-
Notifications
You must be signed in to change notification settings - Fork 4
/
artifacthub-pkg.yml
70 lines (70 loc) · 2.41 KB
/
artifacthub-pkg.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
# Kubewarden Artifacthub Package config
#
# Use this config to submit the policy to https://artifacthub.io.
#
# This config can be saved to its default location with:
# kwctl scaffold artifacthub > artifacthub-pkg.yml
version: 0.1.13
name: psp-apparmor
displayName: Apparmor PSP
createdAt: 2023-10-16T08:41:48.344835749Z
description: Replacement for the Kubernetes Pod Security Policy that controls the usage of AppArmor profiles
license: Apache-2.0
homeURL: https://github.com/kubewarden/apparmor-psp-policy
containersImages:
- name: policy
image: ghcr.io/kubewarden/policies/apparmor-psp:v0.1.13
keywords:
- psp
- apparmor
links:
- name: policy
url: https://github.com/kubewarden/apparmor-psp-policy/releases/download/v0.1.13/policy.wasm
- name: source
url: https://github.com/kubewarden/apparmor-psp-policy
install: |
The policy can be obtained using [`kwctl`](https://github.com/kubewarden/kwctl):
```console
kwctl pull ghcr.io/kubewarden/policies/apparmor-psp:v0.1.13
```
Then, generate the policy manifest and tune it to your liking. For example:
```console
kwctl scaffold manifest -t ClusterAdmissionPolicy registry://ghcr.io/kubewarden/policies/apparmor-psp:v0.1.13
```
maintainers:
- name: Kubewarden developers
email: [email protected]
provider:
name: kubewarden
recommendations:
- url: https://artifacthub.io/packages/helm/kubewarden/kubewarden-controller
annotations:
kubewarden/mutation: 'false'
kubewarden/questions-ui: |
questions:
- default: []
description: >-
This policy works by defining a whitelist of allowed AppArmor profiles. Pods
are then inspected at creation and update time, to ensure only approved
profiles are used. When no AppArmor profile is defined, Kubernetes will
leave the final choice to the underlying container runtime. This will result
in using the default AppArmor profile provided by Container Runtime. Because
of that, the default behaviour of this policy is to accept workloads that do
not have an AppArmor profile specified.
tooltip: Provide a list of allowed AppArmor profiles
group: Settings
label: Allowed profiles
required: false
type: array[
variable: allowed_profiles
kubewarden/resources: Pod
kubewarden/rules: |
- apiGroups:
- ''
apiVersions:
- v1
resources:
- pods
operations:
- CREATE
- UPDATE