PodSecurityPolicyReview checks which service accounts (not users, since that would be cluster-wide) can create the PodTemplateSpec in question.
PodSecurityPolicyReview checks which service accounts (not users, since that would be cluster-wide) can create the PodTemplateSpec in question.
object
spec
| Property | Type | Description |
|---|---|---|
|
|
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources |
|
|
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds |
|
|
PodSecurityPolicyReviewSpec defines specification for PodSecurityPolicyReview |
|
|
PodSecurityPolicyReviewStatus represents the status of PodSecurityPolicyReview. |
PodSecurityPolicyReviewSpec defines specification for PodSecurityPolicyReview
object
template
| Property | Type | Description |
|---|---|---|
|
|
serviceAccountNames is an optional set of ServiceAccounts to run the check with. If serviceAccountNames is empty, the template.spec.serviceAccountName is used, unless it’s empty, in which case "default" is used instead. If serviceAccountNames is specified, template.spec.serviceAccountName is ignored. |
|
template is the PodTemplateSpec to check. The template.spec.serviceAccountName field is used if serviceAccountNames is empty, unless the template.spec.serviceAccountName is empty, in which case "default" is used. If serviceAccountNames is specified, template.spec.serviceAccountName is ignored. |
PodSecurityPolicyReviewStatus represents the status of PodSecurityPolicyReview.
object
allowedServiceAccounts
| Property | Type | Description |
|---|---|---|
|
|
allowedServiceAccounts returns the list of service accounts in this namespace that have the power to create the PodTemplateSpec. |
|
|
ServiceAccountPodSecurityPolicyReviewStatus represents ServiceAccount name and related review status |
allowedServiceAccounts returns the list of service accounts in this namespace that have the power to create the PodTemplateSpec.
array
ServiceAccountPodSecurityPolicyReviewStatus represents ServiceAccount name and related review status
object
name
| Property | Type | Description |
|---|---|---|
|
allowedBy is a reference to the rule that allows the PodTemplateSpec. A rule can be a SecurityContextConstraint or a PodSecurityPolicy A |
|
|
|
name contains the allowed and the denied ServiceAccount name |
|
|
A machine-readable description of why this operation is in the "Failure" status. If this value is empty there is no information available. |
|
template is the PodTemplateSpec after the defaulting is applied. |
The following API endpoints are available:
/apis/security.openshift.io/v1/namespaces/{namespace}/podsecuritypolicyreviews
POST: create a PodSecurityPolicyReview
| Parameter | Type | Description |
|---|---|---|
|
|
object name and auth scope, such as for teams and projects |
| Parameter | Type | Description |
|---|---|---|
|
|
When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
|
|
fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
|
|
If 'true', then the output is pretty printed. |
POST
create a PodSecurityPolicyReview
| Parameter | Type | Description |
|---|---|---|
|
| HTTP code | Reponse body |
|---|---|
200 - OK |