diff --git a/api/swagger-spec/apps_v1beta1.json b/api/swagger-spec/apps_v1beta1.json index 8104a7052b..4c6641c7f2 100644 --- a/api/swagger-spec/apps_v1beta1.json +++ b/api/swagger-spec/apps_v1beta1.json @@ -4057,8 +4057,7 @@ "description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsNonRoot": { @@ -4117,6 +4116,10 @@ } } }, + "types.UnixUserID": { + "id": "types.UnixUserID", + "properties": {} + }, "v1.PodSecurityContext": { "id": "v1.PodSecurityContext", "description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.", @@ -4126,8 +4129,7 @@ "description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsNonRoot": { @@ -4137,17 +4139,20 @@ "supplementalGroups": { "type": "array", "items": { - "type": "integer" + "$ref": "types.UnixGroupID" }, "description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container." }, "fsGroup": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixGroupID", "description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw " } } }, + "types.UnixGroupID": { + "id": "types.UnixGroupID", + "properties": {} + }, "v1.Affinity": { "id": "v1.Affinity", "description": "Affinity is a group of affinity scheduling rules.", diff --git a/api/swagger-spec/batch_v1.json b/api/swagger-spec/batch_v1.json index 39a21a456a..be62f99049 100644 --- a/api/swagger-spec/batch_v1.json +++ b/api/swagger-spec/batch_v1.json @@ -2840,8 +2840,7 @@ "description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsNonRoot": { @@ -2900,6 +2899,10 @@ } } }, + "types.UnixUserID": { + "id": "types.UnixUserID", + "properties": {} + }, "v1.PodSecurityContext": { "id": "v1.PodSecurityContext", "description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.", @@ -2909,8 +2912,7 @@ "description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsNonRoot": { @@ -2920,17 +2922,20 @@ "supplementalGroups": { "type": "array", "items": { - "type": "integer" + "$ref": "types.UnixGroupID" }, "description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container." }, "fsGroup": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixGroupID", "description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw " } } }, + "types.UnixGroupID": { + "id": "types.UnixGroupID", + "properties": {} + }, "v1.Affinity": { "id": "v1.Affinity", "description": "Affinity is a group of affinity scheduling rules.", diff --git a/api/swagger-spec/batch_v2alpha1.json b/api/swagger-spec/batch_v2alpha1.json index 8d83d1415b..701e1402db 100644 --- a/api/swagger-spec/batch_v2alpha1.json +++ b/api/swagger-spec/batch_v2alpha1.json @@ -3873,8 +3873,7 @@ "description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsNonRoot": { @@ -3933,6 +3932,10 @@ } } }, + "types.UnixUserID": { + "id": "types.UnixUserID", + "properties": {} + }, "v1.PodSecurityContext": { "id": "v1.PodSecurityContext", "description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.", @@ -3942,8 +3945,7 @@ "description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsNonRoot": { @@ -3953,17 +3955,20 @@ "supplementalGroups": { "type": "array", "items": { - "type": "integer" + "$ref": "types.UnixGroupID" }, "description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container." }, "fsGroup": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixGroupID", "description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw " } } }, + "types.UnixGroupID": { + "id": "types.UnixGroupID", + "properties": {} + }, "v1.Affinity": { "id": "v1.Affinity", "description": "Affinity is a group of affinity scheduling rules.", diff --git a/api/swagger-spec/extensions_v1beta1.json b/api/swagger-spec/extensions_v1beta1.json index 2b940b7512..b26008bae5 100644 --- a/api/swagger-spec/extensions_v1beta1.json +++ b/api/swagger-spec/extensions_v1beta1.json @@ -8304,8 +8304,7 @@ "description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsNonRoot": { @@ -8364,6 +8363,10 @@ } } }, + "types.UnixUserID": { + "id": "types.UnixUserID", + "properties": {} + }, "v1.PodSecurityContext": { "id": "v1.PodSecurityContext", "description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.", @@ -8373,8 +8376,7 @@ "description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsNonRoot": { @@ -8384,17 +8386,20 @@ "supplementalGroups": { "type": "array", "items": { - "type": "integer" + "$ref": "types.UnixGroupID" }, "description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container." }, "fsGroup": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixGroupID", "description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw " } } }, + "types.UnixGroupID": { + "id": "types.UnixGroupID", + "properties": {} + }, "v1.Affinity": { "id": "v1.Affinity", "description": "Affinity is a group of affinity scheduling rules.", diff --git a/api/swagger-spec/v1.json b/api/swagger-spec/v1.json index c0e480d85d..d045e970ab 100644 --- a/api/swagger-spec/v1.json +++ b/api/swagger-spec/v1.json @@ -19891,8 +19891,7 @@ "description": "The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence." }, "runAsNonRoot": { @@ -19951,6 +19950,10 @@ } } }, + "types.UnixUserID": { + "id": "types.UnixUserID", + "properties": {} + }, "v1.PodSecurityContext": { "id": "v1.PodSecurityContext", "description": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.", @@ -19960,8 +19963,7 @@ "description": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsUser": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixUserID", "description": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container." }, "runAsNonRoot": { @@ -19971,17 +19973,20 @@ "supplementalGroups": { "type": "array", "items": { - "type": "integer" + "$ref": "types.UnixGroupID" }, "description": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container." }, "fsGroup": { - "type": "integer", - "format": "int64", + "$ref": "types.UnixGroupID", "description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw " } } }, + "types.UnixGroupID": { + "id": "types.UnixGroupID", + "properties": {} + }, "v1.Affinity": { "id": "v1.Affinity", "description": "Affinity is a group of affinity scheduling rules.", diff --git a/docs/api-reference/apps/v1beta1/definitions.html b/docs/api-reference/apps/v1beta1/definitions.html index a7d66f1bfc..1a6f171dad 100755 --- a/docs/api-reference/apps/v1beta1/definitions.html +++ b/docs/api-reference/apps/v1beta1/definitions.html @@ -1755,6 +1755,10 @@ Populated by the system when a graceful deletion is requested. Read-only. More i + +
runAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.
false
integer (int64)
supplementalGroups
A list of groups applied to the first process run in each container, in addition to the container’s primary GID. If unspecified, no groups will be added to any container.
false
integer (int32) array
types.UnixGroupID array
false
integer (int64)
runAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
false
integer (int64)