You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`securityContext.capabilities.drop`| Linux capabilities to drop |`["ALL"]`|
303
303
|`securityContext.seccompProfile.type`| Seccomp profile type |`RuntimeDefault`|
304
304
305
+
## Image Signature Verification
306
+
307
+
Devolutions Server container images are signed with [cosign](https://docs.sigstore.dev/cosign/overview/). You can verify the signature of any image using the public key below:
If you use [Kyverno](https://kyverno.io/), you can enforce image signature verification at the cluster level with an `ImageValidatingPolicy`. The example below audits pods in a specific namespace — change `validationActions` to `["Enforce"]` to block unsigned images.
327
+
328
+
```yaml
329
+
apiVersion: policies.kyverno.io/v1
330
+
kind: ImageValidatingPolicy
331
+
metadata:
332
+
name: verify-dvls-image-signatures
333
+
spec:
334
+
webhookConfiguration:
335
+
timeoutSeconds: 15
336
+
evaluation:
337
+
background:
338
+
enabled: true
339
+
validationActions: ["Audit"]
340
+
matchConstraints:
341
+
resourceRules:
342
+
- apiGroups: [""]
343
+
apiVersions: ["v1"]
344
+
operations: ["CREATE", "UPDATE"]
345
+
resources: ["pods"]
346
+
namespaceSelector:
347
+
matchLabels:
348
+
kubernetes.io/metadata.name: devolutions-server # adjust to your namespace
349
+
matchImageReferences:
350
+
- glob: "devolutions/devolutions-server:*"
351
+
credentials:
352
+
secrets: ["docker-hub"] # your Docker Hub pull secret
0 commit comments