@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class EksContainerSecurityContext extends Object implements Serializable, Cloneable, StructuredPojo
The security context for a job. For more information, see Configure a security context for a pod or container in the Kubernetes documentation.
Constructor and Description |
---|
EksContainerSecurityContext() |
Modifier and Type | Method and Description |
---|---|
EksContainerSecurityContext |
clone() |
boolean |
equals(Object obj) |
Boolean |
getPrivileged()
When this parameter is
true , the container is given elevated permissions on the host container
instance. |
Boolean |
getReadOnlyRootFilesystem()
When this parameter is
true , the container is given read-only access to its root file system. |
Long |
getRunAsGroup()
When this parameter is specified, the container is run as the specified group ID (
gid ). |
Boolean |
getRunAsNonRoot()
When this parameter is specified, the container is run as a user with a
uid other than 0. |
Long |
getRunAsUser()
When this parameter is specified, the container is run as the specified user ID (
uid ). |
int |
hashCode() |
Boolean |
isPrivileged()
When this parameter is
true , the container is given elevated permissions on the host container
instance. |
Boolean |
isReadOnlyRootFilesystem()
When this parameter is
true , the container is given read-only access to its root file system. |
Boolean |
isRunAsNonRoot()
When this parameter is specified, the container is run as a user with a
uid other than 0. |
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setPrivileged(Boolean privileged)
When this parameter is
true , the container is given elevated permissions on the host container
instance. |
void |
setReadOnlyRootFilesystem(Boolean readOnlyRootFilesystem)
When this parameter is
true , the container is given read-only access to its root file system. |
void |
setRunAsGroup(Long runAsGroup)
When this parameter is specified, the container is run as the specified group ID (
gid ). |
void |
setRunAsNonRoot(Boolean runAsNonRoot)
When this parameter is specified, the container is run as a user with a
uid other than 0. |
void |
setRunAsUser(Long runAsUser)
When this parameter is specified, the container is run as the specified user ID (
uid ). |
String |
toString()
Returns a string representation of this object.
|
EksContainerSecurityContext |
withPrivileged(Boolean privileged)
When this parameter is
true , the container is given elevated permissions on the host container
instance. |
EksContainerSecurityContext |
withReadOnlyRootFilesystem(Boolean readOnlyRootFilesystem)
When this parameter is
true , the container is given read-only access to its root file system. |
EksContainerSecurityContext |
withRunAsGroup(Long runAsGroup)
When this parameter is specified, the container is run as the specified group ID (
gid ). |
EksContainerSecurityContext |
withRunAsNonRoot(Boolean runAsNonRoot)
When this parameter is specified, the container is run as a user with a
uid other than 0. |
EksContainerSecurityContext |
withRunAsUser(Long runAsUser)
When this parameter is specified, the container is run as the specified user ID (
uid ). |
public void setRunAsUser(Long runAsUser)
When this parameter is specified, the container is run as the specified user ID (uid
). If this
parameter isn't specified, the default is the user that's specified in the image metadata. This parameter maps to
RunAsUser
and MustRanAs
policy in the Users and groups pod
security policies in the Kubernetes documentation.
runAsUser
- When this parameter is specified, the container is run as the specified user ID (uid
). If
this parameter isn't specified, the default is the user that's specified in the image metadata. This
parameter maps to RunAsUser
and MustRanAs
policy in the Users and groups
pod security policies in the Kubernetes documentation.public Long getRunAsUser()
When this parameter is specified, the container is run as the specified user ID (uid
). If this
parameter isn't specified, the default is the user that's specified in the image metadata. This parameter maps to
RunAsUser
and MustRanAs
policy in the Users and groups pod
security policies in the Kubernetes documentation.
uid
). If
this parameter isn't specified, the default is the user that's specified in the image metadata. This
parameter maps to RunAsUser
and MustRanAs
policy in the Users and
groups pod security policies in the Kubernetes documentation.public EksContainerSecurityContext withRunAsUser(Long runAsUser)
When this parameter is specified, the container is run as the specified user ID (uid
). If this
parameter isn't specified, the default is the user that's specified in the image metadata. This parameter maps to
RunAsUser
and MustRanAs
policy in the Users and groups pod
security policies in the Kubernetes documentation.
runAsUser
- When this parameter is specified, the container is run as the specified user ID (uid
). If
this parameter isn't specified, the default is the user that's specified in the image metadata. This
parameter maps to RunAsUser
and MustRanAs
policy in the Users and groups
pod security policies in the Kubernetes documentation.public void setRunAsGroup(Long runAsGroup)
When this parameter is specified, the container is run as the specified group ID (gid
). If this
parameter isn't specified, the default is the group that's specified in the image metadata. This parameter maps
to RunAsGroup
and MustRunAs
policy in the Users and groups pod
security policies in the Kubernetes documentation.
runAsGroup
- When this parameter is specified, the container is run as the specified group ID (gid
). If
this parameter isn't specified, the default is the group that's specified in the image metadata. This
parameter maps to RunAsGroup
and MustRunAs
policy in the Users and groups
pod security policies in the Kubernetes documentation.public Long getRunAsGroup()
When this parameter is specified, the container is run as the specified group ID (gid
). If this
parameter isn't specified, the default is the group that's specified in the image metadata. This parameter maps
to RunAsGroup
and MustRunAs
policy in the Users and groups pod
security policies in the Kubernetes documentation.
gid
). If
this parameter isn't specified, the default is the group that's specified in the image metadata. This
parameter maps to RunAsGroup
and MustRunAs
policy in the Users and
groups pod security policies in the Kubernetes documentation.public EksContainerSecurityContext withRunAsGroup(Long runAsGroup)
When this parameter is specified, the container is run as the specified group ID (gid
). If this
parameter isn't specified, the default is the group that's specified in the image metadata. This parameter maps
to RunAsGroup
and MustRunAs
policy in the Users and groups pod
security policies in the Kubernetes documentation.
runAsGroup
- When this parameter is specified, the container is run as the specified group ID (gid
). If
this parameter isn't specified, the default is the group that's specified in the image metadata. This
parameter maps to RunAsGroup
and MustRunAs
policy in the Users and groups
pod security policies in the Kubernetes documentation.public void setPrivileged(Boolean privileged)
When this parameter is true
, the container is given elevated permissions on the host container
instance. The level of permissions are similar to the root
user permissions. The default value is
false
. This parameter maps to privileged
policy in the Privileged pod security
policies in the Kubernetes documentation.
privileged
- When this parameter is true
, the container is given elevated permissions on the host
container instance. The level of permissions are similar to the root
user permissions. The
default value is false
. This parameter maps to privileged
policy in the Privileged pod
security policies in the Kubernetes documentation.public Boolean getPrivileged()
When this parameter is true
, the container is given elevated permissions on the host container
instance. The level of permissions are similar to the root
user permissions. The default value is
false
. This parameter maps to privileged
policy in the Privileged pod security
policies in the Kubernetes documentation.
true
, the container is given elevated permissions on the host
container instance. The level of permissions are similar to the root
user permissions. The
default value is false
. This parameter maps to privileged
policy in the Privileged pod
security policies in the Kubernetes documentation.public EksContainerSecurityContext withPrivileged(Boolean privileged)
When this parameter is true
, the container is given elevated permissions on the host container
instance. The level of permissions are similar to the root
user permissions. The default value is
false
. This parameter maps to privileged
policy in the Privileged pod security
policies in the Kubernetes documentation.
privileged
- When this parameter is true
, the container is given elevated permissions on the host
container instance. The level of permissions are similar to the root
user permissions. The
default value is false
. This parameter maps to privileged
policy in the Privileged pod
security policies in the Kubernetes documentation.public Boolean isPrivileged()
When this parameter is true
, the container is given elevated permissions on the host container
instance. The level of permissions are similar to the root
user permissions. The default value is
false
. This parameter maps to privileged
policy in the Privileged pod security
policies in the Kubernetes documentation.
true
, the container is given elevated permissions on the host
container instance. The level of permissions are similar to the root
user permissions. The
default value is false
. This parameter maps to privileged
policy in the Privileged pod
security policies in the Kubernetes documentation.public void setReadOnlyRootFilesystem(Boolean readOnlyRootFilesystem)
When this parameter is true
, the container is given read-only access to its root file system. The
default value is false
. This parameter maps to ReadOnlyRootFilesystem
policy in the Volumes and
file systems pod security policies in the Kubernetes documentation.
readOnlyRootFilesystem
- When this parameter is true
, the container is given read-only access to its root file system.
The default value is false
. This parameter maps to ReadOnlyRootFilesystem
policy
in the Volumes
and file systems pod security policies in the Kubernetes documentation.public Boolean getReadOnlyRootFilesystem()
When this parameter is true
, the container is given read-only access to its root file system. The
default value is false
. This parameter maps to ReadOnlyRootFilesystem
policy in the Volumes and
file systems pod security policies in the Kubernetes documentation.
true
, the container is given read-only access to its root file
system. The default value is false
. This parameter maps to
ReadOnlyRootFilesystem
policy in the Volumes
and file systems pod security policies in the Kubernetes documentation.public EksContainerSecurityContext withReadOnlyRootFilesystem(Boolean readOnlyRootFilesystem)
When this parameter is true
, the container is given read-only access to its root file system. The
default value is false
. This parameter maps to ReadOnlyRootFilesystem
policy in the Volumes and
file systems pod security policies in the Kubernetes documentation.
readOnlyRootFilesystem
- When this parameter is true
, the container is given read-only access to its root file system.
The default value is false
. This parameter maps to ReadOnlyRootFilesystem
policy
in the Volumes
and file systems pod security policies in the Kubernetes documentation.public Boolean isReadOnlyRootFilesystem()
When this parameter is true
, the container is given read-only access to its root file system. The
default value is false
. This parameter maps to ReadOnlyRootFilesystem
policy in the Volumes and
file systems pod security policies in the Kubernetes documentation.
true
, the container is given read-only access to its root file
system. The default value is false
. This parameter maps to
ReadOnlyRootFilesystem
policy in the Volumes
and file systems pod security policies in the Kubernetes documentation.public void setRunAsNonRoot(Boolean runAsNonRoot)
When this parameter is specified, the container is run as a user with a uid
other than 0. If this
parameter isn't specified, so such rule is enforced. This parameter maps to RunAsUser
and
MustRunAsNonRoot
policy in the Users and groups pod
security policies in the Kubernetes documentation.
runAsNonRoot
- When this parameter is specified, the container is run as a user with a uid
other than 0. If
this parameter isn't specified, so such rule is enforced. This parameter maps to RunAsUser
and MustRunAsNonRoot
policy in the Users and groups
pod security policies in the Kubernetes documentation.public Boolean getRunAsNonRoot()
When this parameter is specified, the container is run as a user with a uid
other than 0. If this
parameter isn't specified, so such rule is enforced. This parameter maps to RunAsUser
and
MustRunAsNonRoot
policy in the Users and groups pod
security policies in the Kubernetes documentation.
uid
other than 0. If
this parameter isn't specified, so such rule is enforced. This parameter maps to RunAsUser
and MustRunAsNonRoot
policy in the Users and
groups pod security policies in the Kubernetes documentation.public EksContainerSecurityContext withRunAsNonRoot(Boolean runAsNonRoot)
When this parameter is specified, the container is run as a user with a uid
other than 0. If this
parameter isn't specified, so such rule is enforced. This parameter maps to RunAsUser
and
MustRunAsNonRoot
policy in the Users and groups pod
security policies in the Kubernetes documentation.
runAsNonRoot
- When this parameter is specified, the container is run as a user with a uid
other than 0. If
this parameter isn't specified, so such rule is enforced. This parameter maps to RunAsUser
and MustRunAsNonRoot
policy in the Users and groups
pod security policies in the Kubernetes documentation.public Boolean isRunAsNonRoot()
When this parameter is specified, the container is run as a user with a uid
other than 0. If this
parameter isn't specified, so such rule is enforced. This parameter maps to RunAsUser
and
MustRunAsNonRoot
policy in the Users and groups pod
security policies in the Kubernetes documentation.
uid
other than 0. If
this parameter isn't specified, so such rule is enforced. This parameter maps to RunAsUser
and MustRunAsNonRoot
policy in the Users and
groups pod security policies in the Kubernetes documentation.public String toString()
toString
in class Object
Object.toString()
public EksContainerSecurityContext clone()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.