os

@JvmName(name = "ndwjormktikcjjeb")
suspend fun os(value: Output<PodOSArgs>)
@JvmName(name = "dhaufnfiuauoulfp")
suspend fun os(value: PodOSArgs?)

Parameters

value

Specifies the OS of the containers in the pod. Some pod and container fields are restricted if this is set. If the OS field is set to linux, the following fields must be unset: -securityContext.windowsOptions If the OS field is set to windows, following fields must be unset: - spec.hostPID - spec.hostIPC - spec.hostUsers - spec.securityContext.appArmorProfile - spec.securityContext.seLinuxOptions - spec.securityContext.seccompProfile - spec.securityContext.fsGroup - spec.securityContext.fsGroupChangePolicy - spec.securityContext.sysctls - spec.shareProcessNamespace - spec.securityContext.runAsUser - spec.securityContext.runAsGroup - spec.securityContext.supplementalGroups - spec.securityContext.supplementalGroupsPolicy - spec.containers*.securityContext.appArmorProfile - spec.containers*.securityContext.seLinuxOptions - spec.containers*.securityContext.seccompProfile - spec.containers*.securityContext.capabilities - spec.containers*.securityContext.readOnlyRootFilesystem - spec.containers*.securityContext.privileged - spec.containers*.securityContext.allowPrivilegeEscalation - spec.containers*.securityContext.procMount - spec.containers*.securityContext.runAsUser - spec.containers*.securityContext.runAsGroup


@JvmName(name = "klvxwobfyqfbjaxe")
suspend fun os(argument: suspend PodOSArgsBuilder.() -> Unit)

Parameters

argument

Specifies the OS of the containers in the pod. Some pod and container fields are restricted if this is set. If the OS field is set to linux, the following fields must be unset: -securityContext.windowsOptions If the OS field is set to windows, following fields must be unset: - spec.hostPID - spec.hostIPC - spec.hostUsers - spec.securityContext.appArmorProfile - spec.securityContext.seLinuxOptions - spec.securityContext.seccompProfile - spec.securityContext.fsGroup - spec.securityContext.fsGroupChangePolicy - spec.securityContext.sysctls - spec.shareProcessNamespace - spec.securityContext.runAsUser - spec.securityContext.runAsGroup - spec.securityContext.supplementalGroups - spec.securityContext.supplementalGroupsPolicy - spec.containers*.securityContext.appArmorProfile - spec.containers*.securityContext.seLinuxOptions - spec.containers*.securityContext.seccompProfile - spec.containers*.securityContext.capabilities - spec.containers*.securityContext.readOnlyRootFilesystem - spec.containers*.securityContext.privileged - spec.containers*.securityContext.allowPrivilegeEscalation - spec.containers*.securityContext.procMount - spec.containers*.securityContext.runAsUser - spec.containers*.securityContext.runAsGroup