k8s_openapi/v1_29/api/core/v1/
ceph_fs_persistent_volume_source.rs#[derive(Clone, Debug, Default, PartialEq)]
pub struct CephFSPersistentVolumeSource {
pub monitors: Vec<String>,
pub path: Option<String>,
pub read_only: Option<bool>,
pub secret_file: Option<String>,
pub secret_ref: Option<crate::api::core::v1::SecretReference>,
pub user: Option<String>,
}
impl crate::DeepMerge for CephFSPersistentVolumeSource {
fn merge_from(&mut self, other: Self) {
crate::merge_strategies::list::atomic(&mut self.monitors, other.monitors);
crate::DeepMerge::merge_from(&mut self.path, other.path);
crate::DeepMerge::merge_from(&mut self.read_only, other.read_only);
crate::DeepMerge::merge_from(&mut self.secret_file, other.secret_file);
crate::DeepMerge::merge_from(&mut self.secret_ref, other.secret_ref);
crate::DeepMerge::merge_from(&mut self.user, other.user);
}
}
impl<'de> crate::serde::Deserialize<'de> for CephFSPersistentVolumeSource {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
#[allow(non_camel_case_types)]
enum Field {
Key_monitors,
Key_path,
Key_read_only,
Key_secret_file,
Key_secret_ref,
Key_user,
Other,
}
impl<'de> crate::serde::Deserialize<'de> for Field {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
struct Visitor;
impl<'de> crate::serde::de::Visitor<'de> for Visitor {
type Value = Field;
fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.write_str("field identifier")
}
fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
Ok(match v {
"monitors" => Field::Key_monitors,
"path" => Field::Key_path,
"readOnly" => Field::Key_read_only,
"secretFile" => Field::Key_secret_file,
"secretRef" => Field::Key_secret_ref,
"user" => Field::Key_user,
_ => Field::Other,
})
}
}
deserializer.deserialize_identifier(Visitor)
}
}
struct Visitor;
impl<'de> crate::serde::de::Visitor<'de> for Visitor {
type Value = CephFSPersistentVolumeSource;
fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.write_str("CephFSPersistentVolumeSource")
}
fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
let mut value_monitors: Option<Vec<String>> = None;
let mut value_path: Option<String> = None;
let mut value_read_only: Option<bool> = None;
let mut value_secret_file: Option<String> = None;
let mut value_secret_ref: Option<crate::api::core::v1::SecretReference> = None;
let mut value_user: Option<String> = None;
while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
match key {
Field::Key_monitors => value_monitors = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Key_path => value_path = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Key_read_only => value_read_only = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Key_secret_file => value_secret_file = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Key_secret_ref => value_secret_ref = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Key_user => value_user = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
}
}
Ok(CephFSPersistentVolumeSource {
monitors: value_monitors.unwrap_or_default(),
path: value_path,
read_only: value_read_only,
secret_file: value_secret_file,
secret_ref: value_secret_ref,
user: value_user,
})
}
}
deserializer.deserialize_struct(
"CephFSPersistentVolumeSource",
&[
"monitors",
"path",
"readOnly",
"secretFile",
"secretRef",
"user",
],
Visitor,
)
}
}
impl crate::serde::Serialize for CephFSPersistentVolumeSource {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
let mut state = serializer.serialize_struct(
"CephFSPersistentVolumeSource",
1 +
self.path.as_ref().map_or(0, |_| 1) +
self.read_only.as_ref().map_or(0, |_| 1) +
self.secret_file.as_ref().map_or(0, |_| 1) +
self.secret_ref.as_ref().map_or(0, |_| 1) +
self.user.as_ref().map_or(0, |_| 1),
)?;
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "monitors", &self.monitors)?;
if let Some(value) = &self.path {
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "path", value)?;
}
if let Some(value) = &self.read_only {
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "readOnly", value)?;
}
if let Some(value) = &self.secret_file {
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "secretFile", value)?;
}
if let Some(value) = &self.secret_ref {
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "secretRef", value)?;
}
if let Some(value) = &self.user {
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "user", value)?;
}
crate::serde::ser::SerializeStruct::end(state)
}
}
#[cfg(feature = "schemars")]
impl crate::schemars::JsonSchema for CephFSPersistentVolumeSource {
fn schema_name() -> String {
"io.k8s.api.core.v1.CephFSPersistentVolumeSource".to_owned()
}
fn json_schema(__gen: &mut crate::schemars::gen::SchemaGenerator) -> crate::schemars::schema::Schema {
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("Represents a Ceph Filesystem mount that lasts the lifetime of a pod Cephfs volumes do not support ownership management or SELinux relabeling.".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Object))),
object: Some(Box::new(crate::schemars::schema::ObjectValidation {
properties: [
(
"monitors".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("monitors is Required: Monitors is a collection of Ceph monitors More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Array))),
array: Some(Box::new(crate::schemars::schema::ArrayValidation {
items: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
..Default::default()
})
))),
..Default::default()
})),
..Default::default()
}),
),
(
"path".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("path is Optional: Used as the mounted root, rather than the full Ceph tree, default is /".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
..Default::default()
}),
),
(
"readOnly".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("readOnly is Optional: Defaults to false (read/write). ReadOnly here will force the ReadOnly setting in VolumeMounts. More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Boolean))),
..Default::default()
}),
),
(
"secretFile".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("secretFile is Optional: SecretFile is the path to key ring for User, default is /etc/ceph/user.secret More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
..Default::default()
}),
),
(
"secretRef".to_owned(),
{
let mut schema_obj = __gen.subschema_for::<crate::api::core::v1::SecretReference>().into_object();
schema_obj.metadata = Some(Box::new(crate::schemars::schema::Metadata {
description: Some("secretRef is Optional: SecretRef is reference to the authentication secret for User, default is empty. More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it".to_owned()),
..Default::default()
}));
crate::schemars::schema::Schema::Object(schema_obj)
},
),
(
"user".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("user is Optional: User is the rados user name, default is admin More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
..Default::default()
}),
),
].into(),
required: [
"monitors".to_owned(),
].into(),
..Default::default()
})),
..Default::default()
})
}
}