Skip to content

Commit

Permalink
Merge pull request #39 from kubewarden/fix-metadata
Browse files Browse the repository at this point in the history
fix: ensure correct metadata is used
  • Loading branch information
flavio authored Feb 6, 2023
2 parents e1b993a + 97f439d commit f384840
Show file tree
Hide file tree
Showing 4 changed files with 32 additions and 8 deletions.
2 changes: 1 addition & 1 deletion Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[package]
name = "allow-privilege-escalation-psp"
version = "0.2.1"
version = "0.2.2"
authors = ["Flavio Castelli <[email protected]>"]
edition = "2018"

Expand Down
22 changes: 17 additions & 5 deletions artifacthub-pkg.yml
Original file line number Diff line number Diff line change
@@ -1,21 +1,21 @@
---
version: 0.2.1
version: 0.2.2
name: allow-privilege-escalation-psp
displayName: Allow Privilege Escalation PSP
createdAt: '2023-01-19T14:46:21+02:00'
createdAt: '2023-02-06T14:46:21+02:00'
description: A Pod Security Policy that controls usage of `allowPrivilegeEscalation`
license: Apache-2.0
homeURL: https://github.com/kubewarden/allow-privilege-escalation-psp-policy
containersImages:
- name: policy
image: ghcr.io/kubewarden/policies/allow-privilege-escalation-psp:v0.2.1
image: ghcr.io/kubewarden/policies/allow-privilege-escalation-psp:v0.2.2
keywords:
- psp
- container
- privilege escalation
links:
- name: policy
url: https://github.com/kubewarden/allow-privilege-escalation-psp-policy/releases/download/v0.2.1/policy.wasm
url: https://github.com/kubewarden/allow-privilege-escalation-psp-policy/releases/download/v0.2.2/policy.wasm
- name: source
url: https://github.com/kubewarden/allow-privilege-escalation-psp-policy
provider:
Expand All @@ -30,7 +30,19 @@ annotations:
rules:
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["deployment","replicaset","statefulset","daemonset","replicationcontroller","job","cronjob","pod"]
resources: ["pods"]
operations: ["CREATE"] # kubernetes doesn't allow to add/remove privileged containers to an already running pod
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["replicationcontrollers"]
operations: ["CREATE", "UPDATE"]
- apiGroups: ["apps"]
apiVersions: ["v1"]
resources: ["deployments","replicasets","statefulsets","daemonsets"]
operations: ["CREATE", "UPDATE"]
- apiGroups: ["batch"]
apiVersions: ["v1"]
resources: ["jobs","cronjobs"]
operations: ["CREATE", "UPDATE"]
kubewarden/questions-ui: |
questions:
Expand Down
14 changes: 13 additions & 1 deletion metadata.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,19 @@
rules:
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["deployment","replicaset","statefulset","daemonset","replicationcontroller","job","cronjob","pod"]
resources: ["pods"]
operations: ["CREATE"] # kubernetes doesn't allow to add/remove privileged containers to an already running pod
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["replicationcontrollers"]
operations: ["CREATE", "UPDATE"]
- apiGroups: ["apps"]
apiVersions: ["v1"]
resources: ["deployments","replicasets","statefulsets","daemonsets"]
operations: ["CREATE", "UPDATE"]
- apiGroups: ["batch"]
apiVersions: ["v1"]
resources: ["jobs","cronjobs"]
operations: ["CREATE", "UPDATE"]
mutating: true
contextAware: false
Expand Down

0 comments on commit f384840

Please sign in to comment.