k8s_openapi/v1_35/api/networking/v1/
network_policy_ingress_rule.rs

1// Generated from definition io.k8s.api.networking.v1.NetworkPolicyIngressRule
2
3/// NetworkPolicyIngressRule describes a particular set of traffic that is allowed to the pods matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and from.
4#[derive(Clone, Debug, Default, PartialEq)]
5pub struct NetworkPolicyIngressRule {
6    /// from is a list of sources which should be able to access the pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all sources (traffic not restricted by source). If this field is present and contains at least one item, this rule allows traffic only if the traffic matches at least one item in the from list.
7    pub from: Option<std::vec::Vec<crate::api::networking::v1::NetworkPolicyPeer>>,
8
9    /// ports is a list of ports which should be made accessible on the pods selected for this rule. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list.
10    pub ports: Option<std::vec::Vec<crate::api::networking::v1::NetworkPolicyPort>>,
11}
12
13impl crate::DeepMerge for NetworkPolicyIngressRule {
14    fn merge_from(&mut self, other: Self) {
15        crate::merge_strategies::list::atomic(&mut self.from, other.from);
16        crate::merge_strategies::list::atomic(&mut self.ports, other.ports);
17    }
18}
19
20impl<'de> crate::serde::Deserialize<'de> for NetworkPolicyIngressRule {
21    fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
22        #[allow(non_camel_case_types)]
23        enum Field {
24            Key_from,
25            Key_ports,
26            Other,
27        }
28
29        impl<'de> crate::serde::Deserialize<'de> for Field {
30            fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
31                struct Visitor;
32
33                impl crate::serde::de::Visitor<'_> for Visitor {
34                    type Value = Field;
35
36                    fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
37                        f.write_str("field identifier")
38                    }
39
40                    fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
41                        Ok(match v {
42                            "from" => Field::Key_from,
43                            "ports" => Field::Key_ports,
44                            _ => Field::Other,
45                        })
46                    }
47                }
48
49                deserializer.deserialize_identifier(Visitor)
50            }
51        }
52
53        struct Visitor;
54
55        impl<'de> crate::serde::de::Visitor<'de> for Visitor {
56            type Value = NetworkPolicyIngressRule;
57
58            fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
59                f.write_str("NetworkPolicyIngressRule")
60            }
61
62            fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
63                let mut value_from: Option<std::vec::Vec<crate::api::networking::v1::NetworkPolicyPeer>> = None;
64                let mut value_ports: Option<std::vec::Vec<crate::api::networking::v1::NetworkPolicyPort>> = None;
65
66                while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
67                    match key {
68                        Field::Key_from => value_from = crate::serde::de::MapAccess::next_value(&mut map)?,
69                        Field::Key_ports => value_ports = crate::serde::de::MapAccess::next_value(&mut map)?,
70                        Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
71                    }
72                }
73
74                Ok(NetworkPolicyIngressRule {
75                    from: value_from,
76                    ports: value_ports,
77                })
78            }
79        }
80
81        deserializer.deserialize_struct(
82            "NetworkPolicyIngressRule",
83            &[
84                "from",
85                "ports",
86            ],
87            Visitor,
88        )
89    }
90}
91
92impl crate::serde::Serialize for NetworkPolicyIngressRule {
93    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
94        let mut state = serializer.serialize_struct(
95            "NetworkPolicyIngressRule",
96            self.from.as_ref().map_or(0, |_| 1) +
97            self.ports.as_ref().map_or(0, |_| 1),
98        )?;
99        if let Some(value) = &self.from {
100            crate::serde::ser::SerializeStruct::serialize_field(&mut state, "from", value)?;
101        }
102        if let Some(value) = &self.ports {
103            crate::serde::ser::SerializeStruct::serialize_field(&mut state, "ports", value)?;
104        }
105        crate::serde::ser::SerializeStruct::end(state)
106    }
107}
108
109#[cfg(feature = "schemars")]
110impl crate::schemars::JsonSchema for NetworkPolicyIngressRule {
111    fn schema_name() -> std::borrow::Cow<'static, str> {
112        "io.k8s.api.networking.v1.NetworkPolicyIngressRule".into()
113    }
114
115    fn json_schema(__gen: &mut crate::schemars::SchemaGenerator) -> crate::schemars::Schema {
116        crate::schemars::json_schema!({
117            "description": "NetworkPolicyIngressRule describes a particular set of traffic that is allowed to the pods matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and from.",
118            "type": "object",
119            "properties": {
120                "from": {
121                    "description": "from is a list of sources which should be able to access the pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all sources (traffic not restricted by source). If this field is present and contains at least one item, this rule allows traffic only if the traffic matches at least one item in the from list.",
122                    "type": "array",
123                    "items": (__gen.subschema_for::<crate::api::networking::v1::NetworkPolicyPeer>()),
124                },
125                "ports": {
126                    "description": "ports is a list of ports which should be made accessible on the pods selected for this rule. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list.",
127                    "type": "array",
128                    "items": (__gen.subschema_for::<crate::api::networking::v1::NetworkPolicyPort>()),
129                },
130            },
131        })
132    }
133}