|
1391 | 1391 | },
|
1392 | 1392 | "type": "object"
|
1393 | 1393 | },
|
| 1394 | + "io.k8s.api.core.v1.AppArmorProfile": { |
| 1395 | + "description": "AppArmorProfile defines a pod or container's AppArmor settings.", |
| 1396 | + "properties": { |
| 1397 | + "localhostProfile": { |
| 1398 | + "description": "localhostProfile indicates a profile loaded on the node that should be used. The profile must be preconfigured on the node to work. Must match the loaded name of the profile. Must be set if and only if type is \"Localhost\".", |
| 1399 | + "type": "string" |
| 1400 | + }, |
| 1401 | + "type": { |
| 1402 | + "default": "", |
| 1403 | + "description": "type indicates which kind of AppArmor profile will be applied. Valid options are:\n Localhost - a profile pre-loaded on the node.\n RuntimeDefault - the container runtime's default profile.\n Unconfined - no AppArmor enforcement.", |
| 1404 | + "type": "string" |
| 1405 | + } |
| 1406 | + }, |
| 1407 | + "required": [ |
| 1408 | + "type" |
| 1409 | + ], |
| 1410 | + "type": "object", |
| 1411 | + "x-kubernetes-unions": [ |
| 1412 | + { |
| 1413 | + "discriminator": "type", |
| 1414 | + "fields-to-discriminateBy": { |
| 1415 | + "localhostProfile": "LocalhostProfile" |
| 1416 | + } |
| 1417 | + } |
| 1418 | + ] |
| 1419 | + }, |
1394 | 1420 | "io.k8s.api.core.v1.AzureDiskVolumeSource": {
|
1395 | 1421 | "description": "AzureDisk represents an Azure Data Disk mount on the host and bind mount to the pod.",
|
1396 | 1422 | "properties": {
|
|
3578 | 3604 | "io.k8s.api.core.v1.PodSecurityContext": {
|
3579 | 3605 | "description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.",
|
3580 | 3606 | "properties": {
|
| 3607 | + "appArmorProfile": { |
| 3608 | + "allOf": [ |
| 3609 | + { |
| 3610 | + "$ref": "#/components/schemas/io.k8s.api.core.v1.AppArmorProfile" |
| 3611 | + } |
| 3612 | + ], |
| 3613 | + "description": "appArmorProfile is the AppArmor options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows." |
| 3614 | + }, |
3581 | 3615 | "fsGroup": {
|
3582 | 3616 | "description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw----\n\nIf unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows.",
|
3583 | 3617 | "format": "int64",
|
|
3816 | 3850 | "$ref": "#/components/schemas/io.k8s.api.core.v1.PodOS"
|
3817 | 3851 | }
|
3818 | 3852 | ],
|
3819 |
| - "description": "Specifies the OS of the containers in the pod. Some pod and container fields are restricted if this is set.\n\nIf the OS field is set to linux, the following fields must be unset: -securityContext.windowsOptions\n\nIf the OS field is set to windows, following fields must be unset: - spec.hostPID - spec.hostIPC - spec.hostUsers - spec.securityContext.seLinuxOptions - spec.securityContext.seccompProfile - spec.securityContext.fsGroup - spec.securityContext.fsGroupChangePolicy - spec.securityContext.sysctls - spec.shareProcessNamespace - spec.securityContext.runAsUser - spec.securityContext.runAsGroup - spec.securityContext.supplementalGroups - spec.containers[*].securityContext.seLinuxOptions - spec.containers[*].securityContext.seccompProfile - spec.containers[*].securityContext.capabilities - spec.containers[*].securityContext.readOnlyRootFilesystem - spec.containers[*].securityContext.privileged - spec.containers[*].securityContext.allowPrivilegeEscalation - spec.containers[*].securityContext.procMount - spec.containers[*].securityContext.runAsUser - spec.containers[*].securityContext.runAsGroup" |
| 3853 | + "description": "Specifies the OS of the containers in the pod. Some pod and container fields are restricted if this is set.\n\nIf the OS field is set to linux, the following fields must be unset: -securityContext.windowsOptions\n\nIf the OS field is set to windows, following fields must be unset: - spec.hostPID - spec.hostIPC - spec.hostUsers - spec.securityContext.appArmorProfile - spec.securityContext.seLinuxOptions - spec.securityContext.seccompProfile - spec.securityContext.fsGroup - spec.securityContext.fsGroupChangePolicy - spec.securityContext.sysctls - spec.shareProcessNamespace - spec.securityContext.runAsUser - spec.securityContext.runAsGroup - spec.securityContext.supplementalGroups - spec.containers[*].securityContext.appArmorProfile - spec.containers[*].securityContext.seLinuxOptions - spec.containers[*].securityContext.seccompProfile - spec.containers[*].securityContext.capabilities - spec.containers[*].securityContext.readOnlyRootFilesystem - spec.containers[*].securityContext.privileged - spec.containers[*].securityContext.allowPrivilegeEscalation - spec.containers[*].securityContext.procMount - spec.containers[*].securityContext.runAsUser - spec.containers[*].securityContext.runAsGroup" |
3820 | 3854 | },
|
3821 | 3855 | "overhead": {
|
3822 | 3856 | "additionalProperties": {
|
|
4524 | 4558 | "description": "AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows.",
|
4525 | 4559 | "type": "boolean"
|
4526 | 4560 | },
|
| 4561 | + "appArmorProfile": { |
| 4562 | + "allOf": [ |
| 4563 | + { |
| 4564 | + "$ref": "#/components/schemas/io.k8s.api.core.v1.AppArmorProfile" |
| 4565 | + } |
| 4566 | + ], |
| 4567 | + "description": "appArmorProfile is the AppArmor options to use by this container. If set, this profile overrides the pod's appArmorProfile. Note that this field cannot be set when spec.os.name is windows." |
| 4568 | + }, |
4527 | 4569 | "capabilities": {
|
4528 | 4570 | "allOf": [
|
4529 | 4571 | {
|
|
0 commit comments