1
0
mirror of https://github.com/rancher/types.git synced 2025-09-18 16:10:58 +00:00

Regenerate code for k8s 1.14

This commit is contained in:
Darren Shepherd
2019-08-19 10:34:39 -07:00
parent 6c963ac005
commit c2052ff483
33 changed files with 127 additions and 17 deletions

View File

@@ -0,0 +1,10 @@
package client
const (
AllowedCSIDriverType = "allowedCSIDriver"
AllowedCSIDriverFieldName = "name"
)
type AllowedCSIDriver struct {
Name string `json:"name,omitempty" yaml:"name,omitempty"`
}

View File

@@ -3,6 +3,7 @@ package client
const (
PodSecurityPolicySpecType = "podSecurityPolicySpec"
PodSecurityPolicySpecFieldAllowPrivilegeEscalation = "allowPrivilegeEscalation"
PodSecurityPolicySpecFieldAllowedCSIDrivers = "allowedCSIDrivers"
PodSecurityPolicySpecFieldAllowedCapabilities = "allowedCapabilities"
PodSecurityPolicySpecFieldAllowedFlexVolumes = "allowedFlexVolumes"
PodSecurityPolicySpecFieldAllowedHostPaths = "allowedHostPaths"
@@ -19,6 +20,7 @@ const (
PodSecurityPolicySpecFieldPrivileged = "privileged"
PodSecurityPolicySpecFieldReadOnlyRootFilesystem = "readOnlyRootFilesystem"
PodSecurityPolicySpecFieldRequiredDropCapabilities = "requiredDropCapabilities"
PodSecurityPolicySpecFieldRunAsGroup = "runAsGroup"
PodSecurityPolicySpecFieldRunAsUser = "runAsUser"
PodSecurityPolicySpecFieldSELinux = "seLinux"
PodSecurityPolicySpecFieldSupplementalGroups = "supplementalGroups"
@@ -27,6 +29,7 @@ const (
type PodSecurityPolicySpec struct {
AllowPrivilegeEscalation *bool `json:"allowPrivilegeEscalation,omitempty" yaml:"allowPrivilegeEscalation,omitempty"`
AllowedCSIDrivers []AllowedCSIDriver `json:"allowedCSIDrivers,omitempty" yaml:"allowedCSIDrivers,omitempty"`
AllowedCapabilities []string `json:"allowedCapabilities,omitempty" yaml:"allowedCapabilities,omitempty"`
AllowedFlexVolumes []AllowedFlexVolume `json:"allowedFlexVolumes,omitempty" yaml:"allowedFlexVolumes,omitempty"`
AllowedHostPaths []AllowedHostPath `json:"allowedHostPaths,omitempty" yaml:"allowedHostPaths,omitempty"`
@@ -43,6 +46,7 @@ type PodSecurityPolicySpec struct {
Privileged bool `json:"privileged,omitempty" yaml:"privileged,omitempty"`
ReadOnlyRootFilesystem bool `json:"readOnlyRootFilesystem,omitempty" yaml:"readOnlyRootFilesystem,omitempty"`
RequiredDropCapabilities []string `json:"requiredDropCapabilities,omitempty" yaml:"requiredDropCapabilities,omitempty"`
RunAsGroup *RunAsGroupStrategyOptions `json:"runAsGroup,omitempty" yaml:"runAsGroup,omitempty"`
RunAsUser *RunAsUserStrategyOptions `json:"runAsUser,omitempty" yaml:"runAsUser,omitempty"`
SELinux *SELinuxStrategyOptions `json:"seLinux,omitempty" yaml:"seLinux,omitempty"`
SupplementalGroups *SupplementalGroupsStrategyOptions `json:"supplementalGroups,omitempty" yaml:"supplementalGroups,omitempty"`

View File

@@ -7,6 +7,7 @@ import (
const (
PodSecurityPolicyTemplateType = "podSecurityPolicyTemplate"
PodSecurityPolicyTemplateFieldAllowPrivilegeEscalation = "allowPrivilegeEscalation"
PodSecurityPolicyTemplateFieldAllowedCSIDrivers = "allowedCSIDrivers"
PodSecurityPolicyTemplateFieldAllowedCapabilities = "allowedCapabilities"
PodSecurityPolicyTemplateFieldAllowedFlexVolumes = "allowedFlexVolumes"
PodSecurityPolicyTemplateFieldAllowedHostPaths = "allowedHostPaths"
@@ -31,6 +32,7 @@ const (
PodSecurityPolicyTemplateFieldReadOnlyRootFilesystem = "readOnlyRootFilesystem"
PodSecurityPolicyTemplateFieldRemoved = "removed"
PodSecurityPolicyTemplateFieldRequiredDropCapabilities = "requiredDropCapabilities"
PodSecurityPolicyTemplateFieldRunAsGroup = "runAsGroup"
PodSecurityPolicyTemplateFieldRunAsUser = "runAsUser"
PodSecurityPolicyTemplateFieldSELinux = "seLinux"
PodSecurityPolicyTemplateFieldSupplementalGroups = "supplementalGroups"
@@ -41,6 +43,7 @@ const (
type PodSecurityPolicyTemplate struct {
types.Resource
AllowPrivilegeEscalation *bool `json:"allowPrivilegeEscalation,omitempty" yaml:"allowPrivilegeEscalation,omitempty"`
AllowedCSIDrivers []AllowedCSIDriver `json:"allowedCSIDrivers,omitempty" yaml:"allowedCSIDrivers,omitempty"`
AllowedCapabilities []string `json:"allowedCapabilities,omitempty" yaml:"allowedCapabilities,omitempty"`
AllowedFlexVolumes []AllowedFlexVolume `json:"allowedFlexVolumes,omitempty" yaml:"allowedFlexVolumes,omitempty"`
AllowedHostPaths []AllowedHostPath `json:"allowedHostPaths,omitempty" yaml:"allowedHostPaths,omitempty"`
@@ -65,6 +68,7 @@ type PodSecurityPolicyTemplate struct {
ReadOnlyRootFilesystem bool `json:"readOnlyRootFilesystem,omitempty" yaml:"readOnlyRootFilesystem,omitempty"`
Removed string `json:"removed,omitempty" yaml:"removed,omitempty"`
RequiredDropCapabilities []string `json:"requiredDropCapabilities,omitempty" yaml:"requiredDropCapabilities,omitempty"`
RunAsGroup *RunAsGroupStrategyOptions `json:"runAsGroup,omitempty" yaml:"runAsGroup,omitempty"`
RunAsUser *RunAsUserStrategyOptions `json:"runAsUser,omitempty" yaml:"runAsUser,omitempty"`
SELinux *SELinuxStrategyOptions `json:"seLinux,omitempty" yaml:"seLinux,omitempty"`
SupplementalGroups *SupplementalGroupsStrategyOptions `json:"supplementalGroups,omitempty" yaml:"supplementalGroups,omitempty"`

View File

@@ -0,0 +1,12 @@
package client
const (
RunAsGroupStrategyOptionsType = "runAsGroupStrategyOptions"
RunAsGroupStrategyOptionsFieldRanges = "ranges"
RunAsGroupStrategyOptionsFieldRule = "rule"
)
type RunAsGroupStrategyOptions struct {
Ranges []IDRange `json:"ranges,omitempty" yaml:"ranges,omitempty"`
Rule string `json:"rule,omitempty" yaml:"rule,omitempty"`
}