Documentation ¶
Overview ¶
OPR-R22-RBAC - ClusterRole has full permissions over admission controllers
OPR-R4-SC - securityContext set to allowPrivilegeEscalation: true
OPR-R17-RBAC - ClusterRole has bind permissions ¶
OPR-R9-SC - securityContext adds CAP_SYS_ADMIN Linux capability
OPR-R10-RBAC - Runs as Cluster Admin ¶
OPR-R21-RBAC - ClusterRole has full permissions over any custom resource definitions ¶
OPR-R1-NS - default namespace ¶
OPR-R16-RBAC - ClusterRole has escalate permissions ¶
OPR-R15-RBAC - ClusterRole can exec into Pods ¶
OPR-R18-RBAC - ClusterRole has impersonate permissions ¶
OPR-R2-NS - kube-system namespace ¶
OPR-R19-RBAC - ClusterRole can modify pod logs ¶
OPR-R25-RBAC - ClusterRole has read, write or delete permissions over network policies ¶
OPR-R3-SC - No securityContext ¶
OPR-R26-RBAC - ClusterRole has permissions over the Kubernetes API server proxy ¶
OPR-R24-RBAC - ClusterRole has read, write or delete permissions over persistent volumes ¶
OPR-R5-SC - securityContext set to privileged: true
OPR-R6-SC - securityContext set to readOnlyRootFilesystem: false
OPR-R20-RBAC - ClusterRole can remove Kubernetes events ¶
OPR-R7-SC - securityContext set to runAsNonRoot: false
OPR-R8-SC - securityContext set to runAsUser: 0
OPR-R14-RBAC - ClusterRole has access to Kubernetes secrets ¶
OPR-R23-RBAC - ClusterRole has permissions over service account token creation ¶
OPR-R11-RBAC - ClusterRole has full permissions over all resources ¶
OPR-R12-RBAC - ClusterRole has full permissions over all CoreAPI resources ¶
OPR-R13-RBAC - ClusterRole has full permissions over ClusterRoles and ClusterRoleBindings
Index ¶
- func AdmissionControllerClusterRole(input []byte) int
- func AllowPrivilegeEscalation(json []byte) int
- func BindClusterRole(input []byte) int
- func CapSysAdmin(json []byte) int
- func ClusterAdmin(json []byte) int
- func CustomResourceClusterRole(input []byte) int
- func DefaultNamespace(json []byte) int
- func EscalateClusterRole(input []byte) int
- func ExecPodsClusterRole(input []byte) int
- func ImpersonateClusterRole(input []byte) int
- func KubeSystemNamespace(json []byte) int
- func ModifyPodLogsClusterRole(input []byte) int
- func NetworkPolicyClusterRole(input []byte) int
- func NoSecurityContext(json []byte) int
- func NodeProxyClusterRole(input []byte) int
- func PersistentVolumeClusterRole(input []byte) int
- func Privileged(json []byte) int
- func ReadOnlyRootFilesystem(json []byte) int
- func RemoveEventsClusterRole(input []byte) int
- func RunAsNonRoot(json []byte) int
- func RunAsUser(json []byte) int
- func SecretsClusterRole(input []byte) int
- func ServiceAccountClusterRole(input []byte) int
- func StarAllClusterRole(input []byte) int
- func StarAllCoreAPIClusterRole(input []byte) int
- func StarClusterRoleAndBindings(input []byte) int
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func BindClusterRole ¶
func CapSysAdmin ¶
func ClusterAdmin ¶
func DefaultNamespace ¶
func EscalateClusterRole ¶
func ExecPodsClusterRole ¶
func ImpersonateClusterRole ¶
func KubeSystemNamespace ¶
func NoSecurityContext ¶
func NodeProxyClusterRole ¶
func Privileged ¶
func ReadOnlyRootFilesystem ¶
func RemoveEventsClusterRole ¶
func RunAsNonRoot ¶
func SecretsClusterRole ¶
func StarAllClusterRole ¶
Types ¶
This section is empty.
Source Files ¶
- admissionControllerClusterRole.go
- allowPrivilegeEscalation.go
- bindClusterRole.go
- capSysAdmin.go
- clusterAdmin.go
- customResourceClusterRole.go
- defaultNamespace.go
- escalateClusterRole.go
- execPodsClusterRole.go
- impersonateClusterRole.go
- kubesystemNamespace.go
- modifyPodLogsClusterRole.go
- networkPolicyClusterRole.go
- noSecurityContext.go
- nodeProxyClusterRole.go
- persistentVolumesClusterRole.go
- privileged.go
- readOnlyRootFilesystem.go
- removeEventsClusterRole.go
- runAsNonRoot.go
- runAsUser.go
- secretsClusterRole.go
- selector.go
- serviceAccountClusterRole.go
- slice.go
- starAllClusterRole.go
- starAllCoreAPIClusterRole.go
- starClusterRoleAndBindings.go
Click to show internal directories.
Click to hide internal directories.