argo-workflows 6.6.2__py3-none-any.whl → 6.6.6__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of argo-workflows might be problematic. Click here for more details.

Files changed (151) hide show
  1. argo_workflows/__init__.py +1 -1
  2. argo_workflows/api/cluster_workflow_template_service_api.py +6 -0
  3. argo_workflows/api/cron_workflow_service_api.py +6 -0
  4. argo_workflows/api/event_source_service_api.py +23 -11
  5. argo_workflows/api/sensor_service_api.py +23 -11
  6. argo_workflows/api/workflow_service_api.py +20 -2
  7. argo_workflows/api/workflow_template_service_api.py +6 -0
  8. argo_workflows/api_client.py +1 -1
  9. argo_workflows/configuration.py +1 -1
  10. argo_workflows/model/eventsource_create_event_source_request.py +5 -5
  11. argo_workflows/model/eventsource_event_source_watch_event.py +5 -5
  12. argo_workflows/model/eventsource_update_event_source_request.py +5 -5
  13. argo_workflows/model/{io_argoproj_events_v1alpha1_resource.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amount.py} +3 -3
  14. argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_consume_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_consume_config.py} +3 -3
  15. argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_event_source.py} +43 -43
  16. argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_exchange_declare_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_exchange_declare_config.py} +3 -3
  17. argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_queue_bind_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_queue_bind_config.py} +3 -3
  18. argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_queue_declare_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_queue_declare_config.py} +3 -3
  19. argo_workflows/model/{io_argoproj_events_v1alpha1_argo_workflow_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_argo_workflow_trigger.py} +13 -13
  20. argo_workflows/model/{io_argoproj_events_v1alpha1_artifact_location.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_artifact_location.py} +28 -28
  21. argo_workflows/model/{io_argoproj_events_v1alpha1_aws_lambda_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_aws_lambda_trigger.py} +11 -11
  22. argo_workflows/model/{io_argoproj_events_v1alpha1_azure_event_hubs_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_event_hubs_trigger.py} +11 -11
  23. argo_workflows/model/{io_argoproj_events_v1alpha1_azure_events_hub_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_events_hub_event_source.py} +8 -8
  24. argo_workflows/model/{io_argoproj_events_v1alpha1_azure_queue_storage_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_queue_storage_event_source.py} +8 -8
  25. argo_workflows/model/{io_argoproj_events_v1alpha1_azure_service_bus_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_service_bus_event_source.py} +13 -13
  26. argo_workflows/model/{io_argoproj_events_v1alpha1_azure_service_bus_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_service_bus_trigger.py} +16 -16
  27. argo_workflows/model/{io_argoproj_events_v1alpha1_backoff.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_backoff.py} +16 -16
  28. argo_workflows/model/{io_argoproj_events_v1alpha1_git_creds.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_basic_auth.py} +3 -3
  29. argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_auth.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_auth.py} +8 -8
  30. argo_workflows/model/{io_argoproj_events_v1alpha1_basic_auth.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_basic_auth.py} +3 -3
  31. argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_event_source.py} +23 -23
  32. argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_repository.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_repository.py} +3 -3
  33. argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_server_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_server_event_source.py} +41 -25
  34. argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_server_repository.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_server_repository.py} +7 -7
  35. argo_workflows/model/{io_argoproj_events_v1alpha1_calendar_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_calendar_event_source.py} +13 -13
  36. argo_workflows/model/{io_argoproj_events_v1alpha1_catchup_configuration.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_catchup_configuration.py} +3 -3
  37. argo_workflows/model/{io_argoproj_events_v1alpha1_condition.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_condition.py} +3 -3
  38. argo_workflows/model/{io_argoproj_events_v1alpha1_conditions_reset_by_time.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_conditions_reset_by_time.py} +3 -3
  39. argo_workflows/model/{io_argoproj_events_v1alpha1_conditions_reset_criteria.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_conditions_reset_criteria.py} +8 -8
  40. argo_workflows/model/{io_argoproj_events_v1alpha1_config_map_persistence.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_config_map_persistence.py} +3 -3
  41. argo_workflows/model/github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_container.py +289 -0
  42. argo_workflows/model/{io_argoproj_events_v1alpha1_custom_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_custom_trigger.py} +11 -11
  43. argo_workflows/model/{io_argoproj_events_v1alpha1_data_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_data_filter.py} +3 -3
  44. argo_workflows/model/{io_argoproj_events_v1alpha1_email_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_email_trigger.py} +8 -8
  45. argo_workflows/model/{io_argoproj_events_v1alpha1_emitter_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_emitter_event_source.py} +18 -18
  46. argo_workflows/model/{io_argoproj_events_v1alpha1_event_context.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_context.py} +3 -3
  47. argo_workflows/model/{io_argoproj_events_v1alpha1_event_dependency.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_dependency.py} +13 -13
  48. argo_workflows/model/{io_argoproj_events_v1alpha1_event_dependency_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_dependency_filter.py} +23 -23
  49. argo_workflows/model/{io_argoproj_events_v1alpha1_event_dependency_transformer.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_dependency_transformer.py} +3 -3
  50. argo_workflows/model/{io_argoproj_events_v1alpha1_event_persistence.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_persistence.py} +13 -13
  51. argo_workflows/model/{io_argoproj_events_v1alpha1_sensor.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source.py} +13 -13
  52. argo_workflows/model/{io_argoproj_events_v1alpha1_event_source_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source_filter.py} +3 -3
  53. argo_workflows/model/{io_argoproj_events_v1alpha1_sensor_list.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source_list.py} +8 -8
  54. argo_workflows/model/github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source_spec.py +461 -0
  55. argo_workflows/model/{io_argoproj_events_v1alpha1_event_source_status.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source_status.py} +8 -8
  56. argo_workflows/model/{io_argoproj_events_v1alpha1_expr_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_expr_filter.py} +8 -8
  57. argo_workflows/model/{io_argoproj_events_v1alpha1_file_artifact.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_file_artifact.py} +3 -3
  58. argo_workflows/model/{io_argoproj_events_v1alpha1_file_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_file_event_source.py} +13 -13
  59. argo_workflows/model/{io_argoproj_events_v1alpha1_generic_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_generic_event_source.py} +8 -8
  60. argo_workflows/model/{io_argoproj_events_v1alpha1_gerrit_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_gerrit_event_source.py} +18 -18
  61. argo_workflows/model/{io_argoproj_events_v1alpha1_git_artifact.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_git_artifact.py} +13 -13
  62. argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_basic_auth.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_git_creds.py} +3 -3
  63. argo_workflows/model/{io_argoproj_events_v1alpha1_git_remote_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_git_remote_config.py} +3 -3
  64. argo_workflows/model/{io_argoproj_events_v1alpha1_github_app_creds.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_github_app_creds.py} +3 -3
  65. argo_workflows/model/{io_argoproj_events_v1alpha1_github_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_github_event_source.py} +23 -23
  66. argo_workflows/model/{io_argoproj_events_v1alpha1_gitlab_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_gitlab_event_source.py} +13 -13
  67. argo_workflows/model/{io_argoproj_events_v1alpha1_hdfs_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_hdfs_event_source.py} +13 -13
  68. argo_workflows/model/{io_argoproj_events_v1alpha1_http_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_http_trigger.py} +26 -26
  69. argo_workflows/model/{io_argoproj_events_v1alpha1_int64_or_string.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_int64_or_string.py} +3 -3
  70. argo_workflows/model/{io_argoproj_events_v1alpha1_amount.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_k8_s_resource.py} +3 -3
  71. argo_workflows/model/{io_argoproj_events_v1alpha1_k8_s_resource_policy.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_k8_s_resource_policy.py} +8 -8
  72. argo_workflows/model/{io_argoproj_events_v1alpha1_kafka_consumer_group.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_kafka_consumer_group.py} +3 -3
  73. argo_workflows/model/{io_argoproj_events_v1alpha1_kafka_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_kafka_event_source.py} +30 -30
  74. argo_workflows/model/{io_argoproj_events_v1alpha1_kafka_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_kafka_trigger.py} +38 -28
  75. argo_workflows/model/{io_argoproj_events_v1alpha1_log_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_log_trigger.py} +3 -3
  76. argo_workflows/model/{io_argoproj_events_v1alpha1_metadata.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_metadata.py} +3 -3
  77. argo_workflows/model/{io_argoproj_events_v1alpha1_mqtt_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_mqtt_event_source.py} +23 -23
  78. argo_workflows/model/{io_argoproj_events_v1alpha1_nats_auth.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_nats_auth.py} +8 -8
  79. argo_workflows/model/{io_argoproj_events_v1alpha1_nats_events_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_nats_events_source.py} +27 -23
  80. argo_workflows/model/{io_argoproj_events_v1alpha1_nats_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_nats_trigger.py} +22 -16
  81. argo_workflows/model/{io_argoproj_events_v1alpha1_nsq_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_nsq_event_source.py} +18 -18
  82. argo_workflows/model/{io_argoproj_events_v1alpha1_open_whisk_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_open_whisk_trigger.py} +11 -11
  83. argo_workflows/model/{io_argoproj_events_v1alpha1_owned_repositories.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_owned_repositories.py} +3 -3
  84. argo_workflows/model/{io_argoproj_events_v1alpha1_payload_field.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_payload_field.py} +3 -3
  85. argo_workflows/model/{io_argoproj_events_v1alpha1_pub_sub_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_pub_sub_event_source.py} +8 -8
  86. argo_workflows/model/{io_argoproj_events_v1alpha1_pulsar_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_pulsar_event_source.py} +18 -18
  87. argo_workflows/model/{io_argoproj_events_v1alpha1_pulsar_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_pulsar_trigger.py} +21 -21
  88. argo_workflows/model/{io_argoproj_events_v1alpha1_rate_limit.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_rate_limit.py} +3 -3
  89. argo_workflows/model/{io_argoproj_events_v1alpha1_redis_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_redis_event_source.py} +13 -13
  90. argo_workflows/model/{io_argoproj_events_v1alpha1_redis_stream_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_redis_stream_event_source.py} +13 -13
  91. argo_workflows/model/{io_argoproj_events_v1alpha1_resource_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_resource_event_source.py} +8 -8
  92. argo_workflows/model/{io_argoproj_events_v1alpha1_resource_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_resource_filter.py} +11 -11
  93. argo_workflows/model/{io_argoproj_events_v1alpha1_s3_artifact.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_s3_artifact.py} +13 -13
  94. argo_workflows/model/{io_argoproj_events_v1alpha1_s3_bucket.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_s3_bucket.py} +3 -3
  95. argo_workflows/model/{io_argoproj_events_v1alpha1_s3_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_s3_filter.py} +3 -3
  96. argo_workflows/model/{io_argoproj_events_v1alpha1_sasl_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sasl_config.py} +3 -3
  97. argo_workflows/model/{io_argoproj_events_v1alpha1_schema_registry_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_schema_registry_config.py} +8 -8
  98. argo_workflows/model/{io_argoproj_events_v1alpha1_secure_header.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_secure_header.py} +8 -8
  99. argo_workflows/model/{io_argoproj_events_v1alpha1_selector.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_selector.py} +3 -3
  100. argo_workflows/model/{io_argoproj_events_v1alpha1_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor.py} +13 -13
  101. argo_workflows/model/{io_argoproj_events_v1alpha1_event_source_list.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor_list.py} +8 -8
  102. argo_workflows/model/{io_argoproj_events_v1alpha1_sensor_spec.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor_spec.py} +18 -18
  103. argo_workflows/model/{io_argoproj_events_v1alpha1_sensor_status.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor_status.py} +8 -8
  104. argo_workflows/model/{io_argoproj_events_v1alpha1_service.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_service.py} +9 -3
  105. argo_workflows/model/{io_argoproj_events_v1alpha1_sftp_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sftp_event_source.py} +13 -13
  106. argo_workflows/model/{io_argoproj_events_v1alpha1_slack_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_slack_event_source.py} +13 -13
  107. argo_workflows/model/{io_argoproj_events_v1alpha1_slack_sender.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_slack_sender.py} +3 -3
  108. argo_workflows/model/{io_argoproj_events_v1alpha1_slack_thread.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_slack_thread.py} +3 -3
  109. argo_workflows/model/{io_argoproj_events_v1alpha1_slack_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_slack_trigger.py} +18 -18
  110. argo_workflows/model/{io_argoproj_events_v1alpha1_sns_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sns_event_source.py} +13 -13
  111. argo_workflows/model/{io_argoproj_events_v1alpha1_sqs_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sqs_event_source.py} +8 -8
  112. argo_workflows/model/{io_argoproj_events_v1alpha1_standard_k8_s_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_standard_k8_s_trigger.py} +13 -13
  113. argo_workflows/model/{io_argoproj_events_v1alpha1_status.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_status.py} +8 -8
  114. argo_workflows/model/{io_argoproj_events_v1alpha1_status_policy.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_status_policy.py} +3 -3
  115. argo_workflows/model/{io_argoproj_events_v1alpha1_storage_grid_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_storage_grid_event_source.py} +13 -13
  116. argo_workflows/model/{io_argoproj_events_v1alpha1_storage_grid_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_storage_grid_filter.py} +3 -3
  117. argo_workflows/model/{io_argoproj_events_v1alpha1_stripe_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_stripe_event_source.py} +8 -8
  118. argo_workflows/model/{io_argoproj_events_v1alpha1_template.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_template.py} +13 -13
  119. argo_workflows/model/{io_argoproj_events_v1alpha1_time_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_time_filter.py} +3 -3
  120. argo_workflows/model/{io_argoproj_events_v1alpha1_tls_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_tls_config.py} +3 -3
  121. argo_workflows/model/{io_argoproj_events_v1alpha1_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger.py} +34 -30
  122. argo_workflows/model/{io_argoproj_events_v1alpha1_trigger_parameter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger_parameter.py} +8 -8
  123. argo_workflows/model/{io_argoproj_events_v1alpha1_trigger_parameter_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger_parameter_source.py} +3 -3
  124. argo_workflows/model/{io_argoproj_events_v1alpha1_trigger_policy.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger_policy.py} +13 -13
  125. argo_workflows/model/{io_argoproj_events_v1alpha1_trigger_template.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger_template.py} +80 -80
  126. argo_workflows/model/{io_argoproj_events_v1alpha1_url_artifact.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_url_artifact.py} +3 -3
  127. argo_workflows/model/{io_argoproj_events_v1alpha1_value_from_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_value_from_source.py} +3 -3
  128. argo_workflows/model/{io_argoproj_events_v1alpha1_watch_path_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_watch_path_config.py} +3 -3
  129. argo_workflows/model/{io_argoproj_events_v1alpha1_webhook_context.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_webhook_context.py} +3 -3
  130. argo_workflows/model/{io_argoproj_events_v1alpha1_webhook_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_webhook_event_source.py} +13 -13
  131. argo_workflows/model/image_volume_source.py +259 -0
  132. argo_workflows/model/persistent_volume_claim_condition.py +4 -4
  133. argo_workflows/model/persistent_volume_claim_spec.py +2 -2
  134. argo_workflows/model/persistent_volume_claim_status.py +2 -2
  135. argo_workflows/model/pod_affinity_term.py +4 -4
  136. argo_workflows/model/pod_dns_config_option.py +4 -4
  137. argo_workflows/model/pod_security_context.py +10 -2
  138. argo_workflows/model/projected_volume_source.py +2 -2
  139. argo_workflows/model/resource_claim.py +4 -0
  140. argo_workflows/model/security_context.py +2 -2
  141. argo_workflows/model/sensor_create_sensor_request.py +5 -5
  142. argo_workflows/model/sensor_sensor_watch_event.py +5 -5
  143. argo_workflows/model/sensor_update_sensor_request.py +5 -5
  144. argo_workflows/model/volume.py +6 -0
  145. argo_workflows/models/__init__.py +119 -117
  146. {argo_workflows-6.6.2.dist-info → argo_workflows-6.6.6.dist-info}/METADATA +10 -2
  147. {argo_workflows-6.6.2.dist-info → argo_workflows-6.6.6.dist-info}/RECORD +150 -148
  148. {argo_workflows-6.6.2.dist-info → argo_workflows-6.6.6.dist-info}/WHEEL +1 -1
  149. argo_workflows/model/io_argoproj_events_v1alpha1_event_source_spec.py +0 -461
  150. {argo_workflows-6.6.2.dist-info → argo_workflows-6.6.6.dist-info/licenses}/LICENSE +0 -0
  151. {argo_workflows-6.6.2.dist-info → argo_workflows-6.6.6.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,259 @@
1
+ """
2
+ Argo Workflows API
3
+
4
+ Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. For more information, please see https://argo-workflows.readthedocs.io/en/latest/ # noqa: E501
5
+
6
+ The version of the OpenAPI document: VERSION
7
+ Generated by: https://openapi-generator.tech
8
+ """
9
+
10
+
11
+ import re # noqa: F401
12
+ import sys # noqa: F401
13
+
14
+ from argo_workflows.model_utils import ( # noqa: F401
15
+ ApiTypeError,
16
+ ModelComposed,
17
+ ModelNormal,
18
+ ModelSimple,
19
+ cached_property,
20
+ change_keys_js_to_python,
21
+ convert_js_args_to_python_args,
22
+ date,
23
+ datetime,
24
+ file_type,
25
+ none_type,
26
+ validate_get_composed_info,
27
+ OpenApiModel
28
+ )
29
+ from argo_workflows.exceptions import ApiAttributeError
30
+
31
+
32
+
33
+ class ImageVolumeSource(ModelNormal):
34
+ """NOTE: This class is auto generated by OpenAPI Generator.
35
+ Ref: https://openapi-generator.tech
36
+
37
+ Do not edit the class manually.
38
+
39
+ Attributes:
40
+ allowed_values (dict): The key is the tuple path to the attribute
41
+ and the for var_name this is (var_name,). The value is a dict
42
+ with a capitalized key describing the allowed value and an allowed
43
+ value. These dicts store the allowed enum values.
44
+ attribute_map (dict): The key is attribute name
45
+ and the value is json key in definition.
46
+ discriminator_value_class_map (dict): A dict to go from the discriminator
47
+ variable value to the discriminator class name.
48
+ validations (dict): The key is the tuple path to the attribute
49
+ and the for var_name this is (var_name,). The value is a dict
50
+ that stores validations for max_length, min_length, max_items,
51
+ min_items, exclusive_maximum, inclusive_maximum, exclusive_minimum,
52
+ inclusive_minimum, and regex.
53
+ additional_properties_type (tuple): A tuple of classes accepted
54
+ as additional properties values.
55
+ """
56
+
57
+ allowed_values = {
58
+ }
59
+
60
+ validations = {
61
+ }
62
+
63
+ @cached_property
64
+ def additional_properties_type():
65
+ """
66
+ This must be a method because a model may have properties that are
67
+ of type self, this must run after the class is loaded
68
+ """
69
+ return (bool, date, datetime, dict, float, int, list, str, none_type,) # noqa: E501
70
+
71
+ _nullable = False
72
+
73
+ @cached_property
74
+ def openapi_types():
75
+ """
76
+ This must be a method because a model may have properties that are
77
+ of type self, this must run after the class is loaded
78
+
79
+ Returns
80
+ openapi_types (dict): The key is attribute name
81
+ and the value is attribute type.
82
+ """
83
+ return {
84
+ 'pull_policy': (str,), # noqa: E501
85
+ 'reference': (str,), # noqa: E501
86
+ }
87
+
88
+ @cached_property
89
+ def discriminator():
90
+ return None
91
+
92
+
93
+ attribute_map = {
94
+ 'pull_policy': 'pullPolicy', # noqa: E501
95
+ 'reference': 'reference', # noqa: E501
96
+ }
97
+
98
+ read_only_vars = {
99
+ }
100
+
101
+ _composed_schemas = {}
102
+
103
+ @classmethod
104
+ @convert_js_args_to_python_args
105
+ def _from_openapi_data(cls, *args, **kwargs): # noqa: E501
106
+ """ImageVolumeSource - a model defined in OpenAPI
107
+
108
+ Keyword Args:
109
+ _check_type (bool): if True, values for parameters in openapi_types
110
+ will be type checked and a TypeError will be
111
+ raised if the wrong type is input.
112
+ Defaults to True
113
+ _path_to_item (tuple/list): This is a list of keys or values to
114
+ drill down to the model in received_data
115
+ when deserializing a response
116
+ _spec_property_naming (bool): True if the variable names in the input data
117
+ are serialized names, as specified in the OpenAPI document.
118
+ False if the variable names in the input data
119
+ are pythonic names, e.g. snake case (default)
120
+ _configuration (Configuration): the instance to use when
121
+ deserializing a file_type parameter.
122
+ If passed, type conversion is attempted
123
+ If omitted no type conversion is done.
124
+ _visited_composed_classes (tuple): This stores a tuple of
125
+ classes that we have traveled through so that
126
+ if we see that class again we will not use its
127
+ discriminator again.
128
+ When traveling through a discriminator, the
129
+ composed schema that is
130
+ is traveled through is added to this set.
131
+ For example if Animal has a discriminator
132
+ petType and we pass in "Dog", and the class Dog
133
+ allOf includes Animal, we move through Animal
134
+ once using the discriminator, and pick Dog.
135
+ Then in Dog, we will make an instance of the
136
+ Animal class but this time we won't travel
137
+ through its discriminator because we passed in
138
+ _visited_composed_classes = (Animal,)
139
+ pull_policy (str): Policy for pulling OCI objects. Possible values are: Always: the kubelet always attempts to pull the reference. Container creation will fail If the pull fails. Never: the kubelet never pulls the reference and only uses a local image or artifact. Container creation will fail if the reference isn't present. IfNotPresent: the kubelet pulls if the reference isn't already present on disk. Container creation will fail if the reference isn't present and the pull fails. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise.. [optional] # noqa: E501
140
+ reference (str): Required: Image or artifact reference to be used. Behaves in the same way as pod.spec.containers[*].image. Pull secrets will be assembled in the same way as for the container image by looking up node credentials, SA image pull secrets, and pod spec image pull secrets. More info: https://kubernetes.io/docs/concepts/containers/images This field is optional to allow higher level config management to default or override container images in workload controllers like Deployments and StatefulSets.. [optional] # noqa: E501
141
+ """
142
+
143
+ _check_type = kwargs.pop('_check_type', True)
144
+ _spec_property_naming = kwargs.pop('_spec_property_naming', False)
145
+ _path_to_item = kwargs.pop('_path_to_item', ())
146
+ _configuration = kwargs.pop('_configuration', None)
147
+ _visited_composed_classes = kwargs.pop('_visited_composed_classes', ())
148
+
149
+ self = super(OpenApiModel, cls).__new__(cls)
150
+
151
+ if args:
152
+ raise ApiTypeError(
153
+ "Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % (
154
+ args,
155
+ self.__class__.__name__,
156
+ ),
157
+ path_to_item=_path_to_item,
158
+ valid_classes=(self.__class__,),
159
+ )
160
+
161
+ self._data_store = {}
162
+ self._check_type = _check_type
163
+ self._spec_property_naming = _spec_property_naming
164
+ self._path_to_item = _path_to_item
165
+ self._configuration = _configuration
166
+ self._visited_composed_classes = _visited_composed_classes + (self.__class__,)
167
+
168
+ for var_name, var_value in kwargs.items():
169
+ if var_name not in self.attribute_map and \
170
+ self._configuration is not None and \
171
+ self._configuration.discard_unknown_keys and \
172
+ self.additional_properties_type is None:
173
+ # discard variable.
174
+ continue
175
+ setattr(self, var_name, var_value)
176
+ return self
177
+
178
+ required_properties = set([
179
+ '_data_store',
180
+ '_check_type',
181
+ '_spec_property_naming',
182
+ '_path_to_item',
183
+ '_configuration',
184
+ '_visited_composed_classes',
185
+ ])
186
+
187
+ @convert_js_args_to_python_args
188
+ def __init__(self, *args, **kwargs): # noqa: E501
189
+ """ImageVolumeSource - a model defined in OpenAPI
190
+
191
+ Keyword Args:
192
+ _check_type (bool): if True, values for parameters in openapi_types
193
+ will be type checked and a TypeError will be
194
+ raised if the wrong type is input.
195
+ Defaults to True
196
+ _path_to_item (tuple/list): This is a list of keys or values to
197
+ drill down to the model in received_data
198
+ when deserializing a response
199
+ _spec_property_naming (bool): True if the variable names in the input data
200
+ are serialized names, as specified in the OpenAPI document.
201
+ False if the variable names in the input data
202
+ are pythonic names, e.g. snake case (default)
203
+ _configuration (Configuration): the instance to use when
204
+ deserializing a file_type parameter.
205
+ If passed, type conversion is attempted
206
+ If omitted no type conversion is done.
207
+ _visited_composed_classes (tuple): This stores a tuple of
208
+ classes that we have traveled through so that
209
+ if we see that class again we will not use its
210
+ discriminator again.
211
+ When traveling through a discriminator, the
212
+ composed schema that is
213
+ is traveled through is added to this set.
214
+ For example if Animal has a discriminator
215
+ petType and we pass in "Dog", and the class Dog
216
+ allOf includes Animal, we move through Animal
217
+ once using the discriminator, and pick Dog.
218
+ Then in Dog, we will make an instance of the
219
+ Animal class but this time we won't travel
220
+ through its discriminator because we passed in
221
+ _visited_composed_classes = (Animal,)
222
+ pull_policy (str): Policy for pulling OCI objects. Possible values are: Always: the kubelet always attempts to pull the reference. Container creation will fail If the pull fails. Never: the kubelet never pulls the reference and only uses a local image or artifact. Container creation will fail if the reference isn't present. IfNotPresent: the kubelet pulls if the reference isn't already present on disk. Container creation will fail if the reference isn't present and the pull fails. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise.. [optional] # noqa: E501
223
+ reference (str): Required: Image or artifact reference to be used. Behaves in the same way as pod.spec.containers[*].image. Pull secrets will be assembled in the same way as for the container image by looking up node credentials, SA image pull secrets, and pod spec image pull secrets. More info: https://kubernetes.io/docs/concepts/containers/images This field is optional to allow higher level config management to default or override container images in workload controllers like Deployments and StatefulSets.. [optional] # noqa: E501
224
+ """
225
+
226
+ _check_type = kwargs.pop('_check_type', True)
227
+ _spec_property_naming = kwargs.pop('_spec_property_naming', False)
228
+ _path_to_item = kwargs.pop('_path_to_item', ())
229
+ _configuration = kwargs.pop('_configuration', None)
230
+ _visited_composed_classes = kwargs.pop('_visited_composed_classes', ())
231
+
232
+ if args:
233
+ raise ApiTypeError(
234
+ "Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % (
235
+ args,
236
+ self.__class__.__name__,
237
+ ),
238
+ path_to_item=_path_to_item,
239
+ valid_classes=(self.__class__,),
240
+ )
241
+
242
+ self._data_store = {}
243
+ self._check_type = _check_type
244
+ self._spec_property_naming = _spec_property_naming
245
+ self._path_to_item = _path_to_item
246
+ self._configuration = _configuration
247
+ self._visited_composed_classes = _visited_composed_classes + (self.__class__,)
248
+
249
+ for var_name, var_value in kwargs.items():
250
+ if var_name not in self.attribute_map and \
251
+ self._configuration is not None and \
252
+ self._configuration.discard_unknown_keys and \
253
+ self.additional_properties_type is None:
254
+ # discard variable.
255
+ continue
256
+ setattr(self, var_name, var_value)
257
+ if var_name in self.read_only_vars:
258
+ raise ApiAttributeError(f"`{var_name}` is a read-only attribute. Use `from_openapi_data` to instantiate "
259
+ f"class with read only attributes.")
@@ -114,8 +114,8 @@ class PersistentVolumeClaimCondition(ModelNormal):
114
114
  """PersistentVolumeClaimCondition - a model defined in OpenAPI
115
115
 
116
116
  Args:
117
- status (str):
118
- type (str):
117
+ status (str): Status is the status of the condition. Can be True, False, Unknown. More info: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/persistent-volume-claim-v1/#:~:text=state%20of%20pvc-,conditions.status,-(string)%2C%20required
118
+ type (str): Type is the type of the condition. More info: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/persistent-volume-claim-v1/#:~:text=set%20to%20%27ResizeStarted%27.-,PersistentVolumeClaimCondition,-contains%20details%20about
119
119
 
120
120
  Keyword Args:
121
121
  _check_type (bool): if True, values for parameters in openapi_types
@@ -205,8 +205,8 @@ class PersistentVolumeClaimCondition(ModelNormal):
205
205
  """PersistentVolumeClaimCondition - a model defined in OpenAPI
206
206
 
207
207
  Args:
208
- status (str):
209
- type (str):
208
+ status (str): Status is the status of the condition. Can be True, False, Unknown. More info: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/persistent-volume-claim-v1/#:~:text=state%20of%20pvc-,conditions.status,-(string)%2C%20required
209
+ type (str): Type is the type of the condition. More info: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/persistent-volume-claim-v1/#:~:text=set%20to%20%27ResizeStarted%27.-,PersistentVolumeClaimCondition,-contains%20details%20about
210
210
 
211
211
  Keyword Args:
212
212
  _check_type (bool): if True, values for parameters in openapi_types
@@ -168,7 +168,7 @@ class PersistentVolumeClaimSpec(ModelNormal):
168
168
  resources (VolumeResourceRequirements): [optional] # noqa: E501
169
169
  selector (LabelSelector): [optional] # noqa: E501
170
170
  storage_class_name (str): storageClassName is the name of the StorageClass required by the claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#class-1. [optional] # noqa: E501
171
- volume_attributes_class_name (str): volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (Alpha) Using this field requires the VolumeAttributesClass feature gate to be enabled.. [optional] # noqa: E501
171
+ volume_attributes_class_name (str): volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default).. [optional] # noqa: E501
172
172
  volume_mode (str): volumeMode defines what type of volume is required by the claim. Value of Filesystem is implied when not included in claim spec.. [optional] # noqa: E501
173
173
  volume_name (str): volumeName is the binding reference to the PersistentVolume backing this claim.. [optional] # noqa: E501
174
174
  """
@@ -258,7 +258,7 @@ class PersistentVolumeClaimSpec(ModelNormal):
258
258
  resources (VolumeResourceRequirements): [optional] # noqa: E501
259
259
  selector (LabelSelector): [optional] # noqa: E501
260
260
  storage_class_name (str): storageClassName is the name of the StorageClass required by the claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#class-1. [optional] # noqa: E501
261
- volume_attributes_class_name (str): volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (Alpha) Using this field requires the VolumeAttributesClass feature gate to be enabled.. [optional] # noqa: E501
261
+ volume_attributes_class_name (str): volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default).. [optional] # noqa: E501
262
262
  volume_mode (str): volumeMode defines what type of volume is required by the claim. Value of Filesystem is implied when not included in claim spec.. [optional] # noqa: E501
263
263
  volume_name (str): volumeName is the binding reference to the PersistentVolume backing this claim.. [optional] # noqa: E501
264
264
  """
@@ -161,7 +161,7 @@ class PersistentVolumeClaimStatus(ModelNormal):
161
161
  allocated_resources ({str: (str,)}): allocatedResources tracks the resources allocated to a PVC including its capacity. Key names follow standard Kubernetes label syntax. Valid values are either: * Un-prefixed keys: - storage - the capacity of the volume. * Custom resources must use implementation-defined prefixed names such as \"example.com/my-custom-resource\" Apart from above values - keys that are unprefixed or have kubernetes.io prefix are considered reserved and hence may not be used. Capacity reported here may be larger than the actual capacity when a volume expansion operation is requested. For storage quota, the larger value from allocatedResources and PVC.spec.resources is used. If allocatedResources is not set, PVC.spec.resources alone is used for quota calculation. If a volume expansion capacity request is lowered, allocatedResources is only lowered if there are no expansion operations in progress and if the actual volume capacity is equal or lower than the requested capacity. A controller that receives PVC update with previously unknown resourceName should ignore the update for the purpose it was designed. For example - a controller that only is responsible for resizing capacity of the volume, should ignore PVC updates that change other valid resources associated with PVC. This is an alpha field and requires enabling RecoverVolumeExpansionFailure feature.. [optional] # noqa: E501
162
162
  capacity ({str: (str,)}): capacity represents the actual resources of the underlying volume.. [optional] # noqa: E501
163
163
  conditions ([PersistentVolumeClaimCondition]): conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'Resizing'.. [optional] # noqa: E501
164
- current_volume_attributes_class_name (str): currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is an alpha field and requires enabling VolumeAttributesClass feature.. [optional] # noqa: E501
164
+ current_volume_attributes_class_name (str): currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is a beta field and requires enabling VolumeAttributesClass feature (off by default).. [optional] # noqa: E501
165
165
  modify_volume_status (ModifyVolumeStatus): [optional] # noqa: E501
166
166
  phase (str): phase represents the current phase of PersistentVolumeClaim.. [optional] # noqa: E501
167
167
  """
@@ -250,7 +250,7 @@ class PersistentVolumeClaimStatus(ModelNormal):
250
250
  allocated_resources ({str: (str,)}): allocatedResources tracks the resources allocated to a PVC including its capacity. Key names follow standard Kubernetes label syntax. Valid values are either: * Un-prefixed keys: - storage - the capacity of the volume. * Custom resources must use implementation-defined prefixed names such as \"example.com/my-custom-resource\" Apart from above values - keys that are unprefixed or have kubernetes.io prefix are considered reserved and hence may not be used. Capacity reported here may be larger than the actual capacity when a volume expansion operation is requested. For storage quota, the larger value from allocatedResources and PVC.spec.resources is used. If allocatedResources is not set, PVC.spec.resources alone is used for quota calculation. If a volume expansion capacity request is lowered, allocatedResources is only lowered if there are no expansion operations in progress and if the actual volume capacity is equal or lower than the requested capacity. A controller that receives PVC update with previously unknown resourceName should ignore the update for the purpose it was designed. For example - a controller that only is responsible for resizing capacity of the volume, should ignore PVC updates that change other valid resources associated with PVC. This is an alpha field and requires enabling RecoverVolumeExpansionFailure feature.. [optional] # noqa: E501
251
251
  capacity ({str: (str,)}): capacity represents the actual resources of the underlying volume.. [optional] # noqa: E501
252
252
  conditions ([PersistentVolumeClaimCondition]): conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'Resizing'.. [optional] # noqa: E501
253
- current_volume_attributes_class_name (str): currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is an alpha field and requires enabling VolumeAttributesClass feature.. [optional] # noqa: E501
253
+ current_volume_attributes_class_name (str): currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is a beta field and requires enabling VolumeAttributesClass feature (off by default).. [optional] # noqa: E501
254
254
  modify_volume_status (ModifyVolumeStatus): [optional] # noqa: E501
255
255
  phase (str): phase represents the current phase of PersistentVolumeClaim.. [optional] # noqa: E501
256
256
  """
@@ -154,8 +154,8 @@ class PodAffinityTerm(ModelNormal):
154
154
  through its discriminator because we passed in
155
155
  _visited_composed_classes = (Animal,)
156
156
  label_selector (LabelSelector): [optional] # noqa: E501
157
- match_label_keys ([str]): MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.. [optional] # noqa: E501
158
- mismatch_label_keys ([str]): MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.. [optional] # noqa: E501
157
+ match_label_keys ([str]): MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is a beta field and requires enabling MatchLabelKeysInPodAffinity feature gate (enabled by default).. [optional] # noqa: E501
158
+ mismatch_label_keys ([str]): MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is a beta field and requires enabling MatchLabelKeysInPodAffinity feature gate (enabled by default).. [optional] # noqa: E501
159
159
  namespace_selector (LabelSelector): [optional] # noqa: E501
160
160
  namespaces ([str]): namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means \"this pod's namespace\".. [optional] # noqa: E501
161
161
  """
@@ -244,8 +244,8 @@ class PodAffinityTerm(ModelNormal):
244
244
  through its discriminator because we passed in
245
245
  _visited_composed_classes = (Animal,)
246
246
  label_selector (LabelSelector): [optional] # noqa: E501
247
- match_label_keys ([str]): MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.. [optional] # noqa: E501
248
- mismatch_label_keys ([str]): MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.. [optional] # noqa: E501
247
+ match_label_keys ([str]): MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is a beta field and requires enabling MatchLabelKeysInPodAffinity feature gate (enabled by default).. [optional] # noqa: E501
248
+ mismatch_label_keys ([str]): MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is a beta field and requires enabling MatchLabelKeysInPodAffinity feature gate (enabled by default).. [optional] # noqa: E501
249
249
  namespace_selector (LabelSelector): [optional] # noqa: E501
250
250
  namespaces ([str]): namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means \"this pod's namespace\".. [optional] # noqa: E501
251
251
  """
@@ -136,8 +136,8 @@ class PodDNSConfigOption(ModelNormal):
136
136
  Animal class but this time we won't travel
137
137
  through its discriminator because we passed in
138
138
  _visited_composed_classes = (Animal,)
139
- name (str): Required.. [optional] # noqa: E501
140
- value (str): [optional] # noqa: E501
139
+ name (str): Name is this DNS resolver option's name. Required.. [optional] # noqa: E501
140
+ value (str): Value is this DNS resolver option's value.. [optional] # noqa: E501
141
141
  """
142
142
 
143
143
  _check_type = kwargs.pop('_check_type', True)
@@ -219,8 +219,8 @@ class PodDNSConfigOption(ModelNormal):
219
219
  Animal class but this time we won't travel
220
220
  through its discriminator because we passed in
221
221
  _visited_composed_classes = (Animal,)
222
- name (str): Required.. [optional] # noqa: E501
223
- value (str): [optional] # noqa: E501
222
+ name (str): Name is this DNS resolver option's name. Required.. [optional] # noqa: E501
223
+ value (str): Value is this DNS resolver option's value.. [optional] # noqa: E501
224
224
  """
225
225
 
226
226
  _check_type = kwargs.pop('_check_type', True)
@@ -101,9 +101,11 @@ class PodSecurityContext(ModelNormal):
101
101
  'run_as_group': (int,), # noqa: E501
102
102
  'run_as_non_root': (bool,), # noqa: E501
103
103
  'run_as_user': (int,), # noqa: E501
104
+ 'se_linux_change_policy': (str,), # noqa: E501
104
105
  'se_linux_options': (SELinuxOptions,), # noqa: E501
105
106
  'seccomp_profile': (SeccompProfile,), # noqa: E501
106
107
  'supplemental_groups': ([int],), # noqa: E501
108
+ 'supplemental_groups_policy': (str,), # noqa: E501
107
109
  'sysctls': ([Sysctl],), # noqa: E501
108
110
  'windows_options': (WindowsSecurityContextOptions,), # noqa: E501
109
111
  }
@@ -120,9 +122,11 @@ class PodSecurityContext(ModelNormal):
120
122
  'run_as_group': 'runAsGroup', # noqa: E501
121
123
  'run_as_non_root': 'runAsNonRoot', # noqa: E501
122
124
  'run_as_user': 'runAsUser', # noqa: E501
125
+ 'se_linux_change_policy': 'seLinuxChangePolicy', # noqa: E501
123
126
  'se_linux_options': 'seLinuxOptions', # noqa: E501
124
127
  'seccomp_profile': 'seccompProfile', # noqa: E501
125
128
  'supplemental_groups': 'supplementalGroups', # noqa: E501
129
+ 'supplemental_groups_policy': 'supplementalGroupsPolicy', # noqa: E501
126
130
  'sysctls': 'sysctls', # noqa: E501
127
131
  'windows_options': 'windowsOptions', # noqa: E501
128
132
  }
@@ -174,9 +178,11 @@ class PodSecurityContext(ModelNormal):
174
178
  run_as_group (int): The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
175
179
  run_as_non_root (bool): Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.. [optional] # noqa: E501
176
180
  run_as_user (int): The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
181
+ se_linux_change_policy (str): seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod. It has no effect on nodes that do not support SELinux or to volumes does not support SELinux. Valid values are \"MountOption\" and \"Recursive\". \"Recursive\" means relabeling of all files on all Pod volumes by the container runtime. This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node. \"MountOption\" mounts all eligible Pod volumes with `-o context` mount option. This requires all Pods that share the same volume to use the same SELinux label. It is not possible to share the same volume among privileged and unprivileged Pods. Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their CSIDriver instance. Other volumes are always re-labelled recursively. \"MountOption\" value is allowed only when SELinuxMount feature gate is enabled. If not specified and SELinuxMount feature gate is enabled, \"MountOption\" is used. If not specified and SELinuxMount feature gate is disabled, \"MountOption\" is used for ReadWriteOncePod volumes and \"Recursive\" for all other volumes. This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers. All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
177
182
  se_linux_options (SELinuxOptions): [optional] # noqa: E501
178
183
  seccomp_profile (SeccompProfile): [optional] # noqa: E501
179
- supplemental_groups ([int]): A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
184
+ supplemental_groups ([int]): A list of groups applied to the first process run in each container, in addition to the container's primary GID and fsGroup (if specified). If the SupplementalGroupsPolicy feature is enabled, the supplementalGroupsPolicy field determines whether these are in addition to or instead of any group memberships defined in the container image. If unspecified, no additional groups are added, though group memberships defined in the container image may still be used, depending on the supplementalGroupsPolicy field. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
185
+ supplemental_groups_policy (str): Defines how supplemental groups of the first container processes are calculated. Valid values are \"Merge\" and \"Strict\". If not specified, \"Merge\" is used. (Alpha) Using the field requires the SupplementalGroupsPolicy feature gate to be enabled and the container runtime must implement support for this feature. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
180
186
  sysctls ([Sysctl]): Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
181
187
  windows_options (WindowsSecurityContextOptions): [optional] # noqa: E501
182
188
  """
@@ -266,9 +272,11 @@ class PodSecurityContext(ModelNormal):
266
272
  run_as_group (int): The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
267
273
  run_as_non_root (bool): Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.. [optional] # noqa: E501
268
274
  run_as_user (int): The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
275
+ se_linux_change_policy (str): seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod. It has no effect on nodes that do not support SELinux or to volumes does not support SELinux. Valid values are \"MountOption\" and \"Recursive\". \"Recursive\" means relabeling of all files on all Pod volumes by the container runtime. This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node. \"MountOption\" mounts all eligible Pod volumes with `-o context` mount option. This requires all Pods that share the same volume to use the same SELinux label. It is not possible to share the same volume among privileged and unprivileged Pods. Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their CSIDriver instance. Other volumes are always re-labelled recursively. \"MountOption\" value is allowed only when SELinuxMount feature gate is enabled. If not specified and SELinuxMount feature gate is enabled, \"MountOption\" is used. If not specified and SELinuxMount feature gate is disabled, \"MountOption\" is used for ReadWriteOncePod volumes and \"Recursive\" for all other volumes. This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers. All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
269
276
  se_linux_options (SELinuxOptions): [optional] # noqa: E501
270
277
  seccomp_profile (SeccompProfile): [optional] # noqa: E501
271
- supplemental_groups ([int]): A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
278
+ supplemental_groups ([int]): A list of groups applied to the first process run in each container, in addition to the container's primary GID and fsGroup (if specified). If the SupplementalGroupsPolicy feature is enabled, the supplementalGroupsPolicy field determines whether these are in addition to or instead of any group memberships defined in the container image. If unspecified, no additional groups are added, though group memberships defined in the container image may still be used, depending on the supplementalGroupsPolicy field. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
279
+ supplemental_groups_policy (str): Defines how supplemental groups of the first container processes are calculated. Valid values are \"Merge\" and \"Strict\". If not specified, \"Merge\" is used. (Alpha) Using the field requires the SupplementalGroupsPolicy feature gate to be enabled and the container runtime must implement support for this feature. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
272
280
  sysctls ([Sysctl]): Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
273
281
  windows_options (WindowsSecurityContextOptions): [optional] # noqa: E501
274
282
  """
@@ -143,7 +143,7 @@ class ProjectedVolumeSource(ModelNormal):
143
143
  through its discriminator because we passed in
144
144
  _visited_composed_classes = (Animal,)
145
145
  default_mode (int): defaultMode are the mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.. [optional] # noqa: E501
146
- sources ([VolumeProjection]): sources is the list of volume projections. [optional] # noqa: E501
146
+ sources ([VolumeProjection]): sources is the list of volume projections. Each entry in this list handles one source.. [optional] # noqa: E501
147
147
  """
148
148
 
149
149
  _check_type = kwargs.pop('_check_type', True)
@@ -226,7 +226,7 @@ class ProjectedVolumeSource(ModelNormal):
226
226
  through its discriminator because we passed in
227
227
  _visited_composed_classes = (Animal,)
228
228
  default_mode (int): defaultMode are the mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.. [optional] # noqa: E501
229
- sources ([VolumeProjection]): sources is the list of volume projections. [optional] # noqa: E501
229
+ sources ([VolumeProjection]): sources is the list of volume projections. Each entry in this list handles one source.. [optional] # noqa: E501
230
230
  """
231
231
 
232
232
  _check_type = kwargs.pop('_check_type', True)
@@ -82,6 +82,7 @@ class ResourceClaim(ModelNormal):
82
82
  """
83
83
  return {
84
84
  'name': (str,), # noqa: E501
85
+ 'request': (str,), # noqa: E501
85
86
  }
86
87
 
87
88
  @cached_property
@@ -91,6 +92,7 @@ class ResourceClaim(ModelNormal):
91
92
 
92
93
  attribute_map = {
93
94
  'name': 'name', # noqa: E501
95
+ 'request': 'request', # noqa: E501
94
96
  }
95
97
 
96
98
  read_only_vars = {
@@ -137,6 +139,7 @@ class ResourceClaim(ModelNormal):
137
139
  Animal class but this time we won't travel
138
140
  through its discriminator because we passed in
139
141
  _visited_composed_classes = (Animal,)
142
+ request (str): Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.. [optional] # noqa: E501
140
143
  """
141
144
 
142
145
  _check_type = kwargs.pop('_check_type', True)
@@ -222,6 +225,7 @@ class ResourceClaim(ModelNormal):
222
225
  Animal class but this time we won't travel
223
226
  through its discriminator because we passed in
224
227
  _visited_composed_classes = (Animal,)
228
+ request (str): Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.. [optional] # noqa: E501
225
229
  """
226
230
 
227
231
  _check_type = kwargs.pop('_check_type', True)
@@ -174,7 +174,7 @@ class SecurityContext(ModelNormal):
174
174
  app_armor_profile (AppArmorProfile): [optional] # noqa: E501
175
175
  capabilities (Capabilities): [optional] # noqa: E501
176
176
  privileged (bool): Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
177
- proc_mount (str): procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
177
+ proc_mount (str): procMount denotes the type of proc mount to use for the containers. The default value is Default which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
178
178
  read_only_root_filesystem (bool): Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
179
179
  run_as_group (int): The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
180
180
  run_as_non_root (bool): Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.. [optional] # noqa: E501
@@ -267,7 +267,7 @@ class SecurityContext(ModelNormal):
267
267
  app_armor_profile (AppArmorProfile): [optional] # noqa: E501
268
268
  capabilities (Capabilities): [optional] # noqa: E501
269
269
  privileged (bool): Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
270
- proc_mount (str): procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
270
+ proc_mount (str): procMount denotes the type of proc mount to use for the containers. The default value is Default which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
271
271
  read_only_root_filesystem (bool): Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
272
272
  run_as_group (int): The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
273
273
  run_as_non_root (bool): Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.. [optional] # noqa: E501
@@ -31,9 +31,9 @@ from argo_workflows.exceptions import ApiAttributeError
31
31
 
32
32
  def lazy_import():
33
33
  from argo_workflows.model.create_options import CreateOptions
34
- from argo_workflows.model.io_argoproj_events_v1alpha1_sensor import IoArgoprojEventsV1alpha1Sensor
34
+ from argo_workflows.model.github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor import GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor
35
35
  globals()['CreateOptions'] = CreateOptions
36
- globals()['IoArgoprojEventsV1alpha1Sensor'] = IoArgoprojEventsV1alpha1Sensor
36
+ globals()['GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor'] = GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor
37
37
 
38
38
 
39
39
  class SensorCreateSensorRequest(ModelNormal):
@@ -91,7 +91,7 @@ class SensorCreateSensorRequest(ModelNormal):
91
91
  return {
92
92
  'create_options': (CreateOptions,), # noqa: E501
93
93
  'namespace': (str,), # noqa: E501
94
- 'sensor': (IoArgoprojEventsV1alpha1Sensor,), # noqa: E501
94
+ 'sensor': (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor,), # noqa: E501
95
95
  }
96
96
 
97
97
  @cached_property
@@ -148,7 +148,7 @@ class SensorCreateSensorRequest(ModelNormal):
148
148
  _visited_composed_classes = (Animal,)
149
149
  create_options (CreateOptions): [optional] # noqa: E501
150
150
  namespace (str): [optional] # noqa: E501
151
- sensor (IoArgoprojEventsV1alpha1Sensor): [optional] # noqa: E501
151
+ sensor (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor): [optional] # noqa: E501
152
152
  """
153
153
 
154
154
  _check_type = kwargs.pop('_check_type', True)
@@ -232,7 +232,7 @@ class SensorCreateSensorRequest(ModelNormal):
232
232
  _visited_composed_classes = (Animal,)
233
233
  create_options (CreateOptions): [optional] # noqa: E501
234
234
  namespace (str): [optional] # noqa: E501
235
- sensor (IoArgoprojEventsV1alpha1Sensor): [optional] # noqa: E501
235
+ sensor (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor): [optional] # noqa: E501
236
236
  """
237
237
 
238
238
  _check_type = kwargs.pop('_check_type', True)
@@ -30,8 +30,8 @@ from argo_workflows.exceptions import ApiAttributeError
30
30
 
31
31
 
32
32
  def lazy_import():
33
- from argo_workflows.model.io_argoproj_events_v1alpha1_sensor import IoArgoprojEventsV1alpha1Sensor
34
- globals()['IoArgoprojEventsV1alpha1Sensor'] = IoArgoprojEventsV1alpha1Sensor
33
+ from argo_workflows.model.github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor import GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor
34
+ globals()['GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor'] = GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor
35
35
 
36
36
 
37
37
  class SensorSensorWatchEvent(ModelNormal):
@@ -87,7 +87,7 @@ class SensorSensorWatchEvent(ModelNormal):
87
87
  """
88
88
  lazy_import()
89
89
  return {
90
- 'object': (IoArgoprojEventsV1alpha1Sensor,), # noqa: E501
90
+ 'object': (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor,), # noqa: E501
91
91
  'type': (str,), # noqa: E501
92
92
  }
93
93
 
@@ -142,7 +142,7 @@ class SensorSensorWatchEvent(ModelNormal):
142
142
  Animal class but this time we won't travel
143
143
  through its discriminator because we passed in
144
144
  _visited_composed_classes = (Animal,)
145
- object (IoArgoprojEventsV1alpha1Sensor): [optional] # noqa: E501
145
+ object (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor): [optional] # noqa: E501
146
146
  type (str): [optional] # noqa: E501
147
147
  """
148
148
 
@@ -225,7 +225,7 @@ class SensorSensorWatchEvent(ModelNormal):
225
225
  Animal class but this time we won't travel
226
226
  through its discriminator because we passed in
227
227
  _visited_composed_classes = (Animal,)
228
- object (IoArgoprojEventsV1alpha1Sensor): [optional] # noqa: E501
228
+ object (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor): [optional] # noqa: E501
229
229
  type (str): [optional] # noqa: E501
230
230
  """
231
231