affinity",
|
||||
"description": "Affinity is a group of affinity scheduling rules.",
|
||||
|
@ -8792,7 +8792,8 @@
|
||||
"description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -8851,10 +8852,6 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixUserID": {
|
||||
"id": "types.UnixUserID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.PodSecurityContext": {
|
||||
"id": "v1.PodSecurityContext",
|
||||
"description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.",
|
||||
@ -8864,7 +8861,8 @@
|
||||
"description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -8874,20 +8872,17 @@
|
||||
"supplementalGroups": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "types.UnixGroupID"
|
||||
"type": "integer"
|
||||
},
|
||||
"description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container."
|
||||
},
|
||||
"fsGroup": {
|
||||
"$ref": "types.UnixGroupID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw "
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixGroupID": {
|
||||
"id": "types.UnixGroupID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.Affinity": {
|
||||
"id": "v1.Affinity",
|
||||
"description": "Affinity is a group of affinity scheduling rules.",
|
||||
|
@ -20623,7 +20623,8 @@
|
||||
"description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -20682,10 +20683,6 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixUserID": {
|
||||
"id": "types.UnixUserID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.PodSecurityContext": {
|
||||
"id": "v1.PodSecurityContext",
|
||||
"description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.",
|
||||
@ -20695,7 +20692,8 @@
|
||||
"description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsUser": {
|
||||
"$ref": "types.UnixUserID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
@ -20705,20 +20703,17 @@
|
||||
"supplementalGroups": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "types.UnixGroupID"
|
||||
"type": "integer"
|
||||
},
|
||||
"description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container."
|
||||
},
|
||||
"fsGroup": {
|
||||
"$ref": "types.UnixGroupID",
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw "
|
||||
}
|
||||
}
|
||||
},
|
||||
"types.UnixGroupID": {
|
||||
"id": "types.UnixGroupID",
|
||||
"properties": {}
|
||||
},
|
||||
"v1.Affinity": {
|
||||
"id": "v1.Affinity",
|
||||
"description": "Affinity is a group of affinity scheduling rules.",
|
||||
|
Loading…
Reference in New Issue
Block a user