mirror of
https://github.com/rancher/types.git
synced 2025-09-18 16:10:58 +00:00
Regenerate code for k8s 1.14
This commit is contained in:
10
client/management/v3/zz_generated_allowed_csidriver.go
Normal file
10
client/management/v3/zz_generated_allowed_csidriver.go
Normal file
@@ -0,0 +1,10 @@
|
||||
package client
|
||||
|
||||
const (
|
||||
AllowedCSIDriverType = "allowedCSIDriver"
|
||||
AllowedCSIDriverFieldName = "name"
|
||||
)
|
||||
|
||||
type AllowedCSIDriver struct {
|
||||
Name string `json:"name,omitempty" yaml:"name,omitempty"`
|
||||
}
|
@@ -3,6 +3,7 @@ package client
|
||||
const (
|
||||
PodSecurityPolicySpecType = "podSecurityPolicySpec"
|
||||
PodSecurityPolicySpecFieldAllowPrivilegeEscalation = "allowPrivilegeEscalation"
|
||||
PodSecurityPolicySpecFieldAllowedCSIDrivers = "allowedCSIDrivers"
|
||||
PodSecurityPolicySpecFieldAllowedCapabilities = "allowedCapabilities"
|
||||
PodSecurityPolicySpecFieldAllowedFlexVolumes = "allowedFlexVolumes"
|
||||
PodSecurityPolicySpecFieldAllowedHostPaths = "allowedHostPaths"
|
||||
@@ -19,6 +20,7 @@ const (
|
||||
PodSecurityPolicySpecFieldPrivileged = "privileged"
|
||||
PodSecurityPolicySpecFieldReadOnlyRootFilesystem = "readOnlyRootFilesystem"
|
||||
PodSecurityPolicySpecFieldRequiredDropCapabilities = "requiredDropCapabilities"
|
||||
PodSecurityPolicySpecFieldRunAsGroup = "runAsGroup"
|
||||
PodSecurityPolicySpecFieldRunAsUser = "runAsUser"
|
||||
PodSecurityPolicySpecFieldSELinux = "seLinux"
|
||||
PodSecurityPolicySpecFieldSupplementalGroups = "supplementalGroups"
|
||||
@@ -27,6 +29,7 @@ const (
|
||||
|
||||
type PodSecurityPolicySpec struct {
|
||||
AllowPrivilegeEscalation *bool `json:"allowPrivilegeEscalation,omitempty" yaml:"allowPrivilegeEscalation,omitempty"`
|
||||
AllowedCSIDrivers []AllowedCSIDriver `json:"allowedCSIDrivers,omitempty" yaml:"allowedCSIDrivers,omitempty"`
|
||||
AllowedCapabilities []string `json:"allowedCapabilities,omitempty" yaml:"allowedCapabilities,omitempty"`
|
||||
AllowedFlexVolumes []AllowedFlexVolume `json:"allowedFlexVolumes,omitempty" yaml:"allowedFlexVolumes,omitempty"`
|
||||
AllowedHostPaths []AllowedHostPath `json:"allowedHostPaths,omitempty" yaml:"allowedHostPaths,omitempty"`
|
||||
@@ -43,6 +46,7 @@ type PodSecurityPolicySpec struct {
|
||||
Privileged bool `json:"privileged,omitempty" yaml:"privileged,omitempty"`
|
||||
ReadOnlyRootFilesystem bool `json:"readOnlyRootFilesystem,omitempty" yaml:"readOnlyRootFilesystem,omitempty"`
|
||||
RequiredDropCapabilities []string `json:"requiredDropCapabilities,omitempty" yaml:"requiredDropCapabilities,omitempty"`
|
||||
RunAsGroup *RunAsGroupStrategyOptions `json:"runAsGroup,omitempty" yaml:"runAsGroup,omitempty"`
|
||||
RunAsUser *RunAsUserStrategyOptions `json:"runAsUser,omitempty" yaml:"runAsUser,omitempty"`
|
||||
SELinux *SELinuxStrategyOptions `json:"seLinux,omitempty" yaml:"seLinux,omitempty"`
|
||||
SupplementalGroups *SupplementalGroupsStrategyOptions `json:"supplementalGroups,omitempty" yaml:"supplementalGroups,omitempty"`
|
||||
|
@@ -7,6 +7,7 @@ import (
|
||||
const (
|
||||
PodSecurityPolicyTemplateType = "podSecurityPolicyTemplate"
|
||||
PodSecurityPolicyTemplateFieldAllowPrivilegeEscalation = "allowPrivilegeEscalation"
|
||||
PodSecurityPolicyTemplateFieldAllowedCSIDrivers = "allowedCSIDrivers"
|
||||
PodSecurityPolicyTemplateFieldAllowedCapabilities = "allowedCapabilities"
|
||||
PodSecurityPolicyTemplateFieldAllowedFlexVolumes = "allowedFlexVolumes"
|
||||
PodSecurityPolicyTemplateFieldAllowedHostPaths = "allowedHostPaths"
|
||||
@@ -31,6 +32,7 @@ const (
|
||||
PodSecurityPolicyTemplateFieldReadOnlyRootFilesystem = "readOnlyRootFilesystem"
|
||||
PodSecurityPolicyTemplateFieldRemoved = "removed"
|
||||
PodSecurityPolicyTemplateFieldRequiredDropCapabilities = "requiredDropCapabilities"
|
||||
PodSecurityPolicyTemplateFieldRunAsGroup = "runAsGroup"
|
||||
PodSecurityPolicyTemplateFieldRunAsUser = "runAsUser"
|
||||
PodSecurityPolicyTemplateFieldSELinux = "seLinux"
|
||||
PodSecurityPolicyTemplateFieldSupplementalGroups = "supplementalGroups"
|
||||
@@ -41,6 +43,7 @@ const (
|
||||
type PodSecurityPolicyTemplate struct {
|
||||
types.Resource
|
||||
AllowPrivilegeEscalation *bool `json:"allowPrivilegeEscalation,omitempty" yaml:"allowPrivilegeEscalation,omitempty"`
|
||||
AllowedCSIDrivers []AllowedCSIDriver `json:"allowedCSIDrivers,omitempty" yaml:"allowedCSIDrivers,omitempty"`
|
||||
AllowedCapabilities []string `json:"allowedCapabilities,omitempty" yaml:"allowedCapabilities,omitempty"`
|
||||
AllowedFlexVolumes []AllowedFlexVolume `json:"allowedFlexVolumes,omitempty" yaml:"allowedFlexVolumes,omitempty"`
|
||||
AllowedHostPaths []AllowedHostPath `json:"allowedHostPaths,omitempty" yaml:"allowedHostPaths,omitempty"`
|
||||
@@ -65,6 +68,7 @@ type PodSecurityPolicyTemplate struct {
|
||||
ReadOnlyRootFilesystem bool `json:"readOnlyRootFilesystem,omitempty" yaml:"readOnlyRootFilesystem,omitempty"`
|
||||
Removed string `json:"removed,omitempty" yaml:"removed,omitempty"`
|
||||
RequiredDropCapabilities []string `json:"requiredDropCapabilities,omitempty" yaml:"requiredDropCapabilities,omitempty"`
|
||||
RunAsGroup *RunAsGroupStrategyOptions `json:"runAsGroup,omitempty" yaml:"runAsGroup,omitempty"`
|
||||
RunAsUser *RunAsUserStrategyOptions `json:"runAsUser,omitempty" yaml:"runAsUser,omitempty"`
|
||||
SELinux *SELinuxStrategyOptions `json:"seLinux,omitempty" yaml:"seLinux,omitempty"`
|
||||
SupplementalGroups *SupplementalGroupsStrategyOptions `json:"supplementalGroups,omitempty" yaml:"supplementalGroups,omitempty"`
|
||||
|
@@ -0,0 +1,12 @@
|
||||
package client
|
||||
|
||||
const (
|
||||
RunAsGroupStrategyOptionsType = "runAsGroupStrategyOptions"
|
||||
RunAsGroupStrategyOptionsFieldRanges = "ranges"
|
||||
RunAsGroupStrategyOptionsFieldRule = "rule"
|
||||
)
|
||||
|
||||
type RunAsGroupStrategyOptions struct {
|
||||
Ranges []IDRange `json:"ranges,omitempty" yaml:"ranges,omitempty"`
|
||||
Rule string `json:"rule,omitempty" yaml:"rule,omitempty"`
|
||||
}
|
Reference in New Issue
Block a user