PodSecurityPolicySubjectReview checks whether a particular user/SA tuple can create the PodTemplateSpec.
object
spec
Property | Type | Description |
---|---|---|
|
|
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources |
|
|
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds |
|
|
PodSecurityPolicySubjectReviewSpec defines specification for PodSecurityPolicySubjectReview |
|
|
PodSecurityPolicySubjectReviewStatus contains information/status for PodSecurityPolicySubjectReview. |
PodSecurityPolicySubjectReviewSpec defines specification for PodSecurityPolicySubjectReview
object
template
Property | Type | Description |
---|---|---|
|
|
groups is the groups you’re testing for. |
|
template is the PodTemplateSpec to check. If template.spec.serviceAccountName is empty it will not be defaulted. If its non-empty, it will be checked. |
|
|
|
user is the user you’re testing for. If you specify "user" but not "group", then is it interpreted as "What if user were not a member of any groups. If user and groups are empty, then the check is performed using only the serviceAccountName in the template. |
PodSecurityPolicySubjectReviewStatus contains information/status for PodSecurityPolicySubjectReview.
object
Property | Type | Description |
---|---|---|
|
allowedBy is a reference to the rule that allows the PodTemplateSpec. A rule can be a SecurityContextConstraint or a PodSecurityPolicy A |
|
|
|
A machine-readable description of why this operation is in the "Failure" status. If this value is empty there is no information available. |
|
template is the PodTemplateSpec after the defaulting is applied. |
The following API endpoints are available:
/apis/security.openshift.io/v1/namespaces/{namespace}/podsecuritypolicysubjectreviews
POST
: create a PodSecurityPolicySubjectReview
Parameter | Type | Description |
---|---|---|
|
|
object name and auth scope, such as for teams and projects |
Parameter | Type | Description |
---|---|---|
|
|
If 'true', then the output is pretty printed. |
POST
create a PodSecurityPolicySubjectReview
Parameter | Type | Description |
---|---|---|
|
HTTP code | Reponse body |
---|---|
200 - OK |
|
201 - Created |
|
202 - Accepted |
|
401 - Unauthorized |
Empty |