/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/pod-security-admission/policy/ |
H A D | check_seLinuxOptions_test.go | 36 SELinuxOptions: &corev1.SELinuxOptions{ 43 {Name: "a", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{ 46 {Name: "b", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{ 49 {Name: "c", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{ 52 {Name: "d", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{ 55 {Name: "e", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{ 58 {Name: "f", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{ 70 SELinuxOptions: &corev1.SELinuxOptions{ 77 {Name: "a", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{ 80 {Name: "b", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{ [all …]
|
H A D | check_seLinuxOptions.go | 90 validSELinuxOptions := func(opts *corev1.SELinuxOptions) bool { 107 if podSpec.SecurityContext != nil && podSpec.SecurityContext.SELinuxOptions != nil { 108 if !validSELinuxOptions(podSpec.SecurityContext.SELinuxOptions) { 115 if container.SecurityContext != nil && container.SecurityContext.SELinuxOptions != nil { 116 if !validSELinuxOptions(container.SecurityContext.SELinuxOptions) {
|
/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/pod-security-admission/test/ |
H A D | fixtures_seLinuxOptions.go | 48 p.Spec.SecurityContext.SELinuxOptions = nil 50 p.Spec.Containers[0].SecurityContext.SELinuxOptions = nil 52 p.Spec.InitContainers[0].SecurityContext.SELinuxOptions = &corev1.SELinuxOptions{} 56 p.Spec.SecurityContext.SELinuxOptions.Type = "container_t" 57 p.Spec.Containers[0].SecurityContext.SELinuxOptions.Type = "container_init_t" 58 p.Spec.InitContainers[0].SecurityContext.SELinuxOptions.Type = "container_kvm_t" 60 p.Spec.SecurityContext.SELinuxOptions.Level = "" 61 p.Spec.Containers[0].SecurityContext.SELinuxOptions.Level = "somevalue" 70 tweak(p, func(p *corev1.Pod) { p.Spec.SecurityContext.SELinuxOptions.Type = "somevalue" }), 76 tweak(p, func(p *corev1.Pod) { p.Spec.SecurityContext.SELinuxOptions.User = "somevalue" }), [all …]
|
H A D | helpers.go | 53 if p.Spec.SecurityContext.SELinuxOptions == nil { 54 p.Spec.SecurityContext.SELinuxOptions = &corev1.SELinuxOptions{} 57 if p.Spec.Containers[i].SecurityContext.SELinuxOptions == nil { 58 p.Spec.Containers[i].SecurityContext.SELinuxOptions = &corev1.SELinuxOptions{} 62 if p.Spec.InitContainers[i].SecurityContext.SELinuxOptions == nil { 63 p.Spec.InitContainers[i].SecurityContext.SELinuxOptions = &corev1.SELinuxOptions{}
|
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/security/podsecuritypolicy/selinux/ |
H A D | mustrunas_test.go | 43 opts: &policy.SELinuxStrategyOptions{SELinuxOptions: &corev1.SELinuxOptions{}}, 60 SELinuxOptions: &corev1.SELinuxOptions{ 75 internalSELinuxOptions := &api.SELinuxOptions{} 76 …v1.Convert_v1_SELinuxOptions_To_core_SELinuxOptions(opts.SELinuxOptions, internalSELinuxOptions, n… 83 newValidOpts := func() *corev1.SELinuxOptions { 84 return &corev1.SELinuxOptions{ 92 newValidOptsWithLevel := func(level string) *corev1.SELinuxOptions { 110 podSeLinux *corev1.SELinuxOptions 111 pspSeLinux *corev1.SELinuxOptions 153 SELinuxOptions: tc.pspSeLinux, [all …]
|
H A D | mustrunas.go | 32 opts *api.SELinuxOptions 41 if options.SELinuxOptions == nil { 45 internalSELinuxOptions := &api.SELinuxOptions{} 46 …if err := v1.Convert_v1_SELinuxOptions_To_core_SELinuxOptions(options.SELinuxOptions, internalSELi… 55 func (s *mustRunAs) Generate(_ *api.Pod, _ *api.Container) (*api.SELinuxOptions, error) { 60 …date(fldPath *field.Path, _ *api.Pod, _ *api.Container, seLinux *api.SELinuxOptions) field.ErrorLi…
|
H A D | types.go | 27 Generate(pod *api.Pod, container *api.Container) (*api.SELinuxOptions, error) 29 …Validate(fldPath *field.Path, pod *api.Pod, container *api.Container, options *api.SELinuxOptions)… argument
|
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/securitycontext/ |
H A D | accessors_test.go | 43 {SELinuxOptions: &api.SELinuxOptions{User: "bob"}}, 101 SELinuxOptions: &api.SELinuxOptions{}, 269 {SELinuxOptions: &api.SELinuxOptions{User: "bob"}}, 322 SELinuxOptions: &api.SELinuxOptions{}, 476 SELinuxOptions: &api.SELinuxOptions{User: "bob"}, 482 SELinuxOptions: &api.SELinuxOptions{User: "bob"}, 489 SELinuxOptions: &api.SELinuxOptions{User: "bob"}, 495 SELinuxOptions: &api.SELinuxOptions{User: "bob"}, 502 SELinuxOptions: &api.SELinuxOptions{User: "bob"}, 601 SELinuxOptions: &api.SELinuxOptions{User: "poduser"}, [all …]
|
H A D | accessors.go | 30 SELinuxOptions() *api.SELinuxOptions methodSpec 45 SetSELinuxOptions(*api.SELinuxOptions) argument 121 func (w *podSecurityContextWrapper) SELinuxOptions() *api.SELinuxOptions { func 125 return w.podSC.SELinuxOptions 132 w.podSC.SELinuxOptions = v 209 SELinuxOptions() *api.SELinuxOptions methodSpec 294 func (w *containerSecurityContextWrapper) SELinuxOptions() *api.SELinuxOptions { func 298 return w.containerSC.SELinuxOptions 305 w.containerSC.SELinuxOptions = v 414 func (w *effectiveContainerSecurityContextWrapper) SELinuxOptions() *api.SELinuxOptions { func [all …]
|
H A D | util.go | 78 if containerSc.SELinuxOptions != nil { 79 effectiveSc.SELinuxOptions = new(v1.SELinuxOptions) 80 *effectiveSc.SELinuxOptions = *containerSc.SELinuxOptions 170 if pod.Spec.SecurityContext.SELinuxOptions != nil { 171 synthesized.SELinuxOptions = &v1.SELinuxOptions{} 172 *synthesized.SELinuxOptions = *pod.Spec.SecurityContext.SELinuxOptions
|
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/framework/pod/ |
H A D | utils.go | 85 func GeneratePodSecurityContext(fsGroup *int64, seLinuxOptions *v1.SELinuxOptions) *v1.PodSecurityC… argument 91 SELinuxOptions: seLinuxOptions, 109 func GetLinuxLabel() *v1.SELinuxOptions { 113 return &v1.SELinuxOptions{
|
/dports/sysutils/kubectl/kubernetes-1.22.2/plugin/pkg/admission/security/podsecuritypolicy/ |
H A D | admission_test.go | 966 runAsAny.Spec.SELinux.SELinuxOptions = nil 971 mustRunAs.Spec.SELinux.SELinuxOptions = &v1.SELinuxOptions{} 978 opt := kapi.SELinuxOptions{} 1025 expectedPodSC: &kapi.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "foo"}}, 1035 expectedContainerSC: &kapi.SecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "foo"}}, 1039 …i.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "bar"}}, &kapi.SecurityContext{SEL… 1043 expectedPodSC: &kapi.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "bar"}}, 1044 expectedContainerSC: &kapi.SecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "foo"}}, 1071 …&kapi.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{Level: "level", Role: "role", Type: … 1083 …&kapi.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{Level: "level", Role: "role", Type: … [all …]
|
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/windows/ |
H A D | security_context.go | 85 windowsPodWithSELinux.Spec.SecurityContext.SELinuxOptions = &v1.SELinuxOptions{Level: "s0:c24,c9"} 87 SELinuxOptions: &v1.SELinuxOptions{Level: "s0:c24,c9"},
|
/dports/sysutils/kubectl/kubernetes-1.22.2/plugin/pkg/admission/securitycontext/scdeny/ |
H A D | admission_test.go | 66 sc: &api.SecurityContext{SELinuxOptions: &api.SELinuxOptions{}}, 76 podSc: &api.PodSecurityContext{SELinuxOptions: &api.SELinuxOptions{}},
|
H A D | admission.go | 68 if pod.Spec.SecurityContext.SELinuxOptions != nil { 81 if v.SecurityContext.SELinuxOptions != nil { 92 if v.SecurityContext.SELinuxOptions != nil {
|
/dports/net-mgmt/prometheus1/prometheus-1.8.2/vendor/k8s.io/client-go/pkg/api/v1/ |
H A D | conversion.go | 687 if in.SELinuxOptions != nil { 688 out.SELinuxOptions = new(SELinuxOptions) 689 …if err := Convert_api_SELinuxOptions_To_v1_SELinuxOptions(in.SELinuxOptions, out.SELinuxOptions, s… 693 out.SELinuxOptions = nil 703 if in.SELinuxOptions != nil { 704 out.SELinuxOptions = new(api.SELinuxOptions) 705 …if err := Convert_v1_SELinuxOptions_To_api_SELinuxOptions(in.SELinuxOptions, out.SELinuxOptions, s… 709 out.SELinuxOptions = nil
|
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/node/ |
H A D | security_context.go | 212 pod.Spec.SecurityContext.SELinuxOptions = &v1.SELinuxOptions{ 260 pod.Spec.SecurityContext.SELinuxOptions = &v1.SELinuxOptions{ 272 pod.Spec.SecurityContext.SELinuxOptions = &v1.SELinuxOptions{
|
/dports/net/gscloud/gscloud-0.11.0/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/ |
H A D | selinuxstrategyoptions.go | 30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member 51 b.SELinuxOptions = value
|
/dports/net/gscloud/gscloud-0.11.0/vendor/k8s.io/client-go/applyconfigurations/policy/v1beta1/ |
H A D | selinuxstrategyoptions.go | 30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member 51 b.SELinuxOptions = value
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/k8s.io/client-go/applyconfigurations/policy/v1beta1/ |
H A D | selinuxstrategyoptions.go | 30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member 51 b.SELinuxOptions = value
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/ |
H A D | selinuxstrategyoptions.go | 30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member 51 b.SELinuxOptions = value
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/grafana/loki/vendor/k8s.io/client-go/applyconfigurations/policy/v1beta1/ |
H A D | selinuxstrategyoptions.go | 30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member 51 b.SELinuxOptions = value
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/grafana/loki/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/ |
H A D | selinuxstrategyoptions.go | 30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member 51 b.SELinuxOptions = value
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/k8s.io/client-go/client-go-0.21.1/applyconfigurations/extensions/v1beta1/ |
H A D | selinuxstrategyoptions.go | 30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member 51 b.SELinuxOptions = value
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/k8s.io/client-go/client-go-0.21.1/applyconfigurations/policy/v1beta1/ |
H A D | selinuxstrategyoptions.go | 30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member 51 b.SELinuxOptions = value
|