From f8cf951bee16d84186d97b5c0a6da77d63f67ac8 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sebastian=20Ho=C3=9F?= Date: Sat, 11 Nov 2023 14:19:29 +0100 Subject: [PATCH] disable Default trait MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Sebastian Hoß --- .../integration.rock8s.com/v1beta1/plugs.args | 1 + .../v1beta1/sockets.args | 1 + .../integration_rock8s_com_v1beta1/plugs.rs | 130 ++++++++-------- .../integration_rock8s_com_v1beta1/sockets.rs | 142 +++++++++--------- 4 files changed, 138 insertions(+), 136 deletions(-) create mode 100644 crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/plugs.args create mode 100644 crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/sockets.args diff --git a/crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/plugs.args b/crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/plugs.args new file mode 100644 index 000000000..7ab47510b --- /dev/null +++ b/crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/plugs.args @@ -0,0 +1 @@ +--derive=PartialEq diff --git a/crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/sockets.args b/crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/sockets.args new file mode 100644 index 000000000..7ab47510b --- /dev/null +++ b/crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/sockets.args @@ -0,0 +1 @@ +--derive=PartialEq diff --git a/kube-custom-resources-rs/src/integration_rock8s_com_v1beta1/plugs.rs b/kube-custom-resources-rs/src/integration_rock8s_com_v1beta1/plugs.rs index 723533f33..788eaf3ae 100644 --- a/kube-custom-resources-rs/src/integration_rock8s_com_v1beta1/plugs.rs +++ b/kube-custom-resources-rs/src/integration_rock8s_com_v1beta1/plugs.rs @@ -1,5 +1,5 @@ // WARNING: generated by kopium - manual changes will be overwritten -// kopium command: kopium --docs --filename=./crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/plugs.yaml --derive=Default --derive=PartialEq +// kopium command: kopium --docs --filename=./crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/plugs.yaml --derive=PartialEq // kopium version: 0.16.2 use kube::CustomResource; @@ -9,7 +9,7 @@ use std::collections::HashMap; use k8s_openapi::apimachinery::pkg::util::intstr::IntOrString; /// PlugSpec defines the desired state of Plug -#[derive(CustomResource, Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(CustomResource, Serialize, Deserialize, Clone, Debug, PartialEq)] #[kube(group = "integration.rock8s.com", version = "v1beta1", kind = "Plug", plural = "plugs")] #[kube(namespaced)] #[kube(status = "PlugStatus")] @@ -75,7 +75,7 @@ pub struct PlugSpec { } /// apparatus -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatus { /// List of containers belonging to the apparatus. Containers cannot currently be added or removed. There must be at least one container in an apparatus. Cannot be updated. pub containers: Vec, @@ -88,7 +88,7 @@ pub struct PlugApparatus { } /// A single application container that you want to run within a pod. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainers { /// Arguments to the entrypoint. The container image's CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. "$$(VAR_NAME)" will produce the string literal "$(VAR_NAME)". Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell #[serde(default, skip_serializing_if = "Option::is_none")] @@ -158,7 +158,7 @@ pub struct PlugApparatusContainers { } /// EnvVar represents an environment variable present in a Container. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnv { /// Name of the environment variable. Must be a C_IDENTIFIER. pub name: String, @@ -171,7 +171,7 @@ pub struct PlugApparatusContainersEnv { } /// Source for the environment variable's value. Cannot be used if value is not empty. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnvValueFrom { /// Selects a key of a ConfigMap. #[serde(default, skip_serializing_if = "Option::is_none", rename = "configMapKeyRef")] @@ -188,7 +188,7 @@ pub struct PlugApparatusContainersEnvValueFrom { } /// Selects a key of a ConfigMap. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnvValueFromConfigMapKeyRef { /// The key to select. pub key: String, @@ -201,7 +201,7 @@ pub struct PlugApparatusContainersEnvValueFromConfigMapKeyRef { } /// Selects a field of the pod: supports metadata.name, metadata.namespace, `metadata.labels['']`, `metadata.annotations['']`, spec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnvValueFromFieldRef { /// Version of the schema the FieldPath is written in terms of, defaults to "v1". #[serde(default, skip_serializing_if = "Option::is_none", rename = "apiVersion")] @@ -212,7 +212,7 @@ pub struct PlugApparatusContainersEnvValueFromFieldRef { } /// Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnvValueFromResourceFieldRef { /// Container name: required for volumes, optional for env vars #[serde(default, skip_serializing_if = "Option::is_none", rename = "containerName")] @@ -225,7 +225,7 @@ pub struct PlugApparatusContainersEnvValueFromResourceFieldRef { } /// Selects a key of a secret in the pod's namespace -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnvValueFromSecretKeyRef { /// The key of the secret to select from. Must be a valid secret key. pub key: String, @@ -238,7 +238,7 @@ pub struct PlugApparatusContainersEnvValueFromSecretKeyRef { } /// EnvFromSource represents the source of a set of ConfigMaps -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnvFrom { /// The ConfigMap to select from #[serde(default, skip_serializing_if = "Option::is_none", rename = "configMapRef")] @@ -252,7 +252,7 @@ pub struct PlugApparatusContainersEnvFrom { } /// The ConfigMap to select from -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnvFromConfigMapRef { /// Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names TODO: Add other useful fields. apiVersion, kind, uid? #[serde(default, skip_serializing_if = "Option::is_none")] @@ -263,7 +263,7 @@ pub struct PlugApparatusContainersEnvFromConfigMapRef { } /// The Secret to select from -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersEnvFromSecretRef { /// Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names TODO: Add other useful fields. apiVersion, kind, uid? #[serde(default, skip_serializing_if = "Option::is_none")] @@ -274,7 +274,7 @@ pub struct PlugApparatusContainersEnvFromSecretRef { } /// Actions that the management system should take in response to container lifecycle events. Cannot be updated. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecycle { /// PostStart is called immediately after a container is created. If the handler fails, the container is terminated and restarted according to its restart policy. Other management of the container blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks #[serde(default, skip_serializing_if = "Option::is_none", rename = "postStart")] @@ -285,7 +285,7 @@ pub struct PlugApparatusContainersLifecycle { } /// PostStart is called immediately after a container is created. If the handler fails, the container is terminated and restarted according to its restart policy. Other management of the container blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePostStart { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -299,7 +299,7 @@ pub struct PlugApparatusContainersLifecyclePostStart { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePostStartExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -307,7 +307,7 @@ pub struct PlugApparatusContainersLifecyclePostStartExec { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePostStartHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -326,7 +326,7 @@ pub struct PlugApparatusContainersLifecyclePostStartHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePostStartHttpGetHttpHeaders { /// The header field name pub name: String, @@ -335,7 +335,7 @@ pub struct PlugApparatusContainersLifecyclePostStartHttpGetHttpHeaders { } /// Deprecated. TCPSocket is NOT supported as a LifecycleHandler and kept for the backward compatibility. There are no validation of this field and lifecycle hooks will fail in runtime when tcp handler is specified. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePostStartTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -345,7 +345,7 @@ pub struct PlugApparatusContainersLifecyclePostStartTcpSocket { } /// PreStop is called immediately before a container is terminated due to an API request or management event such as liveness/startup probe failure, preemption, resource contention, etc. The handler is not called if the container crashes or exits. The Pod's termination grace period countdown begins before the PreStop hook is executed. Regardless of the outcome of the handler, the container will eventually terminate within the Pod's termination grace period (unless delayed by finalizers). Other management of the container blocks until the hook completes or until the termination grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePreStop { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -359,7 +359,7 @@ pub struct PlugApparatusContainersLifecyclePreStop { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePreStopExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -367,7 +367,7 @@ pub struct PlugApparatusContainersLifecyclePreStopExec { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePreStopHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -386,7 +386,7 @@ pub struct PlugApparatusContainersLifecyclePreStopHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePreStopHttpGetHttpHeaders { /// The header field name pub name: String, @@ -395,7 +395,7 @@ pub struct PlugApparatusContainersLifecyclePreStopHttpGetHttpHeaders { } /// Deprecated. TCPSocket is NOT supported as a LifecycleHandler and kept for the backward compatibility. There are no validation of this field and lifecycle hooks will fail in runtime when tcp handler is specified. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLifecyclePreStopTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -405,7 +405,7 @@ pub struct PlugApparatusContainersLifecyclePreStopTcpSocket { } /// Periodic probe of container liveness. Container will be restarted if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLivenessProbe { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -440,7 +440,7 @@ pub struct PlugApparatusContainersLivenessProbe { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLivenessProbeExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -448,7 +448,7 @@ pub struct PlugApparatusContainersLivenessProbeExec { } /// GRPC specifies an action involving a GRPC port. This is a beta field and requires enabling GRPCContainerProbe feature gate. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLivenessProbeGrpc { /// Port number of the gRPC service. Number must be in the range 1 to 65535. pub port: i32, @@ -459,7 +459,7 @@ pub struct PlugApparatusContainersLivenessProbeGrpc { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLivenessProbeHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -478,7 +478,7 @@ pub struct PlugApparatusContainersLivenessProbeHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLivenessProbeHttpGetHttpHeaders { /// The header field name pub name: String, @@ -487,7 +487,7 @@ pub struct PlugApparatusContainersLivenessProbeHttpGetHttpHeaders { } /// TCPSocket specifies an action involving a TCP port. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersLivenessProbeTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -497,7 +497,7 @@ pub struct PlugApparatusContainersLivenessProbeTcpSocket { } /// ContainerPort represents a network port in a single container. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersPorts { /// Number of port to expose on the pod's IP address. This must be a valid port number, 0 < x < 65536. #[serde(rename = "containerPort")] @@ -517,7 +517,7 @@ pub struct PlugApparatusContainersPorts { } /// Periodic probe of container service readiness. Container will be removed from service endpoints if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersReadinessProbe { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -552,7 +552,7 @@ pub struct PlugApparatusContainersReadinessProbe { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersReadinessProbeExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -560,7 +560,7 @@ pub struct PlugApparatusContainersReadinessProbeExec { } /// GRPC specifies an action involving a GRPC port. This is a beta field and requires enabling GRPCContainerProbe feature gate. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersReadinessProbeGrpc { /// Port number of the gRPC service. Number must be in the range 1 to 65535. pub port: i32, @@ -571,7 +571,7 @@ pub struct PlugApparatusContainersReadinessProbeGrpc { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersReadinessProbeHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -590,7 +590,7 @@ pub struct PlugApparatusContainersReadinessProbeHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersReadinessProbeHttpGetHttpHeaders { /// The header field name pub name: String, @@ -599,7 +599,7 @@ pub struct PlugApparatusContainersReadinessProbeHttpGetHttpHeaders { } /// TCPSocket specifies an action involving a TCP port. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersReadinessProbeTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -609,7 +609,7 @@ pub struct PlugApparatusContainersReadinessProbeTcpSocket { } /// Compute Resources required by this container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersResources { /// Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. /// This is an alpha field and requires enabling the DynamicResourceAllocation feature gate. @@ -625,14 +625,14 @@ pub struct PlugApparatusContainersResources { } /// ResourceClaim references one entry in PodSpec.ResourceClaims. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersResourcesClaims { /// Name must match the name of one entry in pod.spec.resourceClaims of the Pod where this field is used. It makes that resource available inside a container. pub name: String, } /// SecurityContext defines the security options the container should be run with. If set, the fields of SecurityContext override the equivalent fields of PodSecurityContext. More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersSecurityContext { /// AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows. #[serde(default, skip_serializing_if = "Option::is_none", rename = "allowPrivilegeEscalation")] @@ -670,7 +670,7 @@ pub struct PlugApparatusContainersSecurityContext { } /// The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersSecurityContextCapabilities { /// Added capabilities #[serde(default, skip_serializing_if = "Option::is_none")] @@ -681,7 +681,7 @@ pub struct PlugApparatusContainersSecurityContextCapabilities { } /// The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersSecurityContextSeLinuxOptions { /// Level is SELinux level label that applies to the container. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -698,7 +698,7 @@ pub struct PlugApparatusContainersSecurityContextSeLinuxOptions { } /// The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersSecurityContextSeccompProfile { /// localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must only be set if type is "Localhost". #[serde(default, skip_serializing_if = "Option::is_none", rename = "localhostProfile")] @@ -710,7 +710,7 @@ pub struct PlugApparatusContainersSecurityContextSeccompProfile { } /// The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersSecurityContextWindowsOptions { /// GMSACredentialSpec is where the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the GMSA credential spec named by the GMSACredentialSpecName field. #[serde(default, skip_serializing_if = "Option::is_none", rename = "gmsaCredentialSpec")] @@ -727,7 +727,7 @@ pub struct PlugApparatusContainersSecurityContextWindowsOptions { } /// StartupProbe indicates that the Pod has successfully initialized. If specified, no other probes are executed until this completes successfully. If this probe fails, the Pod will be restarted, just as if the livenessProbe failed. This can be used to provide different probe parameters at the beginning of a Pod's lifecycle, when it might take a long time to load data or warm a cache, than during steady-state operation. This cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersStartupProbe { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -762,7 +762,7 @@ pub struct PlugApparatusContainersStartupProbe { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersStartupProbeExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -770,7 +770,7 @@ pub struct PlugApparatusContainersStartupProbeExec { } /// GRPC specifies an action involving a GRPC port. This is a beta field and requires enabling GRPCContainerProbe feature gate. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersStartupProbeGrpc { /// Port number of the gRPC service. Number must be in the range 1 to 65535. pub port: i32, @@ -781,7 +781,7 @@ pub struct PlugApparatusContainersStartupProbeGrpc { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersStartupProbeHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -800,7 +800,7 @@ pub struct PlugApparatusContainersStartupProbeHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersStartupProbeHttpGetHttpHeaders { /// The header field name pub name: String, @@ -809,7 +809,7 @@ pub struct PlugApparatusContainersStartupProbeHttpGetHttpHeaders { } /// TCPSocket specifies an action involving a TCP port. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersStartupProbeTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -819,7 +819,7 @@ pub struct PlugApparatusContainersStartupProbeTcpSocket { } /// volumeDevice describes a mapping of a raw block device within a container. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersVolumeDevices { /// devicePath is the path inside of the container that the device will be mapped to. #[serde(rename = "devicePath")] @@ -829,7 +829,7 @@ pub struct PlugApparatusContainersVolumeDevices { } /// VolumeMount describes a mounting of a Volume within a container. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugApparatusContainersVolumeMounts { /// Path within the container at which the volume should be mounted. Must not contain ':'. #[serde(rename = "mountPath")] @@ -850,7 +850,7 @@ pub struct PlugApparatusContainersVolumeMounts { pub sub_path_expr: Option, } -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugResources { #[serde(default, skip_serializing_if = "Option::is_none", rename = "do")] pub r#do: Option, @@ -868,7 +868,7 @@ pub struct PlugResources { pub when: Option>, } -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugResultResources { #[serde(default, skip_serializing_if = "Option::is_none", rename = "do")] pub r#do: Option, @@ -883,7 +883,7 @@ pub struct PlugResultResources { } /// Var represents a variable whose value will be sourced from a field in a Kubernetes object. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugResultVars { /// FieldRef refers to the field of the object referred to by ObjRef whose value will be extracted for use in replacing $(FOO). If unspecified, this defaults to fieldPath: $defaultFieldPath #[serde(default, skip_serializing_if = "Option::is_none")] @@ -895,14 +895,14 @@ pub struct PlugResultVars { } /// FieldRef refers to the field of the object referred to by ObjRef whose value will be extracted for use in replacing $(FOO). If unspecified, this defaults to fieldPath: $defaultFieldPath -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugResultVarsFieldref { #[serde(default, skip_serializing_if = "Option::is_none", rename = "fieldPath")] pub field_path: Option, } /// ObjRef must refer to a Kubernetes resource under the purview of this kustomization. ObjRef should use the raw name of the object (the name specified in its YAML, before addition of a namePrefix and a nameSuffix). -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugResultVarsObjref { #[serde(default, skip_serializing_if = "Option::is_none", rename = "apiVersion")] pub api_version: Option, @@ -918,7 +918,7 @@ pub struct PlugResultVarsObjref { } /// socket -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugSocket { /// name pub name: String, @@ -928,7 +928,7 @@ pub struct PlugSocket { } /// Var represents a variable whose value will be sourced from a field in a Kubernetes object. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugVars { /// FieldRef refers to the field of the object referred to by ObjRef whose value will be extracted for use in replacing $(FOO). If unspecified, this defaults to fieldPath: $defaultFieldPath #[serde(default, skip_serializing_if = "Option::is_none")] @@ -940,14 +940,14 @@ pub struct PlugVars { } /// FieldRef refers to the field of the object referred to by ObjRef whose value will be extracted for use in replacing $(FOO). If unspecified, this defaults to fieldPath: $defaultFieldPath -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugVarsFieldref { #[serde(default, skip_serializing_if = "Option::is_none", rename = "fieldPath")] pub field_path: Option, } /// ObjRef must refer to a Kubernetes resource under the purview of this kustomization. ObjRef should use the raw name of the object (the name specified in its YAML, before addition of a namePrefix and a nameSuffix). -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugVarsObjref { #[serde(default, skip_serializing_if = "Option::is_none", rename = "apiVersion")] pub api_version: Option, @@ -963,7 +963,7 @@ pub struct PlugVarsObjref { } /// PlugStatus defines the observed state of Plug -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugStatus { /// Conditions represent the latest available observations of an object's state #[serde(default, skip_serializing_if = "Option::is_none")] @@ -979,7 +979,7 @@ pub struct PlugStatus { /// Condition contains details for one aspect of the current state of this API Resource. --- This struct is intended for direct use as an array at the field path .status.conditions. For example, /// type FooStatus struct{ // Represents the observations of a foo's current state. // Known .status.conditions.type are: "Available", "Progressing", and "Degraded" // +patchMergeKey=type // +patchStrategy=merge // +listType=map // +listMapKey=type Conditions []metav1.Condition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,1,rep,name=conditions"` /// // other fields } -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugStatusConditions { /// lastTransitionTime is the last time the condition transitioned from one status to another. This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. #[serde(rename = "lastTransitionTime")] @@ -1009,7 +1009,7 @@ pub enum PlugStatusConditionsStatus { } /// coupled result -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugStatusCoupledResult { /// observed generation #[serde(default, skip_serializing_if = "Option::is_none", rename = "observedGeneration")] @@ -1023,7 +1023,7 @@ pub struct PlugStatusCoupledResult { } /// socket coupled to plug -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct PlugStatusCoupledSocket { /// API version of the socket #[serde(default, skip_serializing_if = "Option::is_none", rename = "apiVersion")] diff --git a/kube-custom-resources-rs/src/integration_rock8s_com_v1beta1/sockets.rs b/kube-custom-resources-rs/src/integration_rock8s_com_v1beta1/sockets.rs index 3054477f8..8a27ee24b 100644 --- a/kube-custom-resources-rs/src/integration_rock8s_com_v1beta1/sockets.rs +++ b/kube-custom-resources-rs/src/integration_rock8s_com_v1beta1/sockets.rs @@ -1,5 +1,5 @@ // WARNING: generated by kopium - manual changes will be overwritten -// kopium command: kopium --docs --filename=./crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/sockets.yaml --derive=Default --derive=PartialEq +// kopium command: kopium --docs --filename=./crd-catalog/clayrisser/integration-operator/integration.rock8s.com/v1beta1/sockets.yaml --derive=PartialEq // kopium version: 0.16.2 use kube::CustomResource; @@ -9,7 +9,7 @@ use std::collections::HashMap; use k8s_openapi::apimachinery::pkg::util::intstr::IntOrString; /// SocketSpec defines the desired state of Socket -#[derive(CustomResource, Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(CustomResource, Serialize, Deserialize, Clone, Debug, PartialEq)] #[kube(group = "integration.rock8s.com", version = "v1beta1", kind = "Socket", plural = "sockets")] #[kube(namespaced)] #[kube(status = "SocketStatus")] @@ -81,7 +81,7 @@ pub struct SocketSpec { } /// apparatus -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatus { /// List of containers belonging to the apparatus. Containers cannot currently be added or removed. There must be at least one container in an apparatus. Cannot be updated. pub containers: Vec, @@ -94,7 +94,7 @@ pub struct SocketApparatus { } /// A single application container that you want to run within a pod. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainers { /// Arguments to the entrypoint. The container image's CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. "$$(VAR_NAME)" will produce the string literal "$(VAR_NAME)". Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell #[serde(default, skip_serializing_if = "Option::is_none")] @@ -164,7 +164,7 @@ pub struct SocketApparatusContainers { } /// EnvVar represents an environment variable present in a Container. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnv { /// Name of the environment variable. Must be a C_IDENTIFIER. pub name: String, @@ -177,7 +177,7 @@ pub struct SocketApparatusContainersEnv { } /// Source for the environment variable's value. Cannot be used if value is not empty. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnvValueFrom { /// Selects a key of a ConfigMap. #[serde(default, skip_serializing_if = "Option::is_none", rename = "configMapKeyRef")] @@ -194,7 +194,7 @@ pub struct SocketApparatusContainersEnvValueFrom { } /// Selects a key of a ConfigMap. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnvValueFromConfigMapKeyRef { /// The key to select. pub key: String, @@ -207,7 +207,7 @@ pub struct SocketApparatusContainersEnvValueFromConfigMapKeyRef { } /// Selects a field of the pod: supports metadata.name, metadata.namespace, `metadata.labels['']`, `metadata.annotations['']`, spec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnvValueFromFieldRef { /// Version of the schema the FieldPath is written in terms of, defaults to "v1". #[serde(default, skip_serializing_if = "Option::is_none", rename = "apiVersion")] @@ -218,7 +218,7 @@ pub struct SocketApparatusContainersEnvValueFromFieldRef { } /// Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnvValueFromResourceFieldRef { /// Container name: required for volumes, optional for env vars #[serde(default, skip_serializing_if = "Option::is_none", rename = "containerName")] @@ -231,7 +231,7 @@ pub struct SocketApparatusContainersEnvValueFromResourceFieldRef { } /// Selects a key of a secret in the pod's namespace -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnvValueFromSecretKeyRef { /// The key of the secret to select from. Must be a valid secret key. pub key: String, @@ -244,7 +244,7 @@ pub struct SocketApparatusContainersEnvValueFromSecretKeyRef { } /// EnvFromSource represents the source of a set of ConfigMaps -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnvFrom { /// The ConfigMap to select from #[serde(default, skip_serializing_if = "Option::is_none", rename = "configMapRef")] @@ -258,7 +258,7 @@ pub struct SocketApparatusContainersEnvFrom { } /// The ConfigMap to select from -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnvFromConfigMapRef { /// Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names TODO: Add other useful fields. apiVersion, kind, uid? #[serde(default, skip_serializing_if = "Option::is_none")] @@ -269,7 +269,7 @@ pub struct SocketApparatusContainersEnvFromConfigMapRef { } /// The Secret to select from -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersEnvFromSecretRef { /// Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names TODO: Add other useful fields. apiVersion, kind, uid? #[serde(default, skip_serializing_if = "Option::is_none")] @@ -280,7 +280,7 @@ pub struct SocketApparatusContainersEnvFromSecretRef { } /// Actions that the management system should take in response to container lifecycle events. Cannot be updated. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecycle { /// PostStart is called immediately after a container is created. If the handler fails, the container is terminated and restarted according to its restart policy. Other management of the container blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks #[serde(default, skip_serializing_if = "Option::is_none", rename = "postStart")] @@ -291,7 +291,7 @@ pub struct SocketApparatusContainersLifecycle { } /// PostStart is called immediately after a container is created. If the handler fails, the container is terminated and restarted according to its restart policy. Other management of the container blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePostStart { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -305,7 +305,7 @@ pub struct SocketApparatusContainersLifecyclePostStart { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePostStartExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -313,7 +313,7 @@ pub struct SocketApparatusContainersLifecyclePostStartExec { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePostStartHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -332,7 +332,7 @@ pub struct SocketApparatusContainersLifecyclePostStartHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePostStartHttpGetHttpHeaders { /// The header field name pub name: String, @@ -341,7 +341,7 @@ pub struct SocketApparatusContainersLifecyclePostStartHttpGetHttpHeaders { } /// Deprecated. TCPSocket is NOT supported as a LifecycleHandler and kept for the backward compatibility. There are no validation of this field and lifecycle hooks will fail in runtime when tcp handler is specified. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePostStartTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -351,7 +351,7 @@ pub struct SocketApparatusContainersLifecyclePostStartTcpSocket { } /// PreStop is called immediately before a container is terminated due to an API request or management event such as liveness/startup probe failure, preemption, resource contention, etc. The handler is not called if the container crashes or exits. The Pod's termination grace period countdown begins before the PreStop hook is executed. Regardless of the outcome of the handler, the container will eventually terminate within the Pod's termination grace period (unless delayed by finalizers). Other management of the container blocks until the hook completes or until the termination grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePreStop { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -365,7 +365,7 @@ pub struct SocketApparatusContainersLifecyclePreStop { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePreStopExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -373,7 +373,7 @@ pub struct SocketApparatusContainersLifecyclePreStopExec { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePreStopHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -392,7 +392,7 @@ pub struct SocketApparatusContainersLifecyclePreStopHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePreStopHttpGetHttpHeaders { /// The header field name pub name: String, @@ -401,7 +401,7 @@ pub struct SocketApparatusContainersLifecyclePreStopHttpGetHttpHeaders { } /// Deprecated. TCPSocket is NOT supported as a LifecycleHandler and kept for the backward compatibility. There are no validation of this field and lifecycle hooks will fail in runtime when tcp handler is specified. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLifecyclePreStopTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -411,7 +411,7 @@ pub struct SocketApparatusContainersLifecyclePreStopTcpSocket { } /// Periodic probe of container liveness. Container will be restarted if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLivenessProbe { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -446,7 +446,7 @@ pub struct SocketApparatusContainersLivenessProbe { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLivenessProbeExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -454,7 +454,7 @@ pub struct SocketApparatusContainersLivenessProbeExec { } /// GRPC specifies an action involving a GRPC port. This is a beta field and requires enabling GRPCContainerProbe feature gate. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLivenessProbeGrpc { /// Port number of the gRPC service. Number must be in the range 1 to 65535. pub port: i32, @@ -465,7 +465,7 @@ pub struct SocketApparatusContainersLivenessProbeGrpc { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLivenessProbeHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -484,7 +484,7 @@ pub struct SocketApparatusContainersLivenessProbeHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLivenessProbeHttpGetHttpHeaders { /// The header field name pub name: String, @@ -493,7 +493,7 @@ pub struct SocketApparatusContainersLivenessProbeHttpGetHttpHeaders { } /// TCPSocket specifies an action involving a TCP port. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersLivenessProbeTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -503,7 +503,7 @@ pub struct SocketApparatusContainersLivenessProbeTcpSocket { } /// ContainerPort represents a network port in a single container. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersPorts { /// Number of port to expose on the pod's IP address. This must be a valid port number, 0 < x < 65536. #[serde(rename = "containerPort")] @@ -523,7 +523,7 @@ pub struct SocketApparatusContainersPorts { } /// Periodic probe of container service readiness. Container will be removed from service endpoints if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersReadinessProbe { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -558,7 +558,7 @@ pub struct SocketApparatusContainersReadinessProbe { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersReadinessProbeExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -566,7 +566,7 @@ pub struct SocketApparatusContainersReadinessProbeExec { } /// GRPC specifies an action involving a GRPC port. This is a beta field and requires enabling GRPCContainerProbe feature gate. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersReadinessProbeGrpc { /// Port number of the gRPC service. Number must be in the range 1 to 65535. pub port: i32, @@ -577,7 +577,7 @@ pub struct SocketApparatusContainersReadinessProbeGrpc { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersReadinessProbeHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -596,7 +596,7 @@ pub struct SocketApparatusContainersReadinessProbeHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersReadinessProbeHttpGetHttpHeaders { /// The header field name pub name: String, @@ -605,7 +605,7 @@ pub struct SocketApparatusContainersReadinessProbeHttpGetHttpHeaders { } /// TCPSocket specifies an action involving a TCP port. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersReadinessProbeTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -615,7 +615,7 @@ pub struct SocketApparatusContainersReadinessProbeTcpSocket { } /// Compute Resources required by this container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersResources { /// Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. /// This is an alpha field and requires enabling the DynamicResourceAllocation feature gate. @@ -631,14 +631,14 @@ pub struct SocketApparatusContainersResources { } /// ResourceClaim references one entry in PodSpec.ResourceClaims. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersResourcesClaims { /// Name must match the name of one entry in pod.spec.resourceClaims of the Pod where this field is used. It makes that resource available inside a container. pub name: String, } /// SecurityContext defines the security options the container should be run with. If set, the fields of SecurityContext override the equivalent fields of PodSecurityContext. More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersSecurityContext { /// AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows. #[serde(default, skip_serializing_if = "Option::is_none", rename = "allowPrivilegeEscalation")] @@ -676,7 +676,7 @@ pub struct SocketApparatusContainersSecurityContext { } /// The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersSecurityContextCapabilities { /// Added capabilities #[serde(default, skip_serializing_if = "Option::is_none")] @@ -687,7 +687,7 @@ pub struct SocketApparatusContainersSecurityContextCapabilities { } /// The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersSecurityContextSeLinuxOptions { /// Level is SELinux level label that applies to the container. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -704,7 +704,7 @@ pub struct SocketApparatusContainersSecurityContextSeLinuxOptions { } /// The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersSecurityContextSeccompProfile { /// localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must only be set if type is "Localhost". #[serde(default, skip_serializing_if = "Option::is_none", rename = "localhostProfile")] @@ -716,7 +716,7 @@ pub struct SocketApparatusContainersSecurityContextSeccompProfile { } /// The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersSecurityContextWindowsOptions { /// GMSACredentialSpec is where the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the GMSA credential spec named by the GMSACredentialSpecName field. #[serde(default, skip_serializing_if = "Option::is_none", rename = "gmsaCredentialSpec")] @@ -733,7 +733,7 @@ pub struct SocketApparatusContainersSecurityContextWindowsOptions { } /// StartupProbe indicates that the Pod has successfully initialized. If specified, no other probes are executed until this completes successfully. If this probe fails, the Pod will be restarted, just as if the livenessProbe failed. This can be used to provide different probe parameters at the beginning of a Pod's lifecycle, when it might take a long time to load data or warm a cache, than during steady-state operation. This cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersStartupProbe { /// Exec specifies the action to take. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -768,7 +768,7 @@ pub struct SocketApparatusContainersStartupProbe { } /// Exec specifies the action to take. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersStartupProbeExec { /// Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -776,7 +776,7 @@ pub struct SocketApparatusContainersStartupProbeExec { } /// GRPC specifies an action involving a GRPC port. This is a beta field and requires enabling GRPCContainerProbe feature gate. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersStartupProbeGrpc { /// Port number of the gRPC service. Number must be in the range 1 to 65535. pub port: i32, @@ -787,7 +787,7 @@ pub struct SocketApparatusContainersStartupProbeGrpc { } /// HTTPGet specifies the http request to perform. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersStartupProbeHttpGet { /// Host name to connect to, defaults to the pod IP. You probably want to set "Host" in httpHeaders instead. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -806,7 +806,7 @@ pub struct SocketApparatusContainersStartupProbeHttpGet { } /// HTTPHeader describes a custom header to be used in HTTP probes -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersStartupProbeHttpGetHttpHeaders { /// The header field name pub name: String, @@ -815,7 +815,7 @@ pub struct SocketApparatusContainersStartupProbeHttpGetHttpHeaders { } /// TCPSocket specifies an action involving a TCP port. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersStartupProbeTcpSocket { /// Optional: Host name to connect to, defaults to the pod IP. #[serde(default, skip_serializing_if = "Option::is_none")] @@ -825,7 +825,7 @@ pub struct SocketApparatusContainersStartupProbeTcpSocket { } /// volumeDevice describes a mapping of a raw block device within a container. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersVolumeDevices { /// devicePath is the path inside of the container that the device will be mapped to. #[serde(rename = "devicePath")] @@ -835,7 +835,7 @@ pub struct SocketApparatusContainersVolumeDevices { } /// VolumeMount describes a mounting of a Volume within a container. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketApparatusContainersVolumeMounts { /// Path within the container at which the volume should be mounted. Must not contain ':'. #[serde(rename = "mountPath")] @@ -857,7 +857,7 @@ pub struct SocketApparatusContainersVolumeMounts { } /// interface -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketInterface { /// config interface #[serde(default, skip_serializing_if = "Option::is_none")] @@ -868,7 +868,7 @@ pub struct SocketInterface { } /// config interface -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketInterfaceConfig { /// plug config properties #[serde(default, skip_serializing_if = "Option::is_none")] @@ -879,7 +879,7 @@ pub struct SocketInterfaceConfig { } /// plug config properties -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketInterfaceConfigPlug { #[serde(default, skip_serializing_if = "Option::is_none")] pub default: Option, @@ -890,7 +890,7 @@ pub struct SocketInterfaceConfigPlug { } /// socket config properties -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketInterfaceConfigSocket { #[serde(default, skip_serializing_if = "Option::is_none")] pub default: Option, @@ -901,7 +901,7 @@ pub struct SocketInterfaceConfigSocket { } /// result interface -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketInterfaceResult { /// plug result properties #[serde(default, skip_serializing_if = "Option::is_none")] @@ -912,7 +912,7 @@ pub struct SocketInterfaceResult { } /// plug result properties -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketInterfaceResultPlug { #[serde(default, skip_serializing_if = "Option::is_none")] pub default: Option, @@ -923,7 +923,7 @@ pub struct SocketInterfaceResultPlug { } /// socket result properties -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketInterfaceResultSocket { #[serde(default, skip_serializing_if = "Option::is_none")] pub default: Option, @@ -933,7 +933,7 @@ pub struct SocketInterfaceResultSocket { pub required: Option, } -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketResources { #[serde(default, skip_serializing_if = "Option::is_none", rename = "do")] pub r#do: Option, @@ -951,7 +951,7 @@ pub struct SocketResources { pub when: Option>, } -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketResultResources { #[serde(default, skip_serializing_if = "Option::is_none", rename = "do")] pub r#do: Option, @@ -966,7 +966,7 @@ pub struct SocketResultResources { } /// Var represents a variable whose value will be sourced from a field in a Kubernetes object. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketResultVars { /// FieldRef refers to the field of the object referred to by ObjRef whose value will be extracted for use in replacing $(FOO). If unspecified, this defaults to fieldPath: $defaultFieldPath #[serde(default, skip_serializing_if = "Option::is_none")] @@ -978,14 +978,14 @@ pub struct SocketResultVars { } /// FieldRef refers to the field of the object referred to by ObjRef whose value will be extracted for use in replacing $(FOO). If unspecified, this defaults to fieldPath: $defaultFieldPath -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketResultVarsFieldref { #[serde(default, skip_serializing_if = "Option::is_none", rename = "fieldPath")] pub field_path: Option, } /// ObjRef must refer to a Kubernetes resource under the purview of this kustomization. ObjRef should use the raw name of the object (the name specified in its YAML, before addition of a namePrefix and a nameSuffix). -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketResultVarsObjref { #[serde(default, skip_serializing_if = "Option::is_none", rename = "apiVersion")] pub api_version: Option, @@ -1001,7 +1001,7 @@ pub struct SocketResultVarsObjref { } /// validation -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketValidation { /// namespace blacklist #[serde(default, skip_serializing_if = "Option::is_none", rename = "namespaceBlacklist")] @@ -1012,7 +1012,7 @@ pub struct SocketValidation { } /// Var represents a variable whose value will be sourced from a field in a Kubernetes object. -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketVars { /// FieldRef refers to the field of the object referred to by ObjRef whose value will be extracted for use in replacing $(FOO). If unspecified, this defaults to fieldPath: $defaultFieldPath #[serde(default, skip_serializing_if = "Option::is_none")] @@ -1024,14 +1024,14 @@ pub struct SocketVars { } /// FieldRef refers to the field of the object referred to by ObjRef whose value will be extracted for use in replacing $(FOO). If unspecified, this defaults to fieldPath: $defaultFieldPath -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketVarsFieldref { #[serde(default, skip_serializing_if = "Option::is_none", rename = "fieldPath")] pub field_path: Option, } /// ObjRef must refer to a Kubernetes resource under the purview of this kustomization. ObjRef should use the raw name of the object (the name specified in its YAML, before addition of a namePrefix and a nameSuffix). -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketVarsObjref { #[serde(default, skip_serializing_if = "Option::is_none", rename = "apiVersion")] pub api_version: Option, @@ -1047,7 +1047,7 @@ pub struct SocketVarsObjref { } /// SocketStatus defines the observed state of Socket -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketStatus { /// Conditions represent the latest available observations of an object's state #[serde(default, skip_serializing_if = "Option::is_none")] @@ -1060,7 +1060,7 @@ pub struct SocketStatus { /// Condition contains details for one aspect of the current state of this API Resource. --- This struct is intended for direct use as an array at the field path .status.conditions. For example, /// type FooStatus struct{ // Represents the observations of a foo's current state. // Known .status.conditions.type are: "Available", "Progressing", and "Degraded" // +patchMergeKey=type // +patchStrategy=merge // +listType=map // +listMapKey=type Conditions []metav1.Condition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type" protobuf:"bytes,1,rep,name=conditions"` /// // other fields } -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketStatusConditions { /// lastTransitionTime is the last time the condition transitioned from one status to another. This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable. #[serde(rename = "lastTransitionTime")] @@ -1089,7 +1089,7 @@ pub enum SocketStatusConditionsStatus { Unknown, } -#[derive(Serialize, Deserialize, Clone, Debug, Default, PartialEq)] +#[derive(Serialize, Deserialize, Clone, Debug, PartialEq)] pub struct SocketStatusCoupledPlugs { /// API version of the plug #[serde(rename = "apiVersion")]