1#[derive(Clone, Debug, Default, PartialEq)]
5pub struct ValidatingAdmissionPolicySpec {
6 pub audit_annotations: Option<std::vec::Vec<crate::api::admissionregistration::v1::AuditAnnotation>>,
8
9 pub failure_policy: Option<std::string::String>,
19
20 pub match_conditions: Option<std::vec::Vec<crate::api::admissionregistration::v1::MatchCondition>>,
31
32 pub match_constraints: Option<crate::api::admissionregistration::v1::MatchResources>,
34
35 pub param_kind: Option<crate::api::admissionregistration::v1::ParamKind>,
37
38 pub validations: Option<std::vec::Vec<crate::api::admissionregistration::v1::Validation>>,
40
41 pub variables: Option<std::vec::Vec<crate::api::admissionregistration::v1::Variable>>,
45}
46
47impl crate::DeepMerge for ValidatingAdmissionPolicySpec {
48 fn merge_from(&mut self, other: Self) {
49 crate::merge_strategies::list::atomic(&mut self.audit_annotations, other.audit_annotations);
50 crate::DeepMerge::merge_from(&mut self.failure_policy, other.failure_policy);
51 crate::merge_strategies::list::map(
52 &mut self.match_conditions,
53 other.match_conditions,
54 &[|lhs, rhs| lhs.name == rhs.name],
55 |current_item, other_item| {
56 crate::DeepMerge::merge_from(current_item, other_item);
57 },
58 );
59 crate::DeepMerge::merge_from(&mut self.match_constraints, other.match_constraints);
60 crate::DeepMerge::merge_from(&mut self.param_kind, other.param_kind);
61 crate::merge_strategies::list::atomic(&mut self.validations, other.validations);
62 crate::merge_strategies::list::map(
63 &mut self.variables,
64 other.variables,
65 &[|lhs, rhs| lhs.name == rhs.name],
66 |current_item, other_item| {
67 crate::DeepMerge::merge_from(current_item, other_item);
68 },
69 );
70 }
71}
72
73impl<'de> crate::serde::Deserialize<'de> for ValidatingAdmissionPolicySpec {
74 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
75 #[allow(non_camel_case_types)]
76 enum Field {
77 Key_audit_annotations,
78 Key_failure_policy,
79 Key_match_conditions,
80 Key_match_constraints,
81 Key_param_kind,
82 Key_validations,
83 Key_variables,
84 Other,
85 }
86
87 impl<'de> crate::serde::Deserialize<'de> for Field {
88 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
89 struct Visitor;
90
91 impl crate::serde::de::Visitor<'_> for Visitor {
92 type Value = Field;
93
94 fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
95 f.write_str("field identifier")
96 }
97
98 fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
99 Ok(match v {
100 "auditAnnotations" => Field::Key_audit_annotations,
101 "failurePolicy" => Field::Key_failure_policy,
102 "matchConditions" => Field::Key_match_conditions,
103 "matchConstraints" => Field::Key_match_constraints,
104 "paramKind" => Field::Key_param_kind,
105 "validations" => Field::Key_validations,
106 "variables" => Field::Key_variables,
107 _ => Field::Other,
108 })
109 }
110 }
111
112 deserializer.deserialize_identifier(Visitor)
113 }
114 }
115
116 struct Visitor;
117
118 impl<'de> crate::serde::de::Visitor<'de> for Visitor {
119 type Value = ValidatingAdmissionPolicySpec;
120
121 fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
122 f.write_str("ValidatingAdmissionPolicySpec")
123 }
124
125 fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
126 let mut value_audit_annotations: Option<std::vec::Vec<crate::api::admissionregistration::v1::AuditAnnotation>> = None;
127 let mut value_failure_policy: Option<std::string::String> = None;
128 let mut value_match_conditions: Option<std::vec::Vec<crate::api::admissionregistration::v1::MatchCondition>> = None;
129 let mut value_match_constraints: Option<crate::api::admissionregistration::v1::MatchResources> = None;
130 let mut value_param_kind: Option<crate::api::admissionregistration::v1::ParamKind> = None;
131 let mut value_validations: Option<std::vec::Vec<crate::api::admissionregistration::v1::Validation>> = None;
132 let mut value_variables: Option<std::vec::Vec<crate::api::admissionregistration::v1::Variable>> = None;
133
134 while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
135 match key {
136 Field::Key_audit_annotations => value_audit_annotations = crate::serde::de::MapAccess::next_value(&mut map)?,
137 Field::Key_failure_policy => value_failure_policy = crate::serde::de::MapAccess::next_value(&mut map)?,
138 Field::Key_match_conditions => value_match_conditions = crate::serde::de::MapAccess::next_value(&mut map)?,
139 Field::Key_match_constraints => value_match_constraints = crate::serde::de::MapAccess::next_value(&mut map)?,
140 Field::Key_param_kind => value_param_kind = crate::serde::de::MapAccess::next_value(&mut map)?,
141 Field::Key_validations => value_validations = crate::serde::de::MapAccess::next_value(&mut map)?,
142 Field::Key_variables => value_variables = crate::serde::de::MapAccess::next_value(&mut map)?,
143 Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
144 }
145 }
146
147 Ok(ValidatingAdmissionPolicySpec {
148 audit_annotations: value_audit_annotations,
149 failure_policy: value_failure_policy,
150 match_conditions: value_match_conditions,
151 match_constraints: value_match_constraints,
152 param_kind: value_param_kind,
153 validations: value_validations,
154 variables: value_variables,
155 })
156 }
157 }
158
159 deserializer.deserialize_struct(
160 "ValidatingAdmissionPolicySpec",
161 &[
162 "auditAnnotations",
163 "failurePolicy",
164 "matchConditions",
165 "matchConstraints",
166 "paramKind",
167 "validations",
168 "variables",
169 ],
170 Visitor,
171 )
172 }
173}
174
175impl crate::serde::Serialize for ValidatingAdmissionPolicySpec {
176 fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
177 let mut state = serializer.serialize_struct(
178 "ValidatingAdmissionPolicySpec",
179 self.audit_annotations.as_ref().map_or(0, |_| 1) +
180 self.failure_policy.as_ref().map_or(0, |_| 1) +
181 self.match_conditions.as_ref().map_or(0, |_| 1) +
182 self.match_constraints.as_ref().map_or(0, |_| 1) +
183 self.param_kind.as_ref().map_or(0, |_| 1) +
184 self.validations.as_ref().map_or(0, |_| 1) +
185 self.variables.as_ref().map_or(0, |_| 1),
186 )?;
187 if let Some(value) = &self.audit_annotations {
188 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "auditAnnotations", value)?;
189 }
190 if let Some(value) = &self.failure_policy {
191 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "failurePolicy", value)?;
192 }
193 if let Some(value) = &self.match_conditions {
194 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "matchConditions", value)?;
195 }
196 if let Some(value) = &self.match_constraints {
197 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "matchConstraints", value)?;
198 }
199 if let Some(value) = &self.param_kind {
200 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "paramKind", value)?;
201 }
202 if let Some(value) = &self.validations {
203 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "validations", value)?;
204 }
205 if let Some(value) = &self.variables {
206 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "variables", value)?;
207 }
208 crate::serde::ser::SerializeStruct::end(state)
209 }
210}
211
212#[cfg(feature = "schemars")]
213impl crate::schemars::JsonSchema for ValidatingAdmissionPolicySpec {
214 fn schema_name() -> std::string::String {
215 "io.k8s.api.admissionregistration.v1.ValidatingAdmissionPolicySpec".into()
216 }
217
218 fn json_schema(__gen: &mut crate::schemars::gen::SchemaGenerator) -> crate::schemars::schema::Schema {
219 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
220 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
221 description: Some("ValidatingAdmissionPolicySpec is the specification of the desired behavior of the AdmissionPolicy.".into()),
222 ..Default::default()
223 })),
224 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::Object))),
225 object: Some(std::boxed::Box::new(crate::schemars::schema::ObjectValidation {
226 properties: [
227 (
228 "auditAnnotations".into(),
229 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
230 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
231 description: Some("auditAnnotations contains CEL expressions which are used to produce audit annotations for the audit event of the API request. validations and auditAnnotations may not both be empty; a least one of validations or auditAnnotations is required.".into()),
232 ..Default::default()
233 })),
234 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::Array))),
235 array: Some(std::boxed::Box::new(crate::schemars::schema::ArrayValidation {
236 items: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(__gen.subschema_for::<crate::api::admissionregistration::v1::AuditAnnotation>()))),
237 ..Default::default()
238 })),
239 ..Default::default()
240 }),
241 ),
242 (
243 "failurePolicy".into(),
244 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
245 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
246 description: Some("failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.\n\nA policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.\n\nfailurePolicy does not define how validations that evaluate to false are handled.\n\nWhen failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.\n\nAllowed values are Ignore or Fail. Defaults to Fail.".into()),
247 ..Default::default()
248 })),
249 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::String))),
250 ..Default::default()
251 }),
252 ),
253 (
254 "matchConditions".into(),
255 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
256 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
257 description: Some("MatchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the rules, namespaceSelector, and objectSelector. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.\n\nIf a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.\n\nThe exact matching logic is (in order):\n 1. If ANY matchCondition evaluates to FALSE, the policy is skipped.\n 2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.\n 3. If any matchCondition evaluates to an error (but none are FALSE):\n - If failurePolicy=Fail, reject the request\n - If failurePolicy=Ignore, the policy is skipped".into()),
258 ..Default::default()
259 })),
260 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::Array))),
261 array: Some(std::boxed::Box::new(crate::schemars::schema::ArrayValidation {
262 items: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(__gen.subschema_for::<crate::api::admissionregistration::v1::MatchCondition>()))),
263 ..Default::default()
264 })),
265 ..Default::default()
266 }),
267 ),
268 (
269 "matchConstraints".into(),
270 {
271 let mut schema_obj = __gen.subschema_for::<crate::api::admissionregistration::v1::MatchResources>().into_object();
272 schema_obj.metadata = Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
273 description: Some("MatchConstraints specifies what resources this policy is designed to validate. The AdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API ValidatingAdmissionPolicy cannot match ValidatingAdmissionPolicy and ValidatingAdmissionPolicyBinding. Required.".into()),
274 ..Default::default()
275 }));
276 crate::schemars::schema::Schema::Object(schema_obj)
277 },
278 ),
279 (
280 "paramKind".into(),
281 {
282 let mut schema_obj = __gen.subschema_for::<crate::api::admissionregistration::v1::ParamKind>().into_object();
283 schema_obj.metadata = Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
284 description: Some("ParamKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If ParamKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in ValidatingAdmissionPolicyBinding, the params variable will be null.".into()),
285 ..Default::default()
286 }));
287 crate::schemars::schema::Schema::Object(schema_obj)
288 },
289 ),
290 (
291 "validations".into(),
292 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
293 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
294 description: Some("Validations contain CEL expressions which is used to apply the validation. Validations and AuditAnnotations may not both be empty; a minimum of one Validations or AuditAnnotations is required.".into()),
295 ..Default::default()
296 })),
297 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::Array))),
298 array: Some(std::boxed::Box::new(crate::schemars::schema::ArrayValidation {
299 items: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(__gen.subschema_for::<crate::api::admissionregistration::v1::Validation>()))),
300 ..Default::default()
301 })),
302 ..Default::default()
303 }),
304 ),
305 (
306 "variables".into(),
307 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
308 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
309 description: Some("Variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except MatchConditions because MatchConditions are evaluated before the rest of the policy.\n\nThe expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, Variables must be sorted by the order of first appearance and acyclic.".into()),
310 ..Default::default()
311 })),
312 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::Array))),
313 array: Some(std::boxed::Box::new(crate::schemars::schema::ArrayValidation {
314 items: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(__gen.subschema_for::<crate::api::admissionregistration::v1::Variable>()))),
315 ..Default::default()
316 })),
317 ..Default::default()
318 }),
319 ),
320 ].into(),
321 ..Default::default()
322 })),
323 ..Default::default()
324 })
325 }
326}