mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-29 14:37:00 +00:00
Fix comment in CRI run_as_group.
Signed-off-by: Lantao Liu <lantaol@google.com>
This commit is contained in:
parent
5ae7bba496
commit
5d6f356b91
@ -557,7 +557,8 @@ type LinuxSandboxSecurityContext struct {
|
|||||||
SelinuxOptions *SELinuxOption `protobuf:"bytes,2,opt,name=selinux_options,json=selinuxOptions" json:"selinux_options,omitempty"`
|
SelinuxOptions *SELinuxOption `protobuf:"bytes,2,opt,name=selinux_options,json=selinuxOptions" json:"selinux_options,omitempty"`
|
||||||
// UID to run sandbox processes as, when applicable.
|
// UID to run sandbox processes as, when applicable.
|
||||||
RunAsUser *Int64Value `protobuf:"bytes,3,opt,name=run_as_user,json=runAsUser" json:"run_as_user,omitempty"`
|
RunAsUser *Int64Value `protobuf:"bytes,3,opt,name=run_as_user,json=runAsUser" json:"run_as_user,omitempty"`
|
||||||
// GID to run sandbox processes as, when applicable.
|
// GID to run sandbox processes as, when applicable. run_as_group should only
|
||||||
|
// be specified when run_as_user is specified; otherwise, the runtime MUST error.
|
||||||
RunAsGroup *Int64Value `protobuf:"bytes,8,opt,name=run_as_group,json=runAsGroup" json:"run_as_group,omitempty"`
|
RunAsGroup *Int64Value `protobuf:"bytes,8,opt,name=run_as_group,json=runAsGroup" json:"run_as_group,omitempty"`
|
||||||
// If set, the root filesystem of the sandbox is read-only.
|
// If set, the root filesystem of the sandbox is read-only.
|
||||||
ReadonlyRootfs bool `protobuf:"varint,4,opt,name=readonly_rootfs,json=readonlyRootfs,proto3" json:"readonly_rootfs,omitempty"`
|
ReadonlyRootfs bool `protobuf:"varint,4,opt,name=readonly_rootfs,json=readonlyRootfs,proto3" json:"readonly_rootfs,omitempty"`
|
||||||
@ -1465,8 +1466,9 @@ type LinuxContainerSecurityContext struct {
|
|||||||
// UID to run the container process as. Only one of run_as_user and
|
// UID to run the container process as. Only one of run_as_user and
|
||||||
// run_as_username can be specified at a time.
|
// run_as_username can be specified at a time.
|
||||||
RunAsUser *Int64Value `protobuf:"bytes,5,opt,name=run_as_user,json=runAsUser" json:"run_as_user,omitempty"`
|
RunAsUser *Int64Value `protobuf:"bytes,5,opt,name=run_as_user,json=runAsUser" json:"run_as_user,omitempty"`
|
||||||
// GID to run the container process as. Only one of run_as_group and
|
// GID to run the container process as. run_as_group should only be specified
|
||||||
// run_as_groupname can be specified at a time.
|
// when run_as_user or run_as_username is specified; otherwise, the runtime
|
||||||
|
// MUST error.
|
||||||
RunAsGroup *Int64Value `protobuf:"bytes,12,opt,name=run_as_group,json=runAsGroup" json:"run_as_group,omitempty"`
|
RunAsGroup *Int64Value `protobuf:"bytes,12,opt,name=run_as_group,json=runAsGroup" json:"run_as_group,omitempty"`
|
||||||
// User name to run the container process as. If specified, the user MUST
|
// User name to run the container process as. If specified, the user MUST
|
||||||
// exist in the container image (i.e. in the /etc/passwd inside the image),
|
// exist in the container image (i.e. in the /etc/passwd inside the image),
|
||||||
|
@ -237,7 +237,8 @@ message LinuxSandboxSecurityContext {
|
|||||||
SELinuxOption selinux_options = 2;
|
SELinuxOption selinux_options = 2;
|
||||||
// UID to run sandbox processes as, when applicable.
|
// UID to run sandbox processes as, when applicable.
|
||||||
Int64Value run_as_user = 3;
|
Int64Value run_as_user = 3;
|
||||||
// GID to run sandbox processes as, when applicable.
|
// GID to run sandbox processes as, when applicable. run_as_group should only
|
||||||
|
// be specified when run_as_user is specified; otherwise, the runtime MUST error.
|
||||||
Int64Value run_as_group = 8;
|
Int64Value run_as_group = 8;
|
||||||
// If set, the root filesystem of the sandbox is read-only.
|
// If set, the root filesystem of the sandbox is read-only.
|
||||||
bool readonly_rootfs = 4;
|
bool readonly_rootfs = 4;
|
||||||
@ -555,8 +556,9 @@ message LinuxContainerSecurityContext {
|
|||||||
// UID to run the container process as. Only one of run_as_user and
|
// UID to run the container process as. Only one of run_as_user and
|
||||||
// run_as_username can be specified at a time.
|
// run_as_username can be specified at a time.
|
||||||
Int64Value run_as_user = 5;
|
Int64Value run_as_user = 5;
|
||||||
// GID to run the container process as. Only one of run_as_group and
|
// GID to run the container process as. run_as_group should only be specified
|
||||||
// run_as_groupname can be specified at a time.
|
// when run_as_user or run_as_username is specified; otherwise, the runtime
|
||||||
|
// MUST error.
|
||||||
Int64Value run_as_group = 12;
|
Int64Value run_as_group = 12;
|
||||||
// User name to run the container process as. If specified, the user MUST
|
// User name to run the container process as. If specified, the user MUST
|
||||||
// exist in the container image (i.e. in the /etc/passwd inside the image),
|
// exist in the container image (i.e. in the /etc/passwd inside the image),
|
||||||
|
Loading…
Reference in New Issue
Block a user