Home
last modified time | relevance | path

Searched refs:SELinuxOptions (Results 1 – 25 of 691) sorted by relevance

12345678910>>...28

/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/pod-security-admission/policy/
H A Dcheck_seLinuxOptions_test.go36 SELinuxOptions: &corev1.SELinuxOptions{
43 {Name: "a", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{
46 {Name: "b", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{
49 {Name: "c", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{
52 {Name: "d", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{
55 {Name: "e", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{
58 {Name: "f", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{
70 SELinuxOptions: &corev1.SELinuxOptions{
77 {Name: "a", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{
80 {Name: "b", SecurityContext: &corev1.SecurityContext{SELinuxOptions: &corev1.SELinuxOptions{
[all …]
H A Dcheck_seLinuxOptions.go90 validSELinuxOptions := func(opts *corev1.SELinuxOptions) bool {
107 if podSpec.SecurityContext != nil && podSpec.SecurityContext.SELinuxOptions != nil {
108 if !validSELinuxOptions(podSpec.SecurityContext.SELinuxOptions) {
115 if container.SecurityContext != nil && container.SecurityContext.SELinuxOptions != nil {
116 if !validSELinuxOptions(container.SecurityContext.SELinuxOptions) {
/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/pod-security-admission/test/
H A Dfixtures_seLinuxOptions.go48 p.Spec.SecurityContext.SELinuxOptions = nil
50 p.Spec.Containers[0].SecurityContext.SELinuxOptions = nil
52 p.Spec.InitContainers[0].SecurityContext.SELinuxOptions = &corev1.SELinuxOptions{}
56 p.Spec.SecurityContext.SELinuxOptions.Type = "container_t"
57 p.Spec.Containers[0].SecurityContext.SELinuxOptions.Type = "container_init_t"
58 p.Spec.InitContainers[0].SecurityContext.SELinuxOptions.Type = "container_kvm_t"
60 p.Spec.SecurityContext.SELinuxOptions.Level = ""
61 p.Spec.Containers[0].SecurityContext.SELinuxOptions.Level = "somevalue"
70 tweak(p, func(p *corev1.Pod) { p.Spec.SecurityContext.SELinuxOptions.Type = "somevalue" }),
76 tweak(p, func(p *corev1.Pod) { p.Spec.SecurityContext.SELinuxOptions.User = "somevalue" }),
[all …]
H A Dhelpers.go53 if p.Spec.SecurityContext.SELinuxOptions == nil {
54 p.Spec.SecurityContext.SELinuxOptions = &corev1.SELinuxOptions{}
57 if p.Spec.Containers[i].SecurityContext.SELinuxOptions == nil {
58 p.Spec.Containers[i].SecurityContext.SELinuxOptions = &corev1.SELinuxOptions{}
62 if p.Spec.InitContainers[i].SecurityContext.SELinuxOptions == nil {
63 p.Spec.InitContainers[i].SecurityContext.SELinuxOptions = &corev1.SELinuxOptions{}
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/security/podsecuritypolicy/selinux/
H A Dmustrunas_test.go43 opts: &policy.SELinuxStrategyOptions{SELinuxOptions: &corev1.SELinuxOptions{}},
60 SELinuxOptions: &corev1.SELinuxOptions{
75 internalSELinuxOptions := &api.SELinuxOptions{}
76 …v1.Convert_v1_SELinuxOptions_To_core_SELinuxOptions(opts.SELinuxOptions, internalSELinuxOptions, n…
83 newValidOpts := func() *corev1.SELinuxOptions {
84 return &corev1.SELinuxOptions{
92 newValidOptsWithLevel := func(level string) *corev1.SELinuxOptions {
110 podSeLinux *corev1.SELinuxOptions
111 pspSeLinux *corev1.SELinuxOptions
153 SELinuxOptions: tc.pspSeLinux,
[all …]
H A Dmustrunas.go32 opts *api.SELinuxOptions
41 if options.SELinuxOptions == nil {
45 internalSELinuxOptions := &api.SELinuxOptions{}
46 …if err := v1.Convert_v1_SELinuxOptions_To_core_SELinuxOptions(options.SELinuxOptions, internalSELi…
55 func (s *mustRunAs) Generate(_ *api.Pod, _ *api.Container) (*api.SELinuxOptions, error) {
60 …date(fldPath *field.Path, _ *api.Pod, _ *api.Container, seLinux *api.SELinuxOptions) field.ErrorLi…
H A Dtypes.go27 Generate(pod *api.Pod, container *api.Container) (*api.SELinuxOptions, error)
29 …Validate(fldPath *field.Path, pod *api.Pod, container *api.Container, options *api.SELinuxOptions)… argument
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/securitycontext/
H A Daccessors_test.go43 {SELinuxOptions: &api.SELinuxOptions{User: "bob"}},
101 SELinuxOptions: &api.SELinuxOptions{},
269 {SELinuxOptions: &api.SELinuxOptions{User: "bob"}},
322 SELinuxOptions: &api.SELinuxOptions{},
476 SELinuxOptions: &api.SELinuxOptions{User: "bob"},
482 SELinuxOptions: &api.SELinuxOptions{User: "bob"},
489 SELinuxOptions: &api.SELinuxOptions{User: "bob"},
495 SELinuxOptions: &api.SELinuxOptions{User: "bob"},
502 SELinuxOptions: &api.SELinuxOptions{User: "bob"},
601 SELinuxOptions: &api.SELinuxOptions{User: "poduser"},
[all …]
H A Daccessors.go30 SELinuxOptions() *api.SELinuxOptions methodSpec
45 SetSELinuxOptions(*api.SELinuxOptions) argument
121 func (w *podSecurityContextWrapper) SELinuxOptions() *api.SELinuxOptions { func
125 return w.podSC.SELinuxOptions
132 w.podSC.SELinuxOptions = v
209 SELinuxOptions() *api.SELinuxOptions methodSpec
294 func (w *containerSecurityContextWrapper) SELinuxOptions() *api.SELinuxOptions { func
298 return w.containerSC.SELinuxOptions
305 w.containerSC.SELinuxOptions = v
414 func (w *effectiveContainerSecurityContextWrapper) SELinuxOptions() *api.SELinuxOptions { func
[all …]
H A Dutil.go78 if containerSc.SELinuxOptions != nil {
79 effectiveSc.SELinuxOptions = new(v1.SELinuxOptions)
80 *effectiveSc.SELinuxOptions = *containerSc.SELinuxOptions
170 if pod.Spec.SecurityContext.SELinuxOptions != nil {
171 synthesized.SELinuxOptions = &v1.SELinuxOptions{}
172 *synthesized.SELinuxOptions = *pod.Spec.SecurityContext.SELinuxOptions
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/framework/pod/
H A Dutils.go85 func GeneratePodSecurityContext(fsGroup *int64, seLinuxOptions *v1.SELinuxOptions) *v1.PodSecurityC… argument
91 SELinuxOptions: seLinuxOptions,
109 func GetLinuxLabel() *v1.SELinuxOptions {
113 return &v1.SELinuxOptions{
/dports/sysutils/kubectl/kubernetes-1.22.2/plugin/pkg/admission/security/podsecuritypolicy/
H A Dadmission_test.go966 runAsAny.Spec.SELinux.SELinuxOptions = nil
971 mustRunAs.Spec.SELinux.SELinuxOptions = &v1.SELinuxOptions{}
978 opt := kapi.SELinuxOptions{}
1025 expectedPodSC: &kapi.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "foo"}},
1035 expectedContainerSC: &kapi.SecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "foo"}},
1039 …i.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "bar"}}, &kapi.SecurityContext{SEL…
1043 expectedPodSC: &kapi.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "bar"}},
1044 expectedContainerSC: &kapi.SecurityContext{SELinuxOptions: &kapi.SELinuxOptions{User: "foo"}},
1071 …&kapi.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{Level: "level", Role: "role", Type: …
1083 …&kapi.PodSecurityContext{SELinuxOptions: &kapi.SELinuxOptions{Level: "level", Role: "role", Type: …
[all …]
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/windows/
H A Dsecurity_context.go85 windowsPodWithSELinux.Spec.SecurityContext.SELinuxOptions = &v1.SELinuxOptions{Level: "s0:c24,c9"}
87 SELinuxOptions: &v1.SELinuxOptions{Level: "s0:c24,c9"},
/dports/sysutils/kubectl/kubernetes-1.22.2/plugin/pkg/admission/securitycontext/scdeny/
H A Dadmission_test.go66 sc: &api.SecurityContext{SELinuxOptions: &api.SELinuxOptions{}},
76 podSc: &api.PodSecurityContext{SELinuxOptions: &api.SELinuxOptions{}},
H A Dadmission.go68 if pod.Spec.SecurityContext.SELinuxOptions != nil {
81 if v.SecurityContext.SELinuxOptions != nil {
92 if v.SecurityContext.SELinuxOptions != nil {
/dports/net-mgmt/prometheus1/prometheus-1.8.2/vendor/k8s.io/client-go/pkg/api/v1/
H A Dconversion.go687 if in.SELinuxOptions != nil {
688 out.SELinuxOptions = new(SELinuxOptions)
689 …if err := Convert_api_SELinuxOptions_To_v1_SELinuxOptions(in.SELinuxOptions, out.SELinuxOptions, s…
693 out.SELinuxOptions = nil
703 if in.SELinuxOptions != nil {
704 out.SELinuxOptions = new(api.SELinuxOptions)
705 …if err := Convert_v1_SELinuxOptions_To_api_SELinuxOptions(in.SELinuxOptions, out.SELinuxOptions, s…
709 out.SELinuxOptions = nil
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/node/
H A Dsecurity_context.go212 pod.Spec.SecurityContext.SELinuxOptions = &v1.SELinuxOptions{
260 pod.Spec.SecurityContext.SELinuxOptions = &v1.SELinuxOptions{
272 pod.Spec.SecurityContext.SELinuxOptions = &v1.SELinuxOptions{
/dports/net/gscloud/gscloud-0.11.0/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/
H A Dselinuxstrategyoptions.go30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member
51 b.SELinuxOptions = value
/dports/net/gscloud/gscloud-0.11.0/vendor/k8s.io/client-go/applyconfigurations/policy/v1beta1/
H A Dselinuxstrategyoptions.go30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member
51 b.SELinuxOptions = value
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/k8s.io/client-go/applyconfigurations/policy/v1beta1/
H A Dselinuxstrategyoptions.go30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member
51 b.SELinuxOptions = value
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/
H A Dselinuxstrategyoptions.go30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member
51 b.SELinuxOptions = value
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/grafana/loki/vendor/k8s.io/client-go/applyconfigurations/policy/v1beta1/
H A Dselinuxstrategyoptions.go30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member
51 b.SELinuxOptions = value
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/grafana/loki/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/
H A Dselinuxstrategyoptions.go30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member
51 b.SELinuxOptions = value
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/k8s.io/client-go/client-go-0.21.1/applyconfigurations/extensions/v1beta1/
H A Dselinuxstrategyoptions.go30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member
51 b.SELinuxOptions = value
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/k8s.io/client-go/client-go-0.21.1/applyconfigurations/policy/v1beta1/
H A Dselinuxstrategyoptions.go30 SELinuxOptions *v1.SELinuxOptionsApplyConfiguration `json:"seLinuxOptions,omitempty"` member
51 b.SELinuxOptions = value

12345678910>>...28