mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-06 07:57:07 +00:00
2 KiB
2 KiB
Description
This test creates a policy that enforces the restricted profile and a policy exception that exempts any pod whose image is nginx
in the staging-ns
namespace and fields:
spec.containers[*].securityContext.capabilities.add
is set tofoo
.spec.initContainers[*].securityContext.capabilities.add
is set tobaz
.
Steps
-
- Create a cluster policy
- Assert the policy becomes ready
-
- Create a policy exception for the cluster policy created above.
-
- Try to create a pod named
good-pod-1
in thedefault
namespace withspec.containers[*].securityContext.capabilities.add
set toNET_BIND_SERVICE
, expecting the creation to succeed. - Try to create a pod named
good-pod-2
whose image isnginx
in thestaging-ns
namespace withspec.containers[*].securityContext.capabilities.add
set tofoo
andspec.initContainers[*].securityContext.capabilities.add
set tobaz
, expecting the creation to succeed. - Try to create a pod named
bad-pod-1
whose image isnginx
in thestaging-ns
namespace withspec.containers[*].securityContext.capabilities.add
set tobaz
andspec.initContainers[*].securityContext.capabilities.add
set tofoo
, expecting the creation to fail. - Try to create a pod named
bad-pod-2
whose image isbusybox
in thestaging-ns
namespace withspec.containers[*].securityContext.capabilities.add
set tofoo
andspec.initContainers[*].securityContext.capabilities.add
set tobaz
, expecting the creation to fail. - Try to create a pod named
bad-pod-3
whose image isnginx
in thestaging-ns
namespace withspec.containers[*].securityContext.capabilities.add
set tofoo
andspec.ephemeralContainers[*].securityContext.capabilities.add
set tobaz
, expecting the creation to fail. - Try to create a pod named
bad-pod-4
whose image isnginx
in thedefault
namespace withspec.containers[*].securityContext.capabilities.add
set tofoo
andspec.initContainers[*].securityContext.capabilities.add
set tobaz
, expecting the creation to fail.
- Try to create a pod named