mirror of
https://github.com/kyverno/kyverno.git
synced 2024-12-15 17:51:20 +00:00
…
|
||
---|---|---|
.. | ||
chainsaw-test.yaml | ||
exception.yaml | ||
ns.yaml | ||
pod-allowed-1.yaml | ||
pod-allowed-2.yaml | ||
pod-rejected-1.yaml | ||
pod-rejected-2.yaml | ||
pod-rejected-3.yaml | ||
policy-assert.yaml | ||
policy.yaml | ||
README.md |
Description
This test creates a policy that enforces the restricted profile and a policy exception that exempts any pod whose image is nginx
in the staging-ns
namespace and sets the spec.containers[*].securityContext.runAsUser
field to 0.
Steps
-
- Create a cluster policy
- Assert the policy becomes ready
-
- Create a policy exception for the cluster policy created above.
-
- Try to create a pod named
good-pod-1
in thedefault
namespace that doesn't violate the restricted profile, expecting the creation to succeed. - Try to create a pod named
good-pod-2
whose image isnginx
in thestaging-ns
namespace and thespec.containers[*].securityContext.runAsUser
is set to 0, expecting the creation to succeed. - Try to create a pod named
bad-pod-1
whose image isnginx
in thestaging-ns
namespace and thespec.containers[*].securityContext.runAsUser
is set to 0 and thespec.initContainers[*].securityContext.runAsNonRoot
is set to 0, expecting the creation to fail. - Try to create a pod named
bad-pod-2
whose image isbusybox
in thestaging-ns
namespace and thespec.containers[*].securityContext.runAsUser
is set to 0, expecting the creation to fail. - Try to create a pod named
bad-pod-3
whose image isnginx
in thedefault
namespace and thespec.containers[*].securityContext.runAsUser
is set to 0, expecting the creation to fail.
- Try to create a pod named