Package io.kubernetes.client.proto
Class V1.PodSecurityContext.Builder
java.lang.Object
com.google.protobuf.AbstractMessageLite.Builder
com.google.protobuf.AbstractMessage.Builder<BuilderType>
com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
io.kubernetes.client.proto.V1.PodSecurityContext.Builder
- All Implemented Interfaces:
com.google.protobuf.Message.Builder
,com.google.protobuf.MessageLite.Builder
,com.google.protobuf.MessageLiteOrBuilder
,com.google.protobuf.MessageOrBuilder
,V1.PodSecurityContextOrBuilder
,Cloneable
- Enclosing class:
- V1.PodSecurityContext
public static final class V1.PodSecurityContext.Builder
extends com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
implements V1.PodSecurityContextOrBuilder
PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.Protobuf type
k8s.io.api.core.v1.PodSecurityContext
-
Method Summary
Modifier and TypeMethodDescriptionaddAllSupplementalGroups
(Iterable<? extends Long> values) A list of groups applied to the first process run in each container, in addition to the container's primary GID.addAllSysctls
(Iterable<? extends V1.Sysctl> values) Sysctls hold a list of namespaced sysctls used for the pod.addRepeatedField
(com.google.protobuf.Descriptors.FieldDescriptor field, Object value) addSupplementalGroups
(long value) A list of groups applied to the first process run in each container, in addition to the container's primary GID.addSysctls
(int index, V1.Sysctl value) Sysctls hold a list of namespaced sysctls used for the pod.addSysctls
(int index, V1.Sysctl.Builder builderForValue) Sysctls hold a list of namespaced sysctls used for the pod.addSysctls
(V1.Sysctl value) Sysctls hold a list of namespaced sysctls used for the pod.addSysctls
(V1.Sysctl.Builder builderForValue) Sysctls hold a list of namespaced sysctls used for the pod.Sysctls hold a list of namespaced sysctls used for the pod.addSysctlsBuilder
(int index) Sysctls hold a list of namespaced sysctls used for the pod.build()
clear()
clearField
(com.google.protobuf.Descriptors.FieldDescriptor field) A special supplemental group that applies to all containers in a pod.fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.clearOneof
(com.google.protobuf.Descriptors.OneofDescriptor oneof) The GID to run the entrypoint of the container process.Indicates that the container must run as a non-root user.The UID to run the entrypoint of the container process.The seccomp options to use by the containers in this pod.The SELinux context to be applied to all containers.A list of groups applied to the first process run in each container, in addition to the container's primary GID.Sysctls hold a list of namespaced sysctls used for the pod.The Windows specific settings applied to all containers.clone()
static final com.google.protobuf.Descriptors.Descriptor
com.google.protobuf.Descriptors.Descriptor
long
A special supplemental group that applies to all containers in a pod.fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.com.google.protobuf.ByteString
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.long
The GID to run the entrypoint of the container process.boolean
Indicates that the container must run as a non-root user.long
The UID to run the entrypoint of the container process.The seccomp options to use by the containers in this pod.The seccomp options to use by the containers in this pod.The seccomp options to use by the containers in this pod.The SELinux context to be applied to all containers.The SELinux context to be applied to all containers.The SELinux context to be applied to all containers.long
getSupplementalGroups
(int index) A list of groups applied to the first process run in each container, in addition to the container's primary GID.int
A list of groups applied to the first process run in each container, in addition to the container's primary GID.A list of groups applied to the first process run in each container, in addition to the container's primary GID.getSysctls
(int index) Sysctls hold a list of namespaced sysctls used for the pod.getSysctlsBuilder
(int index) Sysctls hold a list of namespaced sysctls used for the pod.Sysctls hold a list of namespaced sysctls used for the pod.int
Sysctls hold a list of namespaced sysctls used for the pod.Sysctls hold a list of namespaced sysctls used for the pod.getSysctlsOrBuilder
(int index) Sysctls hold a list of namespaced sysctls used for the pod.List<? extends V1.SysctlOrBuilder>
Sysctls hold a list of namespaced sysctls used for the pod.The Windows specific settings applied to all containers.The Windows specific settings applied to all containers.The Windows specific settings applied to all containers.boolean
A special supplemental group that applies to all containers in a pod.boolean
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.boolean
The GID to run the entrypoint of the container process.boolean
Indicates that the container must run as a non-root user.boolean
The UID to run the entrypoint of the container process.boolean
The seccomp options to use by the containers in this pod.boolean
The SELinux context to be applied to all containers.boolean
The Windows specific settings applied to all containers.protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
final boolean
mergeFrom
(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) mergeFrom
(com.google.protobuf.Message other) mergeFrom
(V1.PodSecurityContext other) The seccomp options to use by the containers in this pod.The SELinux context to be applied to all containers.mergeUnknownFields
(com.google.protobuf.UnknownFieldSet unknownFields) The Windows specific settings applied to all containers.removeSysctls
(int index) Sysctls hold a list of namespaced sysctls used for the pod.setFsGroup
(long value) A special supplemental group that applies to all containers in a pod.setFsGroupChangePolicy
(String value) fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.setFsGroupChangePolicyBytes
(com.google.protobuf.ByteString value) fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod.setRepeatedField
(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value) setRunAsGroup
(long value) The GID to run the entrypoint of the container process.setRunAsNonRoot
(boolean value) Indicates that the container must run as a non-root user.setRunAsUser
(long value) The UID to run the entrypoint of the container process.The seccomp options to use by the containers in this pod.setSeccompProfile
(V1.SeccompProfile.Builder builderForValue) The seccomp options to use by the containers in this pod.The SELinux context to be applied to all containers.setSeLinuxOptions
(V1.SELinuxOptions.Builder builderForValue) The SELinux context to be applied to all containers.setSupplementalGroups
(int index, long value) A list of groups applied to the first process run in each container, in addition to the container's primary GID.setSysctls
(int index, V1.Sysctl value) Sysctls hold a list of namespaced sysctls used for the pod.setSysctls
(int index, V1.Sysctl.Builder builderForValue) Sysctls hold a list of namespaced sysctls used for the pod.setUnknownFields
(com.google.protobuf.UnknownFieldSet unknownFields) The Windows specific settings applied to all containers.setWindowsOptions
(V1.WindowsSecurityContextOptions.Builder builderForValue) The Windows specific settings applied to all containers.Methods inherited from class com.google.protobuf.GeneratedMessageV3.Builder
getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, getUnknownFieldSetBuilder, hasField, hasOneof, internalGetMapField, internalGetMutableMapField, isClean, markClean, mergeUnknownLengthDelimitedField, mergeUnknownVarintField, newBuilderForField, onBuilt, onChanged, parseUnknownField, setUnknownFieldSetBuilder, setUnknownFieldsProto3
Methods inherited from class com.google.protobuf.AbstractMessage.Builder
findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toString
Methods inherited from class com.google.protobuf.AbstractMessageLite.Builder
addAll, addAll, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, newUninitializedMessageException
Methods inherited from class java.lang.Object
equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
Methods inherited from interface com.google.protobuf.Message.Builder
mergeDelimitedFrom, mergeDelimitedFrom
Methods inherited from interface com.google.protobuf.MessageLite.Builder
mergeFrom
Methods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
-
Method Details
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() -
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()- Specified by:
internalGetFieldAccessorTable
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
clear
- Specified by:
clear
in interfacecom.google.protobuf.Message.Builder
- Specified by:
clear
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
clear
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
getDescriptorForType
public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.Message.Builder
- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.MessageOrBuilder
- Overrides:
getDescriptorForType
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
getDefaultInstanceForType
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageOrBuilder
-
build
- Specified by:
build
in interfacecom.google.protobuf.Message.Builder
- Specified by:
build
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartial
- Specified by:
buildPartial
in interfacecom.google.protobuf.Message.Builder
- Specified by:
buildPartial
in interfacecom.google.protobuf.MessageLite.Builder
-
clone
- Specified by:
clone
in interfacecom.google.protobuf.Message.Builder
- Specified by:
clone
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
clone
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
setField
public V1.PodSecurityContext.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value) - Specified by:
setField
in interfacecom.google.protobuf.Message.Builder
- Overrides:
setField
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
clearField
public V1.PodSecurityContext.Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) - Specified by:
clearField
in interfacecom.google.protobuf.Message.Builder
- Overrides:
clearField
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
clearOneof
public V1.PodSecurityContext.Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) - Specified by:
clearOneof
in interfacecom.google.protobuf.Message.Builder
- Overrides:
clearOneof
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
setRepeatedField
public V1.PodSecurityContext.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value) - Specified by:
setRepeatedField
in interfacecom.google.protobuf.Message.Builder
- Overrides:
setRepeatedField
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
addRepeatedField
public V1.PodSecurityContext.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value) - Specified by:
addRepeatedField
in interfacecom.google.protobuf.Message.Builder
- Overrides:
addRepeatedField
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
mergeFrom
- Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<V1.PodSecurityContext.Builder>
-
mergeFrom
-
isInitialized
public final boolean isInitialized()- Specified by:
isInitialized
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Overrides:
isInitialized
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
mergeFrom
public V1.PodSecurityContext.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Specified by:
mergeFrom
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<V1.PodSecurityContext.Builder>
- Throws:
IOException
-
hasSeLinuxOptions
public boolean hasSeLinuxOptions()The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;
- Specified by:
hasSeLinuxOptions
in interfaceV1.PodSecurityContextOrBuilder
-
getSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;
- Specified by:
getSeLinuxOptions
in interfaceV1.PodSecurityContextOrBuilder
-
setSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;
-
setSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;
-
mergeSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;
-
clearSeLinuxOptions
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;
-
getSeLinuxOptionsBuilder
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;
-
getSeLinuxOptionsOrBuilder
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;
- Specified by:
getSeLinuxOptionsOrBuilder
in interfaceV1.PodSecurityContextOrBuilder
-
hasWindowsOptions
public boolean hasWindowsOptions()The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;
- Specified by:
hasWindowsOptions
in interfaceV1.PodSecurityContextOrBuilder
-
getWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;
- Specified by:
getWindowsOptions
in interfaceV1.PodSecurityContextOrBuilder
-
setWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;
-
setWindowsOptions
public V1.PodSecurityContext.Builder setWindowsOptions(V1.WindowsSecurityContextOptions.Builder builderForValue) The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;
-
mergeWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;
-
clearWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;
-
getWindowsOptionsBuilder
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;
-
getWindowsOptionsOrBuilder
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;
- Specified by:
getWindowsOptionsOrBuilder
in interfaceV1.PodSecurityContextOrBuilder
-
hasRunAsUser
public boolean hasRunAsUser()The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;
- Specified by:
hasRunAsUser
in interfaceV1.PodSecurityContextOrBuilder
-
getRunAsUser
public long getRunAsUser()The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;
- Specified by:
getRunAsUser
in interfaceV1.PodSecurityContextOrBuilder
-
setRunAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;
-
clearRunAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;
-
hasRunAsGroup
public boolean hasRunAsGroup()The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;
- Specified by:
hasRunAsGroup
in interfaceV1.PodSecurityContextOrBuilder
-
getRunAsGroup
public long getRunAsGroup()The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;
- Specified by:
getRunAsGroup
in interfaceV1.PodSecurityContextOrBuilder
-
setRunAsGroup
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;
-
clearRunAsGroup
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;
-
hasRunAsNonRoot
public boolean hasRunAsNonRoot()Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;
- Specified by:
hasRunAsNonRoot
in interfaceV1.PodSecurityContextOrBuilder
-
getRunAsNonRoot
public boolean getRunAsNonRoot()Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;
- Specified by:
getRunAsNonRoot
in interfaceV1.PodSecurityContextOrBuilder
-
setRunAsNonRoot
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;
-
clearRunAsNonRoot
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;
-
getSupplementalGroupsList
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;
- Specified by:
getSupplementalGroupsList
in interfaceV1.PodSecurityContextOrBuilder
-
getSupplementalGroupsCount
public int getSupplementalGroupsCount()A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;
- Specified by:
getSupplementalGroupsCount
in interfaceV1.PodSecurityContextOrBuilder
-
getSupplementalGroups
public long getSupplementalGroups(int index) A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;
- Specified by:
getSupplementalGroups
in interfaceV1.PodSecurityContextOrBuilder
-
setSupplementalGroups
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;
-
addSupplementalGroups
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;
-
addAllSupplementalGroups
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;
-
clearSupplementalGroups
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;
-
hasFsGroup
public boolean hasFsGroup()A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;
- Specified by:
hasFsGroup
in interfaceV1.PodSecurityContextOrBuilder
-
getFsGroup
public long getFsGroup()A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;
- Specified by:
getFsGroup
in interfaceV1.PodSecurityContextOrBuilder
-
setFsGroup
A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;
-
clearFsGroup
A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;
-
getSysctlsList
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
- Specified by:
getSysctlsList
in interfaceV1.PodSecurityContextOrBuilder
-
getSysctlsCount
public int getSysctlsCount()Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
- Specified by:
getSysctlsCount
in interfaceV1.PodSecurityContextOrBuilder
-
getSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
- Specified by:
getSysctls
in interfaceV1.PodSecurityContextOrBuilder
-
setSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
setSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
addSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
addSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
addSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
addSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
addAllSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
clearSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
removeSysctls
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
getSysctlsBuilder
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
getSysctlsOrBuilder
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
- Specified by:
getSysctlsOrBuilder
in interfaceV1.PodSecurityContextOrBuilder
-
getSysctlsOrBuilderList
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
- Specified by:
getSysctlsOrBuilderList
in interfaceV1.PodSecurityContextOrBuilder
-
addSysctlsBuilder
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
addSysctlsBuilder
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
getSysctlsBuilderList
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;
-
hasFsGroupChangePolicy
public boolean hasFsGroupChangePolicy()fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;
- Specified by:
hasFsGroupChangePolicy
in interfaceV1.PodSecurityContextOrBuilder
-
getFsGroupChangePolicy
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;
- Specified by:
getFsGroupChangePolicy
in interfaceV1.PodSecurityContextOrBuilder
-
getFsGroupChangePolicyBytes
public com.google.protobuf.ByteString getFsGroupChangePolicyBytes()fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;
- Specified by:
getFsGroupChangePolicyBytes
in interfaceV1.PodSecurityContextOrBuilder
-
setFsGroupChangePolicy
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;
-
clearFsGroupChangePolicy
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;
-
setFsGroupChangePolicyBytes
public V1.PodSecurityContext.Builder setFsGroupChangePolicyBytes(com.google.protobuf.ByteString value) fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;
-
hasSeccompProfile
public boolean hasSeccompProfile()The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;
- Specified by:
hasSeccompProfile
in interfaceV1.PodSecurityContextOrBuilder
-
getSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;
- Specified by:
getSeccompProfile
in interfaceV1.PodSecurityContextOrBuilder
-
setSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;
-
setSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;
-
mergeSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;
-
clearSeccompProfile
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;
-
getSeccompProfileBuilder
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;
-
getSeccompProfileOrBuilder
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;
- Specified by:
getSeccompProfileOrBuilder
in interfaceV1.PodSecurityContextOrBuilder
-
setUnknownFields
public final V1.PodSecurityContext.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) - Specified by:
setUnknownFields
in interfacecom.google.protobuf.Message.Builder
- Overrides:
setUnknownFields
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-
mergeUnknownFields
public final V1.PodSecurityContext.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) - Specified by:
mergeUnknownFields
in interfacecom.google.protobuf.Message.Builder
- Overrides:
mergeUnknownFields
in classcom.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>
-