mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-06 07:57:07 +00:00
1.4 KiB
1.4 KiB
Description
This test creates a policy that enforces the baseline profile and a policy exception that exempts any pod whose image is nginx
in the staging-ns
namespace and sets the securityContext.privileged
field in containers and initContainers only.
Steps
-
- Create a cluster policy
- Assert the policy becomes ready
-
- Create a policy exception for the cluster policy created above.
-
- Try to create a pod named
good-pod-1
withsecurityContext.privileged
set tofalse
in thedefault
namespace, expecting the creation to succeed. - Try to create a pod named
good-pod-2
whose image isnginx
in thestaging-ns
namespace and thesecurityContext.privileged
is set totrue
in containers and initContainers, expecting the creation to succeed. - Try to create a pod named
bad-pod-1
whose image isnginx
in thestaging-ns
namespace and thesecurityContext.privileged
is set totrue
in containers, initContainers and ephemeralContainers, expecting the creation to fail. - Try to create a pod named
bad-pod-2
whose image isbusybox
in thestaging-ns
namespace and thesecurityContext.privileged
is set totrue
in containers and initContainers, expecting the creation to fail. - Try to create a pod named
bad-pod-3
whose image isnginx
in thedefault
namespace and thesecurityContext.privileged
is set totrue
, expecting the creation to fail.
- Try to create a pod named