public interface  io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent extends java.lang.Object implements io.fabric.kubernetes.api.builder.Fluent
{
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent addToAllowedServiceAccounts(int, io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus);
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent setToAllowedServiceAccounts(int, io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus);
public abstract transient io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent addToAllowedServiceAccounts(io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus[]);
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent addAllToAllowedServiceAccounts(java.util.Collection);
public abstract transient io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent removeFromAllowedServiceAccounts(io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus[]);
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent removeAllFromAllowedServiceAccounts(java.util.Collection);
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent removeMatchingFromAllowedServiceAccounts(java.util.function.Predicate);
public abstract java.util.List getAllowedServiceAccounts();
public abstract java.util.List buildAllowedServiceAccounts();
public abstract io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus buildAllowedServiceAccount(int);
public abstract io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus buildFirstAllowedServiceAccount();
public abstract io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus buildLastAllowedServiceAccount();
public abstract io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus buildMatchingAllowedServiceAccount(java.util.function.Predicate);
public abstract java.lang.Boolean hasMatchingAllowedServiceAccount(java.util.function.Predicate);
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent withAllowedServiceAccounts(java.util.List);
public abstract transient io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent withAllowedServiceAccounts(io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus[]);
public abstract java.lang.Boolean hasAllowedServiceAccounts();
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent$AllowedServiceAccountsNested addNewAllowedServiceAccount();
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent$AllowedServiceAccountsNested addNewAllowedServiceAccountLike(io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus);
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent$AllowedServiceAccountsNested setNewAllowedServiceAccountLike(int, io.fabric.openshift.api.model.ServiceAccountPodSecurityPolicyReviewStatus);
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent$AllowedServiceAccountsNested editAllowedServiceAccount(int);
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent$AllowedServiceAccountsNested editFirstAllowedServiceAccount();
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent$AllowedServiceAccountsNested editLastAllowedServiceAccount();
public abstract io.fabric.openshift.api.model.PodSecurityPolicyReviewStatusFluent$AllowedServiceAccountsNested editMatchingAllowedServiceAccount(java.util.function.Predicate);
}