Package io.kubernetes.client.proto
Class V1.PodSecurityContext.Builder
java.lang.Object
com.google.protobuf.AbstractMessageLite.Builder
com.google.protobuf.AbstractMessage.Builder<BuilderT>
com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
io.kubernetes.client.proto.V1.PodSecurityContext.Builder
- All Implemented Interfaces:
com.google.protobuf.Message.Builder,com.google.protobuf.MessageLite.Builder,com.google.protobuf.MessageLiteOrBuilder,com.google.protobuf.MessageOrBuilder,V1.PodSecurityContextOrBuilder,Cloneable
- Enclosing class:
- V1.PodSecurityContext
public static final class V1.PodSecurityContext.Builder
extends com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
implements V1.PodSecurityContextOrBuilder
PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.Protobuf type
k8s.io.api.core.v1.PodSecurityContext-
Method Summary
Modifier and TypeMethodDescriptionaddAllSupplementalGroups(Iterable<? extends Long> values) A list of groups applied to the first process run in each container, in addition to the container's primary GID.addAllSysctls(Iterable<? extends V1.Sysctl> values) Sysctls hold a list of namespaced sysctls used for the pod.addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value) addSupplementalGroups(long value) A list of groups applied to the first process run in each container, in addition to the container's primary GID.addSysctls(int index, V1.Sysctl value) Sysctls hold a list of namespaced sysctls used for the pod.addSysctls(int index, V1.Sysctl.Builder builderForValue) Sysctls hold a list of namespaced sysctls used for the pod.addSysctls(V1.Sysctl value) Sysctls hold a list of namespaced sysctls used for the pod.addSysctls(V1.Sysctl.Builder builderForValue) Sysctls hold a list of namespaced sysctls used for the pod.Sysctls hold a list of namespaced sysctls used for the pod.addSysctlsBuilder(int index) Sysctls hold a list of namespaced sysctls used for the pod.build()clear()clearField(com.google.protobuf.Descriptors.FieldDescriptor field) A special supplemental group that applies to all containers in a pod.fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) The GID to run the entrypoint of the container process.Indicates that the container must run as a non-root user.The UID to run the entrypoint of the container process.The seccomp options to use by the containers in this pod.The SELinux context to be applied to all containers.A list of groups applied to the first process run in each container, in addition to the container's primary GID.Sysctls hold a list of namespaced sysctls used for the pod.The Windows specific settings applied to all containers.clone()static final com.google.protobuf.Descriptors.Descriptorcom.google.protobuf.Descriptors.DescriptorlongA special supplemental group that applies to all containers in a pod.fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.com.google.protobuf.ByteStringfsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.longThe GID to run the entrypoint of the container process.booleanIndicates that the container must run as a non-root user.longThe UID to run the entrypoint of the container process.The seccomp options to use by the containers in this pod.The seccomp options to use by the containers in this pod.The seccomp options to use by the containers in this pod.The SELinux context to be applied to all containers.The SELinux context to be applied to all containers.The SELinux context to be applied to all containers.longgetSupplementalGroups(int index) A list of groups applied to the first process run in each container, in addition to the container's primary GID.intA list of groups applied to the first process run in each container, in addition to the container's primary GID.A list of groups applied to the first process run in each container, in addition to the container's primary GID.getSysctls(int index) Sysctls hold a list of namespaced sysctls used for the pod.getSysctlsBuilder(int index) Sysctls hold a list of namespaced sysctls used for the pod.Sysctls hold a list of namespaced sysctls used for the pod.intSysctls hold a list of namespaced sysctls used for the pod.Sysctls hold a list of namespaced sysctls used for the pod.getSysctlsOrBuilder(int index) Sysctls hold a list of namespaced sysctls used for the pod.List<? extends V1.SysctlOrBuilder>Sysctls hold a list of namespaced sysctls used for the pod.The Windows specific settings applied to all containers.The Windows specific settings applied to all containers.The Windows specific settings applied to all containers.booleanA special supplemental group that applies to all containers in a pod.booleanfsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.booleanThe GID to run the entrypoint of the container process.booleanIndicates that the container must run as a non-root user.booleanThe UID to run the entrypoint of the container process.booleanThe seccomp options to use by the containers in this pod.booleanThe SELinux context to be applied to all containers.booleanThe Windows specific settings applied to all containers.protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTablefinal booleanmergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) mergeFrom(com.google.protobuf.Message other) mergeFrom(V1.PodSecurityContext other) The seccomp options to use by the containers in this pod.The SELinux context to be applied to all containers.mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) The Windows specific settings applied to all containers.removeSysctls(int index) Sysctls hold a list of namespaced sysctls used for the pod.setFsGroup(long value) A special supplemental group that applies to all containers in a pod.setFsGroupChangePolicy(String value) fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.setFsGroupChangePolicyBytes(com.google.protobuf.ByteString value) fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value) setRunAsGroup(long value) The GID to run the entrypoint of the container process.setRunAsNonRoot(boolean value) Indicates that the container must run as a non-root user.setRunAsUser(long value) The UID to run the entrypoint of the container process.The seccomp options to use by the containers in this pod.setSeccompProfile(V1.SeccompProfile.Builder builderForValue) The seccomp options to use by the containers in this pod.The SELinux context to be applied to all containers.setSeLinuxOptions(V1.SELinuxOptions.Builder builderForValue) The SELinux context to be applied to all containers.setSupplementalGroups(int index, long value) A list of groups applied to the first process run in each container, in addition to the container's primary GID.setSysctls(int index, V1.Sysctl value) Sysctls hold a list of namespaced sysctls used for the pod.setSysctls(int index, V1.Sysctl.Builder builderForValue) Sysctls hold a list of namespaced sysctls used for the pod.setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) The Windows specific settings applied to all containers.setWindowsOptions(V1.WindowsSecurityContextOptions.Builder builderForValue) The Windows specific settings applied to all containers.Methods inherited from class com.google.protobuf.GeneratedMessageV3.Builder
getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, getUnknownFieldSetBuilder, hasField, hasOneof, internalGetMapField, internalGetMutableMapField, isClean, markClean, mergeUnknownLengthDelimitedField, mergeUnknownVarintField, newBuilderForField, onBuilt, onChanged, parseUnknownField, setUnknownFieldSetBuilder, setUnknownFieldsProto3Methods inherited from class com.google.protobuf.AbstractMessage.Builder
findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toStringMethods inherited from class com.google.protobuf.AbstractMessageLite.Builder
addAll, addAll, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, newUninitializedMessageExceptionMethods inherited from class java.lang.Object
equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, waitMethods inherited from interface com.google.protobuf.Message.Builder
mergeDelimitedFrom, mergeDelimitedFromMethods inherited from interface com.google.protobuf.MessageLite.Builder
mergeFromMethods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
-
Method Details
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() -
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()- Specified by:
internalGetFieldAccessorTablein classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
clear
- Specified by:
clearin interfacecom.google.protobuf.Message.Builder- Specified by:
clearin interfacecom.google.protobuf.MessageLite.Builder- Overrides:
clearin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
getDescriptorForType
public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()- Specified by:
getDescriptorForTypein interfacecom.google.protobuf.Message.Builder- Specified by:
getDescriptorForTypein interfacecom.google.protobuf.MessageOrBuilder- Overrides:
getDescriptorForTypein classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
getDefaultInstanceForType
- Specified by:
getDefaultInstanceForTypein interfacecom.google.protobuf.MessageLiteOrBuilder- Specified by:
getDefaultInstanceForTypein interfacecom.google.protobuf.MessageOrBuilder
-
build
- Specified by:
buildin interfacecom.google.protobuf.Message.Builder- Specified by:
buildin interfacecom.google.protobuf.MessageLite.Builder
-
buildPartial
- Specified by:
buildPartialin interfacecom.google.protobuf.Message.Builder- Specified by:
buildPartialin interfacecom.google.protobuf.MessageLite.Builder
-
clone
- Specified by:
clonein interfacecom.google.protobuf.Message.Builder- Specified by:
clonein interfacecom.google.protobuf.MessageLite.Builder- Overrides:
clonein classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
setField
public V1.PodSecurityContext.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value) - Specified by:
setFieldin interfacecom.google.protobuf.Message.Builder- Overrides:
setFieldin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
clearField
public V1.PodSecurityContext.Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) - Specified by:
clearFieldin interfacecom.google.protobuf.Message.Builder- Overrides:
clearFieldin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
clearOneof
public V1.PodSecurityContext.Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) - Specified by:
clearOneofin interfacecom.google.protobuf.Message.Builder- Overrides:
clearOneofin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
setRepeatedField
public V1.PodSecurityContext.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value) - Specified by:
setRepeatedFieldin interfacecom.google.protobuf.Message.Builder- Overrides:
setRepeatedFieldin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
addRepeatedField
public V1.PodSecurityContext.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value) - Specified by:
addRepeatedFieldin interfacecom.google.protobuf.Message.Builder- Overrides:
addRepeatedFieldin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
mergeFrom
- Specified by:
mergeFromin interfacecom.google.protobuf.Message.Builder- Overrides:
mergeFromin classcom.google.protobuf.AbstractMessage.Builder<V1.PodSecurityContext.Builder>
-
mergeFrom
-
isInitialized
public final boolean isInitialized()- Specified by:
isInitializedin interfacecom.google.protobuf.MessageLiteOrBuilder- Overrides:
isInitializedin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
mergeFrom
public V1.PodSecurityContext.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Specified by:
mergeFromin interfacecom.google.protobuf.Message.Builder- Specified by:
mergeFromin interfacecom.google.protobuf.MessageLite.Builder- Overrides:
mergeFromin classcom.google.protobuf.AbstractMessage.Builder<V1.PodSecurityContext.Builder>- Throws:
IOException
-
hasSeLinuxOptions
public boolean hasSeLinuxOptions()The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;- Specified by:
hasSeLinuxOptionsin interfaceV1.PodSecurityContextOrBuilder
-
getSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;- Specified by:
getSeLinuxOptionsin interfaceV1.PodSecurityContextOrBuilder
-
setSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1; -
setSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1; -
mergeSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1; -
clearSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1; -
getSeLinuxOptionsBuilder
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1; -
getSeLinuxOptionsOrBuilder
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;- Specified by:
getSeLinuxOptionsOrBuilderin interfaceV1.PodSecurityContextOrBuilder
-
hasWindowsOptions
public boolean hasWindowsOptions()The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;- Specified by:
hasWindowsOptionsin interfaceV1.PodSecurityContextOrBuilder
-
getWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;- Specified by:
getWindowsOptionsin interfaceV1.PodSecurityContextOrBuilder
-
setWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8; -
setWindowsOptions
public V1.PodSecurityContext.Builder setWindowsOptions(V1.WindowsSecurityContextOptions.Builder builderForValue) The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8; -
mergeWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8; -
clearWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8; -
getWindowsOptionsBuilder
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8; -
getWindowsOptionsOrBuilder
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;- Specified by:
getWindowsOptionsOrBuilderin interfaceV1.PodSecurityContextOrBuilder
-
hasRunAsUser
public boolean hasRunAsUser()The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;- Specified by:
hasRunAsUserin interfaceV1.PodSecurityContextOrBuilder
-
getRunAsUser
public long getRunAsUser()The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;- Specified by:
getRunAsUserin interfaceV1.PodSecurityContextOrBuilder
-
setRunAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2; -
clearRunAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2; -
hasRunAsGroup
public boolean hasRunAsGroup()The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;- Specified by:
hasRunAsGroupin interfaceV1.PodSecurityContextOrBuilder
-
getRunAsGroup
public long getRunAsGroup()The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;- Specified by:
getRunAsGroupin interfaceV1.PodSecurityContextOrBuilder
-
setRunAsGroup
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6; -
clearRunAsGroup
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6; -
hasRunAsNonRoot
public boolean hasRunAsNonRoot()Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;- Specified by:
hasRunAsNonRootin interfaceV1.PodSecurityContextOrBuilder
-
getRunAsNonRoot
public boolean getRunAsNonRoot()Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;- Specified by:
getRunAsNonRootin interfaceV1.PodSecurityContextOrBuilder
-
setRunAsNonRoot
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3; -
clearRunAsNonRoot
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3; -
getSupplementalGroupsList
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;- Specified by:
getSupplementalGroupsListin interfaceV1.PodSecurityContextOrBuilder
-
getSupplementalGroupsCount
public int getSupplementalGroupsCount()A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;- Specified by:
getSupplementalGroupsCountin interfaceV1.PodSecurityContextOrBuilder
-
getSupplementalGroups
public long getSupplementalGroups(int index) A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;- Specified by:
getSupplementalGroupsin interfaceV1.PodSecurityContextOrBuilder
-
setSupplementalGroups
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4; -
addSupplementalGroups
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4; -
addAllSupplementalGroups
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4; -
clearSupplementalGroups
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4; -
hasFsGroup
public boolean hasFsGroup()A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;- Specified by:
hasFsGroupin interfaceV1.PodSecurityContextOrBuilder
-
getFsGroup
public long getFsGroup()A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;- Specified by:
getFsGroupin interfaceV1.PodSecurityContextOrBuilder
-
setFsGroup
A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5; -
clearFsGroup
A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5; -
getSysctlsList
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;- Specified by:
getSysctlsListin interfaceV1.PodSecurityContextOrBuilder
-
getSysctlsCount
public int getSysctlsCount()Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;- Specified by:
getSysctlsCountin interfaceV1.PodSecurityContextOrBuilder
-
getSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;- Specified by:
getSysctlsin interfaceV1.PodSecurityContextOrBuilder
-
setSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
setSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
addSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
addSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
addSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
addSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
addAllSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
clearSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
removeSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
getSysctlsBuilder
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
getSysctlsOrBuilder
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;- Specified by:
getSysctlsOrBuilderin interfaceV1.PodSecurityContextOrBuilder
-
getSysctlsOrBuilderList
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;- Specified by:
getSysctlsOrBuilderListin interfaceV1.PodSecurityContextOrBuilder
-
addSysctlsBuilder
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
addSysctlsBuilder
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
getSysctlsBuilderList
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7; -
hasFsGroupChangePolicy
public boolean hasFsGroupChangePolicy()fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;- Specified by:
hasFsGroupChangePolicyin interfaceV1.PodSecurityContextOrBuilder
-
getFsGroupChangePolicy
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;- Specified by:
getFsGroupChangePolicyin interfaceV1.PodSecurityContextOrBuilder
-
getFsGroupChangePolicyBytes
public com.google.protobuf.ByteString getFsGroupChangePolicyBytes()fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;- Specified by:
getFsGroupChangePolicyBytesin interfaceV1.PodSecurityContextOrBuilder
-
setFsGroupChangePolicy
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9; -
clearFsGroupChangePolicy
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9; -
setFsGroupChangePolicyBytes
public V1.PodSecurityContext.Builder setFsGroupChangePolicyBytes(com.google.protobuf.ByteString value) fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9; -
hasSeccompProfile
public boolean hasSeccompProfile()The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;- Specified by:
hasSeccompProfilein interfaceV1.PodSecurityContextOrBuilder
-
getSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;- Specified by:
getSeccompProfilein interfaceV1.PodSecurityContextOrBuilder
-
setSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10; -
setSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10; -
mergeSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10; -
clearSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10; -
getSeccompProfileBuilder
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10; -
getSeccompProfileOrBuilder
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;- Specified by:
getSeccompProfileOrBuilderin interfaceV1.PodSecurityContextOrBuilder
-
setUnknownFields
public final V1.PodSecurityContext.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) - Specified by:
setUnknownFieldsin interfacecom.google.protobuf.Message.Builder- Overrides:
setUnknownFieldsin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
mergeUnknownFields
public final V1.PodSecurityContext.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) - Specified by:
mergeUnknownFieldsin interfacecom.google.protobuf.Message.Builder- Overrides:
mergeUnknownFieldsin classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-