PodSecurityPolicySubjectReview [security.openshift.io/v1]

Description

PodSecurityPolicySubjectReview checks whether a particular user/SA tuple can create the PodTemplateSpec.

Type

object

Required

  • spec

Specification

PropertyTypeDescription

apiVersion

string

APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources

kind

string

Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds

spec

object

PodSecurityPolicySubjectReviewSpec defines specification for PodSecurityPolicySubjectReview

status

object

PodSecurityPolicySubjectReviewStatus contains information/status for PodSecurityPolicySubjectReview.

.spec

Description

PodSecurityPolicySubjectReviewSpec defines specification for PodSecurityPolicySubjectReview

Type

object

Required

  • template
PropertyTypeDescription

groups

array (string)

groups is the groups you’re testing for.

template

PodTemplateSpec core/v1

template is the PodTemplateSpec to check. If template.spec.serviceAccountName is empty it will not be defaulted. If its non-empty, it will be checked.

user

string

user is the user you’re testing for. If you specify “user” but not “group”, then is it interpreted as “What if user were not a member of any groups. If user and groups are empty, then the check is performed using only the serviceAccountName in the template.

.status

Description

PodSecurityPolicySubjectReviewStatus contains information/status for PodSecurityPolicySubjectReview.

Type

object

PropertyTypeDescription

allowedBy

ObjectReference core/v1

allowedBy is a reference to the rule that allows the PodTemplateSpec. A rule can be a SecurityContextConstraint or a PodSecurityPolicy A nil, indicates that it was denied.

reason

string

A machine-readable description of why this operation is in the “Failure” status. If this value is empty there is no information available.

template

PodTemplateSpec core/v1

template is the PodTemplateSpec after the defaulting is applied.

API endpoints

The following API endpoints are available:

  • /apis/security.openshift.io/v1/namespaces/{namespace}/podsecuritypolicysubjectreviews

    • POST: create a PodSecurityPolicySubjectReview

/apis/security.openshift.io/v1/namespaces/{namespace}/podsecuritypolicysubjectreviews

Table 1. Global path parameters
ParameterTypeDescription

namespace

string

object name and auth scope, such as for teams and projects

Table 2. Global query parameters
ParameterTypeDescription

dryRun

string

When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed

fieldManager

string

fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.

pretty

string

If ‘true’, then the output is pretty printed.

HTTP method

POST

Description

create a PodSecurityPolicySubjectReview

Table 3. Body parameters
ParameterTypeDescription

body

PodSecurityPolicySubjectReview security.openshift.io/v1

Table 4. HTTP responses
HTTP codeReponse body

200 - OK

PodSecurityPolicySubjectReview security.openshift.io/v1