...

Source file src/github.com/openshift/api/security/v1/zz_generated.swagger_doc_generated.go

Documentation: github.com/openshift/api/security/v1

     1  package v1
     2  
     3  // This file contains a collection of methods that can be used from go-restful to
     4  // generate Swagger API documentation for its models. Please read this PR for more
     5  // information on the implementation: https://github.com/emicklei/go-restful/pull/215
     6  //
     7  // TODOs are ignored from the parser (e.g. TODO(andronat):... || TODO:...) if and only if
     8  // they are on one line! For multiple line or blocks that you want to ignore use ---.
     9  // Any context after a --- is ignored.
    10  //
    11  // Those methods can be generated by using hack/update-swagger-docs.sh
    12  
    13  // AUTO-GENERATED FUNCTIONS START HERE
    14  var map_AllowedFlexVolume = map[string]string{
    15  	"":       "AllowedFlexVolume represents a single Flexvolume that is allowed to be used.",
    16  	"driver": "Driver is the name of the Flexvolume driver.",
    17  }
    18  
    19  func (AllowedFlexVolume) SwaggerDoc() map[string]string {
    20  	return map_AllowedFlexVolume
    21  }
    22  
    23  var map_FSGroupStrategyOptions = map[string]string{
    24  	"":       "FSGroupStrategyOptions defines the strategy type and options used to create the strategy.",
    25  	"type":   "Type is the strategy that will dictate what FSGroup is used in the SecurityContext.",
    26  	"ranges": "Ranges are the allowed ranges of fs groups.  If you would like to force a single fs group then supply a single range with the same start and end.",
    27  }
    28  
    29  func (FSGroupStrategyOptions) SwaggerDoc() map[string]string {
    30  	return map_FSGroupStrategyOptions
    31  }
    32  
    33  var map_IDRange = map[string]string{
    34  	"":    "IDRange provides a min/max of an allowed range of IDs.",
    35  	"min": "Min is the start of the range, inclusive.",
    36  	"max": "Max is the end of the range, inclusive.",
    37  }
    38  
    39  func (IDRange) SwaggerDoc() map[string]string {
    40  	return map_IDRange
    41  }
    42  
    43  var map_PodSecurityPolicyReview = map[string]string{
    44  	"":       "PodSecurityPolicyReview checks which service accounts (not users, since that would be cluster-wide) can create the `PodTemplateSpec` in question.\n\nCompatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer).",
    45  	"spec":   "spec is the PodSecurityPolicy to check.",
    46  	"status": "status represents the current information/status for the PodSecurityPolicyReview.",
    47  }
    48  
    49  func (PodSecurityPolicyReview) SwaggerDoc() map[string]string {
    50  	return map_PodSecurityPolicyReview
    51  }
    52  
    53  var map_PodSecurityPolicyReviewSpec = map[string]string{
    54  	"":                    "PodSecurityPolicyReviewSpec defines specification for PodSecurityPolicyReview",
    55  	"template":            "template is the PodTemplateSpec to check. The template.spec.serviceAccountName field is used if serviceAccountNames is empty, unless the template.spec.serviceAccountName is empty, in which case \"default\" is used. If serviceAccountNames is specified, template.spec.serviceAccountName is ignored.",
    56  	"serviceAccountNames": "serviceAccountNames is an optional set of ServiceAccounts to run the check with. If serviceAccountNames is empty, the template.spec.serviceAccountName is used, unless it's empty, in which case \"default\" is used instead. If serviceAccountNames is specified, template.spec.serviceAccountName is ignored.",
    57  }
    58  
    59  func (PodSecurityPolicyReviewSpec) SwaggerDoc() map[string]string {
    60  	return map_PodSecurityPolicyReviewSpec
    61  }
    62  
    63  var map_PodSecurityPolicyReviewStatus = map[string]string{
    64  	"":                       "PodSecurityPolicyReviewStatus represents the status of PodSecurityPolicyReview.",
    65  	"allowedServiceAccounts": "allowedServiceAccounts returns the list of service accounts in *this* namespace that have the power to create the PodTemplateSpec.",
    66  }
    67  
    68  func (PodSecurityPolicyReviewStatus) SwaggerDoc() map[string]string {
    69  	return map_PodSecurityPolicyReviewStatus
    70  }
    71  
    72  var map_PodSecurityPolicySelfSubjectReview = map[string]string{
    73  	"":       "PodSecurityPolicySelfSubjectReview checks whether this user/SA tuple can create the PodTemplateSpec\n\nCompatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer).",
    74  	"spec":   "spec defines specification the PodSecurityPolicySelfSubjectReview.",
    75  	"status": "status represents the current information/status for the PodSecurityPolicySelfSubjectReview.",
    76  }
    77  
    78  func (PodSecurityPolicySelfSubjectReview) SwaggerDoc() map[string]string {
    79  	return map_PodSecurityPolicySelfSubjectReview
    80  }
    81  
    82  var map_PodSecurityPolicySelfSubjectReviewSpec = map[string]string{
    83  	"":         "PodSecurityPolicySelfSubjectReviewSpec contains specification for PodSecurityPolicySelfSubjectReview.",
    84  	"template": "template is the PodTemplateSpec to check.",
    85  }
    86  
    87  func (PodSecurityPolicySelfSubjectReviewSpec) SwaggerDoc() map[string]string {
    88  	return map_PodSecurityPolicySelfSubjectReviewSpec
    89  }
    90  
    91  var map_PodSecurityPolicySubjectReview = map[string]string{
    92  	"":       "PodSecurityPolicySubjectReview checks whether a particular user/SA tuple can create the PodTemplateSpec.\n\nCompatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer).",
    93  	"spec":   "spec defines specification for the PodSecurityPolicySubjectReview.",
    94  	"status": "status represents the current information/status for the PodSecurityPolicySubjectReview.",
    95  }
    96  
    97  func (PodSecurityPolicySubjectReview) SwaggerDoc() map[string]string {
    98  	return map_PodSecurityPolicySubjectReview
    99  }
   100  
   101  var map_PodSecurityPolicySubjectReviewSpec = map[string]string{
   102  	"":         "PodSecurityPolicySubjectReviewSpec defines specification for PodSecurityPolicySubjectReview",
   103  	"template": "template is the PodTemplateSpec to check. If template.spec.serviceAccountName is empty it will not be defaulted. If its non-empty, it will be checked.",
   104  	"user":     "user is the user you're testing for. If you specify \"user\" but not \"group\", then is it interpreted as \"What if user were not a member of any groups. If user and groups are empty, then the check is performed using *only* the serviceAccountName in the template.",
   105  	"groups":   "groups is the groups you're testing for.",
   106  }
   107  
   108  func (PodSecurityPolicySubjectReviewSpec) SwaggerDoc() map[string]string {
   109  	return map_PodSecurityPolicySubjectReviewSpec
   110  }
   111  
   112  var map_PodSecurityPolicySubjectReviewStatus = map[string]string{
   113  	"":          "PodSecurityPolicySubjectReviewStatus contains information/status for PodSecurityPolicySubjectReview.",
   114  	"allowedBy": "allowedBy is a reference to the rule that allows the PodTemplateSpec. A rule can be a SecurityContextConstraint or a PodSecurityPolicy A `nil`, indicates that it was denied.",
   115  	"reason":    "A machine-readable description of why this operation is in the \"Failure\" status. If this value is empty there is no information available.",
   116  	"template":  "template is the PodTemplateSpec after the defaulting is applied.",
   117  }
   118  
   119  func (PodSecurityPolicySubjectReviewStatus) SwaggerDoc() map[string]string {
   120  	return map_PodSecurityPolicySubjectReviewStatus
   121  }
   122  
   123  var map_RangeAllocation = map[string]string{
   124  	"":         "RangeAllocation is used so we can easily expose a RangeAllocation typed for security group\n\nCompatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.",
   125  	"metadata": "metadata is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
   126  	"range":    "range is a string representing a unique label for a range of uids, \"1000000000-2000000000/10000\".",
   127  	"data":     "data is a byte array representing the serialized state of a range allocation.  It is a bitmap with each bit set to one to represent a range is taken.",
   128  }
   129  
   130  func (RangeAllocation) SwaggerDoc() map[string]string {
   131  	return map_RangeAllocation
   132  }
   133  
   134  var map_RangeAllocationList = map[string]string{
   135  	"":         "RangeAllocationList is a list of RangeAllocations objects\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
   136  	"metadata": "metadata is the standard list's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
   137  	"items":    "List of RangeAllocations.",
   138  }
   139  
   140  func (RangeAllocationList) SwaggerDoc() map[string]string {
   141  	return map_RangeAllocationList
   142  }
   143  
   144  var map_RunAsUserStrategyOptions = map[string]string{
   145  	"":            "RunAsUserStrategyOptions defines the strategy type and any options used to create the strategy.",
   146  	"type":        "Type is the strategy that will dictate what RunAsUser is used in the SecurityContext.",
   147  	"uid":         "UID is the user id that containers must run as.  Required for the MustRunAs strategy if not using namespace/service account allocated uids.",
   148  	"uidRangeMin": "UIDRangeMin defines the min value for a strategy that allocates by range.",
   149  	"uidRangeMax": "UIDRangeMax defines the max value for a strategy that allocates by range.",
   150  }
   151  
   152  func (RunAsUserStrategyOptions) SwaggerDoc() map[string]string {
   153  	return map_RunAsUserStrategyOptions
   154  }
   155  
   156  var map_SELinuxContextStrategyOptions = map[string]string{
   157  	"":               "SELinuxContextStrategyOptions defines the strategy type and any options used to create the strategy.",
   158  	"type":           "Type is the strategy that will dictate what SELinux context is used in the SecurityContext.",
   159  	"seLinuxOptions": "seLinuxOptions required to run as; required for MustRunAs",
   160  }
   161  
   162  func (SELinuxContextStrategyOptions) SwaggerDoc() map[string]string {
   163  	return map_SELinuxContextStrategyOptions
   164  }
   165  
   166  var map_SecurityContextConstraints = map[string]string{
   167  	"":                                "SecurityContextConstraints governs the ability to make requests that affect the SecurityContext that will be applied to a container. For historical reasons SCC was exposed under the core Kubernetes API group. That exposure is deprecated and will be removed in a future release - users should instead use the security.openshift.io group to manage SecurityContextConstraints.\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
   168  	"metadata":                        "metadata is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
   169  	"priority":                        "Priority influences the sort order of SCCs when evaluating which SCCs to try first for a given pod request based on access in the Users and Groups fields.  The higher the int, the higher priority. An unset value is considered a 0 priority. If scores for multiple SCCs are equal they will be sorted from most restrictive to least restrictive. If both priorities and restrictions are equal the SCCs will be sorted by name.",
   170  	"allowPrivilegedContainer":        "AllowPrivilegedContainer determines if a container can request to be run as privileged.",
   171  	"defaultAddCapabilities":          "DefaultAddCapabilities is the default set of capabilities that will be added to the container unless the pod spec specifically drops the capability.  You may not list a capabiility in both DefaultAddCapabilities and RequiredDropCapabilities.",
   172  	"requiredDropCapabilities":        "RequiredDropCapabilities are the capabilities that will be dropped from the container.  These are required to be dropped and cannot be added.",
   173  	"allowedCapabilities":             "AllowedCapabilities is a list of capabilities that can be requested to add to the container. Capabilities in this field maybe added at the pod author's discretion. You must not list a capability in both AllowedCapabilities and RequiredDropCapabilities. To allow all capabilities you may use '*'.",
   174  	"allowHostDirVolumePlugin":        "AllowHostDirVolumePlugin determines if the policy allow containers to use the HostDir volume plugin",
   175  	"volumes":                         "Volumes is a white list of allowed volume plugins.  FSType corresponds directly with the field names of a VolumeSource (azureFile, configMap, emptyDir).  To allow all volumes you may use \"*\". To allow no volumes, set to [\"none\"].",
   176  	"allowedFlexVolumes":              "AllowedFlexVolumes is a whitelist of allowed Flexvolumes.  Empty or nil indicates that all Flexvolumes may be used.  This parameter is effective only when the usage of the Flexvolumes is allowed in the \"Volumes\" field.",
   177  	"allowHostNetwork":                "AllowHostNetwork determines if the policy allows the use of HostNetwork in the pod spec.",
   178  	"allowHostPorts":                  "AllowHostPorts determines if the policy allows host ports in the containers.",
   179  	"allowHostPID":                    "AllowHostPID determines if the policy allows host pid in the containers.",
   180  	"allowHostIPC":                    "AllowHostIPC determines if the policy allows host ipc in the containers.",
   181  	"defaultAllowPrivilegeEscalation": "DefaultAllowPrivilegeEscalation controls the default setting for whether a process can gain more privileges than its parent process.",
   182  	"allowPrivilegeEscalation":        "AllowPrivilegeEscalation determines if a pod can request to allow privilege escalation. If unspecified, defaults to true.",
   183  	"seLinuxContext":                  "SELinuxContext is the strategy that will dictate what labels will be set in the SecurityContext.",
   184  	"runAsUser":                       "RunAsUser is the strategy that will dictate what RunAsUser is used in the SecurityContext.",
   185  	"supplementalGroups":              "SupplementalGroups is the strategy that will dictate what supplemental groups are used by the SecurityContext.",
   186  	"fsGroup":                         "FSGroup is the strategy that will dictate what fs group is used by the SecurityContext.",
   187  	"readOnlyRootFilesystem":          "ReadOnlyRootFilesystem when set to true will force containers to run with a read only root file system.  If the container specifically requests to run with a non-read only root file system the SCC should deny the pod. If set to false the container may run with a read only root file system if it wishes but it will not be forced to.",
   188  	"users":                           "The users who have permissions to use this security context constraints",
   189  	"groups":                          "The groups that have permission to use this security context constraints",
   190  	"seccompProfiles":                 "SeccompProfiles lists the allowed profiles that may be set for the pod or container's seccomp annotations.  An unset (nil) or empty value means that no profiles may be specifid by the pod or container.\tThe wildcard '*' may be used to allow all profiles.  When used to generate a value for a pod the first non-wildcard profile will be used as the default.",
   191  	"allowedUnsafeSysctls":            "AllowedUnsafeSysctls is a list of explicitly allowed unsafe sysctls, defaults to none. Each entry is either a plain sysctl name or ends in \"*\" in which case it is considered as a prefix of allowed sysctls. Single * means all unsafe sysctls are allowed. Kubelet has to whitelist all allowed unsafe sysctls explicitly to avoid rejection.\n\nExamples: e.g. \"foo/*\" allows \"foo/bar\", \"foo/baz\", etc. e.g. \"foo.*\" allows \"foo.bar\", \"foo.baz\", etc.",
   192  	"forbiddenSysctls":                "ForbiddenSysctls is a list of explicitly forbidden sysctls, defaults to none. Each entry is either a plain sysctl name or ends in \"*\" in which case it is considered as a prefix of forbidden sysctls. Single * means all sysctls are forbidden.\n\nExamples: e.g. \"foo/*\" forbids \"foo/bar\", \"foo/baz\", etc. e.g. \"foo.*\" forbids \"foo.bar\", \"foo.baz\", etc.",
   193  }
   194  
   195  func (SecurityContextConstraints) SwaggerDoc() map[string]string {
   196  	return map_SecurityContextConstraints
   197  }
   198  
   199  var map_SecurityContextConstraintsList = map[string]string{
   200  	"":         "SecurityContextConstraintsList is a list of SecurityContextConstraints objects\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
   201  	"metadata": "metadata is the standard list's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
   202  	"items":    "List of security context constraints.",
   203  }
   204  
   205  func (SecurityContextConstraintsList) SwaggerDoc() map[string]string {
   206  	return map_SecurityContextConstraintsList
   207  }
   208  
   209  var map_ServiceAccountPodSecurityPolicyReviewStatus = map[string]string{
   210  	"":     "ServiceAccountPodSecurityPolicyReviewStatus represents ServiceAccount name and related review status",
   211  	"name": "name contains the allowed and the denied ServiceAccount name",
   212  }
   213  
   214  func (ServiceAccountPodSecurityPolicyReviewStatus) SwaggerDoc() map[string]string {
   215  	return map_ServiceAccountPodSecurityPolicyReviewStatus
   216  }
   217  
   218  var map_SupplementalGroupsStrategyOptions = map[string]string{
   219  	"":       "SupplementalGroupsStrategyOptions defines the strategy type and options used to create the strategy.",
   220  	"type":   "Type is the strategy that will dictate what supplemental groups is used in the SecurityContext.",
   221  	"ranges": "Ranges are the allowed ranges of supplemental groups.  If you would like to force a single supplemental group then supply a single range with the same start and end.",
   222  }
   223  
   224  func (SupplementalGroupsStrategyOptions) SwaggerDoc() map[string]string {
   225  	return map_SupplementalGroupsStrategyOptions
   226  }
   227  
   228  // AUTO-GENERATED FUNCTIONS END HERE
   229  

View as plain text