mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
add disallow_priviledged_privelegesecalation.yaml
This commit is contained in:
parent
8f8bd05106
commit
0c0a9a69a6
6 changed files with 23 additions and 23 deletions
|
@ -23,7 +23,7 @@ func Test_validate_deny_runasrootuser(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func Test_validate_disallow_priviledgedprivelegesecalation(t *testing.T) {
|
func Test_validate_disallow_priviledgedprivelegesecalation(t *testing.T) {
|
||||||
testScenario(t, "test/scenarios/test/scenario_validate_container_disallow_priviledgedprivelegesecalation.yaml")
|
testScenario(t, "test/scenarios/test/scenario_validate_disallow_priviledged_privelegesecalation.yaml")
|
||||||
}
|
}
|
||||||
|
|
||||||
func Test_validate_healthChecks(t *testing.T) {
|
func Test_validate_healthChecks(t *testing.T) {
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
|
|
||||||
| Best practice | Policy
|
| Best practice | Policy
|
||||||
|------------------------------------------------|-----------------------------------------------------------------------|
|
|------------------------------------------------|-----------------------------------------------------------------------|
|
||||||
| Run as non-root user | [policy_validate_deny_runasrootuser.yaml](best_practices/policy_validate_deny_runasrootuser.yaml) |
|
| Run as non-root user | [deny_runasrootuser.yaml](best_practices/deny_runasrootuser.yaml) |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -1,11 +1,11 @@
|
||||||
apiVersion: kyverno.io/v1alpha1
|
apiVersion: kyverno.io/v1alpha1
|
||||||
kind: ClusterPolicy
|
kind: ClusterPolicy
|
||||||
metadata:
|
metadata:
|
||||||
name: validate-deny-privileged-disallowpriviligedescalation
|
name: validate-deny-privileged-priviligedescalation
|
||||||
spec:
|
spec:
|
||||||
validationFailureAction: "audit"
|
validationFailureAction: "audit"
|
||||||
rules:
|
rules:
|
||||||
- name: deny-privileged-disallowpriviligedescalation
|
- name: deny-privileged-priviligedescalation
|
||||||
exclude:
|
exclude:
|
||||||
match:
|
match:
|
||||||
resources:
|
resources:
|
|
@ -1,19 +0,0 @@
|
||||||
# file path relative to project root
|
|
||||||
input:
|
|
||||||
policy: examples/best_practices/policy_validate_container_disallow_priviledgedprivelegesecalation.yaml
|
|
||||||
resource: examples/best_practices/resources/resource_validate_container_disallow_priviledgedprivelegesecalation.yaml
|
|
||||||
expected:
|
|
||||||
validation:
|
|
||||||
policyresponse:
|
|
||||||
policy: validate-deny-privileged-disallowpriviligedescalation
|
|
||||||
resource:
|
|
||||||
kind: Pod
|
|
||||||
apiVersion: v1
|
|
||||||
namespace: ''
|
|
||||||
name: check-privileged-cfg
|
|
||||||
rules:
|
|
||||||
- name: deny-privileged-disallowpriviligedescalation
|
|
||||||
type: Validation
|
|
||||||
message: "Validation rule 'deny-privileged-disallowpriviligedescalation' failed to validate patterns defined in anyPattern. Privileged mode is not allowed. Set allowPrivilegeEscalation and privileged to false; anyPattern[0] failed at path /spec/securityContext/; anyPattern[1] failed at path /spec/containers/0/securityContext/allowPrivilegeEscalation/"
|
|
||||||
success: false
|
|
||||||
|
|
|
@ -0,0 +1,19 @@
|
||||||
|
# file path relative to project root
|
||||||
|
input:
|
||||||
|
policy: samples/best_practices/disallow_priviledged_priviligedescalation.yaml
|
||||||
|
resource: test/manifest/disallow_priviledged_priviligedescalation.yaml
|
||||||
|
expected:
|
||||||
|
validation:
|
||||||
|
policyresponse:
|
||||||
|
policy: validate-deny-privileged-priviligedescalation
|
||||||
|
resource:
|
||||||
|
kind: Pod
|
||||||
|
apiVersion: v1
|
||||||
|
namespace: ''
|
||||||
|
name: check-privileged-cfg
|
||||||
|
rules:
|
||||||
|
- name: deny-privileged-priviligedescalation
|
||||||
|
type: Validation
|
||||||
|
message: "Validation rule 'deny-privileged-priviligedescalation' failed to validate patterns defined in anyPattern. Privileged mode is not allowed. Set allowPrivilegeEscalation and privileged to false; anyPattern[0] failed at path /spec/securityContext/; anyPattern[1] failed at path /spec/containers/0/securityContext/allowPrivilegeEscalation/"
|
||||||
|
success: false
|
||||||
|
|
Loading…
Add table
Reference in a new issue