Skip to content

Commit

Permalink
SCC: add {Default,}AllowPrivilegeEscalation options for controlling n…
Browse files Browse the repository at this point in the history
…o-new-privs flag.
  • Loading branch information
php-coder committed Jun 25, 2018
1 parent 64db63c commit b609731
Showing 1 changed file with 8 additions and 0 deletions.
8 changes: 8 additions & 0 deletions security/v1/types.go
Original file line number Diff line number Diff line change
Expand Up @@ -68,6 +68,14 @@ type SecurityContextConstraints struct {
AllowHostPID bool `json:"allowHostPID" protobuf:"varint,11,opt,name=allowHostPID"`
// AllowHostIPC determines if the policy allows host ipc in the containers.
AllowHostIPC bool `json:"allowHostIPC" protobuf:"varint,12,opt,name=allowHostIPC"`
// DefaultAllowPrivilegeEscalation controls the default setting for whether a
// process can gain more privileges than its parent process.
// +optional
DefaultAllowPrivilegeEscalation *bool `json:"defaultAllowPrivilegeEscalation,omitempty" protobuf:"varint,22,rep,name=defaultAllowPrivilegeEscalation"`
// AllowPrivilegeEscalation determines if a pod can request to allow
// privilege escalation. If unspecified, defaults to true.
// +optional
AllowPrivilegeEscalation *bool `json:"allowPrivilegeEscalation,omitempty" protobuf:"varint,23,rep,name=allowPrivilegeEscalation"`
// SELinuxContext is the strategy that will dictate what labels will be set in the SecurityContext.
SELinuxContext SELinuxContextStrategyOptions `json:"seLinuxContext,omitempty" protobuf:"bytes,13,opt,name=seLinuxContext"`
// RunAsUser is the strategy that will dictate what RunAsUser is used in the SecurityContext.
Expand Down

0 comments on commit b609731

Please sign in to comment.