cloud-8.x-2.0-beta1/modules/cloud_service_providers/k8s/k8s.routing.yml

modules/cloud_service_providers/k8s/k8s.routing.yml
# Kubernetes Routing Definition

# Kubernetes Admin Settings
k8s.settings:
  path: '/admin/config/services/cloud/k8s'
  defaults:
    _entity_list: 'cloud_config'
    _title: Kubernetes
  requirements:
    _permission: 'administer k8s'

k8s.settings.options:
  path: '/admin/config/services/cloud/k8s/settings'
  defaults:
    _title: Kubernetes
    _form: '\Drupal\k8s\Form\Config\K8sAdminSettings'
  requirements:
    _permission: 'administer k8s'

k8s.update_all_resources:
  path: '/clouds/k8s/{cloud_context}/node/update_all_resources'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateAllResources'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'view k8s node'

entity.k8s_node.list_update:
  path: '/clouds/k8s/{cloud_context}/node/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateNodeList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'view k8s node'

entity.k8s_node.metrics:
  path: '/clouds/k8s/{cloud_context}/node/{k8s_node}/metrics'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::getNodeMetrics'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'view k8s node'
      parameters:
        k8s_node:
          type: 'entity:k8s_node'
          converter: paramconverter.entity

entity.k8s_node.usage_list:
  path: '/clouds/k8s/{cloud_context}/node/allocated_resources'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::getNodeAllocatedResourcesList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
    perm: 'view k8s node'

entity.k8s_node.usage:
  path: '/clouds/k8s/{cloud_context}/node/{k8s_node}/allocated_resources'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::getNodeAllocatedResources'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
    perm: 'view k8s node'

entity.k8s_namespace.list_update:
  path: '/clouds/k8s/{cloud_context}/namespace/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateNamespaceList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s namespace'

entity.k8s_pod.list_update:
  path: '/clouds/k8s/{cloud_context}/pod/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updatePodList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit any k8s pod+edit own k8s pod'

entity.k8s_pod.metrics:
  path: '/clouds/k8s/{cloud_context}/pod/{k8s_pod}/metrics'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::getPodMetrics'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'view any k8s pod+view own k8s pod'
      parameters:
        k8s_pod:
          type: 'entity:k8s_pod'
          converter: paramconverter.entity

entity.k8s_deployment.list_update:
  path: '/clouds/k8s/{cloud_context}/deployment/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateDeploymentList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s deployment'

entity.k8s_replica_set.list_update:
  path: '/clouds/k8s/{cloud_context}/replica_set/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateReplicaSetList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
    perm: 'edit k8s replica set'

entity.k8s_service.list_update:
  path: '/clouds/k8s/{cloud_context}/service/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateServiceList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s service'

entity.k8s_cron_job.list_update:
  path: '/clouds/k8s/{cloud_context}/cron_job/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateCronJobList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s cron job'

entity.k8s_job.list_update:
  path: '/clouds/k8s/{cloud_context}/job/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateJobList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s job'

entity.k8s_resource_quota.list_update:
  path: '/clouds/k8s/{cloud_context}/resource_quota/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateResourceQuotaList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s resource quota'

entity.k8s_limit_range.list_update:
  path: '/clouds/k8s/{cloud_context}/limit_range/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateLimitRangeList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s limit range'

entity.k8s_secret.list_update:
  path: '/clouds/k8s/{cloud_context}/secret/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateSecretList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s secret'

entity.k8s_config_map.list_update:
  path: '/clouds/k8s/{cloud_context}/config_map/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateConfigMapList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
      perm: 'edit k8s config map'

entity.k8s_pod.log_form:
  path: '/clouds/k8s/{cloud_context}/pod/{k8s_pod}/log'
  defaults:
    _entity_form: 'k8s_pod.log'
    _title: 'Log'
  requirements:
    _entity_access: 'k8s_pod.log'

entity.k8s_network_policy.list_update:
  path: '/clouds/k8s/{cloud_context}/network_policy/update'
  defaults:
    _controller: '\Drupal\k8s\Controller\ApiController::updateNetworkPolicyList'
  requirements:
    # Use custom access that will check for cloud_context and the desired permission.
    # Desired permission is passed as an option in the "perm" variable
    _custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
  options:
    perm: 'edit k8s network policy'

Главная | Обратная связь

drupal hosting | друпал хостинг | it patrol .inc