b564454bab
Where possible, use securityContext settings which will work with the most restrictive Pod Security Admission policy level (as of Kube 1.25). Where privileged containers are needed, use the namespace-level annotation to allow them. Also adjust some integration tests to make similar changes to allow the integration tests to pass on test clusters which use restricted PSAs. |
||
---|---|---|
.. | ||
browsertest | ||
access.go | ||
activedirectory.go | ||
assertions.go | ||
cli.go | ||
client.go | ||
env.go | ||
iotest.go | ||
iplookup_go1.14.go | ||
iplookup.go | ||
securetls_preference_fips.go | ||
securetls_preference_nonfips.go | ||
securetls.go | ||
skip.go | ||
spew.go |