mirror of https://github.com/k3s-io/k3s
parent
5e63ef0adb
commit
ce6f716ffd
|
@ -8657,9 +8657,6 @@
|
|||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
|
|
@ -6169,9 +6169,6 @@
|
|||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
|
|
@ -8657,9 +8657,6 @@
|
|||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
|
|
@ -3353,9 +3353,6 @@
|
|||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
|
|
@ -3408,9 +3408,6 @@
|
|||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
|
|
@ -3408,9 +3408,6 @@
|
|||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
|
|
@ -9353,9 +9353,6 @@
|
|||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
|
|
@ -22533,9 +22533,6 @@
|
|||
"v1.SecurityContext": {
|
||||
"id": "v1.SecurityContext",
|
||||
"description": "SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.",
|
||||
"required": [
|
||||
"procMount"
|
||||
],
|
||||
"properties": {
|
||||
"capabilities": {
|
||||
"$ref": "v1.Capabilities",
|
||||
|
|
|
@ -6757,7 +6757,7 @@ Examples:<br>
|
|||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
|
|
@ -6617,7 +6617,7 @@ Examples:<br>
|
|||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
|
|
@ -6896,7 +6896,7 @@ Examples:<br>
|
|||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
|
|
@ -5388,7 +5388,7 @@ Examples:<br>
|
|||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
|
|
@ -5525,7 +5525,7 @@ Examples:<br>
|
|||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
|
|
@ -5326,7 +5326,7 @@ Examples:<br>
|
|||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
|
|
@ -7542,7 +7542,7 @@ If PodSelector is also set, then the NetworkPolicyPeer as a whole selects the Po
|
|||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
|
|
@ -5083,7 +5083,7 @@ Examples:<br>
|
|||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1_procmounttype">v1.ProcMountType</a></p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
</tr>
|
||||
|
|
Loading…
Reference in New Issue