Пример #1
0
 /// <summary>
 /// Initializes a new instance of the V1beta1IngressSpec class.
 /// </summary>
 /// <param name="affinity">If specified, the pod's scheduling
 /// constraints</param>
 /// <param name="backend">A default backend capable of servicing
 /// requests that don't match any rule. At least one of 'backend' or
 /// 'rules' must be specified. This field is optional to allow the
 /// loadbalancer controller or defaulting logic to specify a global
 /// default.</param>
 /// <param name="externalIPs">externalIPs is a list of IP addresses for
 /// which nodes in the cluster will also accept traffic for this
 /// service.  These IPs are not managed by Kubernetes.  The user is
 /// responsible for ensuring that traffic arrives at a node with this
 /// IP.  A common example is external load-balancers that are not part
 /// of the Kubernetes system.</param>
 /// <param name="frontendRules">Frontend rules specifies a set of rules
 /// that should be applied in HAProxy frontend configuration. The set
 /// of keywords are from here
 /// https://cbonte.github.io/haproxy-dconv/1.7/configuration.html#4.1
 /// Only frontend sections can be applied here. It is up to user to
 /// provide valid set of rules. This allows acls or other options in
 /// frontend sections in HAProxy config. Frontend rules will be mapped
 /// with Ingress Rules according to port.</param>
 /// <param name="imagePullSecrets">ImagePullSecrets is an optional list
 /// of references to secrets in the same namespace to use for pulling
 /// any of the images used by this PodSpec. If specified, these secrets
 /// will be passed to individual puller implementations for them to
 /// use. For example, in the case of docker, only DockerConfig type
 /// secrets are honored. More info:
 /// https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod</param>
 /// <param name="loadBalancerSourceRanges">Optional: If specified and
 /// supported by the platform, this will restrict traffic through the
 /// cloud-provider load-balancer will be restricted to the specified
 /// client IPs. This field will be ignored if the cloud-provider does
 /// not support the feature.
 /// https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/</param>
 /// <param name="nodeSelector">NodeSelector is a selector which must be
 /// true for the pod to fit on a node. Selector which must match a
 /// node's labels for the pod to be scheduled on that node. More info:
 /// https://kubernetes.io/docs/concepts/configuration/assign-pod-node/</param>
 /// <param name="resources">Compute Resources required by the sidecar
 /// container.</param>
 /// <param name="rules">A list of host rules used to configure the
 /// Ingress. If unspecified, or no rule matches, all traffic is sent to
 /// the default backend.</param>
 /// <param name="schedulerName">If specified, the pod will be
 /// dispatched by specified scheduler. If not specified, the pod will
 /// be dispatched by default scheduler.</param>
 /// <param name="tls">TLS is the TLS configuration. Currently the
 /// Ingress only supports a single TLS port, 443, and assumes TLS
 /// termination. If multiple members of this list specify different
 /// hosts, they will be multiplexed on the same port according to the
 /// hostname specified through the SNI TLS extension.</param>
 /// <param name="tolerations">If specified, the pod's
 /// tolerations.</param>
 public V1beta1IngressSpec(k8s.Models.V1Affinity affinity = default(k8s.Models.V1Affinity), V1beta1HTTPIngressBackend backend = default(V1beta1HTTPIngressBackend), IList <string> externalIPs = default(IList <string>), IList <V1beta1FrontendRule> frontendRules = default(IList <V1beta1FrontendRule>), IList <k8s.Models.V1LocalObjectReference> imagePullSecrets = default(IList <k8s.Models.V1LocalObjectReference>), IList <string> loadBalancerSourceRanges = default(IList <string>), IDictionary <string, string> nodeSelector = default(IDictionary <string, string>), k8s.Models.V1ResourceRequirements resources = default(k8s.Models.V1ResourceRequirements), IList <V1beta1IngressRule> rules = default(IList <V1beta1IngressRule>), string schedulerName = default(string), IList <V1beta1IngressTLS> tls = default(IList <V1beta1IngressTLS>), IList <k8s.Models.V1Toleration> tolerations = default(IList <k8s.Models.V1Toleration>))
 {
     Affinity                 = affinity;
     Backend                  = backend;
     ExternalIPs              = externalIPs;
     FrontendRules            = frontendRules;
     ImagePullSecrets         = imagePullSecrets;
     LoadBalancerSourceRanges = loadBalancerSourceRanges;
     NodeSelector             = nodeSelector;
     Resources                = resources;
     Rules         = rules;
     SchedulerName = schedulerName;
     Tls           = tls;
     Tolerations   = tolerations;
     CustomInit();
 }
Пример #2
0
 /// <summary>
 /// Initializes a new instance of the V1beta1HTTPIngressPath class.
 /// </summary>
 /// <param name="backend">Backend defines the referenced service
 /// endpoint to which the traffic will be forwarded to.</param>
 /// <param name="path">Path is a extended POSIX regex as defined by
 /// IEEE Std 1003.1, (i.e this follows the egrep/unix syntax, not the
 /// perl syntax) matched against the path of an incoming request.
 /// Currently it can contain characters disallowed from the
 /// conventional "path" part of a URL as defined by RFC 3986. Paths
 /// must begin with a '/'. If unspecified, the path defaults to a catch
 /// all sending traffic to the backend.</param>
 public V1beta1HTTPIngressPath(V1beta1HTTPIngressBackend backend = default(V1beta1HTTPIngressBackend), string path = default(string))
 {
     Backend = backend;
     Path    = path;
     CustomInit();
 }