Class: KubeDSL::DSL::Policy::V1beta1::PodSecurityPolicySpec
Instance Method Summary
collapse
#initialize, #to_resource
extended
extended
Instance Method Details
#kind_sym ⇒ Object
82
83
84
|
# File 'lib/kube-dsl/dsl/policy/v1beta1/pod_security_policy_spec.rb', line 82
def kind_sym
:pod_security_policy_spec
end
|
#serialize ⇒ Object
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
|
# File 'lib/kube-dsl/dsl/policy/v1beta1/pod_security_policy_spec.rb', line 53
def serialize
{}.tap do |result|
result[:allowPrivilegeEscalation] = allow_privilege_escalation
result[:allowedCSIDrivers] = allowed_csi_drivers.map(&:serialize)
result[:allowedCapabilities] = allowed_capabilities
result[:allowedFlexVolumes] = allowed_flex_volumes.map(&:serialize)
result[:allowedHostPaths] = allowed_host_paths.map(&:serialize)
result[:allowedProcMountTypes] = allowed_proc_mount_types
result[:allowedUnsafeSysctls] = allowed_unsafe_sysctls
result[:defaultAddCapabilities] = default_add_capabilities
result[:defaultAllowPrivilegeEscalation] = default_allow_privilege_escalation
result[:forbiddenSysctls] = forbidden_sysctls
result[:fsGroup] = fs_group.serialize
result[:hostIPC] = host_ipc
result[:hostNetwork] = host_network
result[:hostPID] = host_pid
result[:hostPorts] = host_ports.map(&:serialize)
result[:privileged] = privileged
result[:readOnlyRootFilesystem] = read_only_root_filesystem
result[:requiredDropCapabilities] = required_drop_capabilities
result[:runAsGroup] = run_as_group.serialize
result[:runAsUser] = run_as_user.serialize
result[:runtimeClass] = runtime_class.serialize
result[:seLinux] = se_linux.serialize
result[:supplementalGroups] = supplemental_groups.serialize
result[:volumes] = volumes
end
end
|