/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/pod-security-admission/policy/ |
H A D | checks.go | 76 ForbiddenDetail string member 100 func (a *AggregateCheckResult) ForbiddenDetail() string { func 133 details = append(details, result.ForbiddenDetail)
|
H A D | check_runAsNonRoot.go | 110 …ForbiddenDetail: fmt.Sprintf("%s must not set securityContext.runAsNonRoot=false", strings.Join(ba… 119 ForbiddenDetail: fmt.Sprintf(
|
H A D | check_seccompProfile_restricted.go | 115 ForbiddenDetail: fmt.Sprintf( 128 ForbiddenDetail: fmt.Sprintf(
|
H A D | check_seccompProfile_baseline.go | 109 ForbiddenDetail: fmt.Sprintf( 162 ForbiddenDetail: fmt.Sprintf(
|
H A D | check_hostNamespaces.go | 77 ForbiddenDetail: strings.Join(hostNamespaces, ", "),
|
H A D | check_hostPathVolumes.go | 69 …ForbiddenDetail: fmt.Sprintf("%s %s", pluralize("volume", "volumes", len(hostVolumes)), joinQuote(…
|
H A D | check_sysctls.go | 92 ForbiddenDetail: strings.Join(forbiddenSysctls, ", "),
|
H A D | check_allowPrivilegeEscalation.go | 71 ForbiddenDetail: fmt.Sprintf(
|
H A D | check_privileged.go | 67 ForbiddenDetail: fmt.Sprintf(
|
H A D | check_seccompProfile_baseline_test.go | 89 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a { 157 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_hostNamespaces_test.go | 53 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_procMount.go | 83 ForbiddenDetail: fmt.Sprintf(
|
H A D | check_appArmorProfile.go | 76 ForbiddenDetail: strings.Join(forbiddenValues, ", "),
|
H A D | check_capabilities_baseline.go | 99 ForbiddenDetail: fmt.Sprintf(
|
H A D | check_hostPorts.go | 80 ForbiddenDetail: fmt.Sprintf(
|
H A D | check_sysctls_test.go | 53 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_hostPathVolumes_test.go | 55 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_windowsHostProcess.go | 97 …ForbiddenDetail: fmt.Sprintf("%s must not set securityContext.windowsOptions.hostProcess=true", st…
|
H A D | check_capabilities_baseline_test.go | 53 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_allowPrivilegeEscalation_test.go | 56 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_privileged_test.go | 58 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_procMount_test.go | 61 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_capabilities_restricted_test.go | 54 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_hostPorts_test.go | 66 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
|
H A D | check_capabilities_restricted.go | 125 ForbiddenDetail: strings.Join(forbiddenDetails, "; "),
|