1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-29 10:55:05 +00:00

update sysctl

This commit is contained in:
Shuting Zhao 2019-10-07 11:35:04 -07:00
parent c80f9e0f9d
commit 16a851cd8b
5 changed files with 5 additions and 4 deletions

View file

@ -22,4 +22,5 @@
| Allow an FSGroup that owns the pod's volumes | [policy_validate_fsgroup.yaml](policy_validate_fsgroup.yaml) |
| Require SELinux level of the container | [policy_validate_selinux_context.yaml](policy_validate_selinux_context.yaml) |
| Allow default Proc Mount type | [policy_validate_default_proc_mount.yaml](policy_validate_default_proc_mount.yaml) |
| Allow certain capability to be added | [policy_validate_container_capabilities.yaml](policy_validate_container_capabilities.yaml) |
| Allow certain capability to be added | [policy_validate_container_capabilities.yaml](policy_validate_container_capabilities.yaml) |
| Allow local tcp/udp port range | [policy_validate_sysctl_configs.yaml](policy_validate_sysctl_configs.yaml) |

View file

@ -129,5 +129,5 @@ func Test_validate_container_capabilities(t *testing.T) {
}
func Test_validate_disallow_sysctl(t *testing.T) {
testScenario(t, "test/scenarios/test/scenario_validate_disallow_sysctl.yaml")
testScenario(t, "test/scenarios/test/scenario_validate_sysctl_configs.yaml")
}

View file

@ -1,8 +1,8 @@
# file path relative to project root
input:
policy: examples/best_practices/policy_validate_disallow_sysctl.yaml
resource: examples/best_practices/resources/resource_disallow_sysctl.yaml
policy: examples/best_practices/policy_validate_sysctl_configs.yaml
resource: examples/best_practices/resources/resource_validate_sysctl_configs.yaml
expected:
validation:
policyresponse: