Automated openapi generation from release-1.30

Signed-off-by: Kubernetes Prow Robot <k8s.ci.robot@gmail.com>
This commit is contained in:
Kubernetes Prow Robot
2024-05-18 13:20:54 +00:00
parent 7387c20126
commit c97b51f36a
285 changed files with 42411 additions and 434 deletions

View File

@@ -4,6 +4,7 @@
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**allow_privilege_escalation** | **int** | AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows. | [optional]
**app_armor_profile** | [**v1_app_armor_profile_t**](v1_app_armor_profile.md) \* | | [optional]
**capabilities** | [**v1_capabilities_t**](v1_capabilities.md) \* | | [optional]
**privileged** | **int** | Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows. | [optional]
**proc_mount** | **char \*** | procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows. | [optional]