Files
podman/test/e2e/test.yaml
Daniel J Walsh 65ed819932 Set SELinux labels based on the security context in the kube.yaml
If the kube.yaml specifieds the SELinux type or Level, we need the container
to be launched with the correct label.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2019-11-05 04:09:01 -05:00

35 lines
715 B
YAML

# Save the output of this file and use kubectl create -f to import
# it into Kubernetes.
#
# Created with podman-1.6.2
apiVersion: v1
kind: Pod
metadata:
labels:
app: test
name: test
spec:
containers:
- command:
- sleep
- "100"
env:
- name: PATH
value: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
- name: TERM
value: xterm
- name: container
value: podman
image: docker.io/library/fedora:latest
name: test
resources: {}
securityContext:
allowPrivilegeEscalation: true
capabilities: {}
privileged: false
seLinuxOptions:
level: "s0:c1,c2"
readOnlyRootFilesystem: false
workingDir: /
status: {}