Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var Funcs = func(codecs runtimeserializer.CodecFactory) []interface{} { return []interface{}{ func(j *extensions.DeploymentSpec, c fuzz.Continue) { c.FuzzNoCustom(j) rhl := int32(c.Rand.Int31()) pds := int32(c.Rand.Int31()) j.RevisionHistoryLimit = &rhl j.ProgressDeadlineSeconds = &pds }, func(j *extensions.DeploymentStrategy, c fuzz.Continue) { c.FuzzNoCustom(j) strategyTypes := []extensions.DeploymentStrategyType{extensions.RecreateDeploymentStrategyType, extensions.RollingUpdateDeploymentStrategyType} j.Type = strategyTypes[c.Rand.Intn(len(strategyTypes))] if j.Type != extensions.RollingUpdateDeploymentStrategyType { j.RollingUpdate = nil } else { rollingUpdate := extensions.RollingUpdateDeployment{} if c.RandBool() { rollingUpdate.MaxUnavailable = intstr.FromInt(int(c.Rand.Int31())) rollingUpdate.MaxSurge = intstr.FromInt(int(c.Rand.Int31())) } else { rollingUpdate.MaxSurge = intstr.FromString(fmt.Sprintf("%d%%", c.Rand.Int31())) } j.RollingUpdate = &rollingUpdate } }, func(psp *extensions.PodSecurityPolicySpec, c fuzz.Continue) { c.FuzzNoCustom(psp) runAsUserRules := []extensions.RunAsUserStrategy{ extensions.RunAsUserStrategyMustRunAsNonRoot, extensions.RunAsUserStrategyMustRunAs, extensions.RunAsUserStrategyRunAsAny, } psp.RunAsUser.Rule = runAsUserRules[c.Rand.Intn(len(runAsUserRules))] seLinuxRules := []extensions.SELinuxStrategy{ extensions.SELinuxStrategyMustRunAs, extensions.SELinuxStrategyRunAsAny, } psp.SELinux.Rule = seLinuxRules[c.Rand.Intn(len(seLinuxRules))] supplementalGroupsRules := []extensions.SupplementalGroupsStrategyType{ extensions.SupplementalGroupsStrategyRunAsAny, extensions.SupplementalGroupsStrategyMustRunAs, } psp.SupplementalGroups.Rule = supplementalGroupsRules[c.Rand.Intn(len(supplementalGroupsRules))] fsGroupRules := []extensions.FSGroupStrategyType{ extensions.FSGroupStrategyMustRunAs, extensions.FSGroupStrategyRunAsAny, } psp.FSGroup.Rule = fsGroupRules[c.Rand.Intn(len(fsGroupRules))] }, func(j *extensions.DaemonSetSpec, c fuzz.Continue) { c.FuzzNoCustom(j) rhl := int32(c.Rand.Int31()) j.RevisionHistoryLimit = &rhl }, func(j *extensions.DaemonSetUpdateStrategy, c fuzz.Continue) { c.FuzzNoCustom(j) strategyTypes := []extensions.DaemonSetUpdateStrategyType{extensions.RollingUpdateDaemonSetStrategyType, extensions.OnDeleteDaemonSetStrategyType} j.Type = strategyTypes[c.Rand.Intn(len(strategyTypes))] if j.Type != extensions.RollingUpdateDaemonSetStrategyType { j.RollingUpdate = nil } else { rollingUpdate := extensions.RollingUpdateDaemonSet{} if c.RandBool() { if c.RandBool() { rollingUpdate.MaxUnavailable = intstr.FromInt(1 + int(c.Rand.Int31())) } else { rollingUpdate.MaxUnavailable = intstr.FromString(fmt.Sprintf("%d%%", 1+c.Rand.Int31())) } } j.RollingUpdate = &rollingUpdate } }, } }
Funcs returns the fuzzer functions for the extensions api group.
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.