mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
update testrunner for examples/best_practices/policy_validate_container_security_context.yaml
This commit is contained in:
parent
bc087d7918
commit
b667c47587
4 changed files with 46 additions and 18 deletions
|
@ -20,12 +20,6 @@ spec:
|
||||||
- spec:
|
- spec:
|
||||||
securityContext:
|
securityContext:
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
# pattern:
|
|
||||||
# spec:
|
|
||||||
# containers:
|
|
||||||
# - name: "*"
|
|
||||||
# securityContext:
|
|
||||||
# runAsNonRoot: true
|
|
||||||
- name: check-privilege
|
- name: check-privilege
|
||||||
exclude:
|
exclude:
|
||||||
resources:
|
resources:
|
||||||
|
@ -37,15 +31,10 @@ spec:
|
||||||
- Pod
|
- Pod
|
||||||
validate:
|
validate:
|
||||||
message: "Privileged mode is not allowed. Set allowPrivilegeEscalatin and privileged to false"
|
message: "Privileged mode is not allowed. Set allowPrivilegeEscalatin and privileged to false"
|
||||||
anyPattern:
|
pattern:
|
||||||
- spec:
|
spec:
|
||||||
securityContext:
|
containers:
|
||||||
allowPrivilegeEscalation: false
|
- name: "*"
|
||||||
privileged: false
|
securityContext:
|
||||||
# pattern:
|
allowPrivilegeEscalation: false
|
||||||
# spec:
|
privileged: false
|
||||||
# containers:
|
|
||||||
# - name: "*"
|
|
||||||
# securityContext:
|
|
||||||
# allowPrivilegeEscalation: false
|
|
||||||
# privileged: false
|
|
|
@ -0,0 +1,13 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Pod
|
||||||
|
metadata:
|
||||||
|
name: check-container-security-context
|
||||||
|
spec:
|
||||||
|
securityContext:
|
||||||
|
runAsNonRoot: true
|
||||||
|
containers:
|
||||||
|
- name: check-container-security-context
|
||||||
|
image: nginxinc/nginx-unprivileged
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: true
|
||||||
|
privileged: false
|
|
@ -18,6 +18,10 @@ func Test_validate_containerSecurityContext(t *testing.T) {
|
||||||
testScenario(t, "/test/scenarios/test/scenario_validate_containerSecurityContext.yaml")
|
testScenario(t, "/test/scenarios/test/scenario_validate_containerSecurityContext.yaml")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func Test_validate_checkContainerSecurityContext(t *testing.T) {
|
||||||
|
testScenario(t, "/test/scenarios/test/scenario_validate_container_security_context.yaml")
|
||||||
|
}
|
||||||
|
|
||||||
func Test_validate_healthChecks(t *testing.T) {
|
func Test_validate_healthChecks(t *testing.T) {
|
||||||
testScenario(t, "/test/scenarios/test/scenario_validate_healthChecks.yaml")
|
testScenario(t, "/test/scenarios/test/scenario_validate_healthChecks.yaml")
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,22 @@
|
||||||
|
# file path relative to project root
|
||||||
|
input:
|
||||||
|
policy: examples/best_practices/policy_validate_container_security_context.yaml
|
||||||
|
resource: examples/best_practices/resources/resource_validate_container_security_context.yaml
|
||||||
|
expected:
|
||||||
|
validation:
|
||||||
|
policyresponse:
|
||||||
|
policy: check-container-security-context
|
||||||
|
resource:
|
||||||
|
kind: Pod
|
||||||
|
apiVersion: v1
|
||||||
|
namespace: ''
|
||||||
|
name: check-container-security-context
|
||||||
|
rules:
|
||||||
|
- name: check-root-user
|
||||||
|
type: Validation
|
||||||
|
message: "Validation rule 'check-root-user' anyPattern[0] succesfully validated"
|
||||||
|
success: true
|
||||||
|
- name: check-privilege
|
||||||
|
type: Validation
|
||||||
|
message: "Validation rule 'check-privilege' failed at '/spec/containers/0/securityContext/allowPrivilegeEscalation/' for resource Pod//check-container-security-context. Privileged mode is not allowed. Set allowPrivilegeEscalatin and privileged to false"
|
||||||
|
success: false
|
Loading…
Add table
Reference in a new issue