k8s_openapi/v1_30/api/core/v1/
seccomp_profile.rs1#[derive(Clone, Debug, Default, PartialEq)]
5pub struct SeccompProfile {
6 pub localhost_profile: Option<std::string::String>,
8
9 pub type_: std::string::String,
13}
14
15impl crate::DeepMerge for SeccompProfile {
16 fn merge_from(&mut self, other: Self) {
17 crate::DeepMerge::merge_from(&mut self.localhost_profile, other.localhost_profile);
18 crate::DeepMerge::merge_from(&mut self.type_, other.type_);
19 }
20}
21
22impl<'de> crate::serde::Deserialize<'de> for SeccompProfile {
23 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
24 #[allow(non_camel_case_types)]
25 enum Field {
26 Key_localhost_profile,
27 Key_type_,
28 Other,
29 }
30
31 impl<'de> crate::serde::Deserialize<'de> for Field {
32 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
33 struct Visitor;
34
35 impl crate::serde::de::Visitor<'_> for Visitor {
36 type Value = Field;
37
38 fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
39 f.write_str("field identifier")
40 }
41
42 fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
43 Ok(match v {
44 "localhostProfile" => Field::Key_localhost_profile,
45 "type" => Field::Key_type_,
46 _ => Field::Other,
47 })
48 }
49 }
50
51 deserializer.deserialize_identifier(Visitor)
52 }
53 }
54
55 struct Visitor;
56
57 impl<'de> crate::serde::de::Visitor<'de> for Visitor {
58 type Value = SeccompProfile;
59
60 fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
61 f.write_str("SeccompProfile")
62 }
63
64 fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
65 let mut value_localhost_profile: Option<std::string::String> = None;
66 let mut value_type_: Option<std::string::String> = None;
67
68 while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
69 match key {
70 Field::Key_localhost_profile => value_localhost_profile = crate::serde::de::MapAccess::next_value(&mut map)?,
71 Field::Key_type_ => value_type_ = crate::serde::de::MapAccess::next_value(&mut map)?,
72 Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
73 }
74 }
75
76 Ok(SeccompProfile {
77 localhost_profile: value_localhost_profile,
78 type_: value_type_.unwrap_or_default(),
79 })
80 }
81 }
82
83 deserializer.deserialize_struct(
84 "SeccompProfile",
85 &[
86 "localhostProfile",
87 "type",
88 ],
89 Visitor,
90 )
91 }
92}
93
94impl crate::serde::Serialize for SeccompProfile {
95 fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
96 let mut state = serializer.serialize_struct(
97 "SeccompProfile",
98 1 +
99 self.localhost_profile.as_ref().map_or(0, |_| 1),
100 )?;
101 if let Some(value) = &self.localhost_profile {
102 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "localhostProfile", value)?;
103 }
104 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "type", &self.type_)?;
105 crate::serde::ser::SerializeStruct::end(state)
106 }
107}
108
109#[cfg(feature = "schemars")]
110impl crate::schemars::JsonSchema for SeccompProfile {
111 fn schema_name() -> std::borrow::Cow<'static, str> {
112 "io.k8s.api.core.v1.SeccompProfile".into()
113 }
114
115 fn json_schema(__gen: &mut crate::schemars::SchemaGenerator) -> crate::schemars::Schema {
116 crate::schemars::json_schema!({
117 "description": "SeccompProfile defines a pod/container's seccomp profile settings. Only one profile source may be set.",
118 "type": "object",
119 "properties": {
120 "localhostProfile": {
121 "description": "localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must be set if type is \"Localhost\". Must NOT be set for any other type.",
122 "type": "string",
123 },
124 "type": {
125 "description": "type indicates which kind of seccomp profile will be applied. Valid options are:\n\nLocalhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied.",
126 "type": "string",
127 },
128 },
129 "required": [
130 "type",
131 ],
132 })
133 }
134}