mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
add YAML and description
This commit is contained in:
parent
bf196be7a2
commit
eebfab87e5
2 changed files with 69 additions and 0 deletions
38
samples/DisallowNewCapabilities.md
Normal file
38
samples/DisallowNewCapabilities.md
Normal file
|
@ -0,0 +1,38 @@
|
|||
# Disallow new capabilities
|
||||
|
||||
Linux allows defining fine-grained permissions using
|
||||
capabilities. With Kubernetes, it is possible to add capabilities that escalate the
|
||||
level of kernel access and allow other potentially dangerous behaviors. This policy
|
||||
enforces that pods cannot add new capabilities. Other policies can be used to set
|
||||
default capabilities.
|
||||
|
||||
## Policy YAML
|
||||
|
||||
[disallow_new_capabilities.yaml](best_practices/disallow_new_capabilities.yaml)
|
||||
|
||||
````yaml
|
||||
apiVersion: kyverno.io/v1alpha1
|
||||
kind: ClusterPolicy
|
||||
metadata:
|
||||
name: validate-new-capabilities
|
||||
spec:
|
||||
rules:
|
||||
- name: deny-new-capabilities
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- Pod
|
||||
validate:
|
||||
message: "Capabilities cannot be added"
|
||||
anyPattern:
|
||||
- spec:
|
||||
securityContext:
|
||||
capabilities:
|
||||
X(add): null
|
||||
- spec:
|
||||
containers:
|
||||
- name: "*"
|
||||
securityContext:
|
||||
(capabilities):
|
||||
X(add): null
|
||||
````
|
31
samples/best_practices/disallow_new_capabilities.yaml
Normal file
31
samples/best_practices/disallow_new_capabilities.yaml
Normal file
|
@ -0,0 +1,31 @@
|
|||
apiVersion: kyverno.io/v1alpha1
|
||||
kind: ClusterPolicy
|
||||
metadata:
|
||||
name: validate-new-capabilities
|
||||
annotations:
|
||||
policies.kyverno.io/category: Security Context
|
||||
policies.kyverno.io/description: Linux allows defining fine-grained permissions using
|
||||
capabilities. With Kubernetes, it is possible to add capabilities that escalate the
|
||||
level of kernel access and allow other potentially dangerous behaviors. This policy
|
||||
enforces that pods cannot add new capabilities. Other policies can be used to set
|
||||
default capabilities.
|
||||
spec:
|
||||
rules:
|
||||
- name: deny-new-capabilities
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- Pod
|
||||
validate:
|
||||
message: "Capabilities cannot be added"
|
||||
anyPattern:
|
||||
- spec:
|
||||
securityContext:
|
||||
capabilities:
|
||||
X(add): null
|
||||
- spec:
|
||||
containers:
|
||||
- name: "*"
|
||||
securityContext:
|
||||
(capabilities):
|
||||
X(add): null
|
Loading…
Add table
Reference in a new issue