PodSecurityPolicyReview checks which service accounts (not users, since that would be cluster-wide) can create the PodTemplateSpec
in question.
PodSecurityPolicyReview checks which service accounts (not users, since that would be cluster-wide) can create the PodTemplateSpec
in question.
object
spec
Property | Type | Description |
---|---|---|
|
|
apiVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources |
|
|
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds |
|
|
PodSecurityPolicyReviewSpec defines specification for PodSecurityPolicyReview |
|
|
PodSecurityPolicyReviewStatus represents the status of PodSecurityPolicyReview. |
PodSecurityPolicyReviewSpec defines specification for PodSecurityPolicyReview
object
template
Property | Type | Description |
---|---|---|
|
|
serviceAccountNames is an optional set of ServiceAccounts to run the check with. If serviceAccountNames is empty, the template.spec.serviceAccountName is used, unless it’s empty, in which case "default" is used instead. If serviceAccountNames is specified, template.spec.serviceAccountName is ignored. |
|
template is the PodTemplateSpec to check. The template.spec.serviceAccountName field is used if serviceAccountNames is empty, unless the template.spec.serviceAccountName is empty, in which case "default" is used. If serviceAccountNames is specified, template.spec.serviceAccountName is ignored. |
PodSecurityPolicyReviewStatus represents the status of PodSecurityPolicyReview.
object
allowedServiceAccounts
Property | Type | Description |
---|---|---|
|
|
allowedServiceAccounts returns the list of service accounts in this namespace that have the power to create the PodTemplateSpec. |
|
|
ServiceAccountPodSecurityPolicyReviewStatus represents ServiceAccount name and related review status |
allowedServiceAccounts returns the list of service accounts in this namespace that have the power to create the PodTemplateSpec.
array
ServiceAccountPodSecurityPolicyReviewStatus represents ServiceAccount name and related review status
object
name
Property | Type | Description |
---|---|---|
|
allowedBy is a reference to the rule that allows the PodTemplateSpec. A rule can be a SecurityContextConstraint or a PodSecurityPolicy A |
|
|
|
name contains the allowed and the denied ServiceAccount name |
|
|
A machine-readable description of why this operation is in the "Failure" status. If this value is empty there is no information available. |
|
template is the PodTemplateSpec after the defaulting is applied. |
The following api endpoints are available:
/apis/security.openshift.io/v1/namespaces/{namespace}/podsecuritypolicyreviews
POST
: create a PodSecurityPolicyReview
Parameter | Type | Description |
---|---|---|
|
|
object name and auth scope, such as for teams and projects |
Parameter | Type | Description |
---|---|---|
|
|
When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
|
|
fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
|
|
If 'true', then the output is pretty printed. |
POST
create a PodSecurityPolicyReview
Parameter | Type | Description |
---|---|---|
|
HTTP code | Reponse body |
---|---|
200 - OK |