public static final class V1.SecurityContext.Builder extends com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder> implements V1.SecurityContextOrBuilder
SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.Protobuf type
k8s.io.api.core.v1.SecurityContext| Modifier and Type | Method and Description |
|---|---|
V1.SecurityContext.Builder |
addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
V1.SecurityContext |
build() |
V1.SecurityContext |
buildPartial() |
V1.SecurityContext.Builder |
clear() |
V1.SecurityContext.Builder |
clearAllowPrivilegeEscalation()
AllowPrivilegeEscalation controls whether a process can gain more
privileges than its parent process.
|
V1.SecurityContext.Builder |
clearCapabilities()
The capabilities to add/drop when running containers.
|
V1.SecurityContext.Builder |
clearField(com.google.protobuf.Descriptors.FieldDescriptor field) |
V1.SecurityContext.Builder |
clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) |
V1.SecurityContext.Builder |
clearPrivileged()
Run container in privileged mode.
|
V1.SecurityContext.Builder |
clearProcMount()
procMount denotes the type of proc mount to use for the containers.
|
V1.SecurityContext.Builder |
clearReadOnlyRootFilesystem()
Whether this container has a read-only root filesystem.
|
V1.SecurityContext.Builder |
clearRunAsGroup()
The GID to run the entrypoint of the container process.
|
V1.SecurityContext.Builder |
clearRunAsNonRoot()
Indicates that the container must run as a non-root user.
|
V1.SecurityContext.Builder |
clearRunAsUser()
The UID to run the entrypoint of the container process.
|
V1.SecurityContext.Builder |
clearSeLinuxOptions()
The SELinux context to be applied to the container.
|
V1.SecurityContext.Builder |
clone() |
boolean |
getAllowPrivilegeEscalation()
AllowPrivilegeEscalation controls whether a process can gain more
privileges than its parent process.
|
V1.Capabilities |
getCapabilities()
The capabilities to add/drop when running containers.
|
V1.Capabilities.Builder |
getCapabilitiesBuilder()
The capabilities to add/drop when running containers.
|
V1.CapabilitiesOrBuilder |
getCapabilitiesOrBuilder()
The capabilities to add/drop when running containers.
|
V1.SecurityContext |
getDefaultInstanceForType() |
static com.google.protobuf.Descriptors.Descriptor |
getDescriptor() |
com.google.protobuf.Descriptors.Descriptor |
getDescriptorForType() |
boolean |
getPrivileged()
Run container in privileged mode.
|
String |
getProcMount()
procMount denotes the type of proc mount to use for the containers.
|
com.google.protobuf.ByteString |
getProcMountBytes()
procMount denotes the type of proc mount to use for the containers.
|
boolean |
getReadOnlyRootFilesystem()
Whether this container has a read-only root filesystem.
|
long |
getRunAsGroup()
The GID to run the entrypoint of the container process.
|
boolean |
getRunAsNonRoot()
Indicates that the container must run as a non-root user.
|
long |
getRunAsUser()
The UID to run the entrypoint of the container process.
|
V1.SELinuxOptions |
getSeLinuxOptions()
The SELinux context to be applied to the container.
|
V1.SELinuxOptions.Builder |
getSeLinuxOptionsBuilder()
The SELinux context to be applied to the container.
|
V1.SELinuxOptionsOrBuilder |
getSeLinuxOptionsOrBuilder()
The SELinux context to be applied to the container.
|
boolean |
hasAllowPrivilegeEscalation()
AllowPrivilegeEscalation controls whether a process can gain more
privileges than its parent process.
|
boolean |
hasCapabilities()
The capabilities to add/drop when running containers.
|
boolean |
hasPrivileged()
Run container in privileged mode.
|
boolean |
hasProcMount()
procMount denotes the type of proc mount to use for the containers.
|
boolean |
hasReadOnlyRootFilesystem()
Whether this container has a read-only root filesystem.
|
boolean |
hasRunAsGroup()
The GID to run the entrypoint of the container process.
|
boolean |
hasRunAsNonRoot()
Indicates that the container must run as a non-root user.
|
boolean |
hasRunAsUser()
The UID to run the entrypoint of the container process.
|
boolean |
hasSeLinuxOptions()
The SELinux context to be applied to the container.
|
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable |
internalGetFieldAccessorTable() |
boolean |
isInitialized() |
V1.SecurityContext.Builder |
mergeCapabilities(V1.Capabilities value)
The capabilities to add/drop when running containers.
|
V1.SecurityContext.Builder |
mergeFrom(com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
V1.SecurityContext.Builder |
mergeFrom(com.google.protobuf.Message other) |
V1.SecurityContext.Builder |
mergeFrom(V1.SecurityContext other) |
V1.SecurityContext.Builder |
mergeSeLinuxOptions(V1.SELinuxOptions value)
The SELinux context to be applied to the container.
|
V1.SecurityContext.Builder |
mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
V1.SecurityContext.Builder |
setAllowPrivilegeEscalation(boolean value)
AllowPrivilegeEscalation controls whether a process can gain more
privileges than its parent process.
|
V1.SecurityContext.Builder |
setCapabilities(V1.Capabilities.Builder builderForValue)
The capabilities to add/drop when running containers.
|
V1.SecurityContext.Builder |
setCapabilities(V1.Capabilities value)
The capabilities to add/drop when running containers.
|
V1.SecurityContext.Builder |
setField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
V1.SecurityContext.Builder |
setPrivileged(boolean value)
Run container in privileged mode.
|
V1.SecurityContext.Builder |
setProcMount(String value)
procMount denotes the type of proc mount to use for the containers.
|
V1.SecurityContext.Builder |
setProcMountBytes(com.google.protobuf.ByteString value)
procMount denotes the type of proc mount to use for the containers.
|
V1.SecurityContext.Builder |
setReadOnlyRootFilesystem(boolean value)
Whether this container has a read-only root filesystem.
|
V1.SecurityContext.Builder |
setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
int index,
Object value) |
V1.SecurityContext.Builder |
setRunAsGroup(long value)
The GID to run the entrypoint of the container process.
|
V1.SecurityContext.Builder |
setRunAsNonRoot(boolean value)
Indicates that the container must run as a non-root user.
|
V1.SecurityContext.Builder |
setRunAsUser(long value)
The UID to run the entrypoint of the container process.
|
V1.SecurityContext.Builder |
setSeLinuxOptions(V1.SELinuxOptions.Builder builderForValue)
The SELinux context to be applied to the container.
|
V1.SecurityContext.Builder |
setSeLinuxOptions(V1.SELinuxOptions value)
The SELinux context to be applied to the container.
|
V1.SecurityContext.Builder |
setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof, internalGetMapField, internalGetMutableMapField, isClean, markClean, newBuilderForField, onBuilt, onChanged, setUnknownFieldsProto3findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toStringaddAll, addAll, mergeFrom, newUninitializedMessageExceptionequals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, waitpublic static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder clear()
clear in interface com.google.protobuf.Message.Builderclear in interface com.google.protobuf.MessageLite.Builderclear in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
getDescriptorForType in interface com.google.protobuf.Message.BuildergetDescriptorForType in interface com.google.protobuf.MessageOrBuildergetDescriptorForType in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext getDefaultInstanceForType()
getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuildergetDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilderpublic V1.SecurityContext build()
build in interface com.google.protobuf.Message.Builderbuild in interface com.google.protobuf.MessageLite.Builderpublic V1.SecurityContext buildPartial()
buildPartial in interface com.google.protobuf.Message.BuilderbuildPartial in interface com.google.protobuf.MessageLite.Builderpublic V1.SecurityContext.Builder clone()
clone in interface com.google.protobuf.Message.Builderclone in interface com.google.protobuf.MessageLite.Builderclone in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
setField in interface com.google.protobuf.Message.BuildersetField in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field)
clearField in interface com.google.protobuf.Message.BuilderclearField in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof)
clearOneof in interface com.google.protobuf.Message.BuilderclearOneof in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value)
setRepeatedField in interface com.google.protobuf.Message.BuildersetRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
addRepeatedField in interface com.google.protobuf.Message.BuilderaddRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder mergeFrom(com.google.protobuf.Message other)
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder mergeFrom(V1.SecurityContext other)
public final boolean isInitialized()
isInitialized in interface com.google.protobuf.MessageLiteOrBuilderisInitialized in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public V1.SecurityContext.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in interface com.google.protobuf.MessageLite.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<V1.SecurityContext.Builder>IOExceptionpublic boolean hasCapabilities()
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;hasCapabilities in interface V1.SecurityContextOrBuilderpublic V1.Capabilities getCapabilities()
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;getCapabilities in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setCapabilities(V1.Capabilities value)
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;public V1.SecurityContext.Builder setCapabilities(V1.Capabilities.Builder builderForValue)
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;public V1.SecurityContext.Builder mergeCapabilities(V1.Capabilities value)
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;public V1.SecurityContext.Builder clearCapabilities()
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;public V1.Capabilities.Builder getCapabilitiesBuilder()
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;public V1.CapabilitiesOrBuilder getCapabilitiesOrBuilder()
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;getCapabilitiesOrBuilder in interface V1.SecurityContextOrBuilderpublic boolean hasPrivileged()
Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. +optional
optional bool privileged = 2;hasPrivileged in interface V1.SecurityContextOrBuilderpublic boolean getPrivileged()
Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. +optional
optional bool privileged = 2;getPrivileged in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setPrivileged(boolean value)
Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. +optional
optional bool privileged = 2;public V1.SecurityContext.Builder clearPrivileged()
Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. +optional
optional bool privileged = 2;public boolean hasSeLinuxOptions()
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;hasSeLinuxOptions in interface V1.SecurityContextOrBuilderpublic V1.SELinuxOptions getSeLinuxOptions()
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;getSeLinuxOptions in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setSeLinuxOptions(V1.SELinuxOptions value)
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;public V1.SecurityContext.Builder setSeLinuxOptions(V1.SELinuxOptions.Builder builderForValue)
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;public V1.SecurityContext.Builder mergeSeLinuxOptions(V1.SELinuxOptions value)
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;public V1.SecurityContext.Builder clearSeLinuxOptions()
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;public V1.SELinuxOptions.Builder getSeLinuxOptionsBuilder()
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;public V1.SELinuxOptionsOrBuilder getSeLinuxOptionsOrBuilder()
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;getSeLinuxOptionsOrBuilder in interface V1.SecurityContextOrBuilderpublic boolean hasRunAsUser()
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional int64 runAsUser = 4;hasRunAsUser in interface V1.SecurityContextOrBuilderpublic long getRunAsUser()
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional int64 runAsUser = 4;getRunAsUser in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setRunAsUser(long value)
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional int64 runAsUser = 4;public V1.SecurityContext.Builder clearRunAsUser()
The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional int64 runAsUser = 4;public boolean hasRunAsGroup()
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional int64 runAsGroup = 8;hasRunAsGroup in interface V1.SecurityContextOrBuilderpublic long getRunAsGroup()
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional int64 runAsGroup = 8;getRunAsGroup in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setRunAsGroup(long value)
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional int64 runAsGroup = 8;public V1.SecurityContext.Builder clearRunAsGroup()
The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional int64 runAsGroup = 8;public boolean hasRunAsNonRoot()
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 5;hasRunAsNonRoot in interface V1.SecurityContextOrBuilderpublic boolean getRunAsNonRoot()
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 5;getRunAsNonRoot in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setRunAsNonRoot(boolean value)
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 5;public V1.SecurityContext.Builder clearRunAsNonRoot()
Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 5;public boolean hasReadOnlyRootFilesystem()
Whether this container has a read-only root filesystem. Default is false. +optional
optional bool readOnlyRootFilesystem = 6;hasReadOnlyRootFilesystem in interface V1.SecurityContextOrBuilderpublic boolean getReadOnlyRootFilesystem()
Whether this container has a read-only root filesystem. Default is false. +optional
optional bool readOnlyRootFilesystem = 6;getReadOnlyRootFilesystem in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setReadOnlyRootFilesystem(boolean value)
Whether this container has a read-only root filesystem. Default is false. +optional
optional bool readOnlyRootFilesystem = 6;public V1.SecurityContext.Builder clearReadOnlyRootFilesystem()
Whether this container has a read-only root filesystem. Default is false. +optional
optional bool readOnlyRootFilesystem = 6;public boolean hasAllowPrivilegeEscalation()
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN +optional
optional bool allowPrivilegeEscalation = 7;hasAllowPrivilegeEscalation in interface V1.SecurityContextOrBuilderpublic boolean getAllowPrivilegeEscalation()
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN +optional
optional bool allowPrivilegeEscalation = 7;getAllowPrivilegeEscalation in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setAllowPrivilegeEscalation(boolean value)
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN +optional
optional bool allowPrivilegeEscalation = 7;public V1.SecurityContext.Builder clearAllowPrivilegeEscalation()
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN +optional
optional bool allowPrivilegeEscalation = 7;public boolean hasProcMount()
procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. +optional
optional string procMount = 9;hasProcMount in interface V1.SecurityContextOrBuilderpublic String getProcMount()
procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. +optional
optional string procMount = 9;getProcMount in interface V1.SecurityContextOrBuilderpublic com.google.protobuf.ByteString getProcMountBytes()
procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. +optional
optional string procMount = 9;getProcMountBytes in interface V1.SecurityContextOrBuilderpublic V1.SecurityContext.Builder setProcMount(String value)
procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. +optional
optional string procMount = 9;public V1.SecurityContext.Builder clearProcMount()
procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. +optional
optional string procMount = 9;public V1.SecurityContext.Builder setProcMountBytes(com.google.protobuf.ByteString value)
procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. +optional
optional string procMount = 9;public final V1.SecurityContext.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
setUnknownFields in interface com.google.protobuf.Message.BuildersetUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>public final V1.SecurityContext.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
mergeUnknownFields in interface com.google.protobuf.Message.BuildermergeUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<V1.SecurityContext.Builder>Copyright © 2021. All rights reserved.