You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: api/swagger-spec/v1.json
+7
Original file line number
Diff line number
Diff line change
@@ -20351,6 +20351,13 @@
20351
20351
"type": "string"
20352
20352
},
20353
20353
"description": "The groups that have permission to use this security context constraints"
20354
+
},
20355
+
"seccompProfiles": {
20356
+
"type": "array",
20357
+
"items": {
20358
+
"type": "string"
20359
+
},
20360
+
"description": "SeccompProfiles lists the allowed profiles that may be set for the pod or container's seccomp annotations. An unset (nil) or empty value means that no profiles may be specifid by the pod or container.\tThe wildcard '*' may be used to allow all profiles. When used to generate a value for a pod the first non-wildcard profile will be used as the default."
Copy file name to clipboardexpand all lines: pkg/api/v1/types.go
+7
Original file line number
Diff line number
Diff line change
@@ -3405,6 +3405,13 @@ type SecurityContextConstraints struct {
3405
3405
Users []string`json:"users,omitempty" description:"users allowed to use this SecurityContextConstraints" protobuf:"bytes,18,rep,name=users"`
3406
3406
// The groups that have permission to use this security context constraints
3407
3407
Groups []string`json:"groups,omitempty" description:"groups allowed to use this SecurityContextConstraints" protobuf:"bytes,19,rep,name=groups"`
3408
+
3409
+
// SeccompProfiles lists the allowed profiles that may be set for the pod or
3410
+
// container's seccomp annotations. An unset (nil) or empty value means that no profiles may
3411
+
// be specifid by the pod or container. The wildcard '*' may be used to allow all profiles. When
3412
+
// used to generate a value for a pod the first non-wildcard profile will be used as
3413
+
// the default.
3414
+
SeccompProfiles []string`json:"seccompProfiles,omitempty" description:"seccomp profiles allowed to be used by pods and containers" protobuf:"bytes,20,opt,name=seccompProfiles"`
3408
3415
}
3409
3416
3410
3417
// FS Type gives strong typing to different file systems that are used by volumes.
Copy file name to clipboardexpand all lines: pkg/api/v1/types_swagger_doc_generated.go
+1
Original file line number
Diff line number
Diff line change
@@ -1621,6 +1621,7 @@ var map_SecurityContextConstraints = map[string]string{
1621
1621
"readOnlyRootFilesystem": "ReadOnlyRootFilesystem when set to true will force containers to run with a read only root file system. If the container specifically requests to run with a non-read only root file system the SCC should deny the pod. If set to false the container may run with a read only root file system if it wishes but it will not be forced to.",
1622
1622
"users": "The users who have permissions to use this security context constraints",
1623
1623
"groups": "The groups that have permission to use this security context constraints",
1624
+
"seccompProfiles": "SeccompProfiles lists the allowed profiles that may be set for the pod or container's seccomp annotations. An unset (nil) or empty value means that no profiles may be specifid by the pod or container.\tThe wildcard '*' may be used to allow all profiles. When used to generate a value for a pod the first non-wildcard profile will be used as the default.",
0 commit comments