Skip to content

Commit d3a4f2e

Browse files
authored
Merge pull request #31486 from liggitt/pss
Pod Security Standards doc updates
2 parents 2309413 + 4ca5ff6 commit d3a4f2e

File tree

1 file changed

+11
-43
lines changed

1 file changed

+11
-43
lines changed

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 11 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -305,34 +305,22 @@ fail validation.
305305
<tr>
306306
<td style="white-space: nowrap">Volume Types</td>
307307
<td>
308-
<p>In addition to restricting HostPath volumes, the restricted policy limits usage of non-core volume types to those defined through PersistentVolumes.</p>
308+
<p>The restricted policy only permits the following volume types.</p>
309309
<p><strong>Restricted Fields</strong></p>
310310
<ul>
311-
<li><code>spec.volumes[*].hostPath</code></li>
312-
<li><code>spec.volumes[*].gcePersistentDisk</code></li>
313-
<li><code>spec.volumes[*].awsElasticBlockStore</code></li>
314-
<li><code>spec.volumes[*].gitRepo</code></li>
315-
<li><code>spec.volumes[*].nfs</code></li>
316-
<li><code>spec.volumes[*].iscsi</code></li>
317-
<li><code>spec.volumes[*].glusterfs</code></li>
318-
<li><code>spec.volumes[*].rbd</code></li>
319-
<li><code>spec.volumes[*].flexVolume</code></li>
320-
<li><code>spec.volumes[*].cinder</code></li>
321-
<li><code>spec.volumes[*].cephfs</code></li>
322-
<li><code>spec.volumes[*].flocker</code></li>
323-
<li><code>spec.volumes[*].fc</code></li>
324-
<li><code>spec.volumes[*].azureFile</code></li>
325-
<li><code>spec.volumes[*].vsphereVolume</code></li>
326-
<li><code>spec.volumes[*].quobyte</code></li>
327-
<li><code>spec.volumes[*].azureDisk</code></li>
328-
<li><code>spec.volumes[*].portworxVolume</code></li>
329-
<li><code>spec.volumes[*].scaleIO</code></li>
330-
<li><code>spec.volumes[*].storageos</code></li>
331-
<li><code>spec.volumes[*].photonPersistentDisk</code></li>
311+
<li><code>spec.volumes[*]</code></li>
332312
</ul>
333313
<p><strong>Allowed Values</strong></p>
314+
Every item in the <code>spec.volumes[*]</code> list must set one of the following fields to a non-null value:
334315
<ul>
335-
<li>Undefined/nil</li>
316+
<li><code>spec.volumes[*].configMap</code></li>
317+
<li><code>spec.volumes[*].csi</code></li>
318+
<li><code>spec.volumes[*].downwardAPI</code></li>
319+
<li><code>spec.volumes[*].emptyDir</code></li>
320+
<li><code>spec.volumes[*].ephemeral</code></li>
321+
<li><code>spec.volumes[*].persistentVolumeClaim</code></li>
322+
<li><code>spec.volumes[*].projected</code></li>
323+
<li><code>spec.volumes[*].secret</code></li>
336324
</ul>
337325
</td>
338326
</tr>
@@ -391,26 +379,6 @@ fail validation.
391379
</ul>
392380
</td>
393381
</tr>
394-
<tr>
395-
<td style="white-space: nowrap">Non-root groups <em>(optional)</em></td>
396-
<td>
397-
<p>Containers should be forbidden from running with a root primary or supplementary GID.</p>
398-
<p><strong>Restricted Fields</strong></p>
399-
<ul>
400-
<li><code>spec.securityContext.runAsGroup</code></li>
401-
<li><code>spec.securityContext.supplementalGroups[*]</code></li>
402-
<li><code>spec.securityContext.fsGroup</code></li>
403-
<li><code>spec.containers[*].securityContext.runAsGroup</code></li>
404-
<li><code>spec.initContainers[*].securityContext.runAsGroup</code></li>
405-
<li><code>spec.ephemeralContainers[*].securityContext.runAsGroup</code></li>
406-
</ul>
407-
<p><strong>Allowed Values</strong></p>
408-
<ul>
409-
<li>Undefined/nil (except for <code>*.runAsGroup</code>)</li>
410-
<li>Non-zero</li>
411-
</ul>
412-
</td>
413-
</tr>
414382
<tr>
415383
<td style="white-space: nowrap">Seccomp (v1.19+)</td>
416384
<td>

0 commit comments

Comments
 (0)