PodSecurityContext

trait Product
trait Mirror
class Object
trait Matchable
class Any

Type members

Inherited types

type MirroredElemLabels <: Tuple

The names of the product elements

The names of the product elements

Inherited from:
Mirror
Source:
Mirror.scala

The name of the type

The name of the type

Inherited from:
Mirror
Source:
Mirror.scala

Implicits

Implicits

obj.readOpt[Seq[io.k8s.api.core.v1.Sysctl]]("sysctls")(arrDecoder[T,Sysctl](evidence$1,decoderOf[T](evidence$1))).flatMap[String,PodSecurityContext](((sysctls:Option[Seq[Sysctl]])=>obj.readOpt[Int]("fsGroup")(intDecoder[T](evidence$1)).flatMap[String,PodSecurityContext](((fsGroup:Option[Int])=>obj.readOpt[Seq[Int]]("supplementalGroups")(arrDecoder[T,Int](evidence$1,intDecoder[T](evidence$1))).flatMap[String,PodSecurityContext](((supplementalGroups:Option[Seq[Int]])=>obj.readOpt[Int]("runAsGroup")(intDecoder[T](evidence$1)).flatMap[String,PodSecurityContext](((runAsGroup:Option[Int])=>obj.readOpt[io.k8s.api.core.v1.SeccompProfile]("seccompProfile")(decoderOf[T](evidence$1)).flatMap[String,PodSecurityContext](((seccompProfile:Option[SeccompProfile])=>obj.readOpt[io.k8s.api.core.v1.WindowsSecurityContextOptions]("windowsOptions")(decoderOf[T](evidence$1)).flatMap[String,PodSecurityContext](((windowsOptions:Option[WindowsSecurityContextOptions])=>obj.readOpt[io.k8s.api.core.v1.SELinuxOptions]("seLinuxOptions")(decoderOf[T](evidence$1)).flatMap[String,PodSecurityContext](((seLinuxOptions:Option[SELinuxOptions])=>obj.readOpt[Int]("runAsUser")(intDecoder[T](evidence$1)).flatMap[String,PodSecurityContext](((runAsUser:Option[Int])=>obj.readOpt[Boolean]("runAsNonRoot")(booleanDecoder[T](evidence$1)).map[PodSecurityContext](((runAsNonRoot:Option[Boolean])=>PodSecurityContext.apply(fsGroupChangePolicy=fsGroupChangePolicy,sysctls=sysctls,fsGroup=fsGroup,supplementalGroups=supplementalGroups,runAsGroup=runAsGroup,seccompProfile=seccompProfile,windowsOptions=windowsOptions,seLinuxOptions=seLinuxOptions,runAsUser=runAsUser,runAsNonRoot=runAsNonRoot))))))))))))))))))))))) } (new$anon():Decoder[T,PodSecurityContext]) }" class="documentableAnchor">
implicit def obj.readOpt[Seq[io.k8s.api.core.v1.Sysctl]]("sysctls")(arrDecoder[T,Sysctl](evidence$1,decoderOf[T](evidence$1))).flatMap[String,PodSecurityContext](((sysctls:Option[Seq[Sysctl]])=>obj.readOpt[Int]("fsGroup")(intDecoder[T](evidence$1)).flatMap[String,PodSecurityContext](((fsGroup:Option[Int])=>obj.readOpt[Seq[Int]]("supplementalGroups")(arrDecoder[T,Int](evidence$1,intDecoder[T](evidence$1))).flatMap[String,PodSecurityContext](((supplementalGroups:Option[Seq[Int]])=>obj.readOpt[Int]("runAsGroup")(intDecoder[T](evidence$1)).flatMap[String,PodSecurityContext](((runAsGroup:Option[Int])=>obj.readOpt[io.k8s.api.core.v1.SeccompProfile]("seccompProfile")(decoderOf[T](evidence$1)).flatMap[String,PodSecurityContext](((seccompProfile:Option[SeccompProfile])=>obj.readOpt[io.k8s.api.core.v1.WindowsSecurityContextOptions]("windowsOptions")(decoderOf[T](evidence$1)).flatMap[String,PodSecurityContext](((windowsOptions:Option[WindowsSecurityContextOptions])=>obj.readOpt[io.k8s.api.core.v1.SELinuxOptions]("seLinuxOptions")(decoderOf[T](evidence$1)).flatMap[String,PodSecurityContext](((seLinuxOptions:Option[SELinuxOptions])=>obj.readOpt[Int]("runAsUser")(intDecoder[T](evidence$1)).flatMap[String,PodSecurityContext](((runAsUser:Option[Int])=>obj.readOpt[Boolean]("runAsNonRoot")(booleanDecoder[T](evidence$1)).map[PodSecurityContext](((runAsNonRoot:Option[Boolean])=>PodSecurityContext.apply(fsGroupChangePolicy=fsGroupChangePolicy,sysctls=sysctls,fsGroup=fsGroup,supplementalGroups=supplementalGroups,runAsGroup=runAsGroup,seccompProfile=seccompProfile,windowsOptions=windowsOptions,seLinuxOptions=seLinuxOptions,runAsUser=runAsUser,runAsNonRoot=runAsNonRoot))))))))))))))))))))))) } (new$anon():Decoder[T,PodSecurityContext]) }" class="documentableName ">decoderOf[T : Reader]: Decoder[T, PodSecurityContext]
implicit def encoder[T](implicit builder: Builder[T]): Encoder[PodSecurityContext, T]