v1

package
v3.6.0-rc.0+incompatible Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jul 13, 2017 License: Apache-2.0 Imports: 16 Imported by: 0

Documentation

Overview

+groupName=security.openshift.io Package v1 is the v1 version of the API.

Package v1 is a generated protocol buffer package.

It is generated from these files:
	github.com/openshift/origin/pkg/security/apis/security/v1/generated.proto

It has these top-level messages:
	FSGroupStrategyOptions
	IDRange
	PodSecurityPolicyReview
	PodSecurityPolicyReviewSpec
	PodSecurityPolicyReviewStatus
	PodSecurityPolicySelfSubjectReview
	PodSecurityPolicySelfSubjectReviewSpec
	PodSecurityPolicySubjectReview
	PodSecurityPolicySubjectReviewSpec
	PodSecurityPolicySubjectReviewStatus
	RunAsUserStrategyOptions
	SELinuxContextStrategyOptions
	SecurityContextConstraints
	SecurityContextConstraintsList
	ServiceAccountPodSecurityPolicyReviewStatus
	SupplementalGroupsStrategyOptions

Index

Constants

View Source
const (
	GroupName       = "security.openshift.io"
	LegacyGroupName = ""
)
View Source
const (
	// container must have SELinux labels of X applied.
	SELinuxStrategyMustRunAs SELinuxContextStrategyType = "MustRunAs"
	// container may make requests for any SELinux context labels.
	SELinuxStrategyRunAsAny SELinuxContextStrategyType = "RunAsAny"

	// container must run as a particular uid.
	RunAsUserStrategyMustRunAs RunAsUserStrategyType = "MustRunAs"
	// container must run as a particular uid.
	RunAsUserStrategyMustRunAsRange RunAsUserStrategyType = "MustRunAsRange"
	// container must run as a non-root uid
	RunAsUserStrategyMustRunAsNonRoot RunAsUserStrategyType = "MustRunAsNonRoot"
	// container may make requests for any uid.
	RunAsUserStrategyRunAsAny RunAsUserStrategyType = "RunAsAny"

	// container must have FSGroup of X applied.
	FSGroupStrategyMustRunAs FSGroupStrategyType = "MustRunAs"
	// container may make requests for any FSGroup labels.
	FSGroupStrategyRunAsAny FSGroupStrategyType = "RunAsAny"

	// container must run as a particular gid.
	SupplementalGroupsStrategyMustRunAs SupplementalGroupsStrategyType = "MustRunAs"
	// container may make requests for any gid.
	SupplementalGroupsStrategyRunAsAny SupplementalGroupsStrategyType = "RunAsAny"
)

Variables

View Source
var (
	ErrInvalidLengthGenerated = fmt.Errorf("proto: negative length found during unmarshaling")
	ErrIntOverflowGenerated   = fmt.Errorf("proto: integer overflow")
)
View Source
var (
	SchemeGroupVersion       = schema.GroupVersion{Group: GroupName, Version: "v1"}
	LegacySchemeGroupVersion = schema.GroupVersion{Group: LegacyGroupName, Version: "v1"}

	LegacySchemeBuilder    = runtime.NewSchemeBuilder(addLegacyKnownTypes, addConversionFuncs, addDefaultingFuncs)
	AddToSchemeInCoreGroup = LegacySchemeBuilder.AddToScheme

	SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes, addConversionFuncs, addDefaultingFuncs)
	AddToScheme   = SchemeBuilder.AddToScheme
)

SchemeGroupVersion is group version used to register these objects

Functions

func Convert_security_FSGroupStrategyOptions_To_v1_FSGroupStrategyOptions

func Convert_security_FSGroupStrategyOptions_To_v1_FSGroupStrategyOptions(in *security.FSGroupStrategyOptions, out *FSGroupStrategyOptions, s conversion.Scope) error

func Convert_security_IDRange_To_v1_IDRange

func Convert_security_IDRange_To_v1_IDRange(in *security.IDRange, out *IDRange, s conversion.Scope) error

func Convert_security_PodSecurityPolicyReviewSpec_To_v1_PodSecurityPolicyReviewSpec

func Convert_security_PodSecurityPolicyReviewSpec_To_v1_PodSecurityPolicyReviewSpec(in *security.PodSecurityPolicyReviewSpec, out *PodSecurityPolicyReviewSpec, s conversion.Scope) error

func Convert_security_PodSecurityPolicyReviewStatus_To_v1_PodSecurityPolicyReviewStatus

func Convert_security_PodSecurityPolicyReviewStatus_To_v1_PodSecurityPolicyReviewStatus(in *security.PodSecurityPolicyReviewStatus, out *PodSecurityPolicyReviewStatus, s conversion.Scope) error

func Convert_security_PodSecurityPolicyReview_To_v1_PodSecurityPolicyReview

func Convert_security_PodSecurityPolicyReview_To_v1_PodSecurityPolicyReview(in *security.PodSecurityPolicyReview, out *PodSecurityPolicyReview, s conversion.Scope) error

func Convert_security_PodSecurityPolicySubjectReview_To_v1_PodSecurityPolicySubjectReview

func Convert_security_PodSecurityPolicySubjectReview_To_v1_PodSecurityPolicySubjectReview(in *security.PodSecurityPolicySubjectReview, out *PodSecurityPolicySubjectReview, s conversion.Scope) error

func Convert_security_RunAsUserStrategyOptions_To_v1_RunAsUserStrategyOptions

func Convert_security_RunAsUserStrategyOptions_To_v1_RunAsUserStrategyOptions(in *security.RunAsUserStrategyOptions, out *RunAsUserStrategyOptions, s conversion.Scope) error

func Convert_security_SELinuxContextStrategyOptions_To_v1_SELinuxContextStrategyOptions

func Convert_security_SELinuxContextStrategyOptions_To_v1_SELinuxContextStrategyOptions(in *security.SELinuxContextStrategyOptions, out *SELinuxContextStrategyOptions, s conversion.Scope) error

func Convert_security_SecurityContextConstraintsList_To_v1_SecurityContextConstraintsList

func Convert_security_SecurityContextConstraintsList_To_v1_SecurityContextConstraintsList(in *security.SecurityContextConstraintsList, out *SecurityContextConstraintsList, s conversion.Scope) error

func Convert_security_SecurityContextConstraints_To_v1_SecurityContextConstraints

func Convert_security_SecurityContextConstraints_To_v1_SecurityContextConstraints(in *securityapi.SecurityContextConstraints, out *SecurityContextConstraints, s conversion.Scope) error

func Convert_security_SupplementalGroupsStrategyOptions_To_v1_SupplementalGroupsStrategyOptions

func Convert_security_SupplementalGroupsStrategyOptions_To_v1_SupplementalGroupsStrategyOptions(in *security.SupplementalGroupsStrategyOptions, out *SupplementalGroupsStrategyOptions, s conversion.Scope) error

func Convert_v1_FSGroupStrategyOptions_To_security_FSGroupStrategyOptions

func Convert_v1_FSGroupStrategyOptions_To_security_FSGroupStrategyOptions(in *FSGroupStrategyOptions, out *security.FSGroupStrategyOptions, s conversion.Scope) error

func Convert_v1_IDRange_To_security_IDRange

func Convert_v1_IDRange_To_security_IDRange(in *IDRange, out *security.IDRange, s conversion.Scope) error

func Convert_v1_PodSecurityPolicyReviewSpec_To_security_PodSecurityPolicyReviewSpec

func Convert_v1_PodSecurityPolicyReviewSpec_To_security_PodSecurityPolicyReviewSpec(in *PodSecurityPolicyReviewSpec, out *security.PodSecurityPolicyReviewSpec, s conversion.Scope) error

func Convert_v1_PodSecurityPolicyReviewStatus_To_security_PodSecurityPolicyReviewStatus

func Convert_v1_PodSecurityPolicyReviewStatus_To_security_PodSecurityPolicyReviewStatus(in *PodSecurityPolicyReviewStatus, out *security.PodSecurityPolicyReviewStatus, s conversion.Scope) error

func Convert_v1_PodSecurityPolicyReview_To_security_PodSecurityPolicyReview

func Convert_v1_PodSecurityPolicyReview_To_security_PodSecurityPolicyReview(in *PodSecurityPolicyReview, out *security.PodSecurityPolicyReview, s conversion.Scope) error

func Convert_v1_PodSecurityPolicySubjectReview_To_security_PodSecurityPolicySubjectReview

func Convert_v1_PodSecurityPolicySubjectReview_To_security_PodSecurityPolicySubjectReview(in *PodSecurityPolicySubjectReview, out *security.PodSecurityPolicySubjectReview, s conversion.Scope) error

func Convert_v1_RunAsUserStrategyOptions_To_security_RunAsUserStrategyOptions

func Convert_v1_RunAsUserStrategyOptions_To_security_RunAsUserStrategyOptions(in *RunAsUserStrategyOptions, out *security.RunAsUserStrategyOptions, s conversion.Scope) error

func Convert_v1_SELinuxContextStrategyOptions_To_security_SELinuxContextStrategyOptions

func Convert_v1_SELinuxContextStrategyOptions_To_security_SELinuxContextStrategyOptions(in *SELinuxContextStrategyOptions, out *security.SELinuxContextStrategyOptions, s conversion.Scope) error

func Convert_v1_SecurityContextConstraintsList_To_security_SecurityContextConstraintsList

func Convert_v1_SecurityContextConstraintsList_To_security_SecurityContextConstraintsList(in *SecurityContextConstraintsList, out *security.SecurityContextConstraintsList, s conversion.Scope) error

func Convert_v1_SecurityContextConstraints_To_security_SecurityContextConstraints

func Convert_v1_SecurityContextConstraints_To_security_SecurityContextConstraints(in *SecurityContextConstraints, out *securityapi.SecurityContextConstraints, s conversion.Scope) error

func Convert_v1_SupplementalGroupsStrategyOptions_To_security_SupplementalGroupsStrategyOptions

func Convert_v1_SupplementalGroupsStrategyOptions_To_security_SupplementalGroupsStrategyOptions(in *SupplementalGroupsStrategyOptions, out *security.SupplementalGroupsStrategyOptions, s conversion.Scope) error

func DeepCopy_v1_FSGroupStrategyOptions

func DeepCopy_v1_FSGroupStrategyOptions(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_IDRange

func DeepCopy_v1_IDRange(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_PodSecurityPolicyReview

func DeepCopy_v1_PodSecurityPolicyReview(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_PodSecurityPolicyReviewSpec

func DeepCopy_v1_PodSecurityPolicyReviewSpec(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_PodSecurityPolicyReviewStatus

func DeepCopy_v1_PodSecurityPolicyReviewStatus(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_PodSecurityPolicySelfSubjectReview

func DeepCopy_v1_PodSecurityPolicySelfSubjectReview(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_PodSecurityPolicySelfSubjectReviewSpec

func DeepCopy_v1_PodSecurityPolicySelfSubjectReviewSpec(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_PodSecurityPolicySubjectReview

func DeepCopy_v1_PodSecurityPolicySubjectReview(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_PodSecurityPolicySubjectReviewSpec

func DeepCopy_v1_PodSecurityPolicySubjectReviewSpec(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_PodSecurityPolicySubjectReviewStatus

func DeepCopy_v1_PodSecurityPolicySubjectReviewStatus(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_RunAsUserStrategyOptions

func DeepCopy_v1_RunAsUserStrategyOptions(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_SELinuxContextStrategyOptions

func DeepCopy_v1_SELinuxContextStrategyOptions(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_SecurityContextConstraints

func DeepCopy_v1_SecurityContextConstraints(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_SecurityContextConstraintsList

func DeepCopy_v1_SecurityContextConstraintsList(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_ServiceAccountPodSecurityPolicyReviewStatus

func DeepCopy_v1_ServiceAccountPodSecurityPolicyReviewStatus(in interface{}, out interface{}, c *conversion.Cloner) error

func DeepCopy_v1_SupplementalGroupsStrategyOptions

func DeepCopy_v1_SupplementalGroupsStrategyOptions(in interface{}, out interface{}, c *conversion.Cloner) error

func RegisterConversions

func RegisterConversions(scheme *runtime.Scheme) error

RegisterConversions adds conversion functions to the given scheme. Public to allow building arbitrary schemes.

func RegisterDeepCopies

func RegisterDeepCopies(scheme *runtime.Scheme) error

RegisterDeepCopies adds deep-copy functions to the given scheme. Public to allow building arbitrary schemes.

func RegisterDefaults

func RegisterDefaults(scheme *runtime.Scheme) error

RegisterDefaults adds defaulters functions to the given scheme. Public to allow building arbitrary schemes. All generated defaulters are covering - they call all nested defaulters.

func SetDefaults_SCC

func SetDefaults_SCC(scc *SecurityContextConstraints)

Default SCCs for new fields. FSGroup and SupplementalGroups are set to the RunAsAny strategy if they are unset on the scc.

func SetObjectDefaults_PodSecurityPolicyReview

func SetObjectDefaults_PodSecurityPolicyReview(in *PodSecurityPolicyReview)

func SetObjectDefaults_PodSecurityPolicySelfSubjectReview

func SetObjectDefaults_PodSecurityPolicySelfSubjectReview(in *PodSecurityPolicySelfSubjectReview)

func SetObjectDefaults_PodSecurityPolicySubjectReview

func SetObjectDefaults_PodSecurityPolicySubjectReview(in *PodSecurityPolicySubjectReview)

Types

type FSGroupStrategyOptions

type FSGroupStrategyOptions struct {
	// Type is the strategy that will dictate what FSGroup is used in the SecurityContext.
	Type FSGroupStrategyType `json:"type,omitempty" protobuf:"bytes,1,opt,name=type,casttype=FSGroupStrategyType"`
	// Ranges are the allowed ranges of fs groups.  If you would like to force a single
	// fs group then supply a single range with the same start and end.
	Ranges []IDRange `json:"ranges,omitempty" protobuf:"bytes,2,rep,name=ranges"`
}

FSGroupStrategyOptions defines the strategy type and options used to create the strategy.

func (*FSGroupStrategyOptions) Descriptor

func (*FSGroupStrategyOptions) Descriptor() ([]byte, []int)

func (*FSGroupStrategyOptions) Marshal

func (m *FSGroupStrategyOptions) Marshal() (data []byte, err error)

func (*FSGroupStrategyOptions) MarshalTo

func (m *FSGroupStrategyOptions) MarshalTo(data []byte) (int, error)

func (*FSGroupStrategyOptions) ProtoMessage

func (*FSGroupStrategyOptions) ProtoMessage()

func (*FSGroupStrategyOptions) Reset

func (m *FSGroupStrategyOptions) Reset()

func (*FSGroupStrategyOptions) Size

func (m *FSGroupStrategyOptions) Size() (n int)

func (*FSGroupStrategyOptions) String

func (this *FSGroupStrategyOptions) String() string

func (FSGroupStrategyOptions) SwaggerDoc

func (FSGroupStrategyOptions) SwaggerDoc() map[string]string

func (*FSGroupStrategyOptions) Unmarshal

func (m *FSGroupStrategyOptions) Unmarshal(data []byte) error

type FSGroupStrategyType

type FSGroupStrategyType string

FSGroupStrategyType denotes strategy types for generating FSGroup values for a SecurityContext

type FSType

type FSType string

FS Type gives strong typing to different file systems that are used by volumes.

var (
	FSTypeAzureFile             FSType = "azureFile"
	FSTypeFlocker               FSType = "flocker"
	FSTypeFlexVolume            FSType = "flexVolume"
	FSTypeHostPath              FSType = "hostPath"
	FSTypeEmptyDir              FSType = "emptyDir"
	FSTypeGCEPersistentDisk     FSType = "gcePersistentDisk"
	FSTypeAWSElasticBlockStore  FSType = "awsElasticBlockStore"
	FSTypeGitRepo               FSType = "gitRepo"
	FSTypeSecret                FSType = "secret"
	FSTypeNFS                   FSType = "nfs"
	FSTypeISCSI                 FSType = "iscsi"
	FSTypeGlusterfs             FSType = "glusterfs"
	FSTypePersistentVolumeClaim FSType = "persistentVolumeClaim"
	FSTypeRBD                   FSType = "rbd"
	FSTypeCinder                FSType = "cinder"
	FSTypeCephFS                FSType = "cephFS"
	FSTypeDownwardAPI           FSType = "downwardAPI"
	FSTypeFC                    FSType = "fc"
	FSTypeConfigMap             FSType = "configMap"
	FSTypeAll                   FSType = "*"
	FSTypeNone                  FSType = "none"
)

func StringSetToFSType

func StringSetToFSType(set sets.String) []FSType

type IDRange

type IDRange struct {
	// Min is the start of the range, inclusive.
	Min int64 `json:"min,omitempty" protobuf:"varint,1,opt,name=min"`
	// Max is the end of the range, inclusive.
	Max int64 `json:"max,omitempty" protobuf:"varint,2,opt,name=max"`
}

IDRange provides a min/max of an allowed range of IDs. TODO: this could be reused for UIDs.

func (*IDRange) Descriptor

func (*IDRange) Descriptor() ([]byte, []int)

func (*IDRange) Marshal

func (m *IDRange) Marshal() (data []byte, err error)

func (*IDRange) MarshalTo

func (m *IDRange) MarshalTo(data []byte) (int, error)

func (*IDRange) ProtoMessage

func (*IDRange) ProtoMessage()

func (*IDRange) Reset

func (m *IDRange) Reset()

func (*IDRange) Size

func (m *IDRange) Size() (n int)

func (*IDRange) String

func (this *IDRange) String() string

func (IDRange) SwaggerDoc

func (IDRange) SwaggerDoc() map[string]string

func (*IDRange) Unmarshal

func (m *IDRange) Unmarshal(data []byte) error

type PodSecurityPolicyReview

type PodSecurityPolicyReview struct {
	metav1.TypeMeta `json:",inline"`

	// spec is the PodSecurityPolicy to check.
	Spec PodSecurityPolicyReviewSpec `json:"spec" protobuf:"bytes,1,opt,name=spec"`

	// status represents the current information/status for the PodSecurityPolicyReview.
	Status PodSecurityPolicyReviewStatus `json:"status,omitempty" protobuf:"bytes,2,opt,name=status"`
}

PodSecurityPolicyReview checks which service accounts (not users, since that would be cluster-wide) can create the `PodTemplateSpec` in question.

func (*PodSecurityPolicyReview) Descriptor

func (*PodSecurityPolicyReview) Descriptor() ([]byte, []int)

func (*PodSecurityPolicyReview) Marshal

func (m *PodSecurityPolicyReview) Marshal() (data []byte, err error)

func (*PodSecurityPolicyReview) MarshalTo

func (m *PodSecurityPolicyReview) MarshalTo(data []byte) (int, error)

func (*PodSecurityPolicyReview) ProtoMessage

func (*PodSecurityPolicyReview) ProtoMessage()

func (*PodSecurityPolicyReview) Reset

func (m *PodSecurityPolicyReview) Reset()

func (*PodSecurityPolicyReview) Size

func (m *PodSecurityPolicyReview) Size() (n int)

func (*PodSecurityPolicyReview) String

func (this *PodSecurityPolicyReview) String() string

func (PodSecurityPolicyReview) SwaggerDoc

func (PodSecurityPolicyReview) SwaggerDoc() map[string]string

func (*PodSecurityPolicyReview) Unmarshal

func (m *PodSecurityPolicyReview) Unmarshal(data []byte) error

type PodSecurityPolicyReviewSpec

type PodSecurityPolicyReviewSpec struct {
	// template is the PodTemplateSpec to check. The template.spec.serviceAccountName field is used
	// if serviceAccountNames is empty, unless the template.spec.serviceAccountName is empty,
	// in which case "default" is used.
	// If serviceAccountNames is specified, template.spec.serviceAccountName is ignored.
	Template kapi.PodTemplateSpec `json:"template" protobuf:"bytes,1,opt,name=template"`

	// serviceAccountNames is an optional set of ServiceAccounts to run the check with.
	// If serviceAccountNames is empty, the template.spec.serviceAccountName is used,
	// unless it's empty, in which case "default" is used instead.
	// If serviceAccountNames is specified, template.spec.serviceAccountName is ignored.
	ServiceAccountNames []string `json:"serviceAccountNames,omitempty" protobuf:"bytes,2,rep,name=serviceAccountNames"` // TODO: find a way to express 'all service accounts'
}

PodSecurityPolicyReviewSpec defines specification for PodSecurityPolicyReview

func (*PodSecurityPolicyReviewSpec) Descriptor

func (*PodSecurityPolicyReviewSpec) Descriptor() ([]byte, []int)

func (*PodSecurityPolicyReviewSpec) Marshal

func (m *PodSecurityPolicyReviewSpec) Marshal() (data []byte, err error)

func (*PodSecurityPolicyReviewSpec) MarshalTo

func (m *PodSecurityPolicyReviewSpec) MarshalTo(data []byte) (int, error)

func (*PodSecurityPolicyReviewSpec) ProtoMessage

func (*PodSecurityPolicyReviewSpec) ProtoMessage()

func (*PodSecurityPolicyReviewSpec) Reset

func (m *PodSecurityPolicyReviewSpec) Reset()

func (*PodSecurityPolicyReviewSpec) Size

func (m *PodSecurityPolicyReviewSpec) Size() (n int)

func (*PodSecurityPolicyReviewSpec) String

func (this *PodSecurityPolicyReviewSpec) String() string

func (PodSecurityPolicyReviewSpec) SwaggerDoc

func (PodSecurityPolicyReviewSpec) SwaggerDoc() map[string]string

func (*PodSecurityPolicyReviewSpec) Unmarshal

func (m *PodSecurityPolicyReviewSpec) Unmarshal(data []byte) error

type PodSecurityPolicyReviewStatus

type PodSecurityPolicyReviewStatus struct {
	// allowedServiceAccounts returns the list of service accounts in *this* namespace that have the power to create the PodTemplateSpec.
	AllowedServiceAccounts []ServiceAccountPodSecurityPolicyReviewStatus `json:"allowedServiceAccounts" protobuf:"bytes,1,rep,name=allowedServiceAccounts"`
}

PodSecurityPolicyReviewStatus represents the status of PodSecurityPolicyReview.

func (*PodSecurityPolicyReviewStatus) Descriptor

func (*PodSecurityPolicyReviewStatus) Descriptor() ([]byte, []int)

func (*PodSecurityPolicyReviewStatus) Marshal

func (m *PodSecurityPolicyReviewStatus) Marshal() (data []byte, err error)

func (*PodSecurityPolicyReviewStatus) MarshalTo

func (m *PodSecurityPolicyReviewStatus) MarshalTo(data []byte) (int, error)

func (*PodSecurityPolicyReviewStatus) ProtoMessage

func (*PodSecurityPolicyReviewStatus) ProtoMessage()

func (*PodSecurityPolicyReviewStatus) Reset

func (m *PodSecurityPolicyReviewStatus) Reset()

func (*PodSecurityPolicyReviewStatus) Size

func (m *PodSecurityPolicyReviewStatus) Size() (n int)

func (*PodSecurityPolicyReviewStatus) String

func (this *PodSecurityPolicyReviewStatus) String() string

func (PodSecurityPolicyReviewStatus) SwaggerDoc

func (PodSecurityPolicyReviewStatus) SwaggerDoc() map[string]string

func (*PodSecurityPolicyReviewStatus) Unmarshal

func (m *PodSecurityPolicyReviewStatus) Unmarshal(data []byte) error

type PodSecurityPolicySelfSubjectReview

type PodSecurityPolicySelfSubjectReview struct {
	metav1.TypeMeta `json:",inline"`

	// spec defines specification the PodSecurityPolicySelfSubjectReview.
	Spec PodSecurityPolicySelfSubjectReviewSpec `json:"spec" protobuf:"bytes,1,opt,name=spec"`

	// status represents the current information/status for the PodSecurityPolicySelfSubjectReview.
	Status PodSecurityPolicySubjectReviewStatus `json:"status,omitempty" protobuf:"bytes,2,opt,name=status"`
}

PodSecurityPolicySelfSubjectReview checks whether this user/SA tuple can create the PodTemplateSpec

func (*PodSecurityPolicySelfSubjectReview) Descriptor

func (*PodSecurityPolicySelfSubjectReview) Descriptor() ([]byte, []int)

func (*PodSecurityPolicySelfSubjectReview) Marshal

func (m *PodSecurityPolicySelfSubjectReview) Marshal() (data []byte, err error)

func (*PodSecurityPolicySelfSubjectReview) MarshalTo

func (m *PodSecurityPolicySelfSubjectReview) MarshalTo(data []byte) (int, error)

func (*PodSecurityPolicySelfSubjectReview) ProtoMessage

func (*PodSecurityPolicySelfSubjectReview) ProtoMessage()

func (*PodSecurityPolicySelfSubjectReview) Reset

func (*PodSecurityPolicySelfSubjectReview) Size

func (*PodSecurityPolicySelfSubjectReview) String

func (PodSecurityPolicySelfSubjectReview) SwaggerDoc

func (*PodSecurityPolicySelfSubjectReview) Unmarshal

func (m *PodSecurityPolicySelfSubjectReview) Unmarshal(data []byte) error

type PodSecurityPolicySelfSubjectReviewSpec

type PodSecurityPolicySelfSubjectReviewSpec struct {
	// template is the PodTemplateSpec to check.
	Template kapi.PodTemplateSpec `json:"template" protobuf:"bytes,1,opt,name=template"`
}

PodSecurityPolicySelfSubjectReviewSpec contains specification for PodSecurityPolicySelfSubjectReview.

func (*PodSecurityPolicySelfSubjectReviewSpec) Descriptor

func (*PodSecurityPolicySelfSubjectReviewSpec) Descriptor() ([]byte, []int)

func (*PodSecurityPolicySelfSubjectReviewSpec) Marshal

func (m *PodSecurityPolicySelfSubjectReviewSpec) Marshal() (data []byte, err error)

func (*PodSecurityPolicySelfSubjectReviewSpec) MarshalTo

func (m *PodSecurityPolicySelfSubjectReviewSpec) MarshalTo(data []byte) (int, error)

func (*PodSecurityPolicySelfSubjectReviewSpec) ProtoMessage

func (*PodSecurityPolicySelfSubjectReviewSpec) Reset

func (*PodSecurityPolicySelfSubjectReviewSpec) Size

func (*PodSecurityPolicySelfSubjectReviewSpec) String

func (PodSecurityPolicySelfSubjectReviewSpec) SwaggerDoc

func (*PodSecurityPolicySelfSubjectReviewSpec) Unmarshal

func (m *PodSecurityPolicySelfSubjectReviewSpec) Unmarshal(data []byte) error

type PodSecurityPolicySubjectReview

type PodSecurityPolicySubjectReview struct {
	metav1.TypeMeta `json:",inline"`

	// spec defines specification for the PodSecurityPolicySubjectReview.
	Spec PodSecurityPolicySubjectReviewSpec `json:"spec" protobuf:"bytes,1,opt,name=spec"`

	// status represents the current information/status for the PodSecurityPolicySubjectReview.
	Status PodSecurityPolicySubjectReviewStatus `json:"status,omitempty" protobuf:"bytes,2,opt,name=status"`
}

PodSecurityPolicySubjectReview checks whether a particular user/SA tuple can create the PodTemplateSpec.

func (*PodSecurityPolicySubjectReview) Descriptor

func (*PodSecurityPolicySubjectReview) Descriptor() ([]byte, []int)

func (*PodSecurityPolicySubjectReview) Marshal

func (m *PodSecurityPolicySubjectReview) Marshal() (data []byte, err error)

func (*PodSecurityPolicySubjectReview) MarshalTo

func (m *PodSecurityPolicySubjectReview) MarshalTo(data []byte) (int, error)

func (*PodSecurityPolicySubjectReview) ProtoMessage

func (*PodSecurityPolicySubjectReview) ProtoMessage()

func (*PodSecurityPolicySubjectReview) Reset

func (m *PodSecurityPolicySubjectReview) Reset()

func (*PodSecurityPolicySubjectReview) Size

func (m *PodSecurityPolicySubjectReview) Size() (n int)

func (*PodSecurityPolicySubjectReview) String

func (this *PodSecurityPolicySubjectReview) String() string

func (PodSecurityPolicySubjectReview) SwaggerDoc

func (PodSecurityPolicySubjectReview) SwaggerDoc() map[string]string

func (*PodSecurityPolicySubjectReview) Unmarshal

func (m *PodSecurityPolicySubjectReview) Unmarshal(data []byte) error

type PodSecurityPolicySubjectReviewSpec

type PodSecurityPolicySubjectReviewSpec struct {
	// template is the PodTemplateSpec to check. If template.spec.serviceAccountName is empty it will not be defaulted.
	// If its non-empty, it will be checked.
	Template kapi.PodTemplateSpec `json:"template" protobuf:"bytes,1,opt,name=template"`

	// user is the user you're testing for.
	// If you specify "user" but not "group", then is it interpreted as "What if user were not a member of any groups.
	// If user and groups are empty, then the check is performed using *only* the serviceAccountName in the template.
	User string `json:"user,omitempty" protobuf:"bytes,2,opt,name=user"`

	// groups is the groups you're testing for.
	Groups []string `json:"groups,omitempty" protobuf:"bytes,3,rep,name=groups"`
}

PodSecurityPolicySubjectReviewSpec defines specification for PodSecurityPolicySubjectReview

func (*PodSecurityPolicySubjectReviewSpec) Descriptor

func (*PodSecurityPolicySubjectReviewSpec) Descriptor() ([]byte, []int)

func (*PodSecurityPolicySubjectReviewSpec) Marshal

func (m *PodSecurityPolicySubjectReviewSpec) Marshal() (data []byte, err error)

func (*PodSecurityPolicySubjectReviewSpec) MarshalTo

func (m *PodSecurityPolicySubjectReviewSpec) MarshalTo(data []byte) (int, error)

func (*PodSecurityPolicySubjectReviewSpec) ProtoMessage

func (*PodSecurityPolicySubjectReviewSpec) ProtoMessage()

func (*PodSecurityPolicySubjectReviewSpec) Reset

func (*PodSecurityPolicySubjectReviewSpec) Size

func (*PodSecurityPolicySubjectReviewSpec) String

func (PodSecurityPolicySubjectReviewSpec) SwaggerDoc

func (*PodSecurityPolicySubjectReviewSpec) Unmarshal

func (m *PodSecurityPolicySubjectReviewSpec) Unmarshal(data []byte) error

type PodSecurityPolicySubjectReviewStatus

type PodSecurityPolicySubjectReviewStatus struct {
	// allowedBy is a reference to the rule that allows the PodTemplateSpec.
	// A rule can be a SecurityContextConstraint or a PodSecurityPolicy
	// A `nil`, indicates that it was denied.
	AllowedBy *kapi.ObjectReference `json:"allowedBy,omitempty" protobuf:"bytes,1,opt,name=allowedBy"`

	// A machine-readable description of why this operation is in the
	// "Failure" status. If this value is empty there
	// is no information available.
	Reason string `json:"reason,omitempty" protobuf:"bytes,2,opt,name=reason"`

	// template is the PodTemplateSpec after the defaulting is applied.
	Template kapi.PodTemplateSpec `json:"template,omitempty" protobuf:"bytes,3,opt,name=template"`
}

PodSecurityPolicySubjectReviewStatus contains information/status for PodSecurityPolicySubjectReview.

func (*PodSecurityPolicySubjectReviewStatus) Descriptor

func (*PodSecurityPolicySubjectReviewStatus) Descriptor() ([]byte, []int)

func (*PodSecurityPolicySubjectReviewStatus) Marshal

func (m *PodSecurityPolicySubjectReviewStatus) Marshal() (data []byte, err error)

func (*PodSecurityPolicySubjectReviewStatus) MarshalTo

func (m *PodSecurityPolicySubjectReviewStatus) MarshalTo(data []byte) (int, error)

func (*PodSecurityPolicySubjectReviewStatus) ProtoMessage

func (*PodSecurityPolicySubjectReviewStatus) ProtoMessage()

func (*PodSecurityPolicySubjectReviewStatus) Reset

func (*PodSecurityPolicySubjectReviewStatus) Size

func (*PodSecurityPolicySubjectReviewStatus) String

func (PodSecurityPolicySubjectReviewStatus) SwaggerDoc

func (*PodSecurityPolicySubjectReviewStatus) Unmarshal

func (m *PodSecurityPolicySubjectReviewStatus) Unmarshal(data []byte) error

type RunAsUserStrategyOptions

type RunAsUserStrategyOptions struct {
	// Type is the strategy that will dictate what RunAsUser is used in the SecurityContext.
	Type RunAsUserStrategyType `json:"type,omitempty" protobuf:"bytes,1,opt,name=type,casttype=RunAsUserStrategyType"`
	// UID is the user id that containers must run as.  Required for the MustRunAs strategy if not using
	// namespace/service account allocated uids.
	UID *int64 `json:"uid,omitempty" protobuf:"varint,2,opt,name=uid"`
	// UIDRangeMin defines the min value for a strategy that allocates by range.
	UIDRangeMin *int64 `json:"uidRangeMin,omitempty" protobuf:"varint,3,opt,name=uidRangeMin"`
	// UIDRangeMax defines the max value for a strategy that allocates by range.
	UIDRangeMax *int64 `json:"uidRangeMax,omitempty" protobuf:"varint,4,opt,name=uidRangeMax"`
}

RunAsUserStrategyOptions defines the strategy type and any options used to create the strategy.

func (*RunAsUserStrategyOptions) Descriptor

func (*RunAsUserStrategyOptions) Descriptor() ([]byte, []int)

func (*RunAsUserStrategyOptions) Marshal

func (m *RunAsUserStrategyOptions) Marshal() (data []byte, err error)

func (*RunAsUserStrategyOptions) MarshalTo

func (m *RunAsUserStrategyOptions) MarshalTo(data []byte) (int, error)

func (*RunAsUserStrategyOptions) ProtoMessage

func (*RunAsUserStrategyOptions) ProtoMessage()

func (*RunAsUserStrategyOptions) Reset

func (m *RunAsUserStrategyOptions) Reset()

func (*RunAsUserStrategyOptions) Size

func (m *RunAsUserStrategyOptions) Size() (n int)

func (*RunAsUserStrategyOptions) String

func (this *RunAsUserStrategyOptions) String() string

func (RunAsUserStrategyOptions) SwaggerDoc

func (RunAsUserStrategyOptions) SwaggerDoc() map[string]string

func (*RunAsUserStrategyOptions) Unmarshal

func (m *RunAsUserStrategyOptions) Unmarshal(data []byte) error

type RunAsUserStrategyType

type RunAsUserStrategyType string

RunAsUserStrategyType denotes strategy types for generating RunAsUser values for a SecurityContext

type SELinuxContextStrategyOptions

type SELinuxContextStrategyOptions struct {
	// Type is the strategy that will dictate what SELinux context is used in the SecurityContext.
	Type SELinuxContextStrategyType `json:"type,omitempty" protobuf:"bytes,1,opt,name=type,casttype=SELinuxContextStrategyType"`
	// seLinuxOptions required to run as; required for MustRunAs
	SELinuxOptions *kapi.SELinuxOptions `json:"seLinuxOptions,omitempty" protobuf:"bytes,2,opt,name=seLinuxOptions"`
}

SELinuxContextStrategyOptions defines the strategy type and any options used to create the strategy.

func (*SELinuxContextStrategyOptions) Descriptor

func (*SELinuxContextStrategyOptions) Descriptor() ([]byte, []int)

func (*SELinuxContextStrategyOptions) Marshal

func (m *SELinuxContextStrategyOptions) Marshal() (data []byte, err error)

func (*SELinuxContextStrategyOptions) MarshalTo

func (m *SELinuxContextStrategyOptions) MarshalTo(data []byte) (int, error)

func (*SELinuxContextStrategyOptions) ProtoMessage

func (*SELinuxContextStrategyOptions) ProtoMessage()

func (*SELinuxContextStrategyOptions) Reset

func (m *SELinuxContextStrategyOptions) Reset()

func (*SELinuxContextStrategyOptions) Size

func (m *SELinuxContextStrategyOptions) Size() (n int)

func (*SELinuxContextStrategyOptions) String

func (this *SELinuxContextStrategyOptions) String() string

func (SELinuxContextStrategyOptions) SwaggerDoc

func (SELinuxContextStrategyOptions) SwaggerDoc() map[string]string

func (*SELinuxContextStrategyOptions) Unmarshal

func (m *SELinuxContextStrategyOptions) Unmarshal(data []byte) error

type SELinuxContextStrategyType

type SELinuxContextStrategyType string

SELinuxContextStrategyType denotes strategy types for generating SELinux options for a SecurityContext

type SecurityContextConstraints

type SecurityContextConstraints struct {
	metav1.TypeMeta `json:",inline"`
	// Standard object's metadata.
	// More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#metadata
	metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`

	// Priority influences the sort order of SCCs when evaluating which SCCs to try first for
	// a given pod request based on access in the Users and Groups fields.  The higher the int, the
	// higher priority.  If scores for multiple SCCs are equal they will be sorted by name.
	Priority *int32 `json:"priority" protobuf:"varint,2,opt,name=priority"`

	// AllowPrivilegedContainer determines if a container can request to be run as privileged.
	AllowPrivilegedContainer bool `json:"allowPrivilegedContainer" protobuf:"varint,3,opt,name=allowPrivilegedContainer"`
	// DefaultAddCapabilities is the default set of capabilities that will be added to the container
	// unless the pod spec specifically drops the capability.  You may not list a capabiility in both
	// DefaultAddCapabilities and RequiredDropCapabilities.
	DefaultAddCapabilities []kapi.Capability `json:"defaultAddCapabilities" protobuf:"bytes,4,rep,name=defaultAddCapabilities,casttype=Capability"`
	// RequiredDropCapabilities are the capabilities that will be dropped from the container.  These
	// are required to be dropped and cannot be added.
	RequiredDropCapabilities []kapi.Capability `json:"requiredDropCapabilities" protobuf:"bytes,5,rep,name=requiredDropCapabilities,casttype=Capability"`
	// AllowedCapabilities is a list of capabilities that can be requested to add to the container.
	// Capabilities in this field maybe added at the pod author's discretion.
	// You must not list a capability in both AllowedCapabilities and RequiredDropCapabilities.
	// To allow all capabilities you may use '*'.
	AllowedCapabilities []kapi.Capability `json:"allowedCapabilities" protobuf:"bytes,6,rep,name=allowedCapabilities,casttype=Capability"`
	// AllowHostDirVolumePlugin determines if the policy allow containers to use the HostDir volume plugin
	// +k8s:conversion-gen=false
	AllowHostDirVolumePlugin bool `json:"allowHostDirVolumePlugin" protobuf:"varint,7,opt,name=allowHostDirVolumePlugin"`
	// Volumes is a white list of allowed volume plugins.  FSType corresponds directly with the field names
	// of a VolumeSource (azureFile, configMap, emptyDir).  To allow all volumes you may use "*".
	// To allow no volumes, set to ["none"].
	Volumes []FSType `json:"volumes" protobuf:"bytes,8,rep,name=volumes,casttype=FSType"`
	// AllowHostNetwork determines if the policy allows the use of HostNetwork in the pod spec.
	AllowHostNetwork bool `json:"allowHostNetwork" protobuf:"varint,9,opt,name=allowHostNetwork"`
	// AllowHostPorts determines if the policy allows host ports in the containers.
	AllowHostPorts bool `json:"allowHostPorts" protobuf:"varint,10,opt,name=allowHostPorts"`
	// AllowHostPID determines if the policy allows host pid in the containers.
	AllowHostPID bool `json:"allowHostPID" protobuf:"varint,11,opt,name=allowHostPID"`
	// AllowHostIPC determines if the policy allows host ipc in the containers.
	AllowHostIPC bool `json:"allowHostIPC" protobuf:"varint,12,opt,name=allowHostIPC"`
	// SELinuxContext is the strategy that will dictate what labels will be set in the SecurityContext.
	SELinuxContext SELinuxContextStrategyOptions `json:"seLinuxContext,omitempty" protobuf:"bytes,13,opt,name=seLinuxContext"`
	// RunAsUser is the strategy that will dictate what RunAsUser is used in the SecurityContext.
	RunAsUser RunAsUserStrategyOptions `json:"runAsUser,omitempty" protobuf:"bytes,14,opt,name=runAsUser"`
	// SupplementalGroups is the strategy that will dictate what supplemental groups are used by the SecurityContext.
	SupplementalGroups SupplementalGroupsStrategyOptions `json:"supplementalGroups,omitempty" protobuf:"bytes,15,opt,name=supplementalGroups"`
	// FSGroup is the strategy that will dictate what fs group is used by the SecurityContext.
	FSGroup FSGroupStrategyOptions `json:"fsGroup,omitempty" protobuf:"bytes,16,opt,name=fsGroup"`
	// ReadOnlyRootFilesystem when set to true will force containers to run with a read only root file
	// system.  If the container specifically requests to run with a non-read only root file system
	// the SCC should deny the pod.
	// If set to false the container may run with a read only root file system if it wishes but it
	// will not be forced to.
	ReadOnlyRootFilesystem bool `json:"readOnlyRootFilesystem" protobuf:"varint,17,opt,name=readOnlyRootFilesystem"`

	// The users who have permissions to use this security context constraints
	Users []string `json:"users,omitempty" protobuf:"bytes,18,rep,name=users"`
	// The groups that have permission to use this security context constraints
	Groups []string `json:"groups,omitempty" protobuf:"bytes,19,rep,name=groups"`

	// SeccompProfiles lists the allowed profiles that may be set for the pod or
	// container's seccomp annotations.  An unset (nil) or empty value means that no profiles may
	// be specifid by the pod or container.	The wildcard '*' may be used to allow all profiles.  When
	// used to generate a value for a pod the first non-wildcard profile will be used as
	// the default.
	SeccompProfiles []string `json:"seccompProfiles,omitempty" protobuf:"bytes,20,opt,name=seccompProfiles"`
}

SecurityContextConstraints governs the ability to make requests that affect the SecurityContext that will be applied to a container.

func (*SecurityContextConstraints) Descriptor

func (*SecurityContextConstraints) Descriptor() ([]byte, []int)

func (*SecurityContextConstraints) Marshal

func (m *SecurityContextConstraints) Marshal() (data []byte, err error)

func (*SecurityContextConstraints) MarshalTo

func (m *SecurityContextConstraints) MarshalTo(data []byte) (int, error)

func (*SecurityContextConstraints) ProtoMessage

func (*SecurityContextConstraints) ProtoMessage()

func (*SecurityContextConstraints) Reset

func (m *SecurityContextConstraints) Reset()

func (*SecurityContextConstraints) Size

func (m *SecurityContextConstraints) Size() (n int)

func (*SecurityContextConstraints) String

func (this *SecurityContextConstraints) String() string

func (SecurityContextConstraints) SwaggerDoc

func (SecurityContextConstraints) SwaggerDoc() map[string]string

func (*SecurityContextConstraints) Unmarshal

func (m *SecurityContextConstraints) Unmarshal(data []byte) error

type SecurityContextConstraintsList

type SecurityContextConstraintsList struct {
	metav1.TypeMeta `json:",inline"`

	// More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#metadata
	metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`

	// List of security context constraints.
	Items []SecurityContextConstraints `json:"items" protobuf:"bytes,2,rep,name=items"`
}

SecurityContextConstraintsList is a list of SecurityContextConstraints objects

func (*SecurityContextConstraintsList) Descriptor

func (*SecurityContextConstraintsList) Descriptor() ([]byte, []int)

func (*SecurityContextConstraintsList) Marshal

func (m *SecurityContextConstraintsList) Marshal() (data []byte, err error)

func (*SecurityContextConstraintsList) MarshalTo

func (m *SecurityContextConstraintsList) MarshalTo(data []byte) (int, error)

func (*SecurityContextConstraintsList) ProtoMessage

func (*SecurityContextConstraintsList) ProtoMessage()

func (*SecurityContextConstraintsList) Reset

func (m *SecurityContextConstraintsList) Reset()

func (*SecurityContextConstraintsList) Size

func (m *SecurityContextConstraintsList) Size() (n int)

func (*SecurityContextConstraintsList) String

func (this *SecurityContextConstraintsList) String() string

func (SecurityContextConstraintsList) SwaggerDoc

func (SecurityContextConstraintsList) SwaggerDoc() map[string]string

func (*SecurityContextConstraintsList) Unmarshal

func (m *SecurityContextConstraintsList) Unmarshal(data []byte) error

type ServiceAccountPodSecurityPolicyReviewStatus

type ServiceAccountPodSecurityPolicyReviewStatus struct {
	PodSecurityPolicySubjectReviewStatus `json:",inline" protobuf:"bytes,1,opt,name=podSecurityPolicySubjectReviewStatus"`

	// name contains the allowed and the denied ServiceAccount name
	Name string `json:"name" protobuf:"bytes,2,opt,name=name"`
}

ServiceAccountPodSecurityPolicyReviewStatus represents ServiceAccount name and related review status

func (*ServiceAccountPodSecurityPolicyReviewStatus) Descriptor

func (*ServiceAccountPodSecurityPolicyReviewStatus) Marshal

func (m *ServiceAccountPodSecurityPolicyReviewStatus) Marshal() (data []byte, err error)

func (*ServiceAccountPodSecurityPolicyReviewStatus) MarshalTo

func (*ServiceAccountPodSecurityPolicyReviewStatus) ProtoMessage

func (*ServiceAccountPodSecurityPolicyReviewStatus) Reset

func (*ServiceAccountPodSecurityPolicyReviewStatus) Size

func (*ServiceAccountPodSecurityPolicyReviewStatus) String

func (ServiceAccountPodSecurityPolicyReviewStatus) SwaggerDoc

func (*ServiceAccountPodSecurityPolicyReviewStatus) Unmarshal

type SupplementalGroupsStrategyOptions

type SupplementalGroupsStrategyOptions struct {
	// Type is the strategy that will dictate what supplemental groups is used in the SecurityContext.
	Type SupplementalGroupsStrategyType `json:"type,omitempty" protobuf:"bytes,1,opt,name=type,casttype=SupplementalGroupsStrategyType"`
	// Ranges are the allowed ranges of supplemental groups.  If you would like to force a single
	// supplemental group then supply a single range with the same start and end.
	Ranges []IDRange `json:"ranges,omitempty" protobuf:"bytes,2,rep,name=ranges"`
}

SupplementalGroupsStrategyOptions defines the strategy type and options used to create the strategy.

func (*SupplementalGroupsStrategyOptions) Descriptor

func (*SupplementalGroupsStrategyOptions) Descriptor() ([]byte, []int)

func (*SupplementalGroupsStrategyOptions) Marshal

func (m *SupplementalGroupsStrategyOptions) Marshal() (data []byte, err error)

func (*SupplementalGroupsStrategyOptions) MarshalTo

func (m *SupplementalGroupsStrategyOptions) MarshalTo(data []byte) (int, error)

func (*SupplementalGroupsStrategyOptions) ProtoMessage

func (*SupplementalGroupsStrategyOptions) ProtoMessage()

func (*SupplementalGroupsStrategyOptions) Reset

func (*SupplementalGroupsStrategyOptions) Size

func (m *SupplementalGroupsStrategyOptions) Size() (n int)

func (*SupplementalGroupsStrategyOptions) String

func (SupplementalGroupsStrategyOptions) SwaggerDoc

func (*SupplementalGroupsStrategyOptions) Unmarshal

func (m *SupplementalGroupsStrategyOptions) Unmarshal(data []byte) error

type SupplementalGroupsStrategyType

type SupplementalGroupsStrategyType string

SupplementalGroupsStrategyType denotes strategy types for determining valid supplemental groups for a SecurityContext.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL