1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-10 18:06:55 +00:00
kyverno/test/conformance/chainsaw/validate/e2e/trusted-images
Mariam Fahmy 2140a0239b
chore: rename validationFailureAction to failureAction under the rule (#10893)
Signed-off-by: Mariam Fahmy <mariam.fahmy@nirmata.com>
Co-authored-by: Jim Bugwadia <jim@nirmata.com>
2024-08-27 20:07:57 +00:00
..
bad.yaml chore: all chainsaw tests (#9011) 2023-11-24 11:17:58 +01:00
chainsaw-step-02-apply-1-1.yaml chore: convert chainsaw tests to Test resource (#9113) 2023-12-07 22:38:30 +01:00
chainsaw-test.yaml chore: convert chainsaw tests to Test resource (#9113) 2023-12-07 22:38:30 +01:00
policy-ready.yaml chore: all chainsaw tests (#9011) 2023-11-24 11:17:58 +01:00
policy.yaml chore: rename validationFailureAction to failureAction under the rule (#10893) 2024-08-27 20:07:57 +00:00
README.md chore: all chainsaw tests (#9011) 2023-11-24 11:17:58 +01:00

Description

This test is migrated from e2e. It tests an imageRegistry context lookup for a "real" image and states that an image built to run as root can only come from GHCR.

Expected Behavior

If an image is built to run as root user and it does NOT come from GHCR, the Pod is blocked. If it either isn't built to run as root OR it is built to run as root and does come from GHCR, it is allowed.

Reference Issue(s)

N/A