@@ -209,6 +209,13 @@ spec:
209209 successfully take a Backup.
210210 format : int32
211211 type : integer
212+ compression :
213+ description : Compression algorithm to be used in the Backup.
214+ enum :
215+ - none
216+ - bzip2
217+ - gzip
218+ type : string
212219 databases :
213220 description : Databases defines the logical databases to be backed
214221 up. If not provided, all databases are backed up.
@@ -300,9 +307,8 @@ spec:
300307 common container settings.
301308 properties :
302309 appArmorProfile :
303- description : |-
304- appArmorProfile is the AppArmor options to use by the containers in this pod.
305- Note that this field cannot be set when spec.os.name is windows.
310+ description : AppArmorProfile defines a pod or container's AppArmor
311+ settings.
306312 properties :
307313 localhostProfile :
308314 description : |-
@@ -323,66 +329,24 @@ spec:
323329 - type
324330 type : object
325331 fsGroup :
326- description : |-
327- A special supplemental group that applies to all containers in a pod.
328- Some volume types allow the Kubelet to change the ownership of that volume
329- to be owned by the pod:
330-
331- 1. The owning GID will be the FSGroup
332- 2. The setgid bit is set (new files created in the volume will be owned by FSGroup)
333- 3. The permission bits are OR'd with rw-rw----
334-
335- If unset, the Kubelet will not modify the ownership and permissions of any volume.
336- Note that this field cannot be set when spec.os.name is windows.
337332 format : int64
338333 type : integer
339334 fsGroupChangePolicy :
340335 description : |-
341- fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
342- before being exposed inside Pod. This field will only apply to
343- volume types which support fsGroup based ownership(and permissions).
344- It will have no effect on ephemeral volume types such as: secret, configmaps
345- and emptydir.
346- Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used.
347- Note that this field cannot be set when spec.os.name is windows.
336+ PodFSGroupChangePolicy holds policies that will be used for applying fsGroup to a volume
337+ when volume is mounted.
348338 type : string
349339 runAsGroup :
350- description : |-
351- The GID to run the entrypoint of the container process.
352- Uses runtime default if unset.
353- May also be set in SecurityContext. If set in both SecurityContext and
354- PodSecurityContext, the value specified in SecurityContext takes precedence
355- for that container.
356- Note that this field cannot be set when spec.os.name is windows.
357340 format : int64
358341 type : integer
359342 runAsNonRoot :
360- description : |-
361- Indicates that the container must run as a non-root user.
362- If true, the Kubelet will validate the image at runtime to ensure that it
363- does not run as UID 0 (root) and fail to start the container if it does.
364- If unset or false, no such validation will be performed.
365- May also be set in SecurityContext. If set in both SecurityContext and
366- PodSecurityContext, the value specified in SecurityContext takes precedence.
367343 type : boolean
368344 runAsUser :
369- description : |-
370- The UID to run the entrypoint of the container process.
371- Defaults to user specified in image metadata if unspecified.
372- May also be set in SecurityContext. If set in both SecurityContext and
373- PodSecurityContext, the value specified in SecurityContext takes precedence
374- for that container.
375- Note that this field cannot be set when spec.os.name is windows.
376345 format : int64
377346 type : integer
378347 seLinuxOptions :
379- description : |-
380- The SELinux context to be applied to all containers.
381- If unspecified, the container runtime will allocate a random SELinux context for each
382- container. May also be set in SecurityContext. If set in
383- both SecurityContext and PodSecurityContext, the value specified in SecurityContext
384- takes precedence for that container.
385- Note that this field cannot be set when spec.os.name is windows.
348+ description : SELinuxOptions are the labels to be applied to the
349+ container
386350 properties :
387351 level :
388352 description : Level is SELinux level label that applies to
@@ -403,8 +367,8 @@ spec:
403367 type : object
404368 seccompProfile :
405369 description : |-
406- The seccomp options to use by the containers in this pod .
407- Note that this field cannot be set when spec.os.name is windows .
370+ SeccompProfile defines a pod/container's seccomp profile settings .
371+ Only one profile source may be set.
408372 properties :
409373 localhostProfile :
410374 description : |-
@@ -426,81 +390,11 @@ spec:
426390 - type
427391 type : object
428392 supplementalGroups :
429- description : |-
430- A list of groups applied to the first process run in each container, in
431- addition to the container's primary GID and fsGroup (if specified). If
432- the SupplementalGroupsPolicy feature is enabled, the
433- supplementalGroupsPolicy field determines whether these are in addition
434- to or instead of any group memberships defined in the container image.
435- If unspecified, no additional groups are added, though group memberships
436- defined in the container image may still be used, depending on the
437- supplementalGroupsPolicy field.
438- Note that this field cannot be set when spec.os.name is windows.
439393 items :
440394 format : int64
441395 type : integer
442396 type : array
443397 x-kubernetes-list-type : atomic
444- supplementalGroupsPolicy :
445- description : |-
446- Defines how supplemental groups of the first container processes are calculated.
447- Valid values are "Merge" and "Strict". If not specified, "Merge" is used.
448- (Alpha) Using the field requires the SupplementalGroupsPolicy feature gate to be enabled
449- and the container runtime must implement support for this feature.
450- Note that this field cannot be set when spec.os.name is windows.
451- type : string
452- sysctls :
453- description : |-
454- Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported
455- sysctls (by the container runtime) might fail to launch.
456- Note that this field cannot be set when spec.os.name is windows.
457- items :
458- description : Sysctl defines a kernel parameter to be set
459- properties :
460- name :
461- description : Name of a property to set
462- type : string
463- value :
464- description : Value of a property to set
465- type : string
466- required :
467- - name
468- - value
469- type : object
470- type : array
471- x-kubernetes-list-type : atomic
472- windowsOptions :
473- description : |-
474- The Windows specific settings applied to all containers.
475- If unspecified, the options within a container's SecurityContext will be used.
476- If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
477- Note that this field cannot be set when spec.os.name is linux.
478- properties :
479- gmsaCredentialSpec :
480- description : |-
481- GMSACredentialSpec is where the GMSA admission webhook
482- (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the
483- GMSA credential spec named by the GMSACredentialSpecName field.
484- type : string
485- gmsaCredentialSpecName :
486- description : GMSACredentialSpecName is the name of the GMSA
487- credential spec to use.
488- type : string
489- hostProcess :
490- description : |-
491- HostProcess determines if a container should be run as a 'Host Process' container.
492- All of a Pod's containers must have the same effective HostProcess value
493- (it is not allowed to have a mix of HostProcess containers and non-HostProcess containers).
494- In addition, if HostProcess is true then HostNetwork must also be set to true.
495- type : boolean
496- runAsUserName :
497- description : |-
498- The UserName in Windows to run the entrypoint of the container process.
499- Defaults to the user specified in image metadata if unspecified.
500- May also be set in PodSecurityContext. If set in both SecurityContext and
501- PodSecurityContext, the value specified in SecurityContext takes precedence.
502- type : string
503- type : object
504398 type : object
505399 priorityClassName :
506400 description : PriorityClassName to be used in the Pod.
0 commit comments