godep: Update kubernetes dependency to get latest API
Signed-off-by: Mrunal Patel <mrunalp@gmail.com>
This commit is contained in:
parent
47f0c1b4e5
commit
f569f04154
4 changed files with 132 additions and 66 deletions
4
Godeps/Godeps.json
generated
4
Godeps/Godeps.json
generated
|
@ -272,8 +272,8 @@
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"ImportPath": "github.com/kubernetes/kubernetes/pkg/kubelet/api/v1alpha1/runtime",
|
"ImportPath": "github.com/kubernetes/kubernetes/pkg/kubelet/api/v1alpha1/runtime",
|
||||||
"Comment": "v1.4.0-alpha.1-489-g976ca09",
|
"Comment": "v1.4.0-alpha.2-500-ge18eda9",
|
||||||
"Rev": "976ca09d714cf114fb7a9e681bc0b170760cbdab"
|
"Rev": "e18eda9b2b80128a4464cd8712801152e48afe37"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"ImportPath": "github.com/opencontainers/ocitools/generate",
|
"ImportPath": "github.com/opencontainers/ocitools/generate",
|
||||||
|
|
|
@ -141,7 +141,7 @@ func (s *Server) StopPodSandbox(context.Context, *pb.StopPodSandboxRequest) (*pb
|
||||||
|
|
||||||
// DeletePodSandbox deletes the sandbox. If there are any running containers in the
|
// DeletePodSandbox deletes the sandbox. If there are any running containers in the
|
||||||
// sandbox, they should be force deleted.
|
// sandbox, they should be force deleted.
|
||||||
func (s *Server) DeletePodSandbox(context.Context, *pb.DeletePodSandboxRequest) (*pb.DeletePodSandboxResponse, error) {
|
func (s *Server) RemovePodSandbox(context.Context, *pb.RemovePodSandboxRequest) (*pb.RemovePodSandboxResponse, error) {
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
138
vendor/github.com/kubernetes/kubernetes/pkg/kubelet/api/v1alpha1/runtime/api.pb.go
generated
vendored
138
vendor/github.com/kubernetes/kubernetes/pkg/kubelet/api/v1alpha1/runtime/api.pb.go
generated
vendored
|
@ -39,8 +39,8 @@ It has these top-level messages:
|
||||||
CreatePodSandboxResponse
|
CreatePodSandboxResponse
|
||||||
StopPodSandboxRequest
|
StopPodSandboxRequest
|
||||||
StopPodSandboxResponse
|
StopPodSandboxResponse
|
||||||
DeletePodSandboxRequest
|
RemovePodSandboxRequest
|
||||||
DeletePodSandboxResponse
|
RemovePodSandboxResponse
|
||||||
PodSandboxStatusRequest
|
PodSandboxStatusRequest
|
||||||
PodSandboxNetworkStatus
|
PodSandboxNetworkStatus
|
||||||
Namespace
|
Namespace
|
||||||
|
@ -57,6 +57,7 @@ It has these top-level messages:
|
||||||
SELinuxOption
|
SELinuxOption
|
||||||
Capability
|
Capability
|
||||||
LinuxContainerConfig
|
LinuxContainerConfig
|
||||||
|
LinuxUser
|
||||||
ContainerConfig
|
ContainerConfig
|
||||||
CreateContainerRequest
|
CreateContainerRequest
|
||||||
CreateContainerResponse
|
CreateContainerResponse
|
||||||
|
@ -541,13 +542,13 @@ type PodSandboxConfig struct {
|
||||||
// By default the log of a container going into the LogDirectory will be
|
// By default the log of a container going into the LogDirectory will be
|
||||||
// hooked up to STDOUT and STDERR. However, the LogDirectory may contain
|
// hooked up to STDOUT and STDERR. However, the LogDirectory may contain
|
||||||
// binary log files with structured logging data from the individual
|
// binary log files with structured logging data from the individual
|
||||||
// containers. For example the files might be newline seperated JSON
|
// containers. For example, the files might be newline separated JSON
|
||||||
// structured logs, systemd-journald journal files, gRPC trace files, etc.
|
// structured logs, systemd-journald journal files, gRPC trace files, etc.
|
||||||
// E.g.,
|
// E.g.,
|
||||||
// PodSandboxConfig.LogDirectory = `/var/log/pods/<podUID>/`
|
// PodSandboxConfig.LogDirectory = `/var/log/pods/<podUID>/`
|
||||||
// ContainerConfig.LogPath = `containerName_Instance#.log`
|
// ContainerConfig.LogPath = `containerName_Instance#.log`
|
||||||
//
|
//
|
||||||
// WARNING: Log managment and how kubelet should interface with the
|
// WARNING: Log management and how kubelet should interface with the
|
||||||
// container logs are under active discussion in
|
// container logs are under active discussion in
|
||||||
// https://issues.k8s.io/24677. There *may* be future change of direction
|
// https://issues.k8s.io/24677. There *may* be future change of direction
|
||||||
// for logging as the discussion carries on.
|
// for logging as the discussion carries on.
|
||||||
|
@ -560,7 +561,7 @@ type PodSandboxConfig struct {
|
||||||
// aggregate cpu/memory resources limits of all containers).
|
// aggregate cpu/memory resources limits of all containers).
|
||||||
// Note: On a Linux host, kubelet will create a pod-level cgroup and pass
|
// Note: On a Linux host, kubelet will create a pod-level cgroup and pass
|
||||||
// it as the cgroup parent for the PodSandbox. For some runtimes, this is
|
// it as the cgroup parent for the PodSandbox. For some runtimes, this is
|
||||||
// sufficent. For others, e.g., hypervisor-based runtimes, explicit
|
// sufficient. For others, e.g., hypervisor-based runtimes, explicit
|
||||||
// resource limits for the sandbox are needed at creation time.
|
// resource limits for the sandbox are needed at creation time.
|
||||||
Resources *PodSandboxResources `protobuf:"bytes,6,opt,name=resources" json:"resources,omitempty"`
|
Resources *PodSandboxResources `protobuf:"bytes,6,opt,name=resources" json:"resources,omitempty"`
|
||||||
// Labels are key value pairs that may be used to scope and select individual resources.
|
// Labels are key value pairs that may be used to scope and select individual resources.
|
||||||
|
@ -699,30 +700,30 @@ func (m *StopPodSandboxResponse) Reset() { *m = StopPodSandboxResponse{}
|
||||||
func (m *StopPodSandboxResponse) String() string { return proto.CompactTextString(m) }
|
func (m *StopPodSandboxResponse) String() string { return proto.CompactTextString(m) }
|
||||||
func (*StopPodSandboxResponse) ProtoMessage() {}
|
func (*StopPodSandboxResponse) ProtoMessage() {}
|
||||||
|
|
||||||
type DeletePodSandboxRequest struct {
|
type RemovePodSandboxRequest struct {
|
||||||
// The id of the PodSandBox
|
// The id of the PodSandBox
|
||||||
PodSandboxId *string `protobuf:"bytes,1,opt,name=pod_sandbox_id" json:"pod_sandbox_id,omitempty"`
|
PodSandboxId *string `protobuf:"bytes,1,opt,name=pod_sandbox_id" json:"pod_sandbox_id,omitempty"`
|
||||||
XXX_unrecognized []byte `json:"-"`
|
XXX_unrecognized []byte `json:"-"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *DeletePodSandboxRequest) Reset() { *m = DeletePodSandboxRequest{} }
|
func (m *RemovePodSandboxRequest) Reset() { *m = RemovePodSandboxRequest{} }
|
||||||
func (m *DeletePodSandboxRequest) String() string { return proto.CompactTextString(m) }
|
func (m *RemovePodSandboxRequest) String() string { return proto.CompactTextString(m) }
|
||||||
func (*DeletePodSandboxRequest) ProtoMessage() {}
|
func (*RemovePodSandboxRequest) ProtoMessage() {}
|
||||||
|
|
||||||
func (m *DeletePodSandboxRequest) GetPodSandboxId() string {
|
func (m *RemovePodSandboxRequest) GetPodSandboxId() string {
|
||||||
if m != nil && m.PodSandboxId != nil {
|
if m != nil && m.PodSandboxId != nil {
|
||||||
return *m.PodSandboxId
|
return *m.PodSandboxId
|
||||||
}
|
}
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
type DeletePodSandboxResponse struct {
|
type RemovePodSandboxResponse struct {
|
||||||
XXX_unrecognized []byte `json:"-"`
|
XXX_unrecognized []byte `json:"-"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *DeletePodSandboxResponse) Reset() { *m = DeletePodSandboxResponse{} }
|
func (m *RemovePodSandboxResponse) Reset() { *m = RemovePodSandboxResponse{} }
|
||||||
func (m *DeletePodSandboxResponse) String() string { return proto.CompactTextString(m) }
|
func (m *RemovePodSandboxResponse) String() string { return proto.CompactTextString(m) }
|
||||||
func (*DeletePodSandboxResponse) ProtoMessage() {}
|
func (*RemovePodSandboxResponse) ProtoMessage() {}
|
||||||
|
|
||||||
type PodSandboxStatusRequest struct {
|
type PodSandboxStatusRequest struct {
|
||||||
// The id of the PodSandBox
|
// The id of the PodSandBox
|
||||||
|
@ -1217,6 +1218,8 @@ type LinuxContainerConfig struct {
|
||||||
Capabilities *Capability `protobuf:"bytes,2,opt,name=capabilities" json:"capabilities,omitempty"`
|
Capabilities *Capability `protobuf:"bytes,2,opt,name=capabilities" json:"capabilities,omitempty"`
|
||||||
// Optional SELinux context to be applied.
|
// Optional SELinux context to be applied.
|
||||||
SelinuxOptions *SELinuxOption `protobuf:"bytes,3,opt,name=selinux_options" json:"selinux_options,omitempty"`
|
SelinuxOptions *SELinuxOption `protobuf:"bytes,3,opt,name=selinux_options" json:"selinux_options,omitempty"`
|
||||||
|
// User contains the user for the container process.
|
||||||
|
User *LinuxUser `protobuf:"bytes,4,opt,name=user" json:"user,omitempty"`
|
||||||
XXX_unrecognized []byte `json:"-"`
|
XXX_unrecognized []byte `json:"-"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1245,6 +1248,48 @@ func (m *LinuxContainerConfig) GetSelinuxOptions() *SELinuxOption {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (m *LinuxContainerConfig) GetUser() *LinuxUser {
|
||||||
|
if m != nil {
|
||||||
|
return m.User
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type LinuxUser struct {
|
||||||
|
// uid specifies the user ID the container process has.
|
||||||
|
Uid *int64 `protobuf:"varint,1,opt,name=uid" json:"uid,omitempty"`
|
||||||
|
// gid specifies the group ID the container process has.
|
||||||
|
Gid *int64 `protobuf:"varint,2,opt,name=gid" json:"gid,omitempty"`
|
||||||
|
// additional_gids specifies additional GIDs the container process has.
|
||||||
|
AdditionalGids []int64 `protobuf:"varint,3,rep,name=additional_gids" json:"additional_gids,omitempty"`
|
||||||
|
XXX_unrecognized []byte `json:"-"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *LinuxUser) Reset() { *m = LinuxUser{} }
|
||||||
|
func (m *LinuxUser) String() string { return proto.CompactTextString(m) }
|
||||||
|
func (*LinuxUser) ProtoMessage() {}
|
||||||
|
|
||||||
|
func (m *LinuxUser) GetUid() int64 {
|
||||||
|
if m != nil && m.Uid != nil {
|
||||||
|
return *m.Uid
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *LinuxUser) GetGid() int64 {
|
||||||
|
if m != nil && m.Gid != nil {
|
||||||
|
return *m.Gid
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *LinuxUser) GetAdditionalGids() []int64 {
|
||||||
|
if m != nil {
|
||||||
|
return m.AdditionalGids
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
type ContainerConfig struct {
|
type ContainerConfig struct {
|
||||||
// Name of the container.
|
// Name of the container.
|
||||||
Name *string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"`
|
Name *string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"`
|
||||||
|
@ -1281,7 +1326,7 @@ type ContainerConfig struct {
|
||||||
// PodSandboxConfig.LogDirectory = `/var/log/pods/<podUID>/`
|
// PodSandboxConfig.LogDirectory = `/var/log/pods/<podUID>/`
|
||||||
// ContainerConfig.LogPath = `containerName_Instance#.log`
|
// ContainerConfig.LogPath = `containerName_Instance#.log`
|
||||||
//
|
//
|
||||||
// WARNING: Log managment and how kubelet should interface with the
|
// WARNING: Log management and how kubelet should interface with the
|
||||||
// container logs are under active discussion in
|
// container logs are under active discussion in
|
||||||
// https://issues.k8s.io/24677. There *may* be future change of direction
|
// https://issues.k8s.io/24677. There *may* be future change of direction
|
||||||
// for logging as the discussion carries on.
|
// for logging as the discussion carries on.
|
||||||
|
@ -2210,8 +2255,8 @@ func init() {
|
||||||
proto.RegisterType((*CreatePodSandboxResponse)(nil), "runtime.CreatePodSandboxResponse")
|
proto.RegisterType((*CreatePodSandboxResponse)(nil), "runtime.CreatePodSandboxResponse")
|
||||||
proto.RegisterType((*StopPodSandboxRequest)(nil), "runtime.StopPodSandboxRequest")
|
proto.RegisterType((*StopPodSandboxRequest)(nil), "runtime.StopPodSandboxRequest")
|
||||||
proto.RegisterType((*StopPodSandboxResponse)(nil), "runtime.StopPodSandboxResponse")
|
proto.RegisterType((*StopPodSandboxResponse)(nil), "runtime.StopPodSandboxResponse")
|
||||||
proto.RegisterType((*DeletePodSandboxRequest)(nil), "runtime.DeletePodSandboxRequest")
|
proto.RegisterType((*RemovePodSandboxRequest)(nil), "runtime.RemovePodSandboxRequest")
|
||||||
proto.RegisterType((*DeletePodSandboxResponse)(nil), "runtime.DeletePodSandboxResponse")
|
proto.RegisterType((*RemovePodSandboxResponse)(nil), "runtime.RemovePodSandboxResponse")
|
||||||
proto.RegisterType((*PodSandboxStatusRequest)(nil), "runtime.PodSandboxStatusRequest")
|
proto.RegisterType((*PodSandboxStatusRequest)(nil), "runtime.PodSandboxStatusRequest")
|
||||||
proto.RegisterType((*PodSandboxNetworkStatus)(nil), "runtime.PodSandboxNetworkStatus")
|
proto.RegisterType((*PodSandboxNetworkStatus)(nil), "runtime.PodSandboxNetworkStatus")
|
||||||
proto.RegisterType((*Namespace)(nil), "runtime.Namespace")
|
proto.RegisterType((*Namespace)(nil), "runtime.Namespace")
|
||||||
|
@ -2228,6 +2273,7 @@ func init() {
|
||||||
proto.RegisterType((*SELinuxOption)(nil), "runtime.SELinuxOption")
|
proto.RegisterType((*SELinuxOption)(nil), "runtime.SELinuxOption")
|
||||||
proto.RegisterType((*Capability)(nil), "runtime.Capability")
|
proto.RegisterType((*Capability)(nil), "runtime.Capability")
|
||||||
proto.RegisterType((*LinuxContainerConfig)(nil), "runtime.LinuxContainerConfig")
|
proto.RegisterType((*LinuxContainerConfig)(nil), "runtime.LinuxContainerConfig")
|
||||||
|
proto.RegisterType((*LinuxUser)(nil), "runtime.LinuxUser")
|
||||||
proto.RegisterType((*ContainerConfig)(nil), "runtime.ContainerConfig")
|
proto.RegisterType((*ContainerConfig)(nil), "runtime.ContainerConfig")
|
||||||
proto.RegisterType((*CreateContainerRequest)(nil), "runtime.CreateContainerRequest")
|
proto.RegisterType((*CreateContainerRequest)(nil), "runtime.CreateContainerRequest")
|
||||||
proto.RegisterType((*CreateContainerResponse)(nil), "runtime.CreateContainerResponse")
|
proto.RegisterType((*CreateContainerResponse)(nil), "runtime.CreateContainerResponse")
|
||||||
|
@ -2274,13 +2320,14 @@ type RuntimeServiceClient interface {
|
||||||
// CreatePodSandbox creates a pod-level sandbox.
|
// CreatePodSandbox creates a pod-level sandbox.
|
||||||
// The definition of PodSandbox is at https://github.com/kubernetes/kubernetes/pull/25899
|
// The definition of PodSandbox is at https://github.com/kubernetes/kubernetes/pull/25899
|
||||||
CreatePodSandbox(ctx context.Context, in *CreatePodSandboxRequest, opts ...grpc.CallOption) (*CreatePodSandboxResponse, error)
|
CreatePodSandbox(ctx context.Context, in *CreatePodSandboxRequest, opts ...grpc.CallOption) (*CreatePodSandboxResponse, error)
|
||||||
// StopPodSandbox stops the sandbox. If there are any running containers in the
|
// StopPodSandbox stops the running sandbox. If there are any running
|
||||||
// sandbox, they should be force terminated.
|
// containers in the sandbox, they should be forcibly terminated.
|
||||||
StopPodSandbox(ctx context.Context, in *StopPodSandboxRequest, opts ...grpc.CallOption) (*StopPodSandboxResponse, error)
|
StopPodSandbox(ctx context.Context, in *StopPodSandboxRequest, opts ...grpc.CallOption) (*StopPodSandboxResponse, error)
|
||||||
// DeletePodSandbox deletes the sandbox. If there are any running containers in the
|
// RemovePodSandbox removes the sandbox. If there are any running containers in the
|
||||||
// sandbox, they should be force deleted.
|
// sandbox, they should be forcibly removed.
|
||||||
DeletePodSandbox(ctx context.Context, in *DeletePodSandboxRequest, opts ...grpc.CallOption) (*DeletePodSandboxResponse, error)
|
// It should return success if the sandbox has already been removed.
|
||||||
// PodSandboxStatus returns the Status of the PodSandbox.
|
RemovePodSandbox(ctx context.Context, in *RemovePodSandboxRequest, opts ...grpc.CallOption) (*RemovePodSandboxResponse, error)
|
||||||
|
// PodSandboxStatus returns the status of the PodSandbox.
|
||||||
PodSandboxStatus(ctx context.Context, in *PodSandboxStatusRequest, opts ...grpc.CallOption) (*PodSandboxStatusResponse, error)
|
PodSandboxStatus(ctx context.Context, in *PodSandboxStatusRequest, opts ...grpc.CallOption) (*PodSandboxStatusResponse, error)
|
||||||
// ListPodSandbox returns a list of SandBox.
|
// ListPodSandbox returns a list of SandBox.
|
||||||
ListPodSandbox(ctx context.Context, in *ListPodSandboxRequest, opts ...grpc.CallOption) (*ListPodSandboxResponse, error)
|
ListPodSandbox(ctx context.Context, in *ListPodSandboxRequest, opts ...grpc.CallOption) (*ListPodSandboxResponse, error)
|
||||||
|
@ -2290,8 +2337,9 @@ type RuntimeServiceClient interface {
|
||||||
StartContainer(ctx context.Context, in *StartContainerRequest, opts ...grpc.CallOption) (*StartContainerResponse, error)
|
StartContainer(ctx context.Context, in *StartContainerRequest, opts ...grpc.CallOption) (*StartContainerResponse, error)
|
||||||
// StopContainer stops a running container with a grace period (i.e., timeout).
|
// StopContainer stops a running container with a grace period (i.e., timeout).
|
||||||
StopContainer(ctx context.Context, in *StopContainerRequest, opts ...grpc.CallOption) (*StopContainerResponse, error)
|
StopContainer(ctx context.Context, in *StopContainerRequest, opts ...grpc.CallOption) (*StopContainerResponse, error)
|
||||||
// RemoveContainer removes the container. If the container is running, the container
|
// RemoveContainer removes the container. If the container is running, the
|
||||||
// should be force removed.
|
// container should be forcibly removed.
|
||||||
|
// It should return success if the container has already been removed.
|
||||||
RemoveContainer(ctx context.Context, in *RemoveContainerRequest, opts ...grpc.CallOption) (*RemoveContainerResponse, error)
|
RemoveContainer(ctx context.Context, in *RemoveContainerRequest, opts ...grpc.CallOption) (*RemoveContainerResponse, error)
|
||||||
// ListContainers lists all containers by filters.
|
// ListContainers lists all containers by filters.
|
||||||
ListContainers(ctx context.Context, in *ListContainersRequest, opts ...grpc.CallOption) (*ListContainersResponse, error)
|
ListContainers(ctx context.Context, in *ListContainersRequest, opts ...grpc.CallOption) (*ListContainersResponse, error)
|
||||||
|
@ -2336,9 +2384,9 @@ func (c *runtimeServiceClient) StopPodSandbox(ctx context.Context, in *StopPodSa
|
||||||
return out, nil
|
return out, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *runtimeServiceClient) DeletePodSandbox(ctx context.Context, in *DeletePodSandboxRequest, opts ...grpc.CallOption) (*DeletePodSandboxResponse, error) {
|
func (c *runtimeServiceClient) RemovePodSandbox(ctx context.Context, in *RemovePodSandboxRequest, opts ...grpc.CallOption) (*RemovePodSandboxResponse, error) {
|
||||||
out := new(DeletePodSandboxResponse)
|
out := new(RemovePodSandboxResponse)
|
||||||
err := grpc.Invoke(ctx, "/runtime.RuntimeService/DeletePodSandbox", in, out, c.cc, opts...)
|
err := grpc.Invoke(ctx, "/runtime.RuntimeService/RemovePodSandbox", in, out, c.cc, opts...)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -2456,13 +2504,14 @@ type RuntimeServiceServer interface {
|
||||||
// CreatePodSandbox creates a pod-level sandbox.
|
// CreatePodSandbox creates a pod-level sandbox.
|
||||||
// The definition of PodSandbox is at https://github.com/kubernetes/kubernetes/pull/25899
|
// The definition of PodSandbox is at https://github.com/kubernetes/kubernetes/pull/25899
|
||||||
CreatePodSandbox(context.Context, *CreatePodSandboxRequest) (*CreatePodSandboxResponse, error)
|
CreatePodSandbox(context.Context, *CreatePodSandboxRequest) (*CreatePodSandboxResponse, error)
|
||||||
// StopPodSandbox stops the sandbox. If there are any running containers in the
|
// StopPodSandbox stops the running sandbox. If there are any running
|
||||||
// sandbox, they should be force terminated.
|
// containers in the sandbox, they should be forcibly terminated.
|
||||||
StopPodSandbox(context.Context, *StopPodSandboxRequest) (*StopPodSandboxResponse, error)
|
StopPodSandbox(context.Context, *StopPodSandboxRequest) (*StopPodSandboxResponse, error)
|
||||||
// DeletePodSandbox deletes the sandbox. If there are any running containers in the
|
// RemovePodSandbox removes the sandbox. If there are any running containers in the
|
||||||
// sandbox, they should be force deleted.
|
// sandbox, they should be forcibly removed.
|
||||||
DeletePodSandbox(context.Context, *DeletePodSandboxRequest) (*DeletePodSandboxResponse, error)
|
// It should return success if the sandbox has already been removed.
|
||||||
// PodSandboxStatus returns the Status of the PodSandbox.
|
RemovePodSandbox(context.Context, *RemovePodSandboxRequest) (*RemovePodSandboxResponse, error)
|
||||||
|
// PodSandboxStatus returns the status of the PodSandbox.
|
||||||
PodSandboxStatus(context.Context, *PodSandboxStatusRequest) (*PodSandboxStatusResponse, error)
|
PodSandboxStatus(context.Context, *PodSandboxStatusRequest) (*PodSandboxStatusResponse, error)
|
||||||
// ListPodSandbox returns a list of SandBox.
|
// ListPodSandbox returns a list of SandBox.
|
||||||
ListPodSandbox(context.Context, *ListPodSandboxRequest) (*ListPodSandboxResponse, error)
|
ListPodSandbox(context.Context, *ListPodSandboxRequest) (*ListPodSandboxResponse, error)
|
||||||
|
@ -2472,8 +2521,9 @@ type RuntimeServiceServer interface {
|
||||||
StartContainer(context.Context, *StartContainerRequest) (*StartContainerResponse, error)
|
StartContainer(context.Context, *StartContainerRequest) (*StartContainerResponse, error)
|
||||||
// StopContainer stops a running container with a grace period (i.e., timeout).
|
// StopContainer stops a running container with a grace period (i.e., timeout).
|
||||||
StopContainer(context.Context, *StopContainerRequest) (*StopContainerResponse, error)
|
StopContainer(context.Context, *StopContainerRequest) (*StopContainerResponse, error)
|
||||||
// RemoveContainer removes the container. If the container is running, the container
|
// RemoveContainer removes the container. If the container is running, the
|
||||||
// should be force removed.
|
// container should be forcibly removed.
|
||||||
|
// It should return success if the container has already been removed.
|
||||||
RemoveContainer(context.Context, *RemoveContainerRequest) (*RemoveContainerResponse, error)
|
RemoveContainer(context.Context, *RemoveContainerRequest) (*RemoveContainerResponse, error)
|
||||||
// ListContainers lists all containers by filters.
|
// ListContainers lists all containers by filters.
|
||||||
ListContainers(context.Context, *ListContainersRequest) (*ListContainersResponse, error)
|
ListContainers(context.Context, *ListContainersRequest) (*ListContainersResponse, error)
|
||||||
|
@ -2523,12 +2573,12 @@ func _RuntimeService_StopPodSandbox_Handler(srv interface{}, ctx context.Context
|
||||||
return out, nil
|
return out, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func _RuntimeService_DeletePodSandbox_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error) (interface{}, error) {
|
func _RuntimeService_RemovePodSandbox_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error) (interface{}, error) {
|
||||||
in := new(DeletePodSandboxRequest)
|
in := new(RemovePodSandboxRequest)
|
||||||
if err := dec(in); err != nil {
|
if err := dec(in); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
out, err := srv.(RuntimeServiceServer).DeletePodSandbox(ctx, in)
|
out, err := srv.(RuntimeServiceServer).RemovePodSandbox(ctx, in)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -2674,8 +2724,8 @@ var _RuntimeService_serviceDesc = grpc.ServiceDesc{
|
||||||
Handler: _RuntimeService_StopPodSandbox_Handler,
|
Handler: _RuntimeService_StopPodSandbox_Handler,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
MethodName: "DeletePodSandbox",
|
MethodName: "RemovePodSandbox",
|
||||||
Handler: _RuntimeService_DeletePodSandbox_Handler,
|
Handler: _RuntimeService_RemovePodSandbox_Handler,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
MethodName: "PodSandboxStatus",
|
MethodName: "PodSandboxStatus",
|
||||||
|
@ -2727,9 +2777,10 @@ type ImageServiceClient interface {
|
||||||
ListImages(ctx context.Context, in *ListImagesRequest, opts ...grpc.CallOption) (*ListImagesResponse, error)
|
ListImages(ctx context.Context, in *ListImagesRequest, opts ...grpc.CallOption) (*ListImagesResponse, error)
|
||||||
// ImageStatus returns the status of the image.
|
// ImageStatus returns the status of the image.
|
||||||
ImageStatus(ctx context.Context, in *ImageStatusRequest, opts ...grpc.CallOption) (*ImageStatusResponse, error)
|
ImageStatus(ctx context.Context, in *ImageStatusRequest, opts ...grpc.CallOption) (*ImageStatusResponse, error)
|
||||||
// PullImage pulls a image with authentication config.
|
// PullImage pulls an image with authentication config.
|
||||||
PullImage(ctx context.Context, in *PullImageRequest, opts ...grpc.CallOption) (*PullImageResponse, error)
|
PullImage(ctx context.Context, in *PullImageRequest, opts ...grpc.CallOption) (*PullImageResponse, error)
|
||||||
// RemoveImage removes the image.
|
// RemoveImage removes the image.
|
||||||
|
// It should return success if the image has already been removed.
|
||||||
RemoveImage(ctx context.Context, in *RemoveImageRequest, opts ...grpc.CallOption) (*RemoveImageResponse, error)
|
RemoveImage(ctx context.Context, in *RemoveImageRequest, opts ...grpc.CallOption) (*RemoveImageResponse, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2784,9 +2835,10 @@ type ImageServiceServer interface {
|
||||||
ListImages(context.Context, *ListImagesRequest) (*ListImagesResponse, error)
|
ListImages(context.Context, *ListImagesRequest) (*ListImagesResponse, error)
|
||||||
// ImageStatus returns the status of the image.
|
// ImageStatus returns the status of the image.
|
||||||
ImageStatus(context.Context, *ImageStatusRequest) (*ImageStatusResponse, error)
|
ImageStatus(context.Context, *ImageStatusRequest) (*ImageStatusResponse, error)
|
||||||
// PullImage pulls a image with authentication config.
|
// PullImage pulls an image with authentication config.
|
||||||
PullImage(context.Context, *PullImageRequest) (*PullImageResponse, error)
|
PullImage(context.Context, *PullImageRequest) (*PullImageResponse, error)
|
||||||
// RemoveImage removes the image.
|
// RemoveImage removes the image.
|
||||||
|
// It should return success if the image has already been removed.
|
||||||
RemoveImage(context.Context, *RemoveImageRequest) (*RemoveImageResponse, error)
|
RemoveImage(context.Context, *RemoveImageRequest) (*RemoveImageResponse, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
46
vendor/github.com/kubernetes/kubernetes/pkg/kubelet/api/v1alpha1/runtime/api.proto
generated
vendored
46
vendor/github.com/kubernetes/kubernetes/pkg/kubelet/api/v1alpha1/runtime/api.proto
generated
vendored
|
@ -1,4 +1,4 @@
|
||||||
// api.pb.go could be generate by hack/update-generate-runtime.sh
|
// To regenerate api.pb.go run hack/update-generated-runtime.sh
|
||||||
syntax = 'proto2';
|
syntax = 'proto2';
|
||||||
|
|
||||||
package runtime;
|
package runtime;
|
||||||
|
@ -11,13 +11,14 @@ service RuntimeService {
|
||||||
// CreatePodSandbox creates a pod-level sandbox.
|
// CreatePodSandbox creates a pod-level sandbox.
|
||||||
// The definition of PodSandbox is at https://github.com/kubernetes/kubernetes/pull/25899
|
// The definition of PodSandbox is at https://github.com/kubernetes/kubernetes/pull/25899
|
||||||
rpc CreatePodSandbox(CreatePodSandboxRequest) returns (CreatePodSandboxResponse) {}
|
rpc CreatePodSandbox(CreatePodSandboxRequest) returns (CreatePodSandboxResponse) {}
|
||||||
// StopPodSandbox stops the sandbox. If there are any running containers in the
|
// StopPodSandbox stops the running sandbox. If there are any running
|
||||||
// sandbox, they should be force terminated.
|
// containers in the sandbox, they should be forcibly terminated.
|
||||||
rpc StopPodSandbox(StopPodSandboxRequest) returns (StopPodSandboxResponse) {}
|
rpc StopPodSandbox(StopPodSandboxRequest) returns (StopPodSandboxResponse) {}
|
||||||
// DeletePodSandbox deletes the sandbox. If there are any running containers in the
|
// RemovePodSandbox removes the sandbox. If there are any running containers in the
|
||||||
// sandbox, they should be force deleted.
|
// sandbox, they should be forcibly removed.
|
||||||
rpc DeletePodSandbox(DeletePodSandboxRequest) returns (DeletePodSandboxResponse) {}
|
// It should return success if the sandbox has already been removed.
|
||||||
// PodSandboxStatus returns the Status of the PodSandbox.
|
rpc RemovePodSandbox(RemovePodSandboxRequest) returns (RemovePodSandboxResponse) {}
|
||||||
|
// PodSandboxStatus returns the status of the PodSandbox.
|
||||||
rpc PodSandboxStatus(PodSandboxStatusRequest) returns (PodSandboxStatusResponse) {}
|
rpc PodSandboxStatus(PodSandboxStatusRequest) returns (PodSandboxStatusResponse) {}
|
||||||
// ListPodSandbox returns a list of SandBox.
|
// ListPodSandbox returns a list of SandBox.
|
||||||
rpc ListPodSandbox(ListPodSandboxRequest) returns (ListPodSandboxResponse) {}
|
rpc ListPodSandbox(ListPodSandboxRequest) returns (ListPodSandboxResponse) {}
|
||||||
|
@ -28,8 +29,9 @@ service RuntimeService {
|
||||||
rpc StartContainer(StartContainerRequest) returns (StartContainerResponse) {}
|
rpc StartContainer(StartContainerRequest) returns (StartContainerResponse) {}
|
||||||
// StopContainer stops a running container with a grace period (i.e., timeout).
|
// StopContainer stops a running container with a grace period (i.e., timeout).
|
||||||
rpc StopContainer(StopContainerRequest) returns (StopContainerResponse) {}
|
rpc StopContainer(StopContainerRequest) returns (StopContainerResponse) {}
|
||||||
// RemoveContainer removes the container. If the container is running, the container
|
// RemoveContainer removes the container. If the container is running, the
|
||||||
// should be force removed.
|
// container should be forcibly removed.
|
||||||
|
// It should return success if the container has already been removed.
|
||||||
rpc RemoveContainer(RemoveContainerRequest) returns (RemoveContainerResponse) {}
|
rpc RemoveContainer(RemoveContainerRequest) returns (RemoveContainerResponse) {}
|
||||||
// ListContainers lists all containers by filters.
|
// ListContainers lists all containers by filters.
|
||||||
rpc ListContainers(ListContainersRequest) returns (ListContainersResponse) {}
|
rpc ListContainers(ListContainersRequest) returns (ListContainersResponse) {}
|
||||||
|
@ -46,9 +48,10 @@ service ImageService {
|
||||||
rpc ListImages(ListImagesRequest) returns (ListImagesResponse) {}
|
rpc ListImages(ListImagesRequest) returns (ListImagesResponse) {}
|
||||||
// ImageStatus returns the status of the image.
|
// ImageStatus returns the status of the image.
|
||||||
rpc ImageStatus(ImageStatusRequest) returns (ImageStatusResponse) {}
|
rpc ImageStatus(ImageStatusRequest) returns (ImageStatusResponse) {}
|
||||||
// PullImage pulls a image with authentication config.
|
// PullImage pulls an image with authentication config.
|
||||||
rpc PullImage(PullImageRequest) returns (PullImageResponse) {}
|
rpc PullImage(PullImageRequest) returns (PullImageResponse) {}
|
||||||
// RemoveImage removes the image.
|
// RemoveImage removes the image.
|
||||||
|
// It should return success if the image has already been removed.
|
||||||
rpc RemoveImage(RemoveImageRequest) returns (RemoveImageResponse) {}
|
rpc RemoveImage(RemoveImageRequest) returns (RemoveImageResponse) {}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -163,13 +166,13 @@ message PodSandboxConfig {
|
||||||
// By default the log of a container going into the LogDirectory will be
|
// By default the log of a container going into the LogDirectory will be
|
||||||
// hooked up to STDOUT and STDERR. However, the LogDirectory may contain
|
// hooked up to STDOUT and STDERR. However, the LogDirectory may contain
|
||||||
// binary log files with structured logging data from the individual
|
// binary log files with structured logging data from the individual
|
||||||
// containers. For example the files might be newline seperated JSON
|
// containers. For example, the files might be newline separated JSON
|
||||||
// structured logs, systemd-journald journal files, gRPC trace files, etc.
|
// structured logs, systemd-journald journal files, gRPC trace files, etc.
|
||||||
// E.g.,
|
// E.g.,
|
||||||
// PodSandboxConfig.LogDirectory = `/var/log/pods/<podUID>/`
|
// PodSandboxConfig.LogDirectory = `/var/log/pods/<podUID>/`
|
||||||
// ContainerConfig.LogPath = `containerName_Instance#.log`
|
// ContainerConfig.LogPath = `containerName_Instance#.log`
|
||||||
//
|
//
|
||||||
// WARNING: Log managment and how kubelet should interface with the
|
// WARNING: Log management and how kubelet should interface with the
|
||||||
// container logs are under active discussion in
|
// container logs are under active discussion in
|
||||||
// https://issues.k8s.io/24677. There *may* be future change of direction
|
// https://issues.k8s.io/24677. There *may* be future change of direction
|
||||||
// for logging as the discussion carries on.
|
// for logging as the discussion carries on.
|
||||||
|
@ -182,7 +185,7 @@ message PodSandboxConfig {
|
||||||
// aggregate cpu/memory resources limits of all containers).
|
// aggregate cpu/memory resources limits of all containers).
|
||||||
// Note: On a Linux host, kubelet will create a pod-level cgroup and pass
|
// Note: On a Linux host, kubelet will create a pod-level cgroup and pass
|
||||||
// it as the cgroup parent for the PodSandbox. For some runtimes, this is
|
// it as the cgroup parent for the PodSandbox. For some runtimes, this is
|
||||||
// sufficent. For others, e.g., hypervisor-based runtimes, explicit
|
// sufficient. For others, e.g., hypervisor-based runtimes, explicit
|
||||||
// resource limits for the sandbox are needed at creation time.
|
// resource limits for the sandbox are needed at creation time.
|
||||||
optional PodSandboxResources resources = 6;
|
optional PodSandboxResources resources = 6;
|
||||||
// Labels are key value pairs that may be used to scope and select individual resources.
|
// Labels are key value pairs that may be used to scope and select individual resources.
|
||||||
|
@ -211,12 +214,12 @@ message StopPodSandboxRequest {
|
||||||
|
|
||||||
message StopPodSandboxResponse {}
|
message StopPodSandboxResponse {}
|
||||||
|
|
||||||
message DeletePodSandboxRequest {
|
message RemovePodSandboxRequest {
|
||||||
// The id of the PodSandBox
|
// The id of the PodSandBox
|
||||||
optional string pod_sandbox_id = 1;
|
optional string pod_sandbox_id = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
message DeletePodSandboxResponse {}
|
message RemovePodSandboxResponse {}
|
||||||
|
|
||||||
message PodSandboxStatusRequest {
|
message PodSandboxStatusRequest {
|
||||||
// The id of the PodSandBox
|
// The id of the PodSandBox
|
||||||
|
@ -369,6 +372,17 @@ message LinuxContainerConfig {
|
||||||
optional Capability capabilities = 2;
|
optional Capability capabilities = 2;
|
||||||
// Optional SELinux context to be applied.
|
// Optional SELinux context to be applied.
|
||||||
optional SELinuxOption selinux_options = 3;
|
optional SELinuxOption selinux_options = 3;
|
||||||
|
// User contains the user for the container process.
|
||||||
|
optional LinuxUser user = 4;
|
||||||
|
}
|
||||||
|
|
||||||
|
message LinuxUser {
|
||||||
|
// uid specifies the user ID the container process has.
|
||||||
|
optional int64 uid = 1;
|
||||||
|
// gid specifies the group ID the container process has.
|
||||||
|
optional int64 gid = 2;
|
||||||
|
// additional_gids specifies additional GIDs the container process has.
|
||||||
|
repeated int64 additional_gids = 3;
|
||||||
}
|
}
|
||||||
|
|
||||||
message ContainerConfig {
|
message ContainerConfig {
|
||||||
|
@ -407,7 +421,7 @@ message ContainerConfig {
|
||||||
// PodSandboxConfig.LogDirectory = `/var/log/pods/<podUID>/`
|
// PodSandboxConfig.LogDirectory = `/var/log/pods/<podUID>/`
|
||||||
// ContainerConfig.LogPath = `containerName_Instance#.log`
|
// ContainerConfig.LogPath = `containerName_Instance#.log`
|
||||||
//
|
//
|
||||||
// WARNING: Log managment and how kubelet should interface with the
|
// WARNING: Log management and how kubelet should interface with the
|
||||||
// container logs are under active discussion in
|
// container logs are under active discussion in
|
||||||
// https://issues.k8s.io/24677. There *may* be future change of direction
|
// https://issues.k8s.io/24677. There *may* be future change of direction
|
||||||
// for logging as the discussion carries on.
|
// for logging as the discussion carries on.
|
||||||
|
|
Loading…
Reference in a new issue