public static final class V1.PodSecurityContext.Builder extends com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder> implements V1.PodSecurityContextOrBuilder
PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.Protobuf type
k8s.io.api.core.v1.PodSecurityContext| Modifier and Type | Method and Description |
|---|---|
V1.PodSecurityContext.Builder |
addAllSupplementalGroups(Iterable<? extends Long> values)
A list of groups applied to the first process run in each container, in addition
to the container's primary GID.
|
V1.PodSecurityContext.Builder |
addAllSysctls(Iterable<? extends V1.Sysctl> values)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext.Builder |
addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
V1.PodSecurityContext.Builder |
addSupplementalGroups(long value)
A list of groups applied to the first process run in each container, in addition
to the container's primary GID.
|
V1.PodSecurityContext.Builder |
addSysctls(int index,
V1.Sysctl.Builder builderForValue)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext.Builder |
addSysctls(int index,
V1.Sysctl value)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext.Builder |
addSysctls(V1.Sysctl.Builder builderForValue)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext.Builder |
addSysctls(V1.Sysctl value)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.Sysctl.Builder |
addSysctlsBuilder()
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.Sysctl.Builder |
addSysctlsBuilder(int index)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext |
build() |
V1.PodSecurityContext |
buildPartial() |
V1.PodSecurityContext.Builder |
clear() |
V1.PodSecurityContext.Builder |
clearField(com.google.protobuf.Descriptors.FieldDescriptor field) |
V1.PodSecurityContext.Builder |
clearFsGroup()
A special supplemental group that applies to all containers in a pod.
|
V1.PodSecurityContext.Builder |
clearFsGroupChangePolicy()
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
before being exposed inside Pod.
|
V1.PodSecurityContext.Builder |
clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) |
V1.PodSecurityContext.Builder |
clearRunAsGroup()
The GID to run the entrypoint of the container process.
|
V1.PodSecurityContext.Builder |
clearRunAsNonRoot()
Indicates that the container must run as a non-root user.
|
V1.PodSecurityContext.Builder |
clearRunAsUser()
The UID to run the entrypoint of the container process.
|
V1.PodSecurityContext.Builder |
clearSeccompProfile()
The seccomp options to use by the containers in this pod.
|
V1.PodSecurityContext.Builder |
clearSeLinuxOptions()
The SELinux context to be applied to all containers.
|
V1.PodSecurityContext.Builder |
clearSupplementalGroups()
A list of groups applied to the first process run in each container, in addition
to the container's primary GID.
|
V1.PodSecurityContext.Builder |
clearSysctls()
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext.Builder |
clearWindowsOptions()
The Windows specific settings applied to all containers.
|
V1.PodSecurityContext.Builder |
clone() |
V1.PodSecurityContext |
getDefaultInstanceForType() |
static com.google.protobuf.Descriptors.Descriptor |
getDescriptor() |
com.google.protobuf.Descriptors.Descriptor |
getDescriptorForType() |
long |
getFsGroup()
A special supplemental group that applies to all containers in a pod.
|
String |
getFsGroupChangePolicy()
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
before being exposed inside Pod.
|
com.google.protobuf.ByteString |
getFsGroupChangePolicyBytes()
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
before being exposed inside Pod.
|
long |
getRunAsGroup()
The GID to run the entrypoint of the container process.
|
boolean |
getRunAsNonRoot()
Indicates that the container must run as a non-root user.
|
long |
getRunAsUser()
The UID to run the entrypoint of the container process.
|
V1.SeccompProfile |
getSeccompProfile()
The seccomp options to use by the containers in this pod.
|
V1.SeccompProfile.Builder |
getSeccompProfileBuilder()
The seccomp options to use by the containers in this pod.
|
V1.SeccompProfileOrBuilder |
getSeccompProfileOrBuilder()
The seccomp options to use by the containers in this pod.
|
V1.SELinuxOptions |
getSeLinuxOptions()
The SELinux context to be applied to all containers.
|
V1.SELinuxOptions.Builder |
getSeLinuxOptionsBuilder()
The SELinux context to be applied to all containers.
|
V1.SELinuxOptionsOrBuilder |
getSeLinuxOptionsOrBuilder()
The SELinux context to be applied to all containers.
|
long |
getSupplementalGroups(int index)
A list of groups applied to the first process run in each container, in addition
to the container's primary GID.
|
int |
getSupplementalGroupsCount()
A list of groups applied to the first process run in each container, in addition
to the container's primary GID.
|
List<Long> |
getSupplementalGroupsList()
A list of groups applied to the first process run in each container, in addition
to the container's primary GID.
|
V1.Sysctl |
getSysctls(int index)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.Sysctl.Builder |
getSysctlsBuilder(int index)
Sysctls hold a list of namespaced sysctls used for the pod.
|
List<V1.Sysctl.Builder> |
getSysctlsBuilderList()
Sysctls hold a list of namespaced sysctls used for the pod.
|
int |
getSysctlsCount()
Sysctls hold a list of namespaced sysctls used for the pod.
|
List<V1.Sysctl> |
getSysctlsList()
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.SysctlOrBuilder |
getSysctlsOrBuilder(int index)
Sysctls hold a list of namespaced sysctls used for the pod.
|
List<? extends V1.SysctlOrBuilder> |
getSysctlsOrBuilderList()
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.WindowsSecurityContextOptions |
getWindowsOptions()
The Windows specific settings applied to all containers.
|
V1.WindowsSecurityContextOptions.Builder |
getWindowsOptionsBuilder()
The Windows specific settings applied to all containers.
|
V1.WindowsSecurityContextOptionsOrBuilder |
getWindowsOptionsOrBuilder()
The Windows specific settings applied to all containers.
|
boolean |
hasFsGroup()
A special supplemental group that applies to all containers in a pod.
|
boolean |
hasFsGroupChangePolicy()
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
before being exposed inside Pod.
|
boolean |
hasRunAsGroup()
The GID to run the entrypoint of the container process.
|
boolean |
hasRunAsNonRoot()
Indicates that the container must run as a non-root user.
|
boolean |
hasRunAsUser()
The UID to run the entrypoint of the container process.
|
boolean |
hasSeccompProfile()
The seccomp options to use by the containers in this pod.
|
boolean |
hasSeLinuxOptions()
The SELinux context to be applied to all containers.
|
boolean |
hasWindowsOptions()
The Windows specific settings applied to all containers.
|
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable |
internalGetFieldAccessorTable() |
boolean |
isInitialized() |
V1.PodSecurityContext.Builder |
mergeFrom(com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
V1.PodSecurityContext.Builder |
mergeFrom(com.google.protobuf.Message other) |
V1.PodSecurityContext.Builder |
mergeFrom(V1.PodSecurityContext other) |
V1.PodSecurityContext.Builder |
mergeSeccompProfile(V1.SeccompProfile value)
The seccomp options to use by the containers in this pod.
|
V1.PodSecurityContext.Builder |
mergeSeLinuxOptions(V1.SELinuxOptions value)
The SELinux context to be applied to all containers.
|
V1.PodSecurityContext.Builder |
mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
V1.PodSecurityContext.Builder |
mergeWindowsOptions(V1.WindowsSecurityContextOptions value)
The Windows specific settings applied to all containers.
|
V1.PodSecurityContext.Builder |
removeSysctls(int index)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext.Builder |
setField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
V1.PodSecurityContext.Builder |
setFsGroup(long value)
A special supplemental group that applies to all containers in a pod.
|
V1.PodSecurityContext.Builder |
setFsGroupChangePolicy(String value)
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
before being exposed inside Pod.
|
V1.PodSecurityContext.Builder |
setFsGroupChangePolicyBytes(com.google.protobuf.ByteString value)
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
before being exposed inside Pod.
|
V1.PodSecurityContext.Builder |
setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
int index,
Object value) |
V1.PodSecurityContext.Builder |
setRunAsGroup(long value)
The GID to run the entrypoint of the container process.
|
V1.PodSecurityContext.Builder |
setRunAsNonRoot(boolean value)
Indicates that the container must run as a non-root user.
|
V1.PodSecurityContext.Builder |
setRunAsUser(long value)
The UID to run the entrypoint of the container process.
|
V1.PodSecurityContext.Builder |
setSeccompProfile(V1.SeccompProfile.Builder builderForValue)
The seccomp options to use by the containers in this pod.
|
V1.PodSecurityContext.Builder |
setSeccompProfile(V1.SeccompProfile value)
The seccomp options to use by the containers in this pod.
|
V1.PodSecurityContext.Builder |
setSeLinuxOptions(V1.SELinuxOptions.Builder builderForValue)
The SELinux context to be applied to all containers.
|
V1.PodSecurityContext.Builder |
setSeLinuxOptions(V1.SELinuxOptions value)
The SELinux context to be applied to all containers.
|
V1.PodSecurityContext.Builder |
setSupplementalGroups(int index,
long value)
A list of groups applied to the first process run in each container, in addition
to the container's primary GID.
|
V1.PodSecurityContext.Builder |
setSysctls(int index,
V1.Sysctl.Builder builderForValue)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext.Builder |
setSysctls(int index,
V1.Sysctl value)
Sysctls hold a list of namespaced sysctls used for the pod.
|
V1.PodSecurityContext.Builder |
setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
V1.PodSecurityContext.Builder |
setWindowsOptions(V1.WindowsSecurityContextOptions.Builder builderForValue)
The Windows specific settings applied to all containers.
|
V1.PodSecurityContext.Builder |
setWindowsOptions(V1.WindowsSecurityContextOptions value)
The Windows specific settings applied to all containers.
|
getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, getUnknownFieldSetBuilder, hasField, hasOneof, internalGetMapField, internalGetMutableMapField, isClean, markClean, mergeUnknownLengthDelimitedField, mergeUnknownVarintField, newBuilderForField, onBuilt, onChanged, parseUnknownField, setUnknownFieldSetBuilder, setUnknownFieldsProto3findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toStringaddAll, addAll, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, newUninitializedMessageExceptionequals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, waitfindInitializationErrors, getAllFields, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneofpublic static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder clear()
clear in interface com.google.protobuf.Message.Builderclear in interface com.google.protobuf.MessageLite.Builderclear in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
getDescriptorForType in interface com.google.protobuf.Message.BuildergetDescriptorForType in interface com.google.protobuf.MessageOrBuildergetDescriptorForType in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext getDefaultInstanceForType()
getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuildergetDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilderpublic V1.PodSecurityContext build()
build in interface com.google.protobuf.Message.Builderbuild in interface com.google.protobuf.MessageLite.Builderpublic V1.PodSecurityContext buildPartial()
buildPartial in interface com.google.protobuf.Message.BuilderbuildPartial in interface com.google.protobuf.MessageLite.Builderpublic V1.PodSecurityContext.Builder clone()
clone in interface com.google.protobuf.Message.Builderclone in interface com.google.protobuf.MessageLite.Builderclone in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
setField in interface com.google.protobuf.Message.BuildersetField in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field)
clearField in interface com.google.protobuf.Message.BuilderclearField in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof)
clearOneof in interface com.google.protobuf.Message.BuilderclearOneof in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value)
setRepeatedField in interface com.google.protobuf.Message.BuildersetRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
addRepeatedField in interface com.google.protobuf.Message.BuilderaddRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder mergeFrom(com.google.protobuf.Message other)
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder mergeFrom(V1.PodSecurityContext other)
public final boolean isInitialized()
isInitialized in interface com.google.protobuf.MessageLiteOrBuilderisInitialized in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public V1.PodSecurityContext.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in interface com.google.protobuf.MessageLite.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<V1.PodSecurityContext.Builder>IOExceptionpublic boolean hasSeLinuxOptions()
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;hasSeLinuxOptions in interface V1.PodSecurityContextOrBuilderpublic V1.SELinuxOptions getSeLinuxOptions()
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;getSeLinuxOptions in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setSeLinuxOptions(V1.SELinuxOptions value)
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;public V1.PodSecurityContext.Builder setSeLinuxOptions(V1.SELinuxOptions.Builder builderForValue)
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;public V1.PodSecurityContext.Builder mergeSeLinuxOptions(V1.SELinuxOptions value)
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;public V1.PodSecurityContext.Builder clearSeLinuxOptions()
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;public V1.SELinuxOptions.Builder getSeLinuxOptionsBuilder()
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;public V1.SELinuxOptionsOrBuilder getSeLinuxOptionsOrBuilder()
The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 1;getSeLinuxOptionsOrBuilder in interface V1.PodSecurityContextOrBuilderpublic boolean hasWindowsOptions()
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;hasWindowsOptions in interface V1.PodSecurityContextOrBuilderpublic V1.WindowsSecurityContextOptions getWindowsOptions()
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;getWindowsOptions in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setWindowsOptions(V1.WindowsSecurityContextOptions value)
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;public V1.PodSecurityContext.Builder setWindowsOptions(V1.WindowsSecurityContextOptions.Builder builderForValue)
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;public V1.PodSecurityContext.Builder mergeWindowsOptions(V1.WindowsSecurityContextOptions value)
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;public V1.PodSecurityContext.Builder clearWindowsOptions()
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;public V1.WindowsSecurityContextOptions.Builder getWindowsOptionsBuilder()
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;public V1.WindowsSecurityContextOptionsOrBuilder getWindowsOptionsOrBuilder()
The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 8;getWindowsOptionsOrBuilder in interface V1.PodSecurityContextOrBuilderpublic boolean hasRunAsUser()
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;hasRunAsUser in interface V1.PodSecurityContextOrBuilderpublic long getRunAsUser()
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;getRunAsUser in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setRunAsUser(long value)
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;public V1.PodSecurityContext.Builder clearRunAsUser()
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 2;public boolean hasRunAsGroup()
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;hasRunAsGroup in interface V1.PodSecurityContextOrBuilderpublic long getRunAsGroup()
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;getRunAsGroup in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setRunAsGroup(long value)
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;public V1.PodSecurityContext.Builder clearRunAsGroup()
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 6;public boolean hasRunAsNonRoot()
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;hasRunAsNonRoot in interface V1.PodSecurityContextOrBuilderpublic boolean getRunAsNonRoot()
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;getRunAsNonRoot in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setRunAsNonRoot(boolean value)
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;public V1.PodSecurityContext.Builder clearRunAsNonRoot()
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 3;public List<Long> getSupplementalGroupsList()
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;getSupplementalGroupsList in interface V1.PodSecurityContextOrBuilderpublic int getSupplementalGroupsCount()
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;getSupplementalGroupsCount in interface V1.PodSecurityContextOrBuilderpublic long getSupplementalGroups(int index)
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;getSupplementalGroups in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setSupplementalGroups(int index, long value)
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;public V1.PodSecurityContext.Builder addSupplementalGroups(long value)
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;public V1.PodSecurityContext.Builder addAllSupplementalGroups(Iterable<? extends Long> values)
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;public V1.PodSecurityContext.Builder clearSupplementalGroups()
A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows. +optional
repeated int64 supplementalGroups = 4;public boolean hasFsGroup()
A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;hasFsGroup in interface V1.PodSecurityContextOrBuilderpublic long getFsGroup()
A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;getFsGroup in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setFsGroup(long value)
A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;public V1.PodSecurityContext.Builder clearFsGroup()
A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 fsGroup = 5;public List<V1.Sysctl> getSysctlsList()
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;getSysctlsList in interface V1.PodSecurityContextOrBuilderpublic int getSysctlsCount()
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;getSysctlsCount in interface V1.PodSecurityContextOrBuilderpublic V1.Sysctl getSysctls(int index)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;getSysctls in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setSysctls(int index, V1.Sysctl value)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.PodSecurityContext.Builder setSysctls(int index, V1.Sysctl.Builder builderForValue)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.PodSecurityContext.Builder addSysctls(V1.Sysctl value)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.PodSecurityContext.Builder addSysctls(int index, V1.Sysctl value)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.PodSecurityContext.Builder addSysctls(V1.Sysctl.Builder builderForValue)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.PodSecurityContext.Builder addSysctls(int index, V1.Sysctl.Builder builderForValue)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.PodSecurityContext.Builder addAllSysctls(Iterable<? extends V1.Sysctl> values)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.PodSecurityContext.Builder clearSysctls()
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.PodSecurityContext.Builder removeSysctls(int index)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.Sysctl.Builder getSysctlsBuilder(int index)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.SysctlOrBuilder getSysctlsOrBuilder(int index)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;getSysctlsOrBuilder in interface V1.PodSecurityContextOrBuilderpublic List<? extends V1.SysctlOrBuilder> getSysctlsOrBuilderList()
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;getSysctlsOrBuilderList in interface V1.PodSecurityContextOrBuilderpublic V1.Sysctl.Builder addSysctlsBuilder()
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public V1.Sysctl.Builder addSysctlsBuilder(int index)
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public List<V1.Sysctl.Builder> getSysctlsBuilderList()
Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. +optional
repeated .k8s.io.api.core.v1.Sysctl sysctls = 7;public boolean hasFsGroupChangePolicy()
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;hasFsGroupChangePolicy in interface V1.PodSecurityContextOrBuilderpublic String getFsGroupChangePolicy()
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;getFsGroupChangePolicy in interface V1.PodSecurityContextOrBuilderpublic com.google.protobuf.ByteString getFsGroupChangePolicyBytes()
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;getFsGroupChangePolicyBytes in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setFsGroupChangePolicy(String value)
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;public V1.PodSecurityContext.Builder clearFsGroupChangePolicy()
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;public V1.PodSecurityContext.Builder setFsGroupChangePolicyBytes(com.google.protobuf.ByteString value)
fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. +optional
optional string fsGroupChangePolicy = 9;public boolean hasSeccompProfile()
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;hasSeccompProfile in interface V1.PodSecurityContextOrBuilderpublic V1.SeccompProfile getSeccompProfile()
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;getSeccompProfile in interface V1.PodSecurityContextOrBuilderpublic V1.PodSecurityContext.Builder setSeccompProfile(V1.SeccompProfile value)
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;public V1.PodSecurityContext.Builder setSeccompProfile(V1.SeccompProfile.Builder builderForValue)
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;public V1.PodSecurityContext.Builder mergeSeccompProfile(V1.SeccompProfile value)
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;public V1.PodSecurityContext.Builder clearSeccompProfile()
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;public V1.SeccompProfile.Builder getSeccompProfileBuilder()
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;public V1.SeccompProfileOrBuilder getSeccompProfileOrBuilder()
The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 10;getSeccompProfileOrBuilder in interface V1.PodSecurityContextOrBuilderpublic final V1.PodSecurityContext.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
setUnknownFields in interface com.google.protobuf.Message.BuildersetUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>public final V1.PodSecurityContext.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
mergeUnknownFields in interface com.google.protobuf.Message.BuildermergeUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<V1.PodSecurityContext.Builder>Copyright © 2023. All rights reserved.