Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for AllowPrivilegeEscalation (0.43 sec)

  1. pkg/apis/core/validation/validation.go

    	}
    	allErrs = append(allErrs, validateSeccompProfileField(sc.SeccompProfile, fldPath.Child("seccompProfile"))...)
    	if sc.AllowPrivilegeEscalation != nil && !*sc.AllowPrivilegeEscalation {
    		if sc.Privileged != nil && *sc.Privileged {
    			allErrs = append(allErrs, field.Invalid(fldPath, sc, "cannot set `allowPrivilegeEscalation` to false and `privileged` to true"))
    		}
    
    		if sc.Capabilities != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 349.5K bytes
    - Viewed (0)
  2. staging/src/k8s.io/api/core/v1/types.go

    	// +optional
    	AllowPrivilegeEscalation *bool `json:"allowPrivilegeEscalation,omitempty" protobuf:"varint,7,opt,name=allowPrivilegeEscalation"`
    	// procMount denotes the type of proc mount to use for the containers.
    	// The default is DefaultProcMount which uses the container runtime defaults for
    	// readonly paths and masked paths.
    	// This requires the ProcMountType feature flag to be enabled.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 390.8K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/core/v1/generated.proto

      // +optional
      optional bool readOnlyRootFilesystem = 6;
    
      // AllowPrivilegeEscalation controls whether a process can gain more
      // privileges than its parent process. This bool directly controls if
      // the no_new_privs flag will be set on the container process.
      // AllowPrivilegeEscalation is true always when the container is:
      // 1) run as Privileged
      // 2) has CAP_SYS_ADMIN
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 255.8K bytes
    - Viewed (0)
  4. staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go

    	"allowPrivilegeEscalation": "AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name...
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 254.8K bytes
    - Viewed (0)
  5. staging/src/k8s.io/api/core/v1/generated.proto

      // +optional
      optional bool readOnlyRootFilesystem = 6;
    
      // AllowPrivilegeEscalation controls whether a process can gain more
      // privileges than its parent process. This bool directly controls if
      // the no_new_privs flag will be set on the container process.
      // AllowPrivilegeEscalation is true always when the container is:
      // 1) run as Privileged
      // 2) has CAP_SYS_ADMIN
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 280.3K bytes
    - Viewed (0)
  6. pkg/apis/core/v1/zz_generated.conversion.go

    	out.RunAsNonRoot = (*bool)(unsafe.Pointer(in.RunAsNonRoot))
    	out.ReadOnlyRootFilesystem = (*bool)(unsafe.Pointer(in.ReadOnlyRootFilesystem))
    	out.AllowPrivilegeEscalation = (*bool)(unsafe.Pointer(in.AllowPrivilegeEscalation))
    	out.ProcMount = (*core.ProcMountType)(unsafe.Pointer(in.ProcMount))
    	out.SeccompProfile = (*core.SeccompProfile)(unsafe.Pointer(in.SeccompProfile))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 472.1K bytes
    - Viewed (0)
  7. pkg/apis/core/types.go

    	// +optional
    	ReadOnlyRootFilesystem *bool
    	// AllowPrivilegeEscalation controls whether a process can gain more
    	// privileges than its parent process. This bool directly controls if
    	// the no_new_privs flag will be set on the container process.
    	// Note that this field cannot be set when spec.os.name is windows.
    	// +optional
    	AllowPrivilegeEscalation *bool
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 268.9K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.8.md

    * PodSecurityPolicy: Fixes a compatibility issue that caused policies that previously allowed privileged pods to start forbidding them, due to an incorrect default value for `allowPrivilegeEscalation`. PodSecurityPolicy objects defined using a 1.8.0 client or server that intended to set `allowPrivilegeEscalation` to `false` must be reapplied after upgrading to 1.8.1. ([#53443](https://github.com/kubernetes/kubernetes/pull/53443), [@liggitt](https://github.com/liggitt))
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  9. api/openapi-spec/v3/apis__batch__v1_openapi.json

            "properties": {
              "allowPrivilegeEscalation": {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 05 18:37:07 UTC 2024
    - 485.4K bytes
    - Viewed (0)
Back to top