- Sort Score
- Result 10 results
- Languages All
Results 121 - 130 of 145 for ProcMount (0.22 sec)
-
staging/src/k8s.io/api/testdata/v1.30.0/apps.v1beta1.StatefulSet.yaml
type: typeValue capabilities: add: - addValue drop: - dropValue privileged: true procMount: procMountValue readOnlyRootFilesystem: true runAsGroup: 8 runAsNonRoot: true runAsUser: 4 seLinuxOptions: level: levelValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 37.6K bytes - Viewed (0) -
pkg/apis/core/validation/validation.go
} } if sc.ProcMount != nil { if err := ValidateProcMountType(fldPath.Child("procMount"), *sc.ProcMount); err != nil { allErrs = append(allErrs, err) } if hostUsers && *sc.ProcMount == core.UnmaskedProcMount { allErrs = append(allErrs, field.Invalid(fldPath.Child("procMount"), sc.ProcMount, "`hostUsers` must be false to use `Unmasked`")) } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 22:40:29 UTC 2024 - 349.5K bytes - Viewed (1) -
pkg/apis/core/zz_generated.deepcopy.go
} if in.AllowPrivilegeEscalation != nil { in, out := &in.AllowPrivilegeEscalation, &out.AllowPrivilegeEscalation *out = new(bool) **out = **in } if in.ProcMount != nil { in, out := &in.ProcMount, &out.ProcMount *out = new(ProcMountType) **out = **in } if in.SeccompProfile != nil { in, out := &in.SeccompProfile, &out.SeccompProfile *out = new(SeccompProfile)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 22:40:29 UTC 2024 - 181.5K bytes - Viewed (0) -
staging/src/k8s.io/api/core/v1/zz_generated.deepcopy.go
} if in.AllowPrivilegeEscalation != nil { in, out := &in.AllowPrivilegeEscalation, &out.AllowPrivilegeEscalation *out = new(bool) **out = **in } if in.ProcMount != nil { in, out := &in.ProcMount, &out.ProcMount *out = new(ProcMountType) **out = **in } if in.SeccompProfile != nil { in, out := &in.SeccompProfile, &out.SeccompProfile *out = new(SeccompProfile)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 22:40:29 UTC 2024 - 181.9K bytes - Viewed (0) -
staging/src/k8s.io/api/core/v1/types.go
// procMount denotes the type of proc mount to use for the containers. // The default is DefaultProcMount which uses the container runtime defaults for // readonly paths and masked paths. // This requires the ProcMountType feature flag to be enabled. // Note that this field cannot be set when spec.os.name is windows. // +optional
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 22:40:29 UTC 2024 - 390.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.12.md
* Resolves spurious rollouts of workload controllers when upgrading the API server from 1.11 -> 1.12 due to incorrect defaulting of an alpha procMount field in pods ([#78881](https://github.com/kubernetes/kubernetes/pull/78881), [@liggitt](https://github.com/liggitt))
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 293.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.13.md
* Resolves spurious rollouts of workload controllers when upgrading the API server due to incorrect defaulting of an alpha procMount field in pods ([#78882](https://github.com/kubernetes/kubernetes/pull/78882), [@liggitt](https://github.com/liggitt))
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 273.1K bytes - Viewed (0) -
common-protos/k8s.io/api/core/v1/generated.proto
// - spec.containers[*].securityContext.readOnlyRootFilesystem // - spec.containers[*].securityContext.privileged // - spec.containers[*].securityContext.allowPrivilegeEscalation // - spec.containers[*].securityContext.procMount // - spec.containers[*].securityContext.runAsUser // - spec.containers[*].securityContext.runAsGroup // +optional optional PodOS os = 36; // Use the host's user namespace.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 255.8K bytes - Viewed (0) -
pkg/apis/core/types.go
// +optional AllowPrivilegeEscalation *bool // ProcMount denotes the type of proc mount to use for the containers. // The default is DefaultProcMount which uses the container runtime defaults for // readonly paths and masked paths. // Note that this field cannot be set when spec.os.name is windows. // +optional ProcMount *ProcMountType // The seccomp options to use by this container. If seccomp options are
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 22:40:29 UTC 2024 - 268.9K bytes - Viewed (0) -
staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go
"procMount": "procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note...
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 22:40:29 UTC 2024 - 254.8K bytes - Viewed (0)