Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for ProcMount (0.1 sec)

  1. pkg/kubelet/kuberuntime/security_context.go

    	if synthesized == nil {
    		synthesized = &runtimeapi.LinuxContainerSecurityContext{
    			MaskedPaths:   securitycontext.ConvertToRuntimeMaskedPaths(effectiveSc.ProcMount),
    			ReadonlyPaths: securitycontext.ConvertToRuntimeReadonlyPaths(effectiveSc.ProcMount),
    		}
    	}
    	var err error
    
    	synthesized.Seccomp, err = m.getSeccompProfile(pod.Annotations, container.Name, pod.Spec.SecurityContext, container.SecurityContext, m.seccompDefault)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  2. pkg/securitycontext/util.go

    		effectiveSc.AllowPrivilegeEscalation = new(bool)
    		*effectiveSc.AllowPrivilegeEscalation = *containerSc.AllowPrivilegeEscalation
    	}
    
    	if containerSc.ProcMount != nil {
    		effectiveSc.ProcMount = new(v1.ProcMountType)
    		*effectiveSc.ProcMount = *containerSc.ProcMount
    	}
    
    	return effectiveSc
    }
    
    // DetermineEffectiveRunAsUser returns a pointer of UID from the provided pod's
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Feb 15 07:28:24 UTC 2023
    - 7.5K bytes
    - Viewed (0)
Back to top