translate everything

This commit is contained in:
Carlos Polop
2024-12-31 18:35:05 +01:00
parent 145008516e
commit 7770a50092
483 changed files with 1930 additions and 0 deletions

View File

@@ -17,3 +17,7 @@ openshift-scc.md
{{#ref}}
openshift-privilege-escalation/
{{#endref}}

View File

@@ -38,3 +38,7 @@ openshift-scc.md
{{#ref}}
https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#security-context-constraints
{{#endref}}

View File

@@ -37,3 +37,7 @@ You can just edit a build script (such as Jenkinsfile), commit and push (eventua
{{#ref}}
openshift-jenkins-build-overrides.md
{{#endref}}

View File

@@ -17,3 +17,7 @@ openshift-tekton.md
{{#ref}}
openshift-scc-bypass.md
{{#endref}}

View File

@@ -21,3 +21,7 @@ The following tool can be use to enumerate this issue and more generally to grap
{{#ref}}
https://github.com/maxDcb/OpenShiftGrapher
{{#endref}}

View File

@@ -136,3 +136,7 @@ To bypass GateKeeper's rules and set this label to execute a cluster takeover, *
- [https://docs.openshift.com/container-platform/4.8/authentication/managing-security-context-constraints.html](https://docs.openshift.com/container-platform/4.8/authentication/managing-security-context-constraints.html)
- [https://docs.openshift.com/container-platform/3.11/admin_guide/manage_scc.html](https://docs.openshift.com/container-platform/3.11/admin_guide/manage_scc.html)
- [https://github.com/open-policy-agent/gatekeeper](https://github.com/open-policy-agent/gatekeeper)

View File

@@ -73,3 +73,7 @@ spec:
default: "restricted-v2"
maxAllowed: "privileged"
```

View File

@@ -66,3 +66,7 @@ openshift-privilege-escalation/openshift-scc-bypass.md
## References
- [https://www.redhat.com/en/blog/managing-sccs-in-openshift](https://www.redhat.com/en/blog/managing-sccs-in-openshift)