-
Notifications
You must be signed in to change notification settings - Fork 146
fix: clamav volumeClaimTemplates use matchLabels #522
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
replace bitnami common templates
Check failure
Code scanning / Trivy
Root file system is not read-only High
Type: helm
Vulnerability KSV014
Severity: HIGH
Message: Container 'postfix' of Deployment 'mailu-postfix' should set 'securityContext.readOnlyRootFilesystem' to true
Link: KSV014
Check failure
Code scanning / Trivy
Default security context configured High
Type: helm
Vulnerability KSV118
Severity: HIGH
Message: container mailu-postfix in namespace is using the default security context
Link: KSV118
Check warning
Code scanning / Trivy
Can elevate its own privileges Medium
Type: helm
Vulnerability KSV001
Severity: MEDIUM
Message: Container 'postfix' of Deployment 'mailu-postfix' should set 'securityContext.allowPrivilegeEscalation' to false
Link: KSV001
Check warning
Code scanning / Trivy
Runs as root user Medium
Type: helm
Vulnerability KSV012
Severity: MEDIUM
Message: Container 'postfix' of Deployment 'mailu-postfix' should set 'securityContext.runAsNonRoot' to true
Link: KSV012
Check warning
Code scanning / Trivy
Seccomp policies disabled Medium
Type: helm
Vulnerability KSV104
Severity: MEDIUM
Message: container "postfix" of deployment "mailu-postfix" in "" namespace should specify a seccomp profile
Link: KSV104
Check notice
Code scanning / Trivy
Runtime/Default Seccomp profile not set Low
Type: helm
Vulnerability KSV030
Severity: LOW
Message: Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault'
Link: KSV030
Check notice
Code scanning / Trivy
Runs with GID <= 10000 Low
Type: helm
Vulnerability KSV021
Severity: LOW
Message: Container 'postfix' of Deployment 'mailu-postfix' should set 'securityContext.runAsGroup' > 10000
Link: KSV021
Check notice
Code scanning / Trivy
Runs with UID <= 10000 Low
Type: helm
Vulnerability KSV020
Severity: LOW
Message: Container 'postfix' of Deployment 'mailu-postfix' should set 'securityContext.runAsUser' > 10000
Link: KSV020
Check notice
Code scanning / Trivy
Default capabilities: some containers do not drop any Low
Type: helm
Vulnerability KSV004
Severity: LOW
Message: Container 'postfix' of 'deployment' 'mailu-postfix' in '' namespace should set securityContext.capabilities.drop
Link: KSV004
Check notice
Code scanning / Trivy
Default capabilities: some containers do not drop all Low
Type: helm
Vulnerability KSV003
Severity: LOW
Message: Container 'postfix' of Deployment 'mailu-postfix' should add 'ALL' to 'securityContext.capabilities.drop'
Link: KSV003
707c54d to
eceef9c
Compare
(grep -r 'include "common' ./mailu/templates/| sed -e 's/.*include "\(common[^"]*\)" .*/\1/') |sort | uniq -c | sortfixes #513