
com.pulumi.awsnative.batch.kotlin.outputs.JobDefinitionEksContainerSecurityContext.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-aws-native-kotlin Show documentation
Show all versions of pulumi-aws-native-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.awsnative.batch.kotlin.outputs
import kotlin.Boolean
import kotlin.Int
import kotlin.Suppress
/**
*
* @property allowPrivilegeEscalation Whether or not a container or a Kubernetes pod is allowed to gain more privileges than its parent process. The default value is `false` .
* @property privileged When this parameter is `true` , the container is given elevated permissions on the host container instance. The level of permissions are similar to the `root` user permissions. The default value is `false` . This parameter maps to `privileged` policy in the [Privileged pod security policies](https://docs.aws.amazon.com/https://kubernetes.io/docs/concepts/security/pod-security-policy/#privileged) in the *Kubernetes documentation* .
* @property readOnlyRootFilesystem When this parameter is `true` , the container is given read-only access to its root file system. The default value is `false` . This parameter maps to `ReadOnlyRootFilesystem` policy in the [Volumes and file systems pod security policies](https://docs.aws.amazon.com/https://kubernetes.io/docs/concepts/security/pod-security-policy/#volumes-and-file-systems) in the *Kubernetes documentation* .
* @property runAsGroup When this parameter is specified, the container is run as the specified group ID ( `gid` ). If this parameter isn't specified, the default is the group that's specified in the image metadata. This parameter maps to `RunAsGroup` and `MustRunAs` policy in the [Users and groups pod security policies](https://docs.aws.amazon.com/https://kubernetes.io/docs/concepts/security/pod-security-policy/#users-and-groups) in the *Kubernetes documentation* .
* @property runAsNonRoot When this parameter is specified, the container is run as a user with a `uid` other than 0. If this parameter isn't specified, so such rule is enforced. This parameter maps to `RunAsUser` and `MustRunAsNonRoot` policy in the [Users and groups pod security policies](https://docs.aws.amazon.com/https://kubernetes.io/docs/concepts/security/pod-security-policy/#users-and-groups) in the *Kubernetes documentation* .
* @property runAsUser When this parameter is specified, the container is run as the specified user ID ( `uid` ). If this parameter isn't specified, the default is the user that's specified in the image metadata. This parameter maps to `RunAsUser` and `MustRanAs` policy in the [Users and groups pod security policies](https://docs.aws.amazon.com/https://kubernetes.io/docs/concepts/security/pod-security-policy/#users-and-groups) in the *Kubernetes documentation* .
*/
public data class JobDefinitionEksContainerSecurityContext(
public val allowPrivilegeEscalation: Boolean? = null,
public val privileged: Boolean? = null,
public val readOnlyRootFilesystem: Boolean? = null,
public val runAsGroup: Int? = null,
public val runAsNonRoot: Boolean? = null,
public val runAsUser: Int? = null,
) {
public companion object {
public fun toKotlin(javaType: com.pulumi.awsnative.batch.outputs.JobDefinitionEksContainerSecurityContext): JobDefinitionEksContainerSecurityContext = JobDefinitionEksContainerSecurityContext(
allowPrivilegeEscalation = javaType.allowPrivilegeEscalation().map({ args0 -> args0 }).orElse(null),
privileged = javaType.privileged().map({ args0 -> args0 }).orElse(null),
readOnlyRootFilesystem = javaType.readOnlyRootFilesystem().map({ args0 -> args0 }).orElse(null),
runAsGroup = javaType.runAsGroup().map({ args0 -> args0 }).orElse(null),
runAsNonRoot = javaType.runAsNonRoot().map({ args0 -> args0 }).orElse(null),
runAsUser = javaType.runAsUser().map({ args0 -> args0 }).orElse(null),
)
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy