asd
This commit is contained in:
@@ -1,54 +1,54 @@
|
||||
---
|
||||
apiVersion: kyverno.io/v1
|
||||
kind: Policy
|
||||
metadata:
|
||||
name: add-default-securitycontext
|
||||
namespace: memelord-raiko
|
||||
spec:
|
||||
rules:
|
||||
- name: add-default-securitycontext
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- Pod
|
||||
mutate:
|
||||
patchStrategicMerge:
|
||||
spec:
|
||||
securityContext:
|
||||
+(runAsNonRoot): true
|
||||
+(runAsUser): 1000
|
||||
+(runAsGroup): 3000
|
||||
+(fsGroup): 2000
|
||||
|
||||
---
|
||||
apiVersion: kyverno.io/v1
|
||||
kind: Policy
|
||||
metadata:
|
||||
name: require-run-as-non-root-user
|
||||
namespace: memelord-raiko
|
||||
spec:
|
||||
validationFailureAction: Enforce
|
||||
background: false
|
||||
rules:
|
||||
- name: run-as-non-root-user
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- Pod
|
||||
validate:
|
||||
message: Running as root is not allowed. The fields spec.securityContext.runAsUser, spec.containers[*].securityContext.runAsUser, spec.initContainers[*].securityContext.runAsUser, and spec.ephemeralContainers[*].securityContext.runAsUser must be unset or set to a number greater than zero.
|
||||
pattern:
|
||||
spec:
|
||||
"=(securityContext)":
|
||||
"=(runAsUser)": ">0"
|
||||
"=(ephemeralContainers)":
|
||||
- "=(securityContext)":
|
||||
"=(runAsUser)": ">0"
|
||||
"=(initContainers)":
|
||||
- "=(securityContext)":
|
||||
"=(runAsUser)": ">0"
|
||||
containers:
|
||||
- "=(securityContext)":
|
||||
"=(runAsUser)": ">0"
|
||||
# ---
|
||||
# apiVersion: kyverno.io/v1
|
||||
# kind: Policy
|
||||
# metadata:
|
||||
# name: add-default-securitycontext
|
||||
# namespace: memelord-raiko
|
||||
# spec:
|
||||
# rules:
|
||||
# - name: add-default-securitycontext
|
||||
# match:
|
||||
# any:
|
||||
# - resources:
|
||||
# kinds:
|
||||
# - Pod
|
||||
# mutate:
|
||||
# patchStrategicMerge:
|
||||
# spec:
|
||||
# securityContext:
|
||||
# +(runAsNonRoot): true
|
||||
# +(runAsUser): 1000
|
||||
# +(runAsGroup): 3000
|
||||
# +(fsGroup): 2000
|
||||
#
|
||||
# ---
|
||||
# apiVersion: kyverno.io/v1
|
||||
# kind: Policy
|
||||
# metadata:
|
||||
# name: require-run-as-non-root-user
|
||||
# namespace: memelord-raiko
|
||||
# spec:
|
||||
# validationFailureAction: Enforce
|
||||
# background: false
|
||||
# rules:
|
||||
# - name: run-as-non-root-user
|
||||
# match:
|
||||
# any:
|
||||
# - resources:
|
||||
# kinds:
|
||||
# - Pod
|
||||
# validate:
|
||||
# message: Running as root is not allowed. The fields spec.securityContext.runAsUser, spec.containers[*].securityContext.runAsUser, spec.initContainers[*].securityContext.runAsUser, and spec.ephemeralContainers[*].securityContext.runAsUser must be unset or set to a number greater than zero.
|
||||
# pattern:
|
||||
# spec:
|
||||
# "=(securityContext)":
|
||||
# "=(runAsUser)": ">0"
|
||||
# "=(ephemeralContainers)":
|
||||
# - "=(securityContext)":
|
||||
# "=(runAsUser)": ">0"
|
||||
# "=(initContainers)":
|
||||
# - "=(securityContext)":
|
||||
# "=(runAsUser)": ">0"
|
||||
# containers:
|
||||
# - "=(securityContext)":
|
||||
# "=(runAsUser)": ">0"
|
||||
|
||||
Reference in New Issue
Block a user