Skip to content

Latest commit

 

History

History
23 lines (19 loc) · 2.99 KB

V1beta1PodSecurityPolicySpec.md

File metadata and controls

23 lines (19 loc) · 2.99 KB

V1beta1PodSecurityPolicySpec

Properties

Name Type Description Notes
allowed_capabilities list[str] AllowedCapabilities is a list of capabilities that can be requested to add to the container. Capabilities in this field may be added at the pod author's discretion. You must not list a capability in both AllowedCapabilities and RequiredDropCapabilities. [optional]
default_add_capabilities list[str] DefaultAddCapabilities is the default set of capabilities that will be added to the container unless the pod spec specifically drops the capability. You may not list a capabiility in both DefaultAddCapabilities and RequiredDropCapabilities. [optional]
fs_group V1beta1FSGroupStrategyOptions FSGroup is the strategy that will dictate what fs group is used by the SecurityContext.
host_ipc bool hostIPC determines if the policy allows the use of HostIPC in the pod spec. [optional]
host_network bool hostNetwork determines if the policy allows the use of HostNetwork in the pod spec. [optional]
host_pid bool hostPID determines if the policy allows the use of HostPID in the pod spec. [optional]
host_ports list[V1beta1HostPortRange] hostPorts determines which host port ranges are allowed to be exposed. [optional]
privileged bool privileged determines if a pod can request to be run as privileged. [optional]
read_only_root_filesystem bool ReadOnlyRootFilesystem when set to true will force containers to run with a read only root file system. If the container specifically requests to run with a non-read only root file system the PSP should deny the pod. If set to false the container may run with a read only root file system if it wishes but it will not be forced to. [optional]
required_drop_capabilities list[str] RequiredDropCapabilities are the capabilities that will be dropped from the container. These are required to be dropped and cannot be added. [optional]
run_as_user V1beta1RunAsUserStrategyOptions runAsUser is the strategy that will dictate the allowable RunAsUser values that may be set.
se_linux V1beta1SELinuxStrategyOptions seLinux is the strategy that will dictate the allowable labels that may be set.
supplemental_groups V1beta1SupplementalGroupsStrategyOptions SupplementalGroups is the strategy that will dictate what supplemental groups are used by the SecurityContext.
volumes list[str] volumes is a white list of allowed volume plugins. Empty indicates that all plugins may be used. [optional]

[Back to Model list] [Back to API list] [Back to README]