mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-13 18:43:34 +00:00
vendor update for CSI 0.3.0
This commit is contained in:
105
vendor/k8s.io/kubernetes/api/swagger-spec/batch_v2alpha1.json
generated
vendored
105
vendor/k8s.io/kubernetes/api/swagger-spec/batch_v2alpha1.json
generated
vendored
@ -1772,6 +1772,13 @@
|
||||
"dnsConfig": {
|
||||
"$ref": "v1.PodDNSConfig",
|
||||
"description": "Specifies the DNS parameters of a pod. Parameters specified here will be merged to the generated DNS configuration based on DNSPolicy."
|
||||
},
|
||||
"readinessGates": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "v1.PodReadinessGate"
|
||||
},
|
||||
"description": "If specified, all readiness gates will be evaluated for pod readiness. A pod is ready when all its containers are ready AND all conditions specified in the readiness gates have status equal to \"True\" More info: https://github.com/kubernetes/community/blob/master/keps/sig-network/0007-pod-ready%2B%2B.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
@ -1804,7 +1811,7 @@
|
||||
},
|
||||
"gitRepo": {
|
||||
"$ref": "v1.GitRepoVolumeSource",
|
||||
"description": "GitRepo represents a git repository at a particular revision."
|
||||
"description": "GitRepo represents a git repository at a particular revision. DEPRECATED: GitRepo is deprecated. To provision a container with a git repo, mount an EmptyDir into an InitContainer that clones the repo using git, then mount the EmptyDir into the Pod's container."
|
||||
},
|
||||
"secret": {
|
||||
"$ref": "v1.SecretVolumeSource",
|
||||
@ -1985,7 +1992,7 @@
|
||||
},
|
||||
"v1.GitRepoVolumeSource": {
|
||||
"id": "v1.GitRepoVolumeSource",
|
||||
"description": "Represents a volume that is populated with the contents of a git repository. Git repo volumes do not support ownership management. Git repo volumes support SELinux relabeling.",
|
||||
"description": "Represents a volume that is populated with the contents of a git repository. Git repo volumes do not support ownership management. Git repo volumes support SELinux relabeling.\n\nDEPRECATED: GitRepo is deprecated. To provision a container with a git repo, mount an EmptyDir into an InitContainer that clones the repo using git, then mount the EmptyDir into the Pod's container.",
|
||||
"required": [
|
||||
"repository"
|
||||
],
|
||||
@ -2275,6 +2282,10 @@
|
||||
"readOnly": {
|
||||
"type": "boolean",
|
||||
"description": "Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts. More info: https://releases.k8s.io/HEAD/examples/mysql-cinder-pd/README.md"
|
||||
},
|
||||
"secretRef": {
|
||||
"$ref": "v1.LocalObjectReference",
|
||||
"description": "Optional: points to a secret object containing parameters used to connect to OpenStack."
|
||||
}
|
||||
}
|
||||
},
|
||||
@ -2641,6 +2652,10 @@
|
||||
"configMap": {
|
||||
"$ref": "v1.ConfigMapProjection",
|
||||
"description": "information about the configMap data to project"
|
||||
},
|
||||
"serviceAccountToken": {
|
||||
"$ref": "v1.ServiceAccountTokenProjection",
|
||||
"description": "information about the serviceAccountToken data to project"
|
||||
}
|
||||
}
|
||||
},
|
||||
@ -2699,6 +2714,28 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"v1.ServiceAccountTokenProjection": {
|
||||
"id": "v1.ServiceAccountTokenProjection",
|
||||
"description": "ServiceAccountTokenProjection represents a projected service account token volume. This projection can be used to insert a service account token into the pods runtime filesystem for use against APIs (Kubernetes API Server or otherwise).",
|
||||
"required": [
|
||||
"path"
|
||||
],
|
||||
"properties": {
|
||||
"audience": {
|
||||
"type": "string",
|
||||
"description": "Audience is the intended audience of the token. A recipient of a token must identify itself with an identifier specified in the audience of the token, and otherwise should reject the token. The audience defaults to the identifier of the apiserver."
|
||||
},
|
||||
"expirationSeconds": {
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "ExpirationSeconds is the requested duration of validity of the service account token. As the token approaches expiration, the kubelet volume plugin will proactively rotate the service account token. The kubelet will start trying to rotate the token if the token is older than 80 percent of its time to live or if the token is older than 24 hours.Defaults to 1 hour and must be at least 10 minutes."
|
||||
},
|
||||
"path": {
|
||||
"type": "string",
|
||||
"description": "Path is the path relative to the mount point of the file to project the token into."
|
||||
}
|
||||
}
|
||||
},
|
||||
"v1.PortworxVolumeSource": {
|
||||
"id": "v1.PortworxVolumeSource",
|
||||
"description": "PortworxVolumeSource represents a Portworx volume resource.",
|
||||
@ -3113,7 +3150,7 @@
|
||||
},
|
||||
"mountPropagation": {
|
||||
"$ref": "v1.MountPropagationMode",
|
||||
"description": "mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationHostToContainer is used. This field is alpha in 1.8 and can be reworked or removed in a future release."
|
||||
"description": "mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationNone is used. This field is beta in 1.10."
|
||||
}
|
||||
}
|
||||
},
|
||||
@ -3315,6 +3352,11 @@
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsGroup": {
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
"type": "boolean",
|
||||
"description": "Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
@ -3388,6 +3430,11 @@
|
||||
"format": "int64",
|
||||
"description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsGroup": {
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container."
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
"type": "boolean",
|
||||
"description": "Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence."
|
||||
@ -3403,6 +3450,31 @@
|
||||
"type": "integer",
|
||||
"format": "int64",
|
||||
"description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw "
|
||||
},
|
||||
"sysctls": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "v1.Sysctl"
|
||||
},
|
||||
"description": "Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch."
|
||||
}
|
||||
}
|
||||
},
|
||||
"v1.Sysctl": {
|
||||
"id": "v1.Sysctl",
|
||||
"description": "Sysctl defines a kernel parameter to be set",
|
||||
"required": [
|
||||
"name",
|
||||
"value"
|
||||
],
|
||||
"properties": {
|
||||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of a property to set"
|
||||
},
|
||||
"value": {
|
||||
"type": "string",
|
||||
"description": "Value of a property to set"
|
||||
}
|
||||
}
|
||||
},
|
||||
@ -3459,17 +3531,21 @@
|
||||
},
|
||||
"v1.NodeSelectorTerm": {
|
||||
"id": "v1.NodeSelectorTerm",
|
||||
"description": "A null or empty node selector term matches no objects.",
|
||||
"required": [
|
||||
"matchExpressions"
|
||||
],
|
||||
"description": "A null or empty node selector term matches no objects. The requirements of them are ANDed. The TopologySelectorTerm type implements a subset of the NodeSelectorTerm.",
|
||||
"properties": {
|
||||
"matchExpressions": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "v1.NodeSelectorRequirement"
|
||||
},
|
||||
"description": "Required. A list of node selector requirements. The requirements are ANDed."
|
||||
"description": "A list of node selector requirements by node's labels."
|
||||
},
|
||||
"matchFields": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "v1.NodeSelectorRequirement"
|
||||
},
|
||||
"description": "A list of node selector requirements by node's fields."
|
||||
}
|
||||
}
|
||||
},
|
||||
@ -3684,6 +3760,19 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"v1.PodReadinessGate": {
|
||||
"id": "v1.PodReadinessGate",
|
||||
"description": "PodReadinessGate contains the reference to a pod condition",
|
||||
"required": [
|
||||
"conditionType"
|
||||
],
|
||||
"properties": {
|
||||
"conditionType": {
|
||||
"type": "string",
|
||||
"description": "ConditionType refers to a condition in the pod's condition list with matching type."
|
||||
}
|
||||
}
|
||||
},
|
||||
"v2alpha1.CronJobStatus": {
|
||||
"id": "v2alpha1.CronJobStatus",
|
||||
"description": "CronJobStatus represents the current state of a cron job.",
|
||||
|
Reference in New Issue
Block a user