1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-10 09:56:55 +00:00
kyverno/test/conformance/chainsaw/validate/e2e/trusted-images(deprecated)
Mariam Fahmy 340009f55f
feat: add chainsaw tests for validate policies (#10544)
Signed-off-by: Mariam Fahmy <mariam.fahmy@nirmata.com>
2024-06-26 10:39:54 +00:00
..
bad.yaml feat: add chainsaw tests for validate policies (#10544) 2024-06-26 10:39:54 +00:00
chainsaw-step-02-apply-1-1.yaml feat: add chainsaw tests for validate policies (#10544) 2024-06-26 10:39:54 +00:00
chainsaw-test.yaml feat: add chainsaw tests for validate policies (#10544) 2024-06-26 10:39:54 +00:00
policy-ready.yaml feat: add chainsaw tests for validate policies (#10544) 2024-06-26 10:39:54 +00:00
policy.yaml feat: add chainsaw tests for validate policies (#10544) 2024-06-26 10:39:54 +00:00
README.md feat: add chainsaw tests for validate policies (#10544) 2024-06-26 10:39:54 +00:00

Description

This test is migrated from e2e. It tests an imageRegistry context lookup for a "real" image and states that an image built to run as root can only come from GHCR.

Expected Behavior

If an image is built to run as root user and it does NOT come from GHCR, the Pod is blocked. If it either isn't built to run as root OR it is built to run as root and does come from GHCR, it is allowed.

Reference Issue(s)

N/A