Skip to content

Commit

Permalink
feat: background audit config, severity and category annotations.
Browse files Browse the repository at this point in the history
Updates policy metadata.yml file adding the new configuration to enabled
background audit checks and adds two new annotations used by the audit
scanner in its reports.

Signed-off-by: José Guilherme Vanz <[email protected]>
  • Loading branch information
jvanz committed Jul 7, 2023
1 parent 5e9a635 commit 89b1dbf
Showing 1 changed file with 46 additions and 19 deletions.
65 changes: 46 additions & 19 deletions metadata.yml
Original file line number Diff line number Diff line change
@@ -1,33 +1,60 @@
rules:
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["pods"]
operations: ["CREATE"] # kubernetes doesn't allow to add/remove privileged containers to an already running pod
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["replicationcontrollers"]
operations: ["CREATE", "UPDATE"]
- apiGroups: ["apps"]
apiVersions: ["v1"]
resources: ["deployments","replicasets","statefulsets","daemonsets"]
operations: ["CREATE", "UPDATE"]
- apiGroups: ["batch"]
apiVersions: ["v1"]
resources: ["jobs","cronjobs"]
operations: ["CREATE", "UPDATE"]
- apiGroups:
- ''
apiVersions:
- v1
resources:
- pods
operations:
- CREATE
- apiGroups:
- ''
apiVersions:
- v1
resources:
- replicationcontrollers
operations:
- CREATE
- UPDATE
- apiGroups:
- apps
apiVersions:
- v1
resources:
- deployments
- replicasets
- statefulsets
- daemonsets
operations:
- CREATE
- UPDATE
- apiGroups:
- batch
apiVersions:
- v1
resources:
- jobs
- cronjobs
operations:
- CREATE
- UPDATE
mutating: true
contextAware: false
executionMode: kubewarden-wapc
annotations:
# artifacthub specific:
# artifacthub specific
io.artifacthub.displayName: Allow Privilege Escalation PSP
io.artifacthub.resources: Deployment,Replicaset,Statefulset,Daemonset,Replicationcontroller,Job,Cronjob,Pod
io.artifacthub.keywords: PSP, privilege escalation
# kubewarden specific
io.kubewarden.policy.ociUrl: ghcr.io/kubewarden/policies/allow-privilege-escalation-psp
# kubewarden specific:
io.kubewarden.policy.title: allow-privilege-escalation-psp
io.kubewarden.policy.description: Replacement for the Kubernetes Pod Security Policy that controls the allowance of privilege escalation in containers and init containers of a pod
io.kubewarden.policy.description: Replacement for the Kubernetes Pod Security Policy
that controls the allowance of privilege escalation in containers and init containers
of a pod
io.kubewarden.policy.author: Kubewarden developers <[email protected]>
io.kubewarden.policy.url: https://github.com/kubewarden/allow-privilege-escalation-psp-policy
io.kubewarden.policy.source: https://github.com/kubewarden/allow-privilege-escalation-psp-policy
io.kubewarden.policy.license: Apache-2.0
io.kubewarden.policy.severity: medium
io.kubewarden.policy.category: PSP

0 comments on commit 89b1dbf

Please sign in to comment.