tekton.dev / v1 / TaskRun
- string
.apiVersion
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
- string
.kind
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
- object
.metadata
- object
.spec
TaskRunSpec defines the desired state of TaskRun
- object
.spec .computeResources
Compute resources to use for this TaskRun
- array
.spec .computeResources .claims
Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container.
This is an alpha field and requires enabling the DynamicResourceAllocation feature gate.
This field is immutable. It can only be set for containers.
- string required
.spec .computeResources .claims[] .name
Name must match the name of one entry in pod.spec.resourceClaims of the Pod where this field is used. It makes that resource available inside a container.
- string
.spec .computeResources .claims[] .request
Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.
- object
.spec .computeResources .limits
Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- object
.spec .computeResources .requests
Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- object
.spec .debug
TaskRunDebug defines the breakpoint config for a particular TaskRun
- object
.spec .debug .breakpoints
TaskBreakpoints defines the breakpoint config for a particular Task
- array
.spec .debug .breakpoints .beforeSteps
- string
.spec .debug .breakpoints .onFailure
if enabled, pause TaskRun on failure of a step failed step will not exit
- array
.spec .params
Params is a list of Param
- string required
.spec .params[] .name
- undefined required
.spec .params[] .value
- object
.spec .podTemplate
PodTemplate holds pod specific configuration
- undefined
.spec .podTemplate .affinity
If specified, the pod’s scheduling constraints. See Pod.spec.affinity (API version: v1)
- boolean
.spec .podTemplate .automountServiceAccountToken
AutomountServiceAccountToken indicates whether pods running as this service account should have an API token automatically mounted.
- object
.spec .podTemplate .dnsConfig
Specifies the DNS parameters of a pod. Parameters specified here will be merged to the generated DNS configuration based on DNSPolicy.
- array
.spec .podTemplate .dnsConfig .nameservers
A list of DNS name server IP addresses. This will be appended to the base nameservers generated from DNSPolicy. Duplicated nameservers will be removed.
- array
.spec .podTemplate .dnsConfig .options
A list of DNS resolver options. This will be merged with the base options generated from DNSPolicy. Duplicated entries will be removed. Resolution options given in Options will override those that appear in the base DNSPolicy.
- string
.spec .podTemplate .dnsConfig .options[] .name
Name is this DNS resolver option’s name. Required.
- string
.spec .podTemplate .dnsConfig .options[] .value
Value is this DNS resolver option’s value.
- array
.spec .podTemplate .dnsConfig .searches
A list of DNS search domains for host-name lookup. This will be appended to the base search paths generated from DNSPolicy. Duplicated search paths will be removed.
- string
.spec .podTemplate .dnsPolicy
Set DNS policy for the pod. Defaults to “ClusterFirst”. Valid values are ‘ClusterFirst’, ‘Default’ or ‘None’. DNS parameters given in DNSConfig will be merged with the policy selected with DNSPolicy.
- boolean
.spec .podTemplate .enableServiceLinks
EnableServiceLinks indicates whether information about services should be injected into pod’s environment variables, matching the syntax of Docker links. Optional: Defaults to true.
- array
.spec .podTemplate .env
List of environment variables that can be provided to the containers belonging to the pod.
- string required
.spec .podTemplate .env[] .name
Name of the environment variable. Must be a C_IDENTIFIER.
- string
.spec .podTemplate .env[] .value
Variable references $(VAR_NAME) are expanded using the previously defined environment variables in the container and any service environment variables. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Defaults to “”.
- object
.spec .podTemplate .env[] .valueFrom
Source for the environment variable’s value. Cannot be used if value is not empty.
- object
.spec .podTemplate .env[] .valueFrom .configMapKeyRef
Selects a key of a ConfigMap.
- string required
.spec .podTemplate .env[] .valueFrom .configMapKeyRef .key
The key to select.
- string
.spec .podTemplate .env[] .valueFrom .configMapKeyRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.spec .podTemplate .env[] .valueFrom .configMapKeyRef .optional
Specify whether the ConfigMap or its key must be defined
- object
.spec .podTemplate .env[] .valueFrom .fieldRef
Selects a field of the pod: supports metadata.name, metadata.namespace,
metadata.labels['<KEY>']
,metadata.annotations['<KEY>']
, spec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs. - string
.spec .podTemplate .env[] .valueFrom .fieldRef .apiVersion
Version of the schema the FieldPath is written in terms of, defaults to “v1”.
- string required
.spec .podTemplate .env[] .valueFrom .fieldRef .fieldPath
Path of the field to select in the specified API version.
- object
.spec .podTemplate .env[] .valueFrom .resourceFieldRef
Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported.
- string
.spec .podTemplate .env[] .valueFrom .resourceFieldRef .containerName
Container name: required for volumes, optional for env vars
- integer | string
.spec .podTemplate .env[] .valueFrom .resourceFieldRef .divisor
Specifies the output format of the exposed resources, defaults to “1”
- string required
.spec .podTemplate .env[] .valueFrom .resourceFieldRef .resource
Required: resource to select
- object
.spec .podTemplate .env[] .valueFrom .secretKeyRef
Selects a key of a secret in the pod’s namespace
- string required
.spec .podTemplate .env[] .valueFrom .secretKeyRef .key
The key of the secret to select from. Must be a valid secret key.
- string
.spec .podTemplate .env[] .valueFrom .secretKeyRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.spec .podTemplate .env[] .valueFrom .secretKeyRef .optional
Specify whether the Secret or its key must be defined
- array
.spec .podTemplate .hostAliases
HostAliases is an optional list of hosts and IPs that will be injected into the pod’s hosts file if specified. This is only valid for non-hostNetwork pods.
- array
.spec .podTemplate .hostAliases[] .hostnames
Hostnames for the above IP address.
- string required
.spec .podTemplate .hostAliases[] .ip
IP address of the host file entry.
- boolean
.spec .podTemplate .hostNetwork
HostNetwork specifies whether the pod may use the node network namespace
- array
.spec .podTemplate .imagePullSecrets
ImagePullSecrets gives the name of the secret used by the pod to pull the image if specified
- string
.spec .podTemplate .imagePullSecrets[] .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- object
.spec .podTemplate .nodeSelector
NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node’s labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/
- string
.spec .podTemplate .priorityClassName
If specified, indicates the pod’s priority. “system-node-critical” and “system-cluster-critical” are two special keywords which indicate the highest priorities with the former being the highest priority. Any other name must be defined by creating a PriorityClass object with that name. If not specified, the pod priority will be default or zero if there is no default.
- string
.spec .podTemplate .runtimeClassName
RuntimeClassName refers to a RuntimeClass object in the node.k8s.io group, which should be used to run this pod. If no RuntimeClass resource matches the named class, the pod will not be run. If unset or empty, the “legacy” RuntimeClass will be used, which is an implicit class with an empty definition that uses the default runtime handler. More info: https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md This is a beta feature as of Kubernetes v1.14.
- string
.spec .podTemplate .schedulerName
SchedulerName specifies the scheduler to be used to dispatch the Pod
- undefined
.spec .podTemplate .securityContext
SecurityContext holds pod-level security attributes and common container settings. Optional: Defaults to empty. See type description for default values of each field. See Pod.spec.securityContext (API version: v1)
- array
.spec .podTemplate .tolerations
If specified, the pod’s tolerations.
- string
.spec .podTemplate .tolerations[] .effect
Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.
- string
.spec .podTemplate .tolerations[] .key
Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys.
- string
.spec .podTemplate .tolerations[] .operator
Operator represents a key’s relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category.
- integer
.spec .podTemplate .tolerations[] .tolerationSeconds
TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system.
- string
.spec .podTemplate .tolerations[] .value
Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string.
- array
.spec .podTemplate .topologySpreadConstraints
TopologySpreadConstraints controls how Pods are spread across your cluster among failure-domains such as regions, zones, nodes, and other user-defined topology domains.
- object
.spec .podTemplate .topologySpreadConstraints[] .labelSelector
LabelSelector is used to find matching pods. Pods that match this label selector are counted to determine the number of pods in their corresponding topology domain.
- array
.spec .podTemplate .topologySpreadConstraints[] .labelSelector .matchExpressions
matchExpressions is a list of label selector requirements. The requirements are ANDed.
- string required
.spec .podTemplate .topologySpreadConstraints[] .labelSelector .matchExpressions[] .key
key is the label key that the selector applies to.
- string required
.spec .podTemplate .topologySpreadConstraints[] .labelSelector .matchExpressions[] .operator
operator represents a key’s relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
- array
.spec .podTemplate .topologySpreadConstraints[] .labelSelector .matchExpressions[] .values
values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
- object
.spec .podTemplate .topologySpreadConstraints[] .labelSelector .matchLabels
matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is “key”, the operator is “In”, and the values array contains only “value”. The requirements are ANDed.
- array
.spec .podTemplate .topologySpreadConstraints[] .matchLabelKeys
MatchLabelKeys is a set of pod label keys to select the pods over which spreading will be calculated. The keys are used to lookup values from the incoming pod labels, those key-value labels are ANDed with labelSelector to select the group of existing pods over which spreading will be calculated for the incoming pod. The same key is forbidden to exist in both MatchLabelKeys and LabelSelector. MatchLabelKeys cannot be set when LabelSelector isn’t set. Keys that don’t exist in the incoming pod labels will be ignored. A null or empty list means only match against labelSelector.
This is a beta field and requires the MatchLabelKeysInPodTopologySpread feature gate to be enabled (enabled by default).
- integer required
.spec .podTemplate .topologySpreadConstraints[] .maxSkew
MaxSkew describes the degree to which pods may be unevenly distributed. When
whenUnsatisfiable=DoNotSchedule
, it is the maximum permitted difference between the number of matching pods in the target topology and the global minimum. The global minimum is the minimum number of matching pods in an eligible domain or zero if the number of eligible domains is less than MinDomains. For example, in a 3-zone cluster, MaxSkew is set to 1, and pods with the same labelSelector spread as 2/2/1: In this case, the global minimum is 1. | zone1 | zone2 | zone3 | | P P | P P | P |- if MaxSkew is 1, incoming pod can only be scheduled to zone3 to become 2/2/2; scheduling it onto zone1(zone2) would make the ActualSkew(3-1) on zone1(zone2) violate MaxSkew(1).
- if MaxSkew is 2, incoming pod can be scheduled onto any zone.
When
whenUnsatisfiable=ScheduleAnyway
, it is used to give higher precedence to topologies that satisfy it. It’s a required field. Default value is 1 and 0 is not allowed.
- integer
.spec .podTemplate .topologySpreadConstraints[] .minDomains
MinDomains indicates a minimum number of eligible domains. When the number of eligible domains with matching topology keys is less than minDomains, Pod Topology Spread treats “global minimum” as 0, and then the calculation of Skew is performed. And when the number of eligible domains with matching topology keys equals or greater than minDomains, this value has no effect on scheduling. As a result, when the number of eligible domains is less than minDomains, scheduler won’t schedule more than maxSkew Pods to those domains. If value is nil, the constraint behaves as if MinDomains is equal to 1. Valid values are integers greater than 0. When value is not nil, WhenUnsatisfiable must be DoNotSchedule.
For example, in a 3-zone cluster, MaxSkew is set to 2, MinDomains is set to 5 and pods with the same labelSelector spread as 2/2/2: | zone1 | zone2 | zone3 | | P P | P P | P P | The number of domains is less than 5(MinDomains), so “global minimum” is treated as 0. In this situation, new pod with the same labelSelector cannot be scheduled, because computed skew will be 3(3 - 0) if new Pod is scheduled to any of the three zones, it will violate MaxSkew.
- string
.spec .podTemplate .topologySpreadConstraints[] .nodeAffinityPolicy
NodeAffinityPolicy indicates how we will treat Pod’s nodeAffinity/nodeSelector when calculating pod topology spread skew. Options are:
- Honor: only nodes matching nodeAffinity/nodeSelector are included in the calculations.
- Ignore: nodeAffinity/nodeSelector are ignored. All nodes are included in the calculations.
If this value is nil, the behavior is equivalent to the Honor policy. This is a beta-level feature default enabled by the NodeInclusionPolicyInPodTopologySpread feature flag.
- string
.spec .podTemplate .topologySpreadConstraints[] .nodeTaintsPolicy
NodeTaintsPolicy indicates how we will treat node taints when calculating pod topology spread skew. Options are:
- Honor: nodes without taints, along with tainted nodes for which the incoming pod has a toleration, are included.
- Ignore: node taints are ignored. All nodes are included.
If this value is nil, the behavior is equivalent to the Ignore policy. This is a beta-level feature default enabled by the NodeInclusionPolicyInPodTopologySpread feature flag.
- string required
.spec .podTemplate .topologySpreadConstraints[] .topologyKey
TopologyKey is the key of node labels. Nodes that have a label with this key and identical values are considered to be in the same topology. We consider each
as a “bucket”, and try to put balanced number of pods into each bucket. We define a domain as a particular instance of a topology. Also, we define an eligible domain as a domain whose nodes meet the requirements of nodeAffinityPolicy and nodeTaintsPolicy. e.g. If TopologyKey is “kubernetes.io/hostname”, each Node is a domain of that topology. And, if TopologyKey is “topology.kubernetes.io/zone”, each zone is a domain of that topology. It’s a required field. - string required
.spec .podTemplate .topologySpreadConstraints[] .whenUnsatisfiable
WhenUnsatisfiable indicates how to deal with a pod if it doesn’t satisfy the spread constraint.
- DoNotSchedule (default) tells the scheduler not to schedule it.
- ScheduleAnyway tells the scheduler to schedule the pod in any location, but giving higher precedence to topologies that would help reduce the skew. A constraint is considered “Unsatisfiable” for an incoming pod if and only if every possible node assignment for that pod would violate “MaxSkew” on some topology. For example, in a 3-zone cluster, MaxSkew is set to 1, and pods with the same labelSelector spread as 3/1/1: | zone1 | zone2 | zone3 | | P P P | P | P | If WhenUnsatisfiable is set to DoNotSchedule, incoming pod can only be scheduled to zone2(zone3) to become 3/2/1(3/1/2) as ActualSkew(2-1) on zone2(zone3) satisfies MaxSkew(1). In other words, the cluster can still be imbalanced, but scheduler won’t make it more imbalanced. It’s a required field.
- undefined
.spec .podTemplate .volumes
List of volumes that can be mounted by containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes See Pod.spec.volumes (API version: v1)
- integer
.spec .retries
Retries represents how many times this TaskRun should be retried in the event of task failure.
- string
.spec .serviceAccountName
- array
.spec .sidecarSpecs
Specs to apply to Sidecars in this TaskRun. If a field is specified in both a Sidecar and a SidecarSpec, the value from the SidecarSpec will be used. This field is only supported when the alpha feature gate is enabled.
- object required
.spec .sidecarSpecs[] .computeResources
The resource requirements to apply to the Sidecar.
- array
.spec .sidecarSpecs[] .computeResources .claims
Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container.
This is an alpha field and requires enabling the DynamicResourceAllocation feature gate.
This field is immutable. It can only be set for containers.
- string required
.spec .sidecarSpecs[] .computeResources .claims[] .name
Name must match the name of one entry in pod.spec.resourceClaims of the Pod where this field is used. It makes that resource available inside a container.
- string
.spec .sidecarSpecs[] .computeResources .claims[] .request
Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.
- object
.spec .sidecarSpecs[] .computeResources .limits
Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- object
.spec .sidecarSpecs[] .computeResources .requests
Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- string required
.spec .sidecarSpecs[] .name
The name of the Sidecar to override.
- string
.spec .status
Used for cancelling a TaskRun (and maybe more later on)
- string
.spec .statusMessage
Status message for cancellation.
- array
.spec .stepSpecs
Specs to apply to Steps in this TaskRun. If a field is specified in both a Step and a StepSpec, the value from the StepSpec will be used. This field is only supported when the alpha feature gate is enabled.
- object required
.spec .stepSpecs[] .computeResources
The resource requirements to apply to the Step.
- array
.spec .stepSpecs[] .computeResources .claims
Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container.
This is an alpha field and requires enabling the DynamicResourceAllocation feature gate.
This field is immutable. It can only be set for containers.
- string required
.spec .stepSpecs[] .computeResources .claims[] .name
Name must match the name of one entry in pod.spec.resourceClaims of the Pod where this field is used. It makes that resource available inside a container.
- string
.spec .stepSpecs[] .computeResources .claims[] .request
Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.
- object
.spec .stepSpecs[] .computeResources .limits
Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- object
.spec .stepSpecs[] .computeResources .requests
Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- string required
.spec .stepSpecs[] .name
The name of the Step to override.
- object
.spec .taskRef
no more than one of the TaskRef and TaskSpec may be specified.
- string
.spec .taskRef .apiVersion
API version of the referent Note: A Task with non-empty APIVersion and Kind is considered a Custom Task
- string
.spec .taskRef .kind
TaskKind indicates the Kind of the Task:
- Namespaced Task when Kind is set to “Task”. If Kind is “”, it defaults to “Task”.
- Custom Task when Kind is non-empty and APIVersion is non-empty
- string
.spec .taskRef .name
Name of the referent; More info: http://kubernetes.io/docs/user-guide/identifiers#names
- array
.spec .taskRef .params
Params contains the parameters used to identify the referenced Tekton resource. Example entries might include “repo” or “path” but the set of params ultimately depends on the chosen resolver.
- string required
.spec .taskRef .params[] .name
- undefined required
.spec .taskRef .params[] .value
- string
.spec .taskRef .resolver
Resolver is the name of the resolver that should perform resolution of the referenced Tekton resource, such as “git”.
- undefined
.spec .taskSpec
Specifying TaskSpec can be disabled by setting
disable-inline-spec
feature flag. See Task.spec (API version: tekton.dev/v1) - string
.spec .timeout
Time after which one retry attempt times out. Defaults to 1 hour. Refer Go’s ParseDuration documentation for expected format: https://golang.org/pkg/time/#ParseDuration
- array
.spec .workspaces
Workspaces is a list of WorkspaceBindings from volumes to workspaces.
- object
.spec .workspaces[] .configMap
ConfigMap represents a configMap that should populate this workspace.
- integer
.spec .workspaces[] .configMap .defaultMode
defaultMode is optional: mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.
- array
.spec .workspaces[] .configMap .items
items if unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the ‘..’ path or start with ‘..’.
- string required
.spec .workspaces[] .configMap .items[] .key
key is the key to project.
- integer
.spec .workspaces[] .configMap .items[] .mode
mode is Optional: mode bits used to set permissions on this file. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. If not specified, the volume defaultMode will be used. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.
- string required
.spec .workspaces[] .configMap .items[] .path
path is the relative path of the file to map the key to. May not be an absolute path. May not contain the path element ‘..’. May not start with the string ‘..’.
- string
.spec .workspaces[] .configMap .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.spec .workspaces[] .configMap .optional
optional specify whether the ConfigMap or its keys must be defined
- object
.spec .workspaces[] .csi
CSI (Container Storage Interface) represents ephemeral storage that is handled by certain external CSI drivers.
- string required
.spec .workspaces[] .csi .driver
driver is the name of the CSI driver that handles this volume. Consult with your admin for the correct name as registered in the cluster.
- string
.spec .workspaces[] .csi .fsType
fsType to mount. Ex. “ext4”, “xfs”, “ntfs”. If not provided, the empty value is passed to the associated CSI driver which will determine the default filesystem to apply.
- object
.spec .workspaces[] .csi .nodePublishSecretRef
nodePublishSecretRef is a reference to the secret object containing sensitive information to pass to the CSI driver to complete the CSI NodePublishVolume and NodeUnpublishVolume calls. This field is optional, and may be empty if no secret is required. If the secret object contains more than one secret, all secret references are passed.
- string
.spec .workspaces[] .csi .nodePublishSecretRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.spec .workspaces[] .csi .readOnly
readOnly specifies a read-only configuration for the volume. Defaults to false (read/write).
- object
.spec .workspaces[] .csi .volumeAttributes
volumeAttributes stores driver-specific properties that are passed to the CSI driver. Consult your driver’s documentation for supported values.
- object
.spec .workspaces[] .emptyDir
EmptyDir represents a temporary directory that shares a Task’s lifetime. More info: https://kubernetes.io/docs/concepts/storage/volumes#emptydir Either this OR PersistentVolumeClaim can be used.
- string
.spec .workspaces[] .emptyDir .medium
medium represents what type of storage medium should back this directory. The default is “” which means to use the node’s default medium. Must be an empty string (default) or Memory. More info: https://kubernetes.io/docs/concepts/storage/volumes#emptydir
- integer | string
.spec .workspaces[] .emptyDir .sizeLimit
sizeLimit is the total amount of local storage required for this EmptyDir volume. The size limit is also applicable for memory medium. The maximum usage on memory medium EmptyDir would be the minimum value between the SizeLimit specified here and the sum of memory limits of all containers in a pod. The default is nil which means that the limit is undefined. More info: https://kubernetes.io/docs/concepts/storage/volumes#emptydir
- string required
.spec .workspaces[] .name
Name is the name of the workspace populated by the volume.
- object
.spec .workspaces[] .persistentVolumeClaim
PersistentVolumeClaimVolumeSource represents a reference to a PersistentVolumeClaim in the same namespace. Either this OR EmptyDir can be used.
- string required
.spec .workspaces[] .persistentVolumeClaim .claimName
claimName is the name of a PersistentVolumeClaim in the same namespace as the pod using this volume. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistentvolumeclaims
- boolean
.spec .workspaces[] .persistentVolumeClaim .readOnly
readOnly Will force the ReadOnly setting in VolumeMounts. Default false.
- object
.spec .workspaces[] .projected
Projected represents a projected volume that should populate this workspace.
- integer
.spec .workspaces[] .projected .defaultMode
defaultMode are the mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.
- array
.spec .workspaces[] .projected .sources
sources is the list of volume projections. Each entry in this list handles one source.
- object
.spec .workspaces[] .projected .sources[] .clusterTrustBundle
ClusterTrustBundle allows a pod to access the
.spec.trustBundle
field of ClusterTrustBundle objects in an auto-updating file.Alpha, gated by the ClusterTrustBundleProjection feature gate.
ClusterTrustBundle objects can either be selected by name, or by the combination of signer name and a label selector.
Kubelet performs aggressive normalization of the PEM contents written into the pod filesystem. Esoteric PEM features such as inter-block comments and block headers are stripped. Certificates are deduplicated. The ordering of certificates within the file is arbitrary, and Kubelet may change the order over time.
- object
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .labelSelector
Select all ClusterTrustBundles that match this label selector. Only has effect if signerName is set. Mutually-exclusive with name. If unset, interpreted as “match nothing”. If set but empty, interpreted as “match everything”.
- array
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .labelSelector .matchExpressions
matchExpressions is a list of label selector requirements. The requirements are ANDed.
- string required
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .labelSelector .matchExpressions[] .key
key is the label key that the selector applies to.
- string required
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .labelSelector .matchExpressions[] .operator
operator represents a key’s relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
- array
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .labelSelector .matchExpressions[] .values
values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
- object
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .labelSelector .matchLabels
matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is “key”, the operator is “In”, and the values array contains only “value”. The requirements are ANDed.
- string
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .name
Select a single ClusterTrustBundle by object name. Mutually-exclusive with signerName and labelSelector.
- boolean
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .optional
If true, don’t block pod startup if the referenced ClusterTrustBundle(s) aren’t available. If using name, then the named ClusterTrustBundle is allowed not to exist. If using signerName, then the combination of signerName and labelSelector is allowed to match zero ClusterTrustBundles.
- string required
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .path
Relative path from the volume root to write the bundle.
- string
.spec .workspaces[] .projected .sources[] .clusterTrustBundle .signerName
Select all ClusterTrustBundles that match this signer name. Mutually-exclusive with name. The contents of all selected ClusterTrustBundles will be unified and deduplicated.
- object
.spec .workspaces[] .projected .sources[] .configMap
configMap information about the configMap data to project
- array
.spec .workspaces[] .projected .sources[] .configMap .items
items if unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the ‘..’ path or start with ‘..’.
- string required
.spec .workspaces[] .projected .sources[] .configMap .items[] .key
key is the key to project.
- integer
.spec .workspaces[] .projected .sources[] .configMap .items[] .mode
mode is Optional: mode bits used to set permissions on this file. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. If not specified, the volume defaultMode will be used. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.
- string required
.spec .workspaces[] .projected .sources[] .configMap .items[] .path
path is the relative path of the file to map the key to. May not be an absolute path. May not contain the path element ‘..’. May not start with the string ‘..’.
- string
.spec .workspaces[] .projected .sources[] .configMap .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.spec .workspaces[] .projected .sources[] .configMap .optional
optional specify whether the ConfigMap or its keys must be defined
- object
.spec .workspaces[] .projected .sources[] .downwardAPI
downwardAPI information about the downwardAPI data to project
- array
.spec .workspaces[] .projected .sources[] .downwardAPI .items
Items is a list of DownwardAPIVolume file
- object
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .fieldRef
Required: Selects a field of the pod: only annotations, labels, name, namespace and uid are supported.
- string
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .fieldRef .apiVersion
Version of the schema the FieldPath is written in terms of, defaults to “v1”.
- string required
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .fieldRef .fieldPath
Path of the field to select in the specified API version.
- integer
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .mode
Optional: mode bits used to set permissions on this file, must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. If not specified, the volume defaultMode will be used. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.
- string required
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .path
Required: Path is the relative path name of the file to be created. Must not be absolute or contain the ‘..’ path. Must be utf-8 encoded. The first item of the relative path must not start with ‘..’
- object
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .resourceFieldRef
Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, requests.cpu and requests.memory) are currently supported.
- string
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .resourceFieldRef .containerName
Container name: required for volumes, optional for env vars
- integer | string
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .resourceFieldRef .divisor
Specifies the output format of the exposed resources, defaults to “1”
- string required
.spec .workspaces[] .projected .sources[] .downwardAPI .items[] .resourceFieldRef .resource
Required: resource to select
- object
.spec .workspaces[] .projected .sources[] .secret
secret information about the secret data to project
- array
.spec .workspaces[] .projected .sources[] .secret .items
items if unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the ‘..’ path or start with ‘..’.
- string required
.spec .workspaces[] .projected .sources[] .secret .items[] .key
key is the key to project.
- integer
.spec .workspaces[] .projected .sources[] .secret .items[] .mode
mode is Optional: mode bits used to set permissions on this file. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. If not specified, the volume defaultMode will be used. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.
- string required
.spec .workspaces[] .projected .sources[] .secret .items[] .path
path is the relative path of the file to map the key to. May not be an absolute path. May not contain the path element ‘..’. May not start with the string ‘..’.
- string
.spec .workspaces[] .projected .sources[] .secret .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.spec .workspaces[] .projected .sources[] .secret .optional
optional field specify whether the Secret or its key must be defined
- object
.spec .workspaces[] .projected .sources[] .serviceAccountToken
serviceAccountToken is information about the serviceAccountToken data to project
- string
.spec .workspaces[] .projected .sources[] .serviceAccountToken .audience
audience is the intended audience of the token. A recipient of a token must identify itself with an identifier specified in the audience of the token, and otherwise should reject the token. The audience defaults to the identifier of the apiserver.
- integer
.spec .workspaces[] .projected .sources[] .serviceAccountToken .expirationSeconds
expirationSeconds is the requested duration of validity of the service account token. As the token approaches expiration, the kubelet volume plugin will proactively rotate the service account token. The kubelet will start trying to rotate the token if the token is older than 80 percent of its time to live or if the token is older than 24 hours.Defaults to 1 hour and must be at least 10 minutes.
- string required
.spec .workspaces[] .projected .sources[] .serviceAccountToken .path
path is the path relative to the mount point of the file to project the token into.
- object
.spec .workspaces[] .secret
Secret represents a secret that should populate this workspace.
- integer
.spec .workspaces[] .secret .defaultMode
defaultMode is Optional: mode bits used to set permissions on created files by default. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.
- array
.spec .workspaces[] .secret .items
items If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the ‘..’ path or start with ‘..’.
- string required
.spec .workspaces[] .secret .items[] .key
key is the key to project.
- integer
.spec .workspaces[] .secret .items[] .mode
mode is Optional: mode bits used to set permissions on this file. Must be an octal value between 0000 and 0777 or a decimal value between 0 and 511. YAML accepts both octal and decimal values, JSON requires decimal values for mode bits. If not specified, the volume defaultMode will be used. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set.
- string required
.spec .workspaces[] .secret .items[] .path
path is the relative path of the file to map the key to. May not be an absolute path. May not contain the path element ‘..’. May not start with the string ‘..’.
- boolean
.spec .workspaces[] .secret .optional
optional field specify whether the Secret or its keys must be defined
- string
.spec .workspaces[] .secret .secretName
secretName is the name of the secret in the pod’s namespace to use. More info: https://kubernetes.io/docs/concepts/storage/volumes#secret
- string
.spec .workspaces[] .subPath
SubPath is optionally a directory on the volume which should be used for this binding (i.e. the volume will be mounted at this sub directory).
- undefined
.spec .workspaces[] .volumeClaimTemplate
VolumeClaimTemplate is a template for a claim that will be created in the same namespace. The PipelineRun controller is responsible for creating a unique claim for each instance of PipelineRun. See PersistentVolumeClaim (API version: v1)
- object
.status
TaskRunStatus defines the observed state of TaskRun
- object
.status .annotations
Annotations is additional Status fields for the Resource to save some additional State as well as convey more information to the user. This is roughly akin to Annotations on any k8s resource, just the reconciler conveying richer information outwards.
- object
.status .artifacts
Artifacts are the list of artifacts written out by the task’s containers
- array
.status .artifacts .inputs
- boolean
.status .artifacts .inputs[] .buildOutput
Indicate if the artifact is a build output or a by-product
- string
.status .artifacts .inputs[] .name
The artifact’s identifying category name
- array
.status .artifacts .inputs[] .values
A collection of values related to the artifact
- object
.status .artifacts .inputs[] .values[] .digest
- string
.status .artifacts .inputs[] .values[] .uri
- array
.status .artifacts .outputs
- boolean
.status .artifacts .outputs[] .buildOutput
Indicate if the artifact is a build output or a by-product
- string
.status .artifacts .outputs[] .name
The artifact’s identifying category name
- array
.status .artifacts .outputs[] .values
A collection of values related to the artifact
- object
.status .artifacts .outputs[] .values[] .digest
- string
.status .artifacts .outputs[] .values[] .uri
- string
.status .completionTime
CompletionTime is the time the build completed.
- array
.status .conditions
Conditions the latest available observations of a resource’s current state.
- string
.status .conditions[] .lastTransitionTime
LastTransitionTime is the last time the condition transitioned from one status to another. We use VolatileTime in place of metav1.Time to exclude this from creating equality.Semantic differences (all other things held constant).
- string
.status .conditions[] .message
A human readable message indicating details about the transition.
- string
.status .conditions[] .reason
The reason for the condition’s last transition.
- string
.status .conditions[] .severity
Severity with which to treat failures of this type of condition. When this is not specified, it defaults to Error.
- string required
.status .conditions[] .status
Status of the condition, one of True, False, Unknown.
- string required
.status .conditions[] .type
Type of condition.
- integer
.status .observedGeneration
ObservedGeneration is the ‘Generation’ of the Service that was last processed by the controller.
- string required
.status .podName
PodName is the name of the pod responsible for executing this task’s steps.
- object
.status .provenance
Provenance contains some key authenticated metadata about how a software artifact was built (what sources, what inputs/outputs, etc.).
- object
.status .provenance .featureFlags
FeatureFlags identifies the feature flags that were used during the task/pipeline run
- boolean
.status .provenance .featureFlags .awaitSidecarReadiness
- string
.status .provenance .featureFlags .coschedule
- boolean
.status .provenance .featureFlags .disableCredsInit
- string
.status .provenance .featureFlags .disableInlineSpec
- string
.status .provenance .featureFlags .enableAPIFields
- boolean
.status .provenance .featureFlags .enableArtifacts
- boolean
.status .provenance .featureFlags .enableCELInWhenExpression
- boolean
.status .provenance .featureFlags .enableConciseResolverSyntax
- boolean
.status .provenance .featureFlags .enableKeepPodOnCancel
- boolean
.status .provenance .featureFlags .enableKubernetesSidecar
- boolean
.status .provenance .featureFlags .enableParamEnum
- boolean
.status .provenance .featureFlags .enableProvenanceInStatus
- boolean
.status .provenance .featureFlags .enableStepActions
EnableStepActions is a no-op flag since StepActions are stable
- string
.status .provenance .featureFlags .enforceNonfalsifiability
- integer
.status .provenance .featureFlags .maxResultSize
- boolean
.status .provenance .featureFlags .requireGitSSHSecretKnownHosts
- string
.status .provenance .featureFlags .resultExtractionMethod
- boolean
.status .provenance .featureFlags .runningInEnvWithInjectedSidecars
- boolean
.status .provenance .featureFlags .sendCloudEventsForRuns
- boolean
.status .provenance .featureFlags .setSecurityContext
- boolean
.status .provenance .featureFlags .setSecurityContextReadOnlyRootFilesystem
- string
.status .provenance .featureFlags .verificationNoMatchPolicy
VerificationNoMatchPolicy is the feature flag for “trusted-resources-verification-no-match-policy” VerificationNoMatchPolicy can be set to “ignore”, “warn” and “fail” values. ignore: skip trusted resources verification when no matching verification policies found warn: skip trusted resources verification when no matching verification policies found and log a warning fail: fail the taskrun or pipelines run if no matching verification policies found
- object
.status .provenance .refSource
RefSource identifies the source where a remote task/pipeline came from.
- object
.status .provenance .refSource .digest
Digest is a collection of cryptographic digests for the contents of the artifact specified by URI. Example: {“sha1”: “f99d13e554ffcb696dee719fa85b695cb5b0f428”}
- string
.status .provenance .refSource .entryPoint
EntryPoint identifies the entry point into the build. This is often a path to a build definition file and/or a target label within that file. Example: “task/git-clone/0.8/git-clone.yaml”
- string
.status .provenance .refSource .uri
URI indicates the identity of the source of the build definition. Example: “https://github.com/tektoncd/catalog”
- array
.status .results
Results are the list of results written out by the task’s containers
- string required
.status .results[] .name
Name the given name
- string
.status .results[] .type
Type is the user-specified type of the result. The possible type is currently “string” and will support “array” in following work.
- undefined required
.status .results[] .value
Value the given value of the result
- undefined
.status .retriesStatus
RetriesStatus contains the history of TaskRunStatus in case of a retry in order to keep record of failures. All TaskRunStatus stored in RetriesStatus will have no date within the RetriesStatus as is redundant.
- array
.status .sidecars
The list has one entry per sidecar in the manifest. Each entry is represents the imageid of the corresponding sidecar.
- string
.status .sidecars[] .container
- string
.status .sidecars[] .imageID
- string
.status .sidecars[] .name
- object
.status .sidecars[] .running
Details about a running container
- string
.status .sidecars[] .running .startedAt
Time at which the container was last (re-)started
- object
.status .sidecars[] .terminated
Details about a terminated container
- string
.status .sidecars[] .terminated .containerID
Container’s ID in the format ‘
:// ’ - integer required
.status .sidecars[] .terminated .exitCode
Exit status from the last termination of the container
- string
.status .sidecars[] .terminated .finishedAt
Time at which the container last terminated
- string
.status .sidecars[] .terminated .message
Message regarding the last termination of the container
- string
.status .sidecars[] .terminated .reason
(brief) reason from the last termination of the container
- integer
.status .sidecars[] .terminated .signal
Signal from the last termination of the container
- string
.status .sidecars[] .terminated .startedAt
Time at which previous execution of the container started
- object
.status .sidecars[] .waiting
Details about a waiting container
- string
.status .sidecars[] .waiting .message
Message regarding why the container is not yet running.
- string
.status .sidecars[] .waiting .reason
(brief) reason the container is not yet running.
- object
.status .spanContext
SpanContext contains tracing span context fields
- string
.status .startTime
StartTime is the time the build is actually started.
- array
.status .steps
Steps describes the state of each build step container.
- string
.status .steps[] .container
- string
.status .steps[] .imageID
- array
.status .steps[] .inputs
- boolean
.status .steps[] .inputs[] .buildOutput
Indicate if the artifact is a build output or a by-product
- string
.status .steps[] .inputs[] .name
The artifact’s identifying category name
- array
.status .steps[] .inputs[] .values
A collection of values related to the artifact
- object
.status .steps[] .inputs[] .values[] .digest
- string
.status .steps[] .inputs[] .values[] .uri
- string
.status .steps[] .name
- array
.status .steps[] .outputs
- boolean
.status .steps[] .outputs[] .buildOutput
Indicate if the artifact is a build output or a by-product
- string
.status .steps[] .outputs[] .name
The artifact’s identifying category name
- array
.status .steps[] .outputs[] .values
A collection of values related to the artifact
- object
.status .steps[] .outputs[] .values[] .digest
- string
.status .steps[] .outputs[] .values[] .uri
- object
.status .steps[] .provenance
Provenance contains metadata about resources used in the TaskRun/PipelineRun such as the source from where a remote build definition was fetched. This field aims to carry minimum amoumt of metadata in *Run status so that Tekton Chains can capture them in the provenance.
- object
.status .steps[] .provenance .featureFlags
FeatureFlags identifies the feature flags that were used during the task/pipeline run
- boolean
.status .steps[] .provenance .featureFlags .awaitSidecarReadiness
- string
.status .steps[] .provenance .featureFlags .coschedule
- boolean
.status .steps[] .provenance .featureFlags .disableCredsInit
- string
.status .steps[] .provenance .featureFlags .disableInlineSpec
- string
.status .steps[] .provenance .featureFlags .enableAPIFields
- boolean
.status .steps[] .provenance .featureFlags .enableArtifacts
- boolean
.status .steps[] .provenance .featureFlags .enableCELInWhenExpression
- boolean
.status .steps[] .provenance .featureFlags .enableConciseResolverSyntax
- boolean
.status .steps[] .provenance .featureFlags .enableKeepPodOnCancel
- boolean
.status .steps[] .provenance .featureFlags .enableKubernetesSidecar
- boolean
.status .steps[] .provenance .featureFlags .enableParamEnum
- boolean
.status .steps[] .provenance .featureFlags .enableProvenanceInStatus
- boolean
.status .steps[] .provenance .featureFlags .enableStepActions
EnableStepActions is a no-op flag since StepActions are stable
- string
.status .steps[] .provenance .featureFlags .enforceNonfalsifiability
- integer
.status .steps[] .provenance .featureFlags .maxResultSize
- boolean
.status .steps[] .provenance .featureFlags .requireGitSSHSecretKnownHosts
- string
.status .steps[] .provenance .featureFlags .resultExtractionMethod
- boolean
.status .steps[] .provenance .featureFlags .runningInEnvWithInjectedSidecars
- boolean
.status .steps[] .provenance .featureFlags .sendCloudEventsForRuns
- boolean
.status .steps[] .provenance .featureFlags .setSecurityContext
- boolean
.status .steps[] .provenance .featureFlags .setSecurityContextReadOnlyRootFilesystem
- string
.status .steps[] .provenance .featureFlags .verificationNoMatchPolicy
VerificationNoMatchPolicy is the feature flag for “trusted-resources-verification-no-match-policy” VerificationNoMatchPolicy can be set to “ignore”, “warn” and “fail” values. ignore: skip trusted resources verification when no matching verification policies found warn: skip trusted resources verification when no matching verification policies found and log a warning fail: fail the taskrun or pipelines run if no matching verification policies found
- object
.status .steps[] .provenance .refSource
RefSource identifies the source where a remote task/pipeline came from.
- object
.status .steps[] .provenance .refSource .digest
Digest is a collection of cryptographic digests for the contents of the artifact specified by URI. Example: {“sha1”: “f99d13e554ffcb696dee719fa85b695cb5b0f428”}
- string
.status .steps[] .provenance .refSource .entryPoint
EntryPoint identifies the entry point into the build. This is often a path to a build definition file and/or a target label within that file. Example: “task/git-clone/0.8/git-clone.yaml”
- string
.status .steps[] .provenance .refSource .uri
URI indicates the identity of the source of the build definition. Example: “https://github.com/tektoncd/catalog”
- array
.status .steps[] .results
- string required
.status .steps[] .results[] .name
Name the given name
- string
.status .steps[] .results[] .type
Type is the user-specified type of the result. The possible type is currently “string” and will support “array” in following work.
- undefined required
.status .steps[] .results[] .value
Value the given value of the result
- object
.status .steps[] .running
Details about a running container
- string
.status .steps[] .running .startedAt
Time at which the container was last (re-)started
- object
.status .steps[] .terminated
Details about a terminated container
- string
.status .steps[] .terminated .containerID
Container’s ID in the format ‘
:// ’ - integer required
.status .steps[] .terminated .exitCode
Exit status from the last termination of the container
- string
.status .steps[] .terminated .finishedAt
Time at which the container last terminated
- string
.status .steps[] .terminated .message
Message regarding the last termination of the container
- string
.status .steps[] .terminated .reason
(brief) reason from the last termination of the container
- integer
.status .steps[] .terminated .signal
Signal from the last termination of the container
- string
.status .steps[] .terminated .startedAt
Time at which previous execution of the container started
- string
.status .steps[] .terminationReason
- object
.status .steps[] .waiting
Details about a waiting container
- string
.status .steps[] .waiting .message
Message regarding why the container is not yet running.
- string
.status .steps[] .waiting .reason
(brief) reason the container is not yet running.
- object
.status .taskSpec
TaskSpec contains the Spec from the dereferenced Task definition used to instantiate this TaskRun.
- string
.status .taskSpec .description
Description is a user-facing description of the task that may be used to populate a UI.
- string
.status .taskSpec .displayName
DisplayName is a user-facing name of the task that may be used to populate a UI.
- array
.status .taskSpec .params
Params is a list of input parameters required to run the task. Params must be supplied as inputs in TaskRuns unless they declare a default value.
- undefined
.status .taskSpec .params[] .default
Default is the value a parameter takes if no input value is supplied. If default is set, a Task may be executed without a supplied value for the parameter.
- string
.status .taskSpec .params[] .description
Description is a user-facing description of the parameter that may be used to populate a UI.
- array
.status .taskSpec .params[] .enum
Enum declares a set of allowed param input values for tasks/pipelines that can be validated. If Enum is not set, no input validation is performed for the param.
- string required
.status .taskSpec .params[] .name
Name declares the name by which a parameter is referenced.
- object
.status .taskSpec .params[] .properties
Properties is the JSON Schema properties to support key-value pairs parameter.
- string
.status .taskSpec .params[] .type
Type is the user-specified type of the parameter. The possible types are currently “string”, “array” and “object”, and “string” is the default.
- array
.status .taskSpec .results
Results are values that this Task can output
- string
.status .taskSpec .results[] .description
Description is a human-readable description of the result
- string required
.status .taskSpec .results[] .name
Name the given name
- object
.status .taskSpec .results[] .properties
Properties is the JSON Schema properties to support key-value pairs results.
- string
.status .taskSpec .results[] .type
Type is the user-specified type of the result. The possible type is currently “string” and will support “array” in following work.
- undefined
.status .taskSpec .results[] .value
Value the expression used to retrieve the value of the result from an underlying Step.
- array
.status .taskSpec .sidecars
Sidecars are run alongside the Task’s step containers. They begin before the steps start and end after the steps complete.
- array
.status .taskSpec .sidecars[] .args
Arguments to the entrypoint. The image’s CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the Sidecar’s environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
- array
.status .taskSpec .sidecars[] .command
Entrypoint array. Not executed within a shell. The image’s ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the Sidecar’s environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
- object
.status .taskSpec .sidecars[] .computeResources
ComputeResources required by this Sidecar. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- array
.status .taskSpec .sidecars[] .computeResources .claims
Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container.
This is an alpha field and requires enabling the DynamicResourceAllocation feature gate.
This field is immutable. It can only be set for containers.
- string required
.status .taskSpec .sidecars[] .computeResources .claims[] .name
Name must match the name of one entry in pod.spec.resourceClaims of the Pod where this field is used. It makes that resource available inside a container.
- string
.status .taskSpec .sidecars[] .computeResources .claims[] .request
Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.
- object
.status .taskSpec .sidecars[] .computeResources .limits
Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- object
.status .taskSpec .sidecars[] .computeResources .requests
Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- array
.status .taskSpec .sidecars[] .env
List of environment variables to set in the Sidecar. Cannot be updated.
- string required
.status .taskSpec .sidecars[] .env[] .name
Name of the environment variable. Must be a C_IDENTIFIER.
- string
.status .taskSpec .sidecars[] .env[] .value
Variable references $(VAR_NAME) are expanded using the previously defined environment variables in the container and any service environment variables. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Defaults to “”.
- object
.status .taskSpec .sidecars[] .env[] .valueFrom
Source for the environment variable’s value. Cannot be used if value is not empty.
- object
.status .taskSpec .sidecars[] .env[] .valueFrom .configMapKeyRef
Selects a key of a ConfigMap.
- string required
.status .taskSpec .sidecars[] .env[] .valueFrom .configMapKeyRef .key
The key to select.
- string
.status .taskSpec .sidecars[] .env[] .valueFrom .configMapKeyRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .sidecars[] .env[] .valueFrom .configMapKeyRef .optional
Specify whether the ConfigMap or its key must be defined
- object
.status .taskSpec .sidecars[] .env[] .valueFrom .fieldRef
Selects a field of the pod: supports metadata.name, metadata.namespace,
metadata.labels['<KEY>']
,metadata.annotations['<KEY>']
, spec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs. - string
.status .taskSpec .sidecars[] .env[] .valueFrom .fieldRef .apiVersion
Version of the schema the FieldPath is written in terms of, defaults to “v1”.
- string required
.status .taskSpec .sidecars[] .env[] .valueFrom .fieldRef .fieldPath
Path of the field to select in the specified API version.
- object
.status .taskSpec .sidecars[] .env[] .valueFrom .resourceFieldRef
Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported.
- string
.status .taskSpec .sidecars[] .env[] .valueFrom .resourceFieldRef .containerName
Container name: required for volumes, optional for env vars
- integer | string
.status .taskSpec .sidecars[] .env[] .valueFrom .resourceFieldRef .divisor
Specifies the output format of the exposed resources, defaults to “1”
- string required
.status .taskSpec .sidecars[] .env[] .valueFrom .resourceFieldRef .resource
Required: resource to select
- object
.status .taskSpec .sidecars[] .env[] .valueFrom .secretKeyRef
Selects a key of a secret in the pod’s namespace
- string required
.status .taskSpec .sidecars[] .env[] .valueFrom .secretKeyRef .key
The key of the secret to select from. Must be a valid secret key.
- string
.status .taskSpec .sidecars[] .env[] .valueFrom .secretKeyRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .sidecars[] .env[] .valueFrom .secretKeyRef .optional
Specify whether the Secret or its key must be defined
- array
.status .taskSpec .sidecars[] .envFrom
List of sources to populate environment variables in the Sidecar. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.
- object
.status .taskSpec .sidecars[] .envFrom[] .configMapRef
The ConfigMap to select from
- string
.status .taskSpec .sidecars[] .envFrom[] .configMapRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .sidecars[] .envFrom[] .configMapRef .optional
Specify whether the ConfigMap must be defined
- string
.status .taskSpec .sidecars[] .envFrom[] .prefix
An optional identifier to prepend to each key in the ConfigMap. Must be a C_IDENTIFIER.
- object
.status .taskSpec .sidecars[] .envFrom[] .secretRef
The Secret to select from
- string
.status .taskSpec .sidecars[] .envFrom[] .secretRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .sidecars[] .envFrom[] .secretRef .optional
Specify whether the Secret must be defined
- string
.status .taskSpec .sidecars[] .image
Image reference name. More info: https://kubernetes.io/docs/concepts/containers/images
- string
.status .taskSpec .sidecars[] .imagePullPolicy
Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images
- object
.status .taskSpec .sidecars[] .lifecycle
Actions that the management system should take in response to Sidecar lifecycle events. Cannot be updated.
- object
.status .taskSpec .sidecars[] .lifecycle .postStart
PostStart is called immediately after a container is created. If the handler fails, the container is terminated and restarted according to its restart policy. Other management of the container blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks
- object
.status .taskSpec .sidecars[] .lifecycle .postStart .exec
Exec specifies a command to execute in the container.
- array
.status .taskSpec .sidecars[] .lifecycle .postStart .exec .command
Command is the command line to execute inside the container, the working directory for the command is root (‘/’) in the container’s filesystem. The command is simply exec’d, it is not run inside a shell, so traditional shell instructions (‘|’, etc) won’t work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
- object
.status .taskSpec .sidecars[] .lifecycle .postStart .httpGet
HTTPGet specifies an HTTP GET request to perform.
- string
.status .taskSpec .sidecars[] .lifecycle .postStart .httpGet .host
Host name to connect to, defaults to the pod IP. You probably want to set “Host” in httpHeaders instead.
- array
.status .taskSpec .sidecars[] .lifecycle .postStart .httpGet .httpHeaders
Custom headers to set in the request. HTTP allows repeated headers.
- string required
.status .taskSpec .sidecars[] .lifecycle .postStart .httpGet .httpHeaders[] .name
The header field name. This will be canonicalized upon output, so case-variant names will be understood as the same header.
- string required
.status .taskSpec .sidecars[] .lifecycle .postStart .httpGet .httpHeaders[] .value
The header field value
- string
.status .taskSpec .sidecars[] .lifecycle .postStart .httpGet .path
Path to access on the HTTP server.
- integer | string required
.status .taskSpec .sidecars[] .lifecycle .postStart .httpGet .port
Name or number of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- string
.status .taskSpec .sidecars[] .lifecycle .postStart .httpGet .scheme
Scheme to use for connecting to the host. Defaults to HTTP.
- object
.status .taskSpec .sidecars[] .lifecycle .postStart .sleep
Sleep represents a duration that the container should sleep.
- integer required
.status .taskSpec .sidecars[] .lifecycle .postStart .sleep .seconds
Seconds is the number of seconds to sleep.
- object
.status .taskSpec .sidecars[] .lifecycle .postStart .tcpSocket
Deprecated. TCPSocket is NOT supported as a LifecycleHandler and kept for backward compatibility. There is no validation of this field and lifecycle hooks will fail at runtime when it is specified.
- string
.status .taskSpec .sidecars[] .lifecycle .postStart .tcpSocket .host
Optional: Host name to connect to, defaults to the pod IP.
- integer | string required
.status .taskSpec .sidecars[] .lifecycle .postStart .tcpSocket .port
Number or name of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- object
.status .taskSpec .sidecars[] .lifecycle .preStop
PreStop is called immediately before a container is terminated due to an API request or management event such as liveness/startup probe failure, preemption, resource contention, etc. The handler is not called if the container crashes or exits. The Pod’s termination grace period countdown begins before the PreStop hook is executed. Regardless of the outcome of the handler, the container will eventually terminate within the Pod’s termination grace period (unless delayed by finalizers). Other management of the container blocks until the hook completes or until the termination grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks
- object
.status .taskSpec .sidecars[] .lifecycle .preStop .exec
Exec specifies a command to execute in the container.
- array
.status .taskSpec .sidecars[] .lifecycle .preStop .exec .command
Command is the command line to execute inside the container, the working directory for the command is root (‘/’) in the container’s filesystem. The command is simply exec’d, it is not run inside a shell, so traditional shell instructions (‘|’, etc) won’t work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
- object
.status .taskSpec .sidecars[] .lifecycle .preStop .httpGet
HTTPGet specifies an HTTP GET request to perform.
- string
.status .taskSpec .sidecars[] .lifecycle .preStop .httpGet .host
Host name to connect to, defaults to the pod IP. You probably want to set “Host” in httpHeaders instead.
- array
.status .taskSpec .sidecars[] .lifecycle .preStop .httpGet .httpHeaders
Custom headers to set in the request. HTTP allows repeated headers.
- string required
.status .taskSpec .sidecars[] .lifecycle .preStop .httpGet .httpHeaders[] .name
The header field name. This will be canonicalized upon output, so case-variant names will be understood as the same header.
- string required
.status .taskSpec .sidecars[] .lifecycle .preStop .httpGet .httpHeaders[] .value
The header field value
- string
.status .taskSpec .sidecars[] .lifecycle .preStop .httpGet .path
Path to access on the HTTP server.
- integer | string required
.status .taskSpec .sidecars[] .lifecycle .preStop .httpGet .port
Name or number of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- string
.status .taskSpec .sidecars[] .lifecycle .preStop .httpGet .scheme
Scheme to use for connecting to the host. Defaults to HTTP.
- object
.status .taskSpec .sidecars[] .lifecycle .preStop .sleep
Sleep represents a duration that the container should sleep.
- integer required
.status .taskSpec .sidecars[] .lifecycle .preStop .sleep .seconds
Seconds is the number of seconds to sleep.
- object
.status .taskSpec .sidecars[] .lifecycle .preStop .tcpSocket
Deprecated. TCPSocket is NOT supported as a LifecycleHandler and kept for backward compatibility. There is no validation of this field and lifecycle hooks will fail at runtime when it is specified.
- string
.status .taskSpec .sidecars[] .lifecycle .preStop .tcpSocket .host
Optional: Host name to connect to, defaults to the pod IP.
- integer | string required
.status .taskSpec .sidecars[] .lifecycle .preStop .tcpSocket .port
Number or name of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- object
.status .taskSpec .sidecars[] .livenessProbe
Periodic probe of Sidecar liveness. Container will be restarted if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- object
.status .taskSpec .sidecars[] .livenessProbe .exec
Exec specifies a command to execute in the container.
- array
.status .taskSpec .sidecars[] .livenessProbe .exec .command
Command is the command line to execute inside the container, the working directory for the command is root (‘/’) in the container’s filesystem. The command is simply exec’d, it is not run inside a shell, so traditional shell instructions (‘|’, etc) won’t work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
- integer
.status .taskSpec .sidecars[] .livenessProbe .failureThreshold
Minimum consecutive failures for the probe to be considered failed after having succeeded. Defaults to 3. Minimum value is 1.
- object
.status .taskSpec .sidecars[] .livenessProbe .grpc
GRPC specifies a GRPC HealthCheckRequest.
- integer required
.status .taskSpec .sidecars[] .livenessProbe .grpc .port
Port number of the gRPC service. Number must be in the range 1 to 65535.
- string
.status .taskSpec .sidecars[] .livenessProbe .grpc .service
Service is the name of the service to place in the gRPC HealthCheckRequest (see https://github.com/grpc/grpc/blob/master/doc/health-checking.md).
If this is not specified, the default behavior is defined by gRPC.
- object
.status .taskSpec .sidecars[] .livenessProbe .httpGet
HTTPGet specifies an HTTP GET request to perform.
- string
.status .taskSpec .sidecars[] .livenessProbe .httpGet .host
Host name to connect to, defaults to the pod IP. You probably want to set “Host” in httpHeaders instead.
- array
.status .taskSpec .sidecars[] .livenessProbe .httpGet .httpHeaders
Custom headers to set in the request. HTTP allows repeated headers.
- string required
.status .taskSpec .sidecars[] .livenessProbe .httpGet .httpHeaders[] .name
The header field name. This will be canonicalized upon output, so case-variant names will be understood as the same header.
- string required
.status .taskSpec .sidecars[] .livenessProbe .httpGet .httpHeaders[] .value
The header field value
- string
.status .taskSpec .sidecars[] .livenessProbe .httpGet .path
Path to access on the HTTP server.
- integer | string required
.status .taskSpec .sidecars[] .livenessProbe .httpGet .port
Name or number of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- string
.status .taskSpec .sidecars[] .livenessProbe .httpGet .scheme
Scheme to use for connecting to the host. Defaults to HTTP.
- integer
.status .taskSpec .sidecars[] .livenessProbe .initialDelaySeconds
Number of seconds after the container has started before liveness probes are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- integer
.status .taskSpec .sidecars[] .livenessProbe .periodSeconds
How often (in seconds) to perform the probe. Default to 10 seconds. Minimum value is 1.
- integer
.status .taskSpec .sidecars[] .livenessProbe .successThreshold
Minimum consecutive successes for the probe to be considered successful after having failed. Defaults to 1. Must be 1 for liveness and startup. Minimum value is 1.
- object
.status .taskSpec .sidecars[] .livenessProbe .tcpSocket
TCPSocket specifies a connection to a TCP port.
- string
.status .taskSpec .sidecars[] .livenessProbe .tcpSocket .host
Optional: Host name to connect to, defaults to the pod IP.
- integer | string required
.status .taskSpec .sidecars[] .livenessProbe .tcpSocket .port
Number or name of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- integer
.status .taskSpec .sidecars[] .livenessProbe .terminationGracePeriodSeconds
Optional duration in seconds the pod needs to terminate gracefully upon probe failure. The grace period is the duration in seconds after the processes running in the pod are sent a termination signal and the time when the processes are forcibly halted with a kill signal. Set this value longer than the expected cleanup time for your process. If this value is nil, the pod’s terminationGracePeriodSeconds will be used. Otherwise, this value overrides the value provided by the pod spec. Value must be non-negative integer. The value zero indicates stop immediately via the kill signal (no opportunity to shut down). This is a beta field and requires enabling ProbeTerminationGracePeriod feature gate. Minimum value is 1. spec.terminationGracePeriodSeconds is used if unset.
- integer
.status .taskSpec .sidecars[] .livenessProbe .timeoutSeconds
Number of seconds after which the probe times out. Defaults to 1 second. Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- string required
.status .taskSpec .sidecars[] .name
Name of the Sidecar specified as a DNS_LABEL. Each Sidecar in a Task must have a unique name (DNS_LABEL). Cannot be updated.
- array
.status .taskSpec .sidecars[] .ports
List of ports to expose from the Sidecar. Exposing a port here gives the system additional information about the network connections a container uses, but is primarily informational. Not specifying a port here DOES NOT prevent that port from being exposed. Any port which is listening on the default “0.0.0.0” address inside a container will be accessible from the network. Cannot be updated.
- integer required
.status .taskSpec .sidecars[] .ports[] .containerPort
Number of port to expose on the pod’s IP address. This must be a valid port number, 0 < x < 65536.
- string
.status .taskSpec .sidecars[] .ports[] .hostIP
What host IP to bind the external port to.
- integer
.status .taskSpec .sidecars[] .ports[] .hostPort
Number of port to expose on the host. If specified, this must be a valid port number, 0 < x < 65536. If HostNetwork is specified, this must match ContainerPort. Most containers do not need this.
- string
.status .taskSpec .sidecars[] .ports[] .name
If specified, this must be an IANA_SVC_NAME and unique within the pod. Each named port in a pod must have a unique name. Name for the port that can be referred to by services.
- string
.status .taskSpec .sidecars[] .ports[] .protocol
Protocol for port. Must be UDP, TCP, or SCTP. Defaults to “TCP”.
- object
.status .taskSpec .sidecars[] .readinessProbe
Periodic probe of Sidecar service readiness. Container will be removed from service endpoints if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- object
.status .taskSpec .sidecars[] .readinessProbe .exec
Exec specifies a command to execute in the container.
- array
.status .taskSpec .sidecars[] .readinessProbe .exec .command
Command is the command line to execute inside the container, the working directory for the command is root (‘/’) in the container’s filesystem. The command is simply exec’d, it is not run inside a shell, so traditional shell instructions (‘|’, etc) won’t work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
- integer
.status .taskSpec .sidecars[] .readinessProbe .failureThreshold
Minimum consecutive failures for the probe to be considered failed after having succeeded. Defaults to 3. Minimum value is 1.
- object
.status .taskSpec .sidecars[] .readinessProbe .grpc
GRPC specifies a GRPC HealthCheckRequest.
- integer required
.status .taskSpec .sidecars[] .readinessProbe .grpc .port
Port number of the gRPC service. Number must be in the range 1 to 65535.
- string
.status .taskSpec .sidecars[] .readinessProbe .grpc .service
Service is the name of the service to place in the gRPC HealthCheckRequest (see https://github.com/grpc/grpc/blob/master/doc/health-checking.md).
If this is not specified, the default behavior is defined by gRPC.
- object
.status .taskSpec .sidecars[] .readinessProbe .httpGet
HTTPGet specifies an HTTP GET request to perform.
- string
.status .taskSpec .sidecars[] .readinessProbe .httpGet .host
Host name to connect to, defaults to the pod IP. You probably want to set “Host” in httpHeaders instead.
- array
.status .taskSpec .sidecars[] .readinessProbe .httpGet .httpHeaders
Custom headers to set in the request. HTTP allows repeated headers.
- string required
.status .taskSpec .sidecars[] .readinessProbe .httpGet .httpHeaders[] .name
The header field name. This will be canonicalized upon output, so case-variant names will be understood as the same header.
- string required
.status .taskSpec .sidecars[] .readinessProbe .httpGet .httpHeaders[] .value
The header field value
- string
.status .taskSpec .sidecars[] .readinessProbe .httpGet .path
Path to access on the HTTP server.
- integer | string required
.status .taskSpec .sidecars[] .readinessProbe .httpGet .port
Name or number of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- string
.status .taskSpec .sidecars[] .readinessProbe .httpGet .scheme
Scheme to use for connecting to the host. Defaults to HTTP.
- integer
.status .taskSpec .sidecars[] .readinessProbe .initialDelaySeconds
Number of seconds after the container has started before liveness probes are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- integer
.status .taskSpec .sidecars[] .readinessProbe .periodSeconds
How often (in seconds) to perform the probe. Default to 10 seconds. Minimum value is 1.
- integer
.status .taskSpec .sidecars[] .readinessProbe .successThreshold
Minimum consecutive successes for the probe to be considered successful after having failed. Defaults to 1. Must be 1 for liveness and startup. Minimum value is 1.
- object
.status .taskSpec .sidecars[] .readinessProbe .tcpSocket
TCPSocket specifies a connection to a TCP port.
- string
.status .taskSpec .sidecars[] .readinessProbe .tcpSocket .host
Optional: Host name to connect to, defaults to the pod IP.
- integer | string required
.status .taskSpec .sidecars[] .readinessProbe .tcpSocket .port
Number or name of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- integer
.status .taskSpec .sidecars[] .readinessProbe .terminationGracePeriodSeconds
Optional duration in seconds the pod needs to terminate gracefully upon probe failure. The grace period is the duration in seconds after the processes running in the pod are sent a termination signal and the time when the processes are forcibly halted with a kill signal. Set this value longer than the expected cleanup time for your process. If this value is nil, the pod’s terminationGracePeriodSeconds will be used. Otherwise, this value overrides the value provided by the pod spec. Value must be non-negative integer. The value zero indicates stop immediately via the kill signal (no opportunity to shut down). This is a beta field and requires enabling ProbeTerminationGracePeriod feature gate. Minimum value is 1. spec.terminationGracePeriodSeconds is used if unset.
- integer
.status .taskSpec .sidecars[] .readinessProbe .timeoutSeconds
Number of seconds after which the probe times out. Defaults to 1 second. Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- string
.status .taskSpec .sidecars[] .restartPolicy
RestartPolicy refers to kubernetes RestartPolicy. It can only be set for an initContainer and must have it’s policy set to “Always”. It is currently left optional to help support Kubernetes versions prior to 1.29 when this feature was introduced.
- string
.status .taskSpec .sidecars[] .script
Script is the contents of an executable file to execute.
If Script is not empty, the Step cannot have an Command or Args.
- object
.status .taskSpec .sidecars[] .securityContext
SecurityContext defines the security options the Sidecar should be run with. If set, the fields of SecurityContext override the equivalent fields of PodSecurityContext. More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- boolean
.status .taskSpec .sidecars[] .securityContext .allowPrivilegeEscalation
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is:
- run as Privileged
- has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows.
- object
.status .taskSpec .sidecars[] .securityContext .appArmorProfile
appArmorProfile is the AppArmor options to use by this container. If set, this profile overrides the pod’s appArmorProfile. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .sidecars[] .securityContext .appArmorProfile .localhostProfile
localhostProfile indicates a profile loaded on the node that should be used. The profile must be preconfigured on the node to work. Must match the loaded name of the profile. Must be set if and only if type is “Localhost”.
- string required
.status .taskSpec .sidecars[] .securityContext .appArmorProfile .type
type indicates which kind of AppArmor profile will be applied. Valid options are: Localhost - a profile pre-loaded on the node. RuntimeDefault - the container runtime’s default profile. Unconfined - no AppArmor enforcement.
- object
.status .taskSpec .sidecars[] .securityContext .capabilities
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows.
- array
.status .taskSpec .sidecars[] .securityContext .capabilities .add
Added capabilities
- array
.status .taskSpec .sidecars[] .securityContext .capabilities .drop
Removed capabilities
- boolean
.status .taskSpec .sidecars[] .securityContext .privileged
Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .sidecars[] .securityContext .procMount
procMount denotes the type of proc mount to use for the containers. The default value is Default which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.
- boolean
.status .taskSpec .sidecars[] .securityContext .readOnlyRootFilesystem
Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows.
- integer
.status .taskSpec .sidecars[] .securityContext .runAsGroup
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- boolean
.status .taskSpec .sidecars[] .securityContext .runAsNonRoot
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
- integer
.status .taskSpec .sidecars[] .securityContext .runAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- object
.status .taskSpec .sidecars[] .securityContext .seLinuxOptions
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .sidecars[] .securityContext .seLinuxOptions .level
Level is SELinux level label that applies to the container.
- string
.status .taskSpec .sidecars[] .securityContext .seLinuxOptions .role
Role is a SELinux role label that applies to the container.
- string
.status .taskSpec .sidecars[] .securityContext .seLinuxOptions .type
Type is a SELinux type label that applies to the container.
- string
.status .taskSpec .sidecars[] .securityContext .seLinuxOptions .user
User is a SELinux user label that applies to the container.
- object
.status .taskSpec .sidecars[] .securityContext .seccompProfile
The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .sidecars[] .securityContext .seccompProfile .localhostProfile
localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet’s configured seccomp profile location. Must be set if type is “Localhost”. Must NOT be set for any other type.
- string required
.status .taskSpec .sidecars[] .securityContext .seccompProfile .type
type indicates which kind of seccomp profile will be applied. Valid options are:
Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied.
- object
.status .taskSpec .sidecars[] .securityContext .windowsOptions
The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux.
- string
.status .taskSpec .sidecars[] .securityContext .windowsOptions .gmsaCredentialSpec
GMSACredentialSpec is where the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the GMSA credential spec named by the GMSACredentialSpecName field.
- string
.status .taskSpec .sidecars[] .securityContext .windowsOptions .gmsaCredentialSpecName
GMSACredentialSpecName is the name of the GMSA credential spec to use.
- boolean
.status .taskSpec .sidecars[] .securityContext .windowsOptions .hostProcess
HostProcess determines if a container should be run as a ‘Host Process’ container. All of a Pod’s containers must have the same effective HostProcess value (it is not allowed to have a mix of HostProcess containers and non-HostProcess containers). In addition, if HostProcess is true then HostNetwork must also be set to true.
- string
.status .taskSpec .sidecars[] .securityContext .windowsOptions .runAsUserName
The UserName in Windows to run the entrypoint of the container process. Defaults to the user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
- object
.status .taskSpec .sidecars[] .startupProbe
StartupProbe indicates that the Pod the Sidecar is running in has successfully initialized. If specified, no other probes are executed until this completes successfully. If this probe fails, the Pod will be restarted, just as if the livenessProbe failed. This can be used to provide different probe parameters at the beginning of a Pod’s lifecycle, when it might take a long time to load data or warm a cache, than during steady-state operation. This cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- object
.status .taskSpec .sidecars[] .startupProbe .exec
Exec specifies a command to execute in the container.
- array
.status .taskSpec .sidecars[] .startupProbe .exec .command
Command is the command line to execute inside the container, the working directory for the command is root (‘/’) in the container’s filesystem. The command is simply exec’d, it is not run inside a shell, so traditional shell instructions (‘|’, etc) won’t work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy.
- integer
.status .taskSpec .sidecars[] .startupProbe .failureThreshold
Minimum consecutive failures for the probe to be considered failed after having succeeded. Defaults to 3. Minimum value is 1.
- object
.status .taskSpec .sidecars[] .startupProbe .grpc
GRPC specifies a GRPC HealthCheckRequest.
- integer required
.status .taskSpec .sidecars[] .startupProbe .grpc .port
Port number of the gRPC service. Number must be in the range 1 to 65535.
- string
.status .taskSpec .sidecars[] .startupProbe .grpc .service
Service is the name of the service to place in the gRPC HealthCheckRequest (see https://github.com/grpc/grpc/blob/master/doc/health-checking.md).
If this is not specified, the default behavior is defined by gRPC.
- object
.status .taskSpec .sidecars[] .startupProbe .httpGet
HTTPGet specifies an HTTP GET request to perform.
- string
.status .taskSpec .sidecars[] .startupProbe .httpGet .host
Host name to connect to, defaults to the pod IP. You probably want to set “Host” in httpHeaders instead.
- array
.status .taskSpec .sidecars[] .startupProbe .httpGet .httpHeaders
Custom headers to set in the request. HTTP allows repeated headers.
- string required
.status .taskSpec .sidecars[] .startupProbe .httpGet .httpHeaders[] .name
The header field name. This will be canonicalized upon output, so case-variant names will be understood as the same header.
- string required
.status .taskSpec .sidecars[] .startupProbe .httpGet .httpHeaders[] .value
The header field value
- string
.status .taskSpec .sidecars[] .startupProbe .httpGet .path
Path to access on the HTTP server.
- integer | string required
.status .taskSpec .sidecars[] .startupProbe .httpGet .port
Name or number of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- string
.status .taskSpec .sidecars[] .startupProbe .httpGet .scheme
Scheme to use for connecting to the host. Defaults to HTTP.
- integer
.status .taskSpec .sidecars[] .startupProbe .initialDelaySeconds
Number of seconds after the container has started before liveness probes are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- integer
.status .taskSpec .sidecars[] .startupProbe .periodSeconds
How often (in seconds) to perform the probe. Default to 10 seconds. Minimum value is 1.
- integer
.status .taskSpec .sidecars[] .startupProbe .successThreshold
Minimum consecutive successes for the probe to be considered successful after having failed. Defaults to 1. Must be 1 for liveness and startup. Minimum value is 1.
- object
.status .taskSpec .sidecars[] .startupProbe .tcpSocket
TCPSocket specifies a connection to a TCP port.
- string
.status .taskSpec .sidecars[] .startupProbe .tcpSocket .host
Optional: Host name to connect to, defaults to the pod IP.
- integer | string required
.status .taskSpec .sidecars[] .startupProbe .tcpSocket .port
Number or name of the port to access on the container. Number must be in the range 1 to 65535. Name must be an IANA_SVC_NAME.
- integer
.status .taskSpec .sidecars[] .startupProbe .terminationGracePeriodSeconds
Optional duration in seconds the pod needs to terminate gracefully upon probe failure. The grace period is the duration in seconds after the processes running in the pod are sent a termination signal and the time when the processes are forcibly halted with a kill signal. Set this value longer than the expected cleanup time for your process. If this value is nil, the pod’s terminationGracePeriodSeconds will be used. Otherwise, this value overrides the value provided by the pod spec. Value must be non-negative integer. The value zero indicates stop immediately via the kill signal (no opportunity to shut down). This is a beta field and requires enabling ProbeTerminationGracePeriod feature gate. Minimum value is 1. spec.terminationGracePeriodSeconds is used if unset.
- integer
.status .taskSpec .sidecars[] .startupProbe .timeoutSeconds
Number of seconds after which the probe times out. Defaults to 1 second. Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
- boolean
.status .taskSpec .sidecars[] .stdin
Whether this Sidecar should allocate a buffer for stdin in the container runtime. If this is not set, reads from stdin in the Sidecar will always result in EOF. Default is false.
- boolean
.status .taskSpec .sidecars[] .stdinOnce
Whether the container runtime should close the stdin channel after it has been opened by a single attach. When stdin is true the stdin stream will remain open across multiple attach sessions. If stdinOnce is set to true, stdin is opened on Sidecar start, is empty until the first client attaches to stdin, and then remains open and accepts data until the client disconnects, at which time stdin is closed and remains closed until the Sidecar is restarted. If this flag is false, a container processes that reads from stdin will never receive an EOF. Default is false
- string
.status .taskSpec .sidecars[] .terminationMessagePath
Optional: Path at which the file to which the Sidecar’s termination message will be written is mounted into the Sidecar’s filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated.
- string
.status .taskSpec .sidecars[] .terminationMessagePolicy
Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the Sidecar status message on both success and failure. FallbackToLogsOnError will use the last chunk of Sidecar log output if the termination message file is empty and the Sidecar exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated.
- boolean
.status .taskSpec .sidecars[] .tty
Whether this Sidecar should allocate a TTY for itself, also requires ‘stdin’ to be true. Default is false.
- array
.status .taskSpec .sidecars[] .volumeDevices
volumeDevices is the list of block devices to be used by the Sidecar.
- string required
.status .taskSpec .sidecars[] .volumeDevices[] .devicePath
devicePath is the path inside of the container that the device will be mapped to.
- string required
.status .taskSpec .sidecars[] .volumeDevices[] .name
name must match the name of a persistentVolumeClaim in the pod
- array
.status .taskSpec .sidecars[] .volumeMounts
Volumes to mount into the Sidecar’s filesystem. Cannot be updated.
- string required
.status .taskSpec .sidecars[] .volumeMounts[] .mountPath
Path within the container at which the volume should be mounted. Must not contain ‘:’.
- string
.status .taskSpec .sidecars[] .volumeMounts[] .mountPropagation
mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationNone is used. This field is beta in 1.10. When RecursiveReadOnly is set to IfPossible or to Enabled, MountPropagation must be None or unspecified (which defaults to None).
- string required
.status .taskSpec .sidecars[] .volumeMounts[] .name
This must match the Name of a Volume.
- boolean
.status .taskSpec .sidecars[] .volumeMounts[] .readOnly
Mounted read-only if true, read-write otherwise (false or unspecified). Defaults to false.
- string
.status .taskSpec .sidecars[] .volumeMounts[] .recursiveReadOnly
RecursiveReadOnly specifies whether read-only mounts should be handled recursively.
If ReadOnly is false, this field has no meaning and must be unspecified.
If ReadOnly is true, and this field is set to Disabled, the mount is not made recursively read-only. If this field is set to IfPossible, the mount is made recursively read-only, if it is supported by the container runtime. If this field is set to Enabled, the mount is made recursively read-only if it is supported by the container runtime, otherwise the pod will not be started and an error will be generated to indicate the reason.
If this field is set to IfPossible or Enabled, MountPropagation must be set to None (or be unspecified, which defaults to None).
If this field is not specified, it is treated as an equivalent of Disabled.
- string
.status .taskSpec .sidecars[] .volumeMounts[] .subPath
Path within the volume from which the container’s volume should be mounted. Defaults to “” (volume’s root).
- string
.status .taskSpec .sidecars[] .volumeMounts[] .subPathExpr
Expanded path within the volume from which the container’s volume should be mounted. Behaves similarly to SubPath but environment variable references $(VAR_NAME) are expanded using the container’s environment. Defaults to “” (volume’s root). SubPathExpr and SubPath are mutually exclusive.
- string
.status .taskSpec .sidecars[] .workingDir
Sidecar’s working directory. If not specified, the container runtime’s default will be used, which might be configured in the container image. Cannot be updated.
- array
.status .taskSpec .sidecars[] .workspaces
This is an alpha field. You must set the “enable-api-fields” feature flag to “alpha” for this field to be supported.
Workspaces is a list of workspaces from the Task that this Sidecar wants exclusive access to. Adding a workspace to this list means that any other Step or Sidecar that does not also request this Workspace will not have access to it.
- string required
.status .taskSpec .sidecars[] .workspaces[] .mountPath
MountPath is the path that the workspace should be mounted to inside the Step or Sidecar, overriding any MountPath specified in the Task’s WorkspaceDeclaration.
- string required
.status .taskSpec .sidecars[] .workspaces[] .name
Name is the name of the workspace this Step or Sidecar wants access to.
- object
.status .taskSpec .stepTemplate
StepTemplate can be used as the basis for all step containers within the Task, so that the steps inherit settings on the base container.
- array
.status .taskSpec .stepTemplate .args
Arguments to the entrypoint. The image’s CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the Step’s environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
- array
.status .taskSpec .stepTemplate .command
Entrypoint array. Not executed within a shell. The image’s ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the Step’s environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
- object
.status .taskSpec .stepTemplate .computeResources
ComputeResources required by this Step. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- array
.status .taskSpec .stepTemplate .computeResources .claims
Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container.
This is an alpha field and requires enabling the DynamicResourceAllocation feature gate.
This field is immutable. It can only be set for containers.
- string required
.status .taskSpec .stepTemplate .computeResources .claims[] .name
Name must match the name of one entry in pod.spec.resourceClaims of the Pod where this field is used. It makes that resource available inside a container.
- string
.status .taskSpec .stepTemplate .computeResources .claims[] .request
Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.
- object
.status .taskSpec .stepTemplate .computeResources .limits
Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- object
.status .taskSpec .stepTemplate .computeResources .requests
Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- array
.status .taskSpec .stepTemplate .env
List of environment variables to set in the Step. Cannot be updated.
- string required
.status .taskSpec .stepTemplate .env[] .name
Name of the environment variable. Must be a C_IDENTIFIER.
- string
.status .taskSpec .stepTemplate .env[] .value
Variable references $(VAR_NAME) are expanded using the previously defined environment variables in the container and any service environment variables. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Defaults to “”.
- object
.status .taskSpec .stepTemplate .env[] .valueFrom
Source for the environment variable’s value. Cannot be used if value is not empty.
- object
.status .taskSpec .stepTemplate .env[] .valueFrom .configMapKeyRef
Selects a key of a ConfigMap.
- string required
.status .taskSpec .stepTemplate .env[] .valueFrom .configMapKeyRef .key
The key to select.
- string
.status .taskSpec .stepTemplate .env[] .valueFrom .configMapKeyRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .stepTemplate .env[] .valueFrom .configMapKeyRef .optional
Specify whether the ConfigMap or its key must be defined
- object
.status .taskSpec .stepTemplate .env[] .valueFrom .fieldRef
Selects a field of the pod: supports metadata.name, metadata.namespace,
metadata.labels['<KEY>']
,metadata.annotations['<KEY>']
, spec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs. - string
.status .taskSpec .stepTemplate .env[] .valueFrom .fieldRef .apiVersion
Version of the schema the FieldPath is written in terms of, defaults to “v1”.
- string required
.status .taskSpec .stepTemplate .env[] .valueFrom .fieldRef .fieldPath
Path of the field to select in the specified API version.
- object
.status .taskSpec .stepTemplate .env[] .valueFrom .resourceFieldRef
Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported.
- string
.status .taskSpec .stepTemplate .env[] .valueFrom .resourceFieldRef .containerName
Container name: required for volumes, optional for env vars
- integer | string
.status .taskSpec .stepTemplate .env[] .valueFrom .resourceFieldRef .divisor
Specifies the output format of the exposed resources, defaults to “1”
- string required
.status .taskSpec .stepTemplate .env[] .valueFrom .resourceFieldRef .resource
Required: resource to select
- object
.status .taskSpec .stepTemplate .env[] .valueFrom .secretKeyRef
Selects a key of a secret in the pod’s namespace
- string required
.status .taskSpec .stepTemplate .env[] .valueFrom .secretKeyRef .key
The key of the secret to select from. Must be a valid secret key.
- string
.status .taskSpec .stepTemplate .env[] .valueFrom .secretKeyRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .stepTemplate .env[] .valueFrom .secretKeyRef .optional
Specify whether the Secret or its key must be defined
- array
.status .taskSpec .stepTemplate .envFrom
List of sources to populate environment variables in the Step. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the Step is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.
- object
.status .taskSpec .stepTemplate .envFrom[] .configMapRef
The ConfigMap to select from
- string
.status .taskSpec .stepTemplate .envFrom[] .configMapRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .stepTemplate .envFrom[] .configMapRef .optional
Specify whether the ConfigMap must be defined
- string
.status .taskSpec .stepTemplate .envFrom[] .prefix
An optional identifier to prepend to each key in the ConfigMap. Must be a C_IDENTIFIER.
- object
.status .taskSpec .stepTemplate .envFrom[] .secretRef
The Secret to select from
- string
.status .taskSpec .stepTemplate .envFrom[] .secretRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .stepTemplate .envFrom[] .secretRef .optional
Specify whether the Secret must be defined
- string
.status .taskSpec .stepTemplate .image
Image reference name. More info: https://kubernetes.io/docs/concepts/containers/images
- string
.status .taskSpec .stepTemplate .imagePullPolicy
Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images
- object
.status .taskSpec .stepTemplate .securityContext
SecurityContext defines the security options the Step should be run with. If set, the fields of SecurityContext override the equivalent fields of PodSecurityContext. More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- boolean
.status .taskSpec .stepTemplate .securityContext .allowPrivilegeEscalation
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is:
- run as Privileged
- has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows.
- object
.status .taskSpec .stepTemplate .securityContext .appArmorProfile
appArmorProfile is the AppArmor options to use by this container. If set, this profile overrides the pod’s appArmorProfile. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .stepTemplate .securityContext .appArmorProfile .localhostProfile
localhostProfile indicates a profile loaded on the node that should be used. The profile must be preconfigured on the node to work. Must match the loaded name of the profile. Must be set if and only if type is “Localhost”.
- string required
.status .taskSpec .stepTemplate .securityContext .appArmorProfile .type
type indicates which kind of AppArmor profile will be applied. Valid options are: Localhost - a profile pre-loaded on the node. RuntimeDefault - the container runtime’s default profile. Unconfined - no AppArmor enforcement.
- object
.status .taskSpec .stepTemplate .securityContext .capabilities
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows.
- array
.status .taskSpec .stepTemplate .securityContext .capabilities .add
Added capabilities
- array
.status .taskSpec .stepTemplate .securityContext .capabilities .drop
Removed capabilities
- boolean
.status .taskSpec .stepTemplate .securityContext .privileged
Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .stepTemplate .securityContext .procMount
procMount denotes the type of proc mount to use for the containers. The default value is Default which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.
- boolean
.status .taskSpec .stepTemplate .securityContext .readOnlyRootFilesystem
Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows.
- integer
.status .taskSpec .stepTemplate .securityContext .runAsGroup
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- boolean
.status .taskSpec .stepTemplate .securityContext .runAsNonRoot
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
- integer
.status .taskSpec .stepTemplate .securityContext .runAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- object
.status .taskSpec .stepTemplate .securityContext .seLinuxOptions
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .stepTemplate .securityContext .seLinuxOptions .level
Level is SELinux level label that applies to the container.
- string
.status .taskSpec .stepTemplate .securityContext .seLinuxOptions .role
Role is a SELinux role label that applies to the container.
- string
.status .taskSpec .stepTemplate .securityContext .seLinuxOptions .type
Type is a SELinux type label that applies to the container.
- string
.status .taskSpec .stepTemplate .securityContext .seLinuxOptions .user
User is a SELinux user label that applies to the container.
- object
.status .taskSpec .stepTemplate .securityContext .seccompProfile
The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .stepTemplate .securityContext .seccompProfile .localhostProfile
localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet’s configured seccomp profile location. Must be set if type is “Localhost”. Must NOT be set for any other type.
- string required
.status .taskSpec .stepTemplate .securityContext .seccompProfile .type
type indicates which kind of seccomp profile will be applied. Valid options are:
Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied.
- object
.status .taskSpec .stepTemplate .securityContext .windowsOptions
The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux.
- string
.status .taskSpec .stepTemplate .securityContext .windowsOptions .gmsaCredentialSpec
GMSACredentialSpec is where the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the GMSA credential spec named by the GMSACredentialSpecName field.
- string
.status .taskSpec .stepTemplate .securityContext .windowsOptions .gmsaCredentialSpecName
GMSACredentialSpecName is the name of the GMSA credential spec to use.
- boolean
.status .taskSpec .stepTemplate .securityContext .windowsOptions .hostProcess
HostProcess determines if a container should be run as a ‘Host Process’ container. All of a Pod’s containers must have the same effective HostProcess value (it is not allowed to have a mix of HostProcess containers and non-HostProcess containers). In addition, if HostProcess is true then HostNetwork must also be set to true.
- string
.status .taskSpec .stepTemplate .securityContext .windowsOptions .runAsUserName
The UserName in Windows to run the entrypoint of the container process. Defaults to the user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
- array
.status .taskSpec .stepTemplate .volumeDevices
volumeDevices is the list of block devices to be used by the Step.
- string required
.status .taskSpec .stepTemplate .volumeDevices[] .devicePath
devicePath is the path inside of the container that the device will be mapped to.
- string required
.status .taskSpec .stepTemplate .volumeDevices[] .name
name must match the name of a persistentVolumeClaim in the pod
- array
.status .taskSpec .stepTemplate .volumeMounts
Volumes to mount into the Step’s filesystem. Cannot be updated.
- string required
.status .taskSpec .stepTemplate .volumeMounts[] .mountPath
Path within the container at which the volume should be mounted. Must not contain ‘:’.
- string
.status .taskSpec .stepTemplate .volumeMounts[] .mountPropagation
mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationNone is used. This field is beta in 1.10. When RecursiveReadOnly is set to IfPossible or to Enabled, MountPropagation must be None or unspecified (which defaults to None).
- string required
.status .taskSpec .stepTemplate .volumeMounts[] .name
This must match the Name of a Volume.
- boolean
.status .taskSpec .stepTemplate .volumeMounts[] .readOnly
Mounted read-only if true, read-write otherwise (false or unspecified). Defaults to false.
- string
.status .taskSpec .stepTemplate .volumeMounts[] .recursiveReadOnly
RecursiveReadOnly specifies whether read-only mounts should be handled recursively.
If ReadOnly is false, this field has no meaning and must be unspecified.
If ReadOnly is true, and this field is set to Disabled, the mount is not made recursively read-only. If this field is set to IfPossible, the mount is made recursively read-only, if it is supported by the container runtime. If this field is set to Enabled, the mount is made recursively read-only if it is supported by the container runtime, otherwise the pod will not be started and an error will be generated to indicate the reason.
If this field is set to IfPossible or Enabled, MountPropagation must be set to None (or be unspecified, which defaults to None).
If this field is not specified, it is treated as an equivalent of Disabled.
- string
.status .taskSpec .stepTemplate .volumeMounts[] .subPath
Path within the volume from which the container’s volume should be mounted. Defaults to “” (volume’s root).
- string
.status .taskSpec .stepTemplate .volumeMounts[] .subPathExpr
Expanded path within the volume from which the container’s volume should be mounted. Behaves similarly to SubPath but environment variable references $(VAR_NAME) are expanded using the container’s environment. Defaults to “” (volume’s root). SubPathExpr and SubPath are mutually exclusive.
- string
.status .taskSpec .stepTemplate .workingDir
Step’s working directory. If not specified, the container runtime’s default will be used, which might be configured in the container image. Cannot be updated.
- array
.status .taskSpec .steps
Steps are the steps of the build; each step is run sequentially with the source mounted into /workspace.
- array
.status .taskSpec .steps[] .args
Arguments to the entrypoint. The image’s CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container’s environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
- array
.status .taskSpec .steps[] .command
Entrypoint array. Not executed within a shell. The image’s ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container’s environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
- object
.status .taskSpec .steps[] .computeResources
ComputeResources required by this Step. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- array
.status .taskSpec .steps[] .computeResources .claims
Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container.
This is an alpha field and requires enabling the DynamicResourceAllocation feature gate.
This field is immutable. It can only be set for containers.
- string required
.status .taskSpec .steps[] .computeResources .claims[] .name
Name must match the name of one entry in pod.spec.resourceClaims of the Pod where this field is used. It makes that resource available inside a container.
- string
.status .taskSpec .steps[] .computeResources .claims[] .request
Request is the name chosen for a request in the referenced claim. If empty, everything from the claim is made available, otherwise only the result of this request.
- object
.status .taskSpec .steps[] .computeResources .limits
Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- object
.status .taskSpec .steps[] .computeResources .requests
Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
- array
.status .taskSpec .steps[] .env
List of environment variables to set in the Step. Cannot be updated.
- string required
.status .taskSpec .steps[] .env[] .name
Name of the environment variable. Must be a C_IDENTIFIER.
- string
.status .taskSpec .steps[] .env[] .value
Variable references $(VAR_NAME) are expanded using the previously defined environment variables in the container and any service environment variables. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. “$$(VAR_NAME)” will produce the string literal “$(VAR_NAME)”. Escaped references will never be expanded, regardless of whether the variable exists or not. Defaults to “”.
- object
.status .taskSpec .steps[] .env[] .valueFrom
Source for the environment variable’s value. Cannot be used if value is not empty.
- object
.status .taskSpec .steps[] .env[] .valueFrom .configMapKeyRef
Selects a key of a ConfigMap.
- string required
.status .taskSpec .steps[] .env[] .valueFrom .configMapKeyRef .key
The key to select.
- string
.status .taskSpec .steps[] .env[] .valueFrom .configMapKeyRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .steps[] .env[] .valueFrom .configMapKeyRef .optional
Specify whether the ConfigMap or its key must be defined
- object
.status .taskSpec .steps[] .env[] .valueFrom .fieldRef
Selects a field of the pod: supports metadata.name, metadata.namespace,
metadata.labels['<KEY>']
,metadata.annotations['<KEY>']
, spec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs. - string
.status .taskSpec .steps[] .env[] .valueFrom .fieldRef .apiVersion
Version of the schema the FieldPath is written in terms of, defaults to “v1”.
- string required
.status .taskSpec .steps[] .env[] .valueFrom .fieldRef .fieldPath
Path of the field to select in the specified API version.
- object
.status .taskSpec .steps[] .env[] .valueFrom .resourceFieldRef
Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported.
- string
.status .taskSpec .steps[] .env[] .valueFrom .resourceFieldRef .containerName
Container name: required for volumes, optional for env vars
- integer | string
.status .taskSpec .steps[] .env[] .valueFrom .resourceFieldRef .divisor
Specifies the output format of the exposed resources, defaults to “1”
- string required
.status .taskSpec .steps[] .env[] .valueFrom .resourceFieldRef .resource
Required: resource to select
- object
.status .taskSpec .steps[] .env[] .valueFrom .secretKeyRef
Selects a key of a secret in the pod’s namespace
- string required
.status .taskSpec .steps[] .env[] .valueFrom .secretKeyRef .key
The key of the secret to select from. Must be a valid secret key.
- string
.status .taskSpec .steps[] .env[] .valueFrom .secretKeyRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .steps[] .env[] .valueFrom .secretKeyRef .optional
Specify whether the Secret or its key must be defined
- array
.status .taskSpec .steps[] .envFrom
List of sources to populate environment variables in the Step. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the Step is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.
- object
.status .taskSpec .steps[] .envFrom[] .configMapRef
The ConfigMap to select from
- string
.status .taskSpec .steps[] .envFrom[] .configMapRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .steps[] .envFrom[] .configMapRef .optional
Specify whether the ConfigMap must be defined
- string
.status .taskSpec .steps[] .envFrom[] .prefix
An optional identifier to prepend to each key in the ConfigMap. Must be a C_IDENTIFIER.
- object
.status .taskSpec .steps[] .envFrom[] .secretRef
The Secret to select from
- string
.status .taskSpec .steps[] .envFrom[] .secretRef .name
Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
- boolean
.status .taskSpec .steps[] .envFrom[] .secretRef .optional
Specify whether the Secret must be defined
- string
.status .taskSpec .steps[] .image
Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images
- string
.status .taskSpec .steps[] .imagePullPolicy
Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images
- string required
.status .taskSpec .steps[] .name
Name of the Step specified as a DNS_LABEL. Each Step in a Task must have a unique name.
- string
.status .taskSpec .steps[] .onError
OnError defines the exiting behavior of a container on error can be set to [ continue | stopAndFail ]
- array
.status .taskSpec .steps[] .params
Params declares parameters passed to this step action.
- string required
.status .taskSpec .steps[] .params[] .name
- undefined required
.status .taskSpec .steps[] .params[] .value
- object
.status .taskSpec .steps[] .ref
Contains the reference to an existing StepAction.
- string
.status .taskSpec .steps[] .ref .name
Name of the referenced step
- array
.status .taskSpec .steps[] .ref .params
Params contains the parameters used to identify the referenced Tekton resource. Example entries might include “repo” or “path” but the set of params ultimately depends on the chosen resolver.
- string required
.status .taskSpec .steps[] .ref .params[] .name
- undefined required
.status .taskSpec .steps[] .ref .params[] .value
- string
.status .taskSpec .steps[] .ref .resolver
Resolver is the name of the resolver that should perform resolution of the referenced Tekton resource, such as “git”.
- array
.status .taskSpec .steps[] .results
Results declares StepResults produced by the Step.
It can be used in an inlined Step when used to store Results to $(step.results.resultName.path). It cannot be used when referencing StepActions using [v1.Step.Ref]. The Results declared by the StepActions will be stored here instead.
- string
.status .taskSpec .steps[] .results[] .description
Description is a human-readable description of the result
- string required
.status .taskSpec .steps[] .results[] .name
Name the given name
- object
.status .taskSpec .steps[] .results[] .properties
Properties is the JSON Schema properties to support key-value pairs results.
- string
.status .taskSpec .steps[] .results[] .type
The possible types are ‘string’, ‘array’, and ‘object’, with ‘string’ as the default.
- string
.status .taskSpec .steps[] .script
Script is the contents of an executable file to execute.
If Script is not empty, the Step cannot have an Command and the Args will be passed to the Script.
- object
.status .taskSpec .steps[] .securityContext
SecurityContext defines the security options the Step should be run with. If set, the fields of SecurityContext override the equivalent fields of PodSecurityContext. More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- boolean
.status .taskSpec .steps[] .securityContext .allowPrivilegeEscalation
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is:
- run as Privileged
- has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows.
- object
.status .taskSpec .steps[] .securityContext .appArmorProfile
appArmorProfile is the AppArmor options to use by this container. If set, this profile overrides the pod’s appArmorProfile. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .steps[] .securityContext .appArmorProfile .localhostProfile
localhostProfile indicates a profile loaded on the node that should be used. The profile must be preconfigured on the node to work. Must match the loaded name of the profile. Must be set if and only if type is “Localhost”.
- string required
.status .taskSpec .steps[] .securityContext .appArmorProfile .type
type indicates which kind of AppArmor profile will be applied. Valid options are: Localhost - a profile pre-loaded on the node. RuntimeDefault - the container runtime’s default profile. Unconfined - no AppArmor enforcement.
- object
.status .taskSpec .steps[] .securityContext .capabilities
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows.
- array
.status .taskSpec .steps[] .securityContext .capabilities .add
Added capabilities
- array
.status .taskSpec .steps[] .securityContext .capabilities .drop
Removed capabilities
- boolean
.status .taskSpec .steps[] .securityContext .privileged
Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .steps[] .securityContext .procMount
procMount denotes the type of proc mount to use for the containers. The default value is Default which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows.
- boolean
.status .taskSpec .steps[] .securityContext .readOnlyRootFilesystem
Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows.
- integer
.status .taskSpec .steps[] .securityContext .runAsGroup
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- boolean
.status .taskSpec .steps[] .securityContext .runAsNonRoot
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
- integer
.status .taskSpec .steps[] .securityContext .runAsUser
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- object
.status .taskSpec .steps[] .securityContext .seLinuxOptions
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .steps[] .securityContext .seLinuxOptions .level
Level is SELinux level label that applies to the container.
- string
.status .taskSpec .steps[] .securityContext .seLinuxOptions .role
Role is a SELinux role label that applies to the container.
- string
.status .taskSpec .steps[] .securityContext .seLinuxOptions .type
Type is a SELinux type label that applies to the container.
- string
.status .taskSpec .steps[] .securityContext .seLinuxOptions .user
User is a SELinux user label that applies to the container.
- object
.status .taskSpec .steps[] .securityContext .seccompProfile
The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows.
- string
.status .taskSpec .steps[] .securityContext .seccompProfile .localhostProfile
localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet’s configured seccomp profile location. Must be set if type is “Localhost”. Must NOT be set for any other type.
- string required
.status .taskSpec .steps[] .securityContext .seccompProfile .type
type indicates which kind of seccomp profile will be applied. Valid options are:
Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied.
- object
.status .taskSpec .steps[] .securityContext .windowsOptions
The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux.
- string
.status .taskSpec .steps[] .securityContext .windowsOptions .gmsaCredentialSpec
GMSACredentialSpec is where the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the GMSA credential spec named by the GMSACredentialSpecName field.
- string
.status .taskSpec .steps[] .securityContext .windowsOptions .gmsaCredentialSpecName
GMSACredentialSpecName is the name of the GMSA credential spec to use.
- boolean
.status .taskSpec .steps[] .securityContext .windowsOptions .hostProcess
HostProcess determines if a container should be run as a ‘Host Process’ container. All of a Pod’s containers must have the same effective HostProcess value (it is not allowed to have a mix of HostProcess containers and non-HostProcess containers). In addition, if HostProcess is true then HostNetwork must also be set to true.
- string
.status .taskSpec .steps[] .securityContext .windowsOptions .runAsUserName
The UserName in Windows to run the entrypoint of the container process. Defaults to the user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
- object
.status .taskSpec .steps[] .stderrConfig
Stores configuration for the stderr stream of the step.
- string
.status .taskSpec .steps[] .stderrConfig .path
Path to duplicate stdout stream to on container’s local filesystem.
- object
.status .taskSpec .steps[] .stdoutConfig
Stores configuration for the stdout stream of the step.
- string
.status .taskSpec .steps[] .stdoutConfig .path
Path to duplicate stdout stream to on container’s local filesystem.
- string
.status .taskSpec .steps[] .timeout
Timeout is the time after which the step times out. Defaults to never. Refer to Go’s ParseDuration documentation for expected format: https://golang.org/pkg/time/#ParseDuration
- array
.status .taskSpec .steps[] .volumeDevices
volumeDevices is the list of block devices to be used by the Step.
- string required
.status .taskSpec .steps[] .volumeDevices[] .devicePath
devicePath is the path inside of the container that the device will be mapped to.
- string required
.status .taskSpec .steps[] .volumeDevices[] .name
name must match the name of a persistentVolumeClaim in the pod
- array
.status .taskSpec .steps[] .volumeMounts
Volumes to mount into the Step’s filesystem. Cannot be updated.
- string required
.status .taskSpec .steps[] .volumeMounts[] .mountPath
Path within the container at which the volume should be mounted. Must not contain ‘:’.
- string
.status .taskSpec .steps[] .volumeMounts[] .mountPropagation
mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationNone is used. This field is beta in 1.10. When RecursiveReadOnly is set to IfPossible or to Enabled, MountPropagation must be None or unspecified (which defaults to None).
- string required
.status .taskSpec .steps[] .volumeMounts[] .name
This must match the Name of a Volume.
- boolean
.status .taskSpec .steps[] .volumeMounts[] .readOnly
Mounted read-only if true, read-write otherwise (false or unspecified). Defaults to false.
- string
.status .taskSpec .steps[] .volumeMounts[] .recursiveReadOnly
RecursiveReadOnly specifies whether read-only mounts should be handled recursively.
If ReadOnly is false, this field has no meaning and must be unspecified.
If ReadOnly is true, and this field is set to Disabled, the mount is not made recursively read-only. If this field is set to IfPossible, the mount is made recursively read-only, if it is supported by the container runtime. If this field is set to Enabled, the mount is made recursively read-only if it is supported by the container runtime, otherwise the pod will not be started and an error will be generated to indicate the reason.
If this field is set to IfPossible or Enabled, MountPropagation must be set to None (or be unspecified, which defaults to None).
If this field is not specified, it is treated as an equivalent of Disabled.
- string
.status .taskSpec .steps[] .volumeMounts[] .subPath
Path within the volume from which the container’s volume should be mounted. Defaults to “” (volume’s root).
- string
.status .taskSpec .steps[] .volumeMounts[] .subPathExpr
Expanded path within the volume from which the container’s volume should be mounted. Behaves similarly to SubPath but environment variable references $(VAR_NAME) are expanded using the container’s environment. Defaults to “” (volume’s root). SubPathExpr and SubPath are mutually exclusive.
- array
.status .taskSpec .steps[] .when
When is a list of when expressions that need to be true for the task to run
- string
.status .taskSpec .steps[] .when[] .cel
CEL is a string of Common Language Expression, which can be used to conditionally execute the task based on the result of the expression evaluation More info about CEL syntax: https://github.com/google/cel-spec/blob/master/doc/langdef.md
- string
.status .taskSpec .steps[] .when[] .input
Input is the string for guard checking which can be a static input or an output from a parent Task
- string
.status .taskSpec .steps[] .when[] .operator
Operator that represents an Input’s relationship to the values
- array
.status .taskSpec .steps[] .when[] .values
Values is an array of strings, which is compared against the input, for guard checking It must be non-empty
- string
.status .taskSpec .steps[] .workingDir
Step’s working directory. If not specified, the container runtime’s default will be used, which might be configured in the container image. Cannot be updated.
- array
.status .taskSpec .steps[] .workspaces
This is an alpha field. You must set the “enable-api-fields” feature flag to “alpha” for this field to be supported.
Workspaces is a list of workspaces from the Task that this Step wants exclusive access to. Adding a workspace to this list means that any other Step or Sidecar that does not also request this Workspace will not have access to it.
- string required
.status .taskSpec .steps[] .workspaces[] .mountPath
MountPath is the path that the workspace should be mounted to inside the Step or Sidecar, overriding any MountPath specified in the Task’s WorkspaceDeclaration.
- string required
.status .taskSpec .steps[] .workspaces[] .name
Name is the name of the workspace this Step or Sidecar wants access to.
- undefined
.status .taskSpec .volumes
Volumes is a collection of volumes that are available to mount into the steps of the build. See Pod.spec.volumes (API version: v1)
- array
.status .taskSpec .workspaces
Workspaces are the volumes that this Task requires.
- string
.status .taskSpec .workspaces[] .description
Description is an optional human readable description of this volume.
- string
.status .taskSpec .workspaces[] .mountPath
MountPath overrides the directory that the volume will be made available at.
- string required
.status .taskSpec .workspaces[] .name
Name is the name by which you can bind the volume at runtime.
- boolean
.status .taskSpec .workspaces[] .optional
Optional marks a Workspace as not being required in TaskRuns. By default this field is false and so declared workspaces are required.
- boolean
.status .taskSpec .workspaces[] .readOnly
ReadOnly dictates whether a mounted volume is writable. By default this field is false and so mounted volumes are writable.