Add node modules and compiled JavaScript from main (#54)
Co-authored-by: Oliver King <oking3@uncc.edu>
This commit is contained in:
committed by
GitHub
parent
4a983766a0
commit
52d71d28bd
82
node_modules/@kubernetes/client-node/dist/gen/model/v1SecurityContext.js
generated
vendored
Normal file
82
node_modules/@kubernetes/client-node/dist/gen/model/v1SecurityContext.js
generated
vendored
Normal file
@@ -0,0 +1,82 @@
|
||||
"use strict";
|
||||
/**
|
||||
* Kubernetes
|
||||
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
||||
*
|
||||
* The version of the OpenAPI document: v1.22.2
|
||||
*
|
||||
*
|
||||
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
||||
* https://openapi-generator.tech
|
||||
* Do not edit the class manually.
|
||||
*/
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.V1SecurityContext = void 0;
|
||||
/**
|
||||
* SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.
|
||||
*/
|
||||
class V1SecurityContext {
|
||||
static getAttributeTypeMap() {
|
||||
return V1SecurityContext.attributeTypeMap;
|
||||
}
|
||||
}
|
||||
exports.V1SecurityContext = V1SecurityContext;
|
||||
V1SecurityContext.discriminator = undefined;
|
||||
V1SecurityContext.attributeTypeMap = [
|
||||
{
|
||||
"name": "allowPrivilegeEscalation",
|
||||
"baseName": "allowPrivilegeEscalation",
|
||||
"type": "boolean"
|
||||
},
|
||||
{
|
||||
"name": "capabilities",
|
||||
"baseName": "capabilities",
|
||||
"type": "V1Capabilities"
|
||||
},
|
||||
{
|
||||
"name": "privileged",
|
||||
"baseName": "privileged",
|
||||
"type": "boolean"
|
||||
},
|
||||
{
|
||||
"name": "procMount",
|
||||
"baseName": "procMount",
|
||||
"type": "string"
|
||||
},
|
||||
{
|
||||
"name": "readOnlyRootFilesystem",
|
||||
"baseName": "readOnlyRootFilesystem",
|
||||
"type": "boolean"
|
||||
},
|
||||
{
|
||||
"name": "runAsGroup",
|
||||
"baseName": "runAsGroup",
|
||||
"type": "number"
|
||||
},
|
||||
{
|
||||
"name": "runAsNonRoot",
|
||||
"baseName": "runAsNonRoot",
|
||||
"type": "boolean"
|
||||
},
|
||||
{
|
||||
"name": "runAsUser",
|
||||
"baseName": "runAsUser",
|
||||
"type": "number"
|
||||
},
|
||||
{
|
||||
"name": "seLinuxOptions",
|
||||
"baseName": "seLinuxOptions",
|
||||
"type": "V1SELinuxOptions"
|
||||
},
|
||||
{
|
||||
"name": "seccompProfile",
|
||||
"baseName": "seccompProfile",
|
||||
"type": "V1SeccompProfile"
|
||||
},
|
||||
{
|
||||
"name": "windowsOptions",
|
||||
"baseName": "windowsOptions",
|
||||
"type": "V1WindowsSecurityContextOptions"
|
||||
}
|
||||
];
|
||||
//# sourceMappingURL=v1SecurityContext.js.map
|
Reference in New Issue
Block a user