|
6690 | 6690 | "$ref": "#/definitions/io.k8s.api.core.v1.ContainerState",
|
6691 | 6691 | "description": "State holds details about the container's current condition."
|
6692 | 6692 | },
|
| 6693 | + "user": { |
| 6694 | + "$ref": "#/definitions/io.k8s.api.core.v1.ContainerUser", |
| 6695 | + "description": "User represents user identity information initially attached to the first process of the container" |
| 6696 | + }, |
6693 | 6697 | "volumeMounts": {
|
6694 | 6698 | "description": "Status of volume mounts.",
|
6695 | 6699 | "items": {
|
|
6713 | 6717 | ],
|
6714 | 6718 | "type": "object"
|
6715 | 6719 | },
|
| 6720 | + "io.k8s.api.core.v1.ContainerUser": { |
| 6721 | + "description": "ContainerUser represents user identity information", |
| 6722 | + "properties": { |
| 6723 | + "linux": { |
| 6724 | + "$ref": "#/definitions/io.k8s.api.core.v1.LinuxContainerUser", |
| 6725 | + "description": "Linux holds user identity information initially attached to the first process of the containers in Linux. Note that the actual running identity can be changed if the process has enough privilege to do so." |
| 6726 | + } |
| 6727 | + }, |
| 6728 | + "type": "object" |
| 6729 | + }, |
6716 | 6730 | "io.k8s.api.core.v1.DaemonEndpoint": {
|
6717 | 6731 | "description": "DaemonEndpoint contains information about a single Daemon endpoint.",
|
6718 | 6732 | "properties": {
|
|
7998 | 8012 | ],
|
7999 | 8013 | "type": "object"
|
8000 | 8014 | },
|
| 8015 | + "io.k8s.api.core.v1.LinuxContainerUser": { |
| 8016 | + "description": "LinuxContainerUser represents user identity information in Linux containers", |
| 8017 | + "properties": { |
| 8018 | + "gid": { |
| 8019 | + "description": "GID is the primary gid initially attached to the first process in the container", |
| 8020 | + "format": "int64", |
| 8021 | + "type": "integer" |
| 8022 | + }, |
| 8023 | + "supplementalGroups": { |
| 8024 | + "description": "SupplementalGroups are the supplemental groups initially attached to the first process in the container", |
| 8025 | + "items": { |
| 8026 | + "format": "int64", |
| 8027 | + "type": "integer" |
| 8028 | + }, |
| 8029 | + "type": "array", |
| 8030 | + "x-kubernetes-list-type": "atomic" |
| 8031 | + }, |
| 8032 | + "uid": { |
| 8033 | + "description": "UID is the primary uid initially attached to the first process in the container", |
| 8034 | + "format": "int64", |
| 8035 | + "type": "integer" |
| 8036 | + } |
| 8037 | + }, |
| 8038 | + "required": [ |
| 8039 | + "uid", |
| 8040 | + "gid" |
| 8041 | + ], |
| 8042 | + "type": "object" |
| 8043 | + }, |
8001 | 8044 | "io.k8s.api.core.v1.LoadBalancerIngress": {
|
8002 | 8045 | "description": "LoadBalancerIngress represents the status of a load-balancer ingress point: traffic intended for the service should be sent to an ingress point.",
|
8003 | 8046 | "properties": {
|
|
9632 | 9675 | "description": "The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows."
|
9633 | 9676 | },
|
9634 | 9677 | "supplementalGroups": {
|
9635 |
| - "description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows.", |
| 9678 | + "description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID and fsGroup (if specified). If the SupplementalGroupsPolicy feature is enabled, the supplementalGroupsPolicy field determines whether these are in addition to or instead of any group memberships defined in the container image. If unspecified, no additional groups are added, though group memberships defined in the container image may still be used, depending on the supplementalGroupsPolicy field. Note that this field cannot be set when spec.os.name is windows.", |
9636 | 9679 | "items": {
|
9637 | 9680 | "format": "int64",
|
9638 | 9681 | "type": "integer"
|
9639 | 9682 | },
|
9640 | 9683 | "type": "array",
|
9641 | 9684 | "x-kubernetes-list-type": "atomic"
|
9642 | 9685 | },
|
| 9686 | + "supplementalGroupsPolicy": { |
| 9687 | + "description": "Defines how supplemental groups of the first container processes are calculated. Valid values are \"Merge\" and \"Strict\". If not specified, \"Merge\" is used. (Alpha) Using the field requires the SupplementalGroupsPolicy feature gate to be enabled and the container runtime must implement support for this feature. Note that this field cannot be set when spec.os.name is windows.", |
| 9688 | + "type": "string" |
| 9689 | + }, |
9643 | 9690 | "sysctls": {
|
9644 | 9691 | "description": "Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows.",
|
9645 | 9692 | "items": {
|
|
9782 | 9829 | },
|
9783 | 9830 | "os": {
|
9784 | 9831 | "$ref": "#/definitions/io.k8s.api.core.v1.PodOS",
|
9785 |
| - "description": "Specifies the OS of the containers in the pod. Some pod and container fields are restricted if this is set.\n\nIf the OS field is set to linux, the following fields must be unset: -securityContext.windowsOptions\n\nIf the OS field is set to windows, following fields must be unset: - spec.hostPID - spec.hostIPC - spec.hostUsers - spec.securityContext.appArmorProfile - spec.securityContext.seLinuxOptions - spec.securityContext.seccompProfile - spec.securityContext.fsGroup - spec.securityContext.fsGroupChangePolicy - spec.securityContext.sysctls - spec.shareProcessNamespace - spec.securityContext.runAsUser - spec.securityContext.runAsGroup - spec.securityContext.supplementalGroups - spec.containers[*].securityContext.appArmorProfile - spec.containers[*].securityContext.seLinuxOptions - spec.containers[*].securityContext.seccompProfile - spec.containers[*].securityContext.capabilities - spec.containers[*].securityContext.readOnlyRootFilesystem - spec.containers[*].securityContext.privileged - spec.containers[*].securityContext.allowPrivilegeEscalation - spec.containers[*].securityContext.procMount - spec.containers[*].securityContext.runAsUser - spec.containers[*].securityContext.runAsGroup" |
| 9832 | + "description": "Specifies the OS of the containers in the pod. Some pod and container fields are restricted if this is set.\n\nIf the OS field is set to linux, the following fields must be unset: -securityContext.windowsOptions\n\nIf the OS field is set to windows, following fields must be unset: - spec.hostPID - spec.hostIPC - spec.hostUsers - spec.securityContext.appArmorProfile - spec.securityContext.seLinuxOptions - spec.securityContext.seccompProfile - spec.securityContext.fsGroup - spec.securityContext.fsGroupChangePolicy - spec.securityContext.sysctls - spec.shareProcessNamespace - spec.securityContext.runAsUser - spec.securityContext.runAsGroup - spec.securityContext.supplementalGroups - spec.securityContext.supplementalGroupsPolicy - spec.containers[*].securityContext.appArmorProfile - spec.containers[*].securityContext.seLinuxOptions - spec.containers[*].securityContext.seccompProfile - spec.containers[*].securityContext.capabilities - spec.containers[*].securityContext.readOnlyRootFilesystem - spec.containers[*].securityContext.privileged - spec.containers[*].securityContext.allowPrivilegeEscalation - spec.containers[*].securityContext.procMount - spec.containers[*].securityContext.runAsUser - spec.containers[*].securityContext.runAsGroup" |
9786 | 9833 | },
|
9787 | 9834 | "overhead": {
|
9788 | 9835 | "additionalProperties": {
|
|
0 commit comments