-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ValidatingAdmissionPolicy for C-0012 #26
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Suhas Gumma <[email protected]>
Signed-off-by: Suhas Gumma <[email protected]>
Signed-off-by: Suhas Gumma <[email protected]>
@suhasgumma , I think there might be an issue with the way you handle environment variables. (correct me if I am wrong) An environment variable can have a value defined in the pod spec, or it can get its value from a secret or a configmap. For example, I have an environment variable "AWS_SECRET_KEY" defined in the pod spec. If it has an immediate value specified in the Pod spec it should fail the control/policy. If it is mounted from a Kubernetes secret it is good practice! |
|
You can add comment to the policy itself, no? |
Yeah, I will do that and clearly specify it in the documentation too. |
…case Signed-off-by: Suhas Gumma <[email protected]>
@suhasgumma can you rebase and fix conflicts? |
Control C-0012
Related Resources: Workloads and ConfigMaps
Control Docs: https://hub.armosec.io/docs/c-0012
Control Rego: