-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Behaviour of drop capabilities using ALL #11
Comments
The PSS/restricted spec does explicitly require 'ALL' and the Pod Security Admission controller implementation requires 'ALL' as well. My understanding is as follows based on correspondence with @tallclair
This is one of the axes I grind, e.g., kyverno/policies#450 |
@joebowbeer thanks for the prompt response. The provided context is sufficient for my use case and general doubts, please feel free to close this issue. |
Quick question, if we want to set the
ALL
entry for the capabilities.drop , is there a difference on usingALL
vsall
. On PSP definitions, we use to setall
, but it seems PSA is opinionated on allowing onlyALL
. Is there any context you can provide on this?The text was updated successfully, but these errors were encountered: