Add node modules and compiled JavaScript from main (#54)
Co-authored-by: Oliver King <oking3@uncc.edu>
This commit is contained in:
committed by
GitHub
parent
4a983766a0
commit
52d71d28bd
77
node_modules/@kubernetes/client-node/dist/gen/model/v1PodSecurityContext.js
generated
vendored
Normal file
77
node_modules/@kubernetes/client-node/dist/gen/model/v1PodSecurityContext.js
generated
vendored
Normal file
@@ -0,0 +1,77 @@
|
||||
"use strict";
|
||||
/**
|
||||
* Kubernetes
|
||||
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
||||
*
|
||||
* The version of the OpenAPI document: v1.22.2
|
||||
*
|
||||
*
|
||||
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
||||
* https://openapi-generator.tech
|
||||
* Do not edit the class manually.
|
||||
*/
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.V1PodSecurityContext = void 0;
|
||||
/**
|
||||
* PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.
|
||||
*/
|
||||
class V1PodSecurityContext {
|
||||
static getAttributeTypeMap() {
|
||||
return V1PodSecurityContext.attributeTypeMap;
|
||||
}
|
||||
}
|
||||
exports.V1PodSecurityContext = V1PodSecurityContext;
|
||||
V1PodSecurityContext.discriminator = undefined;
|
||||
V1PodSecurityContext.attributeTypeMap = [
|
||||
{
|
||||
"name": "fsGroup",
|
||||
"baseName": "fsGroup",
|
||||
"type": "number"
|
||||
},
|
||||
{
|
||||
"name": "fsGroupChangePolicy",
|
||||
"baseName": "fsGroupChangePolicy",
|
||||
"type": "string"
|
||||
},
|
||||
{
|
||||
"name": "runAsGroup",
|
||||
"baseName": "runAsGroup",
|
||||
"type": "number"
|
||||
},
|
||||
{
|
||||
"name": "runAsNonRoot",
|
||||
"baseName": "runAsNonRoot",
|
||||
"type": "boolean"
|
||||
},
|
||||
{
|
||||
"name": "runAsUser",
|
||||
"baseName": "runAsUser",
|
||||
"type": "number"
|
||||
},
|
||||
{
|
||||
"name": "seLinuxOptions",
|
||||
"baseName": "seLinuxOptions",
|
||||
"type": "V1SELinuxOptions"
|
||||
},
|
||||
{
|
||||
"name": "seccompProfile",
|
||||
"baseName": "seccompProfile",
|
||||
"type": "V1SeccompProfile"
|
||||
},
|
||||
{
|
||||
"name": "supplementalGroups",
|
||||
"baseName": "supplementalGroups",
|
||||
"type": "Array<number>"
|
||||
},
|
||||
{
|
||||
"name": "sysctls",
|
||||
"baseName": "sysctls",
|
||||
"type": "Array<V1Sysctl>"
|
||||
},
|
||||
{
|
||||
"name": "windowsOptions",
|
||||
"baseName": "windowsOptions",
|
||||
"type": "V1WindowsSecurityContextOptions"
|
||||
}
|
||||
];
|
||||
//# sourceMappingURL=v1PodSecurityContext.js.map
|
Reference in New Issue
Block a user