Skip to content

Commit

Permalink
feat: background audit config, severity and category annotations.
Browse files Browse the repository at this point in the history
Updates policy metadata.yml file adding the new configuration to enabled
background audit checks and adds two new annotations used by the audit
scanner in its reports.

Signed-off-by: José Guilherme Vanz <[email protected]>
  • Loading branch information
jvanz committed Jul 5, 2023
1 parent fbfda32 commit 33deeea
Showing 1 changed file with 48 additions and 20 deletions.
68 changes: 48 additions & 20 deletions metadata.yml
Original file line number Diff line number Diff line change
@@ -1,33 +1,61 @@
rules:
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["pods"]
operations: ["CREATE"] # kubernetes doesn't allow to add/remove privileged containers to an already running pod
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["replicationcontrollers"]
operations: ["CREATE", "UPDATE"]
- apiGroups: ["apps"]
apiVersions: ["v1"]
resources: ["deployments","replicasets","statefulsets","daemonsets"]
operations: ["CREATE", "UPDATE"]
- apiGroups: ["batch"]
apiVersions: ["v1"]
resources: ["jobs","cronjobs"]
operations: ["CREATE", "UPDATE"]
- apiGroups:
- ''
apiVersions:
- v1
resources:
- pods
operations:
- CREATE
- apiGroups:
- ''
apiVersions:
- v1
resources:
- replicationcontrollers
operations:
- CREATE
- UPDATE
- apiGroups:
- apps
apiVersions:
- v1
resources:
- deployments
- replicasets
- statefulsets
- daemonsets
operations:
- CREATE
- UPDATE
- apiGroups:
- batch
apiVersions:
- v1
resources:
- jobs
- cronjobs
operations:
- CREATE
- UPDATE
mutating: false
contextAware: false
backgroundAudit: true
executionMode: kubewarden-wapc
annotations:
# artifacthub specific
io.artifacthub.displayName: Environment Variable Secrets Scanner
io.artifacthub.resources: Pod,Deployment,Replicaset,Statefulset,Daemonset,Replicationcontroller,Job,Cronjob
io.artifacthub.keywords: secrets, api keys, tokens, secret leak, confidential data, confidential data leak
io.artifacthub.keywords: secrets, api keys, tokens, secret leak, confidential data,
confidential data leak
# kubewarden specific
io.kubewarden.policy.ociUrl: ghcr.io/kubewarden/policies/env-variable-secrets-scanner
# rest
io.kubewarden.policy.title: env-variable-secrets-scanner
io.kubewarden.policy.description: Policy that inspects env vars and rejects a request if a secret was found
io.kubewarden.policy.author: "Kubewarden developers <[email protected]>"
io.kubewarden.policy.description: Policy that inspects env vars and rejects a request
if a secret was found
io.kubewarden.policy.author: Kubewarden developers <[email protected]>
io.kubewarden.policy.url: https://github.com/kubewarden/env-variable-secrets-scanner-policy
io.kubewarden.policy.source: https://github.com/kubewarden/env-variable-secrets-scanner-policy
io.kubewarden.policy.license: Apache-2.0
io.kubewarden.policy.category: resource-validation
io.kubewarden.policy.severity: high

0 comments on commit 33deeea

Please sign in to comment.