Documentation ¶
Index ¶
- func SetPodSecurityPolicy(p PodSecurityPolicy)
- func TestAllowedCapabilitiesAreRestricted(t *testing.T)
- func TestAssignedCapabilitiesAreRestricted(t *testing.T)
- func TestClusterHasPSP(t *testing.T)
- func TestCreatePODSettingAttributes(t *testing.T)
- func TestCreatePODSettingCapabilities(t *testing.T)
- func TestCreatePODSettingSecurityContext(t *testing.T)
- func TestHostIPCIsRestricted(t *testing.T)
- func TestHostNetworkIsRestricted(t *testing.T)
- func TestHostPIDIsRestricted(t *testing.T)
- func TestHostPortsAreRestricted(t *testing.T)
- func TestPSPProbeCommand(t *testing.T)
- func TestPrivilegedAccessIsRestricted(t *testing.T)
- func TestPrivilegedEscalationIsRestricted(t *testing.T)
- func TestRootUserIsRestricted(t *testing.T)
- func TestSeccompProfilesAreRestricted(t *testing.T)
- func TestVolumeTypesAreRestricted(t *testing.T)
- type AzK8sConstraintTemplate
- func (az *AzK8sConstraintTemplate) HasAllowPrivilegeEscalationRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasAllowedCapabilitiesRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasAssignedCapabilitiesRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasHostIPCRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasHostNetworkRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasHostPIDRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasHostPortRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasPrivilegedAccessRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasRootUserRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasSeccompProfileRestriction() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasSecurityPolicies() (*bool, error)
- func (az *AzK8sConstraintTemplate) HasVolumeTypeRestriction() (*bool, error)
- type KubePodSecurityPolicyProvider
- func (p *KubePodSecurityPolicyProvider) HasAllowPrivilegeEscalationRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasAllowedCapabilitiesRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasAssignedCapabilitiesRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasHostIPCRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasHostNetworkRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasHostPIDRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasHostPortRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasPrivilegedAccessRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasRootUserRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasSeccompProfileRestriction() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasSecurityPolicies() (*bool, error)
- func (p *KubePodSecurityPolicyProvider) HasVolumeTypeRestriction() (*bool, error)
- type PSP
- func (psp *PSP) AllowedCapabilitiesAreRestricted() (*bool, error)
- func (psp *PSP) AssignedCapabilitiesAreRestricted() (*bool, error)
- func (psp *PSP) ClusterHasPSP() (*bool, error)
- func (psp *PSP) ClusterIsDeployed() *bool
- func (psp *PSP) CreateConfigMap() error
- func (psp *PSP) CreatePODSettingAttributes(hostPID *bool, hostIPC *bool, hostNetwork *bool, probe *audit.Probe) (*apiv1.Pod, error)
- func (psp *PSP) CreatePODSettingCapabilities(c *[]string, probe *audit.Probe) (*apiv1.Pod, error)
- func (psp *PSP) CreatePODSettingSecurityContext(pr *bool, pe *bool, runAsUser *int64, probe *audit.Probe) (*apiv1.Pod, error)
- func (psp *PSP) CreatePODWithCapabilities(capAdd []string, capDrop []string, probe *audit.Probe) (*apiv1.Pod, error)
- func (psp *PSP) CreatePodFromYaml(y []byte, probe *audit.Probe) (*apiv1.Pod, error)
- func (psp *PSP) DeleteConfigMap() error
- func (psp *PSP) ExecCmd(pName *string, cmd string, probe *audit.Probe) (*kubernetes.CmdExecutionResult, error)
- func (psp *PSP) ExecPSPProbeCmd(pName *string, cmd PSPProbeCommand, probe *audit.Probe) (*kubernetes.CmdExecutionResult, error)
- func (psp *PSP) HostIPCIsRestricted() (*bool, error)
- func (psp *PSP) HostNetworkIsRestricted() (*bool, error)
- func (psp *PSP) HostPIDIsRestricted() (*bool, error)
- func (psp *PSP) HostPortsAreRestricted() (*bool, error)
- func (psp *PSP) PrivilegedAccessIsRestricted() (*bool, error)
- func (psp *PSP) PrivilegedEscalationIsRestricted() (*bool, error)
- func (psp *PSP) RootUserIsRestricted() (*bool, error)
- func (psp *PSP) SeccompProfilesAreRestricted() (*bool, error)
- func (psp *PSP) TeardownPodSecurityProbe(p string, e string) error
- func (psp *PSP) VolumeTypesAreRestricted() (*bool, error)
- type PSPProbeCommand
- type PodSecurityPolicy
- type PrivilegedAccess
- type ProbeStruct
- type SecurityPolicyProvider
- type VerificationProbe
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func SetPodSecurityPolicy ¶
func SetPodSecurityPolicy(p PodSecurityPolicy)
SetPodSecurityPolicy allows injection of a specific PodSecurityPolicy helper.
func TestAllowedCapabilitiesAreRestricted ¶ added in v0.7.1
func TestAssignedCapabilitiesAreRestricted ¶ added in v0.7.1
func TestClusterHasPSP ¶ added in v0.7.1
func TestCreatePODSettingAttributes ¶ added in v0.7.1
func TestCreatePODSettingCapabilities ¶ added in v0.7.1
func TestCreatePODSettingSecurityContext ¶ added in v0.7.1
func TestHostIPCIsRestricted ¶ added in v0.7.1
func TestHostNetworkIsRestricted ¶ added in v0.7.1
func TestHostPIDIsRestricted ¶ added in v0.7.1
func TestHostPortsAreRestricted ¶ added in v0.7.1
func TestPSPProbeCommand ¶ added in v0.7.1
func TestPrivilegedAccessIsRestricted ¶ added in v0.7.1
func TestPrivilegedEscalationIsRestricted ¶ added in v0.7.1
func TestRootUserIsRestricted ¶ added in v0.7.1
func TestSeccompProfilesAreRestricted ¶ added in v0.7.1
func TestVolumeTypesAreRestricted ¶ added in v0.7.1
Types ¶
type AzK8sConstraintTemplate ¶
type AzK8sConstraintTemplate struct {
// contains filtered or unexported fields
}
AzK8sConstraintTemplate captures the Azure specific constraint templates that are the result of applying an Azure Policy which can be used to support PodSecurityPolicy like behaviour. Implements securitypolicyprovider and is the preferred way of determining constraints on an AKS cluster.
func NewAzK8sConstraintTemplate ¶
func NewAzK8sConstraintTemplate(k kubernetes.Kubernetes) *AzK8sConstraintTemplate
NewAzK8sConstraintTemplate constructs a new AzK8sConstraintTemplate using the supplied kubernetes instance.
func NewDefaultAzK8sConstraintTemplate ¶
func NewDefaultAzK8sConstraintTemplate() *AzK8sConstraintTemplate
NewDefaultAzK8sConstraintTemplate constructs a new AzK8sConstraintTemplate using the default kubernetes instance.
func (*AzK8sConstraintTemplate) HasAllowPrivilegeEscalationRestriction ¶
func (az *AzK8sConstraintTemplate) HasAllowPrivilegeEscalationRestriction() (*bool, error)
HasAllowPrivilegeEscalationRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasAllowedCapabilitiesRestriction ¶
func (az *AzK8sConstraintTemplate) HasAllowedCapabilitiesRestriction() (*bool, error)
HasAllowedCapabilitiesRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasAssignedCapabilitiesRestriction ¶
func (az *AzK8sConstraintTemplate) HasAssignedCapabilitiesRestriction() (*bool, error)
HasAssignedCapabilitiesRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasHostIPCRestriction ¶
func (az *AzK8sConstraintTemplate) HasHostIPCRestriction() (*bool, error)
HasHostIPCRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasHostNetworkRestriction ¶
func (az *AzK8sConstraintTemplate) HasHostNetworkRestriction() (*bool, error)
HasHostNetworkRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasHostPIDRestriction ¶
func (az *AzK8sConstraintTemplate) HasHostPIDRestriction() (*bool, error)
HasHostPIDRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasHostPortRestriction ¶
func (az *AzK8sConstraintTemplate) HasHostPortRestriction() (*bool, error)
HasHostPortRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasPrivilegedAccessRestriction ¶
func (az *AzK8sConstraintTemplate) HasPrivilegedAccessRestriction() (*bool, error)
HasPrivilegedAccessRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasRootUserRestriction ¶
func (az *AzK8sConstraintTemplate) HasRootUserRestriction() (*bool, error)
HasRootUserRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasSeccompProfileRestriction ¶
func (az *AzK8sConstraintTemplate) HasSeccompProfileRestriction() (*bool, error)
HasSeccompProfileRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasSecurityPolicies ¶
func (az *AzK8sConstraintTemplate) HasSecurityPolicies() (*bool, error)
HasSecurityPolicies provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
func (*AzK8sConstraintTemplate) HasVolumeTypeRestriction ¶
func (az *AzK8sConstraintTemplate) HasVolumeTypeRestriction() (*bool, error)
HasVolumeTypeRestriction provides the AzK8sConstraintTemplate implementation of SecurityPolicyProvider.
type KubePodSecurityPolicyProvider ¶
type KubePodSecurityPolicyProvider struct {
// contains filtered or unexported fields
}
KubePodSecurityPolicyProvider implements SecurityPolicyProvider and looks for kubernetes PodSecurityPolices.
func NewKubePodSecurityPolicyProvider ¶
func NewKubePodSecurityPolicyProvider(k kubernetes.Kubernetes) *KubePodSecurityPolicyProvider
NewKubePodSecurityPolicyProvider creates a new KubePodSecurityPolicyProvider with the supplied kubernetes instance.
func (*KubePodSecurityPolicyProvider) HasAllowPrivilegeEscalationRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasAllowPrivilegeEscalationRestriction() (*bool, error)
HasAllowPrivilegeEscalationRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasAllowedCapabilitiesRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasAllowedCapabilitiesRestriction() (*bool, error)
HasAllowedCapabilitiesRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasAssignedCapabilitiesRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasAssignedCapabilitiesRestriction() (*bool, error)
HasAssignedCapabilitiesRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasHostIPCRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasHostIPCRestriction() (*bool, error)
HasHostIPCRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasHostNetworkRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasHostNetworkRestriction() (*bool, error)
HasHostNetworkRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasHostPIDRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasHostPIDRestriction() (*bool, error)
HasHostPIDRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasHostPortRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasHostPortRestriction() (*bool, error)
HasHostPortRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasPrivilegedAccessRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasPrivilegedAccessRestriction() (*bool, error)
HasPrivilegedAccessRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasRootUserRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasRootUserRestriction() (*bool, error)
HasRootUserRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasSeccompProfileRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasSeccompProfileRestriction() (*bool, error)
HasSeccompProfileRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasSecurityPolicies ¶
func (p *KubePodSecurityPolicyProvider) HasSecurityPolicies() (*bool, error)
HasSecurityPolicies provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
func (*KubePodSecurityPolicyProvider) HasVolumeTypeRestriction ¶
func (p *KubePodSecurityPolicyProvider) HasVolumeTypeRestriction() (*bool, error)
HasVolumeTypeRestriction provides the KubePodSecurityPolicyProvider implementation of SecurityPolicyProvider.
type PSP ¶
type PSP struct {
// contains filtered or unexported fields
}
PSP implements PodSecurityPolicy.
func NewDefaultPSP ¶
func NewDefaultPSP() *PSP
NewDefaultPSP creates a new PSP using the default kubernetes instance and the pre-defined SecurityPolicyProviders.
func NewPSP ¶
func NewPSP(k kubernetes.Kubernetes, sp *[]SecurityPolicyProvider) *PSP
NewPSP creates a new PSP using the supplied kubernetes instance and collection of SecurityPolicyProviders.
func (*PSP) AllowedCapabilitiesAreRestricted ¶
AllowedCapabilitiesAreRestricted looks for a SecurityPolicyProvider where allowed capabilities are restricted.
func (*PSP) AssignedCapabilitiesAreRestricted ¶
AssignedCapabilitiesAreRestricted looks for a SecurityPolicyProvider where assigned capabilities are restricted.
func (*PSP) ClusterHasPSP ¶
ClusterHasPSP determines if the cluster has any SecurityPolicyProvider's set.
func (*PSP) ClusterIsDeployed ¶
ClusterIsDeployed verifies that a suitable kubernetes cluster is deployed.
func (*PSP) CreateConfigMap ¶
CreateConfigMap creates a config map to support PSP testing.
func (*PSP) CreatePODSettingAttributes ¶
func (psp *PSP) CreatePODSettingAttributes(hostPID *bool, hostIPC *bool, hostNetwork *bool, probe *audit.Probe) (*apiv1.Pod, error)
CreatePODSettingAttributes creates a POD with attributes: hostPID *bool - set the hostPID flag, defaults to false hostIPC *bool - set the hostIPC flag, defaults to false hostNetwork *bool - set the hostNetwork flag, defaults to false
func (*PSP) CreatePODSettingCapabilities ¶
CreatePODSettingCapabilities creates a pod with the supplied capabilities.
func (*PSP) CreatePODSettingSecurityContext ¶
func (psp *PSP) CreatePODSettingSecurityContext(pr *bool, pe *bool, runAsUser *int64, probe *audit.Probe) (*apiv1.Pod, error)
CreatePODSettingSecurityContext creates POD with a SecurityContext conforming to the parameters: pr *bool - set the Privileged flag. Defaults to false. pe *bool - set the Allow Privileged Escalation flag. Defaults to false. runAsUser *int64 - set RunAsUser. Defaults to 1000.
func (*PSP) CreatePODWithCapabilities ¶ added in v0.8.0
func (psp *PSP) CreatePODWithCapabilities(capAdd []string, capDrop []string, probe *audit.Probe) (*apiv1.Pod, error)
CreatePODWithCapabilities creates a pod with the supplied capabilities.
func (*PSP) CreatePodFromYaml ¶
CreatePodFromYaml creates a pod from the supplied yaml.
func (*PSP) DeleteConfigMap ¶
DeleteConfigMap deletes the config map supporting the PSP testing.
func (*PSP) ExecCmd ¶ added in v0.8.0
func (psp *PSP) ExecCmd(pName *string, cmd string, probe *audit.Probe) (*kubernetes.CmdExecutionResult, error)
ExecCmd executes the given cmd against the supplied pod name
func (*PSP) ExecPSPProbeCmd ¶
func (psp *PSP) ExecPSPProbeCmd(pName *string, cmd PSPProbeCommand, probe *audit.Probe) (*kubernetes.CmdExecutionResult, error)
ExecPSPProbeCmd executes the given PSPProbeCommand against the supplied pod name.
func (*PSP) HostIPCIsRestricted ¶
HostIPCIsRestricted looks for a SecurityPolicyProvider with 'HostIPC' set to false (i.e. NO Access to HostIPC ).
func (*PSP) HostNetworkIsRestricted ¶
HostNetworkIsRestricted looks for a SecurityPolicyProvider with 'HostIPC' set to false (i.e. NO Access to HostIPC ).
func (*PSP) HostPIDIsRestricted ¶
HostPIDIsRestricted looks for a SecurityPolicyProvider with 'HostPID' set to false (i.e. NO Access to HostPID ).
func (*PSP) HostPortsAreRestricted ¶
HostPortsAreRestricted looks for a SecurityPolicyProvider which has a HostPort restriction.
func (*PSP) PrivilegedAccessIsRestricted ¶
PrivilegedAccessIsRestricted looks for a SecurityPolicyProvider with 'Privileged' set to false (ie. NOT privileged).
func (*PSP) PrivilegedEscalationIsRestricted ¶
PrivilegedEscalationIsRestricted looks for a SecurityPolicyProvider with 'Privileged' set to false (ie. NOT privileged).
func (*PSP) RootUserIsRestricted ¶
RootUserIsRestricted looks for a SecurityPolicyProvider which prevents root user access.
func (*PSP) SeccompProfilesAreRestricted ¶
SeccompProfilesAreRestricted looks for a SecurityPolicyProvider which restricts seccomp profiles.
func (*PSP) TeardownPodSecurityProbe ¶
TeardownPodSecurityProbe deletes the given pod name in the PSP test namespace.
func (*PSP) VolumeTypesAreRestricted ¶
VolumeTypesAreRestricted looks for a SecurityPolicyProvider which has a VolumeType restriction.
type PSPProbeCommand ¶
type PSPProbeCommand int
PSPProbeCommand type enumerating the commands that can be used to test pods for compliance with Pod Security Policies
const ( Chroot PSPProbeCommand = iota EnterHostPIDNS EnterHostIPCNS EnterHostNetworkNS VerifyNonRootUID NetRawProbe SpecialCapProbe NetCat Ls SudoChroot PSPProbeCommand = iota )
enumn supporting PSPProbeCommand type
func (PSPProbeCommand) String ¶
func (c PSPProbeCommand) String() string
type PodSecurityPolicy ¶
type PodSecurityPolicy interface { ClusterIsDeployed() *bool ClusterHasPSP() (*bool, error) PrivilegedAccessIsRestricted() (*bool, error) HostPIDIsRestricted() (*bool, error) HostIPCIsRestricted() (*bool, error) HostNetworkIsRestricted() (*bool, error) PrivilegedEscalationIsRestricted() (*bool, error) RootUserIsRestricted() (*bool, error) AllowedCapabilitiesAreRestricted() (*bool, error) AssignedCapabilitiesAreRestricted() (*bool, error) HostPortsAreRestricted() (*bool, error) VolumeTypesAreRestricted() (*bool, error) SeccompProfilesAreRestricted() (*bool, error) CreatePODSettingSecurityContext(pr *bool, pe *bool, runAsUser *int64, probe *audit.Probe) (*apiv1.Pod, error) CreatePODSettingAttributes(hostPID *bool, hostIPC *bool, hostNetwork *bool, probe *audit.Probe) (*apiv1.Pod, error) CreatePODSettingCapabilities(c *[]string, probe *audit.Probe) (*apiv1.Pod, error) CreatePODWithCapabilities(capAdd []string, capDrop []string, probe *audit.Probe) (*apiv1.Pod, error) CreatePodFromYaml(y []byte, probe *audit.Probe) (*apiv1.Pod, error) ExecPSPProbeCmd(pName *string, cmd PSPProbeCommand, probe *audit.Probe) (*kubernetes.CmdExecutionResult, error) ExecCmd(pName *string, cmd string, probe *audit.Probe) (*kubernetes.CmdExecutionResult, error) TeardownPodSecurityProbe(p string, e string) error CreateConfigMap() error DeleteConfigMap() error }
PodSecurityPolicy interface defines a set of methods to support the testing of Pod Security Policies.
type PrivilegedAccess ¶
type PrivilegedAccess int
PrivilegedAccess type enumerating Privileged Access
const ( WithPrivilegedAccess PrivilegedAccess = iota WithoutPrivilegedAccess )
PrivilegedAccess enum
type ProbeStruct ¶
type ProbeStruct struct{}
var Probe ProbeStruct
func (ProbeStruct) Name ¶
func (p ProbeStruct) Name() string
func (ProbeStruct) Path ¶ added in v0.5.0
func (p ProbeStruct) Path() string
func (ProbeStruct) ProbeInitialize ¶
func (p ProbeStruct) ProbeInitialize(ctx *godog.TestSuiteContext)
pspProbeInitialize handles any overall Test Suite initialisation steps. This is registered with the test handler as part of the init() function.
func (ProbeStruct) ScenarioInitialize ¶
func (p ProbeStruct) ScenarioInitialize(ctx *godog.ScenarioContext)
pspScenarioInitialize initialises the specific test steps. This is essentially the creation of the test which reflects the tests described in the events directory. There must be a test step registered for each line in the feature files. Note: Godog will output stub steps and implementations if it doesn't find a step / function defined. See: https://github.com/cucumber/godog#example.
type SecurityPolicyProvider ¶
type SecurityPolicyProvider interface { HasSecurityPolicies() (*bool, error) HasPrivilegedAccessRestriction() (*bool, error) HasHostPIDRestriction() (*bool, error) HasHostIPCRestriction() (*bool, error) HasHostNetworkRestriction() (*bool, error) HasAllowPrivilegeEscalationRestriction() (*bool, error) HasRootUserRestriction() (*bool, error) HasAllowedCapabilitiesRestriction() (*bool, error) HasAssignedCapabilitiesRestriction() (*bool, error) HasHostPortRestriction() (*bool, error) HasVolumeTypeRestriction() (*bool, error) HasSeccompProfileRestriction() (*bool, error) }
SecurityPolicyProvider defines a set of methods for interrogating the security policies set on the kubernetes cluster.
type VerificationProbe ¶
type VerificationProbe struct { Cmd PSPProbeCommand ExpectedExitCode int }
PSPVerificationProbe encapsulates the command and expected result to be used in a Pod Security Policy probe.