Home
last modified time | relevance | path

Searched refs:ForbiddenDetail (Results 1 – 25 of 34) sorted by relevance

12

/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/pod-security-admission/policy/
H A Dchecks.go76 ForbiddenDetail string member
100 func (a *AggregateCheckResult) ForbiddenDetail() string { func
133 details = append(details, result.ForbiddenDetail)
H A Dcheck_runAsNonRoot.go110ForbiddenDetail: fmt.Sprintf("%s must not set securityContext.runAsNonRoot=false", strings.Join(ba…
119 ForbiddenDetail: fmt.Sprintf(
H A Dcheck_seccompProfile_restricted.go115 ForbiddenDetail: fmt.Sprintf(
128 ForbiddenDetail: fmt.Sprintf(
H A Dcheck_seccompProfile_baseline.go109 ForbiddenDetail: fmt.Sprintf(
162 ForbiddenDetail: fmt.Sprintf(
H A Dcheck_hostNamespaces.go77 ForbiddenDetail: strings.Join(hostNamespaces, ", "),
H A Dcheck_hostPathVolumes.go69ForbiddenDetail: fmt.Sprintf("%s %s", pluralize("volume", "volumes", len(hostVolumes)), joinQuote(…
H A Dcheck_sysctls.go92 ForbiddenDetail: strings.Join(forbiddenSysctls, ", "),
H A Dcheck_allowPrivilegeEscalation.go71 ForbiddenDetail: fmt.Sprintf(
H A Dcheck_privileged.go67 ForbiddenDetail: fmt.Sprintf(
H A Dcheck_seccompProfile_baseline_test.go89 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
157 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_hostNamespaces_test.go53 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_procMount.go83 ForbiddenDetail: fmt.Sprintf(
H A Dcheck_appArmorProfile.go76 ForbiddenDetail: strings.Join(forbiddenValues, ", "),
H A Dcheck_capabilities_baseline.go99 ForbiddenDetail: fmt.Sprintf(
H A Dcheck_hostPorts.go80 ForbiddenDetail: fmt.Sprintf(
H A Dcheck_sysctls_test.go53 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_hostPathVolumes_test.go55 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_windowsHostProcess.go97ForbiddenDetail: fmt.Sprintf("%s must not set securityContext.windowsOptions.hostProcess=true", st…
H A Dcheck_capabilities_baseline_test.go53 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_allowPrivilegeEscalation_test.go56 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_privileged_test.go58 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_procMount_test.go61 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_capabilities_restricted_test.go54 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_hostPorts_test.go66 if e, a := tc.expectDetail, result.ForbiddenDetail; e != a {
H A Dcheck_capabilities_restricted.go125 ForbiddenDetail: strings.Join(forbiddenDetails, "; "),

12