argo-workflows 6.6.5__py3-none-any.whl → 6.6.7__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of argo-workflows might be problematic. Click here for more details.
- argo_workflows/__init__.py +1 -1
- argo_workflows/api/cluster_workflow_template_service_api.py +6 -0
- argo_workflows/api/cron_workflow_service_api.py +6 -0
- argo_workflows/api/event_source_service_api.py +23 -11
- argo_workflows/api/sensor_service_api.py +23 -11
- argo_workflows/api/workflow_service_api.py +20 -2
- argo_workflows/api/workflow_template_service_api.py +6 -0
- argo_workflows/api_client.py +1 -1
- argo_workflows/configuration.py +1 -1
- argo_workflows/model/eventsource_create_event_source_request.py +5 -5
- argo_workflows/model/eventsource_event_source_watch_event.py +5 -5
- argo_workflows/model/eventsource_update_event_source_request.py +5 -5
- argo_workflows/model/{io_argoproj_events_v1alpha1_resource.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amount.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_consume_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_consume_config.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_event_source.py} +43 -43
- argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_exchange_declare_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_exchange_declare_config.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_queue_bind_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_queue_bind_config.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_amqp_queue_declare_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_amqp_queue_declare_config.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_argo_workflow_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_argo_workflow_trigger.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_artifact_location.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_artifact_location.py} +28 -28
- argo_workflows/model/{io_argoproj_events_v1alpha1_aws_lambda_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_aws_lambda_trigger.py} +11 -11
- argo_workflows/model/{io_argoproj_events_v1alpha1_azure_event_hubs_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_event_hubs_trigger.py} +11 -11
- argo_workflows/model/{io_argoproj_events_v1alpha1_azure_events_hub_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_events_hub_event_source.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_azure_queue_storage_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_queue_storage_event_source.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_azure_service_bus_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_service_bus_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_azure_service_bus_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_azure_service_bus_trigger.py} +16 -16
- argo_workflows/model/{io_argoproj_events_v1alpha1_backoff.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_backoff.py} +16 -16
- argo_workflows/model/{io_argoproj_events_v1alpha1_git_creds.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_basic_auth.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_auth.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_auth.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_basic_auth.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_basic_auth.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_event_source.py} +23 -23
- argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_repository.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_repository.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_server_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_server_event_source.py} +41 -25
- argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_server_repository.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_bitbucket_server_repository.py} +7 -7
- argo_workflows/model/{io_argoproj_events_v1alpha1_calendar_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_calendar_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_catchup_configuration.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_catchup_configuration.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_condition.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_condition.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_conditions_reset_by_time.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_conditions_reset_by_time.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_conditions_reset_criteria.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_conditions_reset_criteria.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_config_map_persistence.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_config_map_persistence.py} +3 -3
- argo_workflows/model/github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_container.py +289 -0
- argo_workflows/model/{io_argoproj_events_v1alpha1_custom_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_custom_trigger.py} +11 -11
- argo_workflows/model/{io_argoproj_events_v1alpha1_data_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_data_filter.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_email_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_email_trigger.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_emitter_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_emitter_event_source.py} +18 -18
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_context.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_context.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_dependency.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_dependency.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_dependency_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_dependency_filter.py} +23 -23
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_dependency_transformer.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_dependency_transformer.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_persistence.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_persistence.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_sensor.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_source_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source_filter.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_sensor_list.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source_list.py} +8 -8
- argo_workflows/model/github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source_spec.py +461 -0
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_source_status.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_event_source_status.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_expr_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_expr_filter.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_file_artifact.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_file_artifact.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_file_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_file_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_generic_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_generic_event_source.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_gerrit_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_gerrit_event_source.py} +18 -18
- argo_workflows/model/{io_argoproj_events_v1alpha1_git_artifact.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_git_artifact.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_bitbucket_basic_auth.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_git_creds.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_git_remote_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_git_remote_config.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_github_app_creds.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_github_app_creds.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_github_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_github_event_source.py} +23 -23
- argo_workflows/model/{io_argoproj_events_v1alpha1_gitlab_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_gitlab_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_hdfs_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_hdfs_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_http_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_http_trigger.py} +26 -26
- argo_workflows/model/{io_argoproj_events_v1alpha1_int64_or_string.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_int64_or_string.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_amount.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_k8_s_resource.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_k8_s_resource_policy.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_k8_s_resource_policy.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_kafka_consumer_group.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_kafka_consumer_group.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_kafka_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_kafka_event_source.py} +30 -30
- argo_workflows/model/{io_argoproj_events_v1alpha1_kafka_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_kafka_trigger.py} +38 -28
- argo_workflows/model/{io_argoproj_events_v1alpha1_log_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_log_trigger.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_metadata.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_metadata.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_mqtt_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_mqtt_event_source.py} +23 -23
- argo_workflows/model/{io_argoproj_events_v1alpha1_nats_auth.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_nats_auth.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_nats_events_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_nats_events_source.py} +27 -23
- argo_workflows/model/{io_argoproj_events_v1alpha1_nats_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_nats_trigger.py} +22 -16
- argo_workflows/model/{io_argoproj_events_v1alpha1_nsq_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_nsq_event_source.py} +18 -18
- argo_workflows/model/{io_argoproj_events_v1alpha1_open_whisk_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_open_whisk_trigger.py} +11 -11
- argo_workflows/model/{io_argoproj_events_v1alpha1_owned_repositories.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_owned_repositories.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_payload_field.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_payload_field.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_pub_sub_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_pub_sub_event_source.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_pulsar_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_pulsar_event_source.py} +18 -18
- argo_workflows/model/{io_argoproj_events_v1alpha1_pulsar_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_pulsar_trigger.py} +21 -21
- argo_workflows/model/{io_argoproj_events_v1alpha1_rate_limit.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_rate_limit.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_redis_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_redis_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_redis_stream_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_redis_stream_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_resource_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_resource_event_source.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_resource_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_resource_filter.py} +11 -11
- argo_workflows/model/{io_argoproj_events_v1alpha1_s3_artifact.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_s3_artifact.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_s3_bucket.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_s3_bucket.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_s3_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_s3_filter.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_sasl_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sasl_config.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_schema_registry_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_schema_registry_config.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_secure_header.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_secure_header.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_selector.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_selector.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_event_source_list.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor_list.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_sensor_spec.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor_spec.py} +18 -18
- argo_workflows/model/{io_argoproj_events_v1alpha1_sensor_status.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor_status.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_service.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_service.py} +9 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_sftp_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sftp_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_slack_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_slack_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_slack_sender.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_slack_sender.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_slack_thread.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_slack_thread.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_slack_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_slack_trigger.py} +18 -18
- argo_workflows/model/{io_argoproj_events_v1alpha1_sns_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sns_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_sqs_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sqs_event_source.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_standard_k8_s_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_standard_k8_s_trigger.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_status.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_status.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_status_policy.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_status_policy.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_storage_grid_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_storage_grid_event_source.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_storage_grid_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_storage_grid_filter.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_stripe_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_stripe_event_source.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_template.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_template.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_time_filter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_time_filter.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_tls_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_tls_config.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_trigger.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger.py} +34 -30
- argo_workflows/model/{io_argoproj_events_v1alpha1_trigger_parameter.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger_parameter.py} +8 -8
- argo_workflows/model/{io_argoproj_events_v1alpha1_trigger_parameter_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger_parameter_source.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_trigger_policy.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger_policy.py} +13 -13
- argo_workflows/model/{io_argoproj_events_v1alpha1_trigger_template.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_trigger_template.py} +80 -80
- argo_workflows/model/{io_argoproj_events_v1alpha1_url_artifact.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_url_artifact.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_value_from_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_value_from_source.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_watch_path_config.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_watch_path_config.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_webhook_context.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_webhook_context.py} +3 -3
- argo_workflows/model/{io_argoproj_events_v1alpha1_webhook_event_source.py → github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_webhook_event_source.py} +13 -13
- argo_workflows/model/image_volume_source.py +259 -0
- argo_workflows/model/persistent_volume_claim_condition.py +4 -4
- argo_workflows/model/persistent_volume_claim_spec.py +2 -2
- argo_workflows/model/persistent_volume_claim_status.py +2 -2
- argo_workflows/model/pod_affinity_term.py +4 -4
- argo_workflows/model/pod_dns_config_option.py +4 -4
- argo_workflows/model/pod_security_context.py +10 -2
- argo_workflows/model/projected_volume_source.py +2 -2
- argo_workflows/model/resource_claim.py +4 -0
- argo_workflows/model/security_context.py +2 -2
- argo_workflows/model/sensor_create_sensor_request.py +5 -5
- argo_workflows/model/sensor_sensor_watch_event.py +5 -5
- argo_workflows/model/sensor_update_sensor_request.py +5 -5
- argo_workflows/model/volume.py +6 -0
- argo_workflows/models/__init__.py +119 -117
- {argo_workflows-6.6.5.dist-info → argo_workflows-6.6.7.dist-info}/METADATA +3 -2
- {argo_workflows-6.6.5.dist-info → argo_workflows-6.6.7.dist-info}/RECORD +150 -148
- {argo_workflows-6.6.5.dist-info → argo_workflows-6.6.7.dist-info}/WHEEL +1 -1
- argo_workflows/model/io_argoproj_events_v1alpha1_event_source_spec.py +0 -461
- {argo_workflows-6.6.5.dist-info → argo_workflows-6.6.7.dist-info/licenses}/LICENSE +0 -0
- {argo_workflows-6.6.5.dist-info → argo_workflows-6.6.7.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,259 @@
|
|
|
1
|
+
"""
|
|
2
|
+
Argo Workflows API
|
|
3
|
+
|
|
4
|
+
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. For more information, please see https://argo-workflows.readthedocs.io/en/latest/ # noqa: E501
|
|
5
|
+
|
|
6
|
+
The version of the OpenAPI document: VERSION
|
|
7
|
+
Generated by: https://openapi-generator.tech
|
|
8
|
+
"""
|
|
9
|
+
|
|
10
|
+
|
|
11
|
+
import re # noqa: F401
|
|
12
|
+
import sys # noqa: F401
|
|
13
|
+
|
|
14
|
+
from argo_workflows.model_utils import ( # noqa: F401
|
|
15
|
+
ApiTypeError,
|
|
16
|
+
ModelComposed,
|
|
17
|
+
ModelNormal,
|
|
18
|
+
ModelSimple,
|
|
19
|
+
cached_property,
|
|
20
|
+
change_keys_js_to_python,
|
|
21
|
+
convert_js_args_to_python_args,
|
|
22
|
+
date,
|
|
23
|
+
datetime,
|
|
24
|
+
file_type,
|
|
25
|
+
none_type,
|
|
26
|
+
validate_get_composed_info,
|
|
27
|
+
OpenApiModel
|
|
28
|
+
)
|
|
29
|
+
from argo_workflows.exceptions import ApiAttributeError
|
|
30
|
+
|
|
31
|
+
|
|
32
|
+
|
|
33
|
+
class ImageVolumeSource(ModelNormal):
|
|
34
|
+
"""NOTE: This class is auto generated by OpenAPI Generator.
|
|
35
|
+
Ref: https://openapi-generator.tech
|
|
36
|
+
|
|
37
|
+
Do not edit the class manually.
|
|
38
|
+
|
|
39
|
+
Attributes:
|
|
40
|
+
allowed_values (dict): The key is the tuple path to the attribute
|
|
41
|
+
and the for var_name this is (var_name,). The value is a dict
|
|
42
|
+
with a capitalized key describing the allowed value and an allowed
|
|
43
|
+
value. These dicts store the allowed enum values.
|
|
44
|
+
attribute_map (dict): The key is attribute name
|
|
45
|
+
and the value is json key in definition.
|
|
46
|
+
discriminator_value_class_map (dict): A dict to go from the discriminator
|
|
47
|
+
variable value to the discriminator class name.
|
|
48
|
+
validations (dict): The key is the tuple path to the attribute
|
|
49
|
+
and the for var_name this is (var_name,). The value is a dict
|
|
50
|
+
that stores validations for max_length, min_length, max_items,
|
|
51
|
+
min_items, exclusive_maximum, inclusive_maximum, exclusive_minimum,
|
|
52
|
+
inclusive_minimum, and regex.
|
|
53
|
+
additional_properties_type (tuple): A tuple of classes accepted
|
|
54
|
+
as additional properties values.
|
|
55
|
+
"""
|
|
56
|
+
|
|
57
|
+
allowed_values = {
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
validations = {
|
|
61
|
+
}
|
|
62
|
+
|
|
63
|
+
@cached_property
|
|
64
|
+
def additional_properties_type():
|
|
65
|
+
"""
|
|
66
|
+
This must be a method because a model may have properties that are
|
|
67
|
+
of type self, this must run after the class is loaded
|
|
68
|
+
"""
|
|
69
|
+
return (bool, date, datetime, dict, float, int, list, str, none_type,) # noqa: E501
|
|
70
|
+
|
|
71
|
+
_nullable = False
|
|
72
|
+
|
|
73
|
+
@cached_property
|
|
74
|
+
def openapi_types():
|
|
75
|
+
"""
|
|
76
|
+
This must be a method because a model may have properties that are
|
|
77
|
+
of type self, this must run after the class is loaded
|
|
78
|
+
|
|
79
|
+
Returns
|
|
80
|
+
openapi_types (dict): The key is attribute name
|
|
81
|
+
and the value is attribute type.
|
|
82
|
+
"""
|
|
83
|
+
return {
|
|
84
|
+
'pull_policy': (str,), # noqa: E501
|
|
85
|
+
'reference': (str,), # noqa: E501
|
|
86
|
+
}
|
|
87
|
+
|
|
88
|
+
@cached_property
|
|
89
|
+
def discriminator():
|
|
90
|
+
return None
|
|
91
|
+
|
|
92
|
+
|
|
93
|
+
attribute_map = {
|
|
94
|
+
'pull_policy': 'pullPolicy', # noqa: E501
|
|
95
|
+
'reference': 'reference', # noqa: E501
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
read_only_vars = {
|
|
99
|
+
}
|
|
100
|
+
|
|
101
|
+
_composed_schemas = {}
|
|
102
|
+
|
|
103
|
+
@classmethod
|
|
104
|
+
@convert_js_args_to_python_args
|
|
105
|
+
def _from_openapi_data(cls, *args, **kwargs): # noqa: E501
|
|
106
|
+
"""ImageVolumeSource - a model defined in OpenAPI
|
|
107
|
+
|
|
108
|
+
Keyword Args:
|
|
109
|
+
_check_type (bool): if True, values for parameters in openapi_types
|
|
110
|
+
will be type checked and a TypeError will be
|
|
111
|
+
raised if the wrong type is input.
|
|
112
|
+
Defaults to True
|
|
113
|
+
_path_to_item (tuple/list): This is a list of keys or values to
|
|
114
|
+
drill down to the model in received_data
|
|
115
|
+
when deserializing a response
|
|
116
|
+
_spec_property_naming (bool): True if the variable names in the input data
|
|
117
|
+
are serialized names, as specified in the OpenAPI document.
|
|
118
|
+
False if the variable names in the input data
|
|
119
|
+
are pythonic names, e.g. snake case (default)
|
|
120
|
+
_configuration (Configuration): the instance to use when
|
|
121
|
+
deserializing a file_type parameter.
|
|
122
|
+
If passed, type conversion is attempted
|
|
123
|
+
If omitted no type conversion is done.
|
|
124
|
+
_visited_composed_classes (tuple): This stores a tuple of
|
|
125
|
+
classes that we have traveled through so that
|
|
126
|
+
if we see that class again we will not use its
|
|
127
|
+
discriminator again.
|
|
128
|
+
When traveling through a discriminator, the
|
|
129
|
+
composed schema that is
|
|
130
|
+
is traveled through is added to this set.
|
|
131
|
+
For example if Animal has a discriminator
|
|
132
|
+
petType and we pass in "Dog", and the class Dog
|
|
133
|
+
allOf includes Animal, we move through Animal
|
|
134
|
+
once using the discriminator, and pick Dog.
|
|
135
|
+
Then in Dog, we will make an instance of the
|
|
136
|
+
Animal class but this time we won't travel
|
|
137
|
+
through its discriminator because we passed in
|
|
138
|
+
_visited_composed_classes = (Animal,)
|
|
139
|
+
pull_policy (str): Policy for pulling OCI objects. Possible values are: Always: the kubelet always attempts to pull the reference. Container creation will fail If the pull fails. Never: the kubelet never pulls the reference and only uses a local image or artifact. Container creation will fail if the reference isn't present. IfNotPresent: the kubelet pulls if the reference isn't already present on disk. Container creation will fail if the reference isn't present and the pull fails. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise.. [optional] # noqa: E501
|
|
140
|
+
reference (str): Required: Image or artifact reference to be used. Behaves in the same way as pod.spec.containers[*].image. Pull secrets will be assembled in the same way as for the container image by looking up node credentials, SA image pull secrets, and pod spec image pull secrets. More info: https://kubernetes.io/docs/concepts/containers/images This field is optional to allow higher level config management to default or override container images in workload controllers like Deployments and StatefulSets.. [optional] # noqa: E501
|
|
141
|
+
"""
|
|
142
|
+
|
|
143
|
+
_check_type = kwargs.pop('_check_type', True)
|
|
144
|
+
_spec_property_naming = kwargs.pop('_spec_property_naming', False)
|
|
145
|
+
_path_to_item = kwargs.pop('_path_to_item', ())
|
|
146
|
+
_configuration = kwargs.pop('_configuration', None)
|
|
147
|
+
_visited_composed_classes = kwargs.pop('_visited_composed_classes', ())
|
|
148
|
+
|
|
149
|
+
self = super(OpenApiModel, cls).__new__(cls)
|
|
150
|
+
|
|
151
|
+
if args:
|
|
152
|
+
raise ApiTypeError(
|
|
153
|
+
"Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % (
|
|
154
|
+
args,
|
|
155
|
+
self.__class__.__name__,
|
|
156
|
+
),
|
|
157
|
+
path_to_item=_path_to_item,
|
|
158
|
+
valid_classes=(self.__class__,),
|
|
159
|
+
)
|
|
160
|
+
|
|
161
|
+
self._data_store = {}
|
|
162
|
+
self._check_type = _check_type
|
|
163
|
+
self._spec_property_naming = _spec_property_naming
|
|
164
|
+
self._path_to_item = _path_to_item
|
|
165
|
+
self._configuration = _configuration
|
|
166
|
+
self._visited_composed_classes = _visited_composed_classes + (self.__class__,)
|
|
167
|
+
|
|
168
|
+
for var_name, var_value in kwargs.items():
|
|
169
|
+
if var_name not in self.attribute_map and \
|
|
170
|
+
self._configuration is not None and \
|
|
171
|
+
self._configuration.discard_unknown_keys and \
|
|
172
|
+
self.additional_properties_type is None:
|
|
173
|
+
# discard variable.
|
|
174
|
+
continue
|
|
175
|
+
setattr(self, var_name, var_value)
|
|
176
|
+
return self
|
|
177
|
+
|
|
178
|
+
required_properties = set([
|
|
179
|
+
'_data_store',
|
|
180
|
+
'_check_type',
|
|
181
|
+
'_spec_property_naming',
|
|
182
|
+
'_path_to_item',
|
|
183
|
+
'_configuration',
|
|
184
|
+
'_visited_composed_classes',
|
|
185
|
+
])
|
|
186
|
+
|
|
187
|
+
@convert_js_args_to_python_args
|
|
188
|
+
def __init__(self, *args, **kwargs): # noqa: E501
|
|
189
|
+
"""ImageVolumeSource - a model defined in OpenAPI
|
|
190
|
+
|
|
191
|
+
Keyword Args:
|
|
192
|
+
_check_type (bool): if True, values for parameters in openapi_types
|
|
193
|
+
will be type checked and a TypeError will be
|
|
194
|
+
raised if the wrong type is input.
|
|
195
|
+
Defaults to True
|
|
196
|
+
_path_to_item (tuple/list): This is a list of keys or values to
|
|
197
|
+
drill down to the model in received_data
|
|
198
|
+
when deserializing a response
|
|
199
|
+
_spec_property_naming (bool): True if the variable names in the input data
|
|
200
|
+
are serialized names, as specified in the OpenAPI document.
|
|
201
|
+
False if the variable names in the input data
|
|
202
|
+
are pythonic names, e.g. snake case (default)
|
|
203
|
+
_configuration (Configuration): the instance to use when
|
|
204
|
+
deserializing a file_type parameter.
|
|
205
|
+
If passed, type conversion is attempted
|
|
206
|
+
If omitted no type conversion is done.
|
|
207
|
+
_visited_composed_classes (tuple): This stores a tuple of
|
|
208
|
+
classes that we have traveled through so that
|
|
209
|
+
if we see that class again we will not use its
|
|
210
|
+
discriminator again.
|
|
211
|
+
When traveling through a discriminator, the
|
|
212
|
+
composed schema that is
|
|
213
|
+
is traveled through is added to this set.
|
|
214
|
+
For example if Animal has a discriminator
|
|
215
|
+
petType and we pass in "Dog", and the class Dog
|
|
216
|
+
allOf includes Animal, we move through Animal
|
|
217
|
+
once using the discriminator, and pick Dog.
|
|
218
|
+
Then in Dog, we will make an instance of the
|
|
219
|
+
Animal class but this time we won't travel
|
|
220
|
+
through its discriminator because we passed in
|
|
221
|
+
_visited_composed_classes = (Animal,)
|
|
222
|
+
pull_policy (str): Policy for pulling OCI objects. Possible values are: Always: the kubelet always attempts to pull the reference. Container creation will fail If the pull fails. Never: the kubelet never pulls the reference and only uses a local image or artifact. Container creation will fail if the reference isn't present. IfNotPresent: the kubelet pulls if the reference isn't already present on disk. Container creation will fail if the reference isn't present and the pull fails. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise.. [optional] # noqa: E501
|
|
223
|
+
reference (str): Required: Image or artifact reference to be used. Behaves in the same way as pod.spec.containers[*].image. Pull secrets will be assembled in the same way as for the container image by looking up node credentials, SA image pull secrets, and pod spec image pull secrets. More info: https://kubernetes.io/docs/concepts/containers/images This field is optional to allow higher level config management to default or override container images in workload controllers like Deployments and StatefulSets.. [optional] # noqa: E501
|
|
224
|
+
"""
|
|
225
|
+
|
|
226
|
+
_check_type = kwargs.pop('_check_type', True)
|
|
227
|
+
_spec_property_naming = kwargs.pop('_spec_property_naming', False)
|
|
228
|
+
_path_to_item = kwargs.pop('_path_to_item', ())
|
|
229
|
+
_configuration = kwargs.pop('_configuration', None)
|
|
230
|
+
_visited_composed_classes = kwargs.pop('_visited_composed_classes', ())
|
|
231
|
+
|
|
232
|
+
if args:
|
|
233
|
+
raise ApiTypeError(
|
|
234
|
+
"Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % (
|
|
235
|
+
args,
|
|
236
|
+
self.__class__.__name__,
|
|
237
|
+
),
|
|
238
|
+
path_to_item=_path_to_item,
|
|
239
|
+
valid_classes=(self.__class__,),
|
|
240
|
+
)
|
|
241
|
+
|
|
242
|
+
self._data_store = {}
|
|
243
|
+
self._check_type = _check_type
|
|
244
|
+
self._spec_property_naming = _spec_property_naming
|
|
245
|
+
self._path_to_item = _path_to_item
|
|
246
|
+
self._configuration = _configuration
|
|
247
|
+
self._visited_composed_classes = _visited_composed_classes + (self.__class__,)
|
|
248
|
+
|
|
249
|
+
for var_name, var_value in kwargs.items():
|
|
250
|
+
if var_name not in self.attribute_map and \
|
|
251
|
+
self._configuration is not None and \
|
|
252
|
+
self._configuration.discard_unknown_keys and \
|
|
253
|
+
self.additional_properties_type is None:
|
|
254
|
+
# discard variable.
|
|
255
|
+
continue
|
|
256
|
+
setattr(self, var_name, var_value)
|
|
257
|
+
if var_name in self.read_only_vars:
|
|
258
|
+
raise ApiAttributeError(f"`{var_name}` is a read-only attribute. Use `from_openapi_data` to instantiate "
|
|
259
|
+
f"class with read only attributes.")
|
|
@@ -114,8 +114,8 @@ class PersistentVolumeClaimCondition(ModelNormal):
|
|
|
114
114
|
"""PersistentVolumeClaimCondition - a model defined in OpenAPI
|
|
115
115
|
|
|
116
116
|
Args:
|
|
117
|
-
status (str):
|
|
118
|
-
type (str):
|
|
117
|
+
status (str): Status is the status of the condition. Can be True, False, Unknown. More info: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/persistent-volume-claim-v1/#:~:text=state%20of%20pvc-,conditions.status,-(string)%2C%20required
|
|
118
|
+
type (str): Type is the type of the condition. More info: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/persistent-volume-claim-v1/#:~:text=set%20to%20%27ResizeStarted%27.-,PersistentVolumeClaimCondition,-contains%20details%20about
|
|
119
119
|
|
|
120
120
|
Keyword Args:
|
|
121
121
|
_check_type (bool): if True, values for parameters in openapi_types
|
|
@@ -205,8 +205,8 @@ class PersistentVolumeClaimCondition(ModelNormal):
|
|
|
205
205
|
"""PersistentVolumeClaimCondition - a model defined in OpenAPI
|
|
206
206
|
|
|
207
207
|
Args:
|
|
208
|
-
status (str):
|
|
209
|
-
type (str):
|
|
208
|
+
status (str): Status is the status of the condition. Can be True, False, Unknown. More info: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/persistent-volume-claim-v1/#:~:text=state%20of%20pvc-,conditions.status,-(string)%2C%20required
|
|
209
|
+
type (str): Type is the type of the condition. More info: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/persistent-volume-claim-v1/#:~:text=set%20to%20%27ResizeStarted%27.-,PersistentVolumeClaimCondition,-contains%20details%20about
|
|
210
210
|
|
|
211
211
|
Keyword Args:
|
|
212
212
|
_check_type (bool): if True, values for parameters in openapi_types
|
|
@@ -168,7 +168,7 @@ class PersistentVolumeClaimSpec(ModelNormal):
|
|
|
168
168
|
resources (VolumeResourceRequirements): [optional] # noqa: E501
|
|
169
169
|
selector (LabelSelector): [optional] # noqa: E501
|
|
170
170
|
storage_class_name (str): storageClassName is the name of the StorageClass required by the claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#class-1. [optional] # noqa: E501
|
|
171
|
-
volume_attributes_class_name (str): volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (
|
|
171
|
+
volume_attributes_class_name (str): volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default).. [optional] # noqa: E501
|
|
172
172
|
volume_mode (str): volumeMode defines what type of volume is required by the claim. Value of Filesystem is implied when not included in claim spec.. [optional] # noqa: E501
|
|
173
173
|
volume_name (str): volumeName is the binding reference to the PersistentVolume backing this claim.. [optional] # noqa: E501
|
|
174
174
|
"""
|
|
@@ -258,7 +258,7 @@ class PersistentVolumeClaimSpec(ModelNormal):
|
|
|
258
258
|
resources (VolumeResourceRequirements): [optional] # noqa: E501
|
|
259
259
|
selector (LabelSelector): [optional] # noqa: E501
|
|
260
260
|
storage_class_name (str): storageClassName is the name of the StorageClass required by the claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#class-1. [optional] # noqa: E501
|
|
261
|
-
volume_attributes_class_name (str): volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (
|
|
261
|
+
volume_attributes_class_name (str): volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default).. [optional] # noqa: E501
|
|
262
262
|
volume_mode (str): volumeMode defines what type of volume is required by the claim. Value of Filesystem is implied when not included in claim spec.. [optional] # noqa: E501
|
|
263
263
|
volume_name (str): volumeName is the binding reference to the PersistentVolume backing this claim.. [optional] # noqa: E501
|
|
264
264
|
"""
|
|
@@ -161,7 +161,7 @@ class PersistentVolumeClaimStatus(ModelNormal):
|
|
|
161
161
|
allocated_resources ({str: (str,)}): allocatedResources tracks the resources allocated to a PVC including its capacity. Key names follow standard Kubernetes label syntax. Valid values are either: * Un-prefixed keys: - storage - the capacity of the volume. * Custom resources must use implementation-defined prefixed names such as \"example.com/my-custom-resource\" Apart from above values - keys that are unprefixed or have kubernetes.io prefix are considered reserved and hence may not be used. Capacity reported here may be larger than the actual capacity when a volume expansion operation is requested. For storage quota, the larger value from allocatedResources and PVC.spec.resources is used. If allocatedResources is not set, PVC.spec.resources alone is used for quota calculation. If a volume expansion capacity request is lowered, allocatedResources is only lowered if there are no expansion operations in progress and if the actual volume capacity is equal or lower than the requested capacity. A controller that receives PVC update with previously unknown resourceName should ignore the update for the purpose it was designed. For example - a controller that only is responsible for resizing capacity of the volume, should ignore PVC updates that change other valid resources associated with PVC. This is an alpha field and requires enabling RecoverVolumeExpansionFailure feature.. [optional] # noqa: E501
|
|
162
162
|
capacity ({str: (str,)}): capacity represents the actual resources of the underlying volume.. [optional] # noqa: E501
|
|
163
163
|
conditions ([PersistentVolumeClaimCondition]): conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'Resizing'.. [optional] # noqa: E501
|
|
164
|
-
current_volume_attributes_class_name (str): currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is
|
|
164
|
+
current_volume_attributes_class_name (str): currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is a beta field and requires enabling VolumeAttributesClass feature (off by default).. [optional] # noqa: E501
|
|
165
165
|
modify_volume_status (ModifyVolumeStatus): [optional] # noqa: E501
|
|
166
166
|
phase (str): phase represents the current phase of PersistentVolumeClaim.. [optional] # noqa: E501
|
|
167
167
|
"""
|
|
@@ -250,7 +250,7 @@ class PersistentVolumeClaimStatus(ModelNormal):
|
|
|
250
250
|
allocated_resources ({str: (str,)}): allocatedResources tracks the resources allocated to a PVC including its capacity. Key names follow standard Kubernetes label syntax. Valid values are either: * Un-prefixed keys: - storage - the capacity of the volume. * Custom resources must use implementation-defined prefixed names such as \"example.com/my-custom-resource\" Apart from above values - keys that are unprefixed or have kubernetes.io prefix are considered reserved and hence may not be used. Capacity reported here may be larger than the actual capacity when a volume expansion operation is requested. For storage quota, the larger value from allocatedResources and PVC.spec.resources is used. If allocatedResources is not set, PVC.spec.resources alone is used for quota calculation. If a volume expansion capacity request is lowered, allocatedResources is only lowered if there are no expansion operations in progress and if the actual volume capacity is equal or lower than the requested capacity. A controller that receives PVC update with previously unknown resourceName should ignore the update for the purpose it was designed. For example - a controller that only is responsible for resizing capacity of the volume, should ignore PVC updates that change other valid resources associated with PVC. This is an alpha field and requires enabling RecoverVolumeExpansionFailure feature.. [optional] # noqa: E501
|
|
251
251
|
capacity ({str: (str,)}): capacity represents the actual resources of the underlying volume.. [optional] # noqa: E501
|
|
252
252
|
conditions ([PersistentVolumeClaimCondition]): conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'Resizing'.. [optional] # noqa: E501
|
|
253
|
-
current_volume_attributes_class_name (str): currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is
|
|
253
|
+
current_volume_attributes_class_name (str): currentVolumeAttributesClassName is the current name of the VolumeAttributesClass the PVC is using. When unset, there is no VolumeAttributeClass applied to this PersistentVolumeClaim This is a beta field and requires enabling VolumeAttributesClass feature (off by default).. [optional] # noqa: E501
|
|
254
254
|
modify_volume_status (ModifyVolumeStatus): [optional] # noqa: E501
|
|
255
255
|
phase (str): phase represents the current phase of PersistentVolumeClaim.. [optional] # noqa: E501
|
|
256
256
|
"""
|
|
@@ -154,8 +154,8 @@ class PodAffinityTerm(ModelNormal):
|
|
|
154
154
|
through its discriminator because we passed in
|
|
155
155
|
_visited_composed_classes = (Animal,)
|
|
156
156
|
label_selector (LabelSelector): [optional] # noqa: E501
|
|
157
|
-
match_label_keys ([str]): MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is
|
|
158
|
-
mismatch_label_keys ([str]): MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is
|
|
157
|
+
match_label_keys ([str]): MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is a beta field and requires enabling MatchLabelKeysInPodAffinity feature gate (enabled by default).. [optional] # noqa: E501
|
|
158
|
+
mismatch_label_keys ([str]): MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is a beta field and requires enabling MatchLabelKeysInPodAffinity feature gate (enabled by default).. [optional] # noqa: E501
|
|
159
159
|
namespace_selector (LabelSelector): [optional] # noqa: E501
|
|
160
160
|
namespaces ([str]): namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means \"this pod's namespace\".. [optional] # noqa: E501
|
|
161
161
|
"""
|
|
@@ -244,8 +244,8 @@ class PodAffinityTerm(ModelNormal):
|
|
|
244
244
|
through its discriminator because we passed in
|
|
245
245
|
_visited_composed_classes = (Animal,)
|
|
246
246
|
label_selector (LabelSelector): [optional] # noqa: E501
|
|
247
|
-
match_label_keys ([str]): MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is
|
|
248
|
-
mismatch_label_keys ([str]): MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is
|
|
247
|
+
match_label_keys ([str]): MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is a beta field and requires enabling MatchLabelKeysInPodAffinity feature gate (enabled by default).. [optional] # noqa: E501
|
|
248
|
+
mismatch_label_keys ([str]): MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is a beta field and requires enabling MatchLabelKeysInPodAffinity feature gate (enabled by default).. [optional] # noqa: E501
|
|
249
249
|
namespace_selector (LabelSelector): [optional] # noqa: E501
|
|
250
250
|
namespaces ([str]): namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means \"this pod's namespace\".. [optional] # noqa: E501
|
|
251
251
|
"""
|
|
@@ -136,8 +136,8 @@ class PodDNSConfigOption(ModelNormal):
|
|
|
136
136
|
Animal class but this time we won't travel
|
|
137
137
|
through its discriminator because we passed in
|
|
138
138
|
_visited_composed_classes = (Animal,)
|
|
139
|
-
name (str): Required.. [optional] # noqa: E501
|
|
140
|
-
value (str): [optional] # noqa: E501
|
|
139
|
+
name (str): Name is this DNS resolver option's name. Required.. [optional] # noqa: E501
|
|
140
|
+
value (str): Value is this DNS resolver option's value.. [optional] # noqa: E501
|
|
141
141
|
"""
|
|
142
142
|
|
|
143
143
|
_check_type = kwargs.pop('_check_type', True)
|
|
@@ -219,8 +219,8 @@ class PodDNSConfigOption(ModelNormal):
|
|
|
219
219
|
Animal class but this time we won't travel
|
|
220
220
|
through its discriminator because we passed in
|
|
221
221
|
_visited_composed_classes = (Animal,)
|
|
222
|
-
name (str): Required.. [optional] # noqa: E501
|
|
223
|
-
value (str): [optional] # noqa: E501
|
|
222
|
+
name (str): Name is this DNS resolver option's name. Required.. [optional] # noqa: E501
|
|
223
|
+
value (str): Value is this DNS resolver option's value.. [optional] # noqa: E501
|
|
224
224
|
"""
|
|
225
225
|
|
|
226
226
|
_check_type = kwargs.pop('_check_type', True)
|
|
@@ -101,9 +101,11 @@ class PodSecurityContext(ModelNormal):
|
|
|
101
101
|
'run_as_group': (int,), # noqa: E501
|
|
102
102
|
'run_as_non_root': (bool,), # noqa: E501
|
|
103
103
|
'run_as_user': (int,), # noqa: E501
|
|
104
|
+
'se_linux_change_policy': (str,), # noqa: E501
|
|
104
105
|
'se_linux_options': (SELinuxOptions,), # noqa: E501
|
|
105
106
|
'seccomp_profile': (SeccompProfile,), # noqa: E501
|
|
106
107
|
'supplemental_groups': ([int],), # noqa: E501
|
|
108
|
+
'supplemental_groups_policy': (str,), # noqa: E501
|
|
107
109
|
'sysctls': ([Sysctl],), # noqa: E501
|
|
108
110
|
'windows_options': (WindowsSecurityContextOptions,), # noqa: E501
|
|
109
111
|
}
|
|
@@ -120,9 +122,11 @@ class PodSecurityContext(ModelNormal):
|
|
|
120
122
|
'run_as_group': 'runAsGroup', # noqa: E501
|
|
121
123
|
'run_as_non_root': 'runAsNonRoot', # noqa: E501
|
|
122
124
|
'run_as_user': 'runAsUser', # noqa: E501
|
|
125
|
+
'se_linux_change_policy': 'seLinuxChangePolicy', # noqa: E501
|
|
123
126
|
'se_linux_options': 'seLinuxOptions', # noqa: E501
|
|
124
127
|
'seccomp_profile': 'seccompProfile', # noqa: E501
|
|
125
128
|
'supplemental_groups': 'supplementalGroups', # noqa: E501
|
|
129
|
+
'supplemental_groups_policy': 'supplementalGroupsPolicy', # noqa: E501
|
|
126
130
|
'sysctls': 'sysctls', # noqa: E501
|
|
127
131
|
'windows_options': 'windowsOptions', # noqa: E501
|
|
128
132
|
}
|
|
@@ -174,9 +178,11 @@ class PodSecurityContext(ModelNormal):
|
|
|
174
178
|
run_as_group (int): The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
175
179
|
run_as_non_root (bool): Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.. [optional] # noqa: E501
|
|
176
180
|
run_as_user (int): The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
181
|
+
se_linux_change_policy (str): seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod. It has no effect on nodes that do not support SELinux or to volumes does not support SELinux. Valid values are \"MountOption\" and \"Recursive\". \"Recursive\" means relabeling of all files on all Pod volumes by the container runtime. This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node. \"MountOption\" mounts all eligible Pod volumes with `-o context` mount option. This requires all Pods that share the same volume to use the same SELinux label. It is not possible to share the same volume among privileged and unprivileged Pods. Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their CSIDriver instance. Other volumes are always re-labelled recursively. \"MountOption\" value is allowed only when SELinuxMount feature gate is enabled. If not specified and SELinuxMount feature gate is enabled, \"MountOption\" is used. If not specified and SELinuxMount feature gate is disabled, \"MountOption\" is used for ReadWriteOncePod volumes and \"Recursive\" for all other volumes. This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers. All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
177
182
|
se_linux_options (SELinuxOptions): [optional] # noqa: E501
|
|
178
183
|
seccomp_profile (SeccompProfile): [optional] # noqa: E501
|
|
179
|
-
supplemental_groups ([int]): A list of groups applied to the first process run in each container, in addition to the container's primary GID
|
|
184
|
+
supplemental_groups ([int]): A list of groups applied to the first process run in each container, in addition to the container's primary GID and fsGroup (if specified). If the SupplementalGroupsPolicy feature is enabled, the supplementalGroupsPolicy field determines whether these are in addition to or instead of any group memberships defined in the container image. If unspecified, no additional groups are added, though group memberships defined in the container image may still be used, depending on the supplementalGroupsPolicy field. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
185
|
+
supplemental_groups_policy (str): Defines how supplemental groups of the first container processes are calculated. Valid values are \"Merge\" and \"Strict\". If not specified, \"Merge\" is used. (Alpha) Using the field requires the SupplementalGroupsPolicy feature gate to be enabled and the container runtime must implement support for this feature. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
180
186
|
sysctls ([Sysctl]): Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
181
187
|
windows_options (WindowsSecurityContextOptions): [optional] # noqa: E501
|
|
182
188
|
"""
|
|
@@ -266,9 +272,11 @@ class PodSecurityContext(ModelNormal):
|
|
|
266
272
|
run_as_group (int): The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
267
273
|
run_as_non_root (bool): Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.. [optional] # noqa: E501
|
|
268
274
|
run_as_user (int): The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
275
|
+
se_linux_change_policy (str): seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod. It has no effect on nodes that do not support SELinux or to volumes does not support SELinux. Valid values are \"MountOption\" and \"Recursive\". \"Recursive\" means relabeling of all files on all Pod volumes by the container runtime. This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node. \"MountOption\" mounts all eligible Pod volumes with `-o context` mount option. This requires all Pods that share the same volume to use the same SELinux label. It is not possible to share the same volume among privileged and unprivileged Pods. Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their CSIDriver instance. Other volumes are always re-labelled recursively. \"MountOption\" value is allowed only when SELinuxMount feature gate is enabled. If not specified and SELinuxMount feature gate is enabled, \"MountOption\" is used. If not specified and SELinuxMount feature gate is disabled, \"MountOption\" is used for ReadWriteOncePod volumes and \"Recursive\" for all other volumes. This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers. All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
269
276
|
se_linux_options (SELinuxOptions): [optional] # noqa: E501
|
|
270
277
|
seccomp_profile (SeccompProfile): [optional] # noqa: E501
|
|
271
|
-
supplemental_groups ([int]): A list of groups applied to the first process run in each container, in addition to the container's primary GID
|
|
278
|
+
supplemental_groups ([int]): A list of groups applied to the first process run in each container, in addition to the container's primary GID and fsGroup (if specified). If the SupplementalGroupsPolicy feature is enabled, the supplementalGroupsPolicy field determines whether these are in addition to or instead of any group memberships defined in the container image. If unspecified, no additional groups are added, though group memberships defined in the container image may still be used, depending on the supplementalGroupsPolicy field. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
279
|
+
supplemental_groups_policy (str): Defines how supplemental groups of the first container processes are calculated. Valid values are \"Merge\" and \"Strict\". If not specified, \"Merge\" is used. (Alpha) Using the field requires the SupplementalGroupsPolicy feature gate to be enabled and the container runtime must implement support for this feature. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
272
280
|
sysctls ([Sysctl]): Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
273
281
|
windows_options (WindowsSecurityContextOptions): [optional] # noqa: E501
|
|
274
282
|
"""
|
|
@@ -143,7 +143,7 @@ class ProjectedVolumeSource(ModelNormal):
|
|
|
143
143
|
through its discriminator because we passed in
|
|
144
144
|
_visited_composed_classes = (Animal,)
|
|
145
145
|
default_mode (int): defaultMode are the mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.. [optional] # noqa: E501
|
|
146
|
-
sources ([VolumeProjection]): sources is the list of volume projections. [optional] # noqa: E501
|
|
146
|
+
sources ([VolumeProjection]): sources is the list of volume projections. Each entry in this list handles one source.. [optional] # noqa: E501
|
|
147
147
|
"""
|
|
148
148
|
|
|
149
149
|
_check_type = kwargs.pop('_check_type', True)
|
|
@@ -226,7 +226,7 @@ class ProjectedVolumeSource(ModelNormal):
|
|
|
226
226
|
through its discriminator because we passed in
|
|
227
227
|
_visited_composed_classes = (Animal,)
|
|
228
228
|
default_mode (int): defaultMode are the mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.. [optional] # noqa: E501
|
|
229
|
-
sources ([VolumeProjection]): sources is the list of volume projections. [optional] # noqa: E501
|
|
229
|
+
sources ([VolumeProjection]): sources is the list of volume projections. Each entry in this list handles one source.. [optional] # noqa: E501
|
|
230
230
|
"""
|
|
231
231
|
|
|
232
232
|
_check_type = kwargs.pop('_check_type', True)
|
|
@@ -82,6 +82,7 @@ class ResourceClaim(ModelNormal):
|
|
|
82
82
|
"""
|
|
83
83
|
return {
|
|
84
84
|
'name': (str,), # noqa: E501
|
|
85
|
+
'request': (str,), # noqa: E501
|
|
85
86
|
}
|
|
86
87
|
|
|
87
88
|
@cached_property
|
|
@@ -91,6 +92,7 @@ class ResourceClaim(ModelNormal):
|
|
|
91
92
|
|
|
92
93
|
attribute_map = {
|
|
93
94
|
'name': 'name', # noqa: E501
|
|
95
|
+
'request': 'request', # noqa: E501
|
|
94
96
|
}
|
|
95
97
|
|
|
96
98
|
read_only_vars = {
|
|
@@ -137,6 +139,7 @@ class ResourceClaim(ModelNormal):
|
|
|
137
139
|
Animal class but this time we won't travel
|
|
138
140
|
through its discriminator because we passed in
|
|
139
141
|
_visited_composed_classes = (Animal,)
|
|
142
|
+
request (str): Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.. [optional] # noqa: E501
|
|
140
143
|
"""
|
|
141
144
|
|
|
142
145
|
_check_type = kwargs.pop('_check_type', True)
|
|
@@ -222,6 +225,7 @@ class ResourceClaim(ModelNormal):
|
|
|
222
225
|
Animal class but this time we won't travel
|
|
223
226
|
through its discriminator because we passed in
|
|
224
227
|
_visited_composed_classes = (Animal,)
|
|
228
|
+
request (str): Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.. [optional] # noqa: E501
|
|
225
229
|
"""
|
|
226
230
|
|
|
227
231
|
_check_type = kwargs.pop('_check_type', True)
|
|
@@ -174,7 +174,7 @@ class SecurityContext(ModelNormal):
|
|
|
174
174
|
app_armor_profile (AppArmorProfile): [optional] # noqa: E501
|
|
175
175
|
capabilities (Capabilities): [optional] # noqa: E501
|
|
176
176
|
privileged (bool): Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
177
|
-
proc_mount (str): procMount denotes the type of proc mount to use for the containers. The default is
|
|
177
|
+
proc_mount (str): procMount denotes the type of proc mount to use for the containers. The default value is Default which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
178
178
|
read_only_root_filesystem (bool): Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
179
179
|
run_as_group (int): The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
180
180
|
run_as_non_root (bool): Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.. [optional] # noqa: E501
|
|
@@ -267,7 +267,7 @@ class SecurityContext(ModelNormal):
|
|
|
267
267
|
app_armor_profile (AppArmorProfile): [optional] # noqa: E501
|
|
268
268
|
capabilities (Capabilities): [optional] # noqa: E501
|
|
269
269
|
privileged (bool): Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
270
|
-
proc_mount (str): procMount denotes the type of proc mount to use for the containers. The default is
|
|
270
|
+
proc_mount (str): procMount denotes the type of proc mount to use for the containers. The default value is Default which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
271
271
|
read_only_root_filesystem (bool): Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
272
272
|
run_as_group (int): The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.. [optional] # noqa: E501
|
|
273
273
|
run_as_non_root (bool): Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.. [optional] # noqa: E501
|
|
@@ -31,9 +31,9 @@ from argo_workflows.exceptions import ApiAttributeError
|
|
|
31
31
|
|
|
32
32
|
def lazy_import():
|
|
33
33
|
from argo_workflows.model.create_options import CreateOptions
|
|
34
|
-
from argo_workflows.model.
|
|
34
|
+
from argo_workflows.model.github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor import GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor
|
|
35
35
|
globals()['CreateOptions'] = CreateOptions
|
|
36
|
-
globals()['
|
|
36
|
+
globals()['GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor'] = GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor
|
|
37
37
|
|
|
38
38
|
|
|
39
39
|
class SensorCreateSensorRequest(ModelNormal):
|
|
@@ -91,7 +91,7 @@ class SensorCreateSensorRequest(ModelNormal):
|
|
|
91
91
|
return {
|
|
92
92
|
'create_options': (CreateOptions,), # noqa: E501
|
|
93
93
|
'namespace': (str,), # noqa: E501
|
|
94
|
-
'sensor': (
|
|
94
|
+
'sensor': (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor,), # noqa: E501
|
|
95
95
|
}
|
|
96
96
|
|
|
97
97
|
@cached_property
|
|
@@ -148,7 +148,7 @@ class SensorCreateSensorRequest(ModelNormal):
|
|
|
148
148
|
_visited_composed_classes = (Animal,)
|
|
149
149
|
create_options (CreateOptions): [optional] # noqa: E501
|
|
150
150
|
namespace (str): [optional] # noqa: E501
|
|
151
|
-
sensor (
|
|
151
|
+
sensor (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor): [optional] # noqa: E501
|
|
152
152
|
"""
|
|
153
153
|
|
|
154
154
|
_check_type = kwargs.pop('_check_type', True)
|
|
@@ -232,7 +232,7 @@ class SensorCreateSensorRequest(ModelNormal):
|
|
|
232
232
|
_visited_composed_classes = (Animal,)
|
|
233
233
|
create_options (CreateOptions): [optional] # noqa: E501
|
|
234
234
|
namespace (str): [optional] # noqa: E501
|
|
235
|
-
sensor (
|
|
235
|
+
sensor (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor): [optional] # noqa: E501
|
|
236
236
|
"""
|
|
237
237
|
|
|
238
238
|
_check_type = kwargs.pop('_check_type', True)
|
|
@@ -30,8 +30,8 @@ from argo_workflows.exceptions import ApiAttributeError
|
|
|
30
30
|
|
|
31
31
|
|
|
32
32
|
def lazy_import():
|
|
33
|
-
from argo_workflows.model.
|
|
34
|
-
globals()['
|
|
33
|
+
from argo_workflows.model.github_com_argoproj_argo_events_pkg_apis_events_v1alpha1_sensor import GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor
|
|
34
|
+
globals()['GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor'] = GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor
|
|
35
35
|
|
|
36
36
|
|
|
37
37
|
class SensorSensorWatchEvent(ModelNormal):
|
|
@@ -87,7 +87,7 @@ class SensorSensorWatchEvent(ModelNormal):
|
|
|
87
87
|
"""
|
|
88
88
|
lazy_import()
|
|
89
89
|
return {
|
|
90
|
-
'object': (
|
|
90
|
+
'object': (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor,), # noqa: E501
|
|
91
91
|
'type': (str,), # noqa: E501
|
|
92
92
|
}
|
|
93
93
|
|
|
@@ -142,7 +142,7 @@ class SensorSensorWatchEvent(ModelNormal):
|
|
|
142
142
|
Animal class but this time we won't travel
|
|
143
143
|
through its discriminator because we passed in
|
|
144
144
|
_visited_composed_classes = (Animal,)
|
|
145
|
-
object (
|
|
145
|
+
object (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor): [optional] # noqa: E501
|
|
146
146
|
type (str): [optional] # noqa: E501
|
|
147
147
|
"""
|
|
148
148
|
|
|
@@ -225,7 +225,7 @@ class SensorSensorWatchEvent(ModelNormal):
|
|
|
225
225
|
Animal class but this time we won't travel
|
|
226
226
|
through its discriminator because we passed in
|
|
227
227
|
_visited_composed_classes = (Animal,)
|
|
228
|
-
object (
|
|
228
|
+
object (GithubComArgoprojArgoEventsPkgApisEventsV1alpha1Sensor): [optional] # noqa: E501
|
|
229
229
|
type (str): [optional] # noqa: E501
|
|
230
230
|
"""
|
|
231
231
|
|