1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2024-12-15 17:51:20 +00:00
kyverno/test/best_practices/disallow_bind_mounts.yaml

32 lines
1 KiB
YAML
Raw Normal View History

---
2019-12-10 17:51:15 +00:00
apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
2019-10-12 01:57:16 +00:00
annotations:
2019-11-12 02:21:16 +00:00
policies.kyverno.io/category: Workload Isolation
policies.kyverno.io/description: The volume of type `hostPath` allows pods to
use host bind mounts (i.e. directories and volumes mounted to a host path) in
containers. Using host resources can be used to access shared data or escalate
privileges. Also, this couples pods to a specific host and data persisted in
the `hostPath` volume is coupled to the life of the node leading to potential
pod scheduling failures. It is highly recommended that applications are designed
to be decoupled from the underlying infrastructure (in this case, nodes).
name: disallow-bind-mounts
spec:
admission: true
background: true
rules:
- match:
any:
- resources:
kinds:
- Pod
name: validate-hostPath
validate:
message: Host path volumes are not allowed
pattern:
spec:
=(volumes):
- X(hostPath): "null"
validationFailureAction: Audit