Skip to content

Commit

Permalink
build: add kyverno test pre-commit
Browse files Browse the repository at this point in the history
  • Loading branch information
m0wer committed Nov 18, 2024
1 parent 741e914 commit 8ecd644
Show file tree
Hide file tree
Showing 3 changed files with 108 additions and 0 deletions.
5 changes: 5 additions & 0 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -128,4 +128,9 @@ repos:
# - "--server"
# - "https://git.knut.univention.de"

- repo: "https://git.knut.univention.de/univention/customers/dataport/upx/kyverno-test-pre-commit"
rev: "v0.1.0"
hooks:
- id: "kyverno-test"

...
88 changes: 88 additions & 0 deletions helm/stack-data-ums/.kyverno/kyverno-test.yaml.jinja2
Original file line number Diff line number Diff line change
@@ -0,0 +1,88 @@
## SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
## SPDX-License-Identifier: Apache-2.0
---
apiVersion: "cli.kyverno.io/v1alpha1"
kind: "Test"
metadata:
name: "nubus-test"
policies:
- "{{ policies_base_path }}/disallow-container-sock-mounts.yaml"
- "{{ policies_base_path }}/disallow-default-serviceaccount.yaml"
- "{{ policies_base_path }}/disallow-host-namespaces.yaml"
- "{{ policies_base_path }}/disallow-host-path.yaml"
- "{{ policies_base_path }}/disallow-host-ports.yaml"
- "{{ policies_base_path }}/disallow-host-process.yaml"
- "{{ policies_base_path }}/disallow-latest-tag.yaml"
- "{{ policies_base_path }}/require-containersecuritycontext.yaml"
- "{{ policies_base_path }}/require-health-and-liveness-check.yaml"
- "{{ policies_base_path }}/require-imagepullpolicy.yaml"
- "{{ policies_base_path }}/require-requests-limits.yaml"
- "{{ policies_base_path }}/require-tag-and-digest.yaml"
- "{{ policies_base_path }}/template-image-registries.yaml"
- "{{ policies_base_path }}/template-ingress.yaml"
- "{{ policies_base_path }}/template-replicas.yaml"
- "{{ policies_base_path }}/template-require-imagepullsecets.yaml"
- "{{ policies_base_path }}/template-storage.yaml"
resources:
- "manifest.yaml"
results:
- resources:
- "release-name-stack-data-ums-1"
policy: "disallow-default-serviceaccount"
kind: "Job"
rule: "disallow-default-serviceAccountName"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-ro-rootfs"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-no-privilege-escalation"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-all-capabilities-dropped"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-no-privileged"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-run-as-user"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-run-as-group"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-seccomp-profile"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-run-as-non-root"
result: "pass"
- resources:
- "release-name-stack-data-ums-1"
policy: "require-containersecuritycontext"
kind: "Job"
rule: "require-empty-seLinuxOptions"
result: "pass"
15 changes: 15 additions & 0 deletions helm/stack-data-ums/.kyverno/values-kyverno.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
# SPDX-License-Identifier: AGPL-3.0-only
# SPDX-FileCopyrightText: 2024 Univention GmbH
---

imagePullSecrets:
- "kyverno-test"
replicaCount: 42

global:
imageRegistry: "my_private_registry.domain.tld"
imagePullSecrets:
- "kyverno-test"
imagePullPolicy: "kyverno"

...

0 comments on commit 8ecd644

Please sign in to comment.