1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2024-12-15 17:51:20 +00:00
kyverno/test/more/restrict_usergroup_fsgroup_id.yaml

54 lines
1.3 KiB
YAML
Raw Normal View History

---
2019-12-10 17:51:15 +00:00
apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
annotations:
policies.kyverno.io/category: Security Context
policies.kyverno.io/description: All processes inside the pod can be made to run
with specific user and groupID by setting 'runAsUser' and 'runAsGroup' respectively.
'fsGroup' can be specified to make sure any file created in the volume with
have the specified groupID. These options can be used to validate the IDs used
for user and group.
name: validate-userid-groupid-fsgroup
2019-12-10 17:51:15 +00:00
spec:
admission: true
background: true
2019-12-10 17:51:15 +00:00
rules:
- match:
any:
- resources:
kinds:
- Pod
name: validate-userid
2019-12-10 17:51:15 +00:00
validate:
message: User ID should be 1000
2019-12-10 17:51:15 +00:00
pattern:
spec:
securityContext:
runAsUser: "1000"
- match:
any:
- resources:
kinds:
- Pod
name: validate-groupid
2019-12-10 17:51:15 +00:00
validate:
message: Group ID should be 3000
2019-12-10 17:51:15 +00:00
pattern:
spec:
securityContext:
runAsGroup: "3000"
- match:
any:
- resources:
kinds:
- Pod
name: validate-fsgroup
2019-12-10 17:51:15 +00:00
validate:
message: fsgroup should be 2000
2019-12-10 17:51:15 +00:00
pattern:
spec:
securityContext:
fsGroup: "2000"
validationFailureAction: Audit